[PATCH 5.6 068/177] drm/amd/amdgpu: Update update_config() logic

2020-06-01 Thread Greg Kroah-Hartman
From: Leo (Hanghong) Ma [ Upstream commit 650e723cecf2738dee828564396f3239829aba83 ] [Why] For MST case: when update_config is called to disable a stream, this clears the settings for all the streams on that link. We should only clear the settings for the stream that was disabled. [How] Clear

[PATCH 5.6 007/177] net: ethernet: ti: cpsw: fix ASSERT_RTNL() warning during suspend

2020-06-01 Thread Greg Kroah-Hartman
From: Grygorii Strashko [ Upstream commit 4c64b83d03f4aafcdf710caad994cbc855802e74 ] vlan_for_each() are required to be called with rtnl_lock taken, otherwise ASSERT_RTNL() warning will be triggered - which happens now during System resume from suspend: cpsw_suspend() |- cpsw_ndo_stop()

[PATCH 5.6 057/177] gfs2: move privileged user check to gfs2_quota_lock_check

2020-06-01 Thread Greg Kroah-Hartman
From: Bob Peterson [ Upstream commit 4ed0c30811cb4d30ef89850b787a53a84d5d2bcb ] Before this patch, function gfs2_quota_lock checked if it was called from a privileged user, and if so, it bypassed the quota check: superuser can operate outside the quotas. That's the wrong place for the check

[PATCH 5.6 065/177] usb: phy: twl6030-usb: Fix a resource leak in an error handling path in twl6030_usb_probe()

2020-06-01 Thread Greg Kroah-Hartman
From: Christophe JAILLET [ Upstream commit f058764d19000d98aef72010468db1f69faf9fa0 ] A call to 'regulator_get()' is hidden in 'twl6030_usb_ldo_init()'. A corresponding put must be performed in the error handling path, as already done in the remove function. While at it, also move a

[PATCH 5.6 051/177] gpio: tegra: mask GPIO IRQs during IRQ shutdown

2020-06-01 Thread Greg Kroah-Hartman
From: Stephen Warren [ Upstream commit 0cf253eed5d2bdf7bb3152457b38f39b012955f7 ] The driver currently leaves GPIO IRQs unmasked even when the GPIO IRQ client has released the GPIO IRQ. This allows the HW to raise IRQs, and SW to process them, after shutdown. Fix this by masking the IRQ when

[PATCH 5.6 061/177] drm/amd/powerplay: perform PG ungate prior to CG ungate

2020-06-01 Thread Greg Kroah-Hartman
From: Evan Quan [ Upstream commit f4fcfa4282c1a1bf51475ebb0ffda623eebf1191 ] Since gfxoff should be disabled first before trying to access those GC registers. Signed-off-by: Evan Quan Reviewed-by: Alex Deucher Signed-off-by: Alex Deucher Signed-off-by: Sasha Levin ---

[PATCH 5.6 062/177] drm/amdgpu: Use GEM obj reference for KFD BOs

2020-06-01 Thread Greg Kroah-Hartman
From: Felix Kuehling [ Upstream commit 39b3128d7ffd44e400e581e6f49e88cb42bef9a1 ] Releasing the AMDGPU BO ref directly leads to problems when BOs were exported as DMA bufs. Releasing the GEM reference makes sure that the AMDGPU/TTM BO is not freed too early. Also take a GEM reference when

[PATCH 5.6 050/177] ARM: dts: rockchip: fix pinctrl sub nodename for spi in rk322x.dtsi

2020-06-01 Thread Greg Kroah-Hartman
From: Johan Jonker [ Upstream commit 855bdca1781c79eb661f89c8944c4a719ce720e8 ] A test with the command below gives these errors: arch/arm/boot/dts/rk3229-evb.dt.yaml: spi-0: '#address-cells' is a required property arch/arm/boot/dts/rk3229-evb.dt.yaml: spi-1: '#address-cells' is a required

[PATCH 5.6 056/177] kselftests: dmabuf-heaps: Fix confused return value on expected error testing

2020-06-01 Thread Greg Kroah-Hartman
From: John Stultz [ Upstream commit 4bb9d46d47b105a774f9dca642f5271375bca4b2 ] When I added the expected error testing, I forgot I need to set the return to zero when we successfully see an error. Without this change we only end up testing a single heap before the test quits. Cc: Shuah Khan

[PATCH 5.6 066/177] usb: gadget: legacy: fix redundant initialization warnings

2020-06-01 Thread Greg Kroah-Hartman
From: Masahiro Yamada [ Upstream commit d13cce757954fa663c69845611957396843ed87a ] Fix the following cppcheck warnings: drivers/usb/gadget/legacy/inode.c:1364:8: style: Redundant initialization for 'value'. The initialized value is overwritten$ value = -EOPNOTSUPP; ^

[PATCH 5.6 041/177] net: sgi: ioc3-eth: Fix return value check in ioc3eth_probe()

2020-06-01 Thread Greg Kroah-Hartman
From: Tang Bin commit a7654211d0ffeaa8eb0545ea00f8445242cbce05 upstream. In the function devm_platform_ioremap_resource(), if get resource failed, the return value is ERR_PTR() not NULL. Thus it must be replaced by IS_ERR(), or else it may result in crashes if a critical error path is

[PATCH 5.6 000/177] 5.6.16-rc1 review

2020-06-01 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 5.6.16 release. There are 177 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Wed, 03 Jun 2020 17:38:19 +. Anything

[PATCH 5.6 052/177] ALSA: usb-audio: add mapping for ASRock TRX40 Creator

2020-06-01 Thread Greg Kroah-Hartman
From: Andrew Oakley [ Upstream commit da7a8f1a8fc3e14c6dcc52b4098bddb8f20390be ] This is another TRX40 based motherboard with ALC1220-VB USB-audio that requires a static mapping table. This motherboard also has a PCI device which advertises no codecs. The PCI ID is 1022:1487 and PCI SSID is

[PATCH 5.6 059/177] gfs2: Grab glock reference sooner in gfs2_add_revoke

2020-06-01 Thread Greg Kroah-Hartman
From: Andreas Gruenbacher [ Upstream commit f4e2f5e1a527ce58fc9f85145b03704779a3123e ] This patch rearranges gfs2_add_revoke so that the extra glock reference is added earlier on in the function to avoid races in which the glock is freed before the new reference is taken. Signed-off-by:

[PATCH 5.6 060/177] drm/amdgpu: drop unnecessary cancel_delayed_work_sync on PG ungate

2020-06-01 Thread Greg Kroah-Hartman
From: Evan Quan [ Upstream commit 1fe48ec08d9f2e26d893a6c05bd6c99a3490f9ef ] As this is already properly handled in amdgpu_gfx_off_ctrl(). In fact, this unnecessary cancel_delayed_work_sync may leave a small time window for race condition and is dangerous. Signed-off-by: Evan Quan

[PATCH 5.6 055/177] net: microchip: encx24j600: add missed kthread_stop

2020-06-01 Thread Greg Kroah-Hartman
From: Chuhong Yuan [ Upstream commit ff8ce319e9c25e920d994cc35236f0bb32dfc8f3 ] This driver calls kthread_run() in probe, but forgets to call kthread_stop() in probe failure and remove. Add the missed kthread_stop() to fix it. Signed-off-by: Chuhong Yuan Signed-off-by: David S. Miller

[PATCH 5.6 049/177] ARM: dts: rockchip: swap clock-names of gpu nodes

2020-06-01 Thread Greg Kroah-Hartman
From: Johan Jonker [ Upstream commit b14f3898d2c25a9b47a61fb879d0b1f3af92c59b ] Dts files with Rockchip 'gpu' nodes were manually verified. In order to automate this process arm,mali-utgard.txt has been converted to yaml. In the new setup dtbs_check with arm,mali-utgard.yaml expects clock-names

[PATCH 5.6 067/177] net: freescale: select CONFIG_FIXED_PHY where needed

2020-06-01 Thread Greg Kroah-Hartman
From: Arnd Bergmann [ Upstream commit 99352c79af3e5f2e4724abf37fa5a2a3299b1c81 ] I ran into a randconfig build failure with CONFIG_FIXED_PHY=m and CONFIG_GIANFAR=y: x86_64-linux-ld: drivers/net/ethernet/freescale/gianfar.o:(.rodata+0x418): undefined reference to `fixed_phy_change_carrier' It

[PATCH 5.6 026/177] net/mlx5e: Update netdev txq on completions during closure

2020-06-01 Thread Greg Kroah-Hartman
From: Moshe Shemesh [ Upstream commit 5e911e2c06bd8c17df29147a5e2d4b17fafda024 ] On sq closure when we free its descriptors, we should also update netdev txq on completions which would not arrive. Otherwise if we reopen sqs and attach them back, for example on fw fatal recovery flow, we may get

[PATCH 5.6 029/177] wireguard: queueing: preserve flow hash across packet scrubbing

2020-06-01 Thread Greg Kroah-Hartman
From: "Jason A. Donenfeld" [ Upstream commit c78a0b4a78839d572d8a80f6a62221c0d7843135 ] It's important that we clear most header fields during encapsulation and decapsulation, because the packet is substantially changed, and we don't want any info leak or logic bug due to an accidental

[PATCH 5.6 027/177] net/mlx5: Fix error flow in case of function_setup failure

2020-06-01 Thread Greg Kroah-Hartman
From: Shay Drory [ Upstream commit 4f7400d5cbaef676e00cdffb0565bf731c6bb09e ] Currently, if an error occurred during mlx5_function_setup(), we keep dev->state as DEVICE_STATE_UP. Fixing it by adding a goto label. Fixes: e161105e58da ("net/mlx5: Function setup/teardown procedures")

[PATCH 5.6 035/177] net/mlx5: Avoid processing commands before cmdif is ready

2020-06-01 Thread Greg Kroah-Hartman
From: Eran Ben Elisha commit f7936ddd35d8b849daf0372770c7c9dbe7910fca upstream. When driver is reloading during recovery flow, it can't get new commands till command interface is up again. Otherwise we may get to null pointer trying to access non initialized command structures. Add cmdif state

[PATCH 5.6 022/177] tipc: block BH before using dst_cache

2020-06-01 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 1378817486d6860f6a927f573491afe65287abf1 ] dst_cache_get() documents it must be used with BH disabled. sysbot reported : BUG: using smp_processor_id() in preemptible [] code: /21697 caller is dst_cache_get+0x3a/0xb0 net/core/dst_cache.c:68 CPU: 0

[PATCH 5.6 032/177] net/mlx5: Fix a race when moving command interface to events mode

2020-06-01 Thread Greg Kroah-Hartman
From: Eran Ben Elisha [ Upstream commit d43b7007dbd1195a5b6b83213e49b1516aaf6f5e ] After driver creates (via FW command) an EQ for commands, the driver will be informed on new commands completion by EQE. However, due to a race in driver's internal command mode metadata update, some new commands

[PATCH 5.6 031/177] r8169: fix OCP access on RTL8117

2020-06-01 Thread Greg Kroah-Hartman
From: Heiner Kallweit [ Upstream commit 561535b0f23961ced071b82575d5e83e6351a814 ] According to r8168 vendor driver DASHv3 chips like RTL8168fp/RTL8117 need a special addressing for OCP access. Fix is compile-tested only due to missing test hardware. Fixes: 1287723aa139 ("r8169: add support

[PATCH 5.6 002/177] dpaa_eth: fix usage as DSA master, try 3

2020-06-01 Thread Greg Kroah-Hartman
From: Vladimir Oltean [ Upstream commit 5d14c304bfc14b4fd052dc83d5224376b48f52f0 ] The dpaa-eth driver probes on compatible string for the MAC node, and the fman/mac.c driver allocates a dpaa-ethernet platform device that triggers the probing of the dpaa-eth net device driver. All of this is

[PATCH 5.6 021/177] sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed

2020-06-01 Thread Greg Kroah-Hartman
From: "Jere Lepp�nen" [ Upstream commit d3e8e4c11870413789f029a71e72ae6e971fe678 ] Commit bdf6fa52f01b ("sctp: handle association restarts when the socket is closed.") starts shutdown when an association is restarted, if in SHUTDOWN-PENDING state and the socket is closed. However, the rationale

[PATCH 5.6 034/177] Revert "virtio-balloon: Revert "virtio-balloon: Switch back to OOM handler for VIRTIO_BALLOON_F_DEFLATE_ON_OOM""

2020-06-01 Thread Greg Kroah-Hartman
From: Greg Kroah-Hartman This reverts commit 37681282be8e89ae8baf26753bf489837d74e08e which is commit 835a6a649d0dd1b1f46759eb60fff2f63ed253a7 upstream. Jiri and David agree that it is not needed in the 5.6.y tree, so revert it. Reported-by: Jiri Slaby Reported-by: David Hildenbrand Cc:

[PATCH 5.6 033/177] net/mlx5: Fix cleaning unmanaged flow tables

2020-06-01 Thread Greg Kroah-Hartman
From: Roi Dayan [ Upstream commit aee37f3d940ca732df71c3df49347bccaafc0b24 ] Unmanaged flow tables doesn't have a parent and tree_put_node() assume there is always a parent if cleaning is needed. fix that. Fixes: 5281a0c90919 ("net/mlx5: fs_core: Introduce unmanaged flow tables")

[PATCH 5.4 129/142] xsk: Add overflow check for u64 division, stored into u32

2020-06-01 Thread Greg Kroah-Hartman
From: Björn Töpel commit b16a87d0aef7a6be766f6618976dc5ff2c689291 upstream. The npgs member of struct xdp_umem is an u32 entity, and stores the number of pages the UMEM consumes. The calculation of npgs npgs = size / PAGE_SIZE can overflow. To avoid overflow scenarios, the division is now

[PATCH 5.6 016/177] net sched: fix reporting the first-time use timestamp

2020-06-01 Thread Greg Kroah-Hartman
From: Roman Mashak [ Upstream commit b15e62631c5f19fea9895f7632dae9c1b27fe0cd ] When a new action is installed, firstuse field of 'tcf_t' is explicitly set to 0. Value of zero means "new action, not yet used"; as a packet hits the action, 'firstuse' is stamped with the current jiffies value.

[PATCH 5.4 139/142] netfilter: conntrack: comparison of unsigned in cthelper confirmation

2020-06-01 Thread Greg Kroah-Hartman
From: Pablo Neira Ayuso commit 94945ad2b330207cded0fd8d4abebde43a776dfb upstream. net/netfilter/nf_conntrack_core.c: In function nf_confirm_cthelper: net/netfilter/nf_conntrack_core.c:2117:15: warning: comparison of unsigned expression in < 0 is always false [-Wtype-limits] 2117 | if

[PATCH 5.4 102/142] include/asm-generic/topology.h: guard cpumask_of_node() macro argument

2020-06-01 Thread Greg Kroah-Hartman
From: Arnd Bergmann [ Upstream commit 4377748c7b5187c3342a60fa2ceb60c8a57a8488 ] drivers/hwmon/amd_energy.c:195:15: error: invalid operands to binary expression ('void' and 'int') (channel - data->nr_cpus));

[PATCH 5.6 014/177] net: qrtr: Fix passing invalid reference to qrtr_local_enqueue()

2020-06-01 Thread Greg Kroah-Hartman
From: Manivannan Sadhasivam [ Upstream commit d28ea1fbbf437054ef339afec241019f2c4e2bb6 ] Once the traversal of the list is completed with list_for_each_entry(), the iterator (node) will point to an invalid object. So passing this to qrtr_local_enqueue() which is outside of the iterator block is

[PATCH 5.4 133/142] nexthops: dont modify published nexthop groups

2020-06-01 Thread Greg Kroah-Hartman
From: Nikolay Aleksandrov commit 90f33bffa382598a32cc82abfeb20adc92d041b6 upstream. We must avoid modifying published nexthop groups while they might be in use, otherwise we might see NULL ptr dereferences. In order to do that we allocate 2 nexthoup group structures upon nexthop creation and

[PATCH 5.4 136/142] net: dsa: declare lockless TX feature for slave ports

2020-06-01 Thread Greg Kroah-Hartman
From: Vladimir Oltean commit 2b86cb8299765688c5119fd18d5f436716c81010 upstream. Be there a platform with the following layout: Regular NIC | +> DSA master for switch port | +> DSA master for another switch port After changing DSA back

[PATCH 5.6 012/177] net: mvpp2: fix RX hashing for non-10G ports

2020-06-01 Thread Greg Kroah-Hartman
From: Russell King [ Upstream commit 3138a07ce219acde4c0d7ea0b6d54ba64153328b ] When rxhash is enabled on any ethernet port except the first in each CP block, traffic flow is prevented. The analysis is below: I've been investigating this afternoon, and what I've found, comparing a kernel

[PATCH 5.4 123/142] netfilter: conntrack: make conntrack userspace helpers work again

2020-06-01 Thread Greg Kroah-Hartman
From: Pablo Neira Ayuso commit ee04805ff54a63ffd90bc6749ebfe73473734ddb upstream. Florian Westphal says: "Problem is that after the helper hook was merged back into the confirm one, the queueing itself occurs from the confirm hook, i.e. we queue from the last netfilter callback in the

[PATCH 5.4 105/142] iommu: Fix reference count leak in iommu_group_alloc.

2020-06-01 Thread Greg Kroah-Hartman
From: Qiushi Wu [ Upstream commit 7cc31613734c4870ae32f5265d576ef296621343 ] kobject_init_and_add() takes reference even when it fails. Thus, when kobject_init_and_add() returns an error, kobject_put() must be called to properly clean up the kobject. Fixes: d72e31c93746 ("iommu: IOMMU Groups")

[PATCH 5.4 127/142] bnxt_en: Fix accumulation of bp->net_stats_prev.

2020-06-01 Thread Greg Kroah-Hartman
From: Michael Chan commit b8056e8434b037fdab08158fea99ed7bc8ef3a74 upstream. We have logic to maintain network counters across resets by storing the counters in bp->net_stats_prev before reset. But not all resets will clear the counters. Certain resets that don't need to change the number of

[PATCH 5.4 108/142] x86/syscalls: Revert "x86/syscalls: Make __X32_SYSCALL_BIT be unsigned long"

2020-06-01 Thread Greg Kroah-Hartman
From: Andy Lutomirski commit 700d3a5a664df267f01ec8887fd2d8ff98f67e7f upstream. Revert 45e29d119e99 ("x86/syscalls: Make __X32_SYSCALL_BIT be unsigned long") and add a comment to discourage someone else from making the same mistake again. It turns out that some user code fails to compile

[PATCH 5.4 134/142] nexthop: Expand nexthop_is_multipath in a few places

2020-06-01 Thread Greg Kroah-Hartman
From: David Ahern commit 0b5e2e39739e861fa5fc84ab27a35dbe62a15330 upstream. I got too fancy consolidating checks on multipath type. The result is that path lookups can access 2 different nh_grp structs as exposed by Nik's torture tests. Expand nexthop_is_multipath within nexthop.h to avoid

[PATCH 5.4 106/142] parisc: Fix kernel panic in mem_init()

2020-06-01 Thread Greg Kroah-Hartman
From: Helge Deller [ Upstream commit bf71bc16e02162388808949b179d59d0b571b965 ] The Debian kernel v5.6 triggers this kernel panic: Kernel panic - not syncing: Bad Address (null pointer deref?) Bad Address (null pointer deref?): Code=26 (Data memory access rights trap) at addr

[PATCH 5.4 109/142] mac80211: mesh: fix discovery timer re-arming issue / crash

2020-06-01 Thread Greg Kroah-Hartman
From: Linus Lüssing commit e2d4a80f93fcfaf72e2e20daf6a28e39c3b90677 upstream. On a non-forwarding 802.11s link between two fairly busy neighboring nodes (iperf with -P 16 at ~850MBit/s TCP; 1733.3 MBit/s VHT-MCS 9 80MHz short GI VHT-NSS 4), so with frequent PREQ retries, usually after around

[PATCH 5.6 010/177] net: ipip: fix wrong address family in init error path

2020-06-01 Thread Greg Kroah-Hartman
From: Vadim Fedorenko [ Upstream commit 57ebc8f08504f176eb0f25b3e0fde517dec61a4f ] In case of error with MPLS support the code is misusing AF_INET instead of AF_MPLS. Fixes: 1b69e7e6c4da ("ipip: support MPLS over IPv4") Signed-off-by: Vadim Fedorenko Signed-off-by: David S. Miller

[PATCH 5.4 140/142] netfilter: conntrack: Pass value of ctinfo to __nf_conntrack_update

2020-06-01 Thread Greg Kroah-Hartman
From: Nathan Chancellor commit 46c1e0621a72e0469ec4edfdb6ed4d387ec34f8a upstream. Clang warns: net/netfilter/nf_conntrack_core.c:2068:21: warning: variable 'ctinfo' is uninitialized when used here [-Wuninitialized] nf_ct_set(skb, ct, ctinfo); ^~

[PATCH 5.6 018/177] nexthop: Fix attribute checking for groups

2020-06-01 Thread Greg Kroah-Hartman
From: David Ahern [ Upstream commit 84be69b869a5a496a6cfde9b3c29509207a1f1fa ] For nexthop groups, attributes after NHA_GROUP_TYPE are invalid, but nh_check_attr_group starts checking at NHA_GROUP. The group type defaults to multipath and the NHA_GROUP_TYPE is currently optional so this has

[PATCH 5.4 131/142] crypto: chelsio/chtls: properly set tp->lsndtime

2020-06-01 Thread Greg Kroah-Hartman
From: Eric Dumazet commit a4976a3ef844c510ae9120290b23e9f3f47d6bce upstream. TCP tp->lsndtime unit/base is tcp_jiffies32, not tcp_time_stamp() Fixes: 36bedb3f2e5b ("crypto: chtls - Inline TLS record Tx") Signed-off-by: Eric Dumazet Cc: Ayush Sawal Cc: Vinay Kumar Yadav Signed-off-by: David

[PATCH 5.4 130/142] qlcnic: fix missing release in qlcnic_83xx_interrupt_test.

2020-06-01 Thread Greg Kroah-Hartman
From: Qiushi Wu commit 15c973858903009e995b2037683de29dfe968621 upstream. In function qlcnic_83xx_interrupt_test(), function qlcnic_83xx_diag_alloc_res() is not handled by function qlcnic_83xx_diag_free_res() after a call of the function qlcnic_alloc_mbx_args() failed. Fix this issue by adding

[PATCH 5.4 107/142] cfg80211: fix debugfs rename crash

2020-06-01 Thread Greg Kroah-Hartman
From: Johannes Berg commit 0bbab5f0301587cad4e923ccc49bb910db86162c upstream. Removing the "if (IS_ERR(dir)) dir = NULL;" check only works if we adjust the remaining code to not rely on it being NULL. Check IS_ERR_OR_NULL() before attempting to dereference it. I'm not actually entirely sure

[PATCH 5.4 121/142] netfilter: nft_reject_bridge: enable reject with bridge vlan

2020-06-01 Thread Greg Kroah-Hartman
From: Michael Braun commit e9c284ec4b41c827f4369973d2792992849e4fa5 upstream. Currently, using the bridge reject target with tagged packets results in untagged packets being sent back. Fix this by mirroring the vlan id as well. Fixes: 85f5b3086a04 ("netfilter: bridge: add reject support")

[PATCH 5.4 120/142] ip_vti: receive ipip packet by calling ip_tunnel_rcv

2020-06-01 Thread Greg Kroah-Hartman
From: Xin Long commit 976eba8ab596bab94b9714cd46d38d5c6a2c660d upstream. In Commit dd9ee3444014 ("vti4: Fix a ipip packet processing bug in 'IPCOMP' virtual tunnel"), it tries to receive IPIP packets in vti by calling xfrm_input(). This case happens when a small packet or frag sent by peer is

[PATCH 5.4 117/142] xfrm: fix a warning in xfrm_policy_insert_list

2020-06-01 Thread Greg Kroah-Hartman
From: Xin Long commit ed17b8d377eaf6b4a01d46942b4c647378a79bdd upstream. This waring can be triggered simply by: # ip xfrm policy update src 192.168.1.1/24 dst 192.168.1.2/24 dir in \ priority 1 mark 0 mask 0x10 #[1] # ip xfrm policy update src 192.168.1.1/24 dst 192.168.1.2/24 dir in

[PATCH 5.4 113/142] xfrm: do pskb_pull properly in __xfrm_transport_prep

2020-06-01 Thread Greg Kroah-Hartman
From: Xin Long commit 06a0afcfe2f551ff755849ea2549b0d8409fd9a0 upstream. For transport mode, when ipv6 nexthdr is set, the packet format might be like: || dest | | | | ESP| ESP | | IP6 hdr| opts.| ESP |

[PATCH 5.4 114/142] xfrm: remove the xfrm_state_put call becofe going to out_reset

2020-06-01 Thread Greg Kroah-Hartman
From: Xin Long commit db87668ad1e4917cfe04e217307ba6ed9390716e upstream. This xfrm_state_put call in esp4/6_gro_receive() will cause double put for state, as in out_reset path secpath_reset() will put all states set in skb sec_path. So fix it by simply remove the xfrm_state_put call. Fixes:

[PATCH 5.4 118/142] xfrm: fix a NULL-ptr deref in xfrm_local_error

2020-06-01 Thread Greg Kroah-Hartman
From: Xin Long commit f6a23d85d078c2ffde79c66ca81d0a1dde451649 upstream. This patch is to fix a crash: [ ] kasan: GPF could be caused by NULL-ptr deref or user memory access [ ] general protection fault: [#1] SMP KASAN PTI [ ] RIP: 0010:ipv6_local_error+0xac/0x7a0 [ ] Call Trace:

[PATCH 5.4 059/142] cifs: Fix null pointer check in cifs_read

2020-06-01 Thread Greg Kroah-Hartman
From: Steve French [ Upstream commit 9bd21d4b1a767c3abebec203342f3820dcb84662 ] Coverity scan noted a redundant null check Coverity-id: 728517 Reported-by: Coverity Signed-off-by: Steve French Reviewed-by: Shyam Prasad N Signed-off-by: Sasha Levin --- fs/cifs/file.c | 2 +- 1 file

[PATCH 5.4 066/142] Input: xpad - add custom init packet for Xbox One S controllers

2020-06-01 Thread Greg Kroah-Hartman
From: Łukasz Patron [ Upstream commit 764f7f911bf72450c51eb74cbb262ad9933741d8 ] Sending [ 0x05, 0x20, 0x00, 0x0f, 0x06 ] packet for Xbox One S controllers fixes an issue where controller is stuck in Bluetooth mode and not sending any inputs. Signed-off-by: Łukasz Patron Reviewed-by: Cameron

[PATCH 5.4 065/142] Input: evdev - call input_flush_device() on release(), not flush()

2020-06-01 Thread Greg Kroah-Hartman
From: Brendan Shanks [ Upstream commit 09264098ff153f60866039d60b31d39b66f55a31 ] input_flush_device() should only be called once the struct file is being released and no open descriptors remain, but evdev_flush() was calling it whenever a file descriptor was closed. This caused uploaded

[PATCH 5.4 100/142] mm: remove VM_BUG_ON(PageSlab()) from page_mapcount()

2020-06-01 Thread Greg Kroah-Hartman
From: Konstantin Khlebnikov [ Upstream commit 6988f31d558aa8c744464a7f6d91d34ada48ad12 ] Replace superfluous VM_BUG_ON() with comment about correct usage. Technically reverts commit 1d148e218a0d ("mm: add VM_BUG_ON_PAGE() to page_mapcount()"), but context lines have changed. Function

[PATCH 5.4 094/142] libceph: ignore pool overlay and cache logic on redirects

2020-06-01 Thread Greg Kroah-Hartman
From: Jerry Lee [ Upstream commit 890bd0f8997ae6ac0a367dd5146154a3963306dd ] OSD client should ignore cache/overlay flag if got redirect reply. Otherwise, the client hangs when the cache tier is in forward mode. [ idryomov: Redirects are effectively deprecated and no longer used or tested.

[PATCH 5.4 099/142] mm,thp: stop leaking unreleased file pages

2020-06-01 Thread Greg Kroah-Hartman
From: Hugh Dickins [ Upstream commit 2f33a706027c94cd4f70fcd3e3f4a17c1ce4ea4b ] When collapse_file() calls try_to_release_page(), it has already isolated the page: so if releasing buffers happens to fail (as it sometimes does), remember to putback_lru_page(): otherwise that page is left

[PATCH 5.4 096/142] RDMA/core: Fix double destruction of uobject

2020-06-01 Thread Greg Kroah-Hartman
From: Jason Gunthorpe [ Upstream commit c85f4abe66bea0b5db8d28d55da760c4fe0a0301 ] Fix use after free when user user space request uobject concurrently for the same object, within the RCU grace period. In that case, remove_handle_idr_uobject() is called twice and we will have an extra put on

[PATCH 5.4 093/142] ALSA: hda/realtek - Add new codec supported for ALC287

2020-06-01 Thread Greg Kroah-Hartman
From: Kailang Yang [ Upstream commit 630e36126e420e1756378b3427b42711ce0b9ddd ] Enable new codec supported for ALC287. Signed-off-by: Kailang Yang Cc: Link: https://lore.kernel.org/r/dcf5ce5507104d0589a917cbb71dc...@realtek.com Signed-off-by: Takashi Iwai Signed-off-by: Sasha Levin ---

[PATCH 5.4 089/142] ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC

2020-06-01 Thread Greg Kroah-Hartman
From: Chris Chiu [ Upstream commit 4020d1ccbe55bdf67b31d718d2400506eaf4b43f ] The Asus USB DAC is a USB type-C audio dongle for connecting to the headset and headphone. The volume minimum value -23040 which is 0xa600 in hexadecimal with the resolution value 1 indicates this should be endianness

[PATCH 5.4 063/142] Input: usbtouchscreen - add support for BonXeon TP

2020-06-01 Thread Greg Kroah-Hartman
From: James Hilliard [ Upstream commit e3b4f94ef52ae1592cbe199bd38dbdc0d58b2217 ] Based on available information this uses the singletouch irtouch protocol. This is tested and confirmed to be fully functional on the BonXeon TP hardware I have. Signed-off-by: James Hilliard Link:

[PATCH 5.4 097/142] drm/amd/display: drop cursor position check in atomic test

2020-06-01 Thread Greg Kroah-Hartman
From: Simon Ser [ Upstream commit f7d5991b92ff824798693ddf231cf814c9d5a88b ] get_cursor_position already handles the case where the cursor has negative off-screen coordinates by not setting dc_cursor_position.enabled. Signed-off-by: Simon Ser Fixes: 626bf90fe03f ("drm/amd/display: add basic

[PATCH 5.4 098/142] IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode

2020-06-01 Thread Greg Kroah-Hartman
From: Valentine Fatiev [ Upstream commit 1acba6a817852d4aa7916d5c4f2c82f702ee9224 ] When connected mode is set, and we have connected and datagram traffic in parallel, ipoib might crash with double free of datagram skb. The current mechanism assumes that the order in the completion queue is

[PATCH 5.4 090/142] exec: Always set cap_ambient in cap_bprm_set_creds

2020-06-01 Thread Greg Kroah-Hartman
From: Eric W. Biederman [ Upstream commit a4ae32c71fe90794127b32d26d7ad795813b502e ] An invariant of cap_bprm_set_creds is that every field in the new cred structure that cap_bprm_set_creds might set, needs to be set every time to ensure the fields does not get a stale value. The field

[PATCH 5.4 088/142] ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround

2020-06-01 Thread Greg Kroah-Hartman
From: Takashi Iwai [ Upstream commit 399c01aa49e548c82d40f8161915a5941dd3c60e ] We fixed the regression of the speaker volume for some Thinkpad models (e.g. T570) by the commit 54947cd64c1b ("ALSA: hda/realtek - Fix speaker output regression on Thinkpad T570"). Essentially it fixes the DAC /

[PATCH 5.4 074/142] ARM: uaccess: fix DACR mismatch with nested exceptions

2020-06-01 Thread Greg Kroah-Hartman
From: Russell King [ Upstream commit 71f8af1110101facfad68989ff91f88f8e2c3e22 ] Tomas Paukrt reports that his SAM9X60 based system (ARM926, ARMv5TJ) fails to fix up alignment faults, eventually resulting in a kernel oops. The problem occurs when using CONFIG_CPU_USE_DOMAINS with commit

[PATCH 5.4 069/142] Input: synaptics-rmi4 - really fix attn_data use-after-free

2020-06-01 Thread Greg Kroah-Hartman
From: Evan Green [ Upstream commit d5a5e5b5fa7b86c05bf073acc0ba98fa280174ec ] Fix a use-after-free noticed by running with KASAN enabled. If rmi_irq_fn() is run twice in a row, then rmi_f11_attention() (among others) will end up reading from drvdata->attn_data.data, which was freed and left

[PATCH 5.4 073/142] ARM: uaccess: integrate uaccess_save and uaccess_restore

2020-06-01 Thread Greg Kroah-Hartman
From: Russell King [ Upstream commit 8ede890b0bcebe8c760aacfe20e934d98c3dc6aa ] Integrate uaccess_save / uaccess_restore macros into the new uaccess_entry / uaccess_exit macros respectively. Signed-off-by: Russell King Signed-off-by: Sasha Levin --- arch/arm/include/asm/uaccess-asm.h | 30

[PATCH 5.4 084/142] gpio: pxa: Fix return value of pxa_gpio_probe()

2020-06-01 Thread Greg Kroah-Hartman
From: Tiezhu Yang [ Upstream commit 558ab2e8155e5f42ca0a6407957cd4173dc166cc ] When call function devm_platform_ioremap_resource(), we should use IS_ERR() to check the return value and return PTR_ERR() if failed. Fixes: 542c25b7a209 ("drivers: gpio: pxa: use devm_platform_ioremap_resource()")

[PATCH 5.4 086/142] RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe()

2020-06-01 Thread Greg Kroah-Hartman
From: Qiushi Wu [ Upstream commit db857e6ae548f0f4f4a0f63fffeeedf3cca21f9d ] In function pvrdma_pci_probe(), pdev was not disabled in one error path. Thus replace the jump target “err_free_device” by "err_disable_pdev". Fixes: 29c8d9eba550 ("IB: Add vmw_pvrdma driver") Link:

[PATCH 5.4 083/142] mmc: block: Fix use-after-free issue for rpmb

2020-06-01 Thread Greg Kroah-Hartman
From: Peng Hao [ Upstream commit 202500d21654874aa03243e91f96de153ec61860 ] The data structure member “rpmb->md” was passed to a call of the function “mmc_blk_put” after a call of the function “put_device”. Reorder these function calls to keep the data accesses consistent. Fixes: 1c87f7357849

[PATCH 5.4 075/142] gpio: exar: Fix bad handling for ida_simple_get error path

2020-06-01 Thread Greg Kroah-Hartman
From: Takashi Iwai [ Upstream commit 333830aa149a87cabeb5d30fbcf12eecc8040d2c ] The commit 7ecced0934e5 ("gpio: exar: add a check for the return value of ida_simple_get fails") added a goto jump to the common error handler for ida_simple_get() error, but this is wrong in two ways: it doesn't

[PATCH 5.4 071/142] ARM: 8970/1: decompressor: increase tag size

2020-06-01 Thread Greg Kroah-Hartman
From: Łukasz Stelmach [ Upstream commit 2c962369d72f286659e6446919f88d69b943cb4d ] The size field of the tag header structure is supposed to be set to the size of a tag structure including the header. Fixes: c772568788b5f0 ("ARM: add additional table to compressed kernel") Signed-off-by:

[PATCH 5.4 080/142] ARM: dts/imx6q-bx50v3: Set display interface clock parents

2020-06-01 Thread Greg Kroah-Hartman
From: Robert Beckett [ Upstream commit 665e7c73a7724a393b4ec92d1ae1e029925ef2b7 ] Avoid LDB and IPU DI clocks both using the same parent. LDB requires pasthrough clock to avoid breaking timing while IPU DI does not. Force IPU DI clocks to use IMX6QDL_CLK_PLL2_PFD0_352M as parent and LDB to use

[PATCH 5.4 023/142] net/mlx5: Fix memory leak in mlx5_events_init

2020-06-01 Thread Greg Kroah-Hartman
From: Moshe Shemesh [ Upstream commit df14ad1eccb04a4a28c90389214dbacab085b244 ] Fix memory leak in mlx5_events_init(), in case create_single_thread_workqueue() fails, events struct should be freed. Fixes: 5d3c537f9070 ("net/mlx5: Handle event of power detection in the PCIE slot")

[PATCH 5.4 024/142] net/mlx5e: Update netdev txq on completions during closure

2020-06-01 Thread Greg Kroah-Hartman
From: Moshe Shemesh [ Upstream commit 5e911e2c06bd8c17df29147a5e2d4b17fafda024 ] On sq closure when we free its descriptors, we should also update netdev txq on completions which would not arrive. Otherwise if we reopen sqs and attach them back, for example on fw fatal recovery flow, we may get

[PATCH 5.4 060/142] csky: Fixup raw_copy_from_user()

2020-06-01 Thread Greg Kroah-Hartman
From: Al Viro [ Upstream commit 51bb38cb78363fdad1f89e87357b7bc73e39ba88 ] If raw_copy_from_user(to, from, N) returns K, callers expect the first N - K bytes starting at to to have been replaced with the contents of corresponding area starting at from and the last K bytes of destination *left*

[PATCH 5.4 016/142] nexthop: Fix attribute checking for groups

2020-06-01 Thread Greg Kroah-Hartman
From: David Ahern [ Upstream commit 84be69b869a5a496a6cfde9b3c29509207a1f1fa ] For nexthop groups, attributes after NHA_GROUP_TYPE are invalid, but nh_check_attr_group starts checking at NHA_GROUP. The group type defaults to multipath and the NHA_GROUP_TYPE is currently optional so this has

[PATCH 5.4 079/142] IB/qib: Call kobject_put() when kobject_init_and_add() fails

2020-06-01 Thread Greg Kroah-Hartman
From: Kaike Wan [ Upstream commit a35cd6447effd5c239b564c80fa109d05ff3d114 ] When kobject_init_and_add() returns an error in the function qib_create_port_files(), the function kobject_put() is not called for the corresponding kobject, which potentially leads to memory leak. This patch fixes

[PATCH 5.4 058/142] hwmon: (nct7904) Fix incorrect range of temperature limit registers

2020-06-01 Thread Greg Kroah-Hartman
From: Amy Shih [ Upstream commit 7b2fd270af27edaf02acb41a7babe805a9441914 ] The format of temperature limitation registers are 8-bit 2's complement and the range is -128~127. Converts the reading value to signed char to fix the incorrect range of temperature limitation registers.

[PATCH 5.4 025/142] net/mlx5: Fix error flow in case of function_setup failure

2020-06-01 Thread Greg Kroah-Hartman
From: Shay Drory [ Upstream commit 4f7400d5cbaef676e00cdffb0565bf731c6bb09e ] Currently, if an error occurred during mlx5_function_setup(), we keep dev->state as DEVICE_STATE_UP. Fixing it by adding a goto label. Fixes: e161105e58da ("net/mlx5: Function setup/teardown procedures")

[PATCH 5.4 003/142] net: dont return invalid table id error when we fall back to PF_UNSPEC

2020-06-01 Thread Greg Kroah-Hartman
From: Sabrina Dubroca [ Upstream commit 41b4bd986f86331efc599b9a3f5fb86ad92e9af9 ] In case we can't find a ->dumpit callback for the requested (family,type) pair, we fall back to (PF_UNSPEC,type). In effect, we're in the same situation as if userspace had requested a PF_UNSPEC dump. For

Re: [PATCH RFC] seccomp: Implement syscall isolation based on memory areas

2020-06-01 Thread Gabriel Krisman Bertazi
Andy Lutomirski writes: > On Sun, May 31, 2020 at 11:57 AM Andy Lutomirski wrote: >> >> >> What if there was a special filter type that ran a BPF program on each >> syscall, and the program was allowed to access user memory to make its >> decisions, e.g. to look at some list of memory

[PATCH 5.4 052/142] IB/i40iw: Remove bogus call to netdev_master_upper_dev_get()

2020-06-01 Thread Greg Kroah-Hartman
From: Denis V. Lunev [ Upstream commit 856ec7f64688387b100b7083cdf480ce3ac41227 ] Local variable netdev is not used in these calls. It should be noted, that this change is required to work in bonded mode. Otherwise we would get the following assert: "RTNL: assertion failed at net/core/dev.c

[PATCH 5.4 004/142] net: dsa: mt7530: fix roaming from DSA user ports

2020-06-01 Thread Greg Kroah-Hartman
From: DENG Qingfang [ Upstream commit 5e5502e012b8129e11be616acb0f9c34bc8f8adb ] When a client moves from a DSA user port to a software port in a bridge, it cannot reach any other clients that connected to the DSA user ports. That is because SA learning on the CPU port is disabled, so the

[PATCH 5.4 047/142] cachefiles: Fix race between read_waiter and read_copier involving op->to_do

2020-06-01 Thread Greg Kroah-Hartman
From: Lei Xue [ Upstream commit 7bb0c5338436dae953622470d52689265867f032 ] There is a potential race in fscache operation enqueuing for reading and copying multiple pages from cachefiles to netfs. The problem can be seen easily on a heavy loaded system (for example many processes reading files

[PATCH 5.4 042/142] gfs2: dont call quota_unhold if quotas are not locked

2020-06-01 Thread Greg Kroah-Hartman
From: Bob Peterson [ Upstream commit c9cb9e381985bbbe8acd2695bbe6bd24bf06b81c ] Before this patch, function gfs2_quota_unlock checked if quotas are turned off, and if so, it branched to label out, which called gfs2_quota_unhold. With the new system of gfs2_qa_get and put, we no longer want to

[PATCH 5.4 002/142] dpaa_eth: fix usage as DSA master, try 3

2020-06-01 Thread Greg Kroah-Hartman
From: Vladimir Oltean [ Upstream commit 5d14c304bfc14b4fd052dc83d5224376b48f52f0 ] The dpaa-eth driver probes on compatible string for the MAC node, and the fman/mac.c driver allocates a dpaa-ethernet platform device that triggers the probing of the dpaa-eth net device driver. All of this is

[PATCH 5.4 046/142] drm/amdgpu: Use GEM obj reference for KFD BOs

2020-06-01 Thread Greg Kroah-Hartman
From: Felix Kuehling [ Upstream commit 39b3128d7ffd44e400e581e6f49e88cb42bef9a1 ] Releasing the AMDGPU BO ref directly leads to problems when BOs were exported as DMA bufs. Releasing the GEM reference makes sure that the AMDGPU/TTM BO is not freed too early. Also take a GEM reference when

[PATCH 5.4 017/142] r8152: support additional Microsoft Surface Ethernet Adapter variant

2020-06-01 Thread Greg Kroah-Hartman
From: Marc Payne [ Upstream commit c27a204383616efba5a4194075e90819961ff66a ] Device id 0927 is the RTL8153B-based component of the 'Surface USB-C to Ethernet and USB Adapter' and may be used as a component of other devices in future. Tested and working with the r8152 driver. Update the

[PATCH 5.4 009/142] net/mlx5: Add command entry handling completion

2020-06-01 Thread Greg Kroah-Hartman
From: Moshe Shemesh [ Upstream commit 17d00e839d3b592da9659c1977d45f85b77f986a ] When FW response to commands is very slow and all command entries in use are waiting for completion we can have a race where commands can get timeout before they get out of the queue and handled. Timeout completion

[PATCH 5.4 044/142] drm/amdgpu: drop unnecessary cancel_delayed_work_sync on PG ungate

2020-06-01 Thread Greg Kroah-Hartman
From: Evan Quan [ Upstream commit 1fe48ec08d9f2e26d893a6c05bd6c99a3490f9ef ] As this is already properly handled in amdgpu_gfx_off_ctrl(). In fact, this unnecessary cancel_delayed_work_sync may leave a small time window for race condition and is dangerous. Signed-off-by: Evan Quan

[PATCH 5.4 011/142] net: nlmsg_cancel() if put fails for nhmsg

2020-06-01 Thread Greg Kroah-Hartman
From: Stephen Worley [ Upstream commit d69100b8eee27c2d60ee52df76e0b80a8d492d34 ] Fixes data remnant seen when we fail to reserve space for a nexthop group during a larger dump. If we fail the reservation, we goto nla_put_failure and cancel the message. Reproduce with the following iproute2

[PATCH 5.4 032/142] ARM: dts: rockchip: fix phy nodename for rk3228-evb

2020-06-01 Thread Greg Kroah-Hartman
From: Johan Jonker [ Upstream commit 287e0d538fcec2f6e8eb1e565bf0749f3b90186d ] A test with the command below gives for example this error: arch/arm/boot/dts/rk3228-evb.dt.yaml: phy@0: '#phy-cells' is a required property The phy nodename is normally used by a phy-handle. This node is however

[PATCH 5.4 034/142] arm64: dts: rockchip: fix status for in rk3328-evb.dts

2020-06-01 Thread Greg Kroah-Hartman
From: Johan Jonker [ Upstream commit c617ed88502d0b05149e7f32f3b3fd8a0663f7e2 ] The status was removed of the '' node with the apply of a patch long time ago, so fix status for '' in 'rk3328-evb.dts'. Signed-off-by: Johan Jonker Link:

<    4   5   6   7   8   9   10   11   12   13   >