[PATCH 4.19 45/95] ARM: 8970/1: decompressor: increase tag size

2020-06-01 Thread Greg Kroah-Hartman
From: Łukasz Stelmach [ Upstream commit 2c962369d72f286659e6446919f88d69b943cb4d ] The size field of the tag header structure is supposed to be set to the size of a tag structure including the header. Fixes: c772568788b5f0 ("ARM: add additional table to compressed kernel") Signed-off-by: Łukasz

[PATCH 4.19 44/95] Input: synaptics-rmi4 - fix error return code in rmi_driver_probe()

2020-06-01 Thread Greg Kroah-Hartman
From: Wei Yongjun [ Upstream commit 5caab2da63207d6d631007f592f5219459e3454d ] Fix to return a negative error code from the input_register_device() error handling case instead of 0, as done elsewhere in this function. Signed-off-by: Wei Yongjun Link: https://lore.kernel.org/r/20200428134948.78

[PATCH 4.19 57/95] ALSA: hwdep: fix a left shifting 1 by 31 UB bug

2020-06-01 Thread Greg Kroah-Hartman
From: Changming Liu [ Upstream commit fb8cd6481ffd126f35e9e146a0dcf0c4e8899f2e ] The "info.index" variable can be 31 in "1 << info.index". This might trigger an undefined behavior since 1 is signed. Fix this by casting 1 to 1u just to be sure "1u << 31" is defined. Signed-off-by: Changming Liu

Re: [PATCH] flow_dissector: work around stack frame size warning

2020-06-01 Thread David Miller
From: Arnd Bergmann Date: Fri, 29 May 2020 22:13:58 +0200 > The fl_flow_key structure is around 500 bytes, so having two of them > on the stack in one function now exceeds the warning limit after an > otherwise correct change: > > net/sched/cls_flower.c:298:12: error: stack frame size of 1056 by

[PATCH 4.19 43/95] Input: synaptics-rmi4 - really fix attn_data use-after-free

2020-06-01 Thread Greg Kroah-Hartman
From: Evan Green [ Upstream commit d5a5e5b5fa7b86c05bf073acc0ba98fa280174ec ] Fix a use-after-free noticed by running with KASAN enabled. If rmi_irq_fn() is run twice in a row, then rmi_f11_attention() (among others) will end up reading from drvdata->attn_data.data, which was freed and left dang

Re: [v2] afs: Fix memory leak in afs_put_sysnames()

2020-06-01 Thread David Howells
Markus Elfring wrote: > > Fix afs_put_sysnames() to actually free the specified afs_sysnames > > object after its reference count has been decreased to zero and its > > contents have been released. > > * How do you think about to omit the word "Fix" because of the provided tag? Quit

[PATCH 4.19 04/95] __netif_receive_skb_core: pass skb by reference

2020-06-01 Thread Greg Kroah-Hartman
From: Boris Sukholitko [ Upstream commit c0bbbdc32febd4f034ecbf3ea17865785b2c0652 ] __netif_receive_skb_core may change the skb pointer passed into it (e.g. in rx_handler). The original skb may be freed as a result of this operation. The callers of __netif_receive_skb_core may further process o

[PATCH 4.19 40/95] Input: xpad - add custom init packet for Xbox One S controllers

2020-06-01 Thread Greg Kroah-Hartman
From: Łukasz Patron [ Upstream commit 764f7f911bf72450c51eb74cbb262ad9933741d8 ] Sending [ 0x05, 0x20, 0x00, 0x0f, 0x06 ] packet for Xbox One S controllers fixes an issue where controller is stuck in Bluetooth mode and not sending any inputs. Signed-off-by: Łukasz Patron Reviewed-by: Cameron G

[PATCH 4.19 28/95] gfs2: dont call quota_unhold if quotas are not locked

2020-06-01 Thread Greg Kroah-Hartman
From: Bob Peterson [ Upstream commit c9cb9e381985bbbe8acd2695bbe6bd24bf06b81c ] Before this patch, function gfs2_quota_unlock checked if quotas are turned off, and if so, it branched to label out, which called gfs2_quota_unhold. With the new system of gfs2_qa_get and put, we no longer want to ca

[PATCH 4.19 30/95] usb: dwc3: pci: Enable extcon driver for Intel Merrifield

2020-06-01 Thread Greg Kroah-Hartman
From: Andy Shevchenko [ Upstream commit 066c09593454e89bc605ffdff1c9810061f9b1e1 ] Intel Merrifield provides a DR support via PMIC which has its own extcon driver. Add a property string to link to that driver. Signed-off-by: Andy Shevchenko Signed-off-by: Felipe Balbi Signed-off-by: Sasha Le

[PATCH 4.19 27/95] gfs2: move privileged user check to gfs2_quota_lock_check

2020-06-01 Thread Greg Kroah-Hartman
From: Bob Peterson [ Upstream commit 4ed0c30811cb4d30ef89850b787a53a84d5d2bcb ] Before this patch, function gfs2_quota_lock checked if it was called from a privileged user, and if so, it bypassed the quota check: superuser can operate outside the quotas. That's the wrong place for the check beca

[PATCH 4.19 02/95] dpaa_eth: fix usage as DSA master, try 3

2020-06-01 Thread Greg Kroah-Hartman
From: Vladimir Oltean [ Upstream commit 5d14c304bfc14b4fd052dc83d5224376b48f52f0 ] The dpaa-eth driver probes on compatible string for the MAC node, and the fman/mac.c driver allocates a dpaa-ethernet platform device that triggers the probing of the dpaa-eth net device driver. All of this is fi

[PATCH 4.19 18/95] mlxsw: spectrum: Fix use-after-free of split/unsplit/type_set in case reload fails

2020-06-01 Thread Greg Kroah-Hartman
From: Jiri Pirko commit 4340f42f207eacb81e7a6b6bb1e3b6afad9a2e26 upstream. In case of reload fail, the mlxsw_sp->ports contains a pointer to a freed memory (either by reload_down() or reload_up() error path). Fix this by initializing the pointer to NULL and checking it before dereferencing in sp

[PATCH 4.19 20/95] arm64: dts: rockchip: fix status for &gmac2phy in rk3328-evb.dts

2020-06-01 Thread Greg Kroah-Hartman
From: Johan Jonker [ Upstream commit c617ed88502d0b05149e7f32f3b3fd8a0663f7e2 ] The status was removed of the '&gmac2phy' node with the apply of a patch long time ago, so fix status for '&gmac2phy' in 'rk3328-evb.dts'. Signed-off-by: Johan Jonker Link: https://lore.kernel.org/r/20200425122345.

[PATCH 4.19 22/95] ARM: dts: rockchip: swap clock-names of gpu nodes

2020-06-01 Thread Greg Kroah-Hartman
From: Johan Jonker [ Upstream commit b14f3898d2c25a9b47a61fb879d0b1f3af92c59b ] Dts files with Rockchip 'gpu' nodes were manually verified. In order to automate this process arm,mali-utgard.txt has been converted to yaml. In the new setup dtbs_check with arm,mali-utgard.yaml expects clock-names

[PATCH 4.19 15/95] net/mlx5: Annotate mutex destroy for root ns

2020-06-01 Thread Greg Kroah-Hartman
From: Roi Dayan commit 9ca415399dae133b00273a4283ef31d003a6818d upstream. Invoke mutex_destroy() to catch any errors. Fixes: 2cc43b494a6c ("net/mlx5_core: Managing root flow table") Signed-off-by: Roi Dayan Reviewed-by: Mark Bloch Signed-off-by: Saeed Mahameed Signed-off-by: Greg Kroah-Hartm

[PATCH 4.19 12/95] sctp: Dont add the shutdown timer if its already been added

2020-06-01 Thread Greg Kroah-Hartman
From: Neil Horman [ Upstream commit 20a785aa52c82246055a089e55df9dac47d67da1 ] This BUG halt was reported a while back, but the patch somehow got missed: PID: 2879 TASK: c16adaa0 CPU: 1 COMMAND: "sctpn" #0 [f418dd28] crash_kexec at c04a7d8c #1 [f418dd7c] oops_end at c0863e02 #2 [f418dd9

[PATCH 4.19 17/95] net/mlx4_core: fix a memory leak bug.

2020-06-01 Thread Greg Kroah-Hartman
From: Qiushi Wu commit febfd9d3c7f74063e8e630b15413ca91b567f963 upstream. In function mlx4_opreq_action(), pointer "mailbox" is not released, when mlx4_cmd_box() return and error, causing a memory leak bug. Fix this issue by going to "out" label, mlx4_free_cmd_mailbox() can free this pointer. F

[PATCH 4.14 64/77] netfilter: ipset: Fix subcounter update skip

2020-06-01 Thread Greg Kroah-Hartman
From: Phil Sutter commit a164b95ad6055c50612795882f35e0efda1f1390 upstream. If IPSET_FLAG_SKIP_SUBCOUNTER_UPDATE is set, user requested to not update counters in sub sets. Therefore IPSET_FLAG_SKIP_COUNTER_UPDATE must be set, not unset. Fixes: 6e01781d1c80e ("netfilter: ipset: set match: add su

[PATCH 4.19 01/95] ax25: fix setsockopt(SO_BINDTODEVICE)

2020-06-01 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 687775cec056b38a4c8f3291e0dd7a9145f7b667 ] syzbot was able to trigger this trace [1], probably by using a zero optlen. While we are at it, cap optlen to IFNAMSIZ - 1 instead of IFNAMSIZ. [1] BUG: KMSAN: uninit-value in strnlen+0xf9/0x170 lib/string.c:569 CP

[PATCH 4.19 10/95] net sched: fix reporting the first-time use timestamp

2020-06-01 Thread Greg Kroah-Hartman
From: Roman Mashak [ Upstream commit b15e62631c5f19fea9895f7632dae9c1b27fe0cd ] When a new action is installed, firstuse field of 'tcf_t' is explicitly set to 0. Value of zero means "new action, not yet used"; as a packet hits the action, 'firstuse' is stamped with the current jiffies value. tc

[PATCH 4.14 67/77] esp6: get the right proto for transport mode in esp6_gso_encap

2020-06-01 Thread Greg Kroah-Hartman
From: Xin Long commit 3c96ec56828922e3fe5477f75eb3fc02f98f98b5 upstream. For transport mode, when ipv6 nexthdr is set, the packet format might be like: || dest | | | | ESP| ESP | | IP6 hdr| opts.| ESP | T

[PATCH 4.14 61/77] vti4: eliminated some duplicate code.

2020-06-01 Thread Greg Kroah-Hartman
From: Jeremy Sowden commit f981c57ffd2d7cf2dd4b6d6f8fcb3965df42f54c upstream. The ipip tunnel introduced in commit dd9ee3444014 ("vti4: Fix a ipip packet processing bug in 'IPCOMP' virtual tunnel") largely duplicated the existing vti_input and vti_recv functions. Refactored to deduplicate the c

Re: [PATCH] net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss()

2020-06-01 Thread David Miller
From: Jia-Ju Bai Date: Sat, 30 May 2020 10:41:50 +0800 > The value adapter->rss_conf is stored in DMA memory, and it is assigned > to rssConf, so rssConf->indTableSize can be modified at anytime by > malicious hardware. Because rssConf->indTableSize is assigned to n, > buffer overflow may occur w

[PATCH 4.19 11/95] r8152: support additional Microsoft Surface Ethernet Adapter variant

2020-06-01 Thread Greg Kroah-Hartman
From: Marc Payne [ Upstream commit c27a204383616efba5a4194075e90819961ff66a ] Device id 0927 is the RTL8153B-based component of the 'Surface USB-C to Ethernet and USB Adapter' and may be used as a component of other devices in future. Tested and working with the r8152 driver. Update the cdc_eth

[PATCH 4.14 62/77] ip_vti: receive ipip packet by calling ip_tunnel_rcv

2020-06-01 Thread Greg Kroah-Hartman
From: Xin Long commit 976eba8ab596bab94b9714cd46d38d5c6a2c660d upstream. In Commit dd9ee3444014 ("vti4: Fix a ipip packet processing bug in 'IPCOMP' virtual tunnel"), it tries to receive IPIP packets in vti by calling xfrm_input(). This case happens when a small packet or frag sent by peer is to

[PATCH 4.14 63/77] netfilter: nft_reject_bridge: enable reject with bridge vlan

2020-06-01 Thread Greg Kroah-Hartman
From: Michael Braun commit e9c284ec4b41c827f4369973d2792992849e4fa5 upstream. Currently, using the bridge reject target with tagged packets results in untagged packets being sent back. Fix this by mirroring the vlan id as well. Fixes: 85f5b3086a04 ("netfilter: bridge: add reject support") Sign

[PATCH 4.14 59/77] xfrm: fix a NULL-ptr deref in xfrm_local_error

2020-06-01 Thread Greg Kroah-Hartman
From: Xin Long commit f6a23d85d078c2ffde79c66ca81d0a1dde451649 upstream. This patch is to fix a crash: [ ] kasan: GPF could be caused by NULL-ptr deref or user memory access [ ] general protection fault: [#1] SMP KASAN PTI [ ] RIP: 0010:ipv6_local_error+0xac/0x7a0 [ ] Call Trace:

[PATCH 4.14 25/77] Input: i8042 - add ThinkPad S230u to i8042 nomux list

2020-06-01 Thread Greg Kroah-Hartman
From: Kevin Locke [ Upstream commit 18931506465a762ffd3f4803d36a18d336a67da9 ] On the Lenovo ThinkPad Twist S230u (3347-4HU) with BIOS version "GDETC1WW (1.81 ) 06/27/2019", whether booted in UEFI or Legacy/CSM mode the keyboard, Synaptics TouchPad, and TrackPoint either do not function or stop

[PATCH 4.14 24/77] Input: usbtouchscreen - add support for BonXeon TP

2020-06-01 Thread Greg Kroah-Hartman
From: James Hilliard [ Upstream commit e3b4f94ef52ae1592cbe199bd38dbdc0d58b2217 ] Based on available information this uses the singletouch irtouch protocol. This is tested and confirmed to be fully functional on the BonXeon TP hardware I have. Signed-off-by: James Hilliard Link: https://lore.k

[PATCH 4.14 75/77] KVM: VMX: check for existence of secondary exec controls before accessing

2020-06-01 Thread Greg Kroah-Hartman
From: Sean Christopherson commit fd6b6d9b82f97a851fb0078201ddc38fe9728cda upstream. Return early from vmx_set_virtual_apic_mode() if the processor doesn't support VIRTUALIZE_APIC_ACCESSES or VIRTUALIZE_X2APIC_MODE, both of which reside in SECONDARY_VM_EXEC_CONTROL. This eliminates warnings due

[PATCH 4.14 26/77] Input: evdev - call input_flush_device() on release(), not flush()

2020-06-01 Thread Greg Kroah-Hartman
From: Brendan Shanks [ Upstream commit 09264098ff153f60866039d60b31d39b66f55a31 ] input_flush_device() should only be called once the struct file is being released and no open descriptors remain, but evdev_flush() was calling it whenever a file descriptor was closed. This caused uploaded force-

[PATCH 4.14 57/77] xfrm: call xfrm_output_gso when inner_protocol is set in xfrm_output

2020-06-01 Thread Greg Kroah-Hartman
From: Xin Long commit a204aef9fd77dce1efd9066ca4e44eede99cd858 upstream. An use-after-free crash can be triggered when sending big packets over vxlan over esp with esp offload enabled: [] BUG: KASAN: use-after-free in ipv6_gso_pull_exthdrs.part.8+0x32c/0x4e0 [] Call Trace: [] dump_stack+

[PATCH 4.14 70/77] Revert "Input: i8042 - add ThinkPad S230u to i8042 nomux list"

2020-06-01 Thread Greg Kroah-Hartman
From: Dmitry Torokhov commit f4dec2d6160976b14e54be9c3950ce0f52385741 upstream. This reverts commit 18931506465a762ffd3f4803d36a18d336a67da9. From Kevin Locke: "... nomux only appeared to fix the issue because the controller continued working after warm reboots. After more thorough testing from

[PATCH 4.14 22/77] cifs: Fix null pointer check in cifs_read

2020-06-01 Thread Greg Kroah-Hartman
From: Steve French [ Upstream commit 9bd21d4b1a767c3abebec203342f3820dcb84662 ] Coverity scan noted a redundant null check Coverity-id: 728517 Reported-by: Coverity Signed-off-by: Steve French Reviewed-by: Shyam Prasad N Signed-off-by: Sasha Levin --- fs/cifs/file.c | 2 +- 1 file changed,

[PATCH 4.14 53/77] mac80211: mesh: fix discovery timer re-arming issue / crash

2020-06-01 Thread Greg Kroah-Hartman
From: Linus Lüssing commit e2d4a80f93fcfaf72e2e20daf6a28e39c3b90677 upstream. On a non-forwarding 802.11s link between two fairly busy neighboring nodes (iperf with -P 16 at ~850MBit/s TCP; 1733.3 MBit/s VHT-MCS 9 80MHz short GI VHT-NSS 4), so with frequent PREQ retries, usually after around 30-

[PATCH 4.14 69/77] bonding: Fix reference count leak in bond_sysfs_slave_add.

2020-06-01 Thread Greg Kroah-Hartman
From: Qiushi Wu commit a068aab42258e25094bc2c159948d263ed7d7a77 upstream. kobject_init_and_add() takes reference even when it fails. If this function returns an error, kobject_put() must be called to properly clean up the memory associated with the object. Previous commit "b8eb718348b8" fixed a

[PATCH 4.14 17/77] gfs2: move privileged user check to gfs2_quota_lock_check

2020-06-01 Thread Greg Kroah-Hartman
From: Bob Peterson [ Upstream commit 4ed0c30811cb4d30ef89850b787a53a84d5d2bcb ] Before this patch, function gfs2_quota_lock checked if it was called from a privileged user, and if so, it bypassed the quota check: superuser can operate outside the quotas. That's the wrong place for the check beca

[PATCH 4.14 52/77] parisc: Fix kernel panic in mem_init()

2020-06-01 Thread Greg Kroah-Hartman
From: Helge Deller commit bf71bc16e02162388808949b179d59d0b571b965 upstream. The Debian kernel v5.6 triggers this kernel panic: Kernel panic - not syncing: Bad Address (null pointer deref?) Bad Address (null pointer deref?): Code=26 (Data memory access rights trap) at addr

[PATCH 4.14 54/77] x86/dma: Fix max PFN arithmetic overflow on 32 bit systems

2020-06-01 Thread Greg Kroah-Hartman
From: Alexander Dahl commit 88743470668ef5eb6b7ba9e0f99888e5999bf172 upstream. The intermediate result of the old term (4UL * 1024 * 1024 * 1024) is 4 294 967 296 or 0x1 which is no problem on 64 bit systems. The patch does not change the later overall result of 0x10 for MAX_DMA32_PF

[PATCH 4.14 55/77] copy_xstate_to_kernel(): dont leave parts of destination uninitialized

2020-06-01 Thread Greg Kroah-Hartman
From: Al Viro commit 9e4636545933131de15e1ecd06733538ae939b2f upstream. copy the corresponding pieces of init_fpstate into the gaps instead. Cc: sta...@kernel.org Tested-by: Alexander Potapenko Acked-by: Borislav Petkov Signed-off-by: Al Viro Signed-off-by: Greg Kroah-Hartman --- arch/x86

[PATCH 4.14 47/77] libceph: ignore pool overlay and cache logic on redirects

2020-06-01 Thread Greg Kroah-Hartman
From: Jerry Lee [ Upstream commit 890bd0f8997ae6ac0a367dd5146154a3963306dd ] OSD client should ignore cache/overlay flag if got redirect reply. Otherwise, the client hangs when the cache tier is in forward mode. [ idryomov: Redirects are effectively deprecated and no longer used or tested. T

[PATCH 4.14 39/77] ARM: dts/imx6q-bx50v3: Set display interface clock parents

2020-06-01 Thread Greg Kroah-Hartman
From: Robert Beckett [ Upstream commit 665e7c73a7724a393b4ec92d1ae1e029925ef2b7 ] Avoid LDB and IPU DI clocks both using the same parent. LDB requires pasthrough clock to avoid breaking timing while IPU DI does not. Force IPU DI clocks to use IMX6QDL_CLK_PLL2_PFD0_352M as parent and LDB to use

[PATCH 4.14 38/77] ARM: dts: imx6q-bx50v3: Add internal switch

2020-06-01 Thread Greg Kroah-Hartman
From: Sebastian Reichel [ Upstream commit e26dead442689a861358f33126210b0f8de615a9 ] B850v3, B650v3 and B450v3 all have a GPIO bit banged MDIO bus to communicate with a Marvell switch. On all devices the switch is connected to a PCI based network card, which needs to be referenced by DT, so this

[PATCH 4.14 51/77] iommu: Fix reference count leak in iommu_group_alloc.

2020-06-01 Thread Greg Kroah-Hartman
From: Qiushi Wu [ Upstream commit 7cc31613734c4870ae32f5265d576ef296621343 ] kobject_init_and_add() takes reference even when it fails. Thus, when kobject_init_and_add() returns an error, kobject_put() must be called to properly clean up the kobject. Fixes: d72e31c93746 ("iommu: IOMMU Groups")

[PATCH 4.14 46/77] ALSA: hda/realtek - Add new codec supported for ALC287

2020-06-01 Thread Greg Kroah-Hartman
From: Kailang Yang [ Upstream commit 630e36126e420e1756378b3427b42711ce0b9ddd ] Enable new codec supported for ALC287. Signed-off-by: Kailang Yang Cc: Link: https://lore.kernel.org/r/dcf5ce5507104d0589a917cbb71dc...@realtek.com Signed-off-by: Takashi Iwai Signed-off-by: Sasha Levin --- sou

[PATCH 4.14 29/77] Input: i8042 - add ThinkPad S230u to i8042 reset list

2020-06-01 Thread Greg Kroah-Hartman
From: Kevin Locke [ Upstream commit 2712c91a54a1058d55c284152b4d93c979b67be6 ] On the Lenovo ThinkPad Twist S230u (3347-4HU) with BIOS version "GDETC1WW (1.81 ) 06/27/2019", the keyboard, Synaptics TouchPad, and TrackPoint either do not function or stop functioning a few minutes after boot. Thi

Re: [PATCH net-next v2 0/3] bridge: mrp: Add support for MRA role

2020-06-01 Thread David Miller
From: Horatiu Vultur Date: Sat, 30 May 2020 18:09:45 + > This patch series extends the MRP with the MRA role. > A node that has the MRA role can behave as a MRM or as a MRC. In case there > are > multiple nodes in the topology that has the MRA role then only one node can > behave as MRM and

[PATCH 4.14 27/77] Input: xpad - add custom init packet for Xbox One S controllers

2020-06-01 Thread Greg Kroah-Hartman
From: Łukasz Patron [ Upstream commit 764f7f911bf72450c51eb74cbb262ad9933741d8 ] Sending [ 0x05, 0x20, 0x00, 0x0f, 0x06 ] packet for Xbox One S controllers fixes an issue where controller is stuck in Bluetooth mode and not sending any inputs. Signed-off-by: Łukasz Patron Reviewed-by: Cameron G

[PATCH 4.14 31/77] Input: synaptics-rmi4 - fix error return code in rmi_driver_probe()

2020-06-01 Thread Greg Kroah-Hartman
From: Wei Yongjun [ Upstream commit 5caab2da63207d6d631007f592f5219459e3454d ] Fix to return a negative error code from the input_register_device() error handling case instead of 0, as done elsewhere in this function. Signed-off-by: Wei Yongjun Link: https://lore.kernel.org/r/20200428134948.78

[PATCH 4.14 43/77] ALSA: hwdep: fix a left shifting 1 by 31 UB bug

2020-06-01 Thread Greg Kroah-Hartman
From: Changming Liu [ Upstream commit fb8cd6481ffd126f35e9e146a0dcf0c4e8899f2e ] The "info.index" variable can be 31 in "1 << info.index". This might trigger an undefined behavior since 1 is signed. Fix this by casting 1 to 1u just to be sure "1u << 31" is defined. Signed-off-by: Changming Liu

[PATCH 4.14 44/77] ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC

2020-06-01 Thread Greg Kroah-Hartman
From: Chris Chiu [ Upstream commit 4020d1ccbe55bdf67b31d718d2400506eaf4b43f ] The Asus USB DAC is a USB type-C audio dongle for connecting to the headset and headphone. The volume minimum value -23040 which is 0xa600 in hexadecimal with the resolution value 1 indicates this should be endianness

[PATCH 4.14 41/77] mmc: block: Fix use-after-free issue for rpmb

2020-06-01 Thread Greg Kroah-Hartman
From: Peng Hao [ Upstream commit 202500d21654874aa03243e91f96de153ec61860 ] The data structure member “rpmb->md” was passed to a call of the function “mmc_blk_put” after a call of the function “put_device”. Reorder these function calls to keep the data accesses consistent. Fixes: 1c87f7357849 (

[PATCH 4.14 42/77] RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe()

2020-06-01 Thread Greg Kroah-Hartman
From: Qiushi Wu [ Upstream commit db857e6ae548f0f4f4a0f63fffeeedf3cca21f9d ] In function pvrdma_pci_probe(), pdev was not disabled in one error path. Thus replace the jump target “err_free_device” by "err_disable_pdev". Fixes: 29c8d9eba550 ("IB: Add vmw_pvrdma driver") Link: https://lore.kernel

[PATCH 4.14 04/77] net: revert "net: get rid of an signed integer overflow in ip_idents_reserve()"

2020-06-01 Thread Greg Kroah-Hartman
From: Yuqi Jin [ Upstream commit a6211caa634da39d861a47437ffcda8b38ef421b ] Commit adb03115f459 ("net: get rid of an signed integer overflow in ip_idents_reserve()") used atomic_cmpxchg to replace "atomic_add_return" inside the function "ip_idents_reserve". The reason was to avoid UBSAN warning

[PATCH 4.14 05/77] net sched: fix reporting the first-time use timestamp

2020-06-01 Thread Greg Kroah-Hartman
From: Roman Mashak [ Upstream commit b15e62631c5f19fea9895f7632dae9c1b27fe0cd ] When a new action is installed, firstuse field of 'tcf_t' is explicitly set to 0. Value of zero means "new action, not yet used"; as a packet hits the action, 'firstuse' is stamped with the current jiffies value. tc

[PATCH 4.14 35/77] ARM: uaccess: fix DACR mismatch with nested exceptions

2020-06-01 Thread Greg Kroah-Hartman
From: Russell King [ Upstream commit 71f8af1110101facfad68989ff91f88f8e2c3e22 ] Tomas Paukrt reports that his SAM9X60 based system (ARM926, ARMv5TJ) fails to fix up alignment faults, eventually resulting in a kernel oops. The problem occurs when using CONFIG_CPU_USE_DOMAINS with commit e6978e4b

[PATCH 4.14 09/77] net: qrtr: Fix passing invalid reference to qrtr_local_enqueue()

2020-06-01 Thread Greg Kroah-Hartman
From: Manivannan Sadhasivam [ Upstream commit d28ea1fbbf437054ef339afec241019f2c4e2bb6 ] Once the traversal of the list is completed with list_for_each_entry(), the iterator (node) will point to an invalid object. So passing this to qrtr_local_enqueue() which is outside of the iterator block is

[PATCH 4.14 06/77] r8152: support additional Microsoft Surface Ethernet Adapter variant

2020-06-01 Thread Greg Kroah-Hartman
From: Marc Payne [ Upstream commit c27a204383616efba5a4194075e90819961ff66a ] Device id 0927 is the RTL8153B-based component of the 'Surface USB-C to Ethernet and USB Adapter' and may be used as a component of other devices in future. Tested and working with the r8152 driver. Update the cdc_eth

[PATCH 4.14 32/77] ARM: 8843/1: use unified assembler in headers

2020-06-01 Thread Greg Kroah-Hartman
From: Stefan Agner [ Upstream commit c001899a5d6c2d7a0f3b75b2307ddef137fb46a6 ] Use unified assembler syntax (UAL) in headers. Divided syntax is considered deprecated. This will also allow to build the kernel using LLVM's integrated assembler. Signed-off-by: Stefan Agner Acked-by: Nicolas Pitr

[PATCH 4.14 33/77] ARM: uaccess: consolidate uaccess asm to asm/uaccess-asm.h

2020-06-01 Thread Greg Kroah-Hartman
From: Russell King [ Upstream commit 747ffc2fcf969eff9309d7f2d1d61cb8b9e1bb40 ] Consolidate the user access assembly code to asm/uaccess-asm.h. This moves the csdb, check_uaccess, uaccess_mask_range_ptr, uaccess_enable, uaccess_disable, uaccess_save, uaccess_restore macros, and creates two new

[PATCH 4.14 03/77] net/mlx5: Add command entry handling completion

2020-06-01 Thread Greg Kroah-Hartman
From: Moshe Shemesh [ Upstream commit 17d00e839d3b592da9659c1977d45f85b77f986a ] When FW response to commands is very slow and all command entries in use are waiting for completion we can have a race where commands can get timeout before they get out of the queue and handled. Timeout completion

[PATCH 4.14 18/77] gfs2: dont call quota_unhold if quotas are not locked

2020-06-01 Thread Greg Kroah-Hartman
From: Bob Peterson [ Upstream commit c9cb9e381985bbbe8acd2695bbe6bd24bf06b81c ] Before this patch, function gfs2_quota_unlock checked if quotas are turned off, and if so, it branched to label out, which called gfs2_quota_unhold. With the new system of gfs2_qa_get and put, we no longer want to ca

[PATCH 4.14 00/77] 4.14.183-rc1 review

2020-06-01 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.14.183 release. There are 77 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Wed, 03 Jun 2020 17:38:19 +. Anything re

[PATCH 4.14 08/77] net/mlx5e: Update netdev txq on completions during closure

2020-06-01 Thread Greg Kroah-Hartman
From: Moshe Shemesh [ Upstream commit 5e911e2c06bd8c17df29147a5e2d4b17fafda024 ] On sq closure when we free its descriptors, we should also update netdev txq on completions which would not arrive. Otherwise if we reopen sqs and attach them back, for example on fw fatal recovery flow, we may get

[PATCH 4.14 07/77] sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed

2020-06-01 Thread Greg Kroah-Hartman
From: "Jere Lepp�nen" [ Upstream commit d3e8e4c11870413789f029a71e72ae6e971fe678 ] Commit bdf6fa52f01b ("sctp: handle association restarts when the socket is closed.") starts shutdown when an association is restarted, if in SHUTDOWN-PENDING state and the socket is closed. However, the rationale

[PATCH 4.9 45/61] xfrm: allow to accept packets with ipv6 NEXTHDR_HOP in xfrm_input

2020-06-01 Thread Greg Kroah-Hartman
From: Xin Long commit afcaf61be9d1dbdee5ec186d1dcc67b6b692180f upstream. For beet mode, when it's ipv6 inner address with nexthdrs set, the packet format might be: | outer | | dest | | | ESP| ESP | | IP hdr | ES

[PATCH 4.9 48/61] vti4: eliminated some duplicate code.

2020-06-01 Thread Greg Kroah-Hartman
From: Jeremy Sowden commit f981c57ffd2d7cf2dd4b6d6f8fcb3965df42f54c upstream. The ipip tunnel introduced in commit dd9ee3444014 ("vti4: Fix a ipip packet processing bug in 'IPCOMP' virtual tunnel") largely duplicated the existing vti_input and vti_recv functions. Refactored to deduplicate the c

[PATCH 4.9 51/61] netfilter: ipset: Fix subcounter update skip

2020-06-01 Thread Greg Kroah-Hartman
From: Phil Sutter commit a164b95ad6055c50612795882f35e0efda1f1390 upstream. If IPSET_FLAG_SKIP_SUBCOUNTER_UPDATE is set, user requested to not update counters in sub sets. Therefore IPSET_FLAG_SKIP_COUNTER_UPDATE must be set, not unset. Fixes: 6e01781d1c80e ("netfilter: ipset: set match: add su

[PATCH 4.9 58/61] net: rtnl_configure_link: fix dev flags changes arg to __dev_notify_flags

2020-06-01 Thread Greg Kroah-Hartman
From: Roopa Prabhu commit 56a49d7048703f5ffdb84d3a0ee034108fba6850 upstream. This fix addresses https://bugzilla.kernel.org/show_bug.cgi?id=201071 Commit 5025f7f7d506 wrongly relied on __dev_change_flags to notify users of dev flag changes in the case when dev->rtnl_link_state = RTNL_LINK_INITI

[PATCH 4.14 13/77] arm64: dts: rockchip: swap interrupts interrupt-names rk3399 gpu node

2020-06-01 Thread Greg Kroah-Hartman
From: Johan Jonker [ Upstream commit c604fd810bda667bdc20b2c041917baa7803e0fb ] Dts files with Rockchip rk3399 'gpu' nodes were manually verified. In order to automate this process arm,mali-midgard.txt has been converted to yaml. In the new setup dtbs_check with arm,mali-midgard.yaml expects int

[PATCH 4.9 50/61] netfilter: nft_reject_bridge: enable reject with bridge vlan

2020-06-01 Thread Greg Kroah-Hartman
From: Michael Braun commit e9c284ec4b41c827f4369973d2792992849e4fa5 upstream. Currently, using the bridge reject target with tagged packets results in untagged packets being sent back. Fix this by mirroring the vlan id as well. Fixes: 85f5b3086a04 ("netfilter: bridge: add reject support") Sign

[PATCH 4.14 11/77] net/mlx4_core: fix a memory leak bug.

2020-06-01 Thread Greg Kroah-Hartman
From: Qiushi Wu commit febfd9d3c7f74063e8e630b15413ca91b567f963 upstream. In function mlx4_opreq_action(), pointer "mailbox" is not released, when mlx4_cmd_box() return and error, causing a memory leak bug. Fix this issue by going to "out" label, mlx4_free_cmd_mailbox() can free this pointer. F

[PATCH 4.14 10/77] net: sun: fix missing release regions in cas_init_one().

2020-06-01 Thread Greg Kroah-Hartman
From: Qiushi Wu commit 5a730153984dd13f82ffae93d7170d76eba204e9 upstream. In cas_init_one(), "pdev" is requested by "pci_request_regions", but it was not released after a call of the function “pci_write_config_byte” failed. Thus replace the jump target “err_write_cacheline” by "err_out_free_res"

[PATCH 4.14 02/77] net: ipip: fix wrong address family in init error path

2020-06-01 Thread Greg Kroah-Hartman
From: Vadim Fedorenko [ Upstream commit 57ebc8f08504f176eb0f25b3e0fde517dec61a4f ] In case of error with MPLS support the code is misusing AF_INET instead of AF_MPLS. Fixes: 1b69e7e6c4da ("ipip: support MPLS over IPv4") Signed-off-by: Vadim Fedorenko Signed-off-by: David S. Miller Signed-off-

[PATCH 4.9 09/61] net: sun: fix missing release regions in cas_init_one().

2020-06-01 Thread Greg Kroah-Hartman
From: Qiushi Wu commit 5a730153984dd13f82ffae93d7170d76eba204e9 upstream. In cas_init_one(), "pdev" is requested by "pci_request_regions", but it was not released after a call of the function “pci_write_config_byte” failed. Thus replace the jump target “err_write_cacheline” by "err_out_free_res"

[PATCH 4.9 54/61] bonding: Fix reference count leak in bond_sysfs_slave_add.

2020-06-01 Thread Greg Kroah-Hartman
From: Qiushi Wu commit a068aab42258e25094bc2c159948d263ed7d7a77 upstream. kobject_init_and_add() takes reference even when it fails. If this function returns an error, kobject_put() must be called to properly clean up the memory associated with the object. Previous commit "b8eb718348b8" fixed a

[PATCH 4.14 16/77] net: microchip: encx24j600: add missed kthread_stop

2020-06-01 Thread Greg Kroah-Hartman
From: Chuhong Yuan [ Upstream commit ff8ce319e9c25e920d994cc35236f0bb32dfc8f3 ] This driver calls kthread_run() in probe, but forgets to call kthread_stop() in probe failure and remove. Add the missed kthread_stop() to fix it. Signed-off-by: Chuhong Yuan Signed-off-by: David S. Miller Signed-

[PATCH 4.9 56/61] netfilter: nf_conntrack_pptp: fix compilation warning with W=1 build

2020-06-01 Thread Greg Kroah-Hartman
From: Pablo Neira Ayuso commit 4946ea5c1237036155c3b3a24f049fd5f849f8f6 upstream. >> include/linux/netfilter/nf_conntrack_pptp.h:13:20: warning: 'const' type >> qualifier on return type has no effect [-Wignored-qualifiers] extern const char *const pptp_msg_name(u_int16_t msg); ^~ Reported-

[PATCH 4.9 60/61] sc16is7xx: move label err_spi to correct section

2020-06-01 Thread Greg Kroah-Hartman
From: Guoqing Jiang commit e00164a0f000de893944981f41a568c981aca658 upstream. err_spi is used when SERIAL_SC16IS7XX_SPI is enabled, so make the label only available under SERIAL_SC16IS7XX_SPI option. Otherwise, the below warning appears. drivers/tty/serial/sc16is7xx.c:1523:1: warning: label ‘er

[PATCH 4.9 55/61] Revert "Input: i8042 - add ThinkPad S230u to i8042 nomux list"

2020-06-01 Thread Greg Kroah-Hartman
From: Dmitry Torokhov commit f4dec2d6160976b14e54be9c3950ce0f52385741 upstream. This reverts commit 18931506465a762ffd3f4803d36a18d336a67da9. From Kevin Locke: "... nomux only appeared to fix the issue because the controller continued working after warm reboots. After more thorough testing from

[PATCH 4.9 49/61] ip_vti: receive ipip packet by calling ip_tunnel_rcv

2020-06-01 Thread Greg Kroah-Hartman
From: Xin Long commit 976eba8ab596bab94b9714cd46d38d5c6a2c660d upstream. In Commit dd9ee3444014 ("vti4: Fix a ipip packet processing bug in 'IPCOMP' virtual tunnel"), it tries to receive IPIP packets in vti by calling xfrm_input(). This case happens when a small packet or frag sent by peer is to

[PATCH 4.9 00/61] 4.9.226-rc1 review

2020-06-01 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.9.226 release. There are 61 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Wed, 03 Jun 2020 17:38:19 +. Anything rec

[PATCH 4.9 47/61] xfrm: fix a NULL-ptr deref in xfrm_local_error

2020-06-01 Thread Greg Kroah-Hartman
From: Xin Long commit f6a23d85d078c2ffde79c66ca81d0a1dde451649 upstream. This patch is to fix a crash: [ ] kasan: GPF could be caused by NULL-ptr deref or user memory access [ ] general protection fault: [#1] SMP KASAN PTI [ ] RIP: 0010:ipv6_local_error+0xac/0x7a0 [ ] Call Trace:

[PATCH 4.9 42/61] parisc: Fix kernel panic in mem_init()

2020-06-01 Thread Greg Kroah-Hartman
From: Helge Deller commit bf71bc16e02162388808949b179d59d0b571b965 upstream. The Debian kernel v5.6 triggers this kernel panic: Kernel panic - not syncing: Bad Address (null pointer deref?) Bad Address (null pointer deref?): Code=26 (Data memory access rights trap) at addr

[PATCH 4.9 29/61] ARM: uaccess: fix DACR mismatch with nested exceptions

2020-06-01 Thread Greg Kroah-Hartman
From: Russell King [ Upstream commit 71f8af1110101facfad68989ff91f88f8e2c3e22 ] Tomas Paukrt reports that his SAM9X60 based system (ARM926, ARMv5TJ) fails to fix up alignment faults, eventually resulting in a kernel oops. The problem occurs when using CONFIG_CPU_USE_DOMAINS with commit e6978e4b

[PATCH 4.9 32/61] ARM: dts: imx6q-bx50v3: Add internal switch

2020-06-01 Thread Greg Kroah-Hartman
From: Sebastian Reichel [ Upstream commit e26dead442689a861358f33126210b0f8de615a9 ] B850v3, B650v3 and B450v3 all have a GPIO bit banged MDIO bus to communicate with a Marvell switch. On all devices the switch is connected to a PCI based network card, which needs to be referenced by DT, so this

[PATCH 4.9 19/61] cifs: Fix null pointer check in cifs_read

2020-06-01 Thread Greg Kroah-Hartman
From: Steve French [ Upstream commit 9bd21d4b1a767c3abebec203342f3820dcb84662 ] Coverity scan noted a redundant null check Coverity-id: 728517 Reported-by: Coverity Signed-off-by: Steve French Reviewed-by: Shyam Prasad N Signed-off-by: Sasha Levin --- fs/cifs/file.c | 2 +- 1 file changed,

[PATCH 4.9 59/61] mm/vmalloc.c: dont dereference possible NULL pointer in __vunmap()

2020-06-01 Thread Greg Kroah-Hartman
From: Liviu Dudau commit 6ade20327dbb808882888ed8ccded71e93067cf9 upstream. find_vmap_area() can return a NULL pointer and we're going to dereference it without checking it first. Use the existing find_vm_area() function which does exactly what we want and checks for the NULL pointer. Link: ht

[PATCH 4.9 34/61] ALSA: hwdep: fix a left shifting 1 by 31 UB bug

2020-06-01 Thread Greg Kroah-Hartman
From: Changming Liu [ Upstream commit fb8cd6481ffd126f35e9e146a0dcf0c4e8899f2e ] The "info.index" variable can be 31 in "1 << info.index". This might trigger an undefined behavior since 1 is signed. Fix this by casting 1 to 1u just to be sure "1u << 31" is defined. Signed-off-by: Changming Liu

[PATCH 4.9 35/61] ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC

2020-06-01 Thread Greg Kroah-Hartman
From: Chris Chiu [ Upstream commit 4020d1ccbe55bdf67b31d718d2400506eaf4b43f ] The Asus USB DAC is a USB type-C audio dongle for connecting to the headset and headphone. The volume minimum value -23040 which is 0xa600 in hexadecimal with the resolution value 1 indicates this should be endianness

[PATCH 4.9 61/61] net: hns: Fixes the missing put_device in positive leg for roce reset

2020-06-01 Thread Greg Kroah-Hartman
From: Salil Mehta commit 4d96e13ee9cd1f7f801e8c7f4b12f09d1da4a5d8 upstream. This patch fixes the missing device reference release-after-use in the positive leg of the roce reset API of the HNS DSAF. Fixes: c969c6e7ab8c ("net: hns: Fix object reference leaks in hns_dsaf_roce_reset()") Reported-

[PATCH 4.9 36/61] exec: Always set cap_ambient in cap_bprm_set_creds

2020-06-01 Thread Greg Kroah-Hartman
From: Eric W. Biederman [ Upstream commit a4ae32c71fe90794127b32d26d7ad795813b502e ] An invariant of cap_bprm_set_creds is that every field in the new cred structure that cap_bprm_set_creds might set, needs to be set every time to ensure the fields does not get a stale value. The field cap_ambi

[PATCH 4.9 02/61] net: ipip: fix wrong address family in init error path

2020-06-01 Thread Greg Kroah-Hartman
From: Vadim Fedorenko [ Upstream commit 57ebc8f08504f176eb0f25b3e0fde517dec61a4f ] In case of error with MPLS support the code is misusing AF_INET instead of AF_MPLS. Fixes: 1b69e7e6c4da ("ipip: support MPLS over IPv4") Signed-off-by: Vadim Fedorenko Signed-off-by: David S. Miller Signed-off-

[PATCH 4.9 07/61] net: qrtr: Fix passing invalid reference to qrtr_local_enqueue()

2020-06-01 Thread Greg Kroah-Hartman
From: Manivannan Sadhasivam [ Upstream commit d28ea1fbbf437054ef339afec241019f2c4e2bb6 ] Once the traversal of the list is completed with list_for_each_entry(), the iterator (node) will point to an invalid object. So passing this to qrtr_local_enqueue() which is outside of the iterator block is

[PATCH 4.9 41/61] iommu: Fix reference count leak in iommu_group_alloc.

2020-06-01 Thread Greg Kroah-Hartman
From: Qiushi Wu [ Upstream commit 7cc31613734c4870ae32f5265d576ef296621343 ] kobject_init_and_add() takes reference even when it fails. Thus, when kobject_init_and_add() returns an error, kobject_put() must be called to properly clean up the kobject. Fixes: d72e31c93746 ("iommu: IOMMU Groups")

[PATCH 4.9 15/61] gfs2: move privileged user check to gfs2_quota_lock_check

2020-06-01 Thread Greg Kroah-Hartman
From: Bob Peterson [ Upstream commit 4ed0c30811cb4d30ef89850b787a53a84d5d2bcb ] Before this patch, function gfs2_quota_lock checked if it was called from a privileged user, and if so, it bypassed the quota check: superuser can operate outside the quotas. That's the wrong place for the check beca

[PATCH 4.4 43/48] mac80211: fix memory leak

2020-06-01 Thread Greg Kroah-Hartman
From: Sudip Mukherjee commit ea32f065bd3e3e09f0bcb3042f1664caf6b3e233 upstream. On error we jumped to the error label and returned the error code but we missed releasing sinfo. Fixes: 5fe74014172d ("mac80211: avoid excessive stack usage in sta_info") Reviewed-by: Julian Calaby Signed-off-by: S

[PATCH 4.4 41/48] genirq/generic_pending: Do not lose pending affinity update

2020-06-01 Thread Greg Kroah-Hartman
From: Thomas Gleixner commit a33a5d2d16cb84bea8d5f5510f3a41aa48b5c467 upstream. The generic pending interrupt mechanism moves interrupts from the interrupt handler on the original target CPU to the new destination CPU. This is required for x86 and ia64 due to the way the interrupt delivery and a

[PATCH 4.4 09/48] gfs2: dont call quota_unhold if quotas are not locked

2020-06-01 Thread Greg Kroah-Hartman
From: Bob Peterson [ Upstream commit c9cb9e381985bbbe8acd2695bbe6bd24bf06b81c ] Before this patch, function gfs2_quota_unlock checked if quotas are turned off, and if so, it branched to label out, which called gfs2_quota_unhold. With the new system of gfs2_qa_get and put, we no longer want to ca

<    8   9   10   11   12   13   14   15   16   17   >