[PATCH 4.17 018/101] net: macb: Fix ptp time adjustment for large negative delta

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Harini Katakam [ Upstream commit 64d7839af8c8f67daaf9bf387135052c55d85f90 ] When delta passed to gem_ptp_adjtime is negative, the sign is maintained in the ns_to_timespec64 conversion. Hence

[PATCH 4.17 018/101] net: macb: Fix ptp time adjustment for large negative delta

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Harini Katakam [ Upstream commit 64d7839af8c8f67daaf9bf387135052c55d85f90 ] When delta passed to gem_ptp_adjtime is negative, the sign is maintained in the ns_to_timespec64 conversion. Hence

[PATCH 4.17 069/101] reiserfs: fix buffer overflow with long warning messages

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Eric Biggers commit fe10e398e860955bac4d28ec031b701d358465e4 upstream. ReiserFS prepares log messages into a 1024-byte buffer with no bounds checks. Long messages, such as the "unknown mount

[PATCH 4.17 069/101] reiserfs: fix buffer overflow with long warning messages

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Eric Biggers commit fe10e398e860955bac4d28ec031b701d358465e4 upstream. ReiserFS prepares log messages into a 1024-byte buffer with no bounds checks. Long messages, such as the "unknown mount

[PATCH 4.17 027/101] net/packet: fix use-after-free

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 945d015ee0c3095d2290e845565a23dedfd8027c ] We should put copy_skb in receive_queue only after a successful call to virtio_net_hdr_from_skb(). syzbot report :

[PATCH 4.17 027/101] net/packet: fix use-after-free

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 945d015ee0c3095d2290e845565a23dedfd8027c ] We should put copy_skb in receive_queue only after a successful call to virtio_net_hdr_from_skb(). syzbot report :

[PATCH 4.17 061/101] x86/kvm/Kconfig: Ensure CRYPTO_DEV_CCP_DD state at minimum matches KVM_AMD

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Janakarajan Natarajan commit d30f370d3a4998c13ed3e5c8ef607d05be0a987a upstream. Prevent a config where KVM_AMD=y and CRYPTO_DEV_CCP_DD=m thereby ensuring that AMD Secure Processor device

[PATCH 4.17 053/101] enic: do not overwrite error code

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Govindarajulu Varadarajan [ Upstream commit 56f772279a762984f6e9ebbf24a7c829faba5712 ] In failure path, we overwrite err to what vnic_rq_disable() returns. In case it returns 0, enic_open()

[PATCH 4.17 056/101] Revert "s390/qeth: use Read device to query hypervisor for MAC"

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Julian Wiedmann [ Upstream commit 4664610537d398d55be19432f9cd9c29c831e159 ] This reverts commit b7493e91c11a757cf0f8ab26989642ee4bb2c642. On its own, querying RDEV for a MAC address works

[PATCH 4.17 061/101] x86/kvm/Kconfig: Ensure CRYPTO_DEV_CCP_DD state at minimum matches KVM_AMD

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Janakarajan Natarajan commit d30f370d3a4998c13ed3e5c8ef607d05be0a987a upstream. Prevent a config where KVM_AMD=y and CRYPTO_DEV_CCP_DD=m thereby ensuring that AMD Secure Processor device

[PATCH 4.17 053/101] enic: do not overwrite error code

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Govindarajulu Varadarajan [ Upstream commit 56f772279a762984f6e9ebbf24a7c829faba5712 ] In failure path, we overwrite err to what vnic_rq_disable() returns. In case it returns 0, enic_open()

[PATCH 4.17 056/101] Revert "s390/qeth: use Read device to query hypervisor for MAC"

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Julian Wiedmann [ Upstream commit 4664610537d398d55be19432f9cd9c29c831e159 ] This reverts commit b7493e91c11a757cf0f8ab26989642ee4bb2c642. On its own, querying RDEV for a MAC address works

[PATCH 4.17 001/101] compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Nick Desaulniers commit d03db2bc26f0e4a6849ad649a09c9c73fccdc656 upstream. Functions marked extern inline do not emit an externally visible function when the gnu89 C standard is used. Some

[PATCH 4.17 097/101] arm64: KVM: Handle guests ARCH_WORKAROUND_2 requests

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit b4f18c063a13dfb33e3a63fe1844823e19c2265e upstream. In order to forward the guest's ARCH_WORKAROUND_2 calls to EL3, add a small(-ish) sequence to handle it at EL2. Special

[PATCH 4.17 096/101] arm64: KVM: Add ARCH_WORKAROUND_2 support for guests

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit 55e3748e8902ff641e334226bdcb432f9a5d78d3 upstream. In order to offer ARCH_WORKAROUND_2 support to guests, we need a bit of infrastructure. Let's add a flag indicating

[PATCH 4.17 098/101] arm64: KVM: Add ARCH_WORKAROUND_2 discovery through ARCH_FEATURES_FUNC_ID

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit 5d81f7dc9bca4f4963092433e27b508cbe524a32 upstream. Now that all our infrastructure is in place, let's expose the availability of ARCH_WORKAROUND_2 to guests. We take this

Re: [PATCH v2] USB: serial: cp210x: Implement GPIO support for CP2102N

2018-07-20 Thread Karoly Pados
Thank you very much for squeezing this into your schedule. I've also become a lot more experienced now in contributing to the kernel, concerning both planning and code. Next time things should work out even smoother. Wish you a great and rewarding vacation! Karoly July 20, 2018 12:16 PM,

[PATCH 4.17 001/101] compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Nick Desaulniers commit d03db2bc26f0e4a6849ad649a09c9c73fccdc656 upstream. Functions marked extern inline do not emit an externally visible function when the gnu89 C standard is used. Some

[PATCH 4.17 097/101] arm64: KVM: Handle guests ARCH_WORKAROUND_2 requests

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit b4f18c063a13dfb33e3a63fe1844823e19c2265e upstream. In order to forward the guest's ARCH_WORKAROUND_2 calls to EL3, add a small(-ish) sequence to handle it at EL2. Special

[PATCH 4.17 096/101] arm64: KVM: Add ARCH_WORKAROUND_2 support for guests

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit 55e3748e8902ff641e334226bdcb432f9a5d78d3 upstream. In order to offer ARCH_WORKAROUND_2 support to guests, we need a bit of infrastructure. Let's add a flag indicating

[PATCH 4.17 098/101] arm64: KVM: Add ARCH_WORKAROUND_2 discovery through ARCH_FEATURES_FUNC_ID

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit 5d81f7dc9bca4f4963092433e27b508cbe524a32 upstream. Now that all our infrastructure is in place, let's expose the availability of ARCH_WORKAROUND_2 to guests. We take this

Re: [PATCH v2] USB: serial: cp210x: Implement GPIO support for CP2102N

2018-07-20 Thread Karoly Pados
Thank you very much for squeezing this into your schedule. I've also become a lot more experienced now in contributing to the kernel, concerning both planning and code. Next time things should work out even smoother. Wish you a great and rewarding vacation! Karoly July 20, 2018 12:16 PM,

[PATCH 4.17 078/101] block: dont use blocking queue entered for recursive bio submits

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Jens Axboe commit cd4a4ae4683dc2e09380118e205e057896dcda2b upstream. If we end up splitting a bio and the queue goes away between the initial submission and the later split submission, then

[PATCH 4.17 060/101] virtio_net: split XDP_TX kick and XDP_REDIRECT map flushing

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Jesper Dangaard Brouer [ Upstream commit 2471c75efed32529698c26da499954f0253cb401 ] The driver was combining XDP_TX virtqueue_kick and XDP_REDIRECT map flushing (xdp_do_flush_map). This is

[PATCH 4.17 090/101] arm64: ssbd: Add global mitigation state accessor

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit c32e1736ca03904c03de0e4459a673be194f56fd upstream. We're about to need the mitigation state in various parts of the kernel in order to do the right thing for userspace and

[PATCH 4.17 049/101] net: use dev_change_tx_queue_len() for SIOCSIFTXQLEN

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Cong Wang [ Upstream commit 3f76df198288ceec92fc9eddecad1e73c52769b0 ] As noticed by Eric, we need to switch to the helper dev_change_tx_queue_len() for SIOCSIFTXQLEN call path too, otheriwse

[PATCH 4.17 049/101] net: use dev_change_tx_queue_len() for SIOCSIFTXQLEN

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Cong Wang [ Upstream commit 3f76df198288ceec92fc9eddecad1e73c52769b0 ] As noticed by Eric, we need to switch to the helper dev_change_tx_queue_len() for SIOCSIFTXQLEN call path too, otheriwse

[PATCH 4.17 078/101] block: dont use blocking queue entered for recursive bio submits

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Jens Axboe commit cd4a4ae4683dc2e09380118e205e057896dcda2b upstream. If we end up splitting a bio and the queue goes away between the initial submission and the later split submission, then

[PATCH 4.17 060/101] virtio_net: split XDP_TX kick and XDP_REDIRECT map flushing

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Jesper Dangaard Brouer [ Upstream commit 2471c75efed32529698c26da499954f0253cb401 ] The driver was combining XDP_TX virtqueue_kick and XDP_REDIRECT map flushing (xdp_do_flush_map). This is

[PATCH 4.17 090/101] arm64: ssbd: Add global mitigation state accessor

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit c32e1736ca03904c03de0e4459a673be194f56fd upstream. We're about to need the mitigation state in various parts of the kernel in order to do the right thing for userspace and

[PATCH 4.17 094/101] arm64: ssbd: Add prctl interface for per-thread mitigation

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit 9cdc0108baa8ef87c76ed834619886a46bd70cbe upstream. If running on a system that performs dynamic SSBD mitigation, allow userspace to request the mitigation for itself. This

[PATCH 4.17 044/101] vhost_net: validate sock before trying to put its fd

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Jason Wang [ Upstream commit b8f1f65882f07913157c44673af7ec0b308d03eb ] Sock will be NULL if we pass -1 to vhost_net_set_backend(), but when we meet errors during ubuf allocation, the code

[PATCH 4.17 045/101] VSOCK: fix loopback on big-endian systems

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Claudio Imbrenda [ Upstream commit e5ab564c9ebee77794842ca7d7476147b83d6a27 ] The dst_cid and src_cid are 64 bits, therefore 64 bit accessors should be used, and in fact in

[PATCH 4.17 032/101] net/tcp: Fix socket lookups with SO_BINDTODEVICE

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: David Ahern [ Upstream commit 8c43bd1706885ba1acfa88da02bc60a2ec16f68c ] Similar to 69678bcd4d2d ("udp: fix SO_BINDTODEVICE"), TCP socket lookups need to fail if dev_match is not true.

[PATCH 4.17 095/101] arm64: KVM: Add HYP per-cpu accessors

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit 85478bab409171de501b719971fd25a3d5d639f9 upstream. As we're going to require to access per-cpu variables at EL2, let's craft the minimum set of accessors required to

[PATCH 4.14 55/92] clocksource: Initialize cs->wd_list

2018-07-20 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Peter Zijlstra commit 5b9e886a4af97574ca3ce1147f35545da0e7afc7 upstream. A number of places relies on list_empty(>wd_list), however the list_head does not get initialized. Do so upon

[PATCH 4.17 044/101] vhost_net: validate sock before trying to put its fd

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Jason Wang [ Upstream commit b8f1f65882f07913157c44673af7ec0b308d03eb ] Sock will be NULL if we pass -1 to vhost_net_set_backend(), but when we meet errors during ubuf allocation, the code

[PATCH 4.17 045/101] VSOCK: fix loopback on big-endian systems

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Claudio Imbrenda [ Upstream commit e5ab564c9ebee77794842ca7d7476147b83d6a27 ] The dst_cid and src_cid are 64 bits, therefore 64 bit accessors should be used, and in fact in

[PATCH 4.17 032/101] net/tcp: Fix socket lookups with SO_BINDTODEVICE

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: David Ahern [ Upstream commit 8c43bd1706885ba1acfa88da02bc60a2ec16f68c ] Similar to 69678bcd4d2d ("udp: fix SO_BINDTODEVICE"), TCP socket lookups need to fail if dev_match is not true.

[PATCH 4.17 095/101] arm64: KVM: Add HYP per-cpu accessors

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit 85478bab409171de501b719971fd25a3d5d639f9 upstream. As we're going to require to access per-cpu variables at EL2, let's craft the minimum set of accessors required to

[PATCH 4.14 55/92] clocksource: Initialize cs->wd_list

2018-07-20 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Peter Zijlstra commit 5b9e886a4af97574ca3ce1147f35545da0e7afc7 upstream. A number of places relies on list_empty(>wd_list), however the list_head does not get initialized. Do so upon

[PATCH 4.17 094/101] arm64: ssbd: Add prctl interface for per-thread mitigation

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit 9cdc0108baa8ef87c76ed834619886a46bd70cbe upstream. If running on a system that performs dynamic SSBD mitigation, allow userspace to request the mitigation for itself. This

[PATCH 4.17 092/101] arm64: ssbd: Restore mitigation status on CPU resume

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit 647d0519b53f440a55df163de21c52a8205431cc upstream. On a system where firmware can dynamically change the state of the mitigation, the CPU will always come up with the

[PATCH 4.17 091/101] arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit 986372c4367f46b34a3c0f6918d7fb95cbdf39d6 upstream. In order to avoid checking arm64_ssbd_callback_required on each kernel entry/exit even if no mitigation is required,

[PATCH 4.17 093/101] arm64: ssbd: Introduce thread flag to control userspace mitigation

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit 9dd9614f5476687abbff8d4b12cd08ae70d7c2ad upstream. In order to allow userspace to be mitigated on demand, let's introduce a new thread flag that prevents the mitigation

[PATCH 4.17 092/101] arm64: ssbd: Restore mitigation status on CPU resume

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit 647d0519b53f440a55df163de21c52a8205431cc upstream. On a system where firmware can dynamically change the state of the mitigation, the CPU will always come up with the

[PATCH 4.17 091/101] arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit 986372c4367f46b34a3c0f6918d7fb95cbdf39d6 upstream. In order to avoid checking arm64_ssbd_callback_required on each kernel entry/exit even if no mitigation is required,

[PATCH 4.17 093/101] arm64: ssbd: Introduce thread flag to control userspace mitigation

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit 9dd9614f5476687abbff8d4b12cd08ae70d7c2ad upstream. In order to allow userspace to be mitigated on demand, let's introduce a new thread flag that prevents the mitigation

[PATCH 4.17 087/101] arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit 5cf9ce6e5ea50f805c6188c04ed0daaec7b6887d upstream. In a heterogeneous system, we can end up with both affected and unaffected CPUs. Let's check their status before calling

[PATCH 4.17 087/101] arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit 5cf9ce6e5ea50f805c6188c04ed0daaec7b6887d upstream. In a heterogeneous system, we can end up with both affected and unaffected CPUs. Let's check their status before calling

[PATCH 4.17 026/101] net: mvneta: fix the Rx desc DMA address in the Rx path

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Antoine Tenart [ Upstream commit 271f7ff5aa5a73488b7a9d8b84b5205fb5b2f7cc ] When using s/w buffer management, buffers are allocated and DMA mapped. When doing so on an arm64 platform, an

[PATCH v2] phy: Add driver for Cadence MHDP DisplayPort SD0801 PHY

2018-07-20 Thread Scott Telford
Add driver for the Cadence SD0801 "Torrent" PHY used with the Cadence MHDP DisplayPort Tx controller. Integration with the MHDP driver will be the subject of another commit. Signed-off-by: Scott Telford --- .../devicetree/bindings/phy/phy-cadence-dp.txt | 28 ++ drivers/phy/Kconfig

[PATCH 4.17 026/101] net: mvneta: fix the Rx desc DMA address in the Rx path

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Antoine Tenart [ Upstream commit 271f7ff5aa5a73488b7a9d8b84b5205fb5b2f7cc ] When using s/w buffer management, buffers are allocated and DMA mapped. When doing so on an arm64 platform, an

[PATCH v2] phy: Add driver for Cadence MHDP DisplayPort SD0801 PHY

2018-07-20 Thread Scott Telford
Add driver for the Cadence SD0801 "Torrent" PHY used with the Cadence MHDP DisplayPort Tx controller. Integration with the MHDP driver will be the subject of another commit. Signed-off-by: Scott Telford --- .../devicetree/bindings/phy/phy-cadence-dp.txt | 28 ++ drivers/phy/Kconfig

[PATCH 4.17 057/101] s390/qeth: avoid using is_multicast_ether_addr_64bits on (u8 *)[6]

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Vasily Gorbik [ Upstream commit 9d0a58fb9747afd27d490c02a97889a1b59f6be4 ] *ether_addr*_64bits functions have been introduced to optimize performance critical paths, which access 6-byte

[PATCH 4.17 058/101] s390/qeth: fix race when setting MAC address

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Julian Wiedmann [ Upstream commit 4789a21880488048105590049fc41a99f53d565d ] When qeth_l2_set_mac_address() finds the card in a non-reachable state, it merely copies the new MAC address into

[PATCH 4.17 057/101] s390/qeth: avoid using is_multicast_ether_addr_64bits on (u8 *)[6]

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Vasily Gorbik [ Upstream commit 9d0a58fb9747afd27d490c02a97889a1b59f6be4 ] *ether_addr*_64bits functions have been introduced to optimize performance critical paths, which access 6-byte

[PATCH 4.17 058/101] s390/qeth: fix race when setting MAC address

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Julian Wiedmann [ Upstream commit 4789a21880488048105590049fc41a99f53d565d ] When qeth_l2_set_mac_address() finds the card in a non-reachable state, it merely copies the new MAC address into

[PATCH 4.17 015/101] net: dccp: avoid crash in ccid3_hc_rx_send_feedback()

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 74174fe5634ffbf645a7ca5a261571f700b2f332 ] On fast hosts or malicious bots, we trigger a DCCP_BUG() which seems excessive. syzbot reported : BUG: delta

[PATCH 4.17 015/101] net: dccp: avoid crash in ccid3_hc_rx_send_feedback()

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 74174fe5634ffbf645a7ca5a261571f700b2f332 ] On fast hosts or malicious bots, we trigger a DCCP_BUG() which seems excessive. syzbot reported : BUG: delta

[PATCH 4.17 029/101] net/sched: act_ife: preserve the action control in case of error

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Davide Caratti [ Upstream commit cbf56c29624fa056a0c1c3d177e67aa51a7fd8d6 ] in the following script # tc actions add action ife encode allow prio pass index 42 # tc actions replace action

[PATCH 4.17 047/101] nfp: flower: fix mpls ether type detection

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Pieter Jansen van Vuuren [ Upstream commit a64119415ff248efa61301783bc26551df5dabf6 ] Previously it was not possible to distinguish between mpls ether types and other ether types. This leads

[PATCH 4.17 021/101] net/mlx5: E-Switch, Avoid setup attempt if not being e-switch manager

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Or Gerlitz [ Upstream commit 0efc8562491b7d36f6bbc4fbc8f3348cb6641e9c ] In smartnic env, the host (PF) driver might not be an e-switch manager, hence the FW will err on driver attempts to

[PATCH 4.17 029/101] net/sched: act_ife: preserve the action control in case of error

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Davide Caratti [ Upstream commit cbf56c29624fa056a0c1c3d177e67aa51a7fd8d6 ] in the following script # tc actions add action ife encode allow prio pass index 42 # tc actions replace action

[PATCH 4.17 047/101] nfp: flower: fix mpls ether type detection

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Pieter Jansen van Vuuren [ Upstream commit a64119415ff248efa61301783bc26551df5dabf6 ] Previously it was not possible to distinguish between mpls ether types and other ether types. This leads

[PATCH 4.17 021/101] net/mlx5: E-Switch, Avoid setup attempt if not being e-switch manager

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Or Gerlitz [ Upstream commit 0efc8562491b7d36f6bbc4fbc8f3348cb6641e9c ] In smartnic env, the host (PF) driver might not be an e-switch manager, hence the FW will err on driver attempts to

[PATCH 4.17 086/101] arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit 8e2906245f1e3b0d027169d9f2e55ce0548cb96e upstream. In order for the kernel to protect itself, let's call the SSBD mitigation implemented by the higher exception level

[PATCH 4.17 086/101] arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit 8e2906245f1e3b0d027169d9f2e55ce0548cb96e upstream. In order for the kernel to protect itself, let's call the SSBD mitigation implemented by the higher exception level

Re: [PATCH] clk: renesas: r9a06g032: Avoid needless probe deferring

2018-07-20 Thread Geert Uytterhoeven
Hi Phil, On Fri, Jul 20, 2018 at 2:26 PM Phil Edworthy wrote: > On 20 July 2018 13:12, Geert Uytterhoeven wrote: > > On Fri, Jul 20, 2018 at 2:06 PM Phil Edworthy wrote: > > > On 20 July 2018 12:21, Geert Uytterhoeven wrote: > > > > On Wed, Jul 18, 2018 at 4:34 PM Phil Edworthy wrote: > > > > >

[PATCH 4.17 050/101] nfp: reject binding to shared blocks

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: John Hurley [ Upstream commit 951a8ee6def39e25d0e60b9394e5a249ba8b2390 ] TC shared blocks allow multiple qdiscs to be grouped together and filters shared between them. Currently the chains of

Re: [PATCH] clk: renesas: r9a06g032: Avoid needless probe deferring

2018-07-20 Thread Geert Uytterhoeven
Hi Phil, On Fri, Jul 20, 2018 at 2:26 PM Phil Edworthy wrote: > On 20 July 2018 13:12, Geert Uytterhoeven wrote: > > On Fri, Jul 20, 2018 at 2:06 PM Phil Edworthy wrote: > > > On 20 July 2018 12:21, Geert Uytterhoeven wrote: > > > > On Wed, Jul 18, 2018 at 4:34 PM Phil Edworthy wrote: > > > > >

[PATCH 4.17 050/101] nfp: reject binding to shared blocks

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: John Hurley [ Upstream commit 951a8ee6def39e25d0e60b9394e5a249ba8b2390 ] TC shared blocks allow multiple qdiscs to be grouped together and filters shared between them. Currently the chains of

[PATCH 4.17 042/101] tcp: fix Fast Open key endianness

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Yuchung Cheng [ Upstream commit c860e997e9170a6d68f9d1e6e2cf61f572191aaf ] Fast Open key could be stored in different endian based on the CPU. Previously hosts in different endianness in a

[PATCH 4.17 085/101] arm/arm64: smccc: Add SMCCC-specific return codes

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit eff0e9e1078ea7dc1d794dc50e31baef984c46d7 upstream. We've so far used the PSCI return codes for SMCCC because they were extremely similar. But with the new ARM DEN 0070A

[PATCH 4.17 028/101] net/sched: act_ife: fix recursive lock and idr leak

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Davide Caratti [ Upstream commit 0a889b9404c084c6fd145020c939a8f688b3e058 ] a recursive lock warning [1] can be observed with the following script, # $TC actions add action ife encode allow

[PATCH 4.17 041/101] strparser: Remove early eaten to fix full tcp receive buffer stall

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Doron Roberts-Kedes [ Upstream commit 977c7114ebda2e746a114840d3a875e0cdb826fb ] On receving an incomplete message, the existing code stores the remaining length of the cloned skb in the

[PATCH 4.17 046/101] hinic: reset irq affinity before freeing irq

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Wei Yongjun [ Upstream commit 82be2ab159a3a0ae4024b946a31f12b221f6c8ff ] Following warning is seen when rmmod hinic. This is because affinity value is not reset before calling free_irq().

[PATCH 4.17 042/101] tcp: fix Fast Open key endianness

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Yuchung Cheng [ Upstream commit c860e997e9170a6d68f9d1e6e2cf61f572191aaf ] Fast Open key could be stored in different endian based on the CPU. Previously hosts in different endianness in a

[PATCH 4.17 085/101] arm/arm64: smccc: Add SMCCC-specific return codes

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier commit eff0e9e1078ea7dc1d794dc50e31baef984c46d7 upstream. We've so far used the PSCI return codes for SMCCC because they were extremely similar. But with the new ARM DEN 0070A

[PATCH 4.17 028/101] net/sched: act_ife: fix recursive lock and idr leak

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Davide Caratti [ Upstream commit 0a889b9404c084c6fd145020c939a8f688b3e058 ] a recursive lock warning [1] can be observed with the following script, # $TC actions add action ife encode allow

[PATCH 4.17 041/101] strparser: Remove early eaten to fix full tcp receive buffer stall

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Doron Roberts-Kedes [ Upstream commit 977c7114ebda2e746a114840d3a875e0cdb826fb ] On receving an incomplete message, the existing code stores the remaining length of the cloned skb in the

[PATCH 4.17 046/101] hinic: reset irq affinity before freeing irq

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Wei Yongjun [ Upstream commit 82be2ab159a3a0ae4024b946a31f12b221f6c8ff ] Following warning is seen when rmmod hinic. This is because affinity value is not reset before calling free_irq().

[PATCH 4.17 025/101] net/mlx5: Fix wrong size allocation for QoS ETC TC regitster

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Shay Agroskin [ Upstream commit d14fcb8d877caf1b8d6bd65d444bf62b21f2070c ] The driver allocates wrong size (due to wrong struct name) when issuing a query/set request to NIC's register.

[PATCH 4.17 024/101] net/mlx5: Fix required capability for manipulating MPFS

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Eli Cohen [ Upstream commit f811980444ec59ad62f9e041adbb576a821132c7 ] Manipulating of the MPFS requires eswitch manager capabilities. Fixes: eeb66cdb6826 ('net/mlx5: Separate between

[PATCH 4.17 025/101] net/mlx5: Fix wrong size allocation for QoS ETC TC regitster

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Shay Agroskin [ Upstream commit d14fcb8d877caf1b8d6bd65d444bf62b21f2070c ] The driver allocates wrong size (due to wrong struct name) when issuing a query/set request to NIC's register.

[PATCH 4.17 024/101] net/mlx5: Fix required capability for manipulating MPFS

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Eli Cohen [ Upstream commit f811980444ec59ad62f9e041adbb576a821132c7 ] Manipulating of the MPFS requires eswitch manager capabilities. Fixes: eeb66cdb6826 ('net/mlx5: Separate between

[PATCH 4.17 020/101] net/mlx5e: Dont attempt to dereference the ppriv struct if not being eswitch manager

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Or Gerlitz [ Upstream commit 8ffd569aaa818f2624ca821d9a246342fa8b8c50 ] The check for cpu hit statistics was not returning immediate false for any non vport rep netdev and hence we crashed

[PATCH 4.17 020/101] net/mlx5e: Dont attempt to dereference the ppriv struct if not being eswitch manager

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Or Gerlitz [ Upstream commit 8ffd569aaa818f2624ca821d9a246342fa8b8c50 ] The check for cpu hit statistics was not returning immediate false for any non vport rep netdev and hence we crashed

[PATCH 4.17 040/101] stmmac: fix DMA channel hang in half-duplex mode

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Bhadram Varka [ Upstream commit b6cfffa7ad923c73f317ea50fd4ebcb3b4b6669c ] HW does not support Half-duplex mode in multi-queue scenario. Fix it by not advertising the Half-Duplex mode if

[PATCH 4.17 039/101] s390/qeth: dont clobber buffer on async TX completion

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Julian Wiedmann [ Upstream commit ce28867fd20c23cd769e78b4d619c4755bf71a1c ] If qeth_qdio_output_handler() detects that a transmit requires async completion, it replaces the pending buffer's

[PATCH 4.14 08/92] ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()

2018-07-20 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: alex chen commit 3e4c56d41eef5595035872a2ec5a483f42e8917f upstream. ip_alloc_sem should be taken in ocfs2_get_block() when reading file in DIRECT mode to prevent concurrent access to extent

[PATCH 4.17 040/101] stmmac: fix DMA channel hang in half-duplex mode

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Bhadram Varka [ Upstream commit b6cfffa7ad923c73f317ea50fd4ebcb3b4b6669c ] HW does not support Half-duplex mode in multi-queue scenario. Fix it by not advertising the Half-Duplex mode if

[PATCH 4.17 039/101] s390/qeth: dont clobber buffer on async TX completion

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Julian Wiedmann [ Upstream commit ce28867fd20c23cd769e78b4d619c4755bf71a1c ] If qeth_qdio_output_handler() detects that a transmit requires async completion, it replaces the pending buffer's

[PATCH 4.14 08/92] ocfs2: ip_alloc_sem should be taken in ocfs2_get_block()

2018-07-20 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: alex chen commit 3e4c56d41eef5595035872a2ec5a483f42e8917f upstream. ip_alloc_sem should be taken in ocfs2_get_block() when reading file in DIRECT mode to prevent concurrent access to extent

[PATCH 4.17 017/101] net: fix use-after-free in GRO with ESP

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Sabrina Dubroca [ Upstream commit 603d4cf8fe095b1ee78f423d514427be507fb513 ] Since the addition of GRO for ESP, gro_receive can consume the skb and return -EINPROGRESS. In that case, the

[PATCH 4.17 034/101] qed: Fix setting of incorrect eswitch mode.

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Sudarsana Reddy Kalluru [ Upstream commit 538f8d00ba8bb417c4d9e76c61dee59d812d8287 ] By default, driver sets the eswitch mode incorrectly as VEB (virtual Ethernet bridging). Need to set VEB

[PATCH 4.17 016/101] net: dccp: switch rx_tstamp_last_feedback to monotonic clock

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 0ce4e70ff00662ad7490e545ba0cd8c1fa179fca ] To compute delays, better not use time of the day which can be changed by admins or malicious programs. Also change

[PATCH 4.17 033/101] qede: Adverstise software timestamp caps when PHC is not available.

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Sudarsana Reddy Kalluru [ Upstream commit 82a4e71b1565dea8387f54503e806cf374e779ec ] When ptp clock is not available for a PF (e.g., higher PFs in NPAR mode), get-tsinfo() callback should

[PATCH 4.17 036/101] qed: Limit msix vectors in kdump kernel to the minimum required count.

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Sudarsana Reddy Kalluru [ Upstream commit bb7858ba1102f82470a917e041fd23e6385c31be ] Memory size is limited in the kdump kernel environment. Allocation of more msix-vectors (or queues)

[PATCH 4.17 035/101] qed: Fix use of incorrect size in memcpy call.

2018-07-20 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Sudarsana Reddy Kalluru [ Upstream commit cc9b27cdf7bd3c86df73439758ac1564bc8f5bbe ] Use the correct size value while copying chassis/port id values. Fixes: 6ad8c632e ("qed: Add support for

<    5   6   7   8   9   10   11   12   13   14   >