Re: [PATCH 21/33] drm/nouveau: use match_string() helper

2018-05-21 Thread Andy Shevchenko
On Mon, May 21, 2018 at 2:57 PM, Yisheng Xie wrote: > match_string() returns the index of an array for a matching string, > which can be used intead of open coded variant. > if (nouveau_tv_norm) { > + i = match_string(nv17_tv_norm_names, > +n

[PATCH 4.14 35/95] ARM: 8771/1: kprobes: Prohibit kprobes on do_undefinstr

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Masami Hiramatsu commit eb0146daefdde65665b7f076fbff7b49dade95b9 upstream. Prohibit kprobes on do_undefinstr because kprobes on arm is implemented by undefined instruction. This means if we pr

[PATCH 4.14 36/95] x86/mm: Drop TS_COMPAT on 64-bit exec() syscall

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Dmitry Safonov commit acf46020012ccbca1172e9c7aeab399c950d9212 upstream. The x86 mmap() code selects the mmap base for an allocation depending on the bitness of the syscall. For 64bit sycalls

[PATCH 4.14 39/95] ARM: 8770/1: kprobes: Prohibit probing on optimized_callback

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Masami Hiramatsu commit 70948c05fdde0aac32f9667856a88725c192fa40 upstream. Prohibit probing on optimized_callback() because it is called from kprobes itself. If we put a kprobes on it, that wi

[PATCH 4.14 31/95] s390: remove indirect branch from do_softirq_own_stack

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Martin Schwidefsky commit 9f18fff63cfd6f559daa1eaae60640372c65f84b upstream. The inline assembly to call __do_softirq on the irq stack uses an indirect branch. This can be replaced with a norm

[PATCH 4.14 67/95] x86/bugs: Make boot modes __ro_after_init

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Kees Cook commit f9544b2b076ca90d887c5ae5d74fab4c21bb7c13 upstream There's no reason for these to be changed after boot. Signed-off-by: Kees Cook Signed-off-by: Thomas Gleixner Signed-off-b

[PATCH 4.14 78/95] x86/bugs: Fix the parameters alignment and missing void

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Konrad Rzeszutek Wilk commit ffed645e3be0e32f8e9ab068d257aee8d0fe8eec upstream Fixes: 7bb4d366c ("x86/bugs: Make cpu_show_common() static") Fixes: 24f7fc83b ("x86/bugs: Provide boot parameters

Re: [PATCH RESEND] platform/chrome: cros_ec_lpc: Add support for newer Google devices using custom coreboot firmware or stock SeaBIOS.

2018-05-21 Thread Dmitry Torokhov
Hi Vittorio, On Mon, May 21, 2018 at 07:44:35AM +0200, Vittorio Gambaletta (VittGam) wrote: > Custom coreboot firmware does not contain "Google_*" as BIOS > version string; also, booting through stock SeaBIOS will present > an empty BIOS version string to Linux. So the generic match at > the top w

[PATCH 4.14 79/95] x86/cpu: Make alternative_msr_write work for 32-bit code

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Jim Mattson commit 5f2b745f5e1304f438f9b2cd03ebc8120b6e0d3b upstream Cast val and (val >> 32) to (u32), so that they fit in a general-purpose register in both 32-bit and 64-bit code. [ tglx:

[PATCH 4.14 83/95] x86/cpufeatures: Disentangle SSBD enumeration

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit 52817587e706686fcdb27f14c1b000c92f266c96 upstream The SSBD enumeration is similarly to the other bits magically shared between Intel and AMD though the mechanisms are di

Re: [PATCH 20/33] video: fbdev: pxafb: use match_string() helper

2018-05-21 Thread Andy Shevchenko
On Mon, May 21, 2018 at 2:57 PM, Yisheng Xie wrote: > match_string() returns the index of an array for a matching string, > which can be used intead of open coded variant. https://patchwork.kernel.org/patch/10378815/ > Cc: Bartlomiej Zolnierkiewicz > Cc: Arvind Yadav > Cc: dri-de...@lists.free

[PATCH 4.14 80/95] KVM: SVM: Move spec control call after restore of GS

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit 15e6c22fd8e5a42c5ed6d487b7c9fe44c2517765 upstream svm_vcpu_run() invokes x86_spec_ctrl_restore_host() after VMEXIT, but before the host GS is restored. x86_spec_ctrl_res

Re: [PATCH 19/33] thermal: db8500: use match_string() helper

2018-05-21 Thread Andy Shevchenko
On Mon, May 21, 2018 at 2:57 PM, Yisheng Xie wrote: > match_string() returns the index of an array for a matching string, > which can be used intead of open coded variant. > + i = match_string((const char **)trip_point->cdev_name, Casting looks ugly. You need to constify the variable itsel

[PATCH] Fix SSBD not being exposed to guests. (v1)

2018-05-21 Thread Konrad Rzeszutek Wilk
Hi, Without this patch, when launching QEMU with -cpu +ssbd I ended up with a warning seeing that the CPU does not support - which in fact it does. The issue was the X86_FEATURE_ - the kvm_cpuid_7_0_edx_x86_features had bit 17 set (X86_FEATURE_SSBD), while the right bit should have been bit 31 (

[PATCH] KVM: VMX: Expose SSBD properly to guests.

2018-05-21 Thread Konrad Rzeszutek Wilk
The X86_FEATURE_SSBD is an synthetic CPU feature - that is it bit location has no relevance to the real CPUID 0x7.EBX[31] bit position. For that we need the new CPU feature name. Fixes: 52817587e706 ("x86/cpufeatures: Disentangle SSBD enumeration") CC: Paolo Bonzini Cc: "Radim Krčmář" Cc: Thoma

[PATCH 4.14 85/95] x86/speculation: Handle HT correctly on AMD

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit 1f50ddb4f4189243c05926b842dc1a0332195f31 upstream The AMD64_LS_CFG MSR is a per core MSR on Family 17H CPUs. That means when hyperthreading is enabled the SSBD bit toggl

[PATCH 4.14 87/95] x86/speculation: Add virtualized speculative store bypass disable support

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Tom Lendacky commit 11fb0683493b2da112cd64c9dada221b52463bf7 upstream Some AMD processors only support a non-architectural means of enabling speculative store bypass disable (SSBD). To allow

[PATCH 4.14 84/95] x86/cpufeatures: Add FEATURE_ZEN

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit d1035d971829dcf80e8686ccde26f94b0a069472 upstream Add a ZEN feature bit so family-dependent static_cpu_has() optimizations can be built for ZEN. Signed-off-by: Thomas G

Re: [PATCH 18/33] power: supply: use match_string() helper

2018-05-21 Thread Andy Shevchenko
On Mon, May 21, 2018 at 2:57 PM, Yisheng Xie wrote: > match_string() returns the index of an array for a matching string, > which can be used intead of open coded variant. > This doesn't make code looks better anyhow. I even think it makes it worse to read. That's why I dropped my version of the

[PATCH 4.14 88/95] x86/speculation: Rework speculative_store_bypass_update()

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit 0270be3e34efb05a88bc4c422572ece038ef3608 upstream The upcoming support for the virtual SPEC_CTRL MSR on AMD needs to reuse speculative_store_bypass_update() to avoid cod

Re: [REGRESSION] v4.17-rc4: xgalaga fails to start in fullscreen (default) mode

2018-05-21 Thread Vito Caputo
On Mon, May 21, 2018 at 12:53:20PM -0700, Vito Caputo wrote: > Hello all, > > 4.17-rc4 (my latest kernel ATM) consistently fails to start xgalaga > without -window. I will try find time to build the latest rc this > evening. > > > ~$ xgalaga > > X Error of failed request: BadValue (integer para

Re: [PATCH] audit: add containerid support for IMA-audit

2018-05-21 Thread Stefan Berger
On 05/21/2018 02:30 PM, Steve Grubb wrote: Hello Stefan, On Monday, May 21, 2018 1:53:04 PM EDT Stefan Berger wrote: On 05/21/2018 12:58 PM, Steve Grubb wrote: On Thursday, May 17, 2018 10:18:13 AM EDT Stefan Berger wrote: audit_log_container_info() then releasing the local context. This ver

[PATCH 4.14 90/95] x86/bugs: Expose x86_spec_ctrl_base directly

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit fa8ac4988249c38476f6ad678a4848a736373403 upstream x86_spec_ctrl_base is the system wide default value for the SPEC_CTRL MSR. x86_spec_ctrl_get_default() returns x86_spec

[PATCH 4.14 86/95] x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit ccbcd2674472a978b48c91c1fbfb66c0ff959f24 upstream AMD is proposing a VIRT_SPEC_CTRL MSR to handle the Speculative Store Bypass Disable via MSR_AMD64_LS_CFG so that guest

[GIT PULL] SCSI fixes for 4.17-rc6

2018-05-21 Thread James Bottomley
Two driver fixes (zfcp and target core), one information leak in sg and one build clean up. The patch is available here: git://git.kernel.org/pub/scm/linux/kernel/git/jejb/scsi.git scsi-fixes The short changelog is: Alexander Potapenko (1): scsi: sg: allocate with __GFP_ZERO in sg_build_i

[PATCH 4.14 89/95] x86/bugs: Unify x86_spec_ctrl_{set_guest,restore_host}

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Borislav Petkov commit cc69b34989210f067b2c51d5539b5f96ebcc3a01 upstream Function bodies are very similar and are going to grow more almost identical code. Add a bool arg to determine whether

[PATCH 4.14 93/95] x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit 47c61b3955cf712cadfc25635bf9bc174af030ea upstream Add the necessary logic for supporting the emulated VIRT_SPEC_CTRL MSR to x86_virt_spec_ctrl(). If either X86_FEATURE_

Re: [PATCH 17/33] pinctrl: armada-37xx: use match_string() helper

2018-05-21 Thread Andy Shevchenko
On Mon, May 21, 2018 at 2:57 PM, Yisheng Xie wrote: > match_string() returns the index of an array for a matching string, > which can be used intead of open coded variant. https://patchwork.kernel.org/patch/10378781/ > Cc: Jason Cooper > Cc: Andrew Lunn > Cc: Gregory Clement > Cc: Sebastian H

[PATCH 4.14 92/95] x86/bugs: Rework spec_ctrl base and mask logic

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit be6fcb5478e95bb1c91f489121238deb3abca46a upstream x86_spec_ctrL_mask is intended to mask out bits from a MSR_SPEC_CTRL value which are not to be modified. However the im

[PATCH 4.14 95/95] x86/bugs: Rename SSBD_NO to SSB_NO

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Konrad Rzeszutek Wilk commit 240da953fcc6a9008c92fae5b1f727ee5ed167ab upstream The "336996 Speculative Execution Side Channel Mitigations" from May defines this as SSB_NO, hence lets sync-up.

[PATCH 4.14 70/95] seccomp: Add filter flag to opt-out of SSB mitigation

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Kees Cook commit 00a02d0c502a06d15e07b857f8ff921e3e402675 upstream If a seccomp user is not interested in Speculative Store Bypass mitigation by default, it can set the new SECCOMP_FILTER_FLAG

[PATCH 4.14 69/95] seccomp: Use PR_SPEC_FORCE_DISABLE

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit b849a812f7eb92e96d1c8239b06581b2cfd8b275 upstream Use PR_SPEC_FORCE_DISABLE in seccomp() because seccomp does not allow to widen restrictions. Signed-off-by: Thomas Gle

[PATCH 4.14 72/95] x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Kees Cook commit f21b53b20c754021935ea43364dbf53778eeba32 upstream Unless explicitly opted out of, anything running under seccomp will have SSB mitigations enabled. Choosing the "prctl" mode w

[PATCH 4.14 74/95] proc: Use underscores for SSBD in status

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Konrad Rzeszutek Wilk commit e96f46ee8587607a828f783daa6eb5b44d25004d upstream The style for the 'status' file is CamelCase or this. _. Fixes: fae1fa0fc ("proc: Provide details on speculation

Re: INFO: task hung in blk_queue_enter

2018-05-21 Thread Tetsuo Handa
Bart Van Assche wrote: > On Wed, 2018-05-16 at 17:16 +0200, Dmitry Vyukov wrote: > > On Wed, May 16, 2018 at 4:56 PM, Bart Van Assche > > wrote: > > > On Wed, 2018-05-16 at 22:05 +0900, Tetsuo Handa wrote: > > > > diff --git a/block/blk-core.c b/block/blk-core.c > > > > index 85909b4..59e2496 100

[PATCH 4.14 75/95] Documentation/spec_ctrl: Do some minor cleanups

2018-05-21 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Borislav Petkov commit dd0792699c4058e63c0715d9a7c2d40226fcdddc upstream Fix some typos, improve formulations, end sentences with a fullstop. Signed-off-by: Borislav Petkov Signed-off-by: Th

Re: [PATCH 14/33] clk: use match_string() helper

2018-05-21 Thread Andy Shevchenko
On Mon, May 21, 2018 at 2:57 PM, Yisheng Xie wrote: > match_string() returns the index of an array for a matching string, > which can be used intead of open coded variant. > + return match_string(core->parent_names, > + core->num_parents, parent_core->name) >= 0;

[PATCH 4.16 001/110] xhci: Fix USB3 NULL pointer dereference at logical disconnect.

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Mathias Nyman commit 2278446e2b7cd33ad894b32e7eb63afc7db6c86e upstream. Hub driver will try to disable a USB3 device twice at logical disconnect, racing with xhci_free_dev() callback from the

[PATCH 4.16 011/110] spi: pxa2xx: Allow 64-bit DMA

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Andy Shevchenko commit efc4a13724b852ddaa3358402a8dec024ffbcb17 upstream. Currently the 32-bit device address only is supported for DMA. However, starting from Intel Sunrisepoint PCH the DMA a

[PATCH 4.16 010/110] ALSA: control: fix a redundant-copy issue

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Wenwen Wang commit 3f12888dfae2a48741c4caa9214885b3aaf350f9 upstream. In snd_ctl_elem_add_compat(), the fields of the struct 'data' need to be copied from the corresponding fields of the struc

[PATCH 4.16 015/110] KVM: arm/arm64: Properly protect VGIC locks from IRQs

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Andre Przywara commit 388d4359680b56dba82fe2ffca05871e9fd2b73e upstream. As Jan reported [1], lockdep complains about the VGIC not being bullet proof. This seems to be due to two issues: - Whe

[PATCH 4.16 019/110] hwmon: (k10temp) Fix reading critical temperature register

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Guenter Roeck commit 40626a1bf657eef557fcee9e1b8ef5b4f5b56dcd upstream. The HTC (Hardware Temperature Control) register has moved for recent chips. Cc: sta...@vger.kernel.org # v4.16+ Tested-

[PATCH 4.16 017/110] KVM: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Andre Przywara commit 711702b57cc3c50b84bd648de0f1ca0a378805be upstream. kvm_read_guest() will eventually look up in kvm_memslots(), which requires either to hold the kvm->slots_lock or to be

[PATCH 4.16 016/110] KVM: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Andre Przywara commit 9c4188762f7fee032abf8451fd9865a9abfc5516 upstream. Apparently the development of update_affinity() overlapped with the promotion of irq_lock to be _irqsave, so the patch

[PATCH 4.16 022/110] tracing/x86/xen: Remove zero data size trace events trace_xen_mmu_flush_tlb{_all}

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Steven Rostedt (VMware) commit 45dd9b0666a162f8e4be76096716670cf1741f0e upstream. Doing an audit of trace events, I discovered two trace events in the xen subsystem that use a hack to create z

[PATCH 4.16 002/110] usbip: usbip_host: refine probe and disconnect debug msgs to be useful

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Shuah Khan commit 28b68acc4a88dcf91fd1dcf2577371dc9bf574cc upstream. Refine probe and disconnect debug msgs to be useful and say what is in progress. Signed-off-by: Shuah Khan Cc: stable Si

[PATCH 4.16 020/110] hwmon: (k10temp) Use API function to access System Management Network

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Guenter Roeck commit 3b031622f598481970400519bd5abc2a16708282 upstream. The SMN (System Management Network) on Family 17h AMD CPUs is also accessed from other drivers, specifically EDAC. Acces

Re: [PATCH 12/33] clk: bcm2835: use match_string() helper

2018-05-21 Thread Andy Shevchenko
On Mon, May 21, 2018 at 2:57 PM, Yisheng Xie wrote: > match_string() returns the index of an array for a matching string, > which can be used intead of open coded variant. > > Cc: Michael Turquette > Cc: Stephen Boyd > Cc: Eric Anholt > Cc: Stefan Wahren > Cc: linux-...@vger.kernel.org > Cc: l

[PATCH 4.16 027/110] netfilter: nf_tables: cant fail after linking rule into active rule list

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Florian Westphal commit 569ccae68b38654f04b6842b034aa33857f605fe upstream. rules in nftables a free'd using kfree, but protected by rcu, i.e. we must wait for a grace period to elapse. Normal

[PATCH 4.16 021/110] vfio: ccw: fix cleanup if cp_prefetch fails

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Halil Pasic commit d66a7355717ec903d455277a550d930ba13df4a8 upstream. If the translation of a channel program fails, we may end up attempting to clean up (free, unpin) stuff that never got tra

[PATCH 4.16 024/110] x86/amd_nb: Add support for Raven Ridge CPUs

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Guenter Roeck commit f9bc6b2dd9cf025f827f471769e1d88b527bfb91 upstream. Add Raven Ridge root bridge and data fabric PCI IDs. This is required for amd_pci_dev_to_node_id() and amd_smn_read().

[PATCH 4.16 025/110] tee: shm: fix use-after-free via temporarily dropped reference

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Jann Horn commit bb765d1c331f62b59049d35607ed2e365802bef9 upstream. Bump the file's refcount before moving the reference into the fd table, not afterwards. The old code could drop the file's r

[PATCH 4.16 004/110] usbip: usbip_host: run rebind from exit when module is removed

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Shuah Khan (Samsung OSG) commit 7510df3f29d44685bab7b1918b61a8ccd57126a9 upstream. After removing usbip_host module, devices it releases are left without a driver. For example, when a keyboard

[PATCH 4.16 026/110] netfilter: nf_tables: free set name in error path

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Florian Westphal commit 2f6adf481527c8ab8033c601f55bfb5b3712b2ac upstream. set->name must be free'd here in case ops->init fails. Fixes: 387454901bd6 ("netfilter: nf_tables: Allow set names o

[PATCH 4.16 008/110] ALSA: hda/realtek - Clevo P950ER ALC1220 Fixup

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Jeremy Soller commit 2f0d520a1a73555ac51c19cd494493f60b4c1cea upstream. This adds support for the P950ER, which has the same required fixup as the P950HR, but has a different PCI ID. Signed-o

[PATCH 4.16 006/110] usbip: usbip_host: fix bad unlock balance during stub_probe()

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Shuah Khan (Samsung OSG) commit c171654caa875919be3c533d3518da8be5be966e upstream. stub_probe() calls put_busid_priv() in an error path when device isn't found in the busid_table. Fix it by ma

[PATCH 4.16 007/110] ALSA: usb: mixer: volume quirk for CM102-A+/102S+

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Federico Cuello commit 21493316a3c4598f308d5a9fa31cc74639c4caff upstream. Currently it's not possible to set volume lower than 26% (it just mutes). Also fixes this warning: Warning! Unlike

[PATCH 4.16 000/110] 4.16.11-stable review

2018-05-21 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.16.11 release. There are 110 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Tue May 22 21:04:14 UTC 2018. Anything recei

[PATCH 4.16 029/110] ARM64: dts: marvell: armada-cp110: Add clocks for the xmdio node

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Maxime Chevallier commit a057344806d035cb9ac991619fa07854e807562d upstream. The Marvell XSMI controller needs 3 clocks to operate correctly : - The MG clock (clk 5) - The MG Core clock (clk

[PATCH 4.16 038/110] mm: dont allow deferred pages with NEED_PER_CPU_KM

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Pavel Tatashin commit ab1e8d8960b68f54af42b6484b5950bd13a4054b upstream. It is unsafe to do virtual to physical translations before mm_init() is called if struct page is needed in order to det

[PATCH 4.16 039/110] drm/i915/gen9: Add WaClearHIZ_WM_CHICKEN3 for bxt and glk

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Michel Thierry commit b579f924a90f42fa561afd8201514fc216b71949 upstream. Factor in clear values wherever required while updating destination min/max. References: HSDES#160184 Signed-off-b

[PATCH 4.16 043/110] s390: remove indirect branch from do_softirq_own_stack

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Martin Schwidefsky commit 9f18fff63cfd6f559daa1eaae60640372c65f84b upstream. The inline assembly to call __do_softirq on the irq stack uses an indirect branch. This can be replaced with a norm

[PATCH 4.16 044/110] bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Coly Li commit 1c1a2ee1b53b006754073eefc65d2b2cedb5264b upstream. Commit 539d39eb2708 ("bcache: fix wrong return value in bch_debug_init()") returns the return value of debugfs_create_dir() to

Re: [PATCH 10/33] pata_hpt37x: use match_string() helper

2018-05-21 Thread Andy Shevchenko
On Mon, May 21, 2018 at 2:57 PM, Yisheng Xie wrote: > match_string() returns the index of an array for a matching string, > which can be used intead of open coded variant. > https://www.spinics.net/lists/linux-ide/msg55658.html > Cc: Bartlomiej Zolnierkiewicz > Cc: Tejun Heo > Cc: linux-...@vg

Re: [PATCH] bpf: prevent memory disambiguation attack

2018-05-21 Thread Daniel Borkmann
On 05/21/2018 11:17 PM, Alexei Starovoitov wrote: > Detect code patterns where malicious 'speculative store bypass' can be used > and sanitize such patterns. > > 39: (bf) r3 = r10 > 40: (07) r3 += -216 > 41: (79) r8 = *(u64 *)(r7 +0) // slow read > 42: (7a) *(u64 *)(r10 -72) = 0 // verifier

[PATCH] pcnet32: add an error handling path in pcnet32_probe_pci()

2018-05-21 Thread Bo Chen
Make sure to invoke pci_disable_device() when errors occur in pcnet32_probe_pci(). Signed-off-by: Bo Chen --- drivers/net/ethernet/amd/pcnet32.c | 10 +++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/drivers/net/ethernet/amd/pcnet32.c b/drivers/net/ethernet/amd/pcnet32.c

Re: [PATCH 09/33] phy: tegra: use match_string() helper

2018-05-21 Thread Andy Shevchenko
On Mon, May 21, 2018 at 2:57 PM, Yisheng Xie wrote: > match_string() returns the index of an array for a matching string, > which can be used intead of open coded variant. > https://patchwork.ozlabs.org/patch/908133/ > Cc: Kishon Vijay Abraham I > Cc: Thierry Reding > Cc: Jonathan Hunter > Cc

Re: [PATCH] spi: spi-geni-qcom: Add SPI driver support for GENI based QUP

2018-05-21 Thread Mahadevan, Girish
Hi Mark, On 5/17/2018 1:21 AM, Mark Brown wrote: > On Mon, May 07, 2018 at 02:29:45PM -0600, Mahadevan, Girish wrote: >> On 5/3/2018 5:38 PM, Mark Brown wrote: > >>> This is a DT based driver but there is no binding documentation. >>> Binding documentation is required for any new DT stuff. > >>

[PATCH 4.16 045/110] x86/pkeys: Override pkey when moving away from PROT_EXEC

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Dave Hansen commit 0a0b152083cfc44ec1bb599b57b7aab41327f998 upstream. I got a bug report that the following code (roughly) was causing a SIGSEGV: mprotect(ptr, size, PROT_EXEC);

[PATCH 4.16 046/110] x86/pkeys: Do not special case protection key 0

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Dave Hansen commit 2fa9d1cfaf0e02f8abef0757002bff12dfcfa4e6 upstream. mm_pkey_is_allocated() treats pkey 0 as unallocated. That is inconsistent with the manpages, and also inconsistent with m

Re: [PATCH v7 2/2] leds: lm3601x: Introduce the lm3601x LED driver

2018-05-21 Thread Dan Murphy
Jacek Thanks for the review On 05/21/2018 04:09 PM, Jacek Anaszewski wrote: > Hi Dan, > > Thank you for the update. > > On 05/21/2018 08:09 PM, Dan Murphy wrote: >> Introduce the family of LED devices that can >> drive a torch, strobe or IR LED. >> >> The LED driver can be configured with a str

[PATCH 4.16 030/110] ARM64: dts: marvell: armada-cp110: Add mg_core_clk for ethernet node

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Maxime Chevallier commit f43194c1447c9536efb0859c2f3f46f6bf2b9154 upstream. Marvell PPv2.2 controller present on CP-110 need the extra "mg_core_clk" clock to avoid system hangs when powering s

Re: [PATCH v5 4/5] fs: blkdev set bio prio from kiocb prio

2018-05-21 Thread Adam Manzanares
On 5/21/18 2:04 PM, Jeff Moyer wrote: > adam.manzana...@wdc.com writes: > >> From: Adam Manzanares >> >> Now that kiocb has an ioprio field copy this over to the bio when it is >> created from the kiocb. >> >> Signed-off-by: Adam Manzanares >> --- >> fs/block_dev.c | 1 + >> 1 file changed,

[PATCH 4.16 047/110] efi: Avoid potential crashes, fix the struct efi_pci_io_protocol_32 definition for mixed mode

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Ard Biesheuvel commit 0b3225ab9407f557a8e20f23f37aa7236c10a9b1 upstream. Mixed mode allows a kernel built for x86_64 to interact with 32-bit EFI firmware, but requires us to define all struct

[PATCH 4.16 049/110] x86/apic/x2apic: Initialize cluster ID properly

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit fed71f7d98795ed0fa1d431910787f0f4a68324f upstream. Rick bisected a regression on large systems which use the x2apic cluster mode for interrupt delivery to the commit wic

Re: [PATCH 07/33] iwlwifi: mvm: use match_string() helper

2018-05-21 Thread Andy Shevchenko
On Mon, May 21, 2018 at 2:57 PM, Yisheng Xie wrote: > match_string() returns the index of an array for a matching string, > which can be used intead of open coded variant. > int ret, bt_force_ant_mode; > > - for (bt_force_ant_mode = 0; > -bt_force_ant_mode < ARRAY_SIZE(m

[PATCH 4.16 052/110] ARM: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Masami Hiramatsu commit 69af7e23a6870df2ea6fa79ca16493d59b3eebeb upstream. Since get_kprobe_ctlblk() uses smp_processor_id() to access per-cpu variable, it hits smp_processor_id sanity check a

[PATCH 4.16 050/110] x86/mm: Drop TS_COMPAT on 64-bit exec() syscall

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Dmitry Safonov commit acf46020012ccbca1172e9c7aeab399c950d9212 upstream. The x86 mmap() code selects the mmap base for an allocation depending on the bitness of the syscall. For 64bit sycalls

Re: [PATCH v5 0/5] AIO add per-command iopriority

2018-05-21 Thread Adam Manzanares
On 5/21/18 1:57 PM, Jeff Moyer wrote: > Hi, Adam, > > adam.manzana...@wdc.com writes: > >> From: Adam Manzanares >> >> This is the per-I/O equivalent of the ioprio_set system call. >> See the following link for performance implications on a SATA HDD: >> https://lkml.org/lkml/2016/12/6/495 >> >

[PATCH 4.16 054/110] ARM: 8772/1: kprobes: Prohibit kprobes on get_user functions

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Masami Hiramatsu commit 0d73c3f8e7f6ee2aab1bb350f60c180f5ae21a2c upstream. Since do_undefinstr() uses get_user to get the undefined instruction, it can be called before kprobes processes recur

[PATCH 4.16 056/110] Btrfs: send, fix invalid access to commit roots due to concurrent snapshotting

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Robbie Ko commit 6f2f0b394b54e2b159ef969a0b5274e9bbf82ff2 upstream. [BUG] btrfs incremental send BUG happens when creating a snapshot of snapshot that is being used by send. [REASON] The prob

[PATCH 4.16 058/110] btrfs: fix crash when trying to resume balance without the resume flag

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Anand Jain commit 02ee654d3a04563c67bfe658a05384548b9bb105 upstream. We set the BTRFS_BALANCE_RESUME flag in the btrfs_recover_balance() only, which isn't called during the remount. So when re

[PATCH 4.16 060/110] btrfs: Fix delalloc inodes invalidation during transaction abort

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Nikolay Borisov commit fe816d0f1d4c31c4c31d42ca78a87660565fc800 upstream. When a transaction is aborted btrfs_cleanup_transaction is called to cleanup all the various in-flight bits and pieces

[PATCH 4.16 061/110] btrfs: fix reading stale metadata blocks after degraded raid1 mounts

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Liu Bo commit 02a3307aa9c20b4f6626255b028f07f6cfa16feb upstream. If a btree block, aka. extent buffer, is not available in the extent buffer cache, it'll be read out from the disk instead, i.e

Re: v4.17-rc1: regressions on N900, N950

2018-05-21 Thread Pavel Machek
HI! > On Sun, Apr 22, 2018 at 09:42:13AM +0200, Pavel Machek wrote: > > v4.17-rc1 broke display for me on Nokia N900. (I don't know if system > > boots, but I can see on red flash LED that at least that driver > > succeeded. So it should not be early boot crash). > > > > v4.17-rc1 also broke boot

Re: [PATCH 05/33] cxgb4: use match_string() helper

2018-05-21 Thread Andy Shevchenko
On Mon, May 21, 2018 at 2:57 PM, Yisheng Xie wrote: > match_string() returns the index of an array for a matching string, > which can be used intead of open coded variant. > - for (i = 0; i < ARRAY_SIZE(cudbg_region); i++) { > - if (!strcmp(cudbg_region[i], region_name)) { > -

[PATCH 4.16 033/110] powerpc/powernv: Fix NVRAM sleep in invalid context when crashing

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Nicholas Piggin commit c1d2a31397ec51f0370f6bd17b19b39152c263cb upstream. Similarly to opal_event_shutdown, opal_nvram_write can be called in the crash path with irqs disabled. Special case th

Re: [v4 09/11] drivers/hwmon: Add PECI cputemp driver

2018-05-21 Thread Jae Hyun Yoo
On 5/21/2018 2:04 PM, Guenter Roeck wrote: On Mon, May 21, 2018 at 01:50:34PM -0700, Jae Hyun Yoo wrote: On 5/21/2018 1:42 PM, Guenter Roeck wrote: On Mon, May 21, 2018 at 12:59:52PM -0700, Jae Hyun Yoo wrote: This commit adds PECI cputemp hwmon driver. Signed-off-by: Jae Hyun Yoo Reviewed-b

[PATCH 4.16 062/110] x86/nospec: Simplify alternative_msr_write()

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Linus Torvalds commit 1aa7a5735a41418d8e01fa7c9565eb2657e2ea3f upstream The macro is not type safe and I did look for why that "g" constraint for the asm doesn't work: it's because the asm is

[PATCH 4.16 032/110] mtd: rawnand: marvell: Fix read logic for layouts with ->nchunks > 2

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Boris Brezillon commit 90d617633368ab97a2c7571c6e66dad54f39228d upstream. The code is doing monolithic reads for all chunks except the last one which is wrong since a monolithic read will issu

[PATCH 4.16 034/110] drm: Match sysfs name in link removal to link creation

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Haneen Mohammed commit 7f6df440b8623c441c42d070bf592e2d2c1fa9bb upstream. This patch matches the sysfs name used in the unlinking with the linking function. Otherwise, remove_compat_control_li

[PATCH 4.16 037/110] radix tree: fix multi-order iteration race

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Ross Zwisler commit 9f418224e8114156d995b98fa4e0f4fd21f685fe upstream. Fix a race in the multi-order iteration code which causes the kernel to hit a GP fault. This was first seen with a produ

[PATCH 4.16 036/110] lib/test_bitmap.c: fix bitmap optimisation tests to report errors correctly

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Matthew Wilcox commit 1e3054b98c5415d5cb5f8824fc33b548ae5644c3 upstream. I had neglected to increment the error counter when the tests failed, which made the tests noisy when they fail, but no

[PATCH 4.16 073/110] x86/KVM/VMX: Expose SPEC_CTRL Bit(2) to the guest

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Konrad Rzeszutek Wilk commit da39556f66f5cfe8f9c989206974f1cb16ca5d7c upstream Expose the CPUID.7.EDX[31] bit to the guest, and also guard against various combinations of SPEC_CTRL MSR values.

[PATCH 4.16 077/110] x86/speculation: Add prctl for Speculative Store Bypass mitigation

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit a73ec77ee17ec556fe7f165d00314cb7c047b1ac upstream Add prctl based control for Speculative Store Bypass mitigation and make it the default mitigation for Intel and AMD.

[PATCH 4.16 028/110] netfilter: nf_tables: nf_tables_obj_lookup_byhandle() can be static

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: kbuild test robot commit ae0662f84b105776734cb089703a7bf834bac195 upstream. Fixes: 3ecbfd65f50e ("netfilter: nf_tables: allocate handle and delete objects via handle") Signed-off-by: Fengguan

[PATCH 4.16 074/110] x86/speculation: Create spec-ctrl.h to avoid include hell

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit 28a2775217b17208811fa43a9e96bd1fdf417b86 upstream Having everything in nospec-branch.h creates a hell of dependencies when adding the prctl based switching mechanism. Mo

[PATCH 4.16 076/110] x86/process: Allow runtime control of Speculative Store Bypass

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit 885f82bfbc6fefb6664ea27965c3ab9ac4194b8c upstream The Speculative Store Bypass vulnerability can be mitigated with the Reduced Data Speculation (RDS) feature. To allow f

[PATCH 4.16 075/110] prctl: Add speculation control prctls

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit b617cfc858161140d69cc0b5cc211996b557a1c7 upstream Add two new prctls to control aspects of speculation related vulnerabilites and their mitigations to provide finer grai

[PATCH 4.16 080/110] seccomp: Enable speculation flaw mitigations

2018-05-21 Thread Greg Kroah-Hartman
4.16-stable review patch. If anyone has any objections, please let me know. -- From: Kees Cook commit 5c3070890d06ff82eecb808d02d2ca39169533ef upstream When speculation flaw mitigations are opt-in (via prctl), using seccomp will automatically opt-in to these protections, since

<    1   2   3   4   5   6   7   8   9   10   >