[PATCH 5.4 087/142] ALSA: hwdep: fix a left shifting 1 by 31 UB bug

2020-06-01 Thread Greg Kroah-Hartman
From: Changming Liu [ Upstream commit fb8cd6481ffd126f35e9e146a0dcf0c4e8899f2e ] The "info.index" variable can be 31 in "1 << info.index". This might trigger an undefined behavior since 1 is signed. Fix this by casting 1 to 1u just to be sure "1u << 31" is defined. Signed-off-by: Changming

[PATCH 5.4 085/142] gpio: bcm-kona: Fix return value of bcm_kona_gpio_probe()

2020-06-01 Thread Greg Kroah-Hartman
From: Tiezhu Yang [ Upstream commit 98f7d1b15e87c84488b30ecc4ec753b0690b9dbf ] Propagate the error code returned by devm_platform_ioremap_resource() out of probe() instead of overwriting it. Fixes: 72d8cb715477 ("drivers: gpio: bcm-kona: use devm_platform_ioremap_resource()") Signed-off-by:

Re: [PATCH v2 0/3] media: rockchip: Introduce driver for the camera interface on PX30

2020-06-01 Thread Tomasz Figa
Hi Maxime, On Fri, May 29, 2020 at 3:04 PM Maxime Chevallier wrote: > > Hello everyone, > > Here's a V2 of the series adding very basic support for the camera interface > on > the Rockchip PX30 SoC. > > Thanks to everyone that commented on the first series, your reviews were > very helpful :) >

[PATCH 5.4 062/142] drivers: net: hamradio: Fix suspicious RCU usage warning in bpqether.c

2020-06-01 Thread Greg Kroah-Hartman
From: Madhuparna Bhowmik [ Upstream commit 95f59bf88bb75281cc626e283ecefdd5d5641427 ] This patch fixes the following warning: = WARNING: suspicious RCU usage 5.7.0-rc5-next-20200514-syzkaller #0 Not tainted -

[PATCH 5.4 091/142] clk: qcom: gcc: Fix parent for gpll0_out_even

2020-06-01 Thread Greg Kroah-Hartman
From: Vinod Koul [ Upstream commit a76f274182f054481182c81cd62bb8794a5450a6 ] Documentation says that gpll0 is parent of gpll0_out_even, somehow driver coded that as bi_tcxo, so fix it Fixes: 2a1d7eb854bb ("clk: qcom: gcc: Add global clock controller driver for SM8150") Reported-by: Jonathan

[PATCH 5.4 081/142] ARM: dts: bcm2835-rpi-zero-w: Fix led polarity

2020-06-01 Thread Greg Kroah-Hartman
From: Vincent Stehlé [ Upstream commit 58bb90ab415562eededb932455046924e65df342 ] The status "ACT" led on the Raspberry Pi Zero W is on when GPIO 47 is low. This has been verified on a board and somewhat confirmed by both the GPIO name ("STATUS_LED_N") and the reduced schematics [1]. [1]:

Re: [RFC v1 2/3] drivers: nvmem: Add driver for QTI qfprom-efuse support

2020-06-01 Thread Doug Anderson
Hi, On Mon, Jun 1, 2020 at 2:25 AM Srinivas Kandagatla wrote: > > > > On 26/05/2020 23:31, Doug Anderson wrote: > > Hi, > > > > On Fri, May 22, 2020 at 4:18 AM Srinivas Kandagatla > > wrote: > >> > >> On 21/05/2020 22:28, Doug Anderson wrote: > >>> Hi, > >>> > >>> On Thu, May 21, 2020 at 8:56

[PATCH 5.4 092/142] ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio

2020-06-01 Thread Greg Kroah-Hartman
From: Takashi Iwai [ Upstream commit 7f5ad9c9003425175f46c94df380e8c9e558cfb5 ] Gigabyte TRX40 Aorus Master is equipped with two USB-audio devices, a Realtek ALC1220-VB codec (USB ID 0414:a001) and an ESS SABRE9218 DAC (USB ID 0414:a000). The latter serves solely for the headphone output on

[PATCH 5.4 082/142] ARM: dts: bcm: HR2: Fix PPI interrupt types

2020-06-01 Thread Greg Kroah-Hartman
From: Hamish Martin [ Upstream commit be0ec060b54f0481fb95d59086c1484a949c903c ] These error messages are output when booting on a BCM HR2 system: GIC: PPI11 is secure or misconfigured GIC: PPI13 is secure or misconfigured Per ARM documentation these interrupts are triggered on a

[PATCH 5.4 067/142] Input: dlink-dir685-touchkeys - fix a typo in driver name

2020-06-01 Thread Greg Kroah-Hartman
From: Christophe JAILLET [ Upstream commit 38347374ae3f1ec4df56dd688bd603a64e79a0ed ] According to the file name and Kconfig, a 'k' is missing in this driver name. It should be "dlink-dir685-touchkeys". Fixes: 131b3de7016b ("Input: add D-Link DIR-685 touchkeys driver") Signed-off-by:

[PATCH 5.4 101/142] fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info()

2020-06-01 Thread Greg Kroah-Hartman
From: Alexander Potapenko [ Upstream commit 1d605416fb7175e1adf094251466caa52093b413 ] KMSAN reported uninitialized data being written to disk when dumping core. As a result, several kilobytes of kmalloc memory may be written to the core file and then read by a non-privileged user.

[PATCH 5.4 112/142] xfrm: allow to accept packets with ipv6 NEXTHDR_HOP in xfrm_input

2020-06-01 Thread Greg Kroah-Hartman
From: Xin Long commit afcaf61be9d1dbdee5ec186d1dcc67b6b692180f upstream. For beet mode, when it's ipv6 inner address with nexthdrs set, the packet format might be: | outer | | dest | | | ESP| ESP | | IP hdr |

[PATCH 5.4 124/142] netfilter: nfnetlink_cthelper: unbreak userspace helper support

2020-06-01 Thread Greg Kroah-Hartman
From: Pablo Neira Ayuso commit 703acd70f2496537457186211c2f03e792409e68 upstream. Restore helper data size initialization and fix memcopy of the helper data size. Fixes: 157eb5dc ("netfilter: nfnetlink_cthelper: reject too large userspace allocation requests") Reviewed-by: Florian

[PATCH 5.4 115/142] xfrm: call xfrm_output_gso when inner_protocol is set in xfrm_output

2020-06-01 Thread Greg Kroah-Hartman
From: Xin Long commit a204aef9fd77dce1efd9066ca4e44eede99cd858 upstream. An use-after-free crash can be triggered when sending big packets over vxlan over esp with esp offload enabled: [] BUG: KASAN: use-after-free in ipv6_gso_pull_exthdrs.part.8+0x32c/0x4e0 [] Call Trace: []

[PATCH 5.4 125/142] netfilter: nf_conntrack_pptp: prevent buffer overflows in debug code

2020-06-01 Thread Greg Kroah-Hartman
From: Pablo Neira Ayuso commit 4c559f15efcc43b996f4da528cd7f9483aaca36d upstream. Dan Carpenter says: "Smatch complains that the value for "cmd" comes from the network and can't be trusted." Add pptp_msg_name() helper function that checks for the array boundary. Fixes: f09943fefe6b

[PATCH 5.4 064/142] Input: i8042 - add ThinkPad S230u to i8042 nomux list

2020-06-01 Thread Greg Kroah-Hartman
From: Kevin Locke [ Upstream commit 18931506465a762ffd3f4803d36a18d336a67da9 ] On the Lenovo ThinkPad Twist S230u (3347-4HU) with BIOS version "GDETC1WW (1.81 ) 06/27/2019", whether booted in UEFI or Legacy/CSM mode the keyboard, Synaptics TouchPad, and TrackPoint either do not function or stop

[PATCH 5.4 126/142] esp6: get the right proto for transport mode in esp6_gso_encap

2020-06-01 Thread Greg Kroah-Hartman
From: Xin Long commit 3c96ec56828922e3fe5477f75eb3fc02f98f98b5 upstream. For transport mode, when ipv6 nexthdr is set, the packet format might be like: || dest | | | | ESP| ESP | | IP6 hdr| opts.| ESP |

[PATCH 5.4 103/142] Revert "block: end bio with BLK_STS_AGAIN in case of non-mq devs and REQ_NOWAIT"

2020-06-01 Thread Greg Kroah-Hartman
From: Jens Axboe [ Upstream commit b0beb28097fa04177b3769f4bb7a0d0d9c4ae76e ] This reverts commit c58c1f83436b501d45d4050fd1296d71a9760bcb. io_uring does do the right thing for this case, and we're still returning -EAGAIN to userspace for the cases we don't support. Revert this change to avoid

[PATCH 5.4 119/142] xfrm: fix error in comment

2020-06-01 Thread Greg Kroah-Hartman
From: Antony Antony commit 29e4276667e24ee6b91d9f91064d8fda9a210ea1 upstream. s/xfrm_state_offload/xfrm_user_offload/ Fixes: d77e38e612a ("xfrm: Add an IPsec hardware offloading API") Signed-off-by: Antony Antony Signed-off-by: Steffen Klassert Signed-off-by: Greg Kroah-Hartman ---

[PATCH 5.4 104/142] gpio: fix locking open drain IRQ lines

2020-06-01 Thread Greg Kroah-Hartman
From: Linus Walleij [ Upstream commit e9bdf7e655b9ee81ee912fae1d59df48ce7311b6 ] We provided the right semantics on open drain lines being by definition output but incidentally the irq set up function would only allow IRQs on lines that were "not output". Fix the semantics to allow output open

[PATCH 5.4 068/142] Input: i8042 - add ThinkPad S230u to i8042 reset list

2020-06-01 Thread Greg Kroah-Hartman
From: Kevin Locke [ Upstream commit 2712c91a54a1058d55c284152b4d93c979b67be6 ] On the Lenovo ThinkPad Twist S230u (3347-4HU) with BIOS version "GDETC1WW (1.81 ) 06/27/2019", the keyboard, Synaptics TouchPad, and TrackPoint either do not function or stop functioning a few minutes after boot.

[PATCH 5.4 116/142] xfrm interface: fix oops when deleting a x-netns interface

2020-06-01 Thread Greg Kroah-Hartman
From: Nicolas Dichtel commit c95c5f58b35ef995f66cb55547eee6093ab5fcb8 upstream. Here is the steps to reproduce the problem: ip netns add foo ip netns add bar ip -n foo link add xfrmi0 type xfrm dev lo if_id 42 ip -n foo link set xfrmi0 netns bar ip netns del foo ip netns del bar Which results

[PATCH 5.4 128/142] ieee80211: Fix incorrect mask for default PE duration

2020-06-01 Thread Greg Kroah-Hartman
From: Pradeep Kumar Chitrapu commit d031781bdabe1027858a3220f868866586bf6e7c upstream. Fixes bitmask for HE opration's default PE duration. Fixes: daa5b83513a7 ("mac80211: update HE operation fields to D3.0") Signed-off-by: Pradeep Kumar Chitrapu Link:

[PATCH 5.4 122/142] netfilter: ipset: Fix subcounter update skip

2020-06-01 Thread Greg Kroah-Hartman
From: Phil Sutter commit a164b95ad6055c50612795882f35e0efda1f1390 upstream. If IPSET_FLAG_SKIP_SUBCOUNTER_UPDATE is set, user requested to not update counters in sub sets. Therefore IPSET_FLAG_SKIP_COUNTER_UPDATE must be set, not unset. Fixes: 6e01781d1c80e ("netfilter: ipset: set match: add

Re: [BOOTLOADER SPECIFICATION RFC] The bootloader log format for TrenchBoot and others

2020-06-01 Thread Hans Ulrich Niedermann
On Fri, 29 May 2020 13:27:35 +0200 Daniel Kiper wrote: > Below you can find my rough idea of the bootloader log format which is > generic thing but initially will be used for TrenchBoot work. I > discussed this proposal with Ross and Daniel S. So, the idea went > through initial sanitization.

Re: [PATCH v3 1/4] seccomp: rename "usage" to "refs" and document

2020-06-01 Thread Kees Cook
On Sun, May 31, 2020 at 01:50:28PM +0200, Christian Brauner wrote: > Naming the lifetime counter of a seccomp filter "usage" suggests a > little too strongly that its about tasks that are using this filter > while it also tracks other references such as the user notifier or > ptrace. This also

Re: [PATCH v2] RISC-V: Don't mark init section as non-executable

2020-06-01 Thread Atish Patra
On Sun, May 31, 2020 at 10:07 PM Anup Patel wrote: > > The head text section (i.e. _start, secondary_start_sbi, etc) and the > init section fall under same page table level-1 mapping. > > Currently, the runtime CPU hotplug is broken because we are marking > init section as non-executable which

[PATCH 5.4 141/142] netfilter: nf_conntrack_pptp: fix compilation warning with W=1 build

2020-06-01 Thread Greg Kroah-Hartman
From: Pablo Neira Ayuso commit 4946ea5c1237036155c3b3a24f049fd5f849f8f6 upstream. >> include/linux/netfilter/nf_conntrack_pptp.h:13:20: warning: 'const' type >> qualifier on return type has no effect [-Wignored-qualifiers] extern const char *const pptp_msg_name(u_int16_t msg); ^~

[PATCH 5.4 138/142] Revert "Input: i8042 - add ThinkPad S230u to i8042 nomux list"

2020-06-01 Thread Greg Kroah-Hartman
From: Dmitry Torokhov commit f4dec2d6160976b14e54be9c3950ce0f52385741 upstream. This reverts commit 18931506465a762ffd3f4803d36a18d336a67da9. From Kevin Locke: "... nomux only appeared to fix the issue because the controller continued working after warm reboots. After more thorough testing

Re: [PATCH net-next] tipc: Fix NULL pointer dereference in __tipc_sendstream()

2020-06-01 Thread David Miller
From: YueHaibing Date: Thu, 28 May 2020 22:34:07 +0800 > tipc_sendstream() may send zero length packet, then tipc_msg_append() > do not alloc skb, skb_peek_tail() will get NULL, msg_set_ack_required > will trigger NULL pointer dereference. > > Reported-by:

[git pull] set_fs() removal in coredump-related area

2020-06-01 Thread Al Viro
Mostly Christoph's stuff... The following changes since commit 8f3d9f354286745c751374f5f1fcafee6b3f3136: Linux 5.7-rc1 (2020-04-12 12:35:55 -0700) are available in the git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs.git work.set_fs-exec for you to fetch

[PATCH 5.4 135/142] ipv4: nexthop version of fib_info_nh_uses_dev

2020-06-01 Thread Greg Kroah-Hartman
From: David Ahern commit 1fd1c768f3624a5e66766e7b4ddb9b607cd834a5 upstream. Similar to the last path, need to fix fib_info_nh_uses_dev for external nexthops to avoid referencing multiple nh_grp structs. Move the device check in fib_info_nh_uses_dev to a helper and create a nexthop version that

[git pull] uaccess access_ok()

2020-06-01 Thread Al Viro
Removals of trivially pointless access_ok() calls. Note: fiemap stuff removed from the series, since they are duplicates with part of ext4 series carried in Ted's tree The following changes since commit 3815f1be546e752327b5868af103ccdddcc4db77: dlmfs_file_write(): fix the bogosity in

[PATCH 5.4 137/142] bonding: Fix reference count leak in bond_sysfs_slave_add.

2020-06-01 Thread Greg Kroah-Hartman
From: Qiushi Wu commit a068aab42258e25094bc2c159948d263ed7d7a77 upstream. kobject_init_and_add() takes reference even when it fails. If this function returns an error, kobject_put() must be called to properly clean up the memory associated with the object. Previous commit "b8eb718348b8" fixed a

[PATCH 5.4 142/142] perf: Make perf able to build with latest libbfd

2020-06-01 Thread Greg Kroah-Hartman
From: Changbin Du commit 0ada120c883d4f1f6aafd01cf0fbb10d8bbba015 upstream. libbfd has changed the bfd_section_* macros to inline functions bfd_section_ since 2019-09-18. See below two commits: o http://www.sourceware.org/ml/gdb-cvs/2019-09/msg00064.html o

[git pull] uaccess csum

2020-06-01 Thread Al Viro
Regularize the sitation with uaccess checksum primitives, fold csum_partial_... into csum_and_copy_..._user(), on x86 collapse several access_ok()/stac()/clac() into user_access_begin()/user_access_end() The following changes since commit 8f3d9f354286745c751374f5f1fcafee6b3f3136: Linux

[GIT PULL] Please pull hmm changes

2020-06-01 Thread Jason Gunthorpe
Hi Linus, This is a small update for 5.8 mainly including the selftest from Ralph and finishing the hmm_range_fault() simplification started in the last merge window. Regards, Jason The following changes since commit 0e698dfa282211e414076f9dc7e83c1c288314fd: Linux 5.7-rc4 (2020-05-03

[PATCH 5.4 132/142] nexthops: Move code from remove_nexthop_from_groups to remove_nh_grp_entry

2020-06-01 Thread Greg Kroah-Hartman
From: David Ahern commit ac21753a5c2c9a6a2019997481a2ac12bbde48c8 upstream. Move nh_grp dereference and check for removing nexthop group due to all members gone into remove_nh_grp_entry. Fixes: 430a049190de ("nexthop: Add support for nexthop groups") Signed-off-by: David Ahern Acked-by:

Re: [PATCH v3 0/2] regmap: provide simple bitops and use them in a driver

2020-06-01 Thread David Miller
From: Bartosz Golaszewski Date: Thu, 28 May 2020 17:45:01 +0200 > From: Bartosz Golaszewski > > I noticed that oftentimes I use regmap_update_bits() for simple bit > setting or clearing. In this case the fourth argument is superfluous as > it's always 0 or equal to the mask argument. > > This

[PATCH 5.6 013/177] net: nlmsg_cancel() if put fails for nhmsg

2020-06-01 Thread Greg Kroah-Hartman
From: Stephen Worley [ Upstream commit d69100b8eee27c2d60ee52df76e0b80a8d492d34 ] Fixes data remnant seen when we fail to reserve space for a nexthop group during a larger dump. If we fail the reservation, we goto nla_put_failure and cancel the message. Reproduce with the following iproute2

[PATCH 5.6 001/177] ax25: fix setsockopt(SO_BINDTODEVICE)

2020-06-01 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 687775cec056b38a4c8f3291e0dd7a9145f7b667 ] syzbot was able to trigger this trace [1], probably by using a zero optlen. While we are at it, cap optlen to IFNAMSIZ - 1 instead of IFNAMSIZ. [1] BUG: KMSAN: uninit-value in strnlen+0xf9/0x170 lib/string.c:569

[PATCH 5.4 111/142] copy_xstate_to_kernel(): dont leave parts of destination uninitialized

2020-06-01 Thread Greg Kroah-Hartman
From: Al Viro commit 9e4636545933131de15e1ecd06733538ae939b2f upstream. copy the corresponding pieces of init_fpstate into the gaps instead. Cc: sta...@kernel.org Tested-by: Alexander Potapenko Acked-by: Borislav Petkov Signed-off-by: Al Viro Signed-off-by: Greg Kroah-Hartman ---

[PATCH 5.4 110/142] x86/dma: Fix max PFN arithmetic overflow on 32 bit systems

2020-06-01 Thread Greg Kroah-Hartman
From: Alexander Dahl commit 88743470668ef5eb6b7ba9e0f99888e5999bf172 upstream. The intermediate result of the old term (4UL * 1024 * 1024 * 1024) is 4 294 967 296 or 0x1 which is no problem on 64 bit systems. The patch does not change the later overall result of 0x10 for

[PATCH 5.6 020/177] sctp: Dont add the shutdown timer if its already been added

2020-06-01 Thread Greg Kroah-Hartman
From: Neil Horman [ Upstream commit 20a785aa52c82246055a089e55df9dac47d67da1 ] This BUG halt was reported a while back, but the patch somehow got missed: PID: 2879 TASK: c16adaa0 CPU: 1 COMMAND: "sctpn" #0 [f418dd28] crash_kexec at c04a7d8c #1 [f418dd7c] oops_end at c0863e02 #2

[PATCH 5.6 011/177] net/mlx5: Add command entry handling completion

2020-06-01 Thread Greg Kroah-Hartman
From: Moshe Shemesh [ Upstream commit 17d00e839d3b592da9659c1977d45f85b77f986a ] When FW response to commands is very slow and all command entries in use are waiting for completion we can have a race where commands can get timeout before they get out of the queue and handled. Timeout completion

[PATCH 5.6 025/177] net/mlx5: Fix memory leak in mlx5_events_init

2020-06-01 Thread Greg Kroah-Hartman
From: Moshe Shemesh [ Upstream commit df14ad1eccb04a4a28c90389214dbacab085b244 ] Fix memory leak in mlx5_events_init(), in case create_single_thread_workqueue() fails, events struct should be freed. Fixes: 5d3c537f9070 ("net/mlx5: Handle event of power detection in the PCIE slot")

[PATCH 5.6 003/177] ethtool: count header size in reply size estimate

2020-06-01 Thread Greg Kroah-Hartman
From: Michal Kubecek [ Upstream commit 7c87e32d2e380228ada79d20ac5b7674718ef097 ] As ethnl_request_ops::reply_size handlers do not include common header size into calculated/estimated reply size, it needs to be added in ethnl_default_doit() and ethnl_default_notify() before allocating the

[PATCH 5.6 028/177] wireguard: noise: read preshared key while taking lock

2020-06-01 Thread Greg Kroah-Hartman
From: "Jason A. Donenfeld" [ Upstream commit bc67d371256f5c47d824e2eec51e46c8d62d022e ] Prior we read the preshared key after dropping the handshake lock, which isn't an actual crypto issue if it races, but it's still not quite correct. So copy that part of the state into a temporary like we do

[PATCH 5.6 030/177] wireguard: noise: separate receive counter from send counter

2020-06-01 Thread Greg Kroah-Hartman
From: "Jason A. Donenfeld" [ Upstream commit a9e90d9931f3a474f04bab782ccd9d77904941e9 ] In "wireguard: queueing: preserve flow hash across packet scrubbing", we were required to slightly increase the size of the receive replay counter to something still fairly small, but an increase

[PATCH 5.6 017/177] net/tls: fix race condition causing kernel panic

2020-06-01 Thread Greg Kroah-Hartman
From: Vinay Kumar Yadav [ Upstream commit 0cada33241d9de205522e3858b18e506ca5cce2c ] tls_sw_recvmsg() and tls_decrypt_done() can be run concurrently. // tls_sw_recvmsg() if (atomic_read(>decrypt_pending)) crypto_wait_req(-EINPROGRESS, >async_wait); else

[PATCH 5.6 024/177] net/mlx5e: Fix inner tirs handling

2020-06-01 Thread Greg Kroah-Hartman
From: Roi Dayan [ Upstream commit a16b8e0dcf7043bee46174bed0553cc9e36b63a5 ] In the cited commit inner_tirs argument was added to create and destroy inner tirs, and no indication was added to mlx5e_modify_tirs_hash() function. In order to have a consistent handling, use inner_indir_tir[0].tirn

[PATCH 5.6 023/177] net/mlx5e: kTLS, Destroy key object after destroying the TIS

2020-06-01 Thread Greg Kroah-Hartman
From: Tariq Toukan [ Upstream commit 16736e11f43b80a38f98f6add54fab3b8c297df3 ] The TLS TIS object contains the dek/key ID. By destroying the key first, the TIS would contain an invalid non-existing key ID. Reverse the destroy order, this also acheives the desired assymetry between the destroy

[PATCH 5.6 019/177] r8152: support additional Microsoft Surface Ethernet Adapter variant

2020-06-01 Thread Greg Kroah-Hartman
From: Marc Payne [ Upstream commit c27a204383616efba5a4194075e90819961ff66a ] Device id 0927 is the RTL8153B-based component of the 'Surface USB-C to Ethernet and USB Adapter' and may be used as a component of other devices in future. Tested and working with the r8152 driver. Update the

[PATCH 5.6 015/177] net: revert "net: get rid of an signed integer overflow in ip_idents_reserve()"

2020-06-01 Thread Greg Kroah-Hartman
From: Yuqi Jin [ Upstream commit a6211caa634da39d861a47437ffcda8b38ef421b ] Commit adb03115f459 ("net: get rid of an signed integer overflow in ip_idents_reserve()") used atomic_cmpxchg to replace "atomic_add_return" inside the function "ip_idents_reserve". The reason was to avoid UBSAN

[PATCH 5.6 037/177] net/tls: fix encryption error checking

2020-06-01 Thread Greg Kroah-Hartman
From: Vadim Fedorenko commit a7bff11f6f9afa87c25711db8050c9b5324db0e2 upstream. bpf_exec_tx_verdict() can return negative value for copied variable. In that case this value will be pushed back to caller and the real error code will be lost. Fix it using signed type and checking for positive

[PATCH 5.6 004/177] felix: Fix initialization of ioremap resources

2020-06-01 Thread Greg Kroah-Hartman
From: Claudiu Manoil [ Upstream commit b4024c9e5c57902155d3b5e7de482e245f492bff ] The caller of devm_ioremap_resource(), either accidentally or by wrong assumption, is writing back derived resource data to global static resource initialization tables that should have been constant. Meaning

[PATCH 5.6 036/177] net/mlx5: Annotate mutex destroy for root ns

2020-06-01 Thread Greg Kroah-Hartman
From: Roi Dayan commit 9ca415399dae133b00273a4283ef31d003a6818d upstream. Invoke mutex_destroy() to catch any errors. Fixes: 2cc43b494a6c ("net/mlx5_core: Managing root flow table") Signed-off-by: Roi Dayan Reviewed-by: Mark Bloch Signed-off-by: Saeed Mahameed Signed-off-by: Greg

[PATCH 5.6 054/177] ARM: dts: omap4-droid4: Fix occasional lost wakeirq for uart1

2020-06-01 Thread Greg Kroah-Hartman
From: Tony Lindgren [ Upstream commit 738b150ecefbffb6e55cfa8a3b66a844f777d8fb ] Looks like using the UART CTS pin does not always trigger for a wake-up when the SoC is idle. This is probably because the modem first uses gpio_149 to signal the SoC that data will be sent, and the CTS will only

Re: [PATCH v3 2/4] seccomp: release filter after task is fully dead

2020-06-01 Thread Kees Cook
On Sun, May 31, 2020 at 01:50:29PM +0200, Christian Brauner wrote: > The seccomp filter used to be released in free_task() which is called > asynchronously via call_rcu() and assorted mechanisms. Since we need > to inform tasks waiting on the seccomp notifier when a filter goes empty > we will

[PATCH 5.6 005/177] net: dont return invalid table id error when we fall back to PF_UNSPEC

2020-06-01 Thread Greg Kroah-Hartman
From: Sabrina Dubroca [ Upstream commit 41b4bd986f86331efc599b9a3f5fb86ad92e9af9 ] In case we can't find a ->dumpit callback for the requested (family,type) pair, we fall back to (PF_UNSPEC,type). In effect, we're in the same situation as if userspace had requested a PF_UNSPEC dump. For

Re: [GIT PULL] sh: remove sh5 support

2020-06-01 Thread Rich Felker
On Sat, May 30, 2020 at 10:08:09AM +0200, John Paul Adrian Glaubitz wrote: > On 5/29/20 7:53 PM, Rich Felker wrote: > > Frustratingly, I _still_ don't have an official tree on kernel.org for > > the purpose of being the canonical place for linux-next to pull from, > > due to policies around pgp

[PATCH 5.6 008/177] __netif_receive_skb_core: pass skb by reference

2020-06-01 Thread Greg Kroah-Hartman
From: Boris Sukholitko [ Upstream commit c0bbbdc32febd4f034ecbf3ea17865785b2c0652 ] __netif_receive_skb_core may change the skb pointer passed into it (e.g. in rx_handler). The original skb may be freed as a result of this operation. The callers of __netif_receive_skb_core may further process

[PATCH 5.6 058/177] gfs2: dont call quota_unhold if quotas are not locked

2020-06-01 Thread Greg Kroah-Hartman
From: Bob Peterson [ Upstream commit c9cb9e381985bbbe8acd2695bbe6bd24bf06b81c ] Before this patch, function gfs2_quota_unlock checked if quotas are turned off, and if so, it branched to label out, which called gfs2_quota_unhold. With the new system of gfs2_qa_get and put, we no longer want to

[PATCH 5.6 053/177] ARM: dts: omap4-droid4: Fix flakey wlan by disabling internal pull for gpio

2020-06-01 Thread Greg Kroah-Hartman
From: Tony Lindgren [ Upstream commit 30fa60c678eaa27b8f2a531920d77f7184658f73 ] The wlan on droid4 is flakey on some devices, and experiments have shown this gets fixed if we disable the internal pull for wlan gpio interrupt line. The symptoms are that the wlan connection is very slow and

[PATCH 5.6 040/177] net/mlx4_core: fix a memory leak bug.

2020-06-01 Thread Greg Kroah-Hartman
From: Qiushi Wu commit febfd9d3c7f74063e8e630b15413ca91b567f963 upstream. In function mlx4_opreq_action(), pointer "mailbox" is not released, when mlx4_cmd_box() return and error, causing a memory leak bug. Fix this issue by going to "out" label, mlx4_free_cmd_mailbox() can free this pointer.

[RFC PATCH -next] MAINTAINERS: Update F: and X: entry ordering (was Re: [PATCH v2 6/6] MAINTAINERS: Add maintainers for MIPS core drivers)

2020-06-01 Thread Joe Perches
On Mon, 2020-06-01 at 19:04 +0300, Andy Shevchenko wrote: > On Mon, Jun 1, 2020 at 6:52 PM Serge Semin > wrote: > > On Mon, Jun 01, 2020 at 06:30:22PM +0300, Andy Shevchenko wrote: > > > On Mon, Jun 1, 2020 at 6:19 PM Serge Semin > > > wrote: > > > > On Mon, Jun 01, 2020 at 04:56:21PM +0300,

[git pull] vfs patches from Miklos

2020-06-01 Thread Al Viro
Assorted patches from Miklos; an interesting part here is /proc/mounts stuff... The following changes since commit 0e698dfa282211e414076f9dc7e83c1c288314fd: Linux 5.7-rc4 (2020-05-03 14:56:04 -0700) are available in the git repository at:

[PATCH 5.6 006/177] net: dsa: mt7530: fix roaming from DSA user ports

2020-06-01 Thread Greg Kroah-Hartman
From: DENG Qingfang [ Upstream commit 5e5502e012b8129e11be616acb0f9c34bc8f8adb ] When a client moves from a DSA user port to a software port in a bridge, it cannot reach any other clients that connected to the DSA user ports. That is because SA learning on the CPU port is disabled, so the

[PATCH 5.6 038/177] net/tls: free record only on encryption error

2020-06-01 Thread Greg Kroah-Hartman
From: Vadim Fedorenko commit 635d9398178659d8ddba79dd061f9451cec0b4d1 upstream. We cannot free record on any transient error because it leads to losing previos data. Check socket error to know whether record must be freed or not. Fixes: d10523d0b3d7 ("net/tls: free the record on encryption

[PATCH 5.6 009/177] net: inet_csk: Fix so_reuseport bind-address cache in tb->fast*

2020-06-01 Thread Greg Kroah-Hartman
From: Martin KaFai Lau [ Upstream commit 88d7fcfa3b1fe670f0412b95be785aafca63352b ] The commit 637bc8bbe6c0 ("inet: reset tb->fastreuseport when adding a reuseport sk") added a bind-address cache in tb->fast*. The tb->fast* caches the address of a sk which has successfully been binded with

[PATCH 5.6 063/177] cachefiles: Fix race between read_waiter and read_copier involving op->to_do

2020-06-01 Thread Greg Kroah-Hartman
From: Lei Xue [ Upstream commit 7bb0c5338436dae953622470d52689265867f032 ] There is a potential race in fscache operation enqueuing for reading and copying multiple pages from cachefiles to netfs. The problem can be seen easily on a heavy loaded system (for example many processes reading files

[PATCH 5.6 073/177] clk: ti: am33xx: fix RTC clock parent

2020-06-01 Thread Greg Kroah-Hartman
From: Tero Kristo [ Upstream commit dc6dbd51009fc412729c307161f442c0a08618f4 ] Right now, trying to use RTC purely with the ti-sysc / clkctrl framework fails to enable the RTC module properly. Based on experimentation, this appears to be because RTC is sourced from the clkdiv32k optional clock.

[PATCH 5.6 080/177] cifs: Fix null pointer check in cifs_read

2020-06-01 Thread Greg Kroah-Hartman
From: Steve French [ Upstream commit 9bd21d4b1a767c3abebec203342f3820dcb84662 ] Coverity scan noted a redundant null check Coverity-id: 728517 Reported-by: Coverity Signed-off-by: Steve French Reviewed-by: Shyam Prasad N Signed-off-by: Sasha Levin --- fs/cifs/file.c | 2 +- 1 file

[PATCH 5.6 064/177] usb: dwc3: pci: Enable extcon driver for Intel Merrifield

2020-06-01 Thread Greg Kroah-Hartman
From: Andy Shevchenko [ Upstream commit 066c09593454e89bc605ffdff1c9810061f9b1e1 ] Intel Merrifield provides a DR support via PMIC which has its own extcon driver. Add a property string to link to that driver. Signed-off-by: Andy Shevchenko Signed-off-by: Felipe Balbi Signed-off-by: Sasha

[PATCH 5.6 082/177] samples: bpf: Fix build error

2020-06-01 Thread Greg Kroah-Hartman
From: Matteo Croce [ Upstream commit 23ad04669f81f958e9a4121b0266228d2eb3c357 ] GCC 10 is very strict about symbol clash, and lwt_len_hist_user contains a symbol which clashes with libbpf: /usr/bin/ld: samples/bpf/lwt_len_hist_user.o:(.bss+0x0): multiple definition of `bpf_log_buf';

[PATCH 5.6 093/177] ARM: 8970/1: decompressor: increase tag size

2020-06-01 Thread Greg Kroah-Hartman
From: Łukasz Stelmach [ Upstream commit 2c962369d72f286659e6446919f88d69b943cb4d ] The size field of the tag header structure is supposed to be set to the size of a tag structure including the header. Fixes: c772568788b5f0 ("ARM: add additional table to compressed kernel") Signed-off-by:

[PATCH 5.6 081/177] csky: Fixup raw_copy_from_user()

2020-06-01 Thread Greg Kroah-Hartman
From: Al Viro [ Upstream commit 51bb38cb78363fdad1f89e87357b7bc73e39ba88 ] If raw_copy_from_user(to, from, N) returns K, callers expect the first N - K bytes starting at to to have been replaced with the contents of corresponding area starting at from and the last K bytes of destination *left*

Re: [GIT PULL] i3c: Changes for 5.8

2020-06-01 Thread Linus Torvalds
On Mon, Jun 1, 2020 at 12:54 AM Boris Brezillon wrote: > > git://git.kernel.org/pub/scm/linux/kernel/git/i3c/linux.git i3c/for-5.8 Hmm. No such ref.. I see the "i3c/next" branch that has that top commit, but I don't see the signed tag. Forgot to push? "git request-pull" _should_ have warned

[PATCH 5.6 042/177] mlxsw: spectrum: Fix use-after-free of split/unsplit/type_set in case reload fails

2020-06-01 Thread Greg Kroah-Hartman
From: Jiri Pirko commit 4340f42f207eacb81e7a6b6bb1e3b6afad9a2e26 upstream. In case of reload fail, the mlxsw_sp->ports contains a pointer to a freed memory (either by reload_down() or reload_up() error path). Fix this by initializing the pointer to NULL and checking it before dereferencing in

[PATCH 5.6 039/177] net: sun: fix missing release regions in cas_init_one().

2020-06-01 Thread Greg Kroah-Hartman
From: Qiushi Wu commit 5a730153984dd13f82ffae93d7170d76eba204e9 upstream. In cas_init_one(), "pdev" is requested by "pci_request_regions", but it was not released after a call of the function “pci_write_config_byte” failed. Thus replace the jump target “err_write_cacheline” by

[PATCH 5.6 101/177] gpu/drm: Ingenic: Fix opaque pointer casted to wrong type

2020-06-01 Thread Greg Kroah-Hartman
From: Paul Cercueil [ Upstream commit abf56fadf0e208abfb13ad1ac0094416058da0ad ] The opaque pointer passed to the IRQ handler is a pointer to the drm_device, not a pointer to our ingenic_drm structure. It still worked, because our ingenic_drm structure contains the drm_device as its first

Re: [PATCH v2] riscv: fix build warning of missing prototypes

2020-06-01 Thread Atish Patra
On Mon, Jun 1, 2020 at 12:11 AM Zong Li wrote: > > Add the missing header in file, it was lost in original implementation. > > The warning message as follows: > - no previous prototype for 'patch_text_nosync' [-Wmissing-prototypes] > - no previous prototype for 'patch_text'

[PATCH 5.6 122/177] ceph: flush release queue when handling caps for unknown inode

2020-06-01 Thread Greg Kroah-Hartman
From: Jeff Layton [ Upstream commit fb33c114d3ed5bdac230716f5b0a93b56b92a90d ] It's possible for the VFS to completely forget about an inode, but for it to still be sitting on the cap release queue. If the MDS sends the client a cap message for such an inode, it just ignores it today, which can

[PATCH 5.6 078/177] hwmon: (nct7904) Fix incorrect range of temperature limit registers

2020-06-01 Thread Greg Kroah-Hartman
From: Amy Shih [ Upstream commit 7b2fd270af27edaf02acb41a7babe805a9441914 ] The format of temperature limitation registers are 8-bit 2's complement and the range is -128~127. Converts the reading value to signed char to fix the incorrect range of temperature limitation registers.

[PATCH 5.4 095/142] ceph: flush release queue when handling caps for unknown inode

2020-06-01 Thread Greg Kroah-Hartman
From: Jeff Layton [ Upstream commit fb33c114d3ed5bdac230716f5b0a93b56b92a90d ] It's possible for the VFS to completely forget about an inode, but for it to still be sitting on the cap release queue. If the MDS sends the client a cap message for such an inode, it just ignores it today, which can

[PATCH 5.6 098/177] arm64: dts: mt8173: fix vcodec-enc clock

2020-06-01 Thread Greg Kroah-Hartman
From: Hsin-Yi Wang [ Upstream commit 3b1f6c5e4dfaf767f6f2f120cd93b347b5a9f1aa ] Fix the assigned-clock-parents to higher frequency clock to avoid h264 encode timeout: [ 134.763465] mtk_vpu 1002.vpu: vpu ipi 4 ack time out ! [ 134.769008] [MTK_VCODEC][ERROR][18]: vpu_enc_send_msg()

[PATCH 5.6 096/177] ARM: uaccess: fix DACR mismatch with nested exceptions

2020-06-01 Thread Greg Kroah-Hartman
From: Russell King [ Upstream commit 71f8af1110101facfad68989ff91f88f8e2c3e22 ] Tomas Paukrt reports that his SAM9X60 based system (ARM926, ARMv5TJ) fails to fix up alignment faults, eventually resulting in a kernel oops. The problem occurs when using CONFIG_CPU_USE_DOMAINS with commit

[PATCH 5.6 085/177] Input: i8042 - add ThinkPad S230u to i8042 nomux list

2020-06-01 Thread Greg Kroah-Hartman
From: Kevin Locke [ Upstream commit 18931506465a762ffd3f4803d36a18d336a67da9 ] On the Lenovo ThinkPad Twist S230u (3347-4HU) with BIOS version "GDETC1WW (1.81 ) 06/27/2019", whether booted in UEFI or Legacy/CSM mode the keyboard, Synaptics TouchPad, and TrackPoint either do not function or stop

[PATCH 5.6 048/177] arm64: dts: rockchip: swap interrupts interrupt-names rk3399 gpu node

2020-06-01 Thread Greg Kroah-Hartman
From: Johan Jonker [ Upstream commit c604fd810bda667bdc20b2c041917baa7803e0fb ] Dts files with Rockchip rk3399 'gpu' nodes were manually verified. In order to automate this process arm,mali-midgard.txt has been converted to yaml. In the new setup dtbs_check with arm,mali-midgard.yaml expects

[PATCH 5.6 095/177] ARM: uaccess: integrate uaccess_save and uaccess_restore

2020-06-01 Thread Greg Kroah-Hartman
From: Russell King [ Upstream commit 8ede890b0bcebe8c760aacfe20e934d98c3dc6aa ] Integrate uaccess_save / uaccess_restore macros into the new uaccess_entry / uaccess_exit macros respectively. Signed-off-by: Russell King Signed-off-by: Sasha Levin --- arch/arm/include/asm/uaccess-asm.h | 30

[PATCH 5.6 084/177] Input: usbtouchscreen - add support for BonXeon TP

2020-06-01 Thread Greg Kroah-Hartman
From: James Hilliard [ Upstream commit e3b4f94ef52ae1592cbe199bd38dbdc0d58b2217 ] Based on available information this uses the singletouch irtouch protocol. This is tested and confirmed to be fully functional on the BonXeon TP hardware I have. Signed-off-by: James Hilliard Link:

[PATCH 5.6 104/177] ARM: dts: bcm2835-rpi-zero-w: Fix led polarity

2020-06-01 Thread Greg Kroah-Hartman
From: Vincent Stehlé [ Upstream commit 58bb90ab415562eededb932455046924e65df342 ] The status "ACT" led on the Raspberry Pi Zero W is on when GPIO 47 is low. This has been verified on a board and somewhat confirmed by both the GPIO name ("STATUS_LED_N") and the reduced schematics [1]. [1]:

[PATCH 5.6 103/177] ARM: dts/imx6q-bx50v3: Set display interface clock parents

2020-06-01 Thread Greg Kroah-Hartman
From: Robert Beckett [ Upstream commit 665e7c73a7724a393b4ec92d1ae1e029925ef2b7 ] Avoid LDB and IPU DI clocks both using the same parent. LDB requires pasthrough clock to avoid breaking timing while IPU DI does not. Force IPU DI clocks to use IMX6QDL_CLK_PLL2_PFD0_352M as parent and LDB to use

[git pull] uaccess __copy_to_user

2020-06-01 Thread Al Viro
Getting rid of __copy_to_user() callers - stuff that doesn't fit into other series. The following changes since commit 8f3d9f354286745c751374f5f1fcafee6b3f3136: Linux 5.7-rc1 (2020-04-12 12:35:55 -0700) are available in the git repository at:

Re: [PATCH] drivers/net/wan/lapbether.c: Fixed kernel panic when used with AF_PACKET sockets

2020-06-01 Thread David Miller
From: Xie He Date: Wed, 27 May 2020 20:21:33 -0700 > When we use "AF_PACKET" sockets to send data directly over LAPB over > Ethernet using this driver, the kernel will panic because of > insufficient header space allocated in the "sk_buff" struct. > > The header space needs 18 bytes because: >

Re: [PATCH 3/5] arm: decompressor: define a new zImage tag

2020-06-01 Thread Russell King - ARM Linux admin
On Mon, Jun 01, 2020 at 06:19:52PM +0200, Lukasz Stelmach wrote: > It was <2020-06-01 pon 15:55>, when Russell King - ARM Linux admin wrote: > > On Mon, Jun 01, 2020 at 04:27:52PM +0200, Łukasz Stelmach wrote: > >> Add DCSZ tag which holds dynamic memory (stack, bss, malloc pool) > >> requirements

[PATCH 5.6 102/177] IB/qib: Call kobject_put() when kobject_init_and_add() fails

2020-06-01 Thread Greg Kroah-Hartman
From: Kaike Wan [ Upstream commit a35cd6447effd5c239b564c80fa109d05ff3d114 ] When kobject_init_and_add() returns an error in the function qib_create_port_files(), the function kobject_put() is not called for the corresponding kobject, which potentially leads to memory leak. This patch fixes

[PATCH 5.6 109/177] RDMA/mlx5: Fix NULL pointer dereference in destroy_prefetch_work

2020-06-01 Thread Greg Kroah-Hartman
From: Maor Gottlieb [ Upstream commit 189277f3814c36133f4ff0352f4b5194a38486b6 ] q_deferred_work isn't initialized when creating an explicit ODP memory region. This can lead to a NULL pointer dereference when user performs asynchronous prefetch MR. Fix it by initializing q_deferred_work for

Re: [PATCH] gpiolib: split character device into gpiolib-cdev

2020-06-01 Thread kbuild test robot
Hi Kent, Thank you for the patch! Perhaps something to improve: [auto build test WARNING on v5.7-rc5] [cannot apply to gpio/for-next linus/master linux/master v5.7-rc7 v5.7-rc6 next-20200529] [if your patch is applied to the wrong git tree, please drop us a note to help improve the system. BTW,

[PATCH 5.6 117/177] exec: Always set cap_ambient in cap_bprm_set_creds

2020-06-01 Thread Greg Kroah-Hartman
From: Eric W. Biederman [ Upstream commit a4ae32c71fe90794127b32d26d7ad795813b502e ] An invariant of cap_bprm_set_creds is that every field in the new cred structure that cap_bprm_set_creds might set, needs to be set every time to ensure the fields does not get a stale value. The field

<    2   3   4   5   6   7   8   9   10   11   >