[PATCH 4.15 32/47] dpaa_eth: remove duplicate initialization

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Camelia Groza [ Upstream commit 565186362b73226a288830abe595f05f0cec0bbc ] The fd_format has already been initialized at this point. Signed-off-by: Camelia Groza Signed-off-by: David S.

Re: [RFC PATCH for 4.17 02/21] rseq: Introduce restartable sequences system call (v12)

2018-03-29 Thread Mathieu Desnoyers
- On Mar 29, 2018, at 2:07 PM, rostedt rost...@goodmis.org wrote: > On Thu, 29 Mar 2018 14:02:33 -0400 (EDT) > Mathieu Desnoyers wrote: > >> Currently, anyone using ptrace on a process has pretty much given up all >> hopes of performance. Processes will use rseq to gain performance, not the

[PATCH 4.15 31/47] dpaa_eth: fix error in dpaa_remove()

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Madalin Bucur [ Upstream commit 88075256ee817041d68c2387f29065b5cb2b342a ] The recent changes that make the driver probing compatible with DSA were not propagated in

[PATCH 4.15 31/47] dpaa_eth: fix error in dpaa_remove()

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Madalin Bucur [ Upstream commit 88075256ee817041d68c2387f29065b5cb2b342a ] The recent changes that make the driver probing compatible with DSA were not propagated in the dpa_remove()

[PATCH 4.15 33/47] dpaa_eth: increment the RX dropped counter when needed

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Camelia Groza [ Upstream commit e4d1b37c17d000a3da9368a3e260fb9ea4927c25 ] Signed-off-by: Camelia Groza Signed-off-by: David S. Miller

[PATCH 4.15 33/47] dpaa_eth: increment the RX dropped counter when needed

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Camelia Groza [ Upstream commit e4d1b37c17d000a3da9368a3e260fb9ea4927c25 ] Signed-off-by: Camelia Groza Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman ---

[PATCH 4.15 35/47] dccp: check sk for closed state in dccp_sendmsg()

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Alexey Kodanev [ Upstream commit 67f93df79aeefc3add4e4b31a752600f834236e2 ] dccp_disconnect() sets 'dp->dccps_hc_tx_ccid' tx handler to NULL, therefore if DCCP

[PATCH 4.15 35/47] dccp: check sk for closed state in dccp_sendmsg()

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Alexey Kodanev [ Upstream commit 67f93df79aeefc3add4e4b31a752600f834236e2 ] dccp_disconnect() sets 'dp->dccps_hc_tx_ccid' tx handler to NULL, therefore if DCCP socket is disconnected and

Re: [PATCH v2 08/11] block: sed-opal: ioctl for writing to shadow mbr

2018-03-29 Thread catchall
On Thu, Mar 29, 2018 at 11:16:42AM -0600, Scott Bauer wrote: > Yeah, having to autheticate to write the MBR is a real bummer. Theoretically > you could dd a the pw struct + the shador MBR into sysfs. But that's > a pretty disgusting hack just to use sysfs. The other method I thought of > was to

Re: [PATCH v2 08/11] block: sed-opal: ioctl for writing to shadow mbr

2018-03-29 Thread catchall
On Thu, Mar 29, 2018 at 11:16:42AM -0600, Scott Bauer wrote: > Yeah, having to autheticate to write the MBR is a real bummer. Theoretically > you could dd a the pw struct + the shador MBR into sysfs. But that's > a pretty disgusting hack just to use sysfs. The other method I thought of > was to

[PATCH 4.15 09/47] macvlan: filter out unsupported feature flags

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Shannon Nelson [ Upstream commit 13fbcc8dc573482dd3f27568257fd7087f8935f4 ] Adding a macvlan device on top of a lowerdev that supports the xfrm offloads fails with

[PATCH 4.15 09/47] macvlan: filter out unsupported feature flags

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Shannon Nelson [ Upstream commit 13fbcc8dc573482dd3f27568257fd7087f8935f4 ] Adding a macvlan device on top of a lowerdev that supports the xfrm offloads fails with a new regression: # ip

[PATCH 4.15 36/47] ipv6: fix access to non-linear packet in ndisc_fill_redirect_hdr_option()

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Lorenzo Bianconi [ Upstream commit 9f62c15f28b0d1d746734666d88a79f08ba1e43e ] Fix the following slab-out-of-bounds kasan report in ndisc_fill_redirect_hdr_option

[PATCH 4.15 36/47] ipv6: fix access to non-linear packet in ndisc_fill_redirect_hdr_option()

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Lorenzo Bianconi [ Upstream commit 9f62c15f28b0d1d746734666d88a79f08ba1e43e ] Fix the following slab-out-of-bounds kasan report in ndisc_fill_redirect_hdr_option when the incoming ipv6

Re: linux-next 20180327 - "SELinux: (dev dm-3, type ext4) getxattr errno 34"

2018-03-29 Thread Stephen Smalley
On 03/29/2018 02:29 PM, Stephen Smalley wrote: > On 03/29/2018 01:57 PM, valdis.kletni...@vt.edu wrote: >> Seeing this error trying to mount ext4 disks. next-20180320 was OK. >> >> SELinux: (dev dm-3, type ext4) getxattr errno 34 >> >> and for /var, it refused to mount entirely (which brought the

Re: linux-next 20180327 - "SELinux: (dev dm-3, type ext4) getxattr errno 34"

2018-03-29 Thread Stephen Smalley
On 03/29/2018 02:29 PM, Stephen Smalley wrote: > On 03/29/2018 01:57 PM, valdis.kletni...@vt.edu wrote: >> Seeing this error trying to mount ext4 disks. next-20180320 was OK. >> >> SELinux: (dev dm-3, type ext4) getxattr errno 34 >> >> and for /var, it refused to mount entirely (which brought the

[PATCH 4.15 38/47] net: ethernet: arc: Fix a potential memory leak if an optional regulator is deferred

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Christophe JAILLET [ Upstream commit 00777fac28ba3e126b9e63e789a613e8bd2cab25 ] If the optional regulator is deferred, we must release some resources. They

[PATCH 4.15 38/47] net: ethernet: arc: Fix a potential memory leak if an optional regulator is deferred

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Christophe JAILLET [ Upstream commit 00777fac28ba3e126b9e63e789a613e8bd2cab25 ] If the optional regulator is deferred, we must release some resources. They will be re-allocated when the

[PATCH 4.15 40/47] net: fec: Fix unbalanced PM runtime calls

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Florian Fainelli [ Upstream commit a069215cf5985f3aa1bba550264907d6bd05c5f7 ] When unbinding/removing the driver, we will run into the following warnings: [

[PATCH 4.15 40/47] net: fec: Fix unbalanced PM runtime calls

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Florian Fainelli [ Upstream commit a069215cf5985f3aa1bba550264907d6bd05c5f7 ] When unbinding/removing the driver, we will run into the following warnings: [ 259.655198] fec

[PATCH 4.15 43/47] net: Only honor ifindex in IP_PKTINFO if non-0

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: David Ahern [ Upstream commit 2cbb4ea7de167b02ffa63e9cdfdb07a7e7094615 ] Only allow ifindex from IP_PKTINFO to override SO_BINDTODEVICE settings if the index is actually

[PATCH 4.15 43/47] net: Only honor ifindex in IP_PKTINFO if non-0

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: David Ahern [ Upstream commit 2cbb4ea7de167b02ffa63e9cdfdb07a7e7094615 ] Only allow ifindex from IP_PKTINFO to override SO_BINDTODEVICE settings if the index is actually set in the message.

[PATCH 4.15 10/47] net: ipv6: keep sk status consistent after datagram connect failure

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Paolo Abeni [ Upstream commit 2f987a76a97773beafbc615b9c4d8fe79129a7f4 ] On unsuccesful ip6_datagram_connect(), if the failure is caused by ip6_datagram_dst_update(), the

[PATCH 4.15 10/47] net: ipv6: keep sk status consistent after datagram connect failure

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Paolo Abeni [ Upstream commit 2f987a76a97773beafbc615b9c4d8fe79129a7f4 ] On unsuccesful ip6_datagram_connect(), if the failure is caused by ip6_datagram_dst_update(), the sk peer information

[PATCH 4.15 13/47] ipv6: sr: fix scheduling in RCU when creating seg6 lwtunnel state

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: David Lebrun [ Upstream commit 191f86ca8ef27f7a492fd1c03620498c6e94f0ac ] The seg6_build_state() function is called with RCU read lock held, so we cannot use GFP_KERNEL.

[PATCH 4.15 13/47] ipv6: sr: fix scheduling in RCU when creating seg6 lwtunnel state

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: David Lebrun [ Upstream commit 191f86ca8ef27f7a492fd1c03620498c6e94f0ac ] The seg6_build_state() function is called with RCU read lock held, so we cannot use GFP_KERNEL. This patch uses

[PATCH 4.15 06/47] sysfs: symlink: export sysfs_create_link_nowarn()

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Grygorii Strashko [ Upstream commit 2399ac42e762ab25c58420e25359b2921afdc55f ] The sysfs_create_link_nowarn() is going to be used in phylib framework in subsequent

[PATCH 4.15 15/47] net: phy: Tell caller result of phy_change()

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Brad Mouring [ Upstream commit a2c054a896b8ac794ddcfc7c92e2dc7ec4ed4ed5 ] In 664fcf123a30e (net: phy: Threaded interrupts allow some simplification) the phy_interrupt

[PATCH 4.15 06/47] sysfs: symlink: export sysfs_create_link_nowarn()

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Grygorii Strashko [ Upstream commit 2399ac42e762ab25c58420e25359b2921afdc55f ] The sysfs_create_link_nowarn() is going to be used in phylib framework in subsequent patch which can be built

[PATCH 4.15 15/47] net: phy: Tell caller result of phy_change()

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Brad Mouring [ Upstream commit a2c054a896b8ac794ddcfc7c92e2dc7ec4ed4ed5 ] In 664fcf123a30e (net: phy: Threaded interrupts allow some simplification) the phy_interrupt system was changed to

[PATCH 4.15 46/47] skbuff: Fix not waking applications when errors are enqueued

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Vinicius Costa Gomes [ Upstream commit 6e5d58fdc9bedd0255a8781b258f10bbdc63e975 ] When errors are enqueued to the error queue via sock_queue_err_skb() function, it

[PATCH 4.15 46/47] skbuff: Fix not waking applications when errors are enqueued

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Vinicius Costa Gomes [ Upstream commit 6e5d58fdc9bedd0255a8781b258f10bbdc63e975 ] When errors are enqueued to the error queue via sock_queue_err_skb() function, it is possible that the

[PATCH 4.14 10/43] ipv6: sr: fix NULL pointer dereference when setting encap source address

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: David Lebrun [ Upstream commit 8936ef7604c11b5d701580d779e0f5684abc7b68 ] When using seg6 in encap mode, we call ipv6_dev_get_saddr() to set the source address of the

[PATCH 4.14 10/43] ipv6: sr: fix NULL pointer dereference when setting encap source address

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: David Lebrun [ Upstream commit 8936ef7604c11b5d701580d779e0f5684abc7b68 ] When using seg6 in encap mode, we call ipv6_dev_get_saddr() to set the source address of the outer IPv6 header, in

[PATCH 4.15 44/47] net: systemport: Rewrite __bcm_sysport_tx_reclaim()

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Florian Fainelli [ Upstream commit 484d802d0f2f29c335563fcac2a8facf174a1bbc ] There is no need for complex checking between the last consumed index and current consumed

[PATCH 4.15 47/47] team: Fix double free in error path

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Arkadi Sharshevsky [ Upstream commit cbcc607e18422555db569b593608aec26111cb0b ] The __send_and_alloc_skb() receives a skb ptr as a parameter but in case it fails the

[PATCH 4.14 01/43] tcp: reset sk_send_head in tcp_write_queue_purge

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Soheil Hassas Yeganeh tcp_write_queue_purge clears all the SKBs in the write queue but does not reset the sk_send_head. As a result, we can have a NULL pointer dereference

[PATCH 4.15 44/47] net: systemport: Rewrite __bcm_sysport_tx_reclaim()

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Florian Fainelli [ Upstream commit 484d802d0f2f29c335563fcac2a8facf174a1bbc ] There is no need for complex checking between the last consumed index and current consumed index, a simple

[PATCH 4.15 47/47] team: Fix double free in error path

2018-03-29 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Arkadi Sharshevsky [ Upstream commit cbcc607e18422555db569b593608aec26111cb0b ] The __send_and_alloc_skb() receives a skb ptr as a parameter but in case it fails the skb is not valid: - Send

[PATCH 4.14 01/43] tcp: reset sk_send_head in tcp_write_queue_purge

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Soheil Hassas Yeganeh tcp_write_queue_purge clears all the SKBs in the write queue but does not reset the sk_send_head. As a result, we can have a NULL pointer dereference anywhere that we

Re: [PATCH] selftests/ftrace: fix spelling mistake: "tiggers" -> "triggers"

2018-03-29 Thread Steven Rostedt
On Thu, 29 Mar 2018 11:54:28 -0600 Shuah Khan wrote: > I will pick this up with your Ack Steve, unless you want include > it in your pull request. You or Janitors can take it. Thanks! -- Steve

Re: [PATCH] selftests/ftrace: fix spelling mistake: "tiggers" -> "triggers"

2018-03-29 Thread Steven Rostedt
On Thu, 29 Mar 2018 11:54:28 -0600 Shuah Khan wrote: > I will pick this up with your Ack Steve, unless you want include > it in your pull request. You or Janitors can take it. Thanks! -- Steve

[PATCH 4.14 12/43] mlxsw: spectrum_buffers: Set a minimum quota for CPU port traffic

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Ido Schimmel [ Upstream commit bcdd5de80a2275f7879dc278bfc747f1caf94442 ] In commit 9ffcc3725f09 ("mlxsw: spectrum: Allow packets to be trapped from any PG") I fixed a

[PATCH 4.14 12/43] mlxsw: spectrum_buffers: Set a minimum quota for CPU port traffic

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Ido Schimmel [ Upstream commit bcdd5de80a2275f7879dc278bfc747f1caf94442 ] In commit 9ffcc3725f09 ("mlxsw: spectrum: Allow packets to be trapped from any PG") I fixed a problem where packets

[PATCH 4.14 16/43] rhashtable: Fix rhlist duplicates insertion

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Paul Blakey [ Upstream commit d3dcf8eb615537526bd42ff27a081d46d337816e ] When inserting duplicate objects (those with the same key), current rhlist implementation messes

[PATCH 4.14 16/43] rhashtable: Fix rhlist duplicates insertion

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Paul Blakey [ Upstream commit d3dcf8eb615537526bd42ff27a081d46d337816e ] When inserting duplicate objects (those with the same key), current rhlist implementation messes up the chain

[PATCH 4.14 18/43] sch_netem: fix skb leak in netem_enqueue()

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Alexey Kodanev [ Upstream commit 35d889d10b649fda66121891ec05eca88150059d ] When we exceed current packets limit and we have more than one segment in the list

[PATCH 4.14 18/43] sch_netem: fix skb leak in netem_enqueue()

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Alexey Kodanev [ Upstream commit 35d889d10b649fda66121891ec05eca88150059d ] When we exceed current packets limit and we have more than one segment in the list returned by skb_gso_segment(),

[PATCH 4.14 15/43] ppp: avoid loop in xmit recursion detection code

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Guillaume Nault [ Upstream commit 6d066734e9f09cdea4a3b9cb76136db3f29cfb02 ] We already detect situations where a PPP channel sends packets back to its upper PPP

[PATCH 4.14 15/43] ppp: avoid loop in xmit recursion detection code

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Guillaume Nault [ Upstream commit 6d066734e9f09cdea4a3b9cb76136db3f29cfb02 ] We already detect situations where a PPP channel sends packets back to its upper PPP device. While this is enough

[PATCH 4.14 02/43] tcp: purge write queue upon aborting the connection

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Soheil Hassas Yeganeh [ Upstream commit e05836ac07c77dd90377f8c8140bce2a44af5fe7 ] When the connection is aborted, there is no point in keeping the packets on the write

[PATCH 4.14 02/43] tcp: purge write queue upon aborting the connection

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Soheil Hassas Yeganeh [ Upstream commit e05836ac07c77dd90377f8c8140bce2a44af5fe7 ] When the connection is aborted, there is no point in keeping the packets on the write queue until the

[PATCH 4.14 05/43] net: phy: relax error checking when creating sysfs link netdev->phydev

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Grygorii Strashko [ Upstream commit 4414b3ed74be0e205e04e12cd83542a727d88255 ] Some ethernet drivers (like TI CPSW) may connect and manage >1 Net PHYs per one

[PATCH 4.14 05/43] net: phy: relax error checking when creating sysfs link netdev->phydev

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Grygorii Strashko [ Upstream commit 4414b3ed74be0e205e04e12cd83542a727d88255 ] Some ethernet drivers (like TI CPSW) may connect and manage >1 Net PHYs per one netdevice, as result such

[PATCH 4.14 09/43] ipv6: old_dport should be a __be16 in __ip6_datagram_connect()

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Stefano Brivio [ Upstream commit 5f2fb802eee1df0810b47ea251942fe3fd36589a ] Fixes: 2f987a76a977 ("net: ipv6: keep sk status consistent after datagram connect failure")

[PATCH 4.14 09/43] ipv6: old_dport should be a __be16 in __ip6_datagram_connect()

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Stefano Brivio [ Upstream commit 5f2fb802eee1df0810b47ea251942fe3fd36589a ] Fixes: 2f987a76a977 ("net: ipv6: keep sk status consistent after datagram connect failure") Signed-off-by:

Re: [PATCH 2/6] fpga: manager: don't use drvdata in common fpga code

2018-03-29 Thread Alan Tull
On Thu, Mar 29, 2018 at 12:03 PM, Greg KH wrote: Hi Greg, > On Thu, Mar 29, 2018 at 08:36:54AM -0700, Moritz Fischer wrote: >> From: Alan Tull >> >> Change fpga_mgr_register to not set or use drvdata. >> >> Change the register/unregister function

Re: [PATCH 2/6] fpga: manager: don't use drvdata in common fpga code

2018-03-29 Thread Alan Tull
On Thu, Mar 29, 2018 at 12:03 PM, Greg KH wrote: Hi Greg, > On Thu, Mar 29, 2018 at 08:36:54AM -0700, Moritz Fischer wrote: >> From: Alan Tull >> >> Change fpga_mgr_register to not set or use drvdata. >> >> Change the register/unregister function parameters to take the mgr >> struct: >> * int

[PATCH 4.14 07/43] macvlan: filter out unsupported feature flags

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Shannon Nelson [ Upstream commit 13fbcc8dc573482dd3f27568257fd7087f8935f4 ] Adding a macvlan device on top of a lowerdev that supports the xfrm offloads fails with

[PATCH 4.14 07/43] macvlan: filter out unsupported feature flags

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Shannon Nelson [ Upstream commit 13fbcc8dc573482dd3f27568257fd7087f8935f4 ] Adding a macvlan device on top of a lowerdev that supports the xfrm offloads fails with a new regression: # ip

[PATCH 4.14 21/43] net: Fix hlist corruptions in inet_evict_bucket()

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Kirill Tkhai [ Upstream commit a560002437d3646dafccecb1bf32d1685112ddda ] inet_evict_bucket() iterates global list, and several tasks may call it in parallel. All of

[PATCH 4.14 21/43] net: Fix hlist corruptions in inet_evict_bucket()

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Kirill Tkhai [ Upstream commit a560002437d3646dafccecb1bf32d1685112ddda ] inet_evict_bucket() iterates global list, and several tasks may call it in parallel. All of them hash the same

[PATCH 4.14 31/43] net: systemport: Rewrite __bcm_sysport_tx_reclaim()

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Florian Fainelli [ Upstream commit 484d802d0f2f29c335563fcac2a8facf174a1bbc ] There is no need for complex checking between the last consumed index and current consumed

[PATCH 4.14 31/43] net: systemport: Rewrite __bcm_sysport_tx_reclaim()

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Florian Fainelli [ Upstream commit 484d802d0f2f29c335563fcac2a8facf174a1bbc ] There is no need for complex checking between the last consumed index and current consumed index, a simple

[PATCH 4.14 33/43] skbuff: Fix not waking applications when errors are enqueued

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Vinicius Costa Gomes [ Upstream commit 6e5d58fdc9bedd0255a8781b258f10bbdc63e975 ] When errors are enqueued to the error queue via sock_queue_err_skb() function, it

[PATCH 4.14 33/43] skbuff: Fix not waking applications when errors are enqueued

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Vinicius Costa Gomes [ Upstream commit 6e5d58fdc9bedd0255a8781b258f10bbdc63e975 ] When errors are enqueued to the error queue via sock_queue_err_skb() function, it is possible that the

[PATCH] mmc: dw_mmc-k3: Fix DDR52 mode by setting required clock divisor

2018-03-29 Thread oscardagrach
Signed-off-by: oscardagrach --- drivers/mmc/host/dw_mmc-k3.c | 10 -- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/drivers/mmc/host/dw_mmc-k3.c b/drivers/mmc/host/dw_mmc-k3.c index 89cdb3d533bb..efc546cb4db8 100644 --- a/drivers/mmc/host/dw_mmc-k3.c +++

[PATCH] mmc: dw_mmc-k3: Fix DDR52 mode by setting required clock divisor

2018-03-29 Thread oscardagrach
Signed-off-by: oscardagrach --- drivers/mmc/host/dw_mmc-k3.c | 10 -- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/drivers/mmc/host/dw_mmc-k3.c b/drivers/mmc/host/dw_mmc-k3.c index 89cdb3d533bb..efc546cb4db8 100644 --- a/drivers/mmc/host/dw_mmc-k3.c +++

[PATCH 4.14 35/43] soc/fsl/qbman: fix issue in qman_delete_cgr_safe()

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Madalin Bucur [ Upstream commit 96f413f47677366e0ae03797409bfcc4151dbf9e ] The wait_for_completion() call in qman_delete_cgr_safe() was triggering a scheduling while

[PATCH 4.14 35/43] soc/fsl/qbman: fix issue in qman_delete_cgr_safe()

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Madalin Bucur [ Upstream commit 96f413f47677366e0ae03797409bfcc4151dbf9e ] The wait_for_completion() call in qman_delete_cgr_safe() was triggering a scheduling while atomic bug, replacing

[PATCH 4.14 39/43] dpaa_eth: remove duplicate increment of the tx_errors counter

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Camelia Groza [ Upstream commit 82d141cd19d088ee41feafde4a6f86eeb40d93c5 ] The tx_errors counter is incremented by the dpaa_xmit caller. Signed-off-by: Camelia Groza

[PATCH 4.14 38/43] dpaa_eth: increment the RX dropped counter when needed

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Camelia Groza [ Upstream commit e4d1b37c17d000a3da9368a3e260fb9ea4927c25 ] Signed-off-by: Camelia Groza Signed-off-by: David S. Miller

[PATCH 4.14 39/43] dpaa_eth: remove duplicate increment of the tx_errors counter

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Camelia Groza [ Upstream commit 82d141cd19d088ee41feafde4a6f86eeb40d93c5 ] The tx_errors counter is incremented by the dpaa_xmit caller. Signed-off-by: Camelia Groza Signed-off-by: Madalin

[PATCH 4.14 38/43] dpaa_eth: increment the RX dropped counter when needed

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Camelia Groza [ Upstream commit e4d1b37c17d000a3da9368a3e260fb9ea4927c25 ] Signed-off-by: Camelia Groza Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman ---

[PATCH 4.14 37/43] dpaa_eth: remove duplicate initialization

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Camelia Groza [ Upstream commit 565186362b73226a288830abe595f05f0cec0bbc ] The fd_format has already been initialized at this point. Signed-off-by: Camelia Groza

[PATCH 4.14 37/43] dpaa_eth: remove duplicate initialization

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Camelia Groza [ Upstream commit 565186362b73226a288830abe595f05f0cec0bbc ] The fd_format has already been initialized at this point. Signed-off-by: Camelia Groza Signed-off-by: David S.

[PATCH 4.14 41/43] s390/qeth: when thread completes, wake up all waiters

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Julian Wiedmann [ Upstream commit 1063e432bb45be209427ed3f1ca3908e4aa3c7d7 ] qeth_wait_for_threads() is potentially called by multiple users, make sure to notify all

[PATCH 4.14 41/43] s390/qeth: when thread completes, wake up all waiters

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Julian Wiedmann [ Upstream commit 1063e432bb45be209427ed3f1ca3908e4aa3c7d7 ] qeth_wait_for_threads() is potentially called by multiple users, make sure to notify all of them after

[PATCH 4.14 40/43] s390/qeth: free netdevice when removing a card

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Julian Wiedmann [ Upstream commit 6be687395b3124f002a653c1a50b3260222b3cd7 ] On removal, a qeth card's netdevice is currently not properly freed because the call

[PATCH 4.14 40/43] s390/qeth: free netdevice when removing a card

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Julian Wiedmann [ Upstream commit 6be687395b3124f002a653c1a50b3260222b3cd7 ] On removal, a qeth card's netdevice is currently not properly freed because the call chain looks as follows:

[PATCH 4.14 42/43] s390/qeth: lock read device while queueing next buffer

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Julian Wiedmann [ Upstream commit 17bf8c9b3d499d5168537c98b61eb7a1fcbca6c2 ] For calling ccw_device_start(), issue_next_read() needs to hold the device's ccwlock.

[PATCH 4.14 42/43] s390/qeth: lock read device while queueing next buffer

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Julian Wiedmann [ Upstream commit 17bf8c9b3d499d5168537c98b61eb7a1fcbca6c2 ] For calling ccw_device_start(), issue_next_read() needs to hold the device's ccwlock. This is satisfied for the

[PATCH 4.14 43/43] s390/qeth: on channel error, reject further cmd requests

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Julian Wiedmann [ Upstream commit a6c3d93963e4b333c764fde69802c3ea9eaa9d5c ] When the IRQ handler determines that one of the cmd IO channels has failed and schedules

[PATCH 4.14 43/43] s390/qeth: on channel error, reject further cmd requests

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Julian Wiedmann [ Upstream commit a6c3d93963e4b333c764fde69802c3ea9eaa9d5c ] When the IRQ handler determines that one of the cmd IO channels has failed and schedules recovery, block any

[PATCH 4.14 28/43] net/iucv: Free memory obtained by kzalloc

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Arvind Yadav [ Upstream commit fa6a91e9b907231d2e38ea5ed89c537b3525df3d ] Free memory by calling put_device(), if afiucv_iucv_init is not successful.

[PATCH 4.14 24/43] l2tp: do not accept arbitrary sockets

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 17cfe79a65f98abe535261856c5aef14f306dff7 ] syzkaller found an issue caused by lack of sufficient checks in l2tp_tunnel_create() RAW

[PATCH 4.14 28/43] net/iucv: Free memory obtained by kzalloc

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Arvind Yadav [ Upstream commit fa6a91e9b907231d2e38ea5ed89c537b3525df3d ] Free memory by calling put_device(), if afiucv_iucv_init is not successful. Signed-off-by: Arvind Yadav

[PATCH 4.14 24/43] l2tp: do not accept arbitrary sockets

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 17cfe79a65f98abe535261856c5aef14f306dff7 ] syzkaller found an issue caused by lack of sufficient checks in l2tp_tunnel_create() RAW sockets can not be

[PATCH 4.14 29/43] netlink: avoid a double skb free in genlmsg_mcast()

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Nicolas Dichtel [ Upstream commit 02a2385f37a7c6594c9d89b64c4a1451276f08eb ] nlmsg_multicast() consumes always the skb, thus the original skb must be freed only

[PATCH 4.14 29/43] netlink: avoid a double skb free in genlmsg_mcast()

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Nicolas Dichtel [ Upstream commit 02a2385f37a7c6594c9d89b64c4a1451276f08eb ] nlmsg_multicast() consumes always the skb, thus the original skb must be freed only when this function is called

[PATCH 4.14 20/43] net: use skb_to_full_sk() in skb_update_prio()

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 4dcb31d4649df36297296b819437709f5407059c ] Andrei Vagin reported a KASAN: slab-out-of-bounds error in skb_update_prio() Since SYNACK

[PATCH 4.14 20/43] net: use skb_to_full_sk() in skb_update_prio()

2018-03-29 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 4dcb31d4649df36297296b819437709f5407059c ] Andrei Vagin reported a KASAN: slab-out-of-bounds error in skb_update_prio() Since SYNACK might be attached to a

[PATCH 4.9 10/28] dccp: check sk for closed state in dccp_sendmsg()

2018-03-29 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Alexey Kodanev [ Upstream commit 67f93df79aeefc3add4e4b31a752600f834236e2 ] dccp_disconnect() sets 'dp->dccps_hc_tx_ccid' tx handler to NULL, therefore if DCCP

[PATCH 4.9 10/28] dccp: check sk for closed state in dccp_sendmsg()

2018-03-29 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Alexey Kodanev [ Upstream commit 67f93df79aeefc3add4e4b31a752600f834236e2 ] dccp_disconnect() sets 'dp->dccps_hc_tx_ccid' tx handler to NULL, therefore if DCCP socket is disconnected and

[PATCH 4.9 01/28] scsi: sg: dont return bogus Sg_requests

2018-03-29 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Johannes Thumshirn commit 48ae8484e9fc324b4968d33c585e54bc98e44d61 upstream. If the list search in sg_get_rq_mark() fails to find a valid request, we return a bogus

[PATCH 4.9 01/28] scsi: sg: dont return bogus Sg_requests

2018-03-29 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Johannes Thumshirn commit 48ae8484e9fc324b4968d33c585e54bc98e44d61 upstream. If the list search in sg_get_rq_mark() fails to find a valid request, we return a bogus element. This then can

[PATCH 4.9 13/28] net: ethernet: arc: Fix a potential memory leak if an optional regulator is deferred

2018-03-29 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Christophe JAILLET [ Upstream commit 00777fac28ba3e126b9e63e789a613e8bd2cab25 ] If the optional regulator is deferred, we must release some resources. They will

[PATCH 4.9 13/28] net: ethernet: arc: Fix a potential memory leak if an optional regulator is deferred

2018-03-29 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Christophe JAILLET [ Upstream commit 00777fac28ba3e126b9e63e789a613e8bd2cab25 ] If the optional regulator is deferred, we must release some resources. They will be re-allocated when the probe

[PATCH 4.9 15/28] net: fec: Fix unbalanced PM runtime calls

2018-03-29 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Florian Fainelli [ Upstream commit a069215cf5985f3aa1bba550264907d6bd05c5f7 ] When unbinding/removing the driver, we will run into the following warnings: [

[PATCH 4.9 15/28] net: fec: Fix unbalanced PM runtime calls

2018-03-29 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Florian Fainelli [ Upstream commit a069215cf5985f3aa1bba550264907d6bd05c5f7 ] When unbinding/removing the driver, we will run into the following warnings: [ 259.655198] fec

<    2   3   4   5   6   7   8   9   10   11   >