[PATCH v5 2/2] dt-bindings: net: bluetooth: Add device property firmware-name for QCA6174

2019-05-15 Thread Rocky Liao
This patch adds an optional device property "firmware-name" to allow the driver to load customized nvm firmware file based on this property. Signed-off-by: Rocky Liao Reviewed-by: Rob Herring --- Changes in v5: * Made the change applicable to the wcn399x series chip sets ---

[PATCH 4.14 112/115] drivers/virt/fsl_hypervisor.c: dereferencing error pointers in ioctl

2019-05-15 Thread Greg Kroah-Hartman
From: Dan Carpenter commit c8ea3663f7a8e6996d44500ee818c9330ac4fd88 upstream. strndup_user() returns error pointers on error, and then in the error handling we pass the error pointers to kfree(). It will cause an Oops. Link: http://lkml.kernel.org/r/20181218082003.GD32567@kadam Fixes:

[PATCH 4.14 059/115] drm/i915: Downgrade Gen9 Plane WM latency error

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 86c1c87d0e6241cbe35bd52badfc84b154e1b959 ] According to intel_read_wm_latency() it is perfectly legal for one WM and all subsequent levels to be 0 (and the deeper powersaving states disabled), so don't shout *ERROR*, over and over again. Signed-off-by: Chris Wilson Cc: Maarten

[PATCH 4.14 093/115] x86/kprobes: Avoid kretprobe recursion bug

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit b191fa96ea6dc00d331dcc28c1f7db5e075693a0 ] Avoid kretprobe recursion loop bg by setting a dummy kprobes to current_kprobe per-CPU variable. This bug has been introduced with the asm-coded trampoline code, since previously it used another kprobe for hooking the function return

Re: [PATCH v2 0/3] initramfs: add support for xattrs in the initial ram disk

2019-05-15 Thread Roberto Sassu
On 5/15/2019 2:52 AM, Arvind Sankar wrote: On Tue, May 14, 2019 at 04:54:12PM -0700, James Bottomley wrote: On Tue, 2019-05-14 at 18:39 -0500, Rob Landley wrote: On 5/14/19 2:18 PM, James Bottomley wrote: I think Rob is right here. If /init was statically built into the kernel image, it has

[PATCH 4.14 089/115] mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 4af0699782e2cc7d0d89db9eb6f8844dd3df82dc ] The ordered workqueue is used to offload various objects such as routes and neighbours in the order they are notified. It should not be called as part of memory reclaim path, so remove the WQ_MEM_RECLAIM flag. This can also result in a

[PATCH 4.14 090/115] mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit b442fed1b724af0de087912a5718ddde1b87acbb ] The workqueue is used to periodically update the networking stack about activity / statistics of various objects such as neighbours and TC actions. It should not be called as part of memory reclaim path, so remove the WQ_MEM_RECLAIM

[PATCH 4.14 092/115] nfc: nci: Potential off by one in ->pipes[] array

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 6491d698396fd5da4941980a35ca7c162a672016 ] This is similar to commit e285d5bfb7e9 ("NFC: Fix the number of pipes") where we changed NFC_HCI_MAX_PIPES from 127 to 128. As the comment next to the define explains, the pipe identifier is 7 bits long. The highest possible pipe is

[PATCH 4.14 087/115] mlxsw: spectrum_switchdev: Add MDB entries in prepare phase

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit d4d0e40977ac450f32f2db5e4d8e23c9d2578899 ] The driver cannot guarantee in the prepare phase that it will be able to write an MDB entry to the device. In case the driver returned success during the prepare phase, but then failed to add the entry in the commit phase, a WARNING [1]

[PATCH 4.14 081/115] drm/rockchip: fix for mailbox read validation.

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit e4056bbb6719fe713bfc4030ac78e8e97ddf7574 ] This is basically the same fix as in commit fa68d4f8476b ("drm/rockchip: fix for mailbox read size") but for cdn_dp_mailbox_validate_receive function. See patchwork.kernel.org/patch/10671981/ for details. Signed-off-by: Damian Kos

[PATCH 4.14 083/115] x86/fpu: Dont export __kernel_fpu_{begin,end}()

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 12209993e98c5fa1855c467f22a24e3d5b8be205 ] There is one user of __kernel_fpu_begin() and before invoking it, it invokes preempt_disable(). So it could invoke kernel_fpu_begin() right away. The 32bit version of arch_efi_call_virt_setup() and arch_efi_call_virt_teardown() does

[PATCH 4.14 079/115] Input: elan_i2c - add hardware ID for multiple Lenovo laptops

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 738c06d0e4562e0acf9f2c7438a22b2d5afc67aa ] There are many Lenovo laptops which need elan_i2c support, this patch adds relevant IDs to the Elan driver so that touchpads are recognized. Signed-off-by: KT Liao Cc: sta...@vger.kernel.org Signed-off-by: Dmitry Torokhov

[PATCH 4.14 094/115] cw1200: fix missing unlock on error in cw1200_hw_scan()

2019-05-15 Thread Greg Kroah-Hartman
From: Wei Yongjun commit 51c8d24101c79ffce3e79137e2cee5dfeb956dd7 upstream. Add the missing unlock before return from function cw1200_hw_scan() in the error handling case. Fixes: 4f68ef64cd7f ("cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan()") Signed-off-by: Wei Yongjun

[PATCH 4.14 097/115] Dont jump to compute_result state from check_result state

2019-05-15 Thread Greg Kroah-Hartman
From: Nigel Croxon commit 4f4fd7c5798bbdd5a03a60f6269cf1177fbd11ef upstream. Changing state from check_state_check_result to check_state_compute_result not only is unsafe but also doesn't appear to serve a valid purpose. A raid6 check should only be pushing out extra writes if doing repair and

[PATCH 4.14 085/115] mm/memory.c: fix modifying of page protection by insert_pfn()

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit cae85cb8add35f678cf487139d05e083ce2f570a ] Aneesh has reported that PPC triggers the following warning when excercising DAX code: IP set_pte_at+0x3c/0x190 LR insert_pfn+0x208/0x280 Call Trace: insert_pfn+0x68/0x280 dax_iomap_pte_fault.isra.7+0x734/0xa40

[PATCH 4.14 069/115] leds: pwm: silently error out on EPROBE_DEFER

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 9aec30371fb095a0c9415f3f0146ae269c3713d8 ] When probing, if we fail to get the pwm due to probe deferal, we shouldn't print an error message. Just be silent in this case. Signed-off-by: Jerome Brunet Signed-off-by: Jacek Anaszewski Signed-off-by: Sasha Levin ---

[PATCH 4.14 067/115] crypto: testmgr - add AES-CFB tests

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 7da66670775d201f633577f5b15a4bbeebaaa2b0 ] Add AES128/192/256-CFB testvectors from NIST SP800-38A. Signed-off-by: Dmitry Eremin-Solenikov Cc: sta...@vger.kernel.org Signed-off-by: Dmitry Eremin-Solenikov Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin ---

[PATCH 4.14 074/115] devres: Align data[] to ARCH_KMALLOC_MINALIGN

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit a66d972465d15b1d89281258805eb8b47d66bd36 ] Initially we bumped into problem with 32-bit aligned atomic64_t on ARC, see [1]. And then during quite lengthly discussion Peter Z. mentioned ARCH_KMALLOC_MINALIGN which IMHO makes perfect sense. If allocation is done by plain kmalloc()

[PATCH 4.14 075/115] xtensa: xtfpga.dtsi: fix dtc warnings about SPI

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit f37598be4e3896359e87c824be57c280cc3f ] Rename SPI controller node in the XTFPGA DTS to spi@... This fixes the following build warnings: arch/xtensa/boot/dts/kc705_nommu.dtb: Warning (spi_bus_bridge): /soc/spi-master@0d0a: node name for SPI buses should be 'spi'

[PATCH 4.14 062/115] net: stmmac: Move debugfs init/exit to ->probe()/->remove()

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 5f2b8b62786853341a20d4cd4948f9cbca3db002 ] Setting up and tearing down debugfs is current unbalanced, as seen by this error during resume from suspend: [ 752.134067] dwc-eth-dwmac 249.ethernet eth0: ERROR failed to create debugfs directory [ 752.134347]

Applied "spi: tegra114: add support for TX and RX trimmers" to the spi tree

2019-05-15 Thread Mark Brown
The patch spi: tegra114: add support for TX and RX trimmers has been applied to the spi tree at https://git.kernel.org/pub/scm/linux/kernel/git/broonie/spi.git for-5.3 All being well this means that it will be integrated into the linux-next tree (usually sometime in the next 24 hours)

Re: [RFC V2 0/2] sched/fair: Fallback to sched-idle CPU for better performance

2019-05-15 Thread Viresh Kumar
On 25-04-19, 15:07, Viresh Kumar wrote: > Hi, > > Here is another attempt to get some benefit out of the sched-idle > policy. The previous version [1] focused on getting better power numbers > and this version tries to get better performance or lower response time > for the tasks. > > The first

[PATCH 4.14 013/115] s390/dasd: Fix capacity calculation for large volumes

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 2cc9637ce825f3a9f51f8f78af7474e9e85bfa5f ] The DASD driver incorrectly limits the maximum number of blocks of ECKD DASD volumes to 32 bit numbers. Volumes with a capacity greater than 2^32-1 blocks are incorrectly recognized as smaller volumes. This results in the following

[PATCH 4.14 072/115] arm64: dts: marvell: armada-ap806: reserve PSCI area

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 132ac39cffbcfed80ada38ef0fc6d34d95da7be6 ] The memory area [0x400-0x420[ is occupied by the PSCI firmware. Any attempt to access it from Linux leads to an immediate crash. So let's make the same memory reservation as the vendor kernel. [gregory: added as comment that

Re: [RFC][PATCH] perf: Rewrite core context handling

2019-05-15 Thread Alexander Shishkin
Peter Zijlstra writes: > + // XXX think about exclusive > + if ((pmu->capabilities & PERF_PMU_CAP_EXCLUSIVE) && group_leader) { > + err = -EBUSY; > + goto err_context; > } This used to be a problem, because group_leader could have caused move_group, which

[PATCH 4.14 063/115] Btrfs: fix missing delayed iputs on unmount

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit d6fd0ae25c6495674dc5a41a8d16bc8e0073276d ] There's a race between close_ctree() and cleaner_kthread(). close_ctree() sets btrfs_fs_closing(), and the cleaner stops when it sees it set, but this is racy; the cleaner might have already checked the bit and could be cleaning stuff.

[PATCH 4.14 076/115] net_sched: fix two more memory leaks in cls_tcindex

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 1db817e75f5b9387b8db11e37d5f0624eb9223e0 ] struct tcindex_filter_result contains two parts: struct tcf_exts and struct tcf_result. For the local variable 'cr', its exts part is never used but initialized without being released properly on success path. So just completely remove

[PATCH 4.14 005/115] kernfs: fix barrier usage in __kernfs_new_node()

2019-05-15 Thread Greg Kroah-Hartman
From: Andrea Parri commit 998267900cee901c5d1dfa029a6304d00acbc29f upstream. smp_mb__before_atomic() can not be applied to atomic_set(). Remove the barrier and rely on RELEASE synchronization. Fixes: ba16b2846a8c6 ("kernfs: add an API to get kernfs node from inode number") Cc:

[PATCH 4.14 046/115] ima: open a new file instance if no read permissions

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit a408e4a86b36bf98ad15b9ada531cf0e5118ac67 ] Open a new file instance as opposed to changing file->f_mode when the file is not readable. This is done to accomodate overlayfs stacked file operations change. The real struct file is hidden behind the overlays struct file. So, any

[PATCH 4.14 048/115] media: cec: make cec_get_edid_spa_location() an inline function

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit b915bf575d5b7774d0f22d57d6c143e07dcaade2 ] This function is needed by both V4L2 and CEC, so move this to cec.h as a static inline since there are no obvious shared modules between the two subsystems. This patch, together with the following ones, fixes a dependency bug: if

[PATCH 4.14 049/115] media: cec: integrate cec_validate_phys_addr() in cec-api.c

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit e81bff39489a06384822bb38ce7a59f9e365bbe9 ] The cec_phys_addr_validate() function will be moved to V4L2, so use a simplified variant of that function in cec-api.c. cec now no longer calls cec_phys_addr_validate() and it can be safely moved to V4L2. Signed-off-by: Hans Verkuil

[PATCH 4.14 050/115] media: adv7604: when the EDID is cleared, unconfigure CEC as well

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit e7da89926f6dc6cf855f5ffdf79ef99a1b115ca7 ] When there is no EDID the CEC adapter should be unconfigured as well. So call cec_phys_addr_invalidate() when this happens. Signed-off-by: Hans Verkuil Cc: # for v4.18 and up Signed-off-by: Mauro Carvalho Chehab Signed-off-by:

[PATCH 4.14 044/115] ACPICA: AML interpreter: add region addresses in global list during initialization

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 4abb951b73ff0a8a979113ef185651aa3c8da19b ] The table load process omitted adding the operation region address range to the global list. This omission is problematic because the OS queries the global list to check for address range conflicts before deciding which drivers to load.

[PATCH 4.14 042/115] MIPS: VDSO: Reduce VDSO_RANDOMIZE_SIZE to 64MB for 64bit

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit c61c7def1fa0a722610d89790e0255b74f3c07dd ] Commit ea7e0480a4b6 ("MIPS: VDSO: Always map near top of user memory") set VDSO_RANDOMIZE_SIZE to 256MB for 64bit kernel. But take a look at arch/mips/mm/mmap.c we can see that MIN_GAP is 128MB, which means the mmap_base may be at

[PATCH 4.14 047/115] KVM: arm/arm64: Ensure only THP is candidate for adjustment

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit fd2ef358282c849c193aa36dadbf4f07f7dcd29b ] PageTransCompoundMap() returns true for hugetlbfs and THP hugepages. This behaviour incorrectly leads to stage 2 faults for unsupported hugepage sizes (e.g., 64K hugepage with 4K pages) to be treated as THP faults. Tighten the check to

[PATCH 4.14 040/115] sparc64: Export __node_distance.

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 2b4792eaa9f553764047d157365ed8b7787751a3 ] Some drivers reference it via node_distance(), for example the NVME host driver core. ERROR: "__node_distance" [drivers/nvme/host/nvme-core.ko] undefined! make[1]: *** [scripts/Makefile.modpost:92: __modpost] Error 1 Signed-off-by:

[PATCH 4.14 033/115] drm/sun4i: Set device driver data at bind time for use in unbind

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 02b92adbe33e6dbd15dc6e32540b22f47c4ff0a2 ] Our sun4i_drv_unbind gets the drm device using dev_get_drvdata. However, that driver data is never set in sun4i_drv_bind. Set it there to avoid getting a NULL pointer at unbind time. Fixes: 9026e0d122ac ("drm: Add Allwinner A10

[PATCH 4.14 037/115] spi: Micrel eth switch: declare missing of table

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 2f23a2a768bee7ad2ff1e9527c3f7e279e794a46 ] Add missing table for SPI driver relying on SPI device match since compatible is in a DT binding or in a DTS. Before this patch: modinfo drivers/net/phy/spi_ks8995.ko | grep alias alias: spi:ksz8795 alias:

[PATCH 4.14 039/115] Input: synaptics-rmi4 - fix possible double free

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit bce1a78423961fce676ac65540a31b6ffd179e6d ] The RMI4 function structure has been released in rmi_register_function if error occurs. However, it will be released again in the function rmi_create_function, which may result in a double-free bug. Signed-off-by: Pan Bian

[PATCH 4.14 035/115] gpu: ipu-v3: dp: fix CSC handling

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit d4fad0a426c6e26f48c9a7cdd21a7fe9c198d645 ] Initialize the flow input colorspaces to unknown and reset to that value when the channel gets disabled. This avoids the state getting mixed up with a previous mode. Also keep the CSC settings for the background flow intact when

[PATCH 4.14 038/115] spi: ST ST95HF NFC: declare missing of table

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit d04830531d0c4a99c897a44038e5da3d23331d2f ] Add missing table for SPI driver relying on SPI device match since compatible is in a DT binding or in a DTS. Before this patch: modinfo drivers/nfc/st95hf/st95hf.ko | grep alias alias: spi:st95hf After this patch: modinfo

[PATCH 4.14 029/115] ipvs: do not schedule icmp errors from tunnels

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 0261ea1bd1eb0da5c0792a9119b8655cf33c80a3 ] We can receive ICMP errors from client or from tunneling real server. While the former can be scheduled to real server, the latter should not be scheduled, they are decapsulated only when existing connection is found. Fixes:

[PATCH 4.14 025/115] tools lib traceevent: Fix missing equality check for strcmp

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit f32c2877bcb068a718bb70094cd59ccc29d4d082 ] There was a missing comparison with 0 when checking if type is "s64" or "u64". Therefore, the body of the if-statement was entered if "type" was "u64" or not "s64", which made the first strcmp() redundant since if type is "u64", it's

[PATCH 4.14 007/115] iio: adc: xilinx: fix potential use-after-free on remove

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 62039b6aef63380ba7a37c113bbaeee8a55c5342 ] When cancel_delayed_work() returns, the delayed work may still be running. This means that the core could potentially free the private structure (struct xadc) while the delayed work is still using it. This is a potential use-after-free.

[PATCH 4.14 028/115] selftests: netfilter: check icmp pkttoobig errors are set as related

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit becf2319f320cae43e20cf179cc51a355a0deb5f ] When an icmp error such as pkttoobig is received, conntrack checks if the "inner" header (header of packet that did not fit link mtu) is matches an existing connection, and, if so, sets that packet as being related to the conntrack

[PATCH 4.14 020/115] mISDN: Check address length before reading address family

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 238ffdc49ef98b15819cfd5e3fb23194e3ea3d39 ] KMSAN will complain if valid address length passed to bind() is shorter than sizeof("struct sockaddr_mISDN"->family) bytes. Signed-off-by: Tetsuo Handa Signed-off-by: David S. Miller Signed-off-by: Sasha Levin ---

[PATCH 4.14 022/115] x86/reboot, efi: Use EFI reboot for Acer TravelMate X514-51T

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 0082517fa4bce073e7cf542633439f26538a14cc ] Upon reboot, the Acer TravelMate X514-51T laptop appears to complete the shutdown process, but then it hangs in BIOS POST with a black screen. The problem is intermittent - at some points it has appeared related to Secure Boot settings

[PATCH 4.14 015/115] mac80211: Increase MAX_MSG_LEN

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 78be2d21cc1cd3069c6138dcfecec62583130171 ] Looks that 100 chars isn't enough for messages, as we keep getting warnings popping from different places due to message shortening. Instead of trying to shorten the prints, just increase the buffer size. Signed-off-by: Andrei

[PATCH 4.14 021/115] s390/pkey: add one more argument space for debug feature entry

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 6b1f16ba730d4c0cda1247568c3a1bf4fa3a2f2f ] The debug feature entries have been used with up to 5 arguents (including the pointer to the format string) but there was only space reserved for 4 arguemnts. So now the registration does reserve space for 5 times a long value. This

[PATCH 4.14 019/115] clocksource/drivers/oxnas: Fix OX820 compatible

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit fbc87aa0f7c42dc31f1bac3b2615008cac32 ] The OX820 compatible is wrong is the driver, fix it. Fixes: 2ea3401e2a84 ("clocksource/drivers/oxnas: Add OX820 compatible") Reported-by: Daniel Golle Signed-off-by: Neil Armstrong Signed-off-by: Daniel Lezcano Signed-off-by: Sasha

[PATCH 4.14 016/115] mac80211: fix memory accounting with A-MSDU aggregation

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit eb9b64e3a9f8483e6e54f4e03b2ae14ae5db2690 ] skb->truesize can change due to memory reallocation or when adding extra fragments. Adjust fq->memory_usage accordingly Signed-off-by: Felix Fietkau Acked-by: Toke Høiland-Jørgensen Signed-off-by: Johannes Berg Signed-off-by: Sasha

[PATCH 4.14 003/115] platform/x86: thinkpad_acpi: Disable Bluetooth for some machines

2019-05-15 Thread Greg Kroah-Hartman
From: Jiaxun Yang commit f7db839fccf087664e5587966220821289b6a9cb upstream. Some AMD based ThinkPads have a firmware bug that calling "GBDC" will cause Bluetooth on Intel wireless cards blocked. Probe these models by DMI match and disable Bluetooth subdriver if specified Intel wireless card

[PATCH 4.9 47/51] bonding: fix arp_validate toggling in active-backup mode

2019-05-15 Thread Greg Kroah-Hartman
From: Jarod Wilson [ Upstream commit a9b8a2b39ce65df45687cf9ef648885c2a99fe75 ] There's currently a problem with toggling arp_validate on and off with an active-backup bond. At the moment, you can start up a bond, like so: modprobe bonding mode=1 arp_interval=100 arp_validate=0

[PATCH 4.14 001/115] netfilter: compat: initialize all fields in xt_init

2019-05-15 Thread Greg Kroah-Hartman
commit 8d29d16d21342a0c86405d46de0c4ac5daf1760f upstream If a non zero value happens to be in xt[NFPROTO_BRIDGE].cur at init time, the following panic can be caused by running % ebtables -t broute -F BROUTING from a 32-bit user level on a 64-bit kernel. This patch replaces kmalloc_array with

[PATCH 4.14 004/115] hwmon: (pwm-fan) Disable PWM if fetching cooling data fails

2019-05-15 Thread Greg Kroah-Hartman
From: Stefan Wahren commit 53f1647da3e8fb3e89066798f0fdc045064d353d upstream. In case pwm_fan_of_get_cooling_data() fails we should disable the PWM just like in the other error cases. Fixes: 2e5219c77183 ("hwmon: (pwm-fan) Read PWM FAN configuration from device tree") Cc: # 4.14+

[PATCH 4.14 006/115] USB: serial: fix unthrottle races

2019-05-15 Thread Greg Kroah-Hartman
From: Johan Hovold commit 3f5edd58d040bfa4b74fb89bc02f0bc6b9cd06ab upstream. Fix two long-standing bugs which could potentially lead to memory corruption or leave the port throttled until it is reopened (on weakly ordered systems), respectively, when read-URB completion races with unthrottle().

[PATCH 4.9 49/51] drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl

2019-05-15 Thread Greg Kroah-Hartman
From: Dan Carpenter commit 6a024330650e24556b8a18cc654ad00cfecf6c6c upstream. The "param.count" value is a u64 thatcomes from the user. The code later in the function assumes that param.count is at least one and if it's not then it leads to an Oops when we dereference the ZERO_SIZE_PTR. Also

[PATCH 4.9 48/51] drivers/virt/fsl_hypervisor.c: dereferencing error pointers in ioctl

2019-05-15 Thread Greg Kroah-Hartman
From: Dan Carpenter commit c8ea3663f7a8e6996d44500ee818c9330ac4fd88 upstream. strndup_user() returns error pointers on error, and then in the error handling we pass the error pointers to kfree(). It will cause an Oops. Link: http://lkml.kernel.org/r/20181218082003.GD32567@kadam Fixes:

[PATCH 4.9 33/51] Dont jump to compute_result state from check_result state

2019-05-15 Thread Greg Kroah-Hartman
From: Nigel Croxon commit 4f4fd7c5798bbdd5a03a60f6269cf1177fbd11ef upstream. Changing state from check_state_check_result to check_state_compute_result not only is unsafe but also doesn't appear to serve a valid purpose. A raid6 check should only be pushing out extra writes if doing repair and

[PATCH 4.9 32/51] rtlwifi: rtl8723ae: Fix missing break in switch statement

2019-05-15 Thread Greg Kroah-Hartman
From: Gustavo A. R. Silva commit 84242b82d81c54e009a2aaa74d3d9eff70babf56 upstream. Add missing break statement in order to prevent the code from falling through to case 0x1025, and erroneously setting rtlhal->oem_id to RT_CID_819X_ACER when rtlefuse->eeprom_svid is equal to 0x10EC and none of

[PATCH 4.9 51/51] powerpc/booke64: set RI in default MSR

2019-05-15 Thread Greg Kroah-Hartman
From: Laurentiu Tudor commit 5266e58d6cd90ac85c187d673093ad9cb649e16d upstream. Set RI in the default kernel's MSR so that the architected way of detecting unrecoverable machine check interrupts has a chance to work. This is inline with the MSR setup of the rest of booke powerpc architectures

[PATCH 4.9 29/51] Input: synaptics-rmi4 - fix possible double free

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit bce1a78423961fce676ac65540a31b6ffd179e6d ] The RMI4 function structure has been released in rmi_register_function if error occurs. However, it will be released again in the function rmi_create_function, which may result in a double-free bug. Signed-off-by: Pan Bian

[PATCH 4.9 30/51] cw1200: fix missing unlock on error in cw1200_hw_scan()

2019-05-15 Thread Greg Kroah-Hartman
From: Wei Yongjun commit 51c8d24101c79ffce3e79137e2cee5dfeb956dd7 upstream. Add the missing unlock before return from function cw1200_hw_scan() in the error handling case. Fixes: 4f68ef64cd7f ("cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan()") Signed-off-by: Wei Yongjun

[PATCH 4.9 41/51] fib_rules: return 0 directly if an exactly same rule exists when NLM_F_EXCL not supplied

2019-05-15 Thread Greg Kroah-Hartman
From: Hangbin Liu [ Upstream commit e9919a24d3022f72bcadc407e73a6ef17093a849 ] With commit 153380ec4b9 ("fib_rules: Added NLM_F_EXCL support to fib_nl_newrule") we now able to check if a rule already exists. But this only works with iproute2. For other tools like libnl, NetworkManager, it still

[PATCH 4.9 37/51] x86/vdso: Drop implicit common-page-size linker flag

2019-05-15 Thread Greg Kroah-Hartman
commit ac3e233d29f7f77f28243af0132057d378d3ea58 upstream. GNU linker's -z common-page-size's default value is based on the target architecture. arch/x86/entry/vdso/Makefile sets it to the architecture default, which is implicit and redundant. Drop it. Fixes: 2aae950b21e4 ("x86_64: Add vDSO for

[PATCH 4.9 45/51] vrf: sit mtu should not be updated when vrf netdev is the link

2019-05-15 Thread Greg Kroah-Hartman
From: Stephen Suryaputra [ Upstream commit ff6ab32bd4e073976e4d8797b4d514a172cfe6cb ] VRF netdev mtu isn't typically set and have an mtu of 65536. When the link of a tunnel is set, the tunnel mtu is changed from 1480 to the link mtu minus tunnel header. In the case of VRF netdev is the link,

[PATCH 4.9 28/51] spi: ST ST95HF NFC: declare missing of table

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit d04830531d0c4a99c897a44038e5da3d23331d2f ] Add missing table for SPI driver relying on SPI device match since compatible is in a DT binding or in a DTS. Before this patch: modinfo drivers/nfc/st95hf/st95hf.ko | grep alias alias: spi:st95hf After this patch: modinfo

[PATCH 4.9 38/51] x86/vdso: Pass --eh-frame-hdr to the linker

2019-05-15 Thread Greg Kroah-Hartman
From: Alistair Strachan commit cd01544a268ad8ee5b1dfe42c4393f1095f86879 upstream. Commit 379d98ddf413 ("x86: vdso: Use $LD instead of $CC to link") accidentally broke unwinding from userspace, because ld would strip the .eh_frame sections when linking. Originally, the compiler would

[PATCH 4.9 03/51] bpf: convert htab map to hlist_nulls

2019-05-15 Thread Greg Kroah-Hartman
commit 4fe8435909fddc97b81472026aa954e06dd192a5 upstream. when all map elements are pre-allocated one cpu can delete and reuse htab_elem while another cpu is still walking the hlist. In such case the lookup may miss the element. Convert hlist to hlist_nulls to avoid such scenario. When bucket

[PATCH 4.9 08/51] HID: input: add mapping for Expose/Overview key

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 96dd86871e1fffbc39e4fa61c9c75ec54ee9af0f ] According to HUTRR77 usage 0x29f from the consumer page is reserved for the Desktop application to present all running user’s application windows. Linux defines KEY_SCALE to request Compiz Scale (Expose) mode, so let's add the mapping.

[PATCH 4.9 09/51] HID: input: add mapping for keyboard Brightness Up/Down/Toggle keys

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 7975a1d6a7afeb3eb61c971a153d24dd8fa032f3 ] According to HUTRR73 usages 0x79, 0x7a and 0x7c from the consumer page correspond to Brightness Up/Down/Toggle keys, so let's add the mappings. Signed-off-by: Dmitry Torokhov Signed-off-by: Sasha Levin --- drivers/hid/hid-input.c |

[PATCH 4.9 06/51] iio: adc: xilinx: fix potential use-after-free on remove

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 62039b6aef63380ba7a37c113bbaeee8a55c5342 ] When cancel_delayed_work() returns, the delayed work may still be running. This means that the core could potentially free the private structure (struct xadc) while the delayed work is still using it. This is a potential use-after-free.

[PATCH 4.9 02/51] bpf: fix struct htab_elem layout

2019-05-15 Thread Greg Kroah-Hartman
commit 9f691549f76d488a0c74397b3e51e943865ea01f upstream. when htab_elem is removed from the bucket list the htab_elem.hash_node.next field should not be overridden too early otherwise we have a tiny race window between lookup and delete. The bug was discovered by manual code analysis and

[PATCH 4.9 20/51] selftests: netfilter: check icmp pkttoobig errors are set as related

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit becf2319f320cae43e20cf179cc51a355a0deb5f ] When an icmp error such as pkttoobig is received, conntrack checks if the "inner" header (header of packet that did not fit link mtu) is matches an existing connection, and, if so, sets that packet as being related to the conntrack

[PATCH 4.9 25/51] selftests/net: correct the return value for run_netsocktests

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 30c04d796b693e22405c38e9b78e9a364e4c77e6 ] The run_netsocktests will be marked as passed regardless the actual test result from the ./socket: selftests: net: run_netsocktests running socket test

[PATCH 4.9 18/51] tools lib traceevent: Fix missing equality check for strcmp

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit f32c2877bcb068a718bb70094cd59ccc29d4d082 ] There was a missing comparison with 0 when checking if type is "s64" or "u64". Therefore, the body of the if-statement was entered if "type" was "u64" or not "s64", which made the first strcmp() redundant since if type is "u64", it's

[PATCH 4.9 24/51] drm/sun4i: Set device driver data at bind time for use in unbind

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 02b92adbe33e6dbd15dc6e32540b22f47c4ff0a2 ] Our sun4i_drv_unbind gets the drm device using dev_get_drvdata. However, that driver data is never set in sun4i_drv_bind. Set it there to avoid getting a NULL pointer at unbind time. Fixes: 9026e0d122ac ("drm: Add Allwinner A10

[PATCH 4.9 21/51] ipvs: do not schedule icmp errors from tunnels

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 0261ea1bd1eb0da5c0792a9119b8655cf33c80a3 ] We can receive ICMP errors from client or from tunneling real server. While the former can be scheduled to real server, the latter should not be scheduled, they are decapsulated only when existing connection is found. Fixes:

[PATCH 4.9 23/51] s390: ctcm: fix ctcm_new_device error return code

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 27b141fc234a3670d21bd742c35d7205d03cbb3a ] clang points out that the return code from this function is undefined for one of the error paths: ../drivers/s390/net/ctcm_main.c:1595:7: warning: variable 'result' is used uninitialized whenever 'if' condition is true

[PATCH 4.9 13/51] mac80211: fix unaligned access in mesh table hash function

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 40586e3fc400c00c11151804dcdc93f8c831c808 ] The pointer to the last four bytes of the address is not guaranteed to be aligned, so we need to use __get_unaligned_cpu32 here Signed-off-by: Felix Fietkau Signed-off-by: Johannes Berg Signed-off-by: Sasha Levin ---

[PATCH 4.9 11/51] libnvdimm/btt: Fix a kmemdup failure check

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 486fa92df4707b5df58d6508728bdb9321a59766 ] In case kmemdup fails, the fix releases resources and returns to avoid the NULL pointer dereference. Signed-off-by: Aditya Pakki Signed-off-by: Dan Williams Signed-off-by: Sasha Levin --- drivers/nvdimm/btt_devs.c | 18

[PATCH 4.9 15/51] mISDN: Check address length before reading address family

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 238ffdc49ef98b15819cfd5e3fb23194e3ea3d39 ] KMSAN will complain if valid address length passed to bind() is shorter than sizeof("struct sockaddr_mISDN"->family) bytes. Signed-off-by: Tetsuo Handa Signed-off-by: David S. Miller Signed-off-by: Sasha Levin ---

[PATCH 4.9 10/51] HID: input: add mapping for "Toggle Display" key

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit c01908a14bf735b871170092807c618bb9dae654 ] According to HUT 1.12 usage 0xb5 from the generic desktop page is reserved for switching between external and internal display, so let's add the mapping. Signed-off-by: Dmitry Torokhov Signed-off-by: Sasha Levin ---

[PATCH 4.4 254/266] USB: serial: use variable for status

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 3161da970d38cd6ed2ba8cadec93874d1d06e11e ] This patch turns status in a variable read once from the URB. The long term plan is to deliver status to the callback. In addition it makes the code a bit more elegant. Signed-off-by: Oliver Neukum Signed-off-by: Johan Hovold

[PATCH 4.4 256/266] powerpc/64s: Include cpu header

2019-05-15 Thread Greg Kroah-Hartman
From: Breno Leitao commit 42e2acde1237878462b028f5a27d9cc5bea7502c upstream. Current powerpc security.c file is defining functions, as cpu_show_meltdown(), cpu_show_spectre_v{1,2} and others, that are being declared at linux/cpu.h header without including the header file that contains these

[PATCH 4.4 264/266] drivers/virt/fsl_hypervisor.c: dereferencing error pointers in ioctl

2019-05-15 Thread Greg Kroah-Hartman
From: Dan Carpenter commit c8ea3663f7a8e6996d44500ee818c9330ac4fd88 upstream. strndup_user() returns error pointers on error, and then in the error handling we pass the error pointers to kfree(). It will cause an Oops. Link: http://lkml.kernel.org/r/20181218082003.GD32567@kadam Fixes:

[PATCH 4.4 266/266] powerpc/booke64: set RI in default MSR

2019-05-15 Thread Greg Kroah-Hartman
From: Laurentiu Tudor commit 5266e58d6cd90ac85c187d673093ad9cb649e16d upstream. Set RI in the default kernel's MSR so that the architected way of detecting unrecoverable machine check interrupts has a chance to work. This is inline with the MSR setup of the rest of booke powerpc architectures

Re: [PATCH 3/3] regulator: lp87565: Add 4-phase lp87561 regulator support

2019-05-15 Thread Keerthy
On 15/05/19 4:38 PM, Mark Brown wrote: On Wed, May 15, 2019 at 03:38:48PM +0530, Keerthy wrote: @@ -172,6 +178,9 @@ static int lp87565_regulator_probe(struct platform_device *pdev) if (lp87565->dev_type == LP87565_DEVICE_TYPE_LP87565_Q1) { min_idx = LP87565_BUCK_10;

[PATCH 4.4 263/266] bonding: fix arp_validate toggling in active-backup mode

2019-05-15 Thread Greg Kroah-Hartman
From: Jarod Wilson [ Upstream commit a9b8a2b39ce65df45687cf9ef648885c2a99fe75 ] There's currently a problem with toggling arp_validate on and off with an active-backup bond. At the moment, you can start up a bond, like so: modprobe bonding mode=1 arp_interval=100 arp_validate=0

[PATCH 4.4 214/266] x86/speculation: Unify conditional spectre v2 print functions

2019-05-15 Thread Greg Kroah-Hartman
From: Thomas Gleixner commit 495d470e9828500e0155027f230449ac5e29c025 upstream. There is no point in having two functions and a conditional at the call site. Signed-off-by: Thomas Gleixner Reviewed-by: Ingo Molnar Cc: Peter Zijlstra Cc: Andy Lutomirski Cc: Linus Torvalds Cc: Jiri Kosina

[PATCH 4.4 250/266] x86/mds: Add MDSUM variant to the MDS documentation

2019-05-15 Thread Greg Kroah-Hartman
From: speck for Pawan Gupta commit e672f8bf71c66253197e503f75c771dd28ada4a0 upstream. Updated the documentation for a new CVE-2019-11091 Microarchitectural Data Sampling Uncacheable Memory (MDSUM) which is a variant of Microarchitectural Data Sampling (MDS). MDS is a family of side channel

[PATCH 4.4 260/266] vlan: disable SIOCSHWTSTAMP in container

2019-05-15 Thread Greg Kroah-Hartman
From: Hangbin Liu [ Upstream commit 873017af778439f2f8e3d87f28ddb1fcaf244a76 ] With NET_ADMIN enabled in container, a normal user could be mapped to root and is able to change the real device's rx filter via ioctl on vlan, which would affect the other ptp process on host. Fix it by disabling

[PATCH 4.4 262/266] ipv4: Fix raw socket lookup for local traffic

2019-05-15 Thread Greg Kroah-Hartman
From: David Ahern [ Upstream commit 19e4e768064a87b073a4b4c138b55db70e0cfb9f ] inet_iif should be used for the raw socket lookup. inet_iif considers rt_iif which handles the case of local traffic. As it stands, ping to a local address with the '-I ' option fails ever since ping was changed to

[PATCH 4.4 248/266] x86/speculation: Support mitigations= cmdline option

2019-05-15 Thread Greg Kroah-Hartman
From: Josh Poimboeuf commit d68be4c4d31295ff6ae34a8ddfaa4c1a8ff42812 upstream. Configure x86 runtime CPU speculation bug mitigations in accordance with the 'mitigations=' cmdline option. This affects Meltdown, Spectre v2, Speculative Store Bypass, and L1TF. The default behavior is unchanged.

[PATCH 4.4 244/266] x86/speculation/mds: Add SMT warning message

2019-05-15 Thread Greg Kroah-Hartman
From: Josh Poimboeuf commit 39226ef02bfb43248b7db12a4fdccb39d95318e3 upstream. MDS is vulnerable with SMT. Make that clear with a one-time printk whenever SMT first gets enabled. Signed-off-by: Josh Poimboeuf Signed-off-by: Thomas Gleixner Reviewed-by: Tyler Hicks Acked-by: Jiri Kosina

[PATCH 4.4 240/266] Documentation: Move L1TF to separate directory

2019-05-15 Thread Greg Kroah-Hartman
From: Thomas Gleixner commit 65fd4cb65b2dad97feb8330b6690445910b56d6a upstream. Move L!TF to a separate directory so the MDS stuff can be added at the side. Otherwise the all hardware vulnerabilites have their own top level entry. Should have done that right away. Signed-off-by: Thomas

[PATCH 4.4 211/266] x86/speculation: Reorder the spec_v2 code

2019-05-15 Thread Greg Kroah-Hartman
From: Thomas Gleixner commit 15d6b7aab0793b2de8a05d8a828777dd24db424e upstream. Reorder the code so it is better grouped. No functional change. Signed-off-by: Thomas Gleixner Reviewed-by: Ingo Molnar Cc: Peter Zijlstra Cc: Andy Lutomirski Cc: Linus Torvalds Cc: Jiri Kosina Cc: Tom

[PATCH 4.4 243/266] x86/speculation: Move arch_smt_update() call to after mitigation decisions

2019-05-15 Thread Greg Kroah-Hartman
From: Josh Poimboeuf commit 7c3658b20194a5b3209a143f63bc9c643c6a3ae2 upstream. arch_smt_update() now has a dependency on both Spectre v2 and MDS mitigations. Move its initial call to after all the mitigation decisions have been made. Signed-off-by: Josh Poimboeuf Signed-off-by: Thomas

[PATCH 4.4 213/266] x86/speculataion: Mark command line parser data __initdata

2019-05-15 Thread Greg Kroah-Hartman
From: Thomas Gleixner commit 30ba72a990f5096ae08f284de17986461efcc408 upstream. No point to keep that around. Signed-off-by: Thomas Gleixner Reviewed-by: Ingo Molnar Cc: Peter Zijlstra Cc: Andy Lutomirski Cc: Linus Torvalds Cc: Jiri Kosina Cc: Tom Lendacky Cc: Josh Poimboeuf Cc: Andrea

[PATCH 4.4 225/266] x86/speculation: Add seccomp Spectre v2 user space protection mode

2019-05-15 Thread Greg Kroah-Hartman
From: Thomas Gleixner commit 6b3e64c237c072797a9ec918654a60e3a46488e2 upstream. If 'prctl' mode of user space protection from spectre v2 is selected on the kernel command-line, STIBP and IBPB are applied on tasks which restrict their indirect branch speculation via prctl. SECCOMP enables the

<    7   8   9   10   11   12   13   14   15   16   >