[PATCH 4.4 134/266] ARM: iop: dont use using 64-bit DMA masks

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 2125801ccce19249708ca3245d48998e70569ab8 ] clang warns about statically defined DMA masks from the DMA_BIT_MASK macro with length 64: arch/arm/mach-iop13xx/setup.c:303:35: error: shift count >= width of type [-Werror,-Wshift-count-overflow] static u64 iop13xx_adma_dmamask =

[PATCH 4.4 138/266] staging: iio: adt7316: fix the dac write calculation

2019-05-15 Thread Greg Kroah-Hartman
From: Jeremy Fertic commit 78accaea117c1ae878774974fab91ac4a0b0e2b0 upstream. The lsb calculation is not masking the correct bits from the user input. Subtract 1 from (1 << offset) to correctly set up the mask to be applied to user input. The lsb register stores its value starting at the bit 7

[PATCH 4.4 141/266] x86/mce: Improve error message when kernel cannot recover, p2

2019-05-15 Thread Greg Kroah-Hartman
From: Tony Luck commit 41f035a86b5b72a4f947c38e94239d20d595352a upstream. In c7d606f560e4 ("x86/mce: Improve error message when kernel cannot recover") a case was added for a machine check caused by a DATA access to poison memory from the kernel. A case should have been added also for an

Re: [PATCH v4 2/3] PM / EM: Expose perf domain struct

2019-05-15 Thread Daniel Lezcano
On 15/05/2019 13:01, Quentin Perret wrote: > On Wednesday 15 May 2019 at 12:51:57 (+0200), Daniel Lezcano wrote: >> On 15/05/2019 12:46, Quentin Perret wrote: >>> On Wednesday 15 May 2019 at 11:40:44 (+0100), Quentin Perret wrote: >> >> [ ... ] >> +#ifdef CONFIG_THERMAL_GOV_POWER_ALLOCATOR

[PATCH 4.4 142/266] media: v4l2: i2c: ov7670: Fix PLL bypass register values

2019-05-15 Thread Greg Kroah-Hartman
From: Jacopo Mondi commit 61da76beef1e4f0b6ba7be4f8d0cf0dac7ce1f55 upstream. The following commits: commit f6dd927f34d6 ("[media] media: ov7670: calculate framerate properly for ov7675") commit 04ee6d92047e ("[media] media: ov7670: add possibility to bypass pll for ov7675") introduced the

Re: [PATCH v3 2/4] mtd: rawnand: Add Macronix MX25F0A NAND controller

2019-05-15 Thread Miquel Raynal
Hi masonccy...@mxic.com.tw, masonccy...@mxic.com.tw wrote on Wed, 15 May 2019 16:48:46 +0800: > Hi Miquel, > > > > +// SPDX-License-Identifier: GPL-2.0 > > > +// > > > +// Copyright (C) 2019 Macronix International Co., Ltd. > > > +// > > > +// Authors: > > > +// Mason Yang > > > +//

[PATCH 4.4 146/266] ASoC: tlv320aic32x4: Fix Common Pins

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit c63adb28f6d913310430f14c69f0a2ea55eed0cc ] The common pins were mistakenly not added to the DAPM graph. Adding these pins will allow valid graphs to be created. Signed-off-by: Annaliese McDermond Signed-off-by: Mark Brown Signed-off-by: Sasha Levin ---

[PATCH 4.4 145/266] ASoC: cs4270: Set auto-increment bit for register writes

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit f0f2338a9cfaf71db895fa989ea7234e8a9b471d ] The CS4270 does not by default increment the register address on consecutive writes. During normal operation it doesn't matter as all register accesses are done individually. At resume time after suspend, however, the regcache code

[PATCH 4.4 153/266] Bluetooth: hidp: fix buffer overflow

2019-05-15 Thread Greg Kroah-Hartman
From: Young Xiao commit a1616a5ac99ede5d605047a9012481ce7ff18b16 upstream. Struct ca is copied from userspace. It is not checked whether the "name" field is NULL terminated, which allows local users to obtain potentially sensitive information from kernel stack memory, via a HIDPCONNADD command.

[PATCH 4.4 117/266] USB: w1 ds2490: Fix bug caused by improper use of altsetting array

2019-05-15 Thread Greg Kroah-Hartman
From: Alan Stern commit c114944d7d67f24e71562fcfc18d550ab787e4d4 upstream. The syzkaller USB fuzzer spotted a slab-out-of-bounds bug in the ds2490 driver. This bug is caused by improper use of the altsetting array in the usb_interface structure (the array's entries are not always stored in

[PATCH 4.4 157/266] ASoC: Intel: avoid Oops if DMA setup fails

2019-05-15 Thread Greg Kroah-Hartman
From: Ross Zwisler commit 0efa3334d65b7f421ba12382dfa58f6ff5bf83c4 upstream. Currently in sst_dsp_new() if we get an error return from sst_dma_new() we just print an error message and then still complete the function successfully. This means that we are trying to run without sst->dma properly

[PATCH 4.4 152/266] scsi: qla2xxx: Fix incorrect region-size setting in optrom SYSFS routines

2019-05-15 Thread Greg Kroah-Hartman
From: Andrew Vasquez commit 5cbdae10bf11f96e30b4d14de7b08c8b490e903c upstream. Commit e6f77540c067 ("scsi: qla2xxx: Fix an integer overflow in sysfs code") incorrectly set 'optrom_region_size' to 'start+size', which can overflow option-rom boundaries when 'start' is non-zero. Continue setting

[PATCH 4.4 148/266] scsi: csiostor: fix missing data copy in csio_scsi_err_handler()

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 5c2442fd78998af60e13aba506d103f7f43f8701 ] If scsi cmd sglist is not suitable for DDP then csiostor driver uses preallocated buffers for DDP, because of this data copy is required from DDP buffer to scsi cmd sglist before calling ->scsi_done(). Signed-off-by: Varun Prakash

[PATCH 4.4 154/266] Bluetooth: Align minimum encryption key size for LE and BR/EDR connections

2019-05-15 Thread Greg Kroah-Hartman
From: Marcel Holtmann commit d5bb334a8e171b262e48f378bd2096c0ea458265 upstream. The minimum encryption key size for LE connections is 56 bits and to align LE with BR/EDR, enforce 56 bits of minimum encryption key size for BR/EDR connections as well. Signed-off-by: Marcel Holtmann

[PATCH 4.4 122/266] igb: Fix WARN_ONCE on runtime suspend

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit dabb8338be533c18f50255cf39ff4f66d4dabdbe ] The runtime_suspend device callbacks are not supposed to save configuration state or change the power state. Commit fb29f76cc566 ("igb: Fix an issue that PME is not enabled during runtime suspend") changed the driver to not save

[PATCH 4.4 161/266] platform/x86: sony-laptop: Fix unintentional fall-through

2019-05-15 Thread Greg Kroah-Hartman
From: Gustavo A. R. Silva commit 1cbd7a64959d33e7a2a1fa2bf36a62b350a9fcbd upstream. It seems that the default case should return AE_CTRL_TERMINATE, instead of falling through to case ACPI_RESOURCE_TYPE_END_TAG and returning AE_OK; otherwise the line of code at the end of the function is

[PATCH 4.4 158/266] timer/debug: Change /proc/timer_stats from 0644 to 0600

2019-05-15 Thread Greg Kroah-Hartman
From: Ben Hutchings The timer_stats facility should filter and translate PIDs if opened from a non-initial PID namespace, to avoid leaking information about the wider system. It should also not show kernel virtual addresses. Unfortunately it has now been removed upstream (as redundant) instead

Re: [PATCH 3/3] regulator: lp87565: Add 4-phase lp87561 regulator support

2019-05-15 Thread Mark Brown
On Wed, May 15, 2019 at 03:38:48PM +0530, Keerthy wrote: > @@ -172,6 +178,9 @@ static int lp87565_regulator_probe(struct platform_device > *pdev) > if (lp87565->dev_type == LP87565_DEVICE_TYPE_LP87565_Q1) { > min_idx = LP87565_BUCK_10; > max_idx =

[PATCH 4.4 184/266] x86/cpufeatures: Hide AMD-specific speculation flags

2019-05-15 Thread Greg Kroah-Hartman
From: Ben Hutchings Hide the AMD_{IBRS,IBPB,STIBP} flag from /proc/cpuinfo. This was done upstream as part of commit e7c587da1252 "x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP". That commit has already been backported but this part was omitted. Signed-off-by: Ben Hutchings

[PATCH 4.4 186/266] x86/speculation: Simplify the CPU bug detection logic

2019-05-15 Thread Greg Kroah-Hartman
From: Dominik Brodowski commit 8ecc4979b1bd9c94168e6fc92960033b7a951336 upstream. Only CPUs which speculate can speculate. Therefore, it seems prudent to test for cpu_no_speculation first and only then determine whether a specific speculating CPU is susceptible to store bypass speculation. This

[PATCH 4.4 170/266] init: initialize jump labels before command line option parsing

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 6041186a32585fc7a1d0f6cfe2f138b05fdc3c82 ] When a module option, or core kernel argument, toggles a static-key it requires jump labels to be initialized early. While x86, PowerPC, and ARM64 arrange for jump_label_init() to be called before parse_args(), ARM does not. Kernel

[PATCH 4.4 178/266] locking/static_keys: Provide DECLARE and well as DEFINE macros

2019-05-15 Thread Greg Kroah-Hartman
From: Tony Luck commit b8fb03785d4de097507d0cf45873525e0ac4d2b2 upstream. We will need to provide declarations of static keys in header files. Provide DECLARE_STATIC_KEY_{TRUE,FALSE} macros. Signed-off-by: Tony Luck Acked-by: Borislav Petkov Cc: Peter Zijlstra Cc: Dan Williams Cc: Linus

[PATCH 4.4 179/266] x86/microcode/intel: Add a helper which gives the microcode revision

2019-05-15 Thread Greg Kroah-Hartman
From: Borislav Petkov commit 4167709bbf826512a52ebd6aafda2be104adaec9 upstream. Since on Intel we're required to do CPUID(1) first, before reading the microcode revision MSR, let's add a special helper which does the required steps so that we don't forget to do them next time, when we want to

[PATCH 4.4 174/266] gpu: ipu-v3: dp: fix CSC handling

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit d4fad0a426c6e26f48c9a7cdd21a7fe9c198d645 ] Initialize the flow input colorspaces to unknown and reset to that value when the channel gets disabled. This avoids the state getting mixed up with a previous mode. Also keep the CSC settings for the background flow intact when

[PATCH 4.4 173/266] selftests/net: correct the return value for run_netsocktests

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 30c04d796b693e22405c38e9b78e9a364e4c77e6 ] The run_netsocktests will be marked as passed regardless the actual test result from the ./socket: selftests: net: run_netsocktests running socket test

[PATCH 4.4 175/266] cw1200: fix missing unlock on error in cw1200_hw_scan()

2019-05-15 Thread Greg Kroah-Hartman
From: Wei Yongjun commit 51c8d24101c79ffce3e79137e2cee5dfeb956dd7 upstream. Add the missing unlock before return from function cw1200_hw_scan() in the error handling case. Fixes: 4f68ef64cd7f ("cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan()") Signed-off-by: Wei Yongjun

[PATCH 4.4 193/266] x86/microcode: Make sure boot_cpu_data.microcode is up-to-date

2019-05-15 Thread Greg Kroah-Hartman
From: Prarit Bhargava commit 370a132bb2227ff76278f98370e0e701d86ff752 upstream. When preparing an MCE record for logging, boot_cpu_data.microcode is used to read out the microcode revision on the box. However, on systems where late microcode update has happened, the microcode revision output

[PATCH 4.4 197/266] x86/mm: Use WRITE_ONCE() when setting PTEs

2019-05-15 Thread Greg Kroah-Hartman
From: Nadav Amit commit 9bc4f28af75a91aea0ae383f50b0a430c4509303 upstream. When page-table entries are set, the compiler might optimize their assignment by using multiple instructions to set the PTE. This might turn into a security hazard if the user somehow manages to use the interim PTE. L1TF

[PATCH 4.4 199/266] x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation

2019-05-15 Thread Greg Kroah-Hartman
From: Jiri Kosina commit 53c613fe6349994f023245519265999eed75957f upstream. STIBP is a feature provided by certain Intel ucodes / CPUs. This feature (once enabled) prevents cross-hyperthread control of decisions made by indirect branch predictors. Enable this feature if - the CPU is

[PATCH 4.4 195/266] x86/cpu: Sanitize FAM6_ATOM naming

2019-05-15 Thread Greg Kroah-Hartman
From: Peter Zijlstra commit f2c4db1bd80720cd8cb2a5aa220d9bc9f374f04e upstream. Going primarily by: https://en.wikipedia.org/wiki/List_of_Intel_Atom_microprocessors with additional information gleaned from other related pages; notably: - Bonnell shrink was called Saltwell - Moorefield is

[PATCH 4.4 190/266] locking/atomics, asm-generic: Move some macros from to a new file

2019-05-15 Thread Greg Kroah-Hartman
From: Will Deacon commit 8bd9cb51daac89337295b6f037b0486911e1b408 upstream. In preparation for implementing the asm-generic atomic bitops in terms of atomic_long_*(), we need to prevent implementations from pulling in . A common reason for this include is for the BITS_PER_BYTE definition, so

[PATCH 4.4 196/266] KVM: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts disabled

2019-05-15 Thread Greg Kroah-Hartman
From: Thomas Gleixner commit 024d83cadc6b2af027e473720f3c3da97496c318 upstream. Mikhail reported the following lockdep splat: WARNING: possible irq lock inversion dependency detected CPU 0/KVM/10284 just changed the state of lock: 0d538a88 (>lock){+...}, at:

[PATCH 4.4 191/266] x86/bugs: Fix the AMD SSBD usage of the SPEC_CTRL MSR

2019-05-15 Thread Greg Kroah-Hartman
From: Tom Lendacky commit 612bc3b3d4be749f73a513a17d9b3ee1330d3487 upstream. On AMD, the presence of the MSR_SPEC_CTRL feature does not imply that the SSBD mitigation support should use the SPEC_CTRL MSR. Other features could have caused the MSR_SPEC_CTRL feature to be set, while a different

[PATCH 4.4 188/266] x86/bugs: Add AMDs SPEC_CTRL MSR usage

2019-05-15 Thread Greg Kroah-Hartman
From: Konrad Rzeszutek Wilk commit 6ac2f49edb1ef5446089c7c660017732886d62d6 upstream. The AMD document outlining the SSBD handling 124441_AMD64_SpeculativeStoreBypassDisable_Whitepaper_final.pdf mentions that if CPUID 8000_0008.EBX[24] is set we should be using the SPEC_CTRL MSR (0x48) over the

[PATCH 4.4 220/266] x86/speculation: Split out TIF update

2019-05-15 Thread Greg Kroah-Hartman
From: Thomas Gleixner commit e6da8bb6f9abb2628381904b24163c770e630bac upstream. The update of the TIF_SSBD flag and the conditional speculation control MSR update is done in the ssb_prctl_set() function directly. The upcoming prctl support for controlling indirect branch speculation via STIBP

[PATCH 4.4 217/266] x86/process: Consolidate and simplify switch_to_xtra() code

2019-05-15 Thread Greg Kroah-Hartman
From: Thomas Gleixner commit ff16701a29cba3aafa0bd1656d766813b2d0a811 upstream. Move the conditional invocation of __switch_to_xtra() into an inline function so the logic can be shared between 32 and 64 bit. Remove the handthrough of the TSS pointer and retrieve the pointer directly in the

[PATCH 4.4 169/266] tools lib traceevent: Fix missing equality check for strcmp

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit f32c2877bcb068a718bb70094cd59ccc29d4d082 ] There was a missing comparison with 0 when checking if type is "s64" or "u64". Therefore, the body of the if-statement was entered if "type" was "u64" or not "s64", which made the first strcmp() redundant since if type is "u64", it's

[PATCH 4.4 165/266] libnvdimm/btt: Fix a kmemdup failure check

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 486fa92df4707b5df58d6508728bdb9321a59766 ] In case kmemdup fails, the fix releases resources and returns to avoid the NULL pointer dereference. Signed-off-by: Aditya Pakki Signed-off-by: Dan Williams Signed-off-by: Sasha Levin --- drivers/nvdimm/btt_devs.c | 18

[PATCH 4.4 215/266] x86/speculation: Add command line control for indirect branch speculation

2019-05-15 Thread Greg Kroah-Hartman
From: Thomas Gleixner commit fa1202ef224391b6f5b26cdd44cc50495e8fab54 upstream. Add command line control for user space indirect branch speculation mitigations. The new option is: spectre_v2_user= The initial options are: - on: Unconditionally enabled - off: Unconditionally

[PATCH 4.4 219/266] x86/speculation: Prepare for conditional IBPB in switch_mm()

2019-05-15 Thread Greg Kroah-Hartman
From: Thomas Gleixner commit 4c71a2b6fd7e42814aa68a6dec88abf3b42ea573 upstream. The IBPB speculation barrier is issued from switch_mm() when the kernel switches to a user space task with a different mm than the user space task which ran last on the same CPU. An additional optimization is to

RE: [PATCH V2 1/2] soc: imx: Add SCU SoC info driver support

2019-05-15 Thread Anson Huang
Hi, Leonard > -Original Message- > From: Leonard Crestez > Sent: Wednesday, May 15, 2019 6:05 PM > To: Anson Huang > Cc: catalin.mari...@arm.com; will.dea...@arm.com; > shawn...@kernel.org; s.ha...@pengutronix.de; ker...@pengutronix.de; > feste...@gmail.com; agr...@kernel.org;

[PATCH 4.4 216/266] x86/speculation: Prepare for per task indirect branch speculation control

2019-05-15 Thread Greg Kroah-Hartman
From: Tim Chen commit 5bfbe3ad5840d941b89bcac54b821ba14f50a0ba upstream. To avoid the overhead of STIBP always on, it's necessary to allow per task control of STIBP. Add a new task flag TIF_SPEC_IB and evaluate it during context switch if SMT is active and flag evaluation is enabled by the

[PATCH 4.4 206/266] x86/speculation: Rename SSBD update functions

2019-05-15 Thread Greg Kroah-Hartman
From: Thomas Gleixner commit 26c4d75b234040c11728a8acb796b3a85ba7507c upstream. During context switch, the SSBD bit in SPEC_CTRL MSR is updated according to changes of the TIF_SSBD flag in the current and next running task. Currently, only the bit controlling speculative store bypass disable

Re: [PATCH 2/3] au1200fb: fix DMA API abuse

2019-05-15 Thread Manuel Lauss
Servus Christoph, On Thu, May 9, 2019 at 7:39 PM Christoph Hellwig wrote: > Virtual addresses return from dma(m)_alloc_attrs are opaque in what > backs then, and drivers must not poke into them. Similarly caching > modes are not supposed to be directly set by the driver. Switch the > driver to

[PATCH 4.4 203/266] x86/speculation: Remove unnecessary ret variable in cpu_show_common()

2019-05-15 Thread Greg Kroah-Hartman
From: Tim Chen commit b86bda0426853bfe8a3506c7d2a5b332760ae46b upstream. Signed-off-by: Tim Chen Signed-off-by: Thomas Gleixner Reviewed-by: Ingo Molnar Cc: Peter Zijlstra Cc: Andy Lutomirski Cc: Linus Torvalds Cc: Jiri Kosina Cc: Tom Lendacky Cc: Josh Poimboeuf Cc: Andrea Arcangeli

[PATCH 4.4 223/266] x86/speculation: Add prctl() control for indirect branch speculation

2019-05-15 Thread Greg Kroah-Hartman
From: Thomas Gleixner commit 9137bb27e60e554dab694eafa4cca241fa3a694f upstream. Add the PR_SPEC_INDIRECT_BRANCH option for the PR_GET_SPECULATION_CTRL and PR_SET_SPECULATION_CTRL prctls to allow fine grained per task control of indirect branch speculation via STIBP and IBPB. Invocations:

[PATCH 4.4 245/266] x86/speculation/mds: Fix comment

2019-05-15 Thread Greg Kroah-Hartman
From: Boris Ostrovsky commit cae5ec342645746d617dd420d206e1588d47768a upstream. s/L1TF/MDS/ Signed-off-by: Boris Ostrovsky Signed-off-by: Konrad Rzeszutek Wilk Signed-off-by: Thomas Gleixner Reviewed-by: Tyler Hicks Reviewed-by: Josh Poimboeuf [bwh: Backported to 4.4: adjust context]

[PATCH 4.4 227/266] kvm: x86: Report STIBP on GET_SUPPORTED_CPUID

2019-05-15 Thread Greg Kroah-Hartman
From: Eduardo Habkost commit d7b09c827a6cf291f66637a36f46928dd1423184 upstream. Months ago, we have added code to allow direct access to MSR_IA32_SPEC_CTRL to the guest, which makes STIBP available to guests. This was implemented by commits d28b387fb74d ("KVM/VMX: Allow direct access to

[PATCH 4.4 228/266] x86/msr-index: Cleanup bit defines

2019-05-15 Thread Greg Kroah-Hartman
From: Thomas Gleixner commit d8eabc37310a92df40d07c5a8afc53cebf996716 upstream. Greg pointed out that speculation related bit defines are using (1 << N) format instead of BIT(N). Aside of that (1 << N) is wrong as it should use 1UL at least. Clean it up. [ Josh Poimboeuf: Fix tools build ]

[PATCH 4.4 239/266] x86/speculation/mds: Add mitigation mode VMWERV

2019-05-15 Thread Greg Kroah-Hartman
From: Thomas Gleixner commit 22dd8365088b6403630b82423cf906491859b65e upstream. In virtualized environments it can happen that the host has the microcode update which utilizes the VERW instruction to clear CPU buffers, but the hypervisor is not yet updated to expose the X86_FEATURE_MD_CLEAR

[PATCH 4.4 241/266] Documentation: Add MDS vulnerability documentation

2019-05-15 Thread Greg Kroah-Hartman
From: Thomas Gleixner commit 5999bbe7a6ea3c62029532ec84dc06003a1fa258 upstream. Add the initial MDS vulnerability documentation. Signed-off-by: Thomas Gleixner Reviewed-by: Jon Masters [bwh: Backported to 4.4: - Drop the index updates - Adjust filename] Signed-off-by: Ben Hutchings

Re: [PATCH 03/18] dt-bindings: soc: qcom: add IPA bindings

2019-05-15 Thread Alex Elder
On 5/15/19 2:03 AM, Arnd Bergmann wrote: > On Sun, May 12, 2019 at 3:25 AM Alex Elder wrote: >> >> Add the binding definitions for the "qcom,ipa" device tree node. >> >> Signed-off-by: Alex Elder >> --- >> .../devicetree/bindings/net/qcom,ipa.txt | 164 ++ >> 1 file

[PATCH 4.4 209/266] sched: Add sched_smt_active()

2019-05-15 Thread Greg Kroah-Hartman
From: Ben Hutchings Add the sched_smt_active() function needed for some x86 speculation mitigations. This was introduced upstream by commits 1b568f0aabf2 "sched/core: Optimize SCHED_SMT", ba2591a5993e "sched/smt: Update sched_smt_present at runtime", c5511d03ec09 "sched/smt: Make

[PATCH 4.4 238/266] x86/speculation/mds: Add sysfs reporting for MDS

2019-05-15 Thread Greg Kroah-Hartman
From: Thomas Gleixner commit 8a4b06d391b0a42a373808979b5028f5c84d9c6a upstream. Add the sysfs reporting file for MDS. It exposes the vulnerability and mitigation state similar to the existing files for the other speculative hardware vulnerabilities. Signed-off-by: Thomas Gleixner Reviewed-by:

[PATCH 4.4 230/266] x86/speculation/mds: Add basic bug infrastructure for MDS

2019-05-15 Thread Greg Kroah-Hartman
From: Andi Kleen commit ed5194c2732c8084af9fd159c146ea92bf137128 upstream. Microarchitectural Data Sampling (MDS), is a class of side channel attacks on internal buffers in Intel CPUs. The variants are: - Microarchitectural Store Buffer Data Sampling (MSBDS) (CVE-2018-12126) -

[PATCH 4.4 242/266] x86/cpu/bugs: Use __initconst for const init data

2019-05-15 Thread Greg Kroah-Hartman
From: Andi Kleen commit 1de7edbb59c8f1b46071f66c5c97b8a59569eb51 upstream. Some of the recently added const tables use __initdata which causes section attribute conflicts. Use __initconst instead. Fixes: fa1202ef2243 ("x86/speculation: Add command line control") Signed-off-by: Andi Kleen

[PATCH 4.4 224/266] x86/speculation: Enable prctl mode for spectre_v2_user

2019-05-15 Thread Greg Kroah-Hartman
From: Thomas Gleixner commit 7cc765a67d8e04ef7d772425ca5a2a1e2b894c15 upstream. Now that all prerequisites are in place: - Add the prctl command line option - Default the 'auto' mode to 'prctl' - When SMT state changes, update the static key which controls the conditional STIBP

[PATCH 4.4 233/266] x86/speculation/mds: Add mds_clear_cpu_buffers()

2019-05-15 Thread Greg Kroah-Hartman
From: Thomas Gleixner commit 6a9e529272517755904b7afa639f6db59ddb793e upstream. The Microarchitectural Data Sampling (MDS) vulernabilities are mitigated by clearing the affected CPU buffers. The mechanism for clearing the buffers uses the unused and obsolete VERW instruction in combination with

[PATCH 4.4 235/266] x86/speculation/mds: Conditionally clear CPU buffers on idle entry

2019-05-15 Thread Greg Kroah-Hartman
From: Thomas Gleixner commit 07f07f55a29cb705e221eda7894dd67ab81ef343 upstream. Add a static key which controls the invocation of the CPU buffer clear mechanism on idle entry. This is independent of other MDS mitigations because the idle entry invocation to mitigate the potential leakage due to

[PATCH 4.4 247/266] cpu/speculation: Add mitigations= cmdline option

2019-05-15 Thread Greg Kroah-Hartman
From: Josh Poimboeuf commit 98af8452945c55652de68536afdde3b520fec429 upstream. Keeping track of the number of mitigations for all the CPU speculation bugs has become overwhelming for many users. It's getting more and more complicated to decide which mitigations are needed for a given

[PATCH 4.4 210/266] x86/speculation: Rework SMT state change

2019-05-15 Thread Greg Kroah-Hartman
From: Thomas Gleixner commit a74cfffb03b73d41e08f84c2e5c87dec0ce3db9f upstream. arch_smt_update() is only called when the sysfs SMT control knob is changed. This means that when SMT is enabled in the sysfs control knob the system is considered to have SMT active even if all siblings are

[PATCH 4.4 246/266] x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off

2019-05-15 Thread Greg Kroah-Hartman
From: Konrad Rzeszutek Wilk commit e2c3c94788b08891dcf3dbe608f9880523ecd71b upstream. This code is only for CPUs which are affected by MSBDS, but are *not* affected by the other two MDS issues. For such CPUs, enabling the mds_idle_clear mitigation is enough to mitigate SMT. However if user

Re: [PATCH 02/18] soc: qcom: create "include/soc/qcom/rmnet.h"

2019-05-15 Thread Alex Elder
On 5/15/19 1:59 AM, Arnd Bergmann wrote: > On Sun, May 12, 2019 at 3:25 AM Alex Elder wrote: > >> diff --git a/include/soc/qcom/rmnet.h b/include/soc/qcom/rmnet.h >> new file mode 100644 >> index ..80dcd6e68c3d >> --- /dev/null >> +++ b/include/soc/qcom/rmnet.h >> @@ -0,0 +1,38 @@ >>

[PATCH 4.4 212/266] x86/speculation: Mark string arrays const correctly

2019-05-15 Thread Greg Kroah-Hartman
From: Thomas Gleixner commit 8770709f411763884535662744a3786a1806afd3 upstream. checkpatch.pl muttered when reshuffling the code: WARNING: static const char * array should probably be static const char * const Fix up all the string arrays. Signed-off-by: Thomas Gleixner Reviewed-by: Ingo

[PATCH 4.4 261/266] vrf: sit mtu should not be updated when vrf netdev is the link

2019-05-15 Thread Greg Kroah-Hartman
From: Stephen Suryaputra [ Upstream commit ff6ab32bd4e073976e4d8797b4d514a172cfe6cb ] VRF netdev mtu isn't typically set and have an mtu of 65536. When the link of a tunnel is set, the tunnel mtu is changed from 1480 to the link mtu minus tunnel header. In the case of VRF netdev is the link,

[PATCH 4.4 205/266] x86/speculation: Disable STIBP when enhanced IBRS is in use

2019-05-15 Thread Greg Kroah-Hartman
From: Tim Chen commit 34bce7c9690b1d897686aac89604ba7adc365556 upstream. If enhanced IBRS is active, STIBP is redundant for mitigating Spectre v2 user space exploits from hyperthread sibling. Disable STIBP when enhanced IBRS is used. Signed-off-by: Tim Chen Signed-off-by: Thomas Gleixner

[PATCH 4.4 259/266] packet: Fix error path in packet_init

2019-05-15 Thread Greg Kroah-Hartman
From: YueHaibing [ Upstream commit 36096f2f4fa05f7678bc87397665491700bae757 ] kernel BUG at lib/list_debug.c:47! invalid opcode: [#1 CPU: 0 PID: 12914 Comm: rmmod Tainted: GW 5.1.0+ #47 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS

[PATCH 4.4 265/266] drivers/virt/fsl_hypervisor.c: prevent integer overflow in ioctl

2019-05-15 Thread Greg Kroah-Hartman
From: Dan Carpenter commit 6a024330650e24556b8a18cc654ad00cfecf6c6c upstream. The "param.count" value is a u64 thatcomes from the user. The code later in the function assumes that param.count is at least one and if it's not then it leads to an Oops when we dereference the ZERO_SIZE_PTR. Also

[PATCH 4.4 255/266] USB: serial: fix unthrottle races

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 3f5edd58d040bfa4b74fb89bc02f0bc6b9cd06ab ] Fix two long-standing bugs which could potentially lead to memory corruption or leave the port throttled until it is reopened (on weakly ordered systems), respectively, when read-URB completion races with unthrottle(). First, the URB

[PATCH 4.4 252/266] x86/speculation/mds: Fix documentation typo

2019-05-15 Thread Greg Kroah-Hartman
From: Josh Poimboeuf commit 95310e348a321b45fb746c176961d4da72344282 upstream. Fix a minor typo in the MDS documentation: "eanbled" -> "enabled". Reported-by: Jeff Bastian Signed-off-by: Josh Poimboeuf Signed-off-by: Thomas Gleixner Signed-off-by: Ben Hutchings Signed-off-by: Greg

[PATCH 4.4 253/266] x86/bugs: Change L1TF mitigation string to match upstream

2019-05-15 Thread Greg Kroah-Hartman
From: Ben Hutchings Commit 72c6d2db64fa "x86/litf: Introduce vmx status variable" upstream changed "Page Table Inversion" to "PTE Inversion". That was part of the implementation of additional mitigations for VMX which haven't been applied to this branch. Just change this string to be

[PATCH 4.4 251/266] Documentation: Correct the possible MDS sysfs values

2019-05-15 Thread Greg Kroah-Hartman
From: Tyler Hicks commit ea01668f9f43021b28b3f4d5ffad50106a1e1301 upstream. Adjust the last two rows in the table that display possible values when MDS mitigation is enabled. They both were slightly innacurate. In addition, convert the table of possible values and their descriptions to a

[PATCH 4.4 249/266] x86/speculation/mds: Add mitigations= support for MDS

2019-05-15 Thread Greg Kroah-Hartman
From: Josh Poimboeuf commit 5c14068f87d04adc73ba3f41c2a303d3c3d1fa12 upstream. Add MDS to the new 'mitigations=' cmdline option. Signed-off-by: Josh Poimboeuf Signed-off-by: Thomas Gleixner [bwh: Backported to 4.4: - Drop the auto,nosmt option, which we can't support - Adjust filenames,

[PATCH 4.9 14/51] s390/3270: fix lockdep false positive on view->lock

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 5712f3301a12c0c3de9cc423484496b0464f2faf ] The spinlock in the raw3270_view structure is used by con3270, tty3270 and fs3270 in different ways. For con3270 the lock can be acquired in irq context, for tty3270 and fs3270 the highest context is bh. Lockdep sees the view->lock as

[PATCH 4.9 12/51] s390/dasd: Fix capacity calculation for large volumes

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 2cc9637ce825f3a9f51f8f78af7474e9e85bfa5f ] The DASD driver incorrectly limits the maximum number of blocks of ECKD DASD volumes to 32 bit numbers. Volumes with a capacity greater than 2^32-1 blocks are incorrectly recognized as smaller volumes. This results in the following

[PATCH 4.9 01/51] netfilter: compat: initialize all fields in xt_init

2019-05-15 Thread Greg Kroah-Hartman
commit 8d29d16d21342a0c86405d46de0c4ac5daf1760f upstream If a non zero value happens to be in xt[NFPROTO_BRIDGE].cur at init time, the following panic can be caused by running % ebtables -t broute -F BROUTING from a 32-bit user level on a 64-bit kernel. This patch replaces kmalloc_array with

[PATCH 4.4 257/266] bridge: Fix error path for kobject_init_and_add()

2019-05-15 Thread Greg Kroah-Hartman
From: "Tobin C. Harding" [ Upstream commit bdfad5aec1392b93495b77b864d58d7f101dc1c1 ] Currently error return from kobject_init_and_add() is not followed by a call to kobject_put(). This means there is a memory leak. We currently set p to NULL so that kfree() may be called on it as a noop, the

[PATCH 4.4 258/266] net: ucc_geth - fix Oops when changing number of buffers in the ring

2019-05-15 Thread Greg Kroah-Hartman
From: Christophe Leroy [ Upstream commit ee0df19305d9fabd9479b785918966f6e25b733b ] When changing the number of buffers in the RX ring while the interface is running, the following Oops is encountered due to the new number of buffers being taken into account immediately while their allocation

[PATCH 4.9 00/51] 4.9.177-stable review

2019-05-15 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.9.177 release. There are 51 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Fri 17 May 2019 09:04:42 AM UTC. Anything

RE: [PATCH 1/3] dt-bindings: clock: imx8mm: Add SNVS clock

2019-05-15 Thread Anson Huang
Hi, Leonard > -Original Message- > From: Leonard Crestez > Sent: Wednesday, May 15, 2019 6:18 PM > To: Anson Huang ; shawn...@kernel.org; > sb...@kernel.org; Jacky Bai > Cc: robh...@kernel.org; mark.rutl...@arm.com; s.ha...@pengutronix.de; > ker...@pengutronix.de; feste...@gmail.com;

[PATCH 4.9 07/51] libnvdimm/namespace: Fix a potential NULL pointer dereference

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 55c1fc0af29a6c1b92f217b7eb7581a882e0c07c ] In case kmemdup fails, the fix goes to blk_err to avoid NULL pointer dereference. Signed-off-by: Kangjie Lu Signed-off-by: Dan Williams Signed-off-by: Sasha Levin --- drivers/nvdimm/namespace_devs.c | 5 - 1 file changed, 4

[PATCH 4.9 19/51] init: initialize jump labels before command line option parsing

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 6041186a32585fc7a1d0f6cfe2f138b05fdc3c82 ] When a module option, or core kernel argument, toggles a static-key it requires jump labels to be initialized early. While x86, PowerPC, and ARM64 arrange for jump_label_init() to be called before parse_args(), ARM does not. Kernel

[PATCH 4.9 22/51] MIPS: perf: ath79: Fix perfcount IRQ assignment

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit a1e8783db8e0d58891681bc1e6d9ada66eae8e20 ] Currently it's not possible to use perf on ath79 due to genirq flags mismatch happening on static virtual IRQ 13 which is used for performance counters hardware IRQ 5. On TP-Link Archer C7v5: CPU0 2: 0 MIPS

[PATCH 4.9 17/51] KVM: x86: avoid misreporting level-triggered irqs as edge-triggered in tracing

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 7a223e06b1a411cef6c4cd7a9b9a33c8d225b10e ] In __apic_accept_irq() interface trig_mode is int and actually on some code paths it is set above u8: kvm_apic_set_irq() extracts it from 'struct kvm_lapic_irq' where trig_mode is u16. This is done on purpose as e.g. kvm_set_msi_irq()

[PATCH 4.9 27/51] spi: Micrel eth switch: declare missing of table

2019-05-15 Thread Greg Kroah-Hartman
[ Upstream commit 2f23a2a768bee7ad2ff1e9527c3f7e279e794a46 ] Add missing table for SPI driver relying on SPI device match since compatible is in a DT binding or in a DTS. Before this patch: modinfo drivers/net/phy/spi_ks8995.ko | grep alias alias: spi:ksz8795 alias:

[PATCH 4.9 04/51] platform/x86: sony-laptop: Fix unintentional fall-through

2019-05-15 Thread Greg Kroah-Hartman
From: Gustavo A. R. Silva commit 1cbd7a64959d33e7a2a1fa2bf36a62b350a9fcbd upstream. It seems that the default case should return AE_CTRL_TERMINATE, instead of falling through to case ACPI_RESOURCE_TYPE_END_TAG and returning AE_OK; otherwise the line of code at the end of the function is

[PATCH] rtc: test: enable wakeup flags

2019-05-15 Thread roman . stratiienko
From: Roman Stratiienko Alarmtimer interface uses only the RTC with wekeup flags enabled. Allow to use rtc-test driver with alarmtimer interface. Signed-off-by: Roman Stratiienko --- drivers/rtc/rtc-test.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/rtc/rtc-test.c

[PATCH 4.9 36/51] x86: vdso: Use $LD instead of $CC to link

2019-05-15 Thread Greg Kroah-Hartman
commit 379d98ddf41344273d9718556f761420f4dc80b3 upstream. The vdso{32,64}.so can fail to link with CC=clang when clang tries to find a suitable GCC toolchain to link these libraries with. /usr/bin/ld: arch/x86/entry/vdso/vclock_gettime.o: access beyond end of merged section (782) This happens

[PATCH 4.9 05/51] USB: serial: fix unthrottle races

2019-05-15 Thread Greg Kroah-Hartman
From: Johan Hovold commit 3f5edd58d040bfa4b74fb89bc02f0bc6b9cd06ab upstream. Fix two long-standing bugs which could potentially lead to memory corruption or leave the port throttled until it is reopened (on weakly ordered systems), respectively, when read-URB completion races with unthrottle().

[PATCH 4.9 42/51] net: ucc_geth - fix Oops when changing number of buffers in the ring

2019-05-15 Thread Greg Kroah-Hartman
From: Christophe Leroy [ Upstream commit ee0df19305d9fabd9479b785918966f6e25b733b ] When changing the number of buffers in the RX ring while the interface is running, the following Oops is encountered due to the new number of buffers being taken into account immediately while their allocation

[PATCH 4.9 43/51] packet: Fix error path in packet_init

2019-05-15 Thread Greg Kroah-Hartman
From: YueHaibing [ Upstream commit 36096f2f4fa05f7678bc87397665491700bae757 ] kernel BUG at lib/list_debug.c:47! invalid opcode: [#1 CPU: 0 PID: 12914 Comm: rmmod Tainted: GW 5.1.0+ #47 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS

[PATCH 4.9 40/51] bridge: Fix error path for kobject_init_and_add()

2019-05-15 Thread Greg Kroah-Hartman
From: "Tobin C. Harding" [ Upstream commit bdfad5aec1392b93495b77b864d58d7f101dc1c1 ] Currently error return from kobject_init_and_add() is not followed by a call to kobject_put(). This means there is a memory leak. We currently set p to NULL so that kfree() may be called on it as a noop, the

[PATCH 4.9 39/51] powerpc/64s: Include cpu header

2019-05-15 Thread Greg Kroah-Hartman
From: Breno Leitao commit 42e2acde1237878462b028f5a27d9cc5bea7502c upstream. Current powerpc security.c file is defining functions, as cpu_show_meltdown(), cpu_show_spectre_v{1,2} and others, that are being declared at linux/cpu.h header without including the header file that contains these

[PATCH 4.9 46/51] ipv4: Fix raw socket lookup for local traffic

2019-05-15 Thread Greg Kroah-Hartman
From: David Ahern [ Upstream commit 19e4e768064a87b073a4b4c138b55db70e0cfb9f ] inet_iif should be used for the raw socket lookup. inet_iif considers rt_iif which handles the case of local traffic. As it stands, ping to a local address with the '-I ' option fails ever since ping was changed to

[PATCH 4.9 44/51] vlan: disable SIOCSHWTSTAMP in container

2019-05-15 Thread Greg Kroah-Hartman
From: Hangbin Liu [ Upstream commit 873017af778439f2f8e3d87f28ddb1fcaf244a76 ] With NET_ADMIN enabled in container, a normal user could be mapped to root and is able to change the real device's rx filter via ioctl on vlan, which would affect the other ptp process on host. Fix it by disabling

[PATCH 4.9 50/51] powerpc/lib: fix book3s/32 boot failure due to code patching

2019-05-15 Thread Greg Kroah-Hartman
From: Christophe Leroy commit b45ba4a51cde29b2939365ef0c07ad34c8321789 upstream. Commit 51c3c62b58b3 ("powerpc: Avoid code patching freed init sections") accesses 'init_mem_is_free' flag too early, before the kernel is relocated. This provokes early boot failure (before the console is active).

[PATCH 4.9 34/51] Revert "x86/vdso: Drop implicit common-page-size linker flag"

2019-05-15 Thread Greg Kroah-Hartman
This reverts commit 408d67a0fecf4cfe7869f518211ae278ee44376e. The commit message in the 4.9 stable tree did not have a reference to the upstream commit id. Signed-off-by: Sasha Levin --- arch/x86/entry/vdso/Makefile | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git

Re: INFO: task hung in __get_super

2019-05-15 Thread syzbot
Hello, syzbot has tested the proposed patch and the reproducer did not trigger crash: Reported-and-tested-by: syzbot+10007d66ca02b08f0...@syzkaller.appspotmail.com Tested on: commit: e93c9c99 Linux 5.1 git tree:

[PATCH 4.9 35/51] Revert "x86: vdso: Use $LD instead of $CC to link"

2019-05-15 Thread Greg Kroah-Hartman
This reverts commit 94c0c4f033eee2304a98cf30a141f9dae35d3a62. The commit message in the 4.9 stable tree did not have a reference to the upstream commit id. Signed-off-by: Sasha Levin --- arch/x86/entry/vdso/Makefile | 22 +- 1 file changed, 13 insertions(+), 9 deletions(-)

[PATCH 4.9 31/51] ALSA: pcm: remove SNDRV_PCM_IOCTL1_INFO internal command

2019-05-15 Thread Greg Kroah-Hartman
From: Takashi Sakamoto commit e11f0f90a626f93899687b1cc909ee37dd6c5809 upstream. Drivers can implement 'struct snd_pcm_ops.ioctl' to handle some requests from ALSA PCM core. These requests are internal purpose in kernel land. Usually common set of operations are used for it.

<    2   3   4   5   6   7   8   9   10   11   >