Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

4.19 into master #47

Merged
merged 10,000 commits into from
Oct 22, 2018
Merged

4.19 into master #47

merged 10,000 commits into from
Oct 22, 2018
This pull request is big! We’re only showing the most recent 250 commits.

Commits on Oct 9, 2018

  1. Merge tag 'arc-4.19-rc8' of git://git.kernel.org/pub/scm/linux/kernel…

    …/git/vgupta/arc
    
    Vineet writes:
       "ARC updates for 4.19-rc8
        - Fix clone syscall to update Thread pointer register
        - Make/build updates (needed for AGL/OE builds)   [Alexey]
        - Typo fix [Colin Ian King]"
    
    * tag 'arc-4.19-rc8' of git://git.kernel.org/pub/scm/linux/kernel/git/vgupta/arc:
      ARC: clone syscall to setp r25 as thread pointer
      ARC: build: Don't set CROSS_COMPILE in arch's Makefile
      ARC: fix spelling mistake "entires" -> "entries"
      ARC: build: Get rid of toolchain check
      ARCv2: build: use mcpu=hs38 iso generic mcpu=archs
    gregkh committed Oct 9, 2018
    Configuration menu
    Copy the full SHA
    64c5e53 View commit details
    Browse the repository at this point in the history
  2. mmc: block: avoid multiblock reads for the last sector in SPI mode

    On some SD cards over SPI, reading with the multiblock read command the last
    sector will leave the card in a bad state.
    
    Remove last sectors from the multiblock reading cmd.
    
    Signed-off-by: Chris Boot <bootc@bootc.net>
    Signed-off-by: Clément Péron <peron.clem@gmail.com>
    Cc: stable@vger.kernel.org # v4.10+
    Signed-off-by: Ulf Hansson <ulf.hansson@linaro.org>
    bootc authored and storulf committed Oct 9, 2018
    Configuration menu
    Copy the full SHA
    41591b3 View commit details
    Browse the repository at this point in the history
  3. ARM: KVM: Correctly order SGI register entries in the cp15 array

    The ICC_ASGI1R and ICC_SGI0R register entries in the cp15 array
    are not correctly ordered, leading to a BUG() at boot time.
    
    Move them to their natural location.
    
    Fixes: 3e8a8a5 ("KVM: arm: vgic-v3: Add support for ICC_SGI0R and ICC_ASGI1R accesses")
    Reported-by: Florian Fainelli <f.fainelli@gmail.com>
    Tested-by: Florian Fainelli <f.fainelli@gmail.com>
    Signed-off-by: Marc Zyngier <marc.zyngier@arm.com>
    Marc Zyngier committed Oct 9, 2018
    Configuration menu
    Copy the full SHA
    ec876f4 View commit details
    Browse the repository at this point in the history
  4. Revert "perf tools: Fix PMU term format max value calculation"

    This reverts commit ac0e2cd.
    
    Michael reported an issue with oversized terms values assignment
    and I noticed there was actually a misunderstanding of the max
    value check in the past.
    
    The above commit's changelog says:
    
      If bit 21 is set, there is parsing issues as below.
    
        $ perf stat -a -e uncore_qpi_0/event=0x200002,umask=0x8/
        event syntax error: '..pi_0/event=0x200002,umask=0x8/'
                                          \___ value too big for format, maximum is 511
    
    But there's no issue there, because the event value is distributed
    along the value defined by the format. Even if the format defines
    separated bit, the value is treated as a continual number, which
    should follow the format definition.
    
    In above case it's 9-bit value with last bit separated:
      $ cat uncore_qpi_0/format/event
      config:0-7,21
    
    Hence the value 0x200002 is correctly reported as format violation,
    because it exceeds 9 bits. It should have been 0x102 instead, which
    sets the 9th bit - the bit 21 of the format.
    
      $ perf stat -vv -a -e uncore_qpi_0/event=0x102,umask=0x8/
      Using CPUID GenuineIntel-6-2D
      ...
      ------------------------------------------------------------
      perf_event_attr:
        type                             10
        size                             112
        config                           0x200802
        sample_type                      IDENTIFIER
      ...
    
    Reported-by: Michael Petlan <mpetlan@redhat.com>
    Signed-off-by: Jiri Olsa <jolsa@kernel.org>
    Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
    Cc: Andi Kleen <ak@linux.intel.com>
    Cc: Kan Liang <kan.liang@linux.intel.com>
    Cc: Namhyung Kim <namhyung@kernel.org>
    Cc: Peter Zijlstra <peterz@infradead.org>
    Fixes: ac0e2cd ("perf tools: Fix PMU term format max value calculation")
    Link: http://lkml.kernel.org/r/20181003072046.29276-1-jolsa@kernel.org
    Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
    olsajiri authored and acmel committed Oct 9, 2018
    Configuration menu
    Copy the full SHA
    1b9caa1 View commit details
    Browse the repository at this point in the history
  5. selftests: usbip: add wait after attach and before checking port status

    Add sleep between attach and "usbip port" check to make sure status is
    updated. Running attach and query back shows incorrect status.
    
    Signed-off-by: Shuah Khan (Samsung OSG) <shuah@kernel.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    Shuah Khan (Samsung OSG) authored and gregkh committed Oct 9, 2018
    Configuration menu
    Copy the full SHA
    4b0aaac View commit details
    Browse the repository at this point in the history
  6. usb: usbip: Fix BUG: KASAN: slab-out-of-bounds in vhci_hub_control()

    vhci_hub_control() accesses port_status array with out of bounds port
    value. Fix it to reference port_status[] only with a valid rhport value
    when invalid_rhport flag is true.
    
    The invalid_rhport flag is set early on after detecting in port value
    is within the bounds or not.
    
    The following is used reproduce the problem and verify the fix:
    C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=14ed8ab6400000
    
    Reported-by: syzbot+bccc1fe10b70fadc78d0@syzkaller.appspotmail.com
    Cc: stable <stable@vger.kernel.org>
    Signed-off-by: Shuah Khan (Samsung OSG) <shuah@kernel.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    Shuah Khan (Samsung OSG) authored and gregkh committed Oct 9, 2018
    Configuration menu
    Copy the full SHA
    81f7567 View commit details
    Browse the repository at this point in the history
  7. cdc-acm: fix race between reset and control messaging

    If a device splits up a control message and a reset() happens
    between the parts, the message is lost and already recieved parts
    must be dropped.
    
    Signed-off-by: Oliver Neukum <oneukum@suse.com>
    Fixes: 1aba579 ("cdc-acm: handle read pipe errors")
    Cc: stable <stable@vger.kernel.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    oneukum authored and gregkh committed Oct 9, 2018
    Configuration menu
    Copy the full SHA
    9397940 View commit details
    Browse the repository at this point in the history
  8. cdc-acm: do not reset notification buffer index upon urb unlinking

    Resetting the write index of the notification buffer on urb unlink (e.g.
    closing a cdc-acm device from userspace) may lead to wrong interpretation
    of further received notifications, in case the index is not 0 when urb
    unlink happens (i.e. when parts of a notification already have been
    transferred). On the device side there is no "reset" of the notification
    transimission and thus we would get out of sync with the device.
    
    Signed-off-by: Tobias Herzog <t-herzog@gmx.de>
    Acked-by: Oliver Neukum <oneukum@suse.com>
    Cc: stable <stable@vger.kernel.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    Tobias Herzog authored and gregkh committed Oct 9, 2018
    Configuration menu
    Copy the full SHA
    dae3ddb View commit details
    Browse the repository at this point in the history
  9. cdc-acm: correct counting of UART states in serial state notification

    The usb standard ("Universal Serial Bus Class Definitions for Communication
    Devices") distiguishes between "consistent signals" (DSR, DCD), and
    "irregular signals" (break, ring, parity error, framing error, overrun).
    The bits of "irregular signals" are set, if this error/event occurred on
    the device side and are immeadeatly unset, if the serial state notification
    was sent.
    Like other drivers of real serial ports do, just the occurence of those
    events should be counted in serial_icounter_struct (but no 1->0
    transitions).
    
    Signed-off-by: Tobias Herzog <t-herzog@gmx.de>
    Acked-by: Oliver Neukum <oneukum@suse.com>
    Cc: stable <stable@vger.kernel.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    Tobias Herzog authored and gregkh committed Oct 9, 2018
    Configuration menu
    Copy the full SHA
    f976d0e View commit details
    Browse the repository at this point in the history
  10. usb: roles: intel_xhci: Fix Unbalanced pm_runtime_enable

    Add missing pm_runtime_disable() to remove(), in order to avoid
    an Unbalanced pm_runtime_enable when the module is removed and
    re-probed.
    
    Error log:
    root@intel-corei7-64:~# modprobe -r intel_xhci_usb_role_switch
    root@intel-corei7-64:~# modprobe intel_xhci_usb_role_switch
    intel_xhci_usb_sw intel_xhci_usb_sw: Unbalanced pm_runtime_enable!
    
    Fixes: cb29684 (usb: roles: intel_xhci: Enable runtime PM)
    Cc: <stable@vger.kernel.org>
    Reviewed-by: Heikki Krogerus <heikki.krogerus@linux.intel.com>
    Signed-off-by: Wan Ahmad Zainie <wan.ahmad.zainie.wan.mohamad@intel.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    wanahmadzainie authored and gregkh committed Oct 9, 2018
    Configuration menu
    Copy the full SHA
    009b194 View commit details
    Browse the repository at this point in the history
  11. usb: xhci: pci: Enable Intel USB role mux on Apollo Lake platforms

    Intel Apollo Lake has the same internal USB role mux as
    Intel Cherry Trail.
    
    Cc: <stable@vger.kernel.org>
    Signed-off-by: Heikki Krogerus <heikki.krogerus@linux.intel.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    Heikki Krogerus authored and gregkh committed Oct 9, 2018
    Configuration menu
    Copy the full SHA
    c02588a View commit details
    Browse the repository at this point in the history
  12. gfs2: Fix iomap buffered write support for journaled files

    Commit 64bc06b broke buffered writes to journaled files (chattr
    +j): we'll try to journal the buffer heads of the page being written to
    in gfs2_iomap_journaled_page_done.  However, the iomap code no longer
    creates buffer heads, so we'll BUG() in gfs2_page_add_databufs.  Fix
    that by creating buffer heads ourself when needed.
    
    Signed-off-by: Andreas Gruenbacher <agruenba@redhat.com>
    Andreas Gruenbacher committed Oct 9, 2018
    Configuration menu
    Copy the full SHA
    dc480fe View commit details
    Browse the repository at this point in the history
  13. KVM: x86: support CONFIG_KVM_AMD=y with CONFIG_CRYPTO_DEV_CCP_DD=m

    SEV requires access to the AMD cryptographic device APIs, and this
    does not work when KVM is builtin and the crypto driver is a module.
    Actually the Kconfig conditions for CONFIG_KVM_AMD_SEV try to disable
    SEV in that case, but it does not work because the actual crypto
    calls are not culled, only sev_hardware_setup() is.
    
    This patch adds two CONFIG_KVM_AMD_SEV checks that gate all the remaining
    SEV code; it fixes this particular configuration, and drops 5 KiB of
    code when CONFIG_KVM_AMD_SEV=n.
    
    Reported-by: Guenter Roeck <linux@roeck-us.net>
    Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
    bonzini committed Oct 9, 2018
    Configuration menu
    Copy the full SHA
    853c110 View commit details
    Browse the repository at this point in the history
  14. Merge tag 'kvmarm-fixes-for-4.19-2' of git://git.kernel.org/pub/scm/l…

    …inux/kernel/git/kvmarm/kvmarm into kvm-master
    
    KVM/arm fixes for 4.19, take #2
    
    - Correctly order GICv3 SGI registers in the cp15 array
    bonzini committed Oct 9, 2018
    Configuration menu
    Copy the full SHA
    4cebf45 View commit details
    Browse the repository at this point in the history
  15. net: ena: fix warning in rmmod caused by double iounmap

    Memory mapped with devm_ioremap is automatically freed when the driver
    is disconnected from the device. Therefore there is no need to
    explicitly call devm_iounmap.
    
    Fixes: 0857d92 ("net: ena: add missing unmap bars on device removal")
    Fixes: 411838e ("net: ena: fix rare kernel crash when bar memory remap fails")
    Signed-off-by: Arthur Kiyanovski <akiyano@amazon.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    akiyano authored and davem330 committed Oct 9, 2018
    Configuration menu
    Copy the full SHA
    d79c388 View commit details
    Browse the repository at this point in the history
  16. net: ena: fix rare bug when failed restart/resume is followed by driv…

    …er removal
    
    In a rare scenario when ena_device_restore() fails, followed by device
    remove, an FLR will not be issued. In this case, the device will keep
    sending asynchronous AENQ keep-alive events, even after driver removal,
    leading to memory corruption.
    
    Fixes: 8c5c7ab ("net: ena: add power management ops to the ENA driver")
    Signed-off-by: Arthur Kiyanovski <akiyano@amazon.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    akiyano authored and davem330 committed Oct 9, 2018
    Configuration menu
    Copy the full SHA
    d7703dd View commit details
    Browse the repository at this point in the history
  17. net: ena: fix NULL dereference due to untimely napi initialization

    napi poll functions should be initialized before running request_irq(),
    to handle a rare condition where there is a pending interrupt, causing
    the ISR to fire immediately while the poll function wasn't set yet,
    causing a NULL dereference.
    
    Fixes: 1738cd3 ("net: ena: Add a driver for Amazon Elastic Network Adapters (ENA)")
    Signed-off-by: Arthur Kiyanovski <akiyano@amazon.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    akiyano authored and davem330 committed Oct 9, 2018
    Configuration menu
    Copy the full SHA
    78a55d0 View commit details
    Browse the repository at this point in the history
  18. net: ena: fix auto casting to boolean

    Eliminate potential auto casting compilation error.
    
    Fixes: 1738cd3 ("net: ena: Add a driver for Amazon Elastic Network Adapters (ENA)")
    Signed-off-by: Arthur Kiyanovski <akiyano@amazon.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    akiyano authored and davem330 committed Oct 9, 2018
    Configuration menu
    Copy the full SHA
    248ab77 View commit details
    Browse the repository at this point in the history
  19. Merge branch 'ena-fixes'

    Arthur Kiyanovski says:
    
    ====================
    minor bug fixes for ENA Ethernet driver
    
    Arthur Kiyanovski (4):
      net: ena: fix warning in rmmod caused by double iounmap
      net: ena: fix rare bug when failed restart/resume is followed by
        driver removal
      net: ena: fix NULL dereference due to untimely napi initialization
      net: ena: fix auto casting to boolean
    ====================
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Oct 9, 2018
    Configuration menu
    Copy the full SHA
    4cf34c0 View commit details
    Browse the repository at this point in the history
  20. dm cache: destroy migration_cache if cache target registration failed

    Commit 7e6358d ("dm: fix various targets to dm_register_target
    after module __init resources created") inadvertently introduced this
    bug when it moved dm_register_target() after the call to KMEM_CACHE().
    
    Fixes: 7e6358d ("dm: fix various targets to dm_register_target after module __init resources created")
    Cc: stable@vger.kernel.org
    Signed-off-by: Shenghui Wang <shhuiw@foxmail.com>
    Signed-off-by: Mike Snitzer <snitzer@redhat.com>
    shhuiw authored and snitm committed Oct 9, 2018
    Configuration menu
    Copy the full SHA
    c7cd555 View commit details
    Browse the repository at this point in the history
  21. dm: fix report zone remapping to account for partition offset

    If dm-linear or dm-flakey are layered on top of a partition of a zoned
    block device, remapping of the start sector and write pointer position
    of the zones reported by a report zones BIO must be modified to account
    for the target table entry mapping (start offset within the device and
    entry mapping with the dm device).  If the target's backing device is a
    partition of a whole disk, the start sector on the physical device of
    the partition must also be accounted for when modifying the zone
    information.  However, dm_remap_zone_report() was not considering this
    last case, resulting in incorrect zone information remapping with
    targets using disk partitions.
    
    Fix this by calculating the target backing device start sector using
    the position of the completed report zones BIO and the unchanged
    position and size of the original report zone BIO. With this value
    calculated, the start sector and write pointer position of the target
    zones can be correctly remapped.
    
    Fixes: 1099930 ("dm: introduce dm_remap_zone_report()")
    Cc: stable@vger.kernel.org
    Signed-off-by: Damien Le Moal <damien.lemoal@wdc.com>
    Signed-off-by: Mike Snitzer <snitzer@redhat.com>
    damien-lemoal authored and snitm committed Oct 9, 2018
    Configuration menu
    Copy the full SHA
    9864cd5 View commit details
    Browse the repository at this point in the history
  22. mm: Preserve _PAGE_DEVMAP across mprotect() calls

    Currently _PAGE_DEVMAP bit is not preserved in mprotect(2) calls. As a
    result we will see warnings such as:
    
    BUG: Bad page map in process JobWrk0013  pte:800001803875ea25 pmd:7624381067
    addr:00007f0930720000 vm_flags:280000f9 anon_vma:          (null) mapping:ffff97f2384056f0 index:0
    file:457-000000fe00000030-00000009-000000ca-00000001_2001.fileblock fault:xfs_filemap_fault [xfs] mmap:xfs_file_mmap [xfs] readpage:          (null)
    CPU: 3 PID: 15848 Comm: JobWrk0013 Tainted: G        W          4.12.14-2.g7573215-default #1 SLE12-SP4 (unreleased)
    Hardware name: Intel Corporation S2600WFD/S2600WFD, BIOS SE5C620.86B.01.00.0833.051120182255 05/11/2018
    Call Trace:
     dump_stack+0x5a/0x75
     print_bad_pte+0x217/0x2c0
     ? enqueue_task_fair+0x76/0x9f0
     _vm_normal_page+0xe5/0x100
     zap_pte_range+0x148/0x740
     unmap_page_range+0x39a/0x4b0
     unmap_vmas+0x42/0x90
     unmap_region+0x99/0xf0
     ? vma_gap_callbacks_rotate+0x1a/0x20
     do_munmap+0x255/0x3a0
     vm_munmap+0x54/0x80
     SyS_munmap+0x1d/0x30
     do_syscall_64+0x74/0x150
     entry_SYSCALL_64_after_hwframe+0x3d/0xa2
    ...
    
    when mprotect(2) gets used on DAX mappings. Also there is a wide variety
    of other failures that can result from the missing _PAGE_DEVMAP flag
    when the area gets used by get_user_pages() later.
    
    Fix the problem by including _PAGE_DEVMAP in a set of flags that get
    preserved by mprotect(2).
    
    Fixes: 69660fd ("x86, mm: introduce _PAGE_DEVMAP")
    Fixes: ebd3119 ("powerpc/mm: Add devmap support for ppc64")
    Cc: <stable@vger.kernel.org>
    Signed-off-by: Jan Kara <jack@suse.cz>
    Acked-by: Michal Hocko <mhocko@suse.com>
    Reviewed-by: Johannes Thumshirn <jthumshirn@suse.de>
    Signed-off-by: Dan Williams <dan.j.williams@intel.com>
    jankara authored and djbw committed Oct 9, 2018
    Configuration menu
    Copy the full SHA
    4628a64 View commit details
    Browse the repository at this point in the history
  23. sparc: Wire up io_pgetevents system call.

    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Oct 9, 2018
    Configuration menu
    Copy the full SHA
    7c26701 View commit details
    Browse the repository at this point in the history

Commits on Oct 10, 2018

  1. mfd: cros-ec: copy the whole event in get_next_event_xfer

    Commit 57e94c8 caused cros-ec keyboard events
    be truncated on many chromebooks so that Left and Right keys on Column 12 were
    always 0. Use ret as memcpy len to fix this.
    
    The old code was using ec_dev->event_size, which is the event payload/data size
    excluding event_type header, for the length of the memcpy operation. Use ret
    as memcpy length to avoid the off by one and copy the whole msg->data.
    
    Fixes: 57e94c8 ("mfd: cros-ec: Increase maximum mkbp event size")
    
    Acked-by: Enric Balletbo i Serra <enric.balletbo@collabora.com>
    Tested-by: Emil Renner Berthing <kernel@esmil.dk>
    Signed-off-by: Emil Karlson <jekarlson@gmail.com>
    Signed-off-by: Benson Leung <bleung@chromium.org>
    Emil Karlson authored and bleungatchromium committed Oct 10, 2018
    Configuration menu
    Copy the full SHA
    d4d2313 View commit details
    Browse the repository at this point in the history
  2. MAINTAINERS: update the SELinux mailing list location

    Signed-off-by: Paul Moore <paul@paul-moore.com>
    pcmoore committed Oct 10, 2018
    Configuration menu
    Copy the full SHA
    073c1a7 View commit details
    Browse the repository at this point in the history
  3. Merge tag 'mips_fixes_4.19_2' of git://git.kernel.org/pub/scm/linux/k…

    …ernel/git/mips/linux
    
    Paul writes:
      "A few MIPS fixes for 4.19:
    
       - Avoid suboptimal placement of our VDSO when using the legacy mmap
         layout, which can prevent statically linked programs that were able
         to allocate large amounts of memory using the brk syscall prior to
         the introduction of our VDSO from functioning correctly.
    
       - Fix up CONFIG_CMDLINE handling for platforms which ought to ignore
         DT arguments but have incorrectly used them & lost other arguments
         since v3.16.
    
       - Fix a path in MAINTAINERS to use valid wildcards.
    
       - Fixup a regression from v4.17 in memset() for systems using
         CPU_DADDI_WORKAROUNDS."
    
    * tag 'mips_fixes_4.19_2' of git://git.kernel.org/pub/scm/linux/kernel/git/mips/linux:
      MIPS: memset: Fix CPU_DADDI_WORKAROUNDS `small_fixup' regression
      MAINTAINERS: MIPS/LOONGSON2 ARCHITECTURE - Use the normal wildcard style
      MIPS: Fix CONFIG_CMDLINE handling
      MIPS: VDSO: Always map near top of user memory
    gregkh committed Oct 10, 2018
    Configuration menu
    Copy the full SHA
    701f2eb View commit details
    Browse the repository at this point in the history
  4. Merge tag 's390-4.19-4' of git://git.kernel.org/pub/scm/linux/kernel/…

    …git/s390/linux
    
    Martin writes:
      "s390 fixes for 4.19-rc8
    
       Four more patches for 4.19:
        - Fix resume after suspend-to-disk if resume-CPU != suspend-CPU
        - Fix vfio-ccw check for pinned pages
        - Two patches to avoid a usercopy-whitelist warning in vfio-ccw"
    
    * tag 's390-4.19-4' of git://git.kernel.org/pub/scm/linux/kernel/git/s390/linux:
      s390/cio: Fix how vfio-ccw checks pinned pages
      s390/cio: Refactor alloc of ccw_io_region
      s390/cio: Convert ccw_io_region to pointer
      s390/hibernate: fix error handling when suspend cpu != resume cpu
    gregkh committed Oct 10, 2018
    Configuration menu
    Copy the full SHA
    3d647e6 View commit details
    Browse the repository at this point in the history
  5. Merge tag 'gfs2-4.19.fixes2' of git://git.kernel.org/pub/scm/linux/ke…

    …rnel/git/gfs2/linux-gfs2
    
    Andreas writes:
      "gfs2 4.19 fix:
    
       This fixes a regression introduced in commit 64bc06b "gfs2:
       iomap buffered write support""
    
    * tag 'gfs2-4.19.fixes2' of git://git.kernel.org/pub/scm/linux/kernel/git/gfs2/linux-gfs2:
      gfs2: Fix iomap buffered write support for journaled files
    gregkh committed Oct 10, 2018
    Configuration menu
    Copy the full SHA
    3a0671e View commit details
    Browse the repository at this point in the history
  6. Merge branch 'for-4.19-fixes' of git://git.kernel.org/pub/scm/linux/k…

    …ernel/git/dennis/percpu
    
    Dennis writes:
      "percpu fixes for-4.19-rc8
    
       The new percpu allocator introduced in 4.14 had a missing free for
       the percpu metadata. This caused a memory leak when percpu memory is
       being churned resulting in the allocation and deallocation of percpu
       memory chunks"
    
    * 'for-4.19-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/dennis/percpu:
      percpu: stop leaking bitmap metadata blocks
    gregkh committed Oct 10, 2018
    Configuration menu
    Copy the full SHA
    c350a1d View commit details
    Browse the repository at this point in the history
  7. Merge tag 'tag-chrome-platform-fixes-for-v4.19-rc8' of git://git.kern…

    …el.org/pub/scm/linux/kernel/git/bleung/chrome-platform
    
    Benson writes:
      "chrome-platform fix for v4.19-rc8
    
       This contains a fix to 57e94c8 ("mfd: cros-ec: Increase maximum
       mkbp event size"), which caused cros_ec based chromebooks to truncate
       an entire column of their built-in keyboard."
    
    * tag 'tag-chrome-platform-fixes-for-v4.19-rc8' of git://git.kernel.org/pub/scm/linux/kernel/git/bleung/chrome-platform:
      mfd: cros-ec: copy the whole event in get_next_event_xfer
    gregkh committed Oct 10, 2018
    Configuration menu
    Copy the full SHA
    bb2d8f2 View commit details
    Browse the repository at this point in the history
  8. of: unittest: Disable interrupt node tests for old world MAC systems

    On systems with OF_IMAP_OLDWORLD_MAC set in of_irq_workarounds, the
    devicetree interrupt parsing code is different, causing unit tests of
    devicetree interrupt nodes to fail. Due to a bug in unittest code, which
    tries to dereference an uninitialized pointer, this results in a crash.
    
    OF: /testcase-data/phandle-tests/consumer-a: arguments longer than property
    Unable to handle kernel paging request for data at address 0x00bc616e
    Faulting instruction address: 0xc08e9468
    Oops: Kernel access of bad area, sig: 11 [#1]
    BE PREEMPT PowerMac
    Modules linked in:
    CPU: 0 PID: 1 Comm: swapper Not tainted 4.14.72-rc1-yocto-standard+ #1
    task: cf8e0000 task.stack: cf8da000
    NIP:  c08e9468 LR: c08ea5bc CTR: c08ea5ac
    REGS: cf8dbb50 TRAP: 0300   Not tainted  (4.14.72-rc1-yocto-standard+)
    MSR:  00001032 <ME,IR,DR,RI>  CR: 82004044  XER: 00000000
    DAR: 00bc616e DSISR: 40000000
    GPR00: c08ea5bc cf8dbc00 cf8e0000 c13ca517 c13ca517 c13ca8a0 00000066 00000002
    GPR08: 00000063 00bc614e c0b05865 000affff 82004048 00000000 c00047f0 00000000
    GPR16: c0a80000 c0a9cc34 c13ca517 c0ad1134 05ffffff 000affff c0b05860 c0abeef8
    GPR24: cecec278 cecec278 c0a8c4d0 c0a885e0 c13ca8a0 05ffffff c13ca8a0 c13ca517
    
    NIP [c08e9468] device_node_gen_full_name+0x30/0x15c
    LR [c08ea5bc] device_node_string+0x190/0x3c8
    Call Trace:
    [cf8dbc00] [c007f670] trace_hardirqs_on_caller+0x118/0x1fc (unreliable)
    [cf8dbc40] [c08ea5bc] device_node_string+0x190/0x3c8
    [cf8dbcb0] [c08eb794] pointer+0x25c/0x4d0
    [cf8dbd00] [c08ebcbc] vsnprintf+0x2b4/0x5ec
    [cf8dbd60] [c08ec00c] vscnprintf+0x18/0x48
    [cf8dbd70] [c008e268] vprintk_store+0x4c/0x22c
    [cf8dbda0] [c008ecac] vprintk_emit+0x94/0x130
    [cf8dbdd0] [c008ff54] printk+0x5c/0x6c
    [cf8dbe10] [c0b8ddd4] of_unittest+0x2220/0x26f8
    [cf8dbea0] [c0004434] do_one_initcall+0x4c/0x184
    [cf8dbf00] [c0b4534c] kernel_init_freeable+0x13c/0x1d8
    [cf8dbf30] [c0004814] kernel_init+0x24/0x118
    [cf8dbf40] [c0013398] ret_from_kernel_thread+0x5c/0x64
    
    The problem was observed when running a qemu test for the g3beige machine
    with devicetree unittests enabled.
    
    Disable interrupt node tests on affected systems to avoid both false
    unittest failures and the crash.
    
    With this patch in place, unittest on the affected system passes with
    the following message.
    
    	dt-test ### end of unittest - 144 passed, 0 failed
    
    Fixes: 53a4209 ("of: Add device tree selftests")
    Signed-off-by: Guenter Roeck <linux@roeck-us.net>
    Reviewed-by: Frank Rowand <frank.rowand@sony.com>
    Signed-off-by: Rob Herring <robh@kernel.org>
    groeck authored and robherring committed Oct 10, 2018
    Configuration menu
    Copy the full SHA
    8894891 View commit details
    Browse the repository at this point in the history
  9. libertas: call into generic suspend code before turning off power

    When powering down a SDIO connected card during suspend, make sure to call
    into the generic lbs_suspend() function before pulling the plug. This will
    make sure the card is successfully deregistered from the system to avoid
    communication to the card starving out.
    
    Fixes: 7444a80 ("libertas: fix suspend and resume for SDIO connected cards")
    Signed-off-by: Daniel Mack <daniel@zonque.org>
    Reviewed-by: Ulf Hansson <ulf.hansson@linaro.org>
    Acked-by: Kalle Valo <kvalo@codeaurora.org>
    Signed-off-by: Ulf Hansson <ulf.hansson@linaro.org>
    zonque authored and storulf committed Oct 10, 2018
    Configuration menu
    Copy the full SHA
    4f66667 View commit details
    Browse the repository at this point in the history
  10. gpio: Assign gpio_irq_chip::parents to non-stack pointer

    gpiochip_set_cascaded_irqchip() is passed 'parent_irq' as an argument
    and then the address of that argument is assigned to the gpio chips
    gpio_irq_chip 'parents' pointer shortly thereafter. This can't ever
    work, because we've just assigned some stack address to a pointer that
    we plan to dereference later in gpiochip_irq_map(). I ran into this
    issue with the KASAN report below when gpiochip_irq_map() tried to setup
    the parent irq with a total junk pointer for the 'parents' array.
    
    BUG: KASAN: stack-out-of-bounds in gpiochip_irq_map+0x228/0x248
    Read of size 4 at addr ffffffc0dde472e0 by task swapper/0/1
    
    CPU: 7 PID: 1 Comm: swapper/0 Not tainted 4.14.72 #34
    Call trace:
    [<ffffff9008093638>] dump_backtrace+0x0/0x718
    [<ffffff9008093da4>] show_stack+0x20/0x2c
    [<ffffff90096b9224>] __dump_stack+0x20/0x28
    [<ffffff90096b91c8>] dump_stack+0x80/0xbc
    [<ffffff900845a350>] print_address_description+0x70/0x238
    [<ffffff900845a8e4>] kasan_report+0x1cc/0x260
    [<ffffff900845aa14>] __asan_report_load4_noabort+0x2c/0x38
    [<ffffff900897e098>] gpiochip_irq_map+0x228/0x248
    [<ffffff900820cc08>] irq_domain_associate+0x114/0x2ec
    [<ffffff900820d13c>] irq_create_mapping+0x120/0x234
    [<ffffff900820da78>] irq_create_fwspec_mapping+0x4c8/0x88c
    [<ffffff900820e2d8>] irq_create_of_mapping+0x180/0x210
    [<ffffff900917114c>] of_irq_get+0x138/0x198
    [<ffffff9008dc70ac>] spi_drv_probe+0x94/0x178
    [<ffffff9008ca5168>] driver_probe_device+0x51c/0x824
    [<ffffff9008ca6538>] __device_attach_driver+0x148/0x20c
    [<ffffff9008ca14cc>] bus_for_each_drv+0x120/0x188
    [<ffffff9008ca570c>] __device_attach+0x19c/0x2dc
    [<ffffff9008ca586c>] device_initial_probe+0x20/0x2c
    [<ffffff9008ca18bc>] bus_probe_device+0x80/0x154
    [<ffffff9008c9b9b4>] device_add+0x9b8/0xbdc
    [<ffffff9008dc7640>] spi_add_device+0x1b8/0x380
    [<ffffff9008dcbaf0>] spi_register_controller+0x111c/0x1378
    [<ffffff9008dd6b10>] spi_geni_probe+0x4dc/0x6f8
    [<ffffff9008cab058>] platform_drv_probe+0xdc/0x130
    [<ffffff9008ca5168>] driver_probe_device+0x51c/0x824
    [<ffffff9008ca59cc>] __driver_attach+0x100/0x194
    [<ffffff9008ca0ea8>] bus_for_each_dev+0x104/0x16c
    [<ffffff9008ca58c0>] driver_attach+0x48/0x54
    [<ffffff9008ca1edc>] bus_add_driver+0x274/0x498
    [<ffffff9008ca8448>] driver_register+0x1ac/0x230
    [<ffffff9008caaf6c>] __platform_driver_register+0xcc/0xdc
    [<ffffff9009c4b33c>] spi_geni_driver_init+0x1c/0x24
    [<ffffff9008084cb8>] do_one_initcall+0x240/0x3dc
    [<ffffff9009c017d0>] kernel_init_freeable+0x378/0x468
    [<ffffff90096e8240>] kernel_init+0x14/0x110
    [<ffffff9008086fcc>] ret_from_fork+0x10/0x18
    
    The buggy address belongs to the page:
    page:ffffffbf037791c0 count:0 mapcount:0 mapping:          (null) index:0x0
    flags: 0x4000000000000000()
    raw: 4000000000000000 0000000000000000 0000000000000000 00000000ffffffff
    raw: ffffffbf037791e0 ffffffbf037791e0 0000000000000000 0000000000000000
    page dumped because: kasan: bad access detected
    
    Memory state around the buggy address:
     ffffffc0dde47180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     ffffffc0dde47200: f1 f1 f1 f1 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f2 f2
    >ffffffc0dde47280: f2 f2 00 00 00 00 00 00 00 00 00 00 f3 f3 f3 f3
                                                           ^
     ffffffc0dde47300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
     ffffffc0dde47380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    
    Let's leave around one unsigned int in the gpio_irq_chip struct for the
    single parent irq case and repoint the 'parents' array at it. This way
    code is left mostly intact to setup parents and we waste an extra few
    bytes per structure of which there should be only a handful in a system.
    
    Cc: Evan Green <evgreen@chromium.org>
    Cc: Thierry Reding <treding@nvidia.com>
    Cc: Grygorii Strashko <grygorii.strashko@ti.com>
    Fixes: e0d8972 ("gpio: Implement tighter IRQ chip integration")
    Signed-off-by: Stephen Boyd <swboyd@chromium.org>
    Signed-off-by: Linus Walleij <linus.walleij@linaro.org>
    bebarino authored and linusw committed Oct 10, 2018
    Configuration menu
    Copy the full SHA
    3e779a2 View commit details
    Browse the repository at this point in the history
  11. pinctrl: mcp23s08: fix irq and irqchip setup order

    Since 'commit 02e389e ("pinctrl: mcp23s08: fix irq setup order")' the
    irq request isn't the last devm_* allocation. Without a deeper look at
    the irq and testing this isn't a good solution. Since this driver relies
    on the devm mechanism, requesting a interrupt should be the last thing
    to avoid memory corruptions during unbinding.
    
    'Commit 02e389e ("pinctrl: mcp23s08: fix irq setup order")' fixed the
    order for the interrupt-controller use case only. The
    mcp23s08_irq_setup() must be split into two to fix it for the
    interrupt-controller use case and to register the irq at last. So the
    irq will be freed first during unbind.
    
    Cc: stable@vger.kernel.org
    Cc: Jan Kundrát <jan.kundrat@cesnet.cz>
    Cc: Dmitry Mastykin <mastichi@gmail.com>
    Cc: Sebastian Reichel <sebastian.reichel@collabora.co.uk>
    Fixes: 82039d2 ("pinctrl: mcp23s08: add pinconf support")
    Fixes: 02e389e ("pinctrl: mcp23s08: fix irq setup order")
    Signed-off-by: Marco Felsch <m.felsch@pengutronix.de>
    Tested-by: Phil Reid <preid@electromag.com.au>
    Signed-off-by: Linus Walleij <linus.walleij@linaro.org>
    Marco Felsch authored and linusw committed Oct 10, 2018
    Configuration menu
    Copy the full SHA
    f259f89 View commit details
    Browse the repository at this point in the history
  12. dm linear: eliminate linear_end_io call if CONFIG_DM_ZONED disabled

    It is best to avoid any extra overhead associated with bio completion.
    DM core will indirectly call a DM target's .end_io if it is defined.
    In the case of DM linear, there is no need to do so (for every bio that
    completes) if CONFIG_DM_ZONED is not enabled.
    
    Avoiding an extra indirect call for every bio completion is very
    important for ensuring DM linear doesn't incur more overhead that
    further widens the performance gap between dm-linear and raw block
    devices.
    
    Fixes: 0be12c1 ("dm linear: add support for zoned block devices")
    Cc: stable@vger.kernel.org
    Signed-off-by: Mike Snitzer <snitzer@redhat.com>
    snitm committed Oct 10, 2018
    Configuration menu
    Copy the full SHA
    beb9caa View commit details
    Browse the repository at this point in the history
  13. samples: disable CONFIG_SAMPLES for UML

    Some samples require headers installation, so commit 3fca170
    ("kbuild: make samples really depend on headers_install") added
    such dependency in the top Makefile. However, UML fails to build
    with CONFIG_SAMPLES=y because UML does not support headers_install.
    
    Fixes: 3fca170 ("kbuild: make samples really depend on headers_install")
    Reported-by: Kees Cook <keescook@chromium.org>
    Cc: David Howells <dhowells@redhat.com>
    Signed-off-by: Masahiro Yamada <yamada.masahiro@socionext.com>
    masahir0y committed Oct 10, 2018
    Configuration menu
    Copy the full SHA
    5318321 View commit details
    Browse the repository at this point in the history
  14. devlink: Fix param set handling for string type

    In case devlink param type is string, it needs to copy the string value
    it got from the input to devlink_param_value.
    
    Fixes: e3b7ca1 ("devlink: Add param set command")
    Signed-off-by: Moshe Shemesh <moshe@mellanox.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Moshe Shemesh authored and davem330 committed Oct 10, 2018
    Configuration menu
    Copy the full SHA
    f355cfc View commit details
    Browse the repository at this point in the history
  15. devlink: Fix param cmode driverinit for string type

    Driverinit configuration mode value is held by devlink to enable the
    driver fetch the value after reload command. In case the param type is
    string devlink should copy the value from driver string buffer to
    devlink string buffer on devlink_param_driverinit_value_set() and
    vice-versa on devlink_param_driverinit_value_get().
    
    Fixes: ec01aeb ("devlink: Add support for get/set driverinit value")
    Signed-off-by: Moshe Shemesh <moshe@mellanox.com>
    Acked-by: Jiri Pirko <jiri@mellanox.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Moshe Shemesh authored and davem330 committed Oct 10, 2018
    Configuration menu
    Copy the full SHA
    1276534 View commit details
    Browse the repository at this point in the history
  16. devlink: Add helper function for safely copy string param

    Devlink string param buffer is allocated at the size of
    DEVLINK_PARAM_MAX_STRING_VALUE. Add helper function which makes sure
    this size is not exceeded.
    Renamed DEVLINK_PARAM_MAX_STRING_VALUE to
    __DEVLINK_PARAM_MAX_STRING_VALUE to emphasize that it should be used by
    devlink only. The driver should use the helper function instead to
    verify it doesn't exceed the allowed length.
    
    Signed-off-by: Moshe Shemesh <moshe@mellanox.com>
    Acked-by: Jiri Pirko <jiri@mellanox.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Moshe Shemesh authored and davem330 committed Oct 10, 2018
    Configuration menu
    Copy the full SHA
    bde74ad View commit details
    Browse the repository at this point in the history
  17. Merge branch 'devlink-param-type-string-fixes'

    Moshe Shemesh says:
    
    ====================
    devlink param type string fixes
    
    This patchset fixes devlink param infrastructure for string param type.
    
    The devlink param infrastructure doesn't handle copying the string data
    correctly.  The first two patches fix it and the third patch adds helper
    function to safely copy string value without exceeding
    DEVLINK_PARAM_MAX_STRING_VALUE.
    ====================
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Oct 10, 2018
    Configuration menu
    Copy the full SHA
    8b79f41 View commit details
    Browse the repository at this point in the history
  18. net: make skb_partial_csum_set() more robust against overflows

    syzbot managed to crash in skb_checksum_help() [1] :
    
            BUG_ON(offset + sizeof(__sum16) > skb_headlen(skb));
    
    Root cause is the following check in skb_partial_csum_set()
    
    	if (unlikely(start > skb_headlen(skb)) ||
    	    unlikely((int)start + off > skb_headlen(skb) - 2))
    		return false;
    
    If skb_headlen(skb) is 1, then (skb_headlen(skb) - 2) becomes 0xffffffff
    and the check fails to detect that ((int)start + off) is off the limit,
    since the compare is unsigned.
    
    When we fix that, then the first condition (start > skb_headlen(skb))
    becomes obsolete.
    
    Then we should also check that (skb_headroom(skb) + start) wont
    overflow 16bit field.
    
    [1]
    kernel BUG at net/core/dev.c:2880!
    invalid opcode: 0000 [#1] PREEMPT SMP KASAN
    CPU: 1 PID: 7330 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #253
    Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
    RIP: 0010:skb_checksum_help+0x9e3/0xbb0 net/core/dev.c:2880
    Code: 85 00 ff ff ff 48 c1 e8 03 42 80 3c 28 00 0f 84 09 fb ff ff 48 8b bd 00 ff ff ff e8 97 a8 b9 fb e9 f8 fa ff ff e8 2d 09 76 fb <0f> 0b 48 8b bd 28 ff ff ff e8 1f a8 b9 fb e9 b1 f6 ff ff 48 89 cf
    RSP: 0018:ffff8801d83a6f60 EFLAGS: 00010293
    RAX: ffff8801b9834380 RBX: ffff8801b9f8d8c0 RCX: ffffffff8608c6d7
    RDX: 0000000000000000 RSI: ffffffff8608cc63 RDI: 0000000000000006
    RBP: ffff8801d83a7068 R08: ffff8801b9834380 R09: 0000000000000000
    R10: ffff8801d83a76d8 R11: 0000000000000000 R12: 0000000000000001
    R13: 0000000000010001 R14: 000000000000ffff R15: 00000000000000a8
    FS:  00007f1a66db5700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000
    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 00007f7d77f091b0 CR3: 00000001ba252000 CR4: 00000000001406e0
    DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
    Call Trace:
     skb_csum_hwoffload_help+0x8f/0xe0 net/core/dev.c:3269
     validate_xmit_skb+0xa2a/0xf30 net/core/dev.c:3312
     __dev_queue_xmit+0xc2f/0x3950 net/core/dev.c:3797
     dev_queue_xmit+0x17/0x20 net/core/dev.c:3838
     packet_snd net/packet/af_packet.c:2928 [inline]
     packet_sendmsg+0x422d/0x64c0 net/packet/af_packet.c:2953
    
    Fixes: 5ff8dda ("net: Ensure partial checksum offset is inside the skb head")
    Signed-off-by: Eric Dumazet <edumazet@google.com>
    Cc: Herbert Xu <herbert@gondor.apana.org.au>
    Reported-by: syzbot <syzkaller@googlegroups.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Eric Dumazet authored and davem330 committed Oct 10, 2018
    Configuration menu
    Copy the full SHA
    52b5d6f View commit details
    Browse the repository at this point in the history
  19. IB/mlx5: Unmap DMA addr from HCA before IOMMU

    The function that puts back the MR in cache also removes the DMA address
    from the HCA. Therefore we need to call this function before we remove
    the DMA mapping from MMU. Otherwise the HCA may access a memory that
    is no longer DMA mapped.
    
    Call trace:
    NMI: IOCK error (debug interrupt?) for reason 71 on CPU 0.
    CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.19.0-rc6+ #4
    Hardware name: HP ProLiant DL360p Gen8, BIOS P71 08/20/2012
    RIP: 0010:intel_idle+0x73/0x120
    Code: 80 5c 01 00 0f ae 38 0f ae f0 31 d2 65 48 8b 04 25 80 5c 01 00 48 89 d1 0f 60 02
    RSP: 0018:ffffffff9a403e38 EFLAGS: 00000046
    RAX: 0000000000000030 RBX: 0000000000000005 RCX: 0000000000000001
    RDX: 0000000000000000 RSI: ffffffff9a5790c0 RDI: 0000000000000000
    RBP: 0000000000000030 R08: 0000000000000000 R09: 0000000000007cf9
    R10: 000000000000030a R11: 0000000000000018 R12: 0000000000000000
    R13: ffffffff9a5792b8 R14: ffffffff9a5790c0 R15: 0000002b48471e4d
    FS:  0000000000000000(0000) GS:ffff9c6caf400000(0000) knlGS:0000000000000000
    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 00007f5737185000 CR3: 0000000590c0a002 CR4: 00000000000606f0
    Call Trace:
     cpuidle_enter_state+0x7e/0x2e0
     do_idle+0x1ed/0x290
     cpu_startup_entry+0x6f/0x80
     start_kernel+0x524/0x544
     ? set_init_arg+0x55/0x55
     secondary_startup_64+0xa4/0xb0
    DMAR: DRHD: handling fault status reg 2
    DMAR: [DMA Read] Request device [04:00.0] fault addr b34d2000 [fault reason 06] PTE Read access is not set
    DMAR: [DMA Read] Request device [01:00.2] fault addr bff8b000 [fault reason 06] PTE Read access is not set
    
    Fixes: f3f134f ("RDMA/mlx5: Fix crash while accessing garbage pointer and freed memory")
    Signed-off-by: Valentine Fatiev <valentinef@mellanox.com>
    Reviewed-by: Moni Shoua <monis@mellanox.com>
    Signed-off-by: Leon Romanovsky <leonro@mellanox.com>
    Signed-off-by: Doug Ledford <dledford@redhat.com>
    Valentine Fatiev authored and dledford committed Oct 10, 2018
    Configuration menu
    Copy the full SHA
    dd9a403 View commit details
    Browse the repository at this point in the history
  20. Merge tag 'devicetree-fixes-for-4.19-3' of git://git.kernel.org/pub/s…

    …cm/linux/kernel/git/robh/linux
    
    Rob writes:
      "Devicetree fixes for 4.19, part 3:
    
       - Fix DT unittest on Oldworld MAC systems"
    
    * tag 'devicetree-fixes-for-4.19-3' of git://git.kernel.org/pub/scm/linux/kernel/git/robh/linux:
      of: unittest: Disable interrupt node tests for old world MAC systems
    gregkh committed Oct 10, 2018
    Configuration menu
    Copy the full SHA
    f7e59f3 View commit details
    Browse the repository at this point in the history
  21. Merge tag 'trace-v4.19-rc5' of git://git.kernel.org/pub/scm/linux/ker…

    …nel/git/rostedt/linux-trace
    
    Steven writes:
      "vsprint fix:
    
       It was reported that trace_printk() was not reporting properly
       values that came after a dereference pointer.
    
       trace_printk() utilizes vbin_printf() and bstr_printf() to keep the
       overhead of tracing down. vbin_printf() does not do any conversions
       and just stors the string format and the raw arguments into the
       buffer. bstr_printf() is used to read the buffer and does the
       conversions to complete the printf() output.
    
       This can be troublesome with dereferenced pointers because the
       reference may be different from the time vbin_printf() is called to
       the time bstr_printf() is called. To fix this, a prior commit changed
       vbin_printf() to convert dereferenced pointers into strings and load
       the converted string into the buffer. But the change to bstr_printf()
       had an off-by-one error and didn't account for the nul character at
       the end of the string and this corrupted the rest of the values in
       the format that came after a dereferenced pointer."
    
    * tag 'trace-v4.19-rc5' of git://git.kernel.org/pub/scm/linux/kernel/git/rostedt/linux-trace:
      vsprintf: Fix off-by-one bug in bstr_printf() processing dereferenced pointers
    gregkh committed Oct 10, 2018
    Configuration menu
    Copy the full SHA
    588b593 View commit details
    Browse the repository at this point in the history
  22. Merge tag 'for-4.19/dm-fixes-3' of git://git.kernel.org/pub/scm/linux…

    …/kernel/git/device-mapper/linux-dm
    
    Mike writes:
      "device mapper fixes for 4.19 final
    
       - Fix a DM cache module init error path bug that doesn't properly
         cleanup a KMEM_CACHE if target registration fails.
    
       - Two stable@ fixes for DM zoned target; 4.20 will have changes that
         eliminate this code entirely but <= 4.19 needs these changes."
    
    * tag 'for-4.19/dm-fixes-3' of git://git.kernel.org/pub/scm/linux/kernel/git/device-mapper/linux-dm:
      dm linear: eliminate linear_end_io call if CONFIG_DM_ZONED disabled
      dm: fix report zone remapping to account for partition offset
      dm cache: destroy migration_cache if cache target registration failed
    gregkh committed Oct 10, 2018
    Configuration menu
    Copy the full SHA
    b8db9e6 View commit details
    Browse the repository at this point in the history

Commits on Oct 11, 2018

  1. net/mlx5: Fix memory leak when setting fpga ipsec caps

    Allocated memory for context should be freed once
    finished working with it.
    
    Fixes: d6c4f02 ("net/mlx5: Refactor accel IPSec code")
    Signed-off-by: Talat Batheesh <talatb@mellanox.com>
    Reviewed-by: Or Gerlitz <ogerlitz@mellanox.com>
    Reviewed-by: Tariq Toukan <tariqt@mellanox.com>
    Signed-off-by: Saeed Mahameed <saeedm@mellanox.com>
    talatb authored and Saeed Mahameed committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    fd7e848 View commit details
    Browse the repository at this point in the history
  2. net/mlx5: Take only bit 24-26 of wqe.pftype_wq for page fault type

    The HW spec defines only bits 24-26 of pftype_wq as the page fault type,
    use the required mask to ensure that.
    
    Fixes: d9aaed8 ("{net,IB}/mlx5: Refactor page fault handling")
    Signed-off-by: Huy Nguyen <huyn@mellanox.com>
    Signed-off-by: Eli Cohen <eli@mellanox.com>
    Signed-off-by: Saeed Mahameed <saeedm@mellanox.com>
    Huy Nguyen authored and Saeed Mahameed committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    a48bc51 View commit details
    Browse the repository at this point in the history
  3. net/mlx5: WQ, fixes for fragmented WQ buffers API

    mlx5e netdevice used to calculate fragment edges by a call to
    mlx5_wq_cyc_get_frag_size(). This calculation did not give the correct
    indication for queues smaller than a PAGE_SIZE, (broken by default on
    PowerPC, where PAGE_SIZE == 64KB).  Here it is replaced by the correct new
    calls/API.
    
    Since (TX/RX) Work Queues buffers are fragmented, here we introduce
    changes to the API in core driver, so that it gets a stride index and
    returns the index of last stride on same fragment, and an additional
    wrapping function that returns the number of physically contiguous
    strides that can be written contiguously to the work queue.
    
    This obsoletes the following API functions, and their buggy
    usage in EN driver:
    * mlx5_wq_cyc_get_frag_size()
    * mlx5_wq_cyc_ctr2fragix()
    
    The new API improves modularity and hides the details of such
    calculation for mlx5e netdevice and mlx5_ib rdma drivers.
    
    New calculation is also more efficient, and improves performance
    as follows:
    
    Packet rate test: pktgen, UDP / IPv4, 64byte, single ring, 8K ring size.
    
    Before: 16,477,619 pps
    After:  17,085,793 pps
    
    3.7% improvement
    
    Fixes: 3a2f703 ("net/mlx5: Use order-0 allocations for all WQ types")
    Signed-off-by: Tariq Toukan <tariqt@mellanox.com>
    Reviewed-by: Eran Ben Elisha <eranbe@mellanox.com>
    Signed-off-by: Saeed Mahameed <saeedm@mellanox.com>
    Tariq Toukan authored and Saeed Mahameed committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    37fdffb View commit details
    Browse the repository at this point in the history
  4. dm linear: fix linear_end_io conditional definition

    The dm-linear target is independent of the dm-zoned target. For code
    requiring support for zoned block devices, use CONFIG_BLK_DEV_ZONED
    instead of CONFIG_DM_ZONED.
    
    While at it, similarly to dm linear, also enable the DM_TARGET_ZONED_HM
    feature in dm-flakey only if CONFIG_BLK_DEV_ZONED is defined.
    
    Fixes: beb9caa ("dm linear: eliminate linear_end_io call if CONFIG_DM_ZONED disabled")
    Fixes: 0be12c1 ("dm linear: add support for zoned block devices")
    Cc: stable@vger.kernel.org
    Signed-off-by: Damien Le Moal <damien.lemoal@wdc.com>
    Signed-off-by: Mike Snitzer <snitzer@redhat.com>
    damien-lemoal authored and snitm committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    118aa47 View commit details
    Browse the repository at this point in the history
  5. Merge tag 'xfs-fixes-for-4.19-rc7' of git://git.kernel.org/pub/scm/fs…

    …/xfs/xfs-linux
    
    Dave writes:
      "xfs: fixes for 4.19-rc7
    
       Update for 4.19-rc7 to fix numerous file clone and deduplication issues."
    
    * tag 'xfs-fixes-for-4.19-rc7' of git://git.kernel.org/pub/scm/fs/xfs/xfs-linux:
      xfs: fix data corruption w/ unaligned reflink ranges
      xfs: fix data corruption w/ unaligned dedupe ranges
      xfs: update ctime and remove suid before cloning files
      xfs: zero posteof blocks when cloning above eof
      xfs: refactor clonerange preparation into a separate helper
    gregkh committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    4718dca View commit details
    Browse the repository at this point in the history
  6. Merge tag 'for-4.19/dm-fixes-4' of git://git.kernel.org/pub/scm/linux…

    …/kernel/git/device-mapper/linux-dm
    
    Mike writes:
      "device mapper fix for 4.19 final
    
       - Fix for earlier 4.19 final DM linear change that incorrectly
         checked for CONFIG_DM_ZONED rather than CONFIG_BLK_DEV_ZONED."
    
    * tag 'for-4.19/dm-fixes-4' of git://git.kernel.org/pub/scm/linux/kernel/git/device-mapper/linux-dm:
      dm linear: fix linear_end_io conditional definition
    gregkh committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    9dcd936 View commit details
    Browse the repository at this point in the history
  7. rds: RDS (tcp) hangs on sendto() to unresponding address

    In rds_send_mprds_hash(), if the calculated hash value is non-zero and
    the MPRDS connections are not yet up, it will wait.  But it should not
    wait if the send is non-blocking.  In this case, it should just use the
    base c_path for sending the message.
    
    Signed-off-by: Ka-Cheong Poon <ka-cheong.poon@oracle.com>
    Acked-by: Santosh Shilimkar <santosh.shilimkar@oracle.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    kcp-git authored and davem330 committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    9a4890b View commit details
    Browse the repository at this point in the history
  8. Merge tag 'rxrpc-fixes-20181008' of git://git.kernel.org/pub/scm/linu…

    …x/kernel/git/dhowells/linux-fs
    
    David Howells says:
    
    ====================
    rxrpc: Fix packet reception code
    
    Here are a set of patches that prepares for and fix problems in rxrpc's
    package reception code.  There serious problems are:
    
     (A) There's a window between binding the socket and setting the data_ready
         hook in which packets can find their way into the UDP socket's receive
         queues.
    
     (B) The skb_recv_udp() will return an error (and clear the error state) if
         there was an error on the Tx side.  rxrpc doesn't handle this.
    
     (C) The rxrpc data_ready handler doesn't fully drain the UDP receive
         queue.
    
     (D) The rxrpc data_ready handler assumes it is called in a non-reentrant
     state.
    
    The second patch fixes (A) - (C); the third patch renders (B) and (C)
    non-issues by using the recap_rcv hook instead of data_ready - and the
    final patch fixes (D).  That last is the most complex.
    
    The preparatory patches are:
    
     (1) Fix some places that are doing things in the wrong net namespace.
    
     (2) Stop taking the rcu read lock as it's held by the IP input routine in
         the call chain.
    
     (3) Only end the Tx phase if *we* rotated the final packet out of the Tx
         buffer.
    
     (4) Don't assume that the call state won't change after dropping the
         call_state lock.
    
     (5) Only take receive window and MTU suze parameters from an ACK packet if
         it's the latest ACK packet.
    
     (6) Record connection-level abort information correctly.
    
     (7) Fix a trace line.
    
    And then there are three main patches - note that these are mixed in with
    the preparatory patches somewhat:
    
     (1) Fix the setup window (A), skb_recv_udp() error check (B) and packet
         drainage (C).
    
     (2) Switch to using the encap_rcv instead of data_ready to cut out the
         effects of the UDP read queues and get the packets delivered directly.
    
     (3) Add more locking into the various packet input paths to defend against
         re-entrance (D).
    ====================
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    49b538e View commit details
    Browse the repository at this point in the history
  9. net/ipv6: stop leaking percpu memory in fib6 info

    The fib6_info_alloc() function allocates percpu memory to hold per CPU
    pointers to rt6_info, but this memory is never freed. Fix it.
    
    Fixes: a64efe1 ("net/ipv6: introduce fib6_info struct and helpers")
    Signed-off-by: Mike Rapoport <rppt@linux.vnet.ibm.com>
    Reviewed-by: David Ahern <dsahern@gmail.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    rppt authored and davem330 committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    7abab7b View commit details
    Browse the repository at this point in the history
  10. net: ipv4: update fnhe_pmtu when first hop's MTU changes

    Since commit 5aad1de ("ipv4: use separate genid for next hop
    exceptions"), exceptions get deprecated separately from cached
    routes. In particular, administrative changes don't clear PMTU anymore.
    
    As Stefano described in commit e9fa149 ("ipv6: Reflect MTU changes
    on PMTU of exceptions for MTU-less routes"), the PMTU discovered before
    the local MTU change can become stale:
     - if the local MTU is now lower than the PMTU, that PMTU is now
       incorrect
     - if the local MTU was the lowest value in the path, and is increased,
       we might discover a higher PMTU
    
    Similarly to what commit e9fa149 did for IPv6, update PMTU in those
    cases.
    
    If the exception was locked, the discovered PMTU was smaller than the
    minimal accepted PMTU. In that case, if the new local MTU is smaller
    than the current PMTU, let PMTU discovery figure out if locking of the
    exception is still needed.
    
    To do this, we need to know the old link MTU in the NETDEV_CHANGEMTU
    notifier. By the time the notifier is called, dev->mtu has been
    changed. This patch adds the old MTU as additional information in the
    notifier structure, and a new call_netdevice_notifiers_u32() function.
    
    Fixes: 5aad1de ("ipv4: use separate genid for next hop exceptions")
    Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
    Reviewed-by: Stefano Brivio <sbrivio@redhat.com>
    Reviewed-by: David Ahern <dsahern@gmail.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    qsn authored and davem330 committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    af7d6cc View commit details
    Browse the repository at this point in the history
  11. net: ipv4: don't let PMTU updates increase route MTU

    When an MTU update with PMTU smaller than net.ipv4.route.min_pmtu is
    received, we must clamp its value. However, we can receive a PMTU
    exception with PMTU < old_mtu < ip_rt_min_pmtu, which would lead to an
    increase in PMTU.
    
    To fix this, take the smallest of the old MTU and ip_rt_min_pmtu.
    
    Before this patch, in case of an update, the exception's MTU would
    always change. Now, an exception can have only its lock flag updated,
    but not the MTU, so we need to add a check on locking to the following
    "is this exception getting updated, or close to expiring?" test.
    
    Fixes: d52e5a7 ("ipv4: lock mtu in fnhe when received PMTU < net.ipv4.route.min_pmtu")
    Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
    Reviewed-by: Stefano Brivio <sbrivio@redhat.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    qsn authored and davem330 committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    28d35bc View commit details
    Browse the repository at this point in the history
  12. Merge branch 'net-ipv4-fixes-for-PMTU-when-link-MTU-changes'

    Sabrina Dubroca says:
    
    ====================
    net: ipv4: fixes for PMTU when link MTU changes
    
    The first patch adapts the changes that commit e9fa149 ("ipv6:
    Reflect MTU changes on PMTU of exceptions for MTU-less routes") did in
    IPv6 to IPv4: lower PMTU when the first hop's MTU drops below it, and
    raise PMTU when the first hop was limiting PMTU discovery and its MTU
    is increased.
    
    The second patch fixes bugs introduced in commit d52e5a7 ("ipv4:
    lock mtu in fnhe when received PMTU < net.ipv4.route.min_pmtu") that
    only appear once the first patch is applied.
    
    Selftests for these cases were introduced in net-next commit
    e44e428 ("selftests: pmtu: add basic IPv4 and IPv6 PMTU tests")
    
    v2: add cover letter, and fix a few small things in patch 1
    ====================
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    28b6bfe View commit details
    Browse the repository at this point in the history
  13. tipc: set link tolerance correctly in broadcast link

    In the patch referred to below we added link tolerance as an additional
    criteria for declaring broadcast transmission "stale" and resetting the
    affected links.
    
    However, the 'tolerance' field of the broadcast link is never set, and
    remains at zero. This renders the whole commit without the intended
    improving effect, but luckily also with no negative effect.
    
    In this commit we add the missing initialization.
    
    Fixes: a4dc70d ("tipc: extend link reset criteria for stale packet retransmission")
    Signed-off-by: Jon Maloy <jon.maloy@ericsson.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Jon Maloy authored and davem330 committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    047491e View commit details
    Browse the repository at this point in the history
  14. tipc: queue socket protocol error messages into socket receive buffer

    In tipc_sk_filter_rcv(), when we detect protocol messages with error we
    call tipc_sk_conn_proto_rcv() and let it reset the connection and notify
    the socket by calling sk->sk_state_change().
    
    However, tipc_sk_filter_rcv() may have been called from the function
    tipc_backlog_rcv(), in which case the socket lock is held and the socket
    already awake. This means that the sk_state_change() call is ignored and
    the error notification lost. Now the receive queue will remain empty and
    the socket sleeps forever.
    
    In this commit, we convert the protocol message into a connection abort
    message and enqueue it into the socket's receive queue. By this addition
    to the above state change we cover all conditions.
    
    Acked-by: Ying Xue <ying.xue@windriver.com>
    Signed-off-by: Parthasarathy Bhuvaragan <parthasarathy.bhuvaragan@ericsson.com>
    Signed-off-by: Jon Maloy <jon.maloy@ericsson.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Parthasarathy Bhuvaragan authored and davem330 committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    e7eb058 View commit details
    Browse the repository at this point in the history
  15. qmi_wwan: Added support for Gemalto's Cinterion ALASxx WWAN interface

    Added support for Gemalto's Cinterion ALASxx WWAN interfaces
    by adding QMI_FIXED_INTF with Cinterion's VID and PID.
    
    Signed-off-by: Giacinto Cifelli <gciofono@gmail.com>
    Acked-by: Bjørn Mork <bjorn@mork.no>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    GiacintoCifelli authored and davem330 committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    4f76177 View commit details
    Browse the repository at this point in the history
  16. xsk: do not call synchronize_net() under RCU read lock

    The XSKMAP update and delete functions called synchronize_net(), which
    can sleep. It is not allowed to sleep during an RCU read section.
    
    Instead we need to make sure that the sock sk_destruct (xsk_destruct)
    function is asynchronously called after an RCU grace period. Setting
    the SOCK_RCU_FREE flag for XDP sockets takes care of this.
    
    Fixes: fbfc504 ("bpf: introduce new bpf AF_XDP map type BPF_MAP_TYPE_XSKMAP")
    Reported-by: Eric Dumazet <eric.dumazet@gmail.com>
    Signed-off-by: Björn Töpel <bjorn.topel@intel.com>
    Acked-by: Song Liu <songliubraving@fb.com>
    Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
    Björn Töpel authored and borkmann committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    cee2716 View commit details
    Browse the repository at this point in the history
  17. Merge branch 'perf-urgent-for-linus' of git://git.kernel.org/pub/scm/…

    …linux/kernel/git/tip/tip
    
    Ingo, a man of few words, writes:
      "perf fixes:
    
       misc perf tooling fixes"
    
    * 'perf-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
      perf record: Use unmapped IP for inline callchain cursors
      perf python: Use -Wno-redundant-decls to build with PYTHON=python3
      perf report: Don't try to map ip to invalid map
      perf script python: Fix export-to-sqlite.py sample columns
      perf script python: Fix export-to-postgresql.py occasional failure
    gregkh committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    6302aad View commit details
    Browse the repository at this point in the history
  18. Merge branch 'sched-urgent-for-linus' of git://git.kernel.org/pub/scm…

    …/linux/kernel/git/tip/tip
    
    Ingo writes:
      "scheduler fix:
    
       Cleanup of dead code left over from the recent sched/numa fixes."
    
    * 'sched-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
      mm, sched/numa: Remove remaining traces of NUMA rate-limiting
    gregkh committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    a22dd36 View commit details
    Browse the repository at this point in the history
  19. Merge branch 'x86-urgent-for-linus' of git://git.kernel.org/pub/scm/l…

    …inux/kernel/git/tip/tip
    
    Ingo writes:
      "x86 fixes
    
       An intel_rdt memory access fix and a VLA fix in pgd_alloc()."
    
    * 'x86-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
      x86/mm: Avoid VLA in pgd_alloc()
      x86/intel_rdt: Fix out-of-bounds memory access in CBM tests
    gregkh committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    9f203e2 View commit details
    Browse the repository at this point in the history
  20. sched/fair: Fix throttle_list starvation with low CFS quota

    With a very low cpu.cfs_quota_us setting, such as the minimum of 1000,
    distribute_cfs_runtime may not empty the throttled_list before it runs
    out of runtime to distribute. In that case, due to the change from
    c06f04c to put throttled entries at the head of the list, later entries
    on the list will starve.  Essentially, the same X processes will get pulled
    off the list, given CPU time and then, when expired, get put back on the
    head of the list where distribute_cfs_runtime will give runtime to the same
    set of processes leaving the rest.
    
    Fix the issue by setting a bit in struct cfs_bandwidth when
    distribute_cfs_runtime is running, so that the code in throttle_cfs_rq can
    decide to put the throttled entry on the tail or the head of the list.  The
    bit is set/cleared by the callers of distribute_cfs_runtime while they hold
    cfs_bandwidth->lock.
    
    This is easy to reproduce with a handful of CPU consumers. I use 'crash' on
    the live system. In some cases you can simply look at the throttled list and
    see the later entries are not changing:
    
      crash> list cfs_rq.throttled_list -H 0xffff90b54f6ade40 -s cfs_rq.runtime_remaining | paste - - | awk '{print $1"  "$4}' | pr -t -n3
        1     ffff90b56cb2d200  -976050
        2     ffff90b56cb2cc00  -484925
        3     ffff90b56cb2bc00  -658814
        4     ffff90b56cb2ba00  -275365
        5     ffff90b166a45600  -135138
        6     ffff90b56cb2da00  -282505
        7     ffff90b56cb2e000  -148065
        8     ffff90b56cb2fa00  -872591
        9     ffff90b56cb2c000  -84687
       10     ffff90b56cb2f000  -87237
       11     ffff90b166a40a00  -164582
    
      crash> list cfs_rq.throttled_list -H 0xffff90b54f6ade40 -s cfs_rq.runtime_remaining | paste - - | awk '{print $1"  "$4}' | pr -t -n3
        1     ffff90b56cb2d200  -994147
        2     ffff90b56cb2cc00  -306051
        3     ffff90b56cb2bc00  -961321
        4     ffff90b56cb2ba00  -24490
        5     ffff90b166a45600  -135138
        6     ffff90b56cb2da00  -282505
        7     ffff90b56cb2e000  -148065
        8     ffff90b56cb2fa00  -872591
        9     ffff90b56cb2c000  -84687
       10     ffff90b56cb2f000  -87237
       11     ffff90b166a40a00  -164582
    
    Sometimes it is easier to see by finding a process getting starved and looking
    at the sched_info:
    
      crash> task ffff8eb765994500 sched_info
      PID: 7800   TASK: ffff8eb765994500  CPU: 16  COMMAND: "cputest"
        sched_info = {
          pcount = 8,
          run_delay = 697094208,
          last_arrival = 240260125039,
          last_queued = 240260327513
        },
      crash> task ffff8eb765994500 sched_info
      PID: 7800   TASK: ffff8eb765994500  CPU: 16  COMMAND: "cputest"
        sched_info = {
          pcount = 8,
          run_delay = 697094208,
          last_arrival = 240260125039,
          last_queued = 240260327513
        },
    
    Signed-off-by: Phil Auld <pauld@redhat.com>
    Reviewed-by: Ben Segall <bsegall@google.com>
    Cc: Linus Torvalds <torvalds@linux-foundation.org>
    Cc: Peter Zijlstra <peterz@infradead.org>
    Cc: Thomas Gleixner <tglx@linutronix.de>
    Cc: stable@vger.kernel.org
    Fixes: c06f04c ("sched: Fix potential near-infinite distribute_cfs_runtime() loop")
    Link: http://lkml.kernel.org/r/20181008143639.GA4019@pauld.bos.csb
    Signed-off-by: Ingo Molnar <mingo@kernel.org>
    auldp authored and Ingo Molnar committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    baa9be4 View commit details
    Browse the repository at this point in the history
  21. net/xfrm: fix out-of-bounds packet access

    BUG: KASAN: slab-out-of-bounds in _decode_session6+0x1331/0x14e0
    net/ipv6/xfrm6_policy.c:161
    Read of size 1 at addr ffff8801d882eec7 by task syz-executor1/6667
    Call Trace:
      __dump_stack lib/dump_stack.c:77 [inline]
      dump_stack+0x1c9/0x2b4 lib/dump_stack.c:113
      print_address_description+0x6c/0x20b mm/kasan/report.c:256
      kasan_report_error mm/kasan/report.c:354 [inline]
      kasan_report.cold.7+0x242/0x30d mm/kasan/report.c:412
      __asan_report_load1_noabort+0x14/0x20 mm/kasan/report.c:430
      _decode_session6+0x1331/0x14e0 net/ipv6/xfrm6_policy.c:161
      __xfrm_decode_session+0x71/0x140 net/xfrm/xfrm_policy.c:2299
      xfrm_decode_session include/net/xfrm.h:1232 [inline]
      vti6_tnl_xmit+0x3c3/0x1bc1 net/ipv6/ip6_vti.c:542
      __netdev_start_xmit include/linux/netdevice.h:4313 [inline]
      netdev_start_xmit include/linux/netdevice.h:4322 [inline]
      xmit_one net/core/dev.c:3217 [inline]
      dev_hard_start_xmit+0x272/0xc10 net/core/dev.c:3233
      __dev_queue_xmit+0x2ab2/0x3870 net/core/dev.c:3803
      dev_queue_xmit+0x17/0x20 net/core/dev.c:3836
    
    Reported-by: syzbot+acffccec848dc13fe459@syzkaller.appspotmail.com
    Reported-by: Eric Dumazet <edumazet@google.com>
    Signed-off-by: Alexei Starovoitov <ast@kernel.org>
    Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
    Alexei Starovoitov authored and klassert committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    9f7e43d View commit details
    Browse the repository at this point in the history
  22. xfrm: policy: use hlist rcu variants on insert

    bydst table/list lookups use rcu, so insertions must use rcu versions.
    
    Fixes: a7c4424 ("xfrm: policy: make xfrm_policy_lookup_bytype lockless")
    Signed-off-by: Florian Westphal <fw@strlen.de>
    Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
    Florian Westphal authored and klassert committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    9dffff2 View commit details
    Browse the repository at this point in the history
  23. perf vendor events intel: Fix wrong filter_band* values for uncore ev…

    …ents
    
    Michael reported that he could not stat following event:
    
      $ perf stat -e unc_p_freq_ge_1200mhz_cycles -a -- ls
      event syntax error: '..e_1200mhz_cycles'
                                        \___ value too big for format, maximum is 255
      Run 'perf list' for a list of valid events
    
    The event is unwrapped into:
    
      uncore_pcu/event=0xb,filter_band0=1200/
    
    where filter_band0 format says it's one byte only:
    
      # cat uncore_pcu/format/filter_band0
      config1:0-7
    
    while JSON files specifies bigger number:
    
      "Filter": "filter_band0=1200",
    
    all the filter_band* formats show 1 byte width:
    
      # cat uncore_pcu/format/filter_band1
      config1:8-15
      # cat uncore_pcu/format/filter_band2
      config1:16-23
      # cat uncore_pcu/format/filter_band3
      config1:24-31
    
    The reason of the issue is that filter_band* values are supposed to be
    in 100Mhz units.. it's stated in the JSON help for the events, like:
    
      filter_band3=XXX, with XXX in 100Mhz units
    
    This patch divides the filter_band* values by 100, plus there's couple
    of changes that actually change the number completely, like:
    
      -        "Filter": "edge=1,filter_band2=4000",
      +        "Filter": "edge=1,filter_band2=30",
    
    Reported-by: Michael Petlan <mpetlan@redhat.com>
    Signed-off-by: Jiri Olsa <jolsa@kernel.org>
    Acked-by: Andi Kleen <ak@linux.intel.com>
    Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
    Cc: Kan Liang <kan.liang@linux.intel.com>
    Cc: Namhyung Kim <namhyung@kernel.org>
    Cc: Peter Zijlstra <peterz@infradead.org>
    Link: http://lkml.kernel.org/r/20181010080339.GB15790@krava
    Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
    Jiri Olsa authored and acmel committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    94aafb7 View commit details
    Browse the repository at this point in the history
  24. Merge tag 'alloc-args-v4.19-rc8' of https://git.kernel.org/pub/scm/li…

    …nux/kernel/git/kees/linux
    
    Kees writes:
      "Fix open-coded multiplication arguments to allocators
    
       - Fixes several new open-coded multiplications added in the 4.19
         merge window."
    
    * tag 'alloc-args-v4.19-rc8' of https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux:
      treewide: Replace more open-coded allocation size multiplications
    gregkh committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    834d3cd View commit details
    Browse the repository at this point in the history
  25. selftests: rtnetlink.sh explicitly requires bash.

    the script rtnetlink.sh requires a bash-only features (sleep with sub-second
    precision). This may cause random test failure if the default shell is not
    bash.
    Address the above explicitly requiring bash as the script interpreter.
    
    Fixes: 33b01b7 ("selftests: add rtnetlink test script")
    Signed-off-by: Paolo Abeni <pabeni@redhat.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Paolo Abeni authored and davem330 committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    3c718e6 View commit details
    Browse the repository at this point in the history
  26. selftests: udpgso_bench.sh explicitly requires bash

    The udpgso_bench.sh script requires several bash-only features. This
    may cause random failures if the default shell is not bash.
    Address the above explicitly requiring bash as the script interpreter
    
    Fixes: 3a687be ("selftests: udp gso benchmark")
    Signed-off-by: Paolo Abeni <pabeni@redhat.com>
    Acked-by: Willem de Bruijn <willemb@google.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Paolo Abeni authored and davem330 committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    12a2ea9 View commit details
    Browse the repository at this point in the history
  27. Merge branch 'net-explicitly-requires-bash-when-needed'

    Paolo Abeni says:
    
    ====================
    net: explicitly requires bash when needed.
    
    Some test scripts require bash-only features but use the default shell.
    This may cause random failures if the default shell is not bash.
    Instead of doing a potentially complex rewrite of such scripts, these patches
    require the bash interpreter, where needed.
    ====================
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    26b1f4c View commit details
    Browse the repository at this point in the history
  28. Merge tag 'kbuild-fixes-v4.19-2' of git://git.kernel.org/pub/scm/linu…

    …x/kernel/git/masahiroy/linux-kbuild
    
    Masahiro writes:
      "Kbuild fixes for v4.19 (2nd)
       - Fix warnings from recordmcount.pl when building with Clang
       - Allow Clang to use GNU toolchains correctly
       - Disable CONFIG_SAMPLES for UML to avoid build error"
    
    * tag 'kbuild-fixes-v4.19-2' of git://git.kernel.org/pub/scm/linux/kernel/git/masahiroy/linux-kbuild:
      samples: disable CONFIG_SAMPLES for UML
      kbuild: allow to use GCC toolchain not in Clang search path
      ftrace: Build with CPPFLAGS to get -Qunused-arguments
    gregkh committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    e533717 View commit details
    Browse the repository at this point in the history
  29. tipc: eliminate possible recursive locking detected by LOCKDEP

    When booting kernel with LOCKDEP option, below warning info was found:
    
    WARNING: possible recursive locking detected
    4.19.0-rc7+ #14 Not tainted
    --------------------------------------------
    swapper/0/1 is trying to acquire lock:
    00000000dcfc0fc8 (&(&list->lock)->rlock#4){+...}, at: spin_lock_bh
    include/linux/spinlock.h:334 [inline]
    00000000dcfc0fc8 (&(&list->lock)->rlock#4){+...}, at:
    tipc_link_reset+0x125/0xdf0 net/tipc/link.c:850
    
    but task is already holding lock:
    00000000cbb9b036 (&(&list->lock)->rlock#4){+...}, at: spin_lock_bh
    include/linux/spinlock.h:334 [inline]
    00000000cbb9b036 (&(&list->lock)->rlock#4){+...}, at:
    tipc_link_reset+0xfa/0xdf0 net/tipc/link.c:849
    
    other info that might help us debug this:
     Possible unsafe locking scenario:
    
           CPU0
           ----
      lock(&(&list->lock)->rlock#4);
      lock(&(&list->lock)->rlock#4);
    
     *** DEADLOCK ***
    
     May be due to missing lock nesting notation
    
    2 locks held by swapper/0/1:
     #0: 00000000f7539d34 (pernet_ops_rwsem){+.+.}, at:
    register_pernet_subsys+0x19/0x40 net/core/net_namespace.c:1051
     #1: 00000000cbb9b036 (&(&list->lock)->rlock#4){+...}, at:
    spin_lock_bh include/linux/spinlock.h:334 [inline]
     #1: 00000000cbb9b036 (&(&list->lock)->rlock#4){+...}, at:
    tipc_link_reset+0xfa/0xdf0 net/tipc/link.c:849
    
    stack backtrace:
    CPU: 0 PID: 1 Comm: swapper/0 Not tainted 4.19.0-rc7+ #14
    Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014
    Call Trace:
     __dump_stack lib/dump_stack.c:77 [inline]
     dump_stack+0x1af/0x295 lib/dump_stack.c:113
     print_deadlock_bug kernel/locking/lockdep.c:1759 [inline]
     check_deadlock kernel/locking/lockdep.c:1803 [inline]
     validate_chain kernel/locking/lockdep.c:2399 [inline]
     __lock_acquire+0xf1e/0x3c60 kernel/locking/lockdep.c:3411
     lock_acquire+0x1db/0x520 kernel/locking/lockdep.c:3900
     __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline]
     _raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:168
     spin_lock_bh include/linux/spinlock.h:334 [inline]
     tipc_link_reset+0x125/0xdf0 net/tipc/link.c:850
     tipc_link_bc_create+0xb5/0x1f0 net/tipc/link.c:526
     tipc_bcast_init+0x59b/0xab0 net/tipc/bcast.c:521
     tipc_init_net+0x472/0x610 net/tipc/core.c:82
     ops_init+0xf7/0x520 net/core/net_namespace.c:129
     __register_pernet_operations net/core/net_namespace.c:940 [inline]
     register_pernet_operations+0x453/0xac0 net/core/net_namespace.c:1011
     register_pernet_subsys+0x28/0x40 net/core/net_namespace.c:1052
     tipc_init+0x83/0x104 net/tipc/core.c:140
     do_one_initcall+0x109/0x70a init/main.c:885
     do_initcall_level init/main.c:953 [inline]
     do_initcalls init/main.c:961 [inline]
     do_basic_setup init/main.c:979 [inline]
     kernel_init_freeable+0x4bd/0x57f init/main.c:1144
     kernel_init+0x13/0x180 init/main.c:1063
     ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:413
    
    The reason why the noise above was complained by LOCKDEP is because we
    nested to hold l->wakeupq.lock and l->inputq->lock in tipc_link_reset
    function. In fact it's unnecessary to move skb buffer from l->wakeupq
    queue to l->inputq queue while holding the two locks at the same time.
    Instead, we can move skb buffers in l->wakeupq queue to a temporary
    list first and then move the buffers of the temporary list to l->inputq
    queue, which is also safe for us.
    
    Fixes: 3f32d0b ("tipc: lock wakeup & inputq at tipc_link_reset()")
    Reported-by: Dmitry Vyukov <dvyukov@google.com>
    Signed-off-by: Ying Xue <ying.xue@windriver.com>
    Acked-by: Jon Maloy <jon.maloy@ericsson.com>
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    ying-xue authored and davem330 committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    a1f8dd3 View commit details
    Browse the repository at this point in the history
  30. Merge branch 'for-4.19-fixes' of git://git.kernel.org/pub/scm/linux/k…

    …ernel/git/tj/cgroup
    
    Tejun writes:
      "cgroup fixes for v4.19-rc7
    
       One cgroup2 threaded mode fix for v4.19-rc7.  While threaded mode
       isn't used widely (yet) and the bug requires somewhat convoluted
       sequence of operations, it causes a userland visible malfunction -
       EINVAL on a valid attempt to enable threaded mode.  This pull request
       contains the fix"
    
    * 'for-4.19-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/tj/cgroup:
      cgroup: Fix dom_cgrp propagation when enabling threaded mode
    gregkh committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    0778a9f View commit details
    Browse the repository at this point in the history
  31. net/mlx4_core: Fix warnings during boot on driverinit param set failures

    During boot, mlx4_core sets the driverinit configuration parameters and
    updates the devlink module on the initial values calling
    devlink_param_driverinit_value_set().
    If devlink_param_driverinit_value_set() returns an error mlx4_core
    reports kernel module warning.
    
    This caused false alarm during boot in case kernel was compiled with
    CONFIG_NET_DEVLINK off.
    Fix by removing warning reported in case
    devlink_param_driverinit_value_set() fails.
    
    This actually makes the function mlx4_devlink_set_init_value()
    redundant to using directly devlink_param_driverinit_value_set() and so
    removed.
    
    It fixes the following kernel trace:
    
     mlx4_core 0000:00:06.0: devlink set parameter 0 value failed (err = -95)
     mlx4_core 0000:00:06.0: devlink set parameter 1 value failed (err = -95)
     mlx4_core 0000:00:06.0: devlink set parameter 4 value failed (err = -95)
     mlx4_core 0000:00:06.0: devlink set parameter 5 value failed (err = -95)
     mlx4_core 0000:00:06.0: devlink set parameter 3 value failed (err = -95)
    
    Fixes: bd1b51d ("mlx4: Add mlx4 initial parameters table and register it")
    Signed-off-by: Moshe Shemesh <moshe@mellanox.com>
    Signed-off-by: Tariq Toukan <tariqt@mellanox.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Moshe Shemesh authored and davem330 committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    2645060 View commit details
    Browse the repository at this point in the history
  32. net: socionext: clear rx irq correctly

    commit 63ae794 ("net: socionext: Use descriptor info instead of MMIO reads on Rx")
    removed constant mmio reads from the driver and started using a descriptor
    field to check if packet should be processed.
    This lead the napi rx handler being constantly called while no packets
    needed processing and ksoftirq getting 100% cpu usage. Issue one mmio read
    to clear the irq correcty after processing packets
    
    Signed-off-by: Ilias Apalodimas <ilias.apalodimas@linaro.org>
    Reported-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
    Tested-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
    Acked-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    apalos authored and davem330 committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    2a1e89d View commit details
    Browse the repository at this point in the history
  33. r8169: set RX_MULTI_EN bit in RxConfig for 8168F-family chips

    It has been reported that since
    commit 05212ba ("r8169: set RxConfig after tx/rx is enabled for RTL8169sb/8110sb devices")
    at least RTL_GIGA_MAC_VER_38 NICs work erratically after a resume from
    suspend.
    The problem has been traced to a missing RX_MULTI_EN bit in the RxConfig
    register.
    We already set this bit for RTL_GIGA_MAC_VER_35 NICs of the same 8168F
    chip family so let's do it also for its other siblings: RTL_GIGA_MAC_VER_36
    and RTL_GIGA_MAC_VER_38.
    
    Curiously, the NIC seems to work fine after a system boot without having
    this bit set as long as the system isn't suspended and resumed.
    
    Fixes: 05212ba ("r8169: set RxConfig after tx/rx is enabled for RTL8169sb/8110sb devices")
    Reported-by: Chris Clayton <chris2553@googlemail.com>
    Signed-off-by: Maciej S. Szmigiero <mail@maciej.szmigiero.name>
    Reviewed-by: Heiner Kallweit <hkallweit1@gmail.com>
    Tested-by: Chris Clayton <chris2553@googlemail.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    maciejsszmigiero authored and davem330 committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    511cfd5 View commit details
    Browse the repository at this point in the history
  34. net: phy: sfp: remove sfp_mutex's definition

    The sfp_mutex variable is defined but never used in this file. Not even
    in the commit that introduced that variable.
    
    Remove sfp_mutex, it has no purpose.
    
    Cc: Andrew Lunn <andrew@lunn.ch>
    Cc: Florian Fainelli <f.fainelli@gmail.com>
    Cc: "David S. Miller" <davem@davemloft.net>
    Signed-off-by: Sebastian Andrzej Siewior <bigeasy@linutronix.de>
    Reviewed-by: Andrew Lunn <andrew@lunn.ch>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Sebastian Andrzej Siewior authored and davem330 committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    0528586 View commit details
    Browse the repository at this point in the history
  35. blk-wbt: wake up all when we scale up, not down

    Tetsuo brought to my attention that I screwed up the scale_up/scale_down
    helpers when I factored out the rq-qos code.  We need to wake up all the
    waiters when we add slots for requests to make, not when we shrink the
    slots.  Otherwise we'll end up things waiting forever.  This was a
    mistake and simply puts everything back the way it was.
    
    cc: stable@vger.kernel.org
    Fixes: a790504 ("blk-rq-qos: refactor out common elements of blk-wbt")
    eported-by: Tetsuo Handa <penguin-kernel@i-love.sakura.ne.jp>
    Signed-off-by: Josef Bacik <josef@toxicpanda.com>
    Signed-off-by: Jens Axboe <axboe@kernel.dk>
    josefbacik authored and axboe committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    5e65a20 View commit details
    Browse the repository at this point in the history
  36. i2c: Fix kerneldoc for renamed i2c dma put function

    This function was renamed in commit 82fe39a ("i2c: refactor
    function to release a DMA safe buffer") but this kernel doc wasn't
    updated to point at the new function. Rename it.
    
    Fixes: 82fe39a ("i2c: refactor function to release a DMA safe buffer")
    Signed-off-by: Stephen Boyd <swboyd@chromium.org>
    Signed-off-by: Wolfram Sang <wsa@the-dreams.de>
    bebarino authored and Wolfram Sang committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    34d1b82 View commit details
    Browse the repository at this point in the history
  37. vmlinux.lds.h: Fix incomplete .text.exit discards

    Enabling CONFIG_GCOV_PROFILE_ALL=y causes linker errors on ARM:
    
      `.text.exit' referenced in section `.ARM.exidx.text.exit':
      defined in discarded section `.text.exit'
    
      `.text.exit' referenced in section `.fini_array.00100':
      defined in discarded section `.text.exit'
    
    And related errors on NDS32:
    
      `.text.exit' referenced in section `.dtors.65435':
      defined in discarded section `.text.exit'
    
    The gcov compiler flags cause certain compiler versions to generate
    additional destructor-related sections that are not yet handled by the
    linker script, resulting in references between discarded and
    non-discarded sections.
    
    Since destructors are not used in the Linux kernel, fix this by
    discarding these additional sections.
    
    Reported-by: Arnd Bergmann <arnd@arndb.de>
    Tested-by: Arnd Bergmann <arnd@arndb.de>
    Acked-by: Arnd Bergmann <arnd@arndb.de>
    Reported-by: Greentime Hu <green.hu@gmail.com>
    Tested-by: Masami Hiramatsu <mhiramat@kernel.org>
    Signed-off-by: Peter Oberparleiter <oberpar@linux.ibm.com>
    Signed-off-by: Stephen Rothwell <sfr@canb.auug.org.au>
    oberpar authored and sfrothwell committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    8dcf86c View commit details
    Browse the repository at this point in the history
  38. vmlinux.lds.h: Fix linker warnings about orphan .LPBX sections

    Enabling both CONFIG_LD_DEAD_CODE_DATA_ELIMINATION=y and
    CONFIG_GCOV_PROFILE_ALL=y results in linker warnings:
    
      warning: orphan section `.data..LPBX1' being placed in
      section `.data..LPBX1'.
    
    LD_DEAD_CODE_DATA_ELIMINATION adds compiler flag -fdata-sections. This
    option causes GCC to create separate data sections for data objects,
    including those generated by GCC internally for gcov profiling. The
    names of these objects start with a dot (.LPBX0, .LPBX1), resulting in
    section names starting with 'data..'.
    
    As section names starting with 'data..' are used for specific purposes
    in the Linux kernel, the linker script does not automatically include
    them in the output data section, resulting in the "orphan section"
    linker warnings.
    
    Fix this by specifically including sections named "data..LPBX*" in the
    data section.
    
    Reported-by: Stephen Rothwell <sfr@canb.auug.org.au>
    Tested-by: Stephen Rothwell <sfr@canb.auug.org.au>
    Tested-by: Arnd Bergmann <arnd@arndb.de>
    Acked-by: Arnd Bergmann <arnd@arndb.de>
    Signed-off-by: Peter Oberparleiter <oberpar@linux.ibm.com>
    Signed-off-by: Stephen Rothwell <sfr@canb.auug.org.au>
    oberpar authored and sfrothwell committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    52c8ee5 View commit details
    Browse the repository at this point in the history
  39. net: dsa: bcm_sf2: Fix unbind ordering

    The order in which we release resources is unfortunately leading to bus
    errors while dismantling the port. This is because we set
    priv->wol_ports_mask to 0 to tell bcm_sf2_sw_suspend() that it is now
    permissible to clock gate the switch. Later on, when dsa_slave_destroy()
    comes in from dsa_unregister_switch() and calls
    dsa_switch_ops::port_disable, we perform the same dismantling again, and
    this time we hit registers that are clock gated.
    
    Make sure that dsa_unregister_switch() is the first thing that happens,
    which takes care of releasing all user visible resources, then proceed
    with clock gating hardware. We still need to set priv->wol_ports_mask to
    0 to make sure that an enabled port properly gets disabled in case it
    was previously used as part of Wake-on-LAN.
    
    Fixes: d933802 ("net: dsa: bcm_sf2: Make it a real platform device driver")
    Signed-off-by: Florian Fainelli <f.fainelli@gmail.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    ffainelli authored and davem330 committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    bf3b452 View commit details
    Browse the repository at this point in the history
  40. net: dsa: bcm_sf2: Call setup during switch resume

    There is no reason to open code what the switch setup function does, in
    fact, because we just issued a switch reset, we would make all the
    register get their default values, including for instance, having unused
    port be enabled again and wasting power and leading to an inappropriate
    switch core clock being selected.
    
    Fixes: 8cfa949 ("net: dsa: bcm_sf2: add suspend/resume callbacks")
    Signed-off-by: Florian Fainelli <f.fainelli@gmail.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    ffainelli authored and davem330 committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    54baca0 View commit details
    Browse the repository at this point in the history
  41. Merge branch 'net-dsa-bcm_sf2-Couple-of-fixes'

    Florian Fainelli says:
    
    ====================
    net: dsa: bcm_sf2: Couple of fixes
    
    Here are two fixes for the bcm_sf2 driver that were found during
    testing unbind and analysing another issue during system
    suspend/resume.
    ====================
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Oct 11, 2018
    Configuration menu
    Copy the full SHA
    6b9bab5 View commit details
    Browse the repository at this point in the history

Commits on Oct 12, 2018

  1. Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net

    David writes:
      "Networking
    
       1) RXRPC receive path fixes from David Howells.
    
       2) Re-export __skb_recv_udp(), from Jiri Kosina.
    
       3) Fix refcounting in u32 classificer, from Al Viro.
    
       4) Userspace netlink ABI fixes from Eugene Syromiatnikov.
    
       5) Don't double iounmap on rmmod in ena driver, from Arthur
          Kiyanovski.
    
       6) Fix devlink string attribute handling, we must pull a copy into a
          kernel buffer if the lifetime extends past the netlink request.
          From Moshe Shemesh.
    
       7) Fix hangs in RDS, from Ka-Cheong Poon.
    
       8) Fix recursive locking lockdep warnings in tipc, from Ying Xue.
    
       9) Clear RX irq correctly in socionext, from Ilias Apalodimas.
    
       10) bcm_sf2 fixes from Florian Fainelli."
    
    * git://git.kernel.org/pub/scm/linux/kernel/git/davem/net: (38 commits)
      net: dsa: bcm_sf2: Call setup during switch resume
      net: dsa: bcm_sf2: Fix unbind ordering
      net: phy: sfp: remove sfp_mutex's definition
      r8169: set RX_MULTI_EN bit in RxConfig for 8168F-family chips
      net: socionext: clear rx irq correctly
      net/mlx4_core: Fix warnings during boot on driverinit param set failures
      tipc: eliminate possible recursive locking detected by LOCKDEP
      selftests: udpgso_bench.sh explicitly requires bash
      selftests: rtnetlink.sh explicitly requires bash.
      qmi_wwan: Added support for Gemalto's Cinterion ALASxx WWAN interface
      tipc: queue socket protocol error messages into socket receive buffer
      tipc: set link tolerance correctly in broadcast link
      net: ipv4: don't let PMTU updates increase route MTU
      net: ipv4: update fnhe_pmtu when first hop's MTU changes
      net/ipv6: stop leaking percpu memory in fib6 info
      rds: RDS (tcp) hangs on sendto() to unresponding address
      net: make skb_partial_csum_set() more robust against overflows
      devlink: Add helper function for safely copy string param
      devlink: Fix param cmode driverinit for string type
      devlink: Fix param set handling for string type
      ...
    gregkh committed Oct 12, 2018
    Configuration menu
    Copy the full SHA
    90ad184 View commit details
    Browse the repository at this point in the history
  2. lib/bch: fix possible stack overrun

    The previous patch introduced very large kernel stack usage and a Makefile
    change to hide the warning about it.
    
    From what I can tell, a number of things went wrong here:
    
    - The BCH_MAX_T constant was set to the maximum value for 'n',
      not the maximum for 't', which is much smaller.
    
    - The stack usage is actually larger than the entire kernel stack
      on some architectures that can use 4KB stacks (m68k, sh, c6x), which
      leads to an immediate overrun.
    
    - The justification in the patch description claimed that nothing
      changed, however that is not the case even without the two points above:
      the configuration is machine specific, and most boards  never use the
      maximum BCH_ECC_WORDS() length but instead have something much smaller.
      That maximum would only apply to machines that use both the maximum
      block size and the maximum ECC strength.
    
    The largest value for 't' that I could find is '32', which in turn leads
    to a 60 byte array instead of 2048 bytes. Making it '64' for future
    extension seems also worthwhile, with 120 bytes for the array. Anything
    larger won't fit into the OOB area on NAND flash.
    
    With that changed, the warning can be enabled again.
    
    Only linux-4.19+ contains the breakage, so this is only needed
    as a stable backport if it does not make it into the release.
    
    Fixes: 02361bc ("lib/bch: Remove VLA usage")
    Reported-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
    Cc: stable@vger.kernel.org
    Signed-off-by: Arnd Bergmann <arnd@arndb.de>
    Signed-off-by: Boris Brezillon <boris.brezillon@bootlin.com>
    arndb authored and Boris Brezillon committed Oct 12, 2018
    Configuration menu
    Copy the full SHA
    f0fe77f View commit details
    Browse the repository at this point in the history
  3. Merge tag 'next-fixes-20181012' of git://git.kernel.org/pub/scm/linux…

    …/kernel/git/sfr/next-fixes
    
    Stephen writes:
      "A couple of warning fixes:
    
      Two fixes from Peter Oberparleiter <oberpar@linux.ibm.com>:
        Commit 6b7dca4 ("tracing: Allow gcov profiling on only ftrace subsystem")
       uncovered linker problems when using gcov kernel profiling on some
       architectures. These problems were likely introduced earlier, and are
       possibly related to compiler changes."
    
    * tag 'next-fixes-20181012' of git://git.kernel.org/pub/scm/linux/kernel/git/sfr/next-fixes:
      vmlinux.lds.h: Fix linker warnings about orphan .LPBX sections
      vmlinux.lds.h: Fix incomplete .text.exit discards
    gregkh committed Oct 12, 2018
    Configuration menu
    Copy the full SHA
    0c53b6a View commit details
    Browse the repository at this point in the history
  4. Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel…

    …/git/dtor/input
    
    Dmitry writes:
      "Input updates for v4.19-rc7
    
       - we added a few scheduling points into various input interfaces to
         ensure that large writes will not cause RCU stalls
       - fixed configuring PS/2 keyboards as wakeup devices on newer
         platforms
       - added a new Xbox gamepad ID."
    
    * 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/dtor/input:
      Input: uinput - add a schedule point in uinput_inject_events()
      Input: evdev - add a schedule point in evdev_write()
      Input: mousedev - add a schedule point in mousedev_write()
      Input: i8042 - enable keyboard wakeups by default when s2idle is used
      Input: xpad - add support for Xbox1 PDP Camo series gamepad
    gregkh committed Oct 12, 2018
    Configuration menu
    Copy the full SHA
    eb81bfb View commit details
    Browse the repository at this point in the history
  5. Merge tag 'for-gkh' of git://git.kernel.org/pub/scm/linux/kernel/git/…

    …rdma/rdma
    
    Doug writes:
      "RDMA fixes:
    
       Final for-rc pull request for 4.19
    
       We only have one bug to submit this time around.  It fixes a DMA
       unmap issue where we unmapped the DMA address from the IOMMU before
       we did from the card, resulting in a DMAR error with IOMMU enabled,
       or possible crash without."
    
    * tag 'for-gkh' of git://git.kernel.org/pub/scm/linux/kernel/git/rdma/rdma:
      IB/mlx5: Unmap DMA addr from HCA before IOMMU
    gregkh committed Oct 12, 2018
    Configuration menu
    Copy the full SHA
    c789174 View commit details
    Browse the repository at this point in the history
  6. Merge tag 'drm-fixes-2018-10-12-1' of git://anongit.freedesktop.org/d…

    …rm/drm
    
    Dave writes:
      "drm fixes for 4.19-rc8
    
       single nouveau runtime reference and mst change"
    
    * tag 'drm-fixes-2018-10-12-1' of git://anongit.freedesktop.org/drm/drm:
      drm/nouveau/drm/nouveau: Grab runtime PM ref in nv50_mstc_detect()
    gregkh committed Oct 12, 2018
    Configuration menu
    Copy the full SHA
    62d2e53 View commit details
    Browse the repository at this point in the history
  7. Merge tag 'mtd/fixes-for-4.19-rc8' of git://git.infradead.org/linux-mtd

    Boris writes:
      "mdt: fix for 4.19-rc8
    
       * Fix a stack overflow in lib/bch.c"
    
    * tag 'mtd/fixes-for-4.19-rc8' of git://git.infradead.org/linux-mtd:
      lib/bch: fix possible stack overrun
    gregkh committed Oct 12, 2018
    Configuration menu
    Copy the full SHA
    a291ab2 View commit details
    Browse the repository at this point in the history
  8. Merge tag 'pinctrl-v4.19-5' of git://git.kernel.org/pub/scm/linux/ker…

    …nel/git/linusw/linux-pinctrl
    
    Linus writes:
      "pin control fix for v4.19:
    
       A single pin control fix for v4.19:
       - Interrupt setup in the MCP23S08 driver."
    
    * tag 'pinctrl-v4.19-5' of git://git.kernel.org/pub/scm/linux/kernel/git/linusw/linux-pinctrl:
      pinctrl: mcp23s08: fix irq and irqchip setup order
    gregkh committed Oct 12, 2018
    Configuration menu
    Copy the full SHA
    ef0e75a View commit details
    Browse the repository at this point in the history
  9. Merge tag 'gpio-v4.19-4' of git://git.kernel.org/pub/scm/linux/kernel…

    …/git/linusw/linux-gpio
    
    Linus writes:
      "GPIO fix for the v4.19 series:
       - Fix up the interrupt parent for the irqdomains."
    
    * tag 'gpio-v4.19-4' of git://git.kernel.org/pub/scm/linux/kernel/git/linusw/linux-gpio:
      gpio: Assign gpio_irq_chip::parents to non-stack pointer
    gregkh committed Oct 12, 2018
    Configuration menu
    Copy the full SHA
    60bd7be View commit details
    Browse the repository at this point in the history
  10. Merge tag 'mmc-v4.19-rc7' of git://git.kernel.org/pub/scm/linux/kerne…

    …l/git/ulfh/mmc
    
    Ulf writes:
       "MMC core:
        - Avoid fragile multiblock reads for the last sector in SPI mode
        WIFI/SDIO:
        - libertas: Fixup suspend sequence for the SDIO card"
    
    * tag 'mmc-v4.19-rc7' of git://git.kernel.org/pub/scm/linux/kernel/git/ulfh/mmc:
      libertas: call into generic suspend code before turning off power
      mmc: block: avoid multiblock reads for the last sector in SPI mode
    gregkh committed Oct 12, 2018
    Configuration menu
    Copy the full SHA
    4ea07ab View commit details
    Browse the repository at this point in the history
  11. afs: Fix cell proc list

    Access to the list of cells by /proc/net/afs/cells has a couple of
    problems:
    
     (1) It should be checking against SEQ_START_TOKEN for the keying the
         header line.
    
     (2) It's only holding the RCU read lock, so it can't just walk over the
         list without following the proper RCU methods.
    
    Fix these by using an hlist instead of an ordinary list and using the
    appropriate accessor functions to follow it with RCU.
    
    Since the code that adds a cell to the list must also necessarily change,
    sort the list on insertion whilst we're at it.
    
    Fixes: 989782d ("afs: Overhaul cell database management")
    Signed-off-by: David Howells <dhowells@redhat.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    dhowells authored and gregkh committed Oct 12, 2018
    Configuration menu
    Copy the full SHA
    6b3944e View commit details
    Browse the repository at this point in the history
  12. arm64: Fix /proc/iomem for reserved but not memory regions

    We describe ranges of 'reserved' memory to userspace via /proc/iomem.
    Commit 50d7ba3 ("arm64: export memblock_reserve()d regions via
    /proc/iomem") updated the logic to export regions that were reserved
    because their contents should be preserved. This allowed kexec-tools
    to tell the difference between 'reserved' memory that must be
    preserved and not overwritten, (e.g. the ACPI tables), and 'nomap'
    memory that must not be touched without knowing the memory-attributes
    (e.g. RAS CPER regions).
    
    The above commit wrongly assumed that memblock_reserve() would not
    be used to reserve regions that aren't memory. It turns out this is
    exactly what early_init_dt_reserve_memory_arch() will do if it finds
    a DT reserved-memory that was also carved out of the memory node, which
    results in a WARN_ON_ONCE() and the region being reserved instead of
    ignored. The ramoops description on hikey and dragonboard-410c both do
    this, so we can't simply write this configuration off as "buggy firmware".
    
    Avoid this issue by rewriting reserve_memblock_reserved_regions() so
    that only the portions of reserved regions which overlap with mapped
    memory are actually reserved.
    
    Fixes: 50d7ba3 ("arm64: export memblock_reserve()d regions via /proc/iomem")
    Reported-by: John Stultz <john.stultz@linaro.org>
    Reported-by: Paolo Pisati <p.pisati@gmail.com>
    CC: Akashi Takahiro <takahiro.akashi@linaro.org>
    CC: Ard Biesheuvel <ard.biesheuvel@linaro.org>
    Reviewed-by: James Morse <james.morse@arm.com>
    Signed-off-by: Will Deacon <will.deacon@arm.com>
    wildea01 committed Oct 12, 2018
    Configuration menu
    Copy the full SHA
    d91680e View commit details
    Browse the repository at this point in the history
  13. arm64: perf: Reject stand-alone CHAIN events for PMUv3

    It doesn't make sense for a perf event to be configured as a CHAIN event
    in isolation, so extend the arm_pmu structure with a ->filter_match()
    function to allow the backend PMU implementation to reject CHAIN events
    early.
    
    Cc: <stable@vger.kernel.org>
    Reviewed-by: Suzuki K Poulose <suzuki.poulose@arm.com>
    Signed-off-by: Will Deacon <will.deacon@arm.com>
    wildea01 committed Oct 12, 2018
    Configuration menu
    Copy the full SHA
    ca2b497 View commit details
    Browse the repository at this point in the history
  14. gfs2: Fix iomap buffered write support for journaled files (2)

    It turns out that the fix in commit 6636c3cc56 is bad; the assertion
    that the iomap code no longer creates buffer heads is incorrect for
    filesystems that set the IOMAP_F_BUFFER_HEAD flag.
    
    Instead, what's happening is that gfs2_iomap_begin_write treats all
    files that have the jdata flag set as journaled files, which is
    incorrect as long as those files are inline ("stuffed").  We're handling
    stuffed files directly via the page cache, which is why we ended up with
    pages without buffer heads in gfs2_page_add_databufs.
    
    Fix this by handling stuffed journaled files correctly in
    gfs2_iomap_begin_write.
    
    This reverts commit 6636c3cc5690c11631e6366cf9a28fb99c8b25bb.
    
    Signed-off-by: Andreas Gruenbacher <agruenba@redhat.com>
    Andreas Gruenbacher committed Oct 12, 2018
    Configuration menu
    Copy the full SHA
    fee5150 View commit details
    Browse the repository at this point in the history
  15. mux: adgs1408: use the correct MODULE_LICENSE

    The file is GPL v2 or later.
    
    Acked-by: Mircea Caprioru <mircea.caprioru@analog.com>
    Signed-off-by: Peter Rosin <peda@axentia.se>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    peda-r authored and gregkh committed Oct 12, 2018
    Configuration menu
    Copy the full SHA
    38a1260 View commit details
    Browse the repository at this point in the history
  16. MAINTAINERS: use the correct location for dt-bindings includes for mux

    Just drop the "linux" part of the path, it was never correct.
    
    Reported-by: Joe Perches <joe@perches.com>
    Fixes: 256ac03 ("dt-bindings: document devicetree bindings for mux-controllers and gpio-mux")
    Signed-off-by: Peter Rosin <peda@axentia.se>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    peda-r authored and gregkh committed Oct 12, 2018
    Configuration menu
    Copy the full SHA
    b40afc0 View commit details
    Browse the repository at this point in the history
  17. afs: Fix afs_server struct leak

    Fix a leak of afs_server structs.  The routine that installs them in the
    various lookup lists and trees gets a ref on leaving the function, whether
    it added the server or a server already exists.  It shouldn't increment
    the refcount if it added the server.
    
    The effect of this that "rmmod kafs" will hang waiting for the leaked
    server to become unused.
    
    Fixes: d2ddc77 ("afs: Overhaul volume and server record caching and fileserver rotation")
    Signed-off-by: David Howells <dhowells@redhat.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    dhowells authored and gregkh committed Oct 12, 2018
    Configuration menu
    Copy the full SHA
    f014ffb View commit details
    Browse the repository at this point in the history
  18. Merge tag 'armsoc-fixes-4.19' of git://git.kernel.org/pub/scm/linux/k…

    …ernel/git/arm/arm-soc
    
    Arnd writes:
      "ARM: SoC fixes for 4.19
    
       Two last minute bugfixes, both for NXP platforms:
    
       * The Layerscape 'qbman' infrastructure suffers from probe ordering
         bugs in some configurations, a two-patch series adds a hotfix for
         this. 4.20 will have a longer set of patches to rework it.
    
       * The old imx53-qsb board regressed in 4.19 after the addition
         of cpufreq support, adding a set of explicit operating points
         fixes this."
    
    * tag 'armsoc-fixes-4.19' of git://git.kernel.org/pub/scm/linux/kernel/git/arm/arm-soc:
      soc: fsl: qman_portals: defer probe after qman's probe
      soc: fsl: qbman: add APIs to retrieve the probing status
      ARM: dts: imx53-qsb: disable 1.2GHz OPP
    gregkh committed Oct 12, 2018
    Configuration menu
    Copy the full SHA
    bab5c80 View commit details
    Browse the repository at this point in the history
  19. sparc: Fix single-pcr perf event counter management.

    It is important to clear the hw->state value for non-stopped events
    when they are added into the PMU.  Otherwise when the event is
    scheduled out, we won't read the counter because HES_UPTODATE is still
    set.  This breaks 'perf stat' and similar use cases, causing all the
    events to show zero.
    
    This worked for multi-pcr because we make explicit sparc_pmu_start()
    calls in calculate_multiple_pcrs().  calculate_single_pcr() doesn't do
    this because the idea there is to accumulate all of the counter
    settings into the single pcr value.  So we have to add explicit
    hw->state handling there.
    
    Like x86, we use the PERF_HES_ARCH bit to track truly stopped events
    so that we don't accidently start them on a reload.
    
    Related to all of this, sparc_pmu_start() is missing a userpage update
    so add it.
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Oct 12, 2018
    Configuration menu
    Copy the full SHA
    cfdc317 View commit details
    Browse the repository at this point in the history
  20. sparc: Throttle perf events properly.

    Like x86 and arm, call perf_sample_event_took() in perf event
    NMI interrupt handler.
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Oct 12, 2018
    Configuration menu
    Copy the full SHA
    455adb3 View commit details
    Browse the repository at this point in the history

Commits on Oct 13, 2018

  1. Merge tag 'arm64-fixes' of git://git.kernel.org/pub/scm/linux/kernel/…

    …git/arm64/linux
    
    Will writes:
      "More arm64 fixes
    
       - Reject CHAIN PMU events when they are not part of a 64-bit counter
    
       - Fix WARN_ON_ONCE() that triggers for reserved regions that don't
         correspond to mapped memory"
    
    * tag 'arm64-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux:
      arm64: perf: Reject stand-alone CHAIN events for PMUv3
      arm64: Fix /proc/iomem for reserved but not memory regions
    gregkh committed Oct 13, 2018
    Configuration menu
    Copy the full SHA
    e66d001 View commit details
    Browse the repository at this point in the history
  2. Merge tag 'gfs2-4.19.fixes3' of git://git.kernel.org/pub/scm/linux/ke…

    …rnel/git/gfs2/linux-gfs2
    
    Andreas writes:
      "gfs2 4.19 fixes
    
       Fix iomap buffered write support for journaled files"
    
    * tag 'gfs2-4.19.fixes3' of git://git.kernel.org/pub/scm/linux/kernel/git/gfs2/linux-gfs2:
      gfs2: Fix iomap buffered write support for journaled files (2)
    gregkh committed Oct 13, 2018
    Configuration menu
    Copy the full SHA
    ed66c25 View commit details
    Browse the repository at this point in the history
  3. Merge tag 'for-linus-20181012' of git://git.kernel.dk/linux-block

    Jens writes:
      "block fix for 4.19-rc
    
       Just a single fix that should go in, fixing a regression introduced
       in the blk-wbt code."
    
    * tag 'for-linus-20181012' of git://git.kernel.dk/linux-block:
      blk-wbt: wake up all when we scale up, not down
    gregkh committed Oct 13, 2018
    Configuration menu
    Copy the full SHA
    cafa017 View commit details
    Browse the repository at this point in the history
  4. ocfs2: fix a GCC warning

    Fix the following compile warning:
    
    fs/ocfs2/dlmglue.c:99:30: warning: �lockdep_keys� defined but not used [-Wunused-variable]
     static struct lock_class_key lockdep_keys[OCFS2_NUM_LOCK_TYPES];
    
    Link: http://lkml.kernel.org/r/1536938148-32110-1-git-send-email-zhongjiang@huawei.com
    Signed-off-by: zhong jiang <zhongjiang@huawei.com>
    Reviewed-by: Andrew Morton <akpm@linux-foundation.org>
    Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    xiongzhongjiang authored and gregkh committed Oct 13, 2018
    Configuration menu
    Copy the full SHA
    1cff514 View commit details
    Browse the repository at this point in the history
  5. mm/mmap.c: don't clobber partially overlapping VMA with MAP_FIXED_NOR…

    …EPLACE
    
    Daniel Micay reports that attempting to use MAP_FIXED_NOREPLACE in an
    application causes that application to randomly crash.  The existing check
    for handling MAP_FIXED_NOREPLACE looks up the first VMA that either
    overlaps or follows the requested region, and then bails out if that VMA
    overlaps *the start* of the requested region.  It does not bail out if the
    VMA only overlaps another part of the requested region.
    
    Fix it by checking that the found VMA only starts at or after the end of
    the requested region, in which case there is no overlap.
    
    Test case:
    
    user@debian:~$ cat mmap_fixed_simple.c
    #include <sys/mman.h>
    #include <errno.h>
    #include <stdio.h>
    #include <stdlib.h>
    #include <unistd.h>
    
    #ifndef MAP_FIXED_NOREPLACE
    #define MAP_FIXED_NOREPLACE 0x100000
    #endif
    
    int main(void) {
      char *p;
    
      errno = 0;
      p = mmap((void*)0x10001000, 0x4000, PROT_NONE,
    MAP_PRIVATE|MAP_ANONYMOUS|MAP_FIXED_NOREPLACE, -1, 0);
      printf("p1=%p err=%m\n", p);
    
      errno = 0;
      p = mmap((void*)0x10000000, 0x2000, PROT_READ,
    MAP_PRIVATE|MAP_ANONYMOUS|MAP_FIXED_NOREPLACE, -1, 0);
      printf("p2=%p err=%m\n", p);
    
      char cmd[100];
      sprintf(cmd, "cat /proc/%d/maps", getpid());
      system(cmd);
    
      return 0;
    }
    user@debian:~$ gcc -o mmap_fixed_simple mmap_fixed_simple.c
    user@debian:~$ ./mmap_fixed_simple
    p1=0x10001000 err=Success
    p2=0x10000000 err=Success
    10000000-10002000 r--p 00000000 00:00 0
    10002000-10005000 ---p 00000000 00:00 0
    564a9a06f000-564a9a070000 r-xp 00000000 fe:01 264004
      /home/user/mmap_fixed_simple
    564a9a26f000-564a9a270000 r--p 00000000 fe:01 264004
      /home/user/mmap_fixed_simple
    564a9a270000-564a9a271000 rw-p 00001000 fe:01 264004
      /home/user/mmap_fixed_simple
    564a9a54a000-564a9a56b000 rw-p 00000000 00:00 0                          [heap]
    7f8eba447000-7f8eba5dc000 r-xp 00000000 fe:01 405885
      /lib/x86_64-linux-gnu/libc-2.24.so
    7f8eba5dc000-7f8eba7dc000 ---p 00195000 fe:01 405885
      /lib/x86_64-linux-gnu/libc-2.24.so
    7f8eba7dc000-7f8eba7e0000 r--p 00195000 fe:01 405885
      /lib/x86_64-linux-gnu/libc-2.24.so
    7f8eba7e0000-7f8eba7e2000 rw-p 00199000 fe:01 405885
      /lib/x86_64-linux-gnu/libc-2.24.so
    7f8eba7e2000-7f8eba7e6000 rw-p 00000000 00:00 0
    7f8eba7e6000-7f8eba809000 r-xp 00000000 fe:01 405876
      /lib/x86_64-linux-gnu/ld-2.24.so
    7f8eba9e9000-7f8eba9eb000 rw-p 00000000 00:00 0
    7f8ebaa06000-7f8ebaa09000 rw-p 00000000 00:00 0
    7f8ebaa09000-7f8ebaa0a000 r--p 00023000 fe:01 405876
      /lib/x86_64-linux-gnu/ld-2.24.so
    7f8ebaa0a000-7f8ebaa0b000 rw-p 00024000 fe:01 405876
      /lib/x86_64-linux-gnu/ld-2.24.so
    7f8ebaa0b000-7f8ebaa0c000 rw-p 00000000 00:00 0
    7ffcc99fa000-7ffcc9a1b000 rw-p 00000000 00:00 0                          [stack]
    7ffcc9b44000-7ffcc9b47000 r--p 00000000 00:00 0                          [vvar]
    7ffcc9b47000-7ffcc9b49000 r-xp 00000000 00:00 0                          [vdso]
    ffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0
      [vsyscall]
    user@debian:~$ uname -a
    Linux debian 4.19.0-rc6+ #181 SMP Wed Oct 3 23:43:42 CEST 2018 x86_64 GNU/Linux
    user@debian:~$
    
    As you can see, the first page of the mapping at 0x10001000 was clobbered.
    
    Link: http://lkml.kernel.org/r/20181010152736.99475-1-jannh@google.com
    Fixes: a4ff8e8 ("mm: introduce MAP_FIXED_NOREPLACE")
    Signed-off-by: Jann Horn <jannh@google.com>
    Reported-by: Daniel Micay <danielmicay@gmail.com>
    Acked-by: Michal Hocko <mhocko@suse.com>
    Acked-by: John Hubbard <jhubbard@nvidia.com>
    Acked-by: Kees Cook <keescook@chromium.org>
    Acked-by: Vlastimil Babka <vbabka@suse.cz>
    Cc: <stable@vger.kernel.org>
    Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    thejh authored and gregkh committed Oct 13, 2018
    Configuration menu
    Copy the full SHA
    7aa867d View commit details
    Browse the repository at this point in the history
  6. mm/thp: fix call to mmu_notifier in set_pmd_migration_entry() v2

    Inside set_pmd_migration_entry() we are holding page table locks and thus
    we can not sleep so we can not call invalidate_range_start/end()
    
    So remove call to mmu_notifier_invalidate_range_start/end() because they
    are call inside the function calling set_pmd_migration_entry() (see
    try_to_unmap_one()).
    
    Link: http://lkml.kernel.org/r/20181012181056.7864-1-jglisse@redhat.com
    Signed-off-by: Jérôme Glisse <jglisse@redhat.com>
    Reported-by: Andrea Arcangeli <aarcange@redhat.com>
    Reviewed-by: Zi Yan <zi.yan@cs.rutgers.edu>
    Acked-by: Michal Hocko <mhocko@kernel.org>
    Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    Cc: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
    Cc: "H. Peter Anvin" <hpa@zytor.com>
    Cc: Anshuman Khandual <khandual@linux.vnet.ibm.com>
    Cc: Dave Hansen <dave.hansen@intel.com>
    Cc: David Nellans <dnellans@nvidia.com>
    Cc: Ingo Molnar <mingo@elte.hu>
    Cc: Mel Gorman <mgorman@techsingularity.net>
    Cc: Minchan Kim <minchan@kernel.org>
    Cc: Naoya Horiguchi <n-horiguchi@ah.jp.nec.com>
    Cc: Thomas Gleixner <tglx@linutronix.de>
    Cc: Vlastimil Babka <vbabka@suse.cz>
    Cc: <stable@vger.kernel.org>
    Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    Jérôme Glisse authored and gregkh committed Oct 13, 2018
    Configuration menu
    Copy the full SHA
    bfba8e5 View commit details
    Browse the repository at this point in the history
  7. fs/fat/fatent.c: add cond_resched() to fat_count_free_clusters()

    On non-preempt kernels this loop can take a long time (more than 50 ticks)
    processing through entries.
    
    Link: http://lkml.kernel.org/r/20181010172623.57033-1-khazhy@google.com
    Signed-off-by: Khazhismel Kumykov <khazhy@google.com>
    Acked-by: OGAWA Hirofumi <hirofumi@mail.parknet.co.jp>
    Reviewed-by: Andrew Morton <akpm@linux-foundation.org>
    Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    khazhyk authored and gregkh committed Oct 13, 2018
    Configuration menu
    Copy the full SHA
    ac081c3 View commit details
    Browse the repository at this point in the history
  8. Merge branch 'akpm'

    Fixes from Andrew:
    
    * akpm:
      fs/fat/fatent.c: add cond_resched() to fat_count_free_clusters()
      mm/thp: fix call to mmu_notifier in set_pmd_migration_entry() v2
      mm/mmap.c: don't clobber partially overlapping VMA with MAP_FIXED_NOREPLACE
      ocfs2: fix a GCC warning
    gregkh committed Oct 13, 2018
    Configuration menu
    Copy the full SHA
    79fc170 View commit details
    Browse the repository at this point in the history
  9. ubifs: Fix WARN_ON logic in exit path

    ubifs_assert() is not WARN_ON(), so we have to invert
    the checks.
    Randy faced this warning with UBIFS being a module, since
    most users use UBIFS as builtin because UBIFS is the rootfs
    nobody noticed so far. :-(
    Including me.
    
    Reported-by: Randy Dunlap <rdunlap@infradead.org>
    Fixes: 54169dd ("ubifs: Turn two ubifs_assert() into a WARN_ON()")
    Signed-off-by: Richard Weinberger <richard@nod.at>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    richardweinberger authored and gregkh committed Oct 13, 2018
    Configuration menu
    Copy the full SHA
    f8ccb14 View commit details
    Browse the repository at this point in the history
  10. KVM: vmx: hyper-v: don't pass EPT configuration info to vmx_hv_remote…

    …_flush_tlb()
    
    I'm observing random crashes in multi-vCPU L2 guests running on KVM on
    Hyper-V. I bisected the issue to the commit 877ad95 ("KVM: vmx: Add
    tlb_remote_flush callback support"). Hyper-V TLFS states:
    
    "AddressSpace specifies an address space ID (an EPT PML4 table pointer)"
    
    So apparently, Hyper-V doesn't expect us to pass naked EPTP, only PML4
    pointer should be used. Strip off EPT configuration information before
    calling into vmx_hv_remote_flush_tlb().
    
    Fixes: 877ad95 ("KVM: vmx: Add tlb_remote_flush callback support")
    Signed-off-by: Vitaly Kuznetsov <vkuznets@redhat.com>
    Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
    vittyvk authored and bonzini committed Oct 13, 2018
    Configuration menu
    Copy the full SHA
    5f8bb00 View commit details
    Browse the repository at this point in the history
  11. Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm

    Paolo writes:
      "KVM fixes for 4.19-rc8
    
       Leftover bugfixes."
    
    * tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm:
      KVM: vmx: hyper-v: don't pass EPT configuration info to vmx_hv_remote_flush_tlb()
      KVM: x86: support CONFIG_KVM_AMD=y with CONFIG_CRYPTO_DEV_CCP_DD=m
      ARM: KVM: Correctly order SGI register entries in the cp15 array
    gregkh committed Oct 13, 2018
    Configuration menu
    Copy the full SHA
    7ec2182 View commit details
    Browse the repository at this point in the history

Commits on Oct 14, 2018

  1. Merge branch 'i2c/for-current' of git://git.kernel.org/pub/scm/linux/…

    …kernel/git/wsa/linux
    
    Wolfram writes:
      "i2c fix for 4.19:
    
       I2C has one documentation bugfix for something we changed during the
       v4.19 cycle"
    
    * 'i2c/for-current' of git://git.kernel.org/pub/scm/linux/kernel/git/wsa/linux:
      i2c: Fix kerneldoc for renamed i2c dma put function
    gregkh committed Oct 14, 2018
    Configuration menu
    Copy the full SHA
    a24a0eb View commit details
    Browse the repository at this point in the history
  2. Merge tag 'libnvdimm-fixes-4.19-rc8' of git://git.kernel.org/pub/scm/…

    …linux/kernel/git/nvdimm/nvdimm
    
    Dan writes:
      "libnvdimm/dax 4.19-rc8
    
       * Fix a livelock in dax_layout_busy_page() present since v4.18. The
         lockup triggers when truncating an actively mapped huge page out of
         a mapping pinned for direct-I/O.
    
       * Fix mprotect() clobbers of _PAGE_DEVMAP. Broken since v4.5
         mprotect() clears this flag that is needed to communicate the
         liveness of device pages to the get_user_pages() path."
    
    * tag 'libnvdimm-fixes-4.19-rc8' of git://git.kernel.org/pub/scm/linux/kernel/git/nvdimm/nvdimm:
      mm: Preserve _PAGE_DEVMAP across mprotect() calls
      filesystem-dax: Fix dax_layout_busy_page() livelock
    gregkh committed Oct 14, 2018
    Configuration menu
    Copy the full SHA
    3a27203 View commit details
    Browse the repository at this point in the history
  3. x86/tsc: Force inlining of cyc2ns bits

    Looking at the asm for native_sched_clock() I noticed we don't inline
    enough. Mostly caused by sharing code with cyc2ns_read_begin(), which
    we didn't used to do. So mark all that __force_inline to make it DTRT.
    
    Fixes: 59eaef7 ("x86/tsc: Remodel cyc2ns to use seqcount_latch()")
    Reported-by: Eric Dumazet <edumazet@google.com>
    Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Cc: hpa@zytor.com
    Cc: eric.dumazet@gmail.com
    Cc: bp@alien8.de
    Cc: stable@vger.kernel.org
    Link: https://lkml.kernel.org/r/20181011104019.695196158@infradead.org
    Peter Zijlstra authored and KAGA-KOKO committed Oct 14, 2018
    Configuration menu
    Copy the full SHA
    4907c68 View commit details
    Browse the repository at this point in the history
  4. x86/percpu: Fix this_cpu_read()

    Eric reported that a sequence count loop using this_cpu_read() got
    optimized out. This is wrong, this_cpu_read() must imply READ_ONCE()
    because the interface is IRQ-safe, therefore an interrupt can have
    changed the per-cpu value.
    
    Fixes: 7c3576d ("[PATCH] i386: Convert PDA into the percpu section")
    Reported-by: Eric Dumazet <edumazet@google.com>
    Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Acked-by: Eric Dumazet <edumazet@google.com>
    Cc: hpa@zytor.com
    Cc: eric.dumazet@gmail.com
    Cc: bp@alien8.de
    Cc: stable@vger.kernel.org
    Link: https://lkml.kernel.org/r/20181011104019.748208519@infradead.org
    Peter Zijlstra authored and KAGA-KOKO committed Oct 14, 2018
    Configuration menu
    Copy the full SHA
    b59167a View commit details
    Browse the repository at this point in the history
  5. x86/entry: Add some paranoid entry/exit CR3 handling comments

    Andi Kleen was just asking me about the NMI CR3 handling and why
    we restore it unconditionally.  I was *sure* we had documented it
    well.  We did not.
    
    Add some documentation.  We have common entry code where the CR3
    value is stashed, but three places in two big code paths where we
    restore it.  I put bulk of the comments in this common path and
    then refer to it from the other spots.
    
    Signed-off-by: Dave Hansen <dave.hansen@linux.intel.com>
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Cc: luto@kernel.org
    Cc: bp@alien8.de
    Cc: "H. Peter Anvin" <hpa@zytor.come
    Cc: Andy Lutomirski <luto@kernel.org>
    Cc: Borislav Petkov <bp@alien8.de>
    Link: https://lkml.kernel.org/r/20181012232118.3EAAE77B@viggo.jf.intel.com
    hansendc authored and KAGA-KOKO committed Oct 14, 2018
    Configuration menu
    Copy the full SHA
    16561f2 View commit details
    Browse the repository at this point in the history
  6. x86/time: Correct the attribute on jiffies' definition

    Clang warns that the declaration of jiffies in include/linux/jiffies.h
    doesn't match the definition in arch/x86/time/kernel.c:
    
    arch/x86/kernel/time.c:29:42: warning: section does not match previous declaration [-Wsection]
    __visible volatile unsigned long jiffies __cacheline_aligned = INITIAL_JIFFIES;
                                             ^
    ./include/linux/cache.h:49:4: note: expanded from macro '__cacheline_aligned'
                     __section__(".data..cacheline_aligned")))
                     ^
    ./include/linux/jiffies.h:81:31: note: previous attribute is here
    extern unsigned long volatile __cacheline_aligned_in_smp __jiffy_arch_data jiffies;
                                  ^
    ./arch/x86/include/asm/cache.h:20:2: note: expanded from macro '__cacheline_aligned_in_smp'
            __page_aligned_data
            ^
    ./include/linux/linkage.h:39:29: note: expanded from macro '__page_aligned_data'
    #define __page_aligned_data     __section(.data..page_aligned) __aligned(PAGE_SIZE)
                                    ^
    ./include/linux/compiler_attributes.h:233:56: note: expanded from macro '__section'
    #define __section(S)                    __attribute__((__section__(#S)))
                                                           ^
    1 warning generated.
    
    The declaration was changed in commit 7c30f35 ("jiffies.h: declare
    jiffies and jiffies_64 with ____cacheline_aligned_in_smp") but wasn't
    updated here. Make them match so Clang no longer warns.
    
    Fixes: 7c30f35 ("jiffies.h: declare jiffies and jiffies_64 with ____cacheline_aligned_in_smp")
    Signed-off-by: Nathan Chancellor <natechancellor@gmail.com>
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Cc: Borislav Petkov <bp@alien8.de>
    Cc: "H. Peter Anvin" <hpa@zytor.com>
    Cc: Nick Desaulniers <ndesaulniers@google.com>
    Cc: stable@vger.kernel.org
    Link: https://lkml.kernel.org/r/20181013005311.28617-1-natechancellor@gmail.com
    nathanchance authored and KAGA-KOKO committed Oct 14, 2018
    Configuration menu
    Copy the full SHA
    53c13ba View commit details
    Browse the repository at this point in the history
  7. x86/boot: Add -Wno-pointer-sign to KBUILD_CFLAGS

    When compiling the kernel with Clang, this warning appears even though
    it is disabled for the whole kernel because this folder has its own set
    of KBUILD_CFLAGS. It was disabled before the beginning of git history.
    
    In file included from arch/x86/boot/compressed/kaslr.c:29:
    In file included from arch/x86/boot/compressed/misc.h:21:
    In file included from ./include/linux/elf.h:5:
    In file included from ./arch/x86/include/asm/elf.h:77:
    In file included from ./arch/x86/include/asm/vdso.h:11:
    In file included from ./include/linux/mm_types.h:9:
    In file included from ./include/linux/spinlock.h:88:
    In file included from ./arch/x86/include/asm/spinlock.h:43:
    In file included from ./arch/x86/include/asm/qrwlock.h:6:
    ./include/asm-generic/qrwlock.h:101:53: warning: passing 'u32 *' (aka
    'unsigned int *') to parameter of type 'int *' converts between pointers
    to integer types with different sign [-Wpointer-sign]
            if (likely(atomic_try_cmpxchg_acquire(&lock->cnts, &cnts, _QW_LOCKED)))
                                                               ^~~~~
    ./include/linux/compiler.h:76:40: note: expanded from macro 'likely'
    # define likely(x)      __builtin_expect(!!(x), 1)
                                                ^
    ./include/asm-generic/atomic-instrumented.h:69:66: note: passing
    argument to parameter 'old' here
    static __always_inline bool atomic_try_cmpxchg(atomic_t *v, int *old, int new)
                                                                     ^
    
    Signed-off-by: Nathan Chancellor <natechancellor@gmail.com>
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Cc: Borislav Petkov <bp@alien8.de>
    Cc: "H. Peter Anvin" <hpa@zytor.com>
    Cc: Nick Desaulniers <ndesaulniers@google.com>
    Link: https://lkml.kernel.org/r/20181013010713.6999-1-natechancellor@gmail.com
    nathanchance authored and KAGA-KOKO committed Oct 14, 2018
    Configuration menu
    Copy the full SHA
    dca5203 View commit details
    Browse the repository at this point in the history
  8. Merge git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf

    Daniel Borkmann says:
    
    ====================
    pull-request: bpf 2018-10-14
    
    The following pull-request contains BPF updates for your *net* tree.
    
    The main changes are:
    
    1) Fix xsk map update and delete operation to not call synchronize_net()
       but to piggy back on SOCK_RCU_FREE for sockets instead as we are not
       allowed to sleep under RCU, from Björn.
    
    2) Do not change RLIMIT_MEMLOCK in reuseport_bpf selftest if the process
       already has unlimited RLIMIT_MEMLOCK, from Eric.
    ====================
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Oct 14, 2018
    Configuration menu
    Copy the full SHA
    028c99f View commit details
    Browse the repository at this point in the history

Commits on Oct 15, 2018

  1. sparc64: Make proc_id signed.

    So that when it is unset, ie. '-1', userspace can see it
    properly.
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Oct 15, 2018
    Configuration menu
    Copy the full SHA
    b3e1eb8 View commit details
    Browse the repository at this point in the history
  2. sparc64: Set %l4 properly on trap return after handling signals.

    If we did some signal processing, we have to reload the pt_regs
    tstate register because it's value may have changed.
    
    In doing so we also have to extract the %pil value contained in there
    anre load that into %l4.
    
    This value is at bit 20 and thus needs to be shifted down before we
    later write it into the %pil register.
    
    Most of the time this is harmless as we are returning to userspace
    and the %pil is zero for that case.
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Oct 15, 2018
    Configuration menu
    Copy the full SHA
    d1f1f98 View commit details
    Browse the repository at this point in the history
  3. Linux 4.19-rc8

    gregkh committed Oct 15, 2018
    Configuration menu
    Copy the full SHA
    35a7f35 View commit details
    Browse the repository at this point in the history
  4. afs: Fix clearance of reply

    The recent patch to fix the afs_server struct leak didn't actually fix the
    bug, but rather fixed some of the symptoms.  The problem is that an
    asynchronous call that holds a resource pointed to by call->reply[0] will
    find the pointer cleared in the call destructor, thereby preventing the
    resource from being cleaned up.
    
    In the case of the server record leak, the afs_fs_get_capabilities()
    function in devel code sets up a call with reply[0] pointing at the server
    record that should be altered when the result is obtained, but this was
    being cleared before the destructor was called, so the put in the
    destructor does nothing and the record is leaked.
    
    Commit f014ffb removed the additional ref obtained by
    afs_install_server(), but the removal of this ref is actually used by the
    garbage collector to mark a server record as being defunct after the record
    has expired through lack of use.
    
    The offending clearance of call->reply[0] upon completion in
    afs_process_async_call() has been there from the origin of the code, but
    none of the asynchronous calls actually use that pointer currently, so it
    should be safe to remove (note that synchronous calls don't involve this
    function).
    
    Fix this by the following means:
    
     (1) Revert commit f014ffb.
    
     (2) Remove the clearance of reply[0] from afs_process_async_call().
    
    Without this, afs_manage_servers() will suffer an assertion failure if it
    sees a server record that didn't get used because the usage count is not 1.
    
    Fixes: f014ffb ("afs: Fix afs_server struct leak")
    Fixes: 08e0e7c ("[AF_RXRPC]: Make the in-kernel AFS filesystem use AF_RXRPC.")
    Signed-off-by: David Howells <dhowells@redhat.com>
    Cc: stable <stable@vger.kernel.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    dhowells authored and gregkh committed Oct 15, 2018
    Configuration menu
    Copy the full SHA
    f0a7d18 View commit details
    Browse the repository at this point in the history
  5. Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15IGM

    Add ELAN061C to the ACPI table to support Elan touchpad found in Lenovo
    IdeaPad 330-15IGM.
    
    Signed-off-by: Mikhail Nikiforov <jackxviichaos@gmail.com>
    Cc: stable@vger.kernel.org
    Signed-off-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
    JackXVII authored and dtor committed Oct 15, 2018
    Configuration menu
    Copy the full SHA
    13c1c5e View commit details
    Browse the repository at this point in the history
  6. test_ida: Fix lockdep warning

    The IDA was declared on the stack instead of statically, so lockdep
    triggered a warning that it was improperly initialised.
    
    Reported-by: 0day bot
    Tested-by: Rong Chen <rong.a.chen@intel.com>
    Signed-off-by: Matthew Wilcox <willy@infradead.org>
    Matthew Wilcox committed Oct 15, 2018
    Configuration menu
    Copy the full SHA
    c994b12 View commit details
    Browse the repository at this point in the history
  7. idr: Change documentation license

    This documentation was inadvertently released under the CC-BY-SA-4.0
    license.  It was intended to be released under GPL-2.0 or later.
    
    Signed-off-by: Matthew Wilcox <willy@infradead.org>
    Matthew Wilcox committed Oct 15, 2018
    Configuration menu
    Copy the full SHA
    a309d5d View commit details
    Browse the repository at this point in the history

Commits on Oct 16, 2018

  1. Revert "sparc: Convert to using %pOFn instead of device_node.name"

    This reverts commit 0b9871a.
    
    Causes crashes with qemu, interacts badly with commit commit
    6d0a70a ("vsprintf: print OF node name using full_name")
    etc.
    
    Reported-by: Guenter Roeck <linux@roeck-us.net>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    a06ecbf View commit details
    Browse the repository at this point in the history
  2. r8169: Enable MSI-X on RTL8106e

    Originally, we have an issue where r8169 MSI-X interrupt is broken after
    S3 suspend/resume on RTL8106e of ASUS X441UAR.
    
    02:00.0 Ethernet controller [0200]: Realtek Semiconductor Co., Ltd.
    RTL8101/2/6E PCI Express Fast/Gigabit Ethernet controller [10ec:8136]
    (rev 07)
    	Subsystem: ASUSTeK Computer Inc. RTL810xE PCI Express Fast
    Ethernet controller [1043:200f]
    	Flags: bus master, fast devsel, latency 0, IRQ 16
    	I/O ports at e000 [size=256]
    	Memory at ef100000 (64-bit, non-prefetchable) [size=4K]
    	Memory at e0000000 (64-bit, prefetchable) [size=16K]
    	Capabilities: [40] Power Management version 3
    	Capabilities: [50] MSI: Enable- Count=1/1 Maskable- 64bit+
    	Capabilities: [70] Express Endpoint, MSI 01
    	Capabilities: [b0] MSI-X: Enable+ Count=4 Masked-
    	Capabilities: [d0] Vital Product Data
    	Capabilities: [100] Advanced Error Reporting
    	Capabilities: [140] Virtual Channel
    	Capabilities: [160] Device Serial Number 01-00-00-00-36-4c-e0-00
    	Capabilities: [170] Latency Tolerance Reporting
    	Kernel driver in use: r8169
    	Kernel modules: r8169
    
    We found the all of the values in PCI BAR=4 of the ethernet adapter
    become 0xFF after system resumes.  That breaks the MSI-X interrupt.
    Therefore, we can only fall back to MSI interrupt to fix the issue at
    that time.
    
    However, there is a commit which resolves the drivers getting nothing in
    PCI BAR=4 after system resumes.  It is 04cb3ae895d7 "PCI: Reprogram
    bridge prefetch registers on resume" by Daniel Drake.
    
    After apply the patch, the ethernet adapter works fine before suspend
    and after resume.  So, we can revert the workaround after the commit
    "PCI: Reprogram bridge prefetch registers on resume" is merged into main
    tree.
    
    This patch reverts commit 7bb05b8
    "r8169: don't use MSI-X on RTL8106e".
    
    Buglink: https://bugzilla.kernel.org/show_bug.cgi?id=201181
    Fixes: 7bb05b8 ("r8169: don't use MSI-X on RTL8106e")
    Signed-off-by: Jian-Hong Pan <jian-hong@endlessm.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    starnight authored and davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    d49c88d View commit details
    Browse the repository at this point in the history
  3. ethtool: fix a missing-check bug

    In ethtool_get_rxnfc(), the eth command 'cmd' is compared against
    'ETHTOOL_GRXFH' to see whether it is necessary to adjust the variable
    'info_size'. Then the whole structure of 'info' is copied from the
    user-space buffer 'useraddr' with 'info_size' bytes. In the following
    execution, 'info' may be copied again from the buffer 'useraddr' depending
    on the 'cmd' and the 'info.flow_type'. However, after these two copies,
    there is no check between 'cmd' and 'info.cmd'. In fact, 'cmd' is also
    copied from the buffer 'useraddr' in dev_ethtool(), which is the caller
    function of ethtool_get_rxnfc(). Given that 'useraddr' is in the user
    space, a malicious user can race to change the eth command in the buffer
    between these copies. By doing so, the attacker can supply inconsistent
    data and cause undefined behavior because in the following execution 'info'
    will be passed to ops->get_rxnfc().
    
    This patch adds a necessary check on 'info.cmd' and 'cmd' to confirm that
    they are still same after the two copies in ethtool_get_rxnfc(). Otherwise,
    an error code EINVAL will be returned.
    
    Signed-off-by: Wenwen Wang <wang6495@umn.edu>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Wenwen Wang authored and davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    2bb3207 View commit details
    Browse the repository at this point in the history
  4. ethtool: fix a privilege escalation bug

    In dev_ethtool(), the eth command 'ethcmd' is firstly copied from the
    use-space buffer 'useraddr' and checked to see whether it is
    ETHTOOL_PERQUEUE. If yes, the sub-command 'sub_cmd' is further copied from
    the user space. Otherwise, 'sub_cmd' is the same as 'ethcmd'. Next,
    according to 'sub_cmd', a permission check is enforced through the function
    ns_capable(). For example, the permission check is required if 'sub_cmd' is
    ETHTOOL_SCOALESCE, but it is not necessary if 'sub_cmd' is
    ETHTOOL_GCOALESCE, as suggested in the comment "Allow some commands to be
    done by anyone". The following execution invokes different handlers
    according to 'ethcmd'. Specifically, if 'ethcmd' is ETHTOOL_PERQUEUE,
    ethtool_set_per_queue() is called. In ethtool_set_per_queue(), the kernel
    object 'per_queue_opt' is copied again from the user-space buffer
    'useraddr' and 'per_queue_opt.sub_command' is used to determine which
    operation should be performed. Given that the buffer 'useraddr' is in the
    user space, a malicious user can race to change the sub-command between the
    two copies. In particular, the attacker can supply ETHTOOL_PERQUEUE and
    ETHTOOL_GCOALESCE to bypass the permission check in dev_ethtool(). Then
    before ethtool_set_per_queue() is called, the attacker changes
    ETHTOOL_GCOALESCE to ETHTOOL_SCOALESCE. In this way, the attacker can
    bypass the permission check and execute ETHTOOL_SCOALESCE.
    
    This patch enforces a check in ethtool_set_per_queue() after the second
    copy from 'useraddr'. If the sub-command is different from the one obtained
    in the first copy in dev_ethtool(), an error code EINVAL will be returned.
    
    Fixes: f38d138 ("net/ethtool: support set coalesce per queue")
    Signed-off-by: Wenwen Wang <wang6495@umn.edu>
    Reviewed-by: Michal Kubecek <mkubecek@suse.cz>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Wenwen Wang authored and davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    58f5bbe View commit details
    Browse the repository at this point in the history
  5. net/sched: cls_api: add missing validation of netlink attributes

    Similarly to what has been done in 8b4c3cd ("net: sched: Add policy
    validation for tc attributes"), fix classifier code to add validation of
    TCA_CHAIN and TCA_KIND netlink attributes.
    
    tested with:
     # ./tdc.py -c filter
    
    v2: Let sch_api and cls_api share nla_policy they have in common, thanks
        to David Ahern.
    v3: Avoid EXPORT_SYMBOL(), as validation of those attributes is not done
        by TC modules, thanks to Cong Wang.
        While at it, restore the 'Delete / get qdisc' comment to its orginal
        position, just above tc_get_qdisc() function prototype.
    
    Fixes: 5bc1701 ("net: sched: introduce multichain support for filters")
    Signed-off-by: Davide Caratti <dcaratti@redhat.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    dcaratti authored and davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    e331473 View commit details
    Browse the repository at this point in the history
  6. Merge tag 'mlx5-fixes-2018-10-10' of git://git.kernel.org/pub/scm/lin…

    …ux/kernel/git/saeed/linux
    
    Saeed Mahameed says:
    
    ====================
    Mellanox, mlx5 fixes 2018-10-10
    
    This pull request includes some fixes to mlx5 driver,
    Please pull and let me know if there's any problem.
    
    For -stable v4.11:
    ('net/mlx5: Take only bit 24-26 of wqe.pftype_wq for page fault type')
    For -stable v4.17:
    ('net/mlx5: Fix memory leak when setting fpga ipsec caps')
    For -stable v4.18:
    ('net/mlx5: WQ, fixes for fragmented WQ buffers API')
    ====================
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    d0f068e View commit details
    Browse the repository at this point in the history
  7. llc: set SOCK_RCU_FREE in llc_sap_add_socket()

    WHen an llc sock is added into the sk_laddr_hash of an llc_sap,
    it is not marked with SOCK_RCU_FREE.
    
    This causes that the sock could be freed while it is still being
    read by __llc_lookup_established() with RCU read lock. sock is
    refcounted, but with RCU read lock, nothing prevents the readers
    getting a zero refcnt.
    
    Fix it by setting SOCK_RCU_FREE in llc_sap_add_socket().
    
    Reported-by: syzbot+11e05f04c15e03be5254@syzkaller.appspotmail.com
    Signed-off-by: Cong Wang <xiyou.wangcong@gmail.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    congwang authored and davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    5a8e7ae View commit details
    Browse the repository at this point in the history
  8. tipc: initialize broadcast link stale counter correctly

    In the commit referred to below we added link tolerance as an additional
    criteria for declaring broadcast transmission "stale" and resetting the
    unicast links to the affected node.
    
    Unfortunately, this 'improvement' introduced two bugs, which each and
    one alone cause only limited problems, but combined lead to seemingly
    stochastic unicast link resets, depending on the amount of broadcast
    traffic transmitted.
    
    The first issue, a missing initialization of the 'tolerance' field of
    the receiver broadcast link, was recently fixed by commit 047491e
    ("tipc: set link tolerance correctly in broadcast link").
    
    Ths second issue, where we omit to reset the 'stale_cnt' field of
    the same link after a 'stale' period is over, leads to this counter
    accumulating over time, and in the absence of the 'tolerance' criteria
    leads to the above described symptoms. This commit adds the missing
    initialization.
    
    Fixes: a4dc70d ("tipc: extend link reset criteria for stale packet retransmission")
    Signed-off-by: Jon Maloy <jon.maloy@ericsson.com>
    Acked-by: Ying Xue <ying.xue@windriver.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Jon Maloy authored and davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    4af00f4 View commit details
    Browse the repository at this point in the history
  9. rxrpc: Fix an uninitialised variable

    Fix an uninitialised variable introduced by the last patch.  This can cause
    a crash when a new call comes in to a local service, such as when an AFS
    fileserver calls back to the local cache manager.
    
    Fixes: c1e15b4 ("rxrpc: Fix the packet reception routine")
    Signed-off-by: David Howells <dhowells@redhat.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    dhowells authored and davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    d7b4c24 View commit details
    Browse the repository at this point in the history
  10. rxrpc: use correct kvec num when sending BUSY response packet

    Fixes gcc '-Wunused-but-set-variable' warning:
    
    net/rxrpc/output.c: In function 'rxrpc_reject_packets':
    net/rxrpc/output.c:527:11: warning:
     variable 'ioc' set but not used [-Wunused-but-set-variable]
    
    'ioc' is the correct kvec num when sending a BUSY (or an ABORT) response
    packet.
    
    Fixes: ece64fe ("rxrpc: Emit BUSY packets when supposed to rather than ABORTs")
    Signed-off-by: YueHaibing <yuehaibing@huawei.com>
    Signed-off-by: David Howells <dhowells@redhat.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    YueHaibing authored and davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    d6672a5 View commit details
    Browse the repository at this point in the history
  11. net: bcmgenet: Poll internal PHY for GENETv5

    On GENETv5, there is a hardware issue which prevents the GENET hardware
    from generating a link UP interrupt when the link is operating at
    10Mbits/sec. Since we do not have any way to configure the link
    detection logic, fallback to polling in that case.
    
    Fixes: 4213808 ("net: bcmgenet: add support for the GENETv5 hardware")
    Signed-off-by: Florian Fainelli <f.fainelli@gmail.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    ffainelli authored and davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    64bd9c8 View commit details
    Browse the repository at this point in the history
  12. ipv6: rate-limit probes for neighbourless routes

    When commit 2709725 ("[IPV6]: ROUTE: Add Router Reachability
    Probing (RFC4191).") introduced router probing, the rt6_probe() function
    required that a neighbour entry existed. This neighbour entry is used to
    record the timestamp of the last probe via the ->updated field.
    
    Later, commit 2152cae ("ipv6: Do not depend on rt->n in rt6_probe().")
    removed the requirement for a neighbour entry. Neighbourless routes skip
    the interval check and are not rate-limited.
    
    This patch adds rate-limiting for neighbourless routes, by recording the
    timestamp of the last probe in the fib6_info itself.
    
    Fixes: 2152cae ("ipv6: Do not depend on rt->n in rt6_probe().")
    Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
    Reviewed-by: Stefano Brivio <sbrivio@redhat.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    qsn authored and davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    f547fac View commit details
    Browse the repository at this point in the history
  13. rxrpc: Fix incorrect conditional on IPV6

    The udpv6_encap_enable() function is part of the ipv6 code, and if that is
    configured as a loadable module and rxrpc is built in then a build failure
    will occur because the conditional check is wrong:
    
      net/rxrpc/local_object.o: In function `rxrpc_lookup_local':
      local_object.c:(.text+0x2688): undefined reference to `udpv6_encap_enable'
    
    Use the correct config symbol (CONFIG_AF_RXRPC_IPV6) in the conditional
    check rather than CONFIG_IPV6 as that will do the right thing.
    
    Fixes: 5271953 ("rxrpc: Use the UDP encap_rcv hook")
    Reported-by: kbuild-all@01.org
    Reported-by: Arnd Bergmann <arnd@arndb.de>
    Signed-off-by: David Howells <dhowells@redhat.com>
    Reviewed-by: Arnd Bergmann <arnd@arndb.de>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    dhowells authored and davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    7ec8dc9 View commit details
    Browse the repository at this point in the history
  14. tipc: fix unsafe rcu locking when accessing publication list

    The binding table's 'cluster_scope' list is rcu protected to handle
    races between threads changing the list and those traversing the list at
    the same moment. We have now found that the function named_distribute()
    uses the regular list_for_each() macro to traverse the said list.
    Likewise, the function tipc_named_withdraw() is removing items from the
    same list using the regular list_del() call. When these two functions
    execute in parallel we see occasional crashes.
    
    This commit fixes this by adding the missing _rcu() suffixes.
    
    Signed-off-by: Tung Nguyen <tung.q.nguyen@dektech.com.au>
    Signed-off-by: Jon Maloy <jon.maloy@ericsson.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Tung Nguyen authored and davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    d3092b2 View commit details
    Browse the repository at this point in the history
  15. ipv6: mcast: fix a use-after-free in inet6_mc_check

    syzbot found a use-after-free in inet6_mc_check [1]
    
    The problem here is that inet6_mc_check() uses rcu
    and read_lock(&iml->sflock)
    
    So the fact that ip6_mc_leave_src() is called under RTNL
    and the socket lock does not help us, we need to acquire
    iml->sflock in write mode.
    
    In the future, we should convert all this stuff to RCU.
    
    [1]
    BUG: KASAN: use-after-free in ipv6_addr_equal include/net/ipv6.h:521 [inline]
    BUG: KASAN: use-after-free in inet6_mc_check+0xae7/0xb40 net/ipv6/mcast.c:649
    Read of size 8 at addr ffff8801ce7f2510 by task syz-executor0/22432
    
    CPU: 1 PID: 22432 Comm: syz-executor0 Not tainted 4.19.0-rc7+ #280
    Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
    Call Trace:
     __dump_stack lib/dump_stack.c:77 [inline]
     dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113
     print_address_description.cold.8+0x9/0x1ff mm/kasan/report.c:256
     kasan_report_error mm/kasan/report.c:354 [inline]
     kasan_report.cold.9+0x242/0x309 mm/kasan/report.c:412
     __asan_report_load8_noabort+0x14/0x20 mm/kasan/report.c:433
     ipv6_addr_equal include/net/ipv6.h:521 [inline]
     inet6_mc_check+0xae7/0xb40 net/ipv6/mcast.c:649
     __raw_v6_lookup+0x320/0x3f0 net/ipv6/raw.c:98
     ipv6_raw_deliver net/ipv6/raw.c:183 [inline]
     raw6_local_deliver+0x3d3/0xcb0 net/ipv6/raw.c:240
     ip6_input_finish+0x467/0x1aa0 net/ipv6/ip6_input.c:345
     NF_HOOK include/linux/netfilter.h:289 [inline]
     ip6_input+0xe9/0x600 net/ipv6/ip6_input.c:426
     ip6_mc_input+0x48a/0xd20 net/ipv6/ip6_input.c:503
     dst_input include/net/dst.h:450 [inline]
     ip6_rcv_finish+0x17a/0x330 net/ipv6/ip6_input.c:76
     NF_HOOK include/linux/netfilter.h:289 [inline]
     ipv6_rcv+0x120/0x640 net/ipv6/ip6_input.c:271
     __netif_receive_skb_one_core+0x14d/0x200 net/core/dev.c:4913
     __netif_receive_skb+0x2c/0x1e0 net/core/dev.c:5023
     netif_receive_skb_internal+0x12c/0x620 net/core/dev.c:5126
     napi_frags_finish net/core/dev.c:5664 [inline]
     napi_gro_frags+0x75a/0xc90 net/core/dev.c:5737
     tun_get_user+0x3189/0x4250 drivers/net/tun.c:1923
     tun_chr_write_iter+0xb9/0x154 drivers/net/tun.c:1968
     call_write_iter include/linux/fs.h:1808 [inline]
     do_iter_readv_writev+0x8b0/0xa80 fs/read_write.c:680
     do_iter_write+0x185/0x5f0 fs/read_write.c:959
     vfs_writev+0x1f1/0x360 fs/read_write.c:1004
     do_writev+0x11a/0x310 fs/read_write.c:1039
     __do_sys_writev fs/read_write.c:1112 [inline]
     __se_sys_writev fs/read_write.c:1109 [inline]
     __x64_sys_writev+0x75/0xb0 fs/read_write.c:1109
     do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290
     entry_SYSCALL_64_after_hwframe+0x49/0xbe
    RIP: 0033:0x457421
    Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 b5 fb ff c3 48 83 ec 08 e8 1a 2d 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 63 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01
    RSP: 002b:00007f2d30ecaba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014
    RAX: ffffffffffffffda RBX: 000000000000003e RCX: 0000000000457421
    RDX: 0000000000000001 RSI: 00007f2d30ecabf0 RDI: 00000000000000f0
    RBP: 0000000020000500 R08: 00000000000000f0 R09: 0000000000000000
    R10: 0000000000000000 R11: 0000000000000293 R12: 00007f2d30ecb6d4
    R13: 00000000004c4890 R14: 00000000004d7b90 R15: 00000000ffffffff
    
    Allocated by task 22437:
     save_stack+0x43/0xd0 mm/kasan/kasan.c:448
     set_track mm/kasan/kasan.c:460 [inline]
     kasan_kmalloc+0xc7/0xe0 mm/kasan/kasan.c:553
     __do_kmalloc mm/slab.c:3718 [inline]
     __kmalloc+0x14e/0x760 mm/slab.c:3727
     kmalloc include/linux/slab.h:518 [inline]
     sock_kmalloc+0x15a/0x1f0 net/core/sock.c:1983
     ip6_mc_source+0x14dd/0x1960 net/ipv6/mcast.c:427
     do_ipv6_setsockopt.isra.9+0x3afb/0x45d0 net/ipv6/ipv6_sockglue.c:743
     ipv6_setsockopt+0xbd/0x170 net/ipv6/ipv6_sockglue.c:933
     rawv6_setsockopt+0x59/0x140 net/ipv6/raw.c:1069
     sock_common_setsockopt+0x9a/0xe0 net/core/sock.c:3038
     __sys_setsockopt+0x1ba/0x3c0 net/socket.c:1902
     __do_sys_setsockopt net/socket.c:1913 [inline]
     __se_sys_setsockopt net/socket.c:1910 [inline]
     __x64_sys_setsockopt+0xbe/0x150 net/socket.c:1910
     do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290
     entry_SYSCALL_64_after_hwframe+0x49/0xbe
    
    Freed by task 22430:
     save_stack+0x43/0xd0 mm/kasan/kasan.c:448
     set_track mm/kasan/kasan.c:460 [inline]
     __kasan_slab_free+0x102/0x150 mm/kasan/kasan.c:521
     kasan_slab_free+0xe/0x10 mm/kasan/kasan.c:528
     __cache_free mm/slab.c:3498 [inline]
     kfree+0xcf/0x230 mm/slab.c:3813
     __sock_kfree_s net/core/sock.c:2004 [inline]
     sock_kfree_s+0x29/0x60 net/core/sock.c:2010
     ip6_mc_leave_src+0x11a/0x1d0 net/ipv6/mcast.c:2448
     __ipv6_sock_mc_close+0x20b/0x4e0 net/ipv6/mcast.c:310
     ipv6_sock_mc_close+0x158/0x1d0 net/ipv6/mcast.c:328
     inet6_release+0x40/0x70 net/ipv6/af_inet6.c:452
     __sock_release+0xd7/0x250 net/socket.c:579
     sock_close+0x19/0x20 net/socket.c:1141
     __fput+0x385/0xa30 fs/file_table.c:278
     ____fput+0x15/0x20 fs/file_table.c:309
     task_work_run+0x1e8/0x2a0 kernel/task_work.c:113
     tracehook_notify_resume include/linux/tracehook.h:193 [inline]
     exit_to_usermode_loop+0x318/0x380 arch/x86/entry/common.c:166
     prepare_exit_to_usermode arch/x86/entry/common.c:197 [inline]
     syscall_return_slowpath arch/x86/entry/common.c:268 [inline]
     do_syscall_64+0x6be/0x820 arch/x86/entry/common.c:293
     entry_SYSCALL_64_after_hwframe+0x49/0xbe
    
    The buggy address belongs to the object at ffff8801ce7f2500
     which belongs to the cache kmalloc-192 of size 192
    The buggy address is located 16 bytes inside of
     192-byte region [ffff8801ce7f2500, ffff8801ce7f25c0)
    The buggy address belongs to the page:
    page:ffffea000739fc80 count:1 mapcount:0 mapping:ffff8801da800040 index:0x0
    flags: 0x2fffc0000000100(slab)
    raw: 02fffc0000000100 ffffea0006f6e548 ffffea000737b948 ffff8801da800040
    raw: 0000000000000000 ffff8801ce7f2000 0000000100000010 0000000000000000
    page dumped because: kasan: bad access detected
    
    Memory state around the buggy address:
     ffff8801ce7f2400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
     ffff8801ce7f2480: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
    >ffff8801ce7f2500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                             ^
     ffff8801ce7f2580: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
     ffff8801ce7f2600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    
    Signed-off-by: Eric Dumazet <edumazet@google.com>
    Reported-by: syzbot <syzkaller@googlegroups.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Eric Dumazet authored and davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    dc012f3 View commit details
    Browse the repository at this point in the history
  16. qed: fix spelling mistake "Ireelevant" -> "Irrelevant"

    Trivial fix to spelling mistake in DP_INFO message
    
    Signed-off-by: Colin Ian King <colin.king@canonical.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Colin Ian King authored and davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    fbe1222 View commit details
    Browse the repository at this point in the history
  17. net: fec: don't dump RX FIFO register when not available

    Commit db65f35 ("net: fec: add support of ethtool get_regs") introduce
    ethool "--register-dump" interface to dump all FEC registers.
    
    But not all silicon implementations of the Freescale FEC hardware module
    have the FRBR (FIFO Receive Bound Register) and FRSR (FIFO Receive Start
    Register) register, so we should not be trying to dump them on those that
    don't.
    
    To fix it we create a quirk flag, FEC_QUIRK_HAS_RFREG, and check it before
    dump those RX FIFO registers.
    
    Signed-off-by: Fugang Duan <fugang.duan@nxp.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    fugangduan authored and davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    ec20a63 View commit details
    Browse the repository at this point in the history
  18. sctp: use the pmtu from the icmp packet to update transport pathmtu

    Other than asoc pmtu sync from all transports, sctp_assoc_sync_pmtu
    is also processing transport pmtu_pending by icmp packets. But it's
    meaningless to use sctp_dst_mtu(t->dst) as new pmtu for a transport.
    
    The right pmtu value should come from the icmp packet, and it would
    be saved into transport->mtu_info in this patch and used later when
    the pmtu sync happens in sctp_sendmsg_to_asoc or sctp_packet_config.
    
    Besides, without this patch, as pmtu can only be updated correctly
    when receiving a icmp packet and no place is holding sock lock, it
    will take long time if the sock is busy with sending packets.
    
    Note that it doesn't process transport->mtu_info in .release_cb(),
    as there is no enough information for pmtu update, like for which
    asoc or transport. It is not worth traversing all asocs to check
    pmtu_pending. So unlike tcp, sctp does this in tx path, for which
    mtu_info needs to be atomic_t.
    
    Signed-off-by: Xin Long <lucien.xin@gmail.com>
    Acked-by: Marcelo Ricardo Leitner <marcelo.leitner@gmail.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    lxin authored and davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    d805397 View commit details
    Browse the repository at this point in the history
  19. rxrpc: Fix a missing rxrpc_put_peer() in the error_report handler

    Fix a missing call to rxrpc_put_peer() on the main path through the
    rxrpc_error_report() function.  This manifests itself as a ref leak
    whenever an ICMP packet or other error comes in.
    
    In commit f334430, the hand-off of the ref to a work item was removed
    and was not replaced with a put.
    
    Fixes: f334430 ("rxrpc: Fix error distribution")
    Signed-off-by: David Howells <dhowells@redhat.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    dhowells authored and davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    1890fea View commit details
    Browse the repository at this point in the history
  20. nfp: flower: fix pedit set actions for multiple partial masks

    Previously we did not correctly change headers when using multiple
    pedit actions with partial masks. We now take this into account and
    no longer just commit the last pedit action.
    
    Fixes: c0b1bd9 ("nfp: add set ipv4 header action flower offload")
    Signed-off-by: Pieter Jansen van Vuuren <pieter.jansenvanvuuren@netronome.com>
    Reviewed-by: Jakub Kicinski <jakub.kicinski@netronome.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    pjvuuren authored and davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    8913806 View commit details
    Browse the repository at this point in the history
  21. nfp: flower: fix multiple keys per pedit action

    Previously we only allowed a single header key per pedit action to
    change the header. This used to result in the last header key in the
    pedit action to overwrite previous headers. We now keep track of them
    and allow multiple header keys per pedit action.
    
    Fixes: c0b1bd9 ("nfp: add set ipv4 header action flower offload")
    Fixes: 354b82b ("nfp: add set ipv6 source and destination address")
    Fixes: f8b7b0a ("nfp: add set tcp and udp header action flower offload")
    Signed-off-by: Pieter Jansen van Vuuren <pieter.jansenvanvuuren@netronome.com>
    Reviewed-by: Jakub Kicinski <jakub.kicinski@netronome.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    pjvuuren authored and davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    d08c9e5 View commit details
    Browse the repository at this point in the history
  22. nfp: flower: use offsets provided by pedit instead of index for ipv6

    Previously when populating the set ipv6 address action, we incorrectly
    made use of pedit's key index to determine which 32bit word should be
    set. We now calculate which word has been selected based on the offset
    provided by the pedit action.
    
    Fixes: 354b82b ("nfp: add set ipv6 source and destination address")
    Signed-off-by: Pieter Jansen van Vuuren <pieter.jansenvanvuuren@netronome.com>
    Reviewed-by: Jakub Kicinski <jakub.kicinski@netronome.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    pjvuuren authored and davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    140b6ab View commit details
    Browse the repository at this point in the history
  23. Merge branch 'nfp-fix-pedit-set-action-offloads'

    Jakub Kicinski says:
    
    ====================
    nfp: fix pedit set action offloads
    
    Pieter says:
    
    This set fixes set actions when using multiple pedit actions with
    partial masks and with multiple keys per pedit action. Additionally
    it fixes set ipv6 pedit action offloads when using it in combination
    with other header keys.
    
    The problem would only trigger if one combines multiple pedit actions
    of the same type with partial masks, e.g.:
    
    $ tc filter add dev netdev protocol ip parent ffff: \
        flower indev netdev \
        ip_proto tcp \
        action pedit ex munge \
        ip src set 11.11.11.11 retain 65535 munge \
        ip src set 22.22.22.22 retain 4294901760 pipe \
        csum ip and tcp pipe \
        mirred egress redirect dev netdev
    ====================
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    bd8be2c View commit details
    Browse the repository at this point in the history
  24. sched/fair: Fix the min_vruntime update logic in dequeue_entity()

    The comment and the code around the update_min_vruntime() call in
    dequeue_entity() are not in agreement.
    
    From commit:
    
      b60205c ("sched/fair: Fix min_vruntime tracking")
    
    I think that we want to update min_vruntime when a task is sleeping/migrating.
    So, the check is inverted there - fix it.
    
    Signed-off-by: Song Muchun <smuchun@gmail.com>
    Cc: Linus Torvalds <torvalds@linux-foundation.org>
    Cc: Mike Galbraith <efault@gmx.de>
    Cc: Peter Zijlstra <peterz@infradead.org>
    Cc: Thomas Gleixner <tglx@linutronix.de>
    Fixes: b60205c ("sched/fair: Fix min_vruntime tracking")
    Link: http://lkml.kernel.org/r/20181014112612.2614-1-smuchun@gmail.com
    Signed-off-by: Ingo Molnar <mingo@kernel.org>
    Song Muchun authored and Ingo Molnar committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    9845c49 View commit details
    Browse the repository at this point in the history
  25. parisc: Fix uninitialized variable usage in unwind.c

    As noticed by Dave Anglin, the last commit introduced a small bug where
    the potentially uninitialized r struct is used instead of the regs
    pointer as input for unwind_frame_init(). Fix it.
    
    Signed-off-by: Helge Deller <deller@gmx.de>
    Reported-by: John David Anglin <dave.anglin@bell.net>
    hdeller committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    cf8afe5 View commit details
    Browse the repository at this point in the history
  26. USB: fix the usbfs flag sanitization for control transfers

    Commit 7a68d9f ("USB: usbdevfs: sanitize flags more") checks the
    transfer flags for URBs submitted from userspace via usbfs.  However,
    the check for whether the USBDEVFS_URB_SHORT_NOT_OK flag should be
    allowed for a control transfer was added in the wrong place, before
    the code has properly determined the direction of the control
    transfer.  (Control transfers are special because for them, the
    direction is set by the bRequestType byte of the Setup packet rather
    than direction bit of the endpoint address.)
    
    This patch moves code which sets up the allow_short flag for control
    transfers down after is_in has been set to the correct value.
    
    Signed-off-by: Alan Stern <stern@rowland.harvard.edu>
    Reported-and-tested-by: syzbot+24a30223a4b609bb802e@syzkaller.appspotmail.com
    Fixes: 7a68d9f ("USB: usbdevfs: sanitize flags more")
    CC: Oliver Neukum <oneukum@suse.com>
    CC: <stable@vger.kernel.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    AlanStern authored and gregkh committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    665c365 View commit details
    Browse the repository at this point in the history
  27. perf evsel: Store ids for events with their own cpus perf_event__synt…

    …hesize_event_update_cpus
    
    John reported crash when recording on an event under PMU with cpumask defined:
    
      root@localhost:~# ./perf_debug_ record -e armv8_pmuv3_0/br_mis_pred/ sleep 1
      perf: Segmentation fault
      Obtained 9 stack frames.
      ./perf_debug_() [0x4c5ef8]
      [0xffff82ba267c]
      ./perf_debug_() [0x4bc5a8]
      ./perf_debug_() [0x419550]
      ./perf_debug_() [0x41a928]
      ./perf_debug_() [0x472f58]
      ./perf_debug_() [0x473210]
      ./perf_debug_() [0x4070f4]
      /lib/aarch64-linux-gnu/libc.so.6(__libc_start_main+0xe0) [0xffff8294c8a0]
      Segmentation fault (core dumped)
    
    We synthesize an update event that needs to touch the evsel id array, which is
    not defined at that time. Fixing this by forcing the id allocation for events
    with their own cpus.
    
    Reported-by: John Garry <john.garry@huawei.com>
    Signed-off-by: Jiri Olsa <jolsa@kernel.org>
    Tested-by: John Garry <john.garry@huawei.com>
    Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
    Cc: Andi Kleen <ak@linux.intel.com>
    Cc: Mark Rutland <mark.rutland@arm.com>
    Cc: Namhyung Kim <namhyung@kernel.org>
    Cc: Peter Zijlstra <peterz@infradead.org>
    Cc: Will Deacon <will.deacon@arm.com>
    Cc: linux-arm-kernel@lists.infradead.org
    Cc: linuxarm@huawei.com
    Fixes: bfd8f72 ("perf record: Synthesize unit/scale/... in event update")
    Link: http://lkml.kernel.org/r/20181003212052.GA32371@krava
    Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
    Jiri Olsa authored and acmel committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    4ab8455 View commit details
    Browse the repository at this point in the history
  28. drm/edid: VSDB yCBCr420 Deep Color mode bit definitions

    HDMI Forum VSDB YCBCR420 deep color capability bits are 2:0. Correct
    definitions in the header for the mask to work correctly.
    
    Fixes: e6a9a2c ("drm/edid: parse ycbcr 420 deep color information")
    Bugzilla: https://bugs.freedesktop.org/show_bug.cgi?id=107893
    Cc: <stable@vger.kernel.org> # v4.14+
    Signed-off-by: Clint Taylor <clinton.a.taylor@intel.com>
    Reviewed-by: Jani Nikula <jani.nikula@intel.com>
    Reviewed-by: Shashank Sharma <shashank.sharma@intel.com>
    Signed-off-by: Jani Nikula <jani.nikula@intel.com>
    Link: https://patchwork.freedesktop.org/patch/msgid/1538776335-12569-1-git-send-email-clinton.a.taylor@intel.com
    cataylox authored and jnikula committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    9068e02 View commit details
    Browse the repository at this point in the history
  29. perf tools: Fix use of alternatives to find JDIR

    When a build is run from something like a cron job, the user's $PATH is
    rather minimal, of note, not including /usr/sbin in my own case. Because
    of that, an automated rpm package build ultimately fails to find
    libperf-jvmti.so, because somewhere within the build, this happens...
    
      /bin/sh: alternatives: command not found
      /bin/sh: alternatives: command not found
      Makefile.config:849: No openjdk development package found, please install
      JDK package, e.g. openjdk-8-jdk, java-1.8.0-openjdk-devel
    
    ...and while the build continues, libperf-jvmti.so isn't built, and
    things fall down when rpm tries to find all the %files specified. Exact
    same system builds everything just fine when the job is launched from a
    login shell instead of a cron job, since alternatives is in $PATH, so
    openjdk is actually found.
    
    The test required to get into this section of code actually specifies
    the full path, as does a block just above it, so let's do that here too.
    
    Signed-off-by: Jarod Wilson <jarod@redhat.com>
    Acked-by: Jiri Olsa <jolsa@redhat.com>
    Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
    Cc: Namhyung Kim <namhyung@kernel.org>
    Cc: Peter Zijlstra <peterz@infradead.org>
    Cc: Stephane Eranian <eranian@google.com>
    Cc: William Cohen <wcohen@redhat.com>
    Fixes: d4dfdf0 ("perf jvmti: Plug compilation into perf build")
    Link: http://lkml.kernel.org/r/20180906221812.11167-1-jarod@redhat.com
    Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
    jarodwilson authored and acmel committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    36b8d46 View commit details
    Browse the repository at this point in the history
  30. perf tools: Fix tracing_path_mount proper path

    If there's no tracefs (RHEL7) support the tracing_path_mount
    returns debugfs path which results in following fail:
    
      # perf probe sys_write
      kprobe_events file does not exist - please rebuild kernel with CONFIG_KPROBE_EVENTS.
      Error: Failed to add events.
    
    In tracing_path_debugfs_mount function we need to return the
    'tracing' path instead of just the mount to make it work:
    
      # perf probe sys_write
      Added new event:
        probe:sys_write      (on sys_write)
    
      You can now use it in all perf tools, such as:
    
              perf record -e probe:sys_write -aR sleep 1
    
    Adding the 'return tracing_path;' also to tracing_path_tracefs_mount
    function just for consistency with tracing_path_debugfs_mount.
    
    Upstream keeps working, because it has the tracefs support.
    
    Link: http://lkml.kernel.org/n/tip-yiwkzexq9fk1ey1xg3gnjlw4@git.kernel.org
    Signed-off-by: Jiri Olsa <jolsa@kernel.org>
    Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
    Cc: Michael Petlan <mpetlan@redhat.com>
    Cc: Namhyung Kim <namhyung@kernel.org>
    Cc: Peter Zijlstra <peterz@infradead.org>
    Cc: Steven Rostedt <rostedt@goodmis.org>
    Fixes: 23773ca ("perf tools: Make perf aware of tracefs")
    Link: http://lkml.kernel.org/r/20181016114818.3595-1-jolsa@kernel.org
    Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
    olsajiri authored and acmel committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    c458a62 View commit details
    Browse the repository at this point in the history
  31. perf cpu_map: Align cpu map synthesized events properly.

    The size of the resulting cpu map can be smaller than a multiple of
    sizeof(u64), resulting in SIGBUS on cpus like Sparc as the next event
    will not be aligned properly.
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Cc: Jiri Olsa <jolsa@kernel.org>
    Cc: Kan Liang <kan.liang@intel.com>
    Fixes: 6c87290 ("perf cpu_map: Add cpu_map event synthesize function")
    Link: http://lkml.kernel.org/r/20181011.224655.716771175766946817.davem@davemloft.net
    Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
    davem330 authored and acmel committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    0ed149c View commit details
    Browse the repository at this point in the history
  32. IB/ucm: Fix Spectre v1 vulnerability

    hdr.cmd can be indirectly controlled by user-space, hence leading to
    a potential exploitation of the Spectre variant 1 vulnerability.
    
    This issue was detected with the help of Smatch:
    
    drivers/infiniband/core/ucm.c:1127 ib_ucm_write() warn: potential
    spectre issue 'ucm_cmd_table' [r] (local cap)
    
    Fix this by sanitizing hdr.cmd before using it to index
    ucm_cmd_table.
    
    Notice that given that speculation windows are large, the policy is
    to kill the speculation on the first load and not worry if it can be
    completed with a dependent load/store [1].
    
    [1] https://marc.info/?l=linux-kernel&m=152449131114778&w=2
    
    Cc: stable@vger.kernel.org
    Signed-off-by: Gustavo A. R. Silva <gustavo@embeddedor.com>
    Signed-off-by: Doug Ledford <dledford@redhat.com>
    GustavoARSilva authored and dledford committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    0295e39 View commit details
    Browse the repository at this point in the history
  33. RDMA/ucma: Fix Spectre v1 vulnerability

    hdr.cmd can be indirectly controlled by user-space, hence leading to
    a potential exploitation of the Spectre variant 1 vulnerability.
    
    This issue was detected with the help of Smatch:
    
    drivers/infiniband/core/ucma.c:1686 ucma_write() warn: potential
    spectre issue 'ucma_cmd_table' [r] (local cap)
    
    Fix this by sanitizing hdr.cmd before using it to index
    ucm_cmd_table.
    
    Notice that given that speculation windows are large, the policy is
    to kill the speculation on the first load and not worry if it can be
    completed with a dependent load/store [1].
    
    [1] https://marc.info/?l=linux-kernel&m=152449131114778&w=2
    
    Cc: stable@vger.kernel.org
    Signed-off-by: Gustavo A. R. Silva <gustavo@embeddedor.com>
    Signed-off-by: Doug Ledford <dledford@redhat.com>
    GustavoARSilva authored and dledford committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    a3671a4 View commit details
    Browse the repository at this point in the history
  34. Merge tag 'selinux-pr-20181015' of git://git.kernel.org/pub/scm/linux…

    …/kernel/git/pcmoore/selinux
    
    Paul writes:
      "SELinux fixes for v4.19
    
       We've got one SELinux "fix" that I'd like to get into v4.19 if
       possible.  I'm using double quotes on "fix" as this is just an update
       to the MAINTAINERS file and not a code change.  From my perspective,
       MAINTAINERS updates generally don't warrant inclusion during the -rcX
       phase, but this is a change to the mailing list location so it seemed
       prudent to get this in before v4.19 is released"
    
    * tag 'selinux-pr-20181015' of git://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selinux:
      MAINTAINERS: update the SELinux mailing list location
    gregkh committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    a886199 View commit details
    Browse the repository at this point in the history
  35. Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc

    David writes:
      "Sparc fixes
    
       1) Revert the %pOF change, it causes regressions.
    
       2) Wire up io_pgetevents().
    
       3) Fix perf events on single-PCR sparc64 cpus.
    
       4) Do proper perf event throttling like arm and x86."
    
    * git://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc:
      Revert "sparc: Convert to using %pOFn instead of device_node.name"
      sparc64: Set %l4 properly on trap return after handling signals.
      sparc64: Make proc_id signed.
      sparc: Throttle perf events properly.
      sparc: Fix single-pcr perf event counter management.
      sparc: Wire up io_pgetevents system call.
      sunvdc: Remove VLA usage
    gregkh committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    b955a91 View commit details
    Browse the repository at this point in the history
  36. sctp: get pr_assoc and pr_stream all status with SCTP_PR_SCTP_ALL ins…

    …tead
    
    According to rfc7496 section 4.3 or 4.4:
    
       sprstat_policy:  This parameter indicates for which PR-SCTP policy
          the user wants the information.  It is an error to use
          SCTP_PR_SCTP_NONE in sprstat_policy.  If SCTP_PR_SCTP_ALL is used,
          the counters provided are aggregated over all supported policies.
    
    We change to dump pr_assoc and pr_stream all status by SCTP_PR_SCTP_ALL
    instead, and return error for SCTP_PR_SCTP_NONE, as it also said "It is
    an error to use SCTP_PR_SCTP_NONE in sprstat_policy. "
    
    Fixes: 826d253 ("sctp: add SCTP_PR_ASSOC_STATUS on sctp sockopt")
    Fixes: d229d48 ("sctp: add SCTP_PR_STREAM_STATUS sockopt for prsctp")
    Reported-by: Ying Xu <yinxu@redhat.com>
    Signed-off-by: Xin Long <lucien.xin@gmail.com>
    Acked-by: Neil Horman <nhorman@tuxdriver.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    lxin authored and davem330 committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    0ac1077 View commit details
    Browse the repository at this point in the history
  37. perf report: Don't crash on invalid inline debug information

    When the function name for an inline frame is invalid, we must not try
    to demangle this symbol, otherwise we crash with:
    
      #0  0x0000555555895c01 in bfd_demangle ()
      #1  0x0000555555823262 in demangle_sym (dso=0x555555d92b90, elf_name=0x0, kmodule=0) at util/symbol-elf.c:215
      #2  dso__demangle_sym (dso=dso@entry=0x555555d92b90, kmodule=<optimized out>, kmodule@entry=0, elf_name=elf_name@entry=0x0) at util/symbol-elf.c:400
      #3  0x00005555557fef4b in new_inline_sym (funcname=0x0, base_sym=0x555555d92b90, dso=0x555555d92b90) at util/srcline.c:89
      #4  inline_list__append_dso_a2l (dso=dso@entry=0x555555c7bb00, node=node@entry=0x555555e31810, sym=sym@entry=0x555555d92b90) at util/srcline.c:264
      #5  0x00005555557ff27f in addr2line (dso_name=dso_name@entry=0x555555d92430 "/home/milian/.debug/.build-id/f7/186d14bb94f3c6161c010926da66033d24fce5/elf", addr=addr@entry=2888, file=file@entry=0x0,
          line=line@entry=0x0, dso=dso@entry=0x555555c7bb00, unwind_inlines=unwind_inlines@entry=true, node=0x555555e31810, sym=0x555555d92b90) at util/srcline.c:313
      #6  0x00005555557ffe7c in addr2inlines (sym=0x555555d92b90, dso=0x555555c7bb00, addr=2888, dso_name=0x555555d92430 "/home/milian/.debug/.build-id/f7/186d14bb94f3c6161c010926da66033d24fce5/elf")
          at util/srcline.c:358
    
    So instead handle the case where we get invalid function names for
    inlined frames and use a fallback '??' function name instead.
    
    While this crash was originally reported by Hadrien for rust code, I can
    now also reproduce it with trivial C++ code. Indeed, it seems like
    libbfd fails to interpret the debug information for the inline frame
    symbol name:
    
      $ addr2line -e /home/milian/.debug/.build-id/f7/186d14bb94f3c6161c010926da66033d24fce5/elf -if b48
      main
      /usr/include/c++/8.2.1/complex:610
      ??
      /usr/include/c++/8.2.1/complex:618
      ??
      /usr/include/c++/8.2.1/complex:675
      ??
      /usr/include/c++/8.2.1/complex:685
      main
      /home/milian/projects/kdab/rnd/hotspot/tests/test-clients/cpp-inlining/main.cpp:39
    
    I've reported this bug upstream and also attached a patch there which
    should fix this issue:
    
    https://sourceware.org/bugzilla/show_bug.cgi?id=23715
    
    Reported-by: Hadrien Grasland <grasland@lal.in2p3.fr>
    Signed-off-by: Milian Wolff <milian.wolff@kdab.com>
    Cc: Jin Yao <yao.jin@linux.intel.com>
    Cc: Jiri Olsa <jolsa@kernel.org>
    Cc: Namhyung Kim <namhyung@kernel.org>
    Fixes: a64489c ("perf report: Find the inline stack for a given address")
    [ The above 'Fixes:' cset is where originally the problem was
      introduced, i.e.  using a2l->funcname without checking if it is NULL,
      but this current patch fixes the current codebase, i.e. multiple csets
      were applied after a64489c before the problem was reported by Hadrien ]
    Link: http://lkml.kernel.org/r/20180926135207.30263-3-milian.wolff@kdab.com
    Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
    milianw authored and acmel committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    d4046e8 View commit details
    Browse the repository at this point in the history
  38. perf tools: Pass build flags to traceevent build

    So the extra user build flags are propagated to libtraceevent.
    
    Signed-off-by: Jiri Olsa <jolsa@kernel.org>
    Cc: "Herton R. Krzesinski" <herton@redhat.com>
    Cc: Steven Rostedt (VMware) <rostedt@goodmis.org>
    Cc: Tzvetomir Stoyanov (VMware) <tz.stoyanov@gmail.com>
    Cc: Yordan Karadzhov (VMware) <y.karadz@gmail.com>
    Link: http://lkml.kernel.org/r/20181016150614.21260-3-jolsa@kernel.org
    Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
    olsajiri authored and acmel committed Oct 16, 2018
    Configuration menu
    Copy the full SHA
    298faf5 View commit details
    Browse the repository at this point in the history

Commits on Oct 17, 2018

  1. x86/entry/32: Clear the CS high bits

    Even if not on an entry stack, the CS's high bits must be
    initialized because they are unconditionally evaluated in
    PARANOID_EXIT_TO_KERNEL_MODE.
    
    Failing to do so broke the boot on Galileo Gen2 and IOT2000 boards.
    
     [ bp: Make the commit message tone passive and impartial. ]
    
    Fixes: b92a165 ("x86/entry/32: Handle Entry from Kernel-Mode on Entry-Stack")
    Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com>
    Signed-off-by: Borislav Petkov <bp@suse.de>
    Reviewed-by: Joerg Roedel <jroedel@suse.de>
    Acked-by: Joerg Roedel <jroedel@suse.de>
    CC: "H. Peter Anvin" <hpa@zytor.com>
    CC: Andrea Arcangeli <aarcange@redhat.com>
    CC: Andy Lutomirski <luto@kernel.org>
    CC: Boris Ostrovsky <boris.ostrovsky@oracle.com>
    CC: Brian Gerst <brgerst@gmail.com>
    CC: Dave Hansen <dave.hansen@intel.com>
    CC: David Laight <David.Laight@aculab.com>
    CC: Denys Vlasenko <dvlasenk@redhat.com>
    CC: Eduardo Valentin <eduval@amazon.com>
    CC: Greg KH <gregkh@linuxfoundation.org>
    CC: Ingo Molnar <mingo@kernel.org>
    CC: Jiri Kosina <jkosina@suse.cz>
    CC: Josh Poimboeuf <jpoimboe@redhat.com>
    CC: Juergen Gross <jgross@suse.com>
    CC: Linus Torvalds <torvalds@linux-foundation.org>
    CC: Peter Zijlstra <peterz@infradead.org>
    CC: Thomas Gleixner <tglx@linutronix.de>
    CC: Will Deacon <will.deacon@arm.com>
    CC: aliguori@amazon.com
    CC: daniel.gruss@iaik.tugraz.at
    CC: hughd@google.com
    CC: keescook@google.com
    CC: linux-mm <linux-mm@kvack.org>
    CC: x86-ml <x86@kernel.org>
    Link: http://lkml.kernel.org/r/f271c747-1714-5a5b-a71f-ae189a093b8d@siemens.com
    Signed-off-by: Ingo Molnar <mingo@kernel.org>
    jan-kiszka authored and Ingo Molnar committed Oct 17, 2018
    Configuration menu
    Copy the full SHA
    04f4f95 View commit details
    Browse the repository at this point in the history
  2. x86/entry/64: Further improve paranoid_entry comments

    Commit:
    
      16561f2 ("x86/entry: Add some paranoid entry/exit CR3 handling comments")
    
    ... added some comments.  This improves them a bit:
    
     - When I first read the new comments, it was unclear to me whether
       they were referring to the case where paranoid_entry interrupted
       other entry code or where paranoid_entry was itself interrupted.
       Clarify it.
    
     - Remove the EBX comment.  We no longer use EBX as a SWAPGS
       indicator.
    
    Signed-off-by: Andy Lutomirski <luto@kernel.org>
    Acked-by: Thomas Gleixner <tglx@linutronix.de>
    Cc: Borislav Petkov <bp@alien8.de>
    Cc: Dave Hansen <dave.hansen@linux.intel.com>
    Cc: Linus Torvalds <torvalds@linux-foundation.org>
    Cc: Peter Zijlstra <peterz@infradead.org>
    Link: http://lkml.kernel.org/r/c47daa1888dc2298e7e1d3f82bd76b776ea33393.1539542111.git.luto@kernel.org
    Signed-off-by: Ingo Molnar <mingo@kernel.org>
    amluto authored and Ingo Molnar committed Oct 17, 2018
    Configuration menu
    Copy the full SHA
    ae85249 View commit details
    Browse the repository at this point in the history
  3. x86/fpu: Remove second definition of fpu in __fpu__restore_sig()

    Commit:
    
      c5bedc6 ("x86/fpu: Get rid of PF_USED_MATH usage, convert it to fpu->fpstate_active")
    
    introduced the 'fpu' variable at top of __restore_xstate_sig(),
    which now shadows the other definition:
    
      arch/x86/kernel/fpu/signal.c:318:28: warning: symbol 'fpu' shadows an earlier one
      arch/x86/kernel/fpu/signal.c:271:20: originally declared here
    
    Remove the shadowed definition of 'fpu', as the two definitions are the same.
    
    Signed-off-by: Sebastian Andrzej Siewior <bigeasy@linutronix.de>
    Reviewed-by: Andy Lutomirski <luto@kernel.org>
    Cc: Borislav Petkov <bp@alien8.de>
    Cc: Dave Hansen <dave.hansen@linux.intel.com>
    Cc: Linus Torvalds <torvalds@linux-foundation.org>
    Cc: Peter Zijlstra <peterz@infradead.org>
    Cc: Thomas Gleixner <tglx@linutronix.de>
    Fixes: c5bedc6 ("x86/fpu: Get rid of PF_USED_MATH usage, convert it to fpu->fpstate_active")
    Link: http://lkml.kernel.org/r/20181016202525.29437-3-bigeasy@linutronix.de
    Signed-off-by: Ingo Molnar <mingo@kernel.org>
    Sebastian Andrzej Siewior authored and Ingo Molnar committed Oct 17, 2018
    Configuration menu
    Copy the full SHA
    6aa6767 View commit details
    Browse the repository at this point in the history
  4. x86/fpu: Fix i486 + no387 boot crash by only saving FPU registers on …

    …context switch if there is an FPU
    
    Booting an i486 with "no387 nofxsr" ends with with the following crash:
    
       math_emulate: 0060:c101987d
       Kernel panic - not syncing: Math emulation needed in kernel
    
    on the first context switch in user land.
    
    The reason is that copy_fpregs_to_fpstate() tries FNSAVE which does not work
    as the FPU is turned off.
    
    This bug was introduced in:
    
      f1c8cd0 ("x86/fpu: Change fpu->fpregs_active users to fpu->fpstate_active")
    
    Add a check for X86_FEATURE_FPU before trying to save FPU registers (we
    have such a check in switch_fpu_finish() already).
    
    Signed-off-by: Sebastian Andrzej Siewior <bigeasy@linutronix.de>
    Reviewed-by: Andy Lutomirski <luto@kernel.org>
    Cc: Borislav Petkov <bp@alien8.de>
    Cc: Dave Hansen <dave.hansen@linux.intel.com>
    Cc: Linus Torvalds <torvalds@linux-foundation.org>
    Cc: Peter Zijlstra <peterz@infradead.org>
    Cc: Thomas Gleixner <tglx@linutronix.de>
    Cc: stable@vger.kernel.org
    Fixes: f1c8cd0 ("x86/fpu: Change fpu->fpregs_active users to fpu->fpstate_active")
    Link: http://lkml.kernel.org/r/20181016202525.29437-4-bigeasy@linutronix.de
    Signed-off-by: Ingo Molnar <mingo@kernel.org>
    Sebastian Andrzej Siewior authored and Ingo Molnar committed Oct 17, 2018
    Configuration menu
    Copy the full SHA
    2224d61 View commit details
    Browse the repository at this point in the history
  5. Merge tag 'clk-fixes-for-linus' of git://git.kernel.org/pub/scm/linux…

    …/kernel/git/clk/linux
    
    Stephen writes:
      "clk fixes for v4.19-rc8
    
       One fix for the Allwinner A10 SoC's audio PLL that wasn't properly
       set and generating noise."
    
    * tag 'clk-fixes-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/clk/linux:
      clk: sunxi-ng: sun4i: Set VCO and PLL bias current to lowest setting
    gregkh committed Oct 17, 2018
    Configuration menu
    Copy the full SHA
    c0cff31 View commit details
    Browse the repository at this point in the history
  6. Merge branch 'parisc-4.19-3' of git://git.kernel.org/pub/scm/linux/ke…

    …rnel/git/deller/parisc-linux
    
    Helge writes:
       "parisc fix:
    
        Fix an unitialized variable usage in the parisc unwind code."
    
    * 'parisc-4.19-3' of git://git.kernel.org/pub/scm/linux/kernel/git/deller/parisc-linux:
      parisc: Fix uninitialized variable usage in unwind.c
    gregkh committed Oct 17, 2018
    Configuration menu
    Copy the full SHA
    c343db4 View commit details
    Browse the repository at this point in the history
  7. Merge branch 'nvme-4.19' of git://git.infradead.org/nvme into for-linus

    Pull single NVMe fix from Christoph.
    
    * 'nvme-4.19' of git://git.infradead.org/nvme:
      nvme: remove ns sibling before clearing path
    axboe committed Oct 17, 2018
    Configuration menu
    Copy the full SHA
    7a7080b View commit details
    Browse the repository at this point in the history
  8. perf tools: Stop fallbacking to kallsyms for vdso symbols lookup

    David reports that:
    
    <quote>
    Perf has this hack where it uses the kernel symbol map as a backup when
    a symbol can't be found in the user's symbol table(s).
    
    This causes problems because the tests driving this code path use
    machine__kernel_ip(), and that is completely meaningless on Sparc.  On
    sparc64 the kernel and user live in physically separate virtual address
    spaces, rather than a shared one.  And the kernel lives at a virtual
    address that overlaps common userspace addresses.  So this test passes
    almost all the time when a user symbol lookup fails.
    
    The consequence of this is that, if the unfound user virtual address in
    the sample doesn't match up to a kernel symbol either, we trigger things
    like this code in builtin-top.c:
    
    	if (al.sym == NULL && al.map != NULL) {
    		const char *msg = "Kernel samples will not be resolved.\n";
    		/*
    		 * As we do lazy loading of symtabs we only will know if the
    		 * specified vmlinux file is invalid when we actually have a
    		 * hit in kernel space and then try to load it. So if we get
    		 * here and there are _no_ symbols in the DSO backing the
    		 * kernel map, bail out.
    		 *
    		 * We may never get here, for instance, if we use -K/
    		 * --hide-kernel-symbols, even if the user specifies an
    		 * invalid --vmlinux ;-)
    		 */
    		if (!machine->kptr_restrict_warned && !top->vmlinux_warned &&
    		    __map__is_kernel(al.map) && map__has_symbols(al.map)) {
    			if (symbol_conf.vmlinux_name) {
    				char serr[256];
    				dso__strerror_load(al.map->dso, serr, sizeof(serr));
    				ui__warning("The %s file can't be used: %s\n%s",
    					    symbol_conf.vmlinux_name, serr, msg);
    			} else {
    				ui__warning("A vmlinux file was not found.\n%s",
    					    msg);
    			}
    
    			if (use_browser <= 0)
    				sleep(5);
    			top->vmlinux_warned = true;
    		}
    	}
    
    When I fire up a compilation on sparc, this triggers immediately.
    
    I'm trying to figure out what the "backup to kernel map" code is
    accomplishing.
    
    I see some language in the current code and in the changes that have
    happened in this area talking about vdso.  Does that really happen?
    
    The vdso is mapped into userspace virtual addresses, not kernel ones.
    
    More history.  This didn't cause problems on sparc some time ago,
    because the kernel IP check used to be "ip < 0" :-) Sparc kernel
    addresses are not negative.  But now with machine__kernel_ip(), which
    works using the symbol table determined kernel address range, it does
    trigger.
    
    What it all boils down to is that on architectures like sparc,
    machine__kernel_ip() should always return false in this scenerio, and
    therefore this kind of logic:
    
    		if (cpumode == PERF_RECORD_MISC_USER && machine &&
    		    mg != &machine->kmaps &&
    		    machine__kernel_ip(machine, al->addr)) {
    
    is basically invalid.  PERF_RECORD_MISC_USER implies no kernel address
    can possibly match for the sample/event in question (no matter how
    hard you try!) :-)
    </>
    
    So, I thought something had changed and in the past we would somehow
    find that address in the kallsyms, but I couldn't find anything to back
    that up, the patch introducing this is over a decade old, lots of things
    changed, so I was just thinking I was missing something.
    
    I tried a gtod busy loop to generate vdso activity and added a 'perf
    probe' at that branch, on x86_64 to see if it ever gets hit:
    
    Made thread__find_map() noinline, as 'perf probe' in lines of inline
    functions seems to not be working, only at function start. (Masami?)
    
      # perf probe -x ~/bin/perf -L thread__find_map:57
      <thread__find_map@/home/acme/git/perf/tools/perf/util/event.c:57>
         57                 if (cpumode == PERF_RECORD_MISC_USER && machine &&
         58                     mg != &machine->kmaps &&
         59                     machine__kernel_ip(machine, al->addr)) {
         60                         mg = &machine->kmaps;
         61                         load_map = true;
         62                         goto try_again;
                            }
                    } else {
                            /*
                             * Kernel maps might be changed when loading
                             * symbols so loading
                             * must be done prior to using kernel maps.
                             */
         69                 if (load_map)
         70                         map__load(al->map);
         71                 al->addr = al->map->map_ip(al->map, al->addr);
    
      # perf probe -x ~/bin/perf thread__find_map:60
      Added new event:
        probe_perf:thread__find_map (on thread__find_map:60 in /home/acme/bin/perf)
    
      You can now use it in all perf tools, such as:
    
    	perf record -e probe_perf:thread__find_map -aR sleep 1
    
      #
    
      Then used this to see if, system wide, those probe points were being hit:
    
      # perf trace -e *perf:thread*/max-stack=8/
      ^C[root@jouet ~]#
    
      No hits when running 'perf top' and:
    
      # cat gtod.c
      #include <sys/time.h>
    
      int main(void)
      {
    	struct timeval tv;
    
    	while (1)
    		gettimeofday(&tv, 0);
    
    	return 0;
      }
      [root@jouet c]# ./gtod
      ^C
    
      Pressed 'P' in 'perf top' and the [vdso] samples are there:
    
      62.84%  [vdso]                    [.] __vdso_gettimeofday
       8.13%  gtod                      [.] main
       7.51%  [vdso]                    [.] 0x0000000000000914
       5.78%  [vdso]                    [.] 0x0000000000000917
       5.43%  gtod                      [.] _init
       2.71%  [vdso]                    [.] 0x000000000000092d
       0.35%  [kernel]                  [k] native_io_delay
       0.33%  libc-2.26.so              [.] __memmove_avx_unaligned_erms
       0.20%  [vdso]                    [.] 0x000000000000091d
       0.17%  [i2c_i801]                [k] i801_access
       0.06%  firefox                   [.] free
       0.06%  libglib-2.0.so.0.5400.3   [.] g_source_iter_next
       0.05%  [vdso]                    [.] 0x0000000000000919
       0.05%  libpthread-2.26.so        [.] __pthread_mutex_lock
       0.05%  libpixman-1.so.0.34.0     [.] 0x000000000006d3a7
       0.04%  [kernel]                  [k] entry_SYSCALL_64_trampoline
       0.04%  libxul.so                 [.] style::dom_apis::query_selector_slow
       0.04%  [kernel]                  [k] module_get_kallsym
       0.04%  firefox                   [.] malloc
       0.04%  [vdso]                    [.] 0x0000000000000910
    
      I added a 'perf probe' to thread__find_map:69, and that surely got tons
      of hits, i.e. for every map found, just to make sure the 'perf probe'
      command was really working.
    
      In the process I noticed a bug, we're only have records for '[vdso]' for
      pre-existing commands, i.e. ones that are running when we start 'perf top',
      when we will generate the PERF_RECORD_MMAP by looking at /perf/PID/maps.
    
      I.e. like this, for preexisting processes with a vdso map, again,
      tracing for all the system, only pre-existing processes get a [vdso] map
      (when having one):
    
      [root@jouet ~]# perf probe -x ~/bin/perf __machine__addnew_vdso
      Added new event:
      probe_perf:__machine__addnew_vdso (on __machine__addnew_vdso in /home/acme/bin/perf)
    
      You can now use it in all perf tools, such as:
    
    	perf record -e probe_perf:__machine__addnew_vdso -aR sleep 1
    
      [root@jouet ~]# perf trace -e probe_perf:__machine__addnew_vdso/max-stack=8/
         0.000 probe_perf:__machine__addnew_vdso:(568eb3)
                                           __machine__addnew_vdso (/home/acme/bin/perf)
                                           map__new (/home/acme/bin/perf)
                                           machine__process_mmap2_event (/home/acme/bin/perf)
                                           machine__process_event (/home/acme/bin/perf)
                                           perf_event__process (/home/acme/bin/perf)
                                           perf_tool__process_synth_event (/home/acme/bin/perf)
                                           perf_event__synthesize_mmap_events (/home/acme/bin/perf)
                                           __event__synthesize_thread (/home/acme/bin/perf)
    
    The kernel is generating a PERF_RECORD_MMAP for vDSOs, but somehow
    'perf top' is not getting those records while 'perf record' is:
    
      # perf record ~acme/c/gtod
      ^C[ perf record: Woken up 1 times to write data ]
      [ perf record: Captured and wrote 0.076 MB perf.data (1499 samples) ]
    
      # perf report -D | grep PERF_RECORD_MMAP2
      71293612401913 0x11b48 [0x70]: PERF_RECORD_MMAP2 25484/25484: [0x400000(0x1000) @ 0 fd:02 1137 541179306]: r-xp /home/acme/c/gtod
      71293612419012 0x11be0 [0x70]: PERF_RECORD_MMAP2 25484/25484: [0x7fa4a2783000(0x227000) @ 0 fd:00 3146370 854107250]: r-xp /usr/lib64/ld-2.26.so
      71293612432110 0x11c50 [0x60]: PERF_RECORD_MMAP2 25484/25484: [0x7ffcdb53a000(0x2000) @ 0 00:00 0 0]: r-xp [vdso]
      71293612509944 0x11cb0 [0x70]: PERF_RECORD_MMAP2 25484/25484: [0x7fa4a23cd000(0x3b6000) @ 0 fd:00 3149723 262067164]: r-xp /usr/lib64/libc-2.26.so
      #
      # perf script | grep vdso | head
          gtod 25484 71293.612768: 2485554 cycles:ppp:  7ffcdb53a914 [unknown] ([vdso])
          gtod 25484 71293.613576: 2149343 cycles:ppp:  7ffcdb53a917 [unknown] ([vdso])
          gtod 25484 71293.614274: 1814652 cycles:ppp:  7ffcdb53aca8 __vdso_gettimeofday+0x98 ([vdso])
          gtod 25484 71293.614862: 1669070 cycles:ppp:  7ffcdb53acc5 __vdso_gettimeofday+0xb5 ([vdso])
          gtod 25484 71293.615404: 1451589 cycles:ppp:  7ffcdb53acc5 __vdso_gettimeofday+0xb5 ([vdso])
          gtod 25484 71293.615999: 1269941 cycles:ppp:  7ffcdb53ace6 __vdso_gettimeofday+0xd6 ([vdso])
          gtod 25484 71293.616405: 1177946 cycles:ppp:  7ffcdb53a914 [unknown] ([vdso])
          gtod 25484 71293.616775: 1121290 cycles:ppp:  7ffcdb53ac47 __vdso_gettimeofday+0x37 ([vdso])
          gtod 25484 71293.617150: 1037721 cycles:ppp:  7ffcdb53ace6 __vdso_gettimeofday+0xd6 ([vdso])
          gtod 25484 71293.617478:  994526 cycles:ppp:  7ffcdb53ace6 __vdso_gettimeofday+0xd6 ([vdso])
      #
    
    The patch is the obvious one and with it we also continue to resolve
    vdso symbols for pre-existing processes in 'perf top' and for all
    processes in 'perf record' + 'perf report/script'.
    
    Suggested-by: David Miller <davem@davemloft.net>
    Acked-by: David Miller <davem@davemloft.net>
    Cc: Adrian Hunter <adrian.hunter@intel.com>
    Cc: David Ahern <dsahern@gmail.com>
    Cc: Jiri Olsa <jolsa@kernel.org>
    Cc: Namhyung Kim <namhyung@kernel.org>
    Cc: Wang Nan <wangnan0@huawei.com>
    Link: https://lkml.kernel.org/n/tip-cs7skq9pp0kjypiju6o7trse@git.kernel.org
    Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
    acmel committed Oct 17, 2018
    Configuration menu
    Copy the full SHA
    edeb0c9 View commit details
    Browse the repository at this point in the history
  9. usb: gadget: storage: Fix Spectre v1 vulnerability

    num can be indirectly controlled by user-space, hence leading to
    a potential exploitation of the Spectre variant 1 vulnerability.
    
    This issue was detected with the help of Smatch:
    
    drivers/usb/gadget/function/f_mass_storage.c:3177 fsg_lun_make() warn:
    potential spectre issue 'fsg_opts->common->luns' [r] (local cap)
    
    Fix this by sanitizing num before using it to index
    fsg_opts->common->luns
    
    Notice that given that speculation windows are large, the policy is
    to kill the speculation on the first load and not worry if it can be
    completed with a dependent load/store [1].
    
    [1] https://marc.info/?l=linux-kernel&m=152449131114778&w=2
    
    Cc: stable@vger.kernel.org
    Signed-off-by: Gustavo A. R. Silva <gustavo@embeddedor.com>
    Acked-by: Felipe Balbi <felipe.balbi@intel.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    GustavoARSilva authored and gregkh committed Oct 17, 2018
    Configuration menu
    Copy the full SHA
    9ae24af View commit details
    Browse the repository at this point in the history
  10. tracepoint: Fix tracepoint array element size mismatch

    commit 46e0c9b ("kernel: tracepoints: add support for relative
    references") changes the layout of the __tracepoint_ptrs section on
    architectures supporting relative references. However, it does so
    without turning struct tracepoint * const into const int elsewhere in
    the tracepoint code, which has the following side-effect:
    
    Setting mod->num_tracepoints is done in by module.c:
    
        mod->tracepoints_ptrs = section_objs(info, "__tracepoints_ptrs",
                                             sizeof(*mod->tracepoints_ptrs),
                                             &mod->num_tracepoints);
    
    Basically, since sizeof(*mod->tracepoints_ptrs) is a pointer size
    (rather than sizeof(int)), num_tracepoints is erroneously set to half the
    size it should be on 64-bit arch. So a module with an odd number of
    tracepoints misses the last tracepoint due to effect of integer
    division.
    
    So in the module going notifier:
    
            for_each_tracepoint_range(mod->tracepoints_ptrs,
                    mod->tracepoints_ptrs + mod->num_tracepoints,
                    tp_module_going_check_quiescent, NULL);
    
    the expression (mod->tracepoints_ptrs + mod->num_tracepoints) actually
    evaluates to something within the bounds of the array, but miss the
    last tracepoint if the number of tracepoints is odd on 64-bit arch.
    
    Fix this by introducing a new typedef: tracepoint_ptr_t, which
    is either "const int" on architectures that have PREL32 relocations,
    or "struct tracepoint * const" on architectures that does not have
    this feature.
    
    Also provide a new tracepoint_ptr_defer() static inline to
    encapsulate deferencing this type rather than duplicate code and
    ugly idefs within the for_each_tracepoint_range() implementation.
    
    This issue appears in 4.19-rc kernels, and should ideally be fixed
    before the end of the rc cycle.
    
    Acked-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
    Acked-by: Jessica Yu <jeyu@kernel.org>
    Link: http://lkml.kernel.org/r/20181013191050.22389-1-mathieu.desnoyers@efficios.com
    Link: http://lkml.kernel.org/r/20180704083651.24360-7-ard.biesheuvel@linaro.org
    Cc: Michael Ellerman <mpe@ellerman.id.au>
    Cc: Ingo Molnar <mingo@kernel.org>
    Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
    Cc: Arnd Bergmann <arnd@arndb.de>
    Cc: Benjamin Herrenschmidt <benh@kernel.crashing.org>
    Cc: Bjorn Helgaas <bhelgaas@google.com>
    Cc: Catalin Marinas <catalin.marinas@arm.com>
    Cc: James Morris <james.morris@microsoft.com>
    Cc: James Morris <jmorris@namei.org>
    Cc: Josh Poimboeuf <jpoimboe@redhat.com>
    Cc: Kees Cook <keescook@chromium.org>
    Cc: Nicolas Pitre <nico@linaro.org>
    Cc: Paul Mackerras <paulus@samba.org>
    Cc: Petr Mladek <pmladek@suse.com>
    Cc: Russell King <linux@armlinux.org.uk>
    Cc: "Serge E. Hallyn" <serge@hallyn.com>
    Cc: Sergey Senozhatsky <sergey.senozhatsky@gmail.com>
    Cc: Thomas Garnier <thgarnie@google.com>
    Cc: Thomas Gleixner <tglx@linutronix.de>
    Cc: Will Deacon <will.deacon@arm.com>
    Cc: Andrew Morton <akpm@linux-foundation.org>
    Cc: Linus Torvalds <torvalds@linux-foundation.org>
    Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
    Signed-off-by: Steven Rostedt (VMware) <rostedt@goodmis.org>
    compudj authored and rostedt committed Oct 17, 2018
    Configuration menu
    Copy the full SHA
    9c0be3f View commit details
    Browse the repository at this point in the history
  11. tracing: Use trace_clock_local() for looping in preemptirq_delay_test.c

    The preemptirq_delay_test module is used for the ftrace selftest code that
    tests the latency tracers. The problem is that it uses ktime for the delay
    loop, and then checks the tracer to see if the delay loop is caught, but the
    tracer uses trace_clock_local() which uses various different other clocks to
    measure the latency. As ktime uses the clock cycles, and the code then
    converts that to nanoseconds, it causes rounding errors, and the preemptirq
    latency tests are failing due to being off by 1 (it expects to see a delay
    of 500000 us, but the delay is only 499999 us). This is happening due to a
    rounding error in the ktime (which is totally legit). The purpose of the
    test is to see if it can catch the delay, not to test the accuracy between
    trace_clock_local() and ktime_get(). Best to use apples to apples, and have
    the delay loop use the same clock as the latency tracer does.
    
    Cc: stable@vger.kernel.org
    Fixes: f96e857 ("lib: Add module for testing preemptoff/irqsoff latency tracers")
    Acked-by: Joel Fernandes (Google) <joel@joelfernandes.org>
    Signed-off-by: Steven Rostedt (VMware) <rostedt@goodmis.org>
    rostedt committed Oct 17, 2018
    Configuration menu
    Copy the full SHA
    12ad0cb View commit details
    Browse the repository at this point in the history

Commits on Oct 18, 2018

  1. sparc: Fix syscall fallback bugs in VDSO.

    First, the trap number for 32-bit syscalls is 0x10.
    
    Also, only negate the return value when syscall error is indicated by
    the carry bit being set.
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    776ca15 View commit details
    Browse the repository at this point in the history
  2. geneve, vxlan: Don't check skb_dst() twice

    Commit f15ca72 ("net: don't call update_pmtu unconditionally") avoids
    that we try updating PMTU for a non-existent destination, but didn't clean
    up cases where the check was already explicit. Drop those redundant checks.
    
    Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
    Reviewed-by: Sabrina Dubroca <sd@queasysnail.net>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    sbrivio-rh authored and davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    7463e4f View commit details
    Browse the repository at this point in the history
  3. geneve, vxlan: Don't set exceptions if skb->len < mtu

    We shouldn't abuse exceptions: if the destination MTU is already higher
    than what we're transmitting, no exception should be created.
    
    Fixes: 52a589d ("geneve: update skb dst pmtu on tx path")
    Fixes: a93bf0f ("vxlan: update skb dst pmtu on tx path")
    Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
    Reviewed-by: Sabrina Dubroca <sd@queasysnail.net>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    sbrivio-rh authored and davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    6b4f92a View commit details
    Browse the repository at this point in the history
  4. Merge branch 'geneve-vxlan-mtu'

    Stefano Brivio says:
    
    ====================
    geneve, vxlan: Don't set exceptions if skb->len < mtu
    
    This series fixes the exception abuse described in 2/2, and 1/2
    is just a preparatory change to make 2/2 less ugly.
    ====================
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    dc6d0f0 View commit details
    Browse the repository at this point in the history
  5. net: qla3xxx: Remove overflowing shift statement

    Clang currently warns:
    
    drivers/net/ethernet/qlogic/qla3xxx.c:384:24: warning: signed shift
    result (0xF00000000) requires 37 bits to represent, but 'int' only has
    32 bits [-Wshift-overflow]
                        ((ISP_NVRAM_MASK << 16) | qdev->eeprom_cmd_data));
                          ~~~~~~~~~~~~~~ ^  ~~
    1 warning generated.
    
    The warning is certainly accurate since ISP_NVRAM_MASK is defined as
    (0x000F << 16) which is then shifted by 16, resulting in 64424509440,
    well above UINT_MAX.
    
    Given that this is the only location in this driver where ISP_NVRAM_MASK
    is shifted again, it seems likely that ISP_NVRAM_MASK was originally
    defined without a shift and during the move of the shift to the
    definition, this statement wasn't properly removed (since ISP_NVRAM_MASK
    is used in the statenent right above this). Only the maintainers can
    confirm this since this statment has been here since the driver was
    first added to the kernel.
    
    Link: ClangBuiltLinux#127
    Signed-off-by: Nathan Chancellor <natechancellor@gmail.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    nathanchance authored and davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    8c3bf9b View commit details
    Browse the repository at this point in the history
  6. sparc: vDSO: Silence an uninitialized variable warning

    Smatch complains that "val" would be uninitialized if kstrtoul() fails.
    
    Fixes: 9a08862 ("vDSO for sparc")
    Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Dan Carpenter authored and davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    62d6f3b View commit details
    Browse the repository at this point in the history
  7. ptp: fix Spectre v1 vulnerability

    pin_index can be indirectly controlled by user-space, hence leading
    to a potential exploitation of the Spectre variant 1 vulnerability.
    
    This issue was detected with the help of Smatch:
    
    drivers/ptp/ptp_chardev.c:253 ptp_ioctl() warn: potential spectre issue
    'ops->pin_config' [r] (local cap)
    
    Fix this by sanitizing pin_index before using it to index
    ops->pin_config, and before passing it as an argument to
    function ptp_set_pinfunc(), in which it is used to index
    info->pin_config.
    
    Notice that given that speculation windows are large, the policy is
    to kill the speculation on the first load and not worry if it can be
    completed with a dependent load/store [1].
    
    [1] https://marc.info/?l=linux-kernel&m=152449131114778&w=2
    
    Cc: stable@vger.kernel.org
    Signed-off-by: Gustavo A. R. Silva <gustavo@embeddedor.com>
    Acked-by: Richard Cochran <richardcochran@gmail.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    GustavoARSilva authored and davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    efa61c8 View commit details
    Browse the repository at this point in the history
  8. net: bpfilter: use get_pid_task instead of pid_task

    pid_task() dereferences rcu protected tasks array.
    But there is no rcu_read_lock() in shutdown_umh() routine so that
    rcu_read_lock() is needed.
    get_pid_task() is wrapper function of pid_task. it holds rcu_read_lock()
    then calls pid_task(). if task isn't NULL, it increases reference count
    of task.
    
    test commands:
       %modprobe bpfilter
       %modprobe -rv bpfilter
    
    splat looks like:
    [15102.030932] =============================
    [15102.030957] WARNING: suspicious RCU usage
    [15102.030985] 4.19.0-rc7+ #21 Not tainted
    [15102.031010] -----------------------------
    [15102.031038] kernel/pid.c:330 suspicious rcu_dereference_check() usage!
    [15102.031063]
    	       other info that might help us debug this:
    
    [15102.031332]
    	       rcu_scheduler_active = 2, debug_locks = 1
    [15102.031363] 1 lock held by modprobe/1570:
    [15102.031389]  #0: 00000000580ef2b0 (bpfilter_lock){+.+.}, at: stop_umh+0x13/0x52 [bpfilter]
    [15102.031552]
                   stack backtrace:
    [15102.031583] CPU: 1 PID: 1570 Comm: modprobe Not tainted 4.19.0-rc7+ #21
    [15102.031607] Hardware name: To be filled by O.E.M. To be filled by O.E.M./Aptio CRB, BIOS 5.6.5 07/08/2015
    [15102.031628] Call Trace:
    [15102.031676]  dump_stack+0xc9/0x16b
    [15102.031723]  ? show_regs_print_info+0x5/0x5
    [15102.031801]  ? lockdep_rcu_suspicious+0x117/0x160
    [15102.031855]  pid_task+0x134/0x160
    [15102.031900]  ? find_vpid+0xf0/0xf0
    [15102.032017]  shutdown_umh.constprop.1+0x1e/0x53 [bpfilter]
    [15102.032055]  stop_umh+0x46/0x52 [bpfilter]
    [15102.032092]  __x64_sys_delete_module+0x47e/0x570
    [ ... ]
    
    Fixes: d2ba09c ("net: add skeleton of bpfilter kernel module")
    Signed-off-by: Taehee Yoo <ap420073@gmail.com>
    Acked-by: Alexei Starovoitov <ast@kernel.org>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    TaeheeYoo authored and davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    8425843 View commit details
    Browse the repository at this point in the history
  9. r8169: re-enable MSI-X on RTL8168g

    Similar to d49c88d ("r8169: Enable MSI-X on RTL8106e") after
    e9d0ba5 ("PCI: Reprogram bridge prefetch registers on resume")
    we can safely assume that this also fixes the root cause of
    the issue worked around by 7c53a72 ("r8169: don't use MSI-X on
    RTL8168g"). So let's revert it.
    
    Fixes: 7c53a72 ("r8169: don't use MSI-X on RTL8168g")
    Signed-off-by: Heiner Kallweit <hkallweit1@gmail.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    hkallweit authored and davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    9675931 View commit details
    Browse the repository at this point in the history
  10. sctp: fix race on sctp_id2asoc

    syzbot reported an use-after-free involving sctp_id2asoc.  Dmitry Vyukov
    helped to root cause it and it is because of reading the asoc after it
    was freed:
    
            CPU 1                       CPU 2
    (working on socket 1)            (working on socket 2)
    	                         sctp_association_destroy
    sctp_id2asoc
       spin lock
         grab the asoc from idr
       spin unlock
                                       spin lock
    				     remove asoc from idr
    				   spin unlock
    				   free(asoc)
       if asoc->base.sk != sk ... [*]
    
    This can only be hit if trying to fetch asocs from different sockets. As
    we have a single IDR for all asocs, in all SCTP sockets, their id is
    unique on the system. An application can try to send stuff on an id
    that matches on another socket, and the if in [*] will protect from such
    usage. But it didn't consider that as that asoc may belong to another
    socket, it may be freed in parallel (read: under another socket lock).
    
    We fix it by moving the checks in [*] into the protected region. This
    fixes it because the asoc cannot be freed while the lock is held.
    
    Reported-by: syzbot+c7dd55d7aec49d48e49a@syzkaller.appspotmail.com
    Acked-by: Dmitry Vyukov <dvyukov@google.com>
    Signed-off-by: Marcelo Ricardo Leitner <marcelo.leitner@gmail.com>
    Acked-by: Neil Horman <nhorman@tuxdriver.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    marceloleitner authored and davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    b336dec View commit details
    Browse the repository at this point in the history
  11. sctp: not free the new asoc when sctp_wait_for_connect returns err

    When sctp_wait_for_connect is called to wait for connect ready
    for sp->strm_interleave in sctp_sendmsg_to_asoc, a panic could
    be triggered if cpu is scheduled out and the new asoc is freed
    elsewhere, as it will return err and later the asoc gets freed
    again in sctp_sendmsg.
    
    [  285.840764] list_del corruption, ffff9f0f7b284078->next is LIST_POISON1 (dead000000000100)
    [  285.843590] WARNING: CPU: 1 PID: 8861 at lib/list_debug.c:47 __list_del_entry_valid+0x50/0xa0
    [  285.846193] Kernel panic - not syncing: panic_on_warn set ...
    [  285.846193]
    [  285.848206] CPU: 1 PID: 8861 Comm: sctp_ndata Kdump: loaded Not tainted 4.19.0-rc7.label #584
    [  285.850559] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
    [  285.852164] Call Trace:
    ...
    [  285.872210]  ? __list_del_entry_valid+0x50/0xa0
    [  285.872894]  sctp_association_free+0x42/0x2d0 [sctp]
    [  285.873612]  sctp_sendmsg+0x5a4/0x6b0 [sctp]
    [  285.874236]  sock_sendmsg+0x30/0x40
    [  285.874741]  ___sys_sendmsg+0x27a/0x290
    [  285.875304]  ? __switch_to_asm+0x34/0x70
    [  285.875872]  ? __switch_to_asm+0x40/0x70
    [  285.876438]  ? ptep_set_access_flags+0x2a/0x30
    [  285.877083]  ? do_wp_page+0x151/0x540
    [  285.877614]  __sys_sendmsg+0x58/0xa0
    [  285.878138]  do_syscall_64+0x55/0x180
    [  285.878669]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
    
    This is a similar issue with the one fixed in Commit ca3af4d
    ("sctp: do not free asoc when it is already dead in sctp_sendmsg").
    But this one can't be fixed by returning -ESRCH for the dead asoc
    in sctp_wait_for_connect, as it will break sctp_connect's return
    value to users.
    
    This patch is to simply set err to -ESRCH before it returns to
    sctp_sendmsg when any err is returned by sctp_wait_for_connect
    for sp->strm_interleave, so that no asoc would be freed due to
    this.
    
    When users see this error, they will know the packet hasn't been
    sent. And it also makes sense to not free asoc because waiting
    connect fails, like the second call for sctp_wait_for_connect in
    sctp_sendmsg_to_asoc.
    
    Fixes: 668c9be ("sctp: implement assign_number for sctp_stream_interleave")
    Signed-off-by: Xin Long <lucien.xin@gmail.com>
    Acked-by: Marcelo Ricardo Leitner <marcelo.leitner@gmail.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    lxin authored and davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    c863850 View commit details
    Browse the repository at this point in the history
  12. mlxsw: core: Fix use-after-free when flashing firmware during init

    When the switch driver (e.g., mlxsw_spectrum) determines it needs to
    flash a new firmware version it resets the ASIC after the flashing
    process. The bus driver (e.g., mlxsw_pci) then registers itself again
    with mlxsw_core which means (among other things) that the device
    registers itself again with the hwmon subsystem again.
    
    Since the device was registered with the hwmon subsystem using
    devm_hwmon_device_register_with_groups(), then the old hwmon device
    (registered before the flashing) was never unregistered and was
    referencing stale data, resulting in a use-after free.
    
    Fix by removing reliance on device managed APIs in mlxsw_hwmon_init().
    
    Fixes: c86d62c ("mlxsw: spectrum: Reset FW after flash")
    Signed-off-by: Ido Schimmel <idosch@mellanox.com>
    Reported-by: Alexander Petrovskiy <alexpe@mellanox.com>
    Tested-by: Alexander Petrovskiy <alexpe@mellanox.com>
    Reviewed-by: Petr Machata <petrm@mellanox.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    idosch authored and davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    9b3bc7d View commit details
    Browse the repository at this point in the history
  13. udp6: fix encap return code for resubmitting

    The commit eb63f29 ("udp6: add missing checks on edumux packet
    processing") used the same return code convention of the ipv4 counterpart,
    but ipv6 uses the opposite one: positive values means resubmit.
    
    This change addresses the issue, using positive return value for
    resubmitting. Also update the related comment, which was broken, too.
    
    Fixes: eb63f29 ("udp6: add missing checks on edumux packet processing")
    Signed-off-by: Paolo Abeni <pabeni@redhat.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Paolo Abeni authored and davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    84dad55 View commit details
    Browse the repository at this point in the history
  14. Merge tag 'trace-v4.19-rc8' of git://git.kernel.org/pub/scm/linux/ker…

    …nel/git/rostedt/linux-trace
    
    Steven writes:
      "tracing: Two fixes for 4.19
    
       This fixes two bugs:
        - Fix size mismatch of tracepoint array
        - Have preemptirq test module use same clock source of the selftest"
    
    * tag 'trace-v4.19-rc8' of git://git.kernel.org/pub/scm/linux/kernel/git/rostedt/linux-trace:
      tracing: Use trace_clock_local() for looping in preemptirq_delay_test.c
      tracepoint: Fix tracepoint array element size mismatch
    gregkh committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    9bd871d View commit details
    Browse the repository at this point in the history
  15. virtio_net: avoid using netif_tx_disable() for serializing tx routine

    Commit 713a98d ("virtio-net: serialize tx routine during reset")
    introduces netif_tx_disable() after netif_device_detach() in order to
    avoid use-after-free of tx queues. However, there are two issues.
    
    1) Its operation is redundant with netif_device_detach() in case the
       interface is running.
    2) In case of the interface is not running before suspending and
       resuming, the tx does not get resumed by netif_device_attach().
       This results in losing network connectivity.
    
    It is better to use netif_tx_lock_bh()/netif_tx_unlock_bh() instead for
    serializing tx routine during reset. This also preserves the symmetry
    of netif_device_detach() and netif_device_attach().
    
    Fixes commit 713a98d ("virtio-net: serialize tx routine during reset")
    Signed-off-by: Ake Koomsin <ake@igel.co.jp>
    Acked-by: Jason Wang <jasowang@redhat.com>
    Acked-by: Michael S. Tsirkin <mst@redhat.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Ake Koomsin authored and davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    05c998b View commit details
    Browse the repository at this point in the history
  16. sctp: fix the data size calculation in sctp_data_size

    sctp data size should be calculated by subtracting data chunk header's
    length from chunk_hdr->length, not just data header.
    
    Fixes: 668c9be ("sctp: implement assign_number for sctp_stream_interleave")
    Signed-off-by: Xin Long <lucien.xin@gmail.com>
    Acked-by: Marcelo Ricardo Leitner <marcelo.leitner@gmail.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    lxin authored and davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    5660b9d View commit details
    Browse the repository at this point in the history
  17. net: mscc: ocelot: Fix comment in ocelot_vlant_wait_for_completion()

    The ocelot_vlant_wait_for_completion() function is very similar to the
    ocelot_mact_wait_for_completion(). It seemed to have be copied but the
    comment was not updated, so let's fix it.
    
    Signed-off-by: Gregory CLEMENT <gregory.clement@bootlin.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    gclement authored and davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    06a36ec View commit details
    Browse the repository at this point in the history
  18. net: ipmr: fix unresolved entry dumps

    If the skb space ends in an unresolved entry while dumping we'll miss
    some unresolved entries. The reason is due to zeroing the entry counter
    between dumping resolved and unresolved mfc entries. We should just
    keep counting until the whole table is dumped and zero when we move to
    the next as we have a separate table counter.
    
    Reported-by: Colin Ian King <colin.king@canonical.com>
    Fixes: 8fb472c ("ipmr: improve hash scalability")
    Signed-off-by: Nikolay Aleksandrov <nikolay@cumulusnetworks.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Nikolay Aleksandrov authored and davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    eddf016 View commit details
    Browse the repository at this point in the history
  19. Merge tag 'perf-urgent-for-mingo-4.19-20181017' of git://git.kernel.o…

    …rg/pub/scm/linux/kernel/git/acme/linux into perf/urgent
    
    Pull perf/urgent fixes from Arnaldo Carvalho de Melo:
    
    - Stop falling back to kallsyms for vDSO symbols lookup, this wasn't
      being really used and is not valid in arches such as Sparc, where
      user and kernel space don't share the address space, relying only on
      cpumode to figure out what DSOs to lookup (Arnaldo Carvalho de Melo)
    
    - Align CPU map synthesized events properly, fixing SIGBUS in
      CPUs like Sparc (David Miller)
    
    - Fix use of alternatives to find JDIR (Jarod Wilson)
    
    - Store IDs for events with their own CPUs when synthesizing user
      level event details (scale, unit, etc) events, fixing a crash
      when recording a PMU event with a cpumask defined (Jiri Olsa)
    
    - Fix wrong filter_band* values for uncore Intel vendor events (Jiri Olsa)
    
    - Fix detection of tracefs path in systems without tracefs, where
      that path should be the debugfs mountpoint plus "/tracing/" (Jiri Olsa)
    
    - Pass build flags to traceevent build, allowing using alternative
      flags in distro packages, RPM, for instance (Jiri Olsa)
    
    - Fix 'perf report' crash on invalid inline debug information (Milian Wolff)
    
    - Synch KVM UAPI copies (Arnaldo Carvalho de Melo)
    
    Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
    Signed-off-by: Ingo Molnar <mingo@kernel.org>
    Ingo Molnar committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    20e8e72 View commit details
    Browse the repository at this point in the history
  20. Merge branch 'ida-fixes-4.19-rc8' of git://git.infradead.org/users/wi…

    …lly/linux-dax
    
    Matthew writes:
      "IDA/IDR fixes for 4.19
    
       I have two tiny fixes, one for the IDA test-suite and one for the IDR
       documentation license."
    
    * 'ida-fixes-4.19-rc8' of git://git.infradead.org/users/willy/linux-dax:
      idr: Change documentation license
      test_ida: Fix lockdep warning
    gregkh committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    ca9f672 View commit details
    Browse the repository at this point in the history
  21. LICENSES: Remove CC-BY-SA-4.0 license text

    Using non-GPL licenses for our documentation is rather problematic,
    as it can directly include other files, which generally are GPLv2
    licensed and thus not compatible.
    
    Remove this license now that the only user (idr.rst) is gone to avoid
    people semi-accidentally using it again.
    
    Signed-off-by: Christoph Hellwig <hch@lst.de>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    Christoph Hellwig authored and gregkh committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    19e6420 View commit details
    Browse the repository at this point in the history
  22. mremap: properly flush TLB before releasing the page

    Jann Horn points out that our TLB flushing was subtly wrong for the
    mremap() case.  What makes mremap() special is that we don't follow the
    usual "add page to list of pages to be freed, then flush tlb, and then
    free pages".  No, mremap() obviously just _moves_ the page from one page
    table location to another.
    
    That matters, because mremap() thus doesn't directly control the
    lifetime of the moved page with a freelist: instead, the lifetime of the
    page is controlled by the page table locking, that serializes access to
    the entry.
    
    As a result, we need to flush the TLB not just before releasing the lock
    for the source location (to avoid any concurrent accesses to the entry),
    but also before we release the destination page table lock (to avoid the
    TLB being flushed after somebody else has already done something to that
    page).
    
    This also makes the whole "need_flush" logic unnecessary, since we now
    always end up flushing the TLB for every valid entry.
    
    Reported-and-tested-by: Jann Horn <jannh@google.com>
    Acked-by: Will Deacon <will.deacon@arm.com>
    Tested-by: Ingo Molnar <mingo@kernel.org>
    Acked-by: Peter Zijlstra (Intel) <peterz@infradead.org>
    Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    torvalds authored and gregkh committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    eb66ae0 View commit details
    Browse the repository at this point in the history
  23. cachefiles: fix the race between cachefiles_bury_object() and rmdir(2)

    the victim might've been rmdir'ed just before the lock_rename();
    unlike the normal callers, we do not look the source up after the
    parents are locked - we know it beforehand and just recheck that it's
    still the child of what used to be its parent.  Unfortunately,
    the check is too weak - we don't spot a dead directory since its
    ->d_parent is unchanged, dentry is positive, etc.  So we sail all
    the way to ->rename(), with hosting filesystems _not_ expecting
    to be asked renaming an rmdir'ed subdirectory.
    
    The fix is easy, fortunately - the lock on parent is sufficient for
    making IS_DEADDIR() on child safe.
    
    Cc: stable@vger.kernel.org
    Fixes: 9ae326a (CacheFiles: A cache that backs onto a mounted filesystem)
    Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
    Signed-off-by: David Howells <dhowells@redhat.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    Al Viro authored and gregkh committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    169b803 View commit details
    Browse the repository at this point in the history
  24. fscache: Fix incomplete initialisation of inline key space

    The inline key in struct rxrpc_cookie is insufficiently initialized,
    zeroing only 3 of the 4 slots, therefore an index_key_len between 13 and 15
    bytes will end up hashing uninitialized memory because the memcpy only
    partially fills the last buf[] element.
    
    Fix this by clearing fscache_cookie objects on allocation rather than using
    the slab constructor to initialise them.  We're going to pretty much fill
    in the entire struct anyway, so bringing it into our dcache writably
    shouldn't incur much overhead.
    
    This removes the need to do clearance in fscache_set_key() (where we aren't
    doing it correctly anyway).
    
    Also, we don't need to set cookie->key_len in fscache_set_key() as we
    already did it in the only caller, so remove that.
    
    Fixes: ec0328e ("fscache: Maintain a catalogue of allocated cookies")
    Reported-by: syzbot+a95b989b2dde8e806af8@syzkaller.appspotmail.com
    Reported-by: Eric Sandeen <sandeen@redhat.com>
    Cc: stable <stable@vger.kernel.org>
    Signed-off-by: David Howells <dhowells@redhat.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    dhowells authored and gregkh committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    1ff2288 View commit details
    Browse the repository at this point in the history
  25. fscache: Fix out of bound read in long cookie keys

    fscache_set_key() can incur an out-of-bounds read, reported by KASAN:
    
     BUG: KASAN: slab-out-of-bounds in fscache_alloc_cookie+0x5b3/0x680 [fscache]
     Read of size 4 at addr ffff88084ff056d4 by task mount.nfs/32615
    
    and also reported by syzbot at https://lkml.org/lkml/2018/7/8/236
    
      BUG: KASAN: slab-out-of-bounds in fscache_set_key fs/fscache/cookie.c:120 [inline]
      BUG: KASAN: slab-out-of-bounds in fscache_alloc_cookie+0x7a9/0x880 fs/fscache/cookie.c:171
      Read of size 4 at addr ffff8801d3cc8bb4 by task syz-executor907/4466
    
    This happens for any index_key_len which is not divisible by 4 and is
    larger than the size of the inline key, because the code allocates exactly
    index_key_len for the key buffer, but the hashing loop is stepping through
    it 4 bytes (u32) at a time in the buf[] array.
    
    Fix this by calculating how many u32 buffers we'll need by using
    DIV_ROUND_UP, and then using kcalloc() to allocate a precleared allocation
    buffer to hold the index_key, then using that same count as the hashing
    index limit.
    
    Fixes: ec0328e ("fscache: Maintain a catalogue of allocated cookies")
    Reported-by: syzbot+a95b989b2dde8e806af8@syzkaller.appspotmail.com
    Signed-off-by: Eric Sandeen <sandeen@redhat.com>
    Cc: stable <stable@vger.kernel.org>
    Signed-off-by: David Howells <dhowells@redhat.com>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    Eric Sandeen authored and gregkh committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    fa520c4 View commit details
    Browse the repository at this point in the history
  26. block: don't deal with discard limit in blkdev_issue_discard()

    blk_queue_split() does respect this limit via bio splitting, so no
    need to do that in blkdev_issue_discard(), then we can align to
    normal bio submit(bio_add_page() & submit_bio()).
    
    More importantly, this patch fixes one issue introduced in a22c4d7
    ("block: re-add discard_granularity and alignment checks"), in which
    zero discard bio may be generated in case of zero alignment.
    
    Fixes: a22c4d7 ("block: re-add discard_granularity and alignment checks")
    Cc: stable@vger.kernel.org
    Cc: Ming Lin <ming.l@ssi.samsung.com>
    Cc: Mike Snitzer <snitzer@redhat.com>
    Cc: Christoph Hellwig <hch@lst.de>
    Cc: Xiao Ni <xni@redhat.com>
    Tested-by: Mariusz Dabrowski <mariusz.dabrowski@intel.com>
    Signed-off-by: Ming Lei <ming.lei@redhat.com>
    Signed-off-by: Jens Axboe <axboe@kernel.dk>
    Ming Lei authored and axboe committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    744889b View commit details
    Browse the repository at this point in the history
  27. Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/gi…

    …t/klassert/ipsec
    
    Steffen Klassert says:
    
    ====================
    pull request (net): ipsec 2018-10-18
    
    1) Free the xfrm interface gro_cells when deleting the
       interface, otherwise we leak it. From Li RongQing.
    
    2) net/core/flow.c does not exist anymore, so remove it
       from the MAINTAINERS file.
    
    3) Fix a slab-out-of-bounds in _decode_session6.
       From Alexei Starovoitov.
    
    4) Fix RCU protection when policies inserted into
       thei bydst lists. From Florian Westphal.
    
    Please pull or let me know if there are problems.
    ====================
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    2ee653f View commit details
    Browse the repository at this point in the history
  28. drm: Get ref on CRTC commit object when waiting for flip_done

    This fixes a general protection fault, caused by accessing the contents
    of a flip_done completion object that has already been freed. It occurs
    due to the preemption of a non-blocking commit worker thread W by
    another commit thread X. X continues to clear its atomic state at the
    end, destroying the CRTC commit object that W still needs. Switching
    back to W and accessing the commit objects then leads to bad results.
    
    Worker W becomes preemptable when waiting for flip_done to complete. At
    this point, a frequently occurring commit thread X can take over. Here's
    an example where W is a worker thread that flips on both CRTCs, and X
    does a legacy cursor update on both CRTCs:
    
            ...
         1. W does flip work
         2. W runs commit_hw_done()
         3. W waits for flip_done on CRTC 1
         4. > flip_done for CRTC 1 completes
         5. W finishes waiting for CRTC 1
         6. W waits for flip_done on CRTC 2
    
         7. > Preempted by X
         8. > flip_done for CRTC 2 completes
         9. X atomic_check: hw_done and flip_done are complete on all CRTCs
        10. X updates cursor on both CRTCs
        11. X destroys atomic state
        12. X done
    
        13. > Switch back to W
        14. W waits for flip_done on CRTC 2
        15. W raises general protection fault
    
    The error looks like so:
    
        general protection fault: 0000 [#1] PREEMPT SMP PTI
        **snip**
        Call Trace:
         lock_acquire+0xa2/0x1b0
         _raw_spin_lock_irq+0x39/0x70
         wait_for_completion_timeout+0x31/0x130
         drm_atomic_helper_wait_for_flip_done+0x64/0x90 [drm_kms_helper]
         amdgpu_dm_atomic_commit_tail+0xcae/0xdd0 [amdgpu]
         commit_tail+0x3d/0x70 [drm_kms_helper]
         process_one_work+0x212/0x650
         worker_thread+0x49/0x420
         kthread+0xfb/0x130
         ret_from_fork+0x3a/0x50
        Modules linked in: x86_pkg_temp_thermal amdgpu(O) chash(O)
        gpu_sched(O) drm_kms_helper(O) syscopyarea sysfillrect sysimgblt
        fb_sys_fops ttm(O) drm(O)
    
    Note that i915 has this issue masked, since hw_done is signaled after
    waiting for flip_done. Doing so will block the cursor update from
    happening until hw_done is signaled, preventing the cursor commit from
    destroying the state.
    
    v2: The reference on the commit object needs to be obtained before
        hw_done() is signaled, since that's the point where another commit
        is allowed to modify the state. Assuming that the
        new_crtc_state->commit object still exists within flip_done() is
        incorrect.
    
        Fix by getting a reference in setup_commit(), and releasing it
        during default_clear().
    
    Signed-off-by: Leo Li <sunpeng.li@amd.com>
    Reviewed-by: Daniel Vetter <daniel.vetter@ffwll.ch>
    Signed-off-by: Harry Wentland <harry.wentland@amd.com>
    Link: https://patchwork.freedesktop.org/patch/msgid/1539611200-6184-1-git-send-email-sunpeng.li@amd.com
    leeonadoh authored and Harry Wentland committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    4364bcb View commit details
    Browse the repository at this point in the history
  29. sparc: Revert unintended perf changes.

    Some local debugging hacks accidently slipped into the VDSO commit.
    
    Sorry!
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    27faeeb View commit details
    Browse the repository at this point in the history
  30. r8169: fix NAPI handling under high load

    rtl_rx() and rtl_tx() are called only if the respective bits are set
    in the interrupt status register. Under high load NAPI may not be
    able to process all data (work_done == budget) and it will schedule
    subsequent calls to the poll callback.
    rtl_ack_events() however resets the bits in the interrupt status
    register, therefore subsequent calls to rtl8169_poll() won't call
    rtl_rx() and rtl_tx() - chip interrupts are still disabled.
    
    Fix this by calling rtl_rx() and rtl_tx() independent of the bits
    set in the interrupt status register. Both functions will detect
    if there's nothing to do for them.
    
    Fixes: da78dbf ("r8169: remove work from irq handler.")
    Signed-off-by: Heiner Kallweit <hkallweit1@gmail.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    hkallweit authored and davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    6b839b6 View commit details
    Browse the repository at this point in the history
  31. net: sched: Fix for duplicate class dump

    When dumping classes by parent, kernel would return classes twice:
    
    | # tc qdisc add dev lo root prio
    | # tc class show dev lo
    | class prio 8001:1 parent 8001:
    | class prio 8001:2 parent 8001:
    | class prio 8001:3 parent 8001:
    | # tc class show dev lo parent 8001:
    | class prio 8001:1 parent 8001:
    | class prio 8001:2 parent 8001:
    | class prio 8001:3 parent 8001:
    | class prio 8001:1 parent 8001:
    | class prio 8001:2 parent 8001:
    | class prio 8001:3 parent 8001:
    
    This comes from qdisc_match_from_root() potentially returning the root
    qdisc itself if its handle matched. Though in that case, root's classes
    were already dumped a few lines above.
    
    Fixes: cb395b2 ("net: sched: optimize class dumps")
    Signed-off-by: Phil Sutter <phil@nwl.cc>
    Reviewed-by: Jiri Pirko <jiri@mellanox.com>
    Reviewed-by: Eric Dumazet <edumazet@google.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Phil Sutter authored and davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    3c53ed8 View commit details
    Browse the repository at this point in the history
  32. net: socket: fix a missing-check bug

    In ethtool_ioctl(), the ioctl command 'ethcmd' is checked through a switch
    statement to see whether it is necessary to pre-process the ethtool
    structure, because, as mentioned in the comment, the structure
    ethtool_rxnfc is defined with padding. If yes, a user-space buffer 'rxnfc'
    is allocated through compat_alloc_user_space(). One thing to note here is
    that, if 'ethcmd' is ETHTOOL_GRXCLSRLALL, the size of the buffer 'rxnfc' is
    partially determined by 'rule_cnt', which is actually acquired from the
    user-space buffer 'compat_rxnfc', i.e., 'compat_rxnfc->rule_cnt', through
    get_user(). After 'rxnfc' is allocated, the data in the original user-space
    buffer 'compat_rxnfc' is then copied to 'rxnfc' through copy_in_user(),
    including the 'rule_cnt' field. However, after this copy, no check is
    re-enforced on 'rxnfc->rule_cnt'. So it is possible that a malicious user
    race to change the value in the 'compat_rxnfc->rule_cnt' between these two
    copies. Through this way, the attacker can bypass the previous check on
    'rule_cnt' and inject malicious data. This can cause undefined behavior of
    the kernel and introduce potential security risk.
    
    This patch avoids the above issue via copying the value acquired by
    get_user() to 'rxnfc->rule_cn', if 'ethcmd' is ETHTOOL_GRXCLSRLALL.
    
    Signed-off-by: Wenwen Wang <wang6495@umn.edu>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Wenwen Wang authored and davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    b616856 View commit details
    Browse the repository at this point in the history
  33. tipc: fix info leak from kernel tipc_event

    We initialize a struct tipc_event allocated on the kernel stack to
    zero to avert info leak to user space.
    
    Reported-by: syzbot+057458894bc8cada4dee@syzkaller.appspotmail.com
    Signed-off-by: Jon Maloy <jon.maloy@ericsson.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    Jon Maloy authored and davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    b06f9d9 View commit details
    Browse the repository at this point in the history
  34. ip6_tunnel: Fix encapsulation layout

    Commit 058214a ("ip6_tun: Add infrastructure for doing
    encapsulation") added the ip6_tnl_encap() call in ip6_tnl_xmit(), before
    the call to ipv6_push_frag_opts() to append the IPv6 Tunnel Encapsulation
    Limit option (option 4, RFC 2473, par. 5.1) to the outer IPv6 header.
    
    As long as the option didn't actually end up in generated packets, this
    wasn't an issue. Then commit 89a23c8 ("ip6_tunnel: Fix missing tunnel
    encapsulation limit option") fixed sending of this option, and the
    resulting layout, e.g. for FoU, is:
    
    .-------------------.------------.----------.-------------------.----- - -
    | Outer IPv6 Header | UDP header | Option 4 | Inner IPv6 Header | Payload
    '-------------------'------------'----------'-------------------'----- - -
    
    Needless to say, FoU and GUE (at least) won't work over IPv6. The option
    is appended by default, and I couldn't find a way to disable it with the
    current iproute2.
    
    Turn this into a more reasonable:
    
    .-------------------.----------.------------.-------------------.----- - -
    | Outer IPv6 Header | Option 4 | UDP header | Inner IPv6 Header | Payload
    '-------------------'----------'------------'-------------------'----- - -
    
    With this, and with 84dad55 ("udp6: fix encap return code for
    resubmitting"), FoU and GUE work again over IPv6.
    
    Fixes: 058214a ("ip6_tun: Add infrastructure for doing encapsulation")
    Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    sbrivio-rh authored and davem330 committed Oct 18, 2018
    Configuration menu
    Copy the full SHA
    d4d576f View commit details
    Browse the repository at this point in the history

Commits on Oct 19, 2018

  1. Merge tag 'drm-misc-fixes-2018-10-18' of git://anongit.freedesktop.or…

    …g/drm/drm-misc into drm-fixes
    
    drm-misc-fixes for v4.19:
    - Fix use of freed memory in drm_mode_setcrtc.
    - Reject pixel format changing requests in fb helper.
    - Add 6 bpc quirk for HP Pavilion 15-n233sl
    - Fix VSDB yCBCr420 Deep Color mode bit definitions
    
    Signed-off-by: Dave Airlie <airlied@redhat.com>
    
    From: Maarten Lankhorst <maarten.lankhorst@linux.intel.com>
    Link: https://patchwork.freedesktop.org/patch/msgid/647fe5d0-4ec5-57cc-9f23-a4836b29e278@linux.intel.com
    airlied committed Oct 19, 2018
    Configuration menu
    Copy the full SHA
    f8e6e1b View commit details
    Browse the repository at this point in the history
  2. x86/swiotlb: Enable swiotlb for > 4GiG RAM on 32-bit kernels

    We already build the swiotlb code for 32-bit kernels with PAE support,
    but the code to actually use swiotlb has only been enabled for 64-bit
    kernels for an unknown reason.
    
    Before Linux v4.18 we paper over this fact because the networking code,
    the SCSI layer and some random block drivers implemented their own
    bounce buffering scheme.
    
    [ mingo: Changelog fixes. ]
    
    Fixes: 21e07db ("scsi: reduce use of block bounce buffers")
    Fixes: ab74cfe ("net: remove the PCI_DMA_BUS_IS_PHYS check in illegal_highdma")
    Reported-by: Matthew Whitehead <tedheadster@gmail.com>
    Signed-off-by: Christoph Hellwig <hch@lst.de>
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Tested-by: Matthew Whitehead <tedheadster@gmail.com>
    Cc: konrad.wilk@oracle.com
    Cc: iommu@lists.linux-foundation.org
    Cc: stable@vger.kernel.org
    Link: https://lkml.kernel.org/r/20181014075208.2715-1-hch@lst.de
    Signed-off-by: Ingo Molnar <mingo@kernel.org>
    Christoph Hellwig authored and Ingo Molnar committed Oct 19, 2018
    Configuration menu
    Copy the full SHA
    485734f View commit details
    Browse the repository at this point in the history
  3. Merge tag 'for-gkh' of git://git.kernel.org/pub/scm/linux/kernel/git/…

    …rdma/rdma
    
    Doug writes:
      "Really final for-rc pull request for 4.19
    
       Ok, so last week I thought we had sent our final pull request for
       4.19.  Well, wouldn't ya know someone went and found a couple Spectre
       v1 fixes were needed :-/.  So, a couple *very* small specter patches
       for this (hopefully) final -rc week."
    
    * tag 'for-gkh' of git://git.kernel.org/pub/scm/linux/kernel/git/rdma/rdma:
      RDMA/ucma: Fix Spectre v1 vulnerability
      IB/ucm: Fix Spectre v1 vulnerability
    gregkh committed Oct 19, 2018
    Configuration menu
    Copy the full SHA
    eb6d938 View commit details
    Browse the repository at this point in the history
  4. Merge tag 'drm-fixes-2018-10-19' of git://anongit.freedesktop.org/drm…

    …/drm
    
    Dave writes:
      "drm fixes for 4.19 final
    
       Just a last set of misc core fixes for final.
    
       4 fixes, one use after free, one fb integration fix, one EDID fix,
       and one laptop panel quirk,"
    
    * tag 'drm-fixes-2018-10-19' of git://anongit.freedesktop.org/drm/drm:
      drm/edid: VSDB yCBCr420 Deep Color mode bit definitions
      drm: fix use of freed memory in drm_mode_setcrtc
      drm: fb-helper: Reject all pixel format changing requests
      drm/edid: Add 6 bpc quirk for BOE panel in HP Pavilion 15-n233sl
    gregkh committed Oct 19, 2018
    Configuration menu
    Copy the full SHA
    7555c5d View commit details
    Browse the repository at this point in the history
  5. Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc

    David writes:
      "Sparc fixes:
    
       The main bit here is fixing how fallback system calls are handled in
       the sparc vDSO.
    
       Unfortunately, I fat fingered the commit and some perf debugging
       hacks slipped into the vDSO fix, which I revert in the very next
       commit."
    
    * git://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc:
      sparc: Revert unintended perf changes.
      sparc: vDSO: Silence an uninitialized variable warning
      sparc: Fix syscall fallback bugs in VDSO.
    gregkh committed Oct 19, 2018
    Configuration menu
    Copy the full SHA
    2a96661 View commit details
    Browse the repository at this point in the history
  6. Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net

    David writes:
      "Networking
    
       1) Fix gro_cells leak in xfrm layer, from Li RongQing.
    
       2) BPF selftests change RLIMIT_MEMLOCK blindly, don't do that.  From
          Eric Dumazet.
    
       3) AF_XDP calls synchronize_net() under RCU lock, fix from Björn
          Töpel.
    
       4) Out of bounds packet access in _decode_session6(), from Alexei
          Starovoitov.
    
       5) Several ethtool bugs, where we copy a struct into the kernel twice
          and our validations of the values in the first copy can be
          invalidated by the second copy due to asynchronous updates to the
          memory by the user.  From Wenwen Wang.
    
       6) Missing netlink attribute validation in cls_api, from Davide
          Caratti.
    
       7) LLC SAP sockets neet to be SOCK_RCU FREE, from Cong Wang.
    
       8) rxrpc operates on wrong kvec, from Yue Haibing.
    
       9) A regression was introduced by the disassosciation of route
          neighbour references in rt6_probe(), causing probe for
          neighbourless routes to not be properly rate limited.  Fix from
          Sabrina Dubroca.
    
       10) Unsafe RCU locking in tipc, from Tung Nguyen.
    
       11) Use after free in inet6_mc_check(), from Eric Dumazet.
    
       12) PMTU from icmp packets should update the SCTP transport pathmtu,
           from Xin Long.
    
       13) Missing peer put on error in rxrpc, from David Howells.
    
       14) Fix pedit in nfp driver, from Pieter Jansen van Vuuren.
    
       15) Fix overflowing shift statement in qla3xxx driver, from Nathan
           Chancellor.
    
       16) Fix Spectre v1 in ptp code, from Gustavo A. R. Silva.
    
       17) udp6_unicast_rcv_skb() interprets udpv6_queue_rcv_skb() return
           value in an inverted manner, fix from Paolo Abeni.
    
       18) Fix missed unresolved entries in ipmr dumps, from Nikolay
           Aleksandrov.
    
       19) Fix NAPI handling under high load, we can completely miss events
           when NAPI has to loop more than one time in a cycle.  From Heiner
           Kallweit."
    
    * git://git.kernel.org/pub/scm/linux/kernel/git/davem/net: (49 commits)
      ip6_tunnel: Fix encapsulation layout
      tipc: fix info leak from kernel tipc_event
      net: socket: fix a missing-check bug
      net: sched: Fix for duplicate class dump
      r8169: fix NAPI handling under high load
      net: ipmr: fix unresolved entry dumps
      net: mscc: ocelot: Fix comment in ocelot_vlant_wait_for_completion()
      sctp: fix the data size calculation in sctp_data_size
      virtio_net: avoid using netif_tx_disable() for serializing tx routine
      udp6: fix encap return code for resubmitting
      mlxsw: core: Fix use-after-free when flashing firmware during init
      sctp: not free the new asoc when sctp_wait_for_connect returns err
      sctp: fix race on sctp_id2asoc
      r8169: re-enable MSI-X on RTL8168g
      net: bpfilter: use get_pid_task instead of pid_task
      ptp: fix Spectre v1 vulnerability
      net: qla3xxx: Remove overflowing shift statement
      geneve, vxlan: Don't set exceptions if skb->len < mtu
      geneve, vxlan: Don't check skb_dst() twice
      sctp: get pr_assoc and pr_stream all status with SCTP_PR_SCTP_ALL instead
      ...
    gregkh committed Oct 19, 2018
    Configuration menu
    Copy the full SHA
    91b1561 View commit details
    Browse the repository at this point in the history
  7. drm/sun4i: Fix an ulong overflow in the dotclock driver

    The calculated ideal rate can easily overflow an unsigned long, thus
    making the best div selection buggy as soon as no ideal match is found
    before the overflow occurs.
    
    Fixes: 4731a72 ("drm/sun4i: request exact rates to our parents")
    Cc: <stable@vger.kernel.org>
    Signed-off-by: Boris Brezillon <boris.brezillon@bootlin.com>
    Acked-by: Maxime Ripard <maxime.ripard@bootlin.com>
    Signed-off-by: Maxime Ripard <maxime.ripard@bootlin.com>
    Link: https://patchwork.freedesktop.org/patch/msgid/20181018100250.12565-1-boris.brezillon@bootlin.com
    Boris Brezillon authored and mripard committed Oct 19, 2018
    Configuration menu
    Copy the full SHA
    e84cb60 View commit details
    Browse the repository at this point in the history
  8. Merge tag 'for-linus-20181019' of git://git.kernel.dk/linux-block

    Jens writes:
      "Block fixes for 4.19-final
    
       Two small fixes that should go into this release."
    
    * tag 'for-linus-20181019' of git://git.kernel.dk/linux-block:
      block: don't deal with discard limit in blkdev_issue_discard()
      nvme: remove ns sibling before clearing path
    gregkh committed Oct 19, 2018
    Configuration menu
    Copy the full SHA
    b2a205f View commit details
    Browse the repository at this point in the history
  9. Merge tag 'usb-4.19-final' of git://git.kernel.org/pub/scm/linux/kern…

    …el/git/gregkh/usb
    
    I wrote:
      "USB fixes for 4.19-final
    
       Here are a small number of last-minute USB driver fixes
    
       Included here are:
         - spectre fix for usb storage gadgets
         - xhci fixes
         - cdc-acm fixes
         - usbip fixes for reported problems
    
       All of these have been in linux-next with no reported issues."
    
    * tag 'usb-4.19-final' of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb:
      usb: gadget: storage: Fix Spectre v1 vulnerability
      USB: fix the usbfs flag sanitization for control transfers
      usb: xhci: pci: Enable Intel USB role mux on Apollo Lake platforms
      usb: roles: intel_xhci: Fix Unbalanced pm_runtime_enable
      cdc-acm: correct counting of UART states in serial state notification
      cdc-acm: do not reset notification buffer index upon urb unlinking
      cdc-acm: fix race between reset and control messaging
      usb: usbip: Fix BUG: KASAN: slab-out-of-bounds in vhci_hub_control()
      selftests: usbip: add wait after attach and before checking port status
    gregkh committed Oct 19, 2018
    Configuration menu
    Copy the full SHA
    c7b70a6 View commit details
    Browse the repository at this point in the history
  10. Revert "bond: take rcu lock in netpoll_send_skb_on_dev"

    This reverts commit 6fe9487.
    
    It is causing more serious regressions than the RCU warning
    it is fixing.
    
    Signed-off-by: David S. Miller <davem@davemloft.net>
    davem330 committed Oct 19, 2018
    Configuration menu
    Copy the full SHA
    4899542 View commit details
    Browse the repository at this point in the history
  11. tracing: Fix synthetic event to accept unsigned modifier

    Fix synthetic event to accept unsigned modifier for its field type
    correctly.
    
    Currently, synthetic_events interface returns error for "unsigned"
    modifiers as below;
    
     # echo "myevent unsigned long var" >> synthetic_events
     sh: write error: Invalid argument
    
    This is because argv_split() breaks "unsigned long" into "unsigned"
    and "long", but parse_synth_field() doesn't expected it.
    
    With this fix, synthetic_events can handle the "unsigned long"
    correctly like as below;
    
     # echo "myevent unsigned long var" >> synthetic_events
     # cat synthetic_events
     myevent	unsigned long var
    
    Link: http://lkml.kernel.org/r/153986832571.18251.8448135724590496531.stgit@devbox
    
    Cc: Shuah Khan <shuah@kernel.org>
    Cc: Tom Zanussi <tom.zanussi@linux.intel.com>
    Cc: stable@vger.kernel.org
    Fixes: commit 4b14793 ("tracing: Add support for 'synthetic' events")
    Signed-off-by: Masami Hiramatsu <mhiramat@kernel.org>
    Signed-off-by: Steven Rostedt (VMware) <rostedt@goodmis.org>
    mhiramat authored and rostedt committed Oct 19, 2018
    Configuration menu
    Copy the full SHA
    282447b View commit details
    Browse the repository at this point in the history
  12. tracing: Fix synthetic event to allow semicolon at end

    Fix synthetic event to allow independent semicolon at end.
    
    The synthetic_events interface accepts a semicolon after the
    last word if there is no space.
    
     # echo "myevent u64 var;" >> synthetic_events
    
    But if there is a space, it returns an error.
    
     # echo "myevent u64 var ;" > synthetic_events
     sh: write error: Invalid argument
    
    This behavior is difficult for users to understand. Let's
    allow the last independent semicolon too.
    
    Link: http://lkml.kernel.org/r/153986835420.18251.2191216690677025744.stgit@devbox
    
    Cc: Shuah Khan <shuah@kernel.org>
    Cc: Tom Zanussi <tom.zanussi@linux.intel.com>
    Cc: stable@vger.kernel.org
    Fixes: commit 4b14793 ("tracing: Add support for 'synthetic' events")
    Signed-off-by: Masami Hiramatsu <mhiramat@kernel.org>
    Signed-off-by: Steven Rostedt (VMware) <rostedt@goodmis.org>
    mhiramat authored and rostedt committed Oct 19, 2018
    Configuration menu
    Copy the full SHA
    a360d9e View commit details
    Browse the repository at this point in the history
  13. selftests: ftrace: Add synthetic event syntax testcase

    Add a testcase to check the syntax and field types for
    synthetic_events interface.
    
    Link: http://lkml.kernel.org/r/153986838264.18251.16627517536956299922.stgit@devbox
    
    Acked-by: Shuah Khan <shuah@kernel.org>
    Signed-off-by: Masami Hiramatsu <mhiramat@kernel.org>
    Signed-off-by: Steven Rostedt (VMware) <rostedt@goodmis.org>
    mhiramat authored and rostedt committed Oct 19, 2018
    Configuration menu
    Copy the full SHA
    ba0e41c View commit details
    Browse the repository at this point in the history

Commits on Oct 20, 2018

  1. Merge tag 'drm-misc-fixes-2018-10-19' of git://anongit.freedesktop.or…

    …g/drm/drm-misc into drm-fixes
    
    Second pull request for v4.19:
    - Fix ulong overflow in sun4i
    - Fix a serious GPF in waiting for flip_done from commit_tail().
    
    Signed-off-by: Dave Airlie <airlied@redhat.com>
    
    From: Maarten Lankhorst <maarten.lankhorst@linux.intel.com>
    Link: https://patchwork.freedesktop.org/patch/msgid/97d1ed42-1d99-fcc5-291e-cd1dc29a4252@linux.intel.com
    airlied committed Oct 20, 2018
    Configuration menu
    Copy the full SHA
    fe7acd1 View commit details
    Browse the repository at this point in the history
  2. Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel…

    …/git/dtor/input
    
    Dmitry writes:
      "Input updates for 4.19-rc8
    
       Just an addition to elan touchpad driver ACPI table."
    
    * 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/dtor/input:
      Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15IGM
    gregkh committed Oct 20, 2018
    Configuration menu
    Copy the full SHA
    d4ec49d View commit details
    Browse the repository at this point in the history
  3. Merge tag 'trace-v4.19-rc8-2' of git://git.kernel.org/pub/scm/linux/k…

    …ernel/git/rostedt/linux-trace
    
    Steven writes:
      "tracing: A few small fixes to synthetic events
    
       Masami found some issues with the creation of synthetic events.  The
       first two patches fix handling of unsigned type, and handling of a
       space before an ending semi-colon.
    
       The third patch adds a selftest to test the processing of synthetic
       events."
    
    * tag 'trace-v4.19-rc8-2' of git://git.kernel.org/pub/scm/linux/kernel/git/rostedt/linux-trace:
      selftests: ftrace: Add synthetic event syntax testcase
      tracing: Fix synthetic event to allow semicolon at end
      tracing: Fix synthetic event to accept unsigned modifier
    gregkh committed Oct 20, 2018
    Configuration menu
    Copy the full SHA
    6b5201c View commit details
    Browse the repository at this point in the history
  4. Merge tag 'drm-fixes-2018-10-20-1' of git://anongit.freedesktop.org/d…

    …rm/drm
    
    Dave writes:
      "drm fixes for 4.19 final (part 2)
    
       Looked like two stragglers snuck in, one very urgent the pageflipping
       was missing a reference that could result in a GPF on non-i915
       drivers, the other is an overflow in the sun4i dotclock calcs
       resulting in a mode not getting set."
    
    * tag 'drm-fixes-2018-10-20-1' of git://anongit.freedesktop.org/drm/drm:
      drm/sun4i: Fix an ulong overflow in the dotclock driver
      drm: Get ref on CRTC commit object when waiting for flip_done
    gregkh committed Oct 20, 2018
    Configuration menu
    Copy the full SHA
    270b77a View commit details
    Browse the repository at this point in the history
  5. net: fix pskb_trim_rcsum_slow() with odd trim offset

    We've been getting checksum errors involving small UDP packets, usually
    59B packets with 1 extra non-zero padding byte. netdev_rx_csum_fault()
    has been complaining that HW is providing bad checksums. Turns out the
    problem is in pskb_trim_rcsum_slow(), introduced in commit 88078d9
    ("net: pskb_trim_rcsum() and CHECKSUM_COMPLETE are friends").
    
    The source of the problem is that when the bytes we are trimming start
    at an odd address, as in the case of the 1 padding byte above,
    skb_checksum() returns a byte-swapped value. We cannot just combine this
    with skb->csum using csum_sub(). We need to use csum_block_sub() here
    that takes into account the parity of the start address and handles the
    swapping.
    
    Matches existing code in __skb_postpull_rcsum() and esp_remove_trailer().
    
    Fixes: 88078d9 ("net: pskb_trim_rcsum() and CHECKSUM_COMPLETE are friends")
    Signed-off-by: Dimitris Michailidis <dmichail@google.com>
    Reviewed-by: Eric Dumazet <edumazet@google.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    dimichail authored and davem330 committed Oct 20, 2018
    Configuration menu
    Copy the full SHA
    d55bef5 View commit details
    Browse the repository at this point in the history
  6. Merge branch 'perf-urgent-for-linus' of git://git.kernel.org/pub/scm/…

    …linux/kernel/git/tip/tip
    
    Ingo writes:
      "perf fixes:
    
       Misc perf tooling fixes."
    
    * 'perf-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
      perf tools: Stop fallbacking to kallsyms for vdso symbols lookup
      perf tools: Pass build flags to traceevent build
      perf report: Don't crash on invalid inline debug information
      perf cpu_map: Align cpu map synthesized events properly.
      perf tools: Fix tracing_path_mount proper path
      perf tools: Fix use of alternatives to find JDIR
      perf evsel: Store ids for events with their own cpus perf_event__synthesize_event_update_cpus
      perf vendor events intel: Fix wrong filter_band* values for uncore events
      Revert "perf tools: Fix PMU term format max value calculation"
      tools headers uapi: Sync kvm.h copy
      tools arch uapi: Sync the x86 kvm.h copy
    gregkh committed Oct 20, 2018
    Configuration menu
    Copy the full SHA
    9b00eb8 View commit details
    Browse the repository at this point in the history
  7. Merge branch 'sched-urgent-for-linus' of git://git.kernel.org/pub/scm…

    …/linux/kernel/git/tip/tip
    
    Ingo writes:
      "scheduler fixes:
    
       Two fixes: a CFS-throttling bug fix, and an interactivity fix."
    
    * 'sched-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
      sched/fair: Fix the min_vruntime update logic in dequeue_entity()
      sched/fair: Fix throttle_list starvation with low CFS quota
    gregkh committed Oct 20, 2018
    Configuration menu
    Copy the full SHA
    14dbc56 View commit details
    Browse the repository at this point in the history
  8. Merge branch 'x86-urgent-for-linus' of git://git.kernel.org/pub/scm/l…

    …inux/kernel/git/tip/tip
    
    Ingo writes:
      "x86 fixes:
    
       It's 4 misc fixes, 3 build warning fixes and 3 comment fixes.
    
       In hindsight I'd have left out the 3 comment fixes to make the pull
       request look less scary at such a late point in the cycle. :-/"
    
    * 'x86-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
      x86/swiotlb: Enable swiotlb for > 4GiG RAM on 32-bit kernels
      x86/fpu: Fix i486 + no387 boot crash by only saving FPU registers on context switch if there is an FPU
      x86/fpu: Remove second definition of fpu in __fpu__restore_sig()
      x86/entry/64: Further improve paranoid_entry comments
      x86/entry/32: Clear the CS high bits
      x86/boot: Add -Wno-pointer-sign to KBUILD_CFLAGS
      x86/time: Correct the attribute on jiffies' definition
      x86/entry: Add some paranoid entry/exit CR3 handling comments
      x86/percpu: Fix this_cpu_read()
      x86/tsc: Force inlining of cyc2ns bits
    gregkh committed Oct 20, 2018
    Configuration menu
    Copy the full SHA
    b0d04fb View commit details
    Browse the repository at this point in the history
  9. MAINTAINERS: Add entry for Broadcom STB I2C controller

    Add an entry for the Broadcom STB I2C controller in the MAINTAINERS file.
    
    Signed-off-by: Kamal Dasu <kdasu.kdev@gmail.com>
    Acked-by: Florian Fainelli <f.fainelli@gmail.com>
    [wsa: fixed sorting and a whitespace error]
    Signed-off-by: Wolfram Sang <wsa@the-dreams.de>
    KamalDasu authored and Wolfram Sang committed Oct 20, 2018
    Configuration menu
    Copy the full SHA
    72a7a4a View commit details
    Browse the repository at this point in the history
  10. i2c: rcar: cleanup DMA for all kinds of failure

    DMA needs to be cleaned up not only on timeout, but on all errors where
    it has been setup before.
    
    Fixes: 73e8b05 ("i2c: rcar: add DMA support")
    Signed-off-by: Wolfram Sang <wsa+renesas@sang-engineering.com>
    Signed-off-by: Wolfram Sang <wsa@the-dreams.de>
    Wolfram Sang authored and Wolfram Sang committed Oct 20, 2018
    Configuration menu
    Copy the full SHA
    31d8603 View commit details
    Browse the repository at this point in the history
  11. net/ipv6: Fix index counter for unicast addresses in in6_dump_addrs

    The loop wants to skip previously dumped addresses, so loops until
    current index >= saved index. If the message fills it wants to save
    the index for the next address to dump - ie., the one that did not
    fit in the current message.
    
    Currently, it is incrementing the index counter before comparing to the
    saved index, and then the saved index is off by 1 - it assumes the
    current address is going to fit in the message.
    
    Change the index handling to increment only after a succesful dump.
    
    Fixes: 502a2ff ("ipv6: convert idev_list to list macros")
    Signed-off-by: David Ahern <dsahern@gmail.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    dsahern authored and davem330 committed Oct 20, 2018
    Configuration menu
    Copy the full SHA
    4ba4c56 View commit details
    Browse the repository at this point in the history

Commits on Oct 21, 2018

  1. Revert "neighbour: force neigh_invalidate when NUD_FAILED update is f…

    …rom admin"
    
    This reverts commit 8e32628.
    
    This patch results in unnecessary netlink notification when one
    tries to delete a neigh entry already in NUD_FAILED state. Found
    this with a buggy app that tries to delete a NUD_FAILED entry
    repeatedly. While the notification issue can be fixed with more
    checks, adding more complexity here seems unnecessary. Also,
    recent tests with other changes in the neighbour code have
    shown that the INCOMPLETE and PROBE checks are good enough for
    the original issue.
    
    Signed-off-by: Roopa Prabhu <roopa@cumulusnetworks.com>
    Signed-off-by: David S. Miller <davem@davemloft.net>
    roopa-prabhu authored and davem330 committed Oct 21, 2018
    Configuration menu
    Copy the full SHA
    d2fb4fb View commit details
    Browse the repository at this point in the history
  2. Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net

    David writes:
      "Networking:
    
       A few straggler bug fixes:
    
       1) Fix indexing of multi-pass dumps of ipv6 addresses, from David
          Ahern.
    
       2) Revert RCU locking change for bonding netpoll, causes worse
          problems than it solves.
    
       3) pskb_trim_rcsum_slow() doesn't handle odd trim offsets, resulting
          in erroneous bad hw checksum triggers with CHECKSUM_COMPLETE
          devices.  From Dimitris Michailidis.
    
       4) a revert to some neighbour code changes that adjust notifications
          in a way that confuses some apps."
    
    * git://git.kernel.org/pub/scm/linux/kernel/git/davem/net:
      Revert "neighbour: force neigh_invalidate when NUD_FAILED update is from admin"
      net/ipv6: Fix index counter for unicast addresses in in6_dump_addrs
      net: fix pskb_trim_rcsum_slow() with odd trim offset
      Revert "bond: take rcu lock in netpoll_send_skb_on_dev"
    gregkh committed Oct 21, 2018
    Configuration menu
    Copy the full SHA
    23469de View commit details
    Browse the repository at this point in the history
  3. Merge branch 'i2c/for-current' of git://git.kernel.org/pub/scm/linux/…

    …kernel/git/wsa/linux
    
    Wolfram writes:
      "i2c for 4.19
    
       Another driver bugfix and MAINTAINERS addition from I2C."
    
    * 'i2c/for-current' of git://git.kernel.org/pub/scm/linux/kernel/git/wsa/linux:
      i2c: rcar: cleanup DMA for all kinds of failure
      MAINTAINERS: Add entry for Broadcom STB I2C controller
    gregkh committed Oct 21, 2018
    Configuration menu
    Copy the full SHA
    467e050 View commit details
    Browse the repository at this point in the history

Commits on Oct 22, 2018

  1. Code of conduct: Fix wording around maintainers enforcing the code of…

    … conduct
    
    As it was originally worded, this paragraph requires maintainers to
    enforce the code of conduct, or face potential repercussions.  It sends
    the wrong message, when really we just want maintainers to be part of
    the solution and not violate the code of conduct themselves.
    
    Removing it doesn't limit our ability to enforce the code of conduct,
    and we can still encourage maintainers to help maintain high standards
    for the level of discourse in their subsystem.
    
    Signed-off-by: Chris Mason <clm@fb.com>
    Acked-by: Alex Deucher <alexander.deucher@amd.com>
    Acked-by: Amir Goldstein <amir73il@gmail.com>
    Acked-by: Andrew Morton <akpm@linux-foundation.org>
    Acked-by: Anna-Maria Gleixner <anna-maria@linutronix.de>
    Acked-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
    Acked-by: Benjamin Herrenschmidt <benh@kernel.crashing.org>
    Acked-by: Boris Brezillon <boris.brezillon@bootlin.com>
    Acked-by: Borislav Petkov <bp@kernel.org>
    Acked-by: Christian Lütke-Stetzkamp <christian@lkamp.de>
    Acked-by: Christoph Hellwig <hch@lst.de>
    Acked-by: Colin Ian King <colin.king@canonical.com>
    Acked-by: Dan Carpenter <dan.carpenter@oracle.com>
    Acked-by: Dan Williams <dan.j.williams@intel.com>
    Acked-by: Daniel Borkmann <daniel@iogearbox.net>
    Acked-by: Dave Airlie <airlied@redhat.com>
    Acked-by: Dave Hansen <dave.hansen@linux.intel.com>
    Acked-by: David Ahern <dsa@cumulusnetworks.com>
    Acked-by: David Sterba <kdave@kernel.org>
    Acked-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
    Acked-by: Dominik Brodowski <linux@dominikbrodowski.de>
    Acked-by: Eric Dumazet <eric.dumazet@gmail.com>
    Acked-by: Felipe Balbi <balbi@kernel.org>
    Acked-by: Felix Kuehling <Felix.Kuehling@amd.com>
    Acked-by: Florian Fainelli <f.fainelli@gmail.com>
    Acked-by: Florian Westphal <fw@strlen.de>
    Acked-by: Geert Uytterhoeven <geert@linux-m68k.org>
    Acked-by: Grant Likely <grant.likely@secretlab.ca>
    Acked-by: Gregory CLEMENT <gregory.clement@bootlin.com>
    Acked-by: Guenter Roeck <linux@roeck-us.net>
    Acked-by: Gustavo A. R. Silva <gustavo@embeddedor.com>
    Acked-by: Hans Verkuil <hverkuil@xs4all.nl>
    Acked-by: Hans de Goede <j.w.r.degoede@gmail.com>
    Acked-by: Harry Wentland <harry.wentland@amd.com>
    Acked-by: Heiko Stuebner <heiko@sntech.de>
    Acked-by: Ingo Molnar <mingo@kernel.org>
    Acked-by: Jaegeuk Kim <jaegeuk@kernel.org>
    Acked-by: James Smart <james.smart@broadcom.com>
    Acked-by: James Smart <jsmart2021@gmail.com>
    Acked-by: Jan Kara <jack@ucw.cz>
    Acked-by: Jason A. Donenfeld <Jason@zx2c4.com>
    Acked-by: Jeff Kirsher <jeffrey.t.kirsher@intel.com>
    Acked-by: Jens Axboe <axboe@kernel.dk>
    Acked-by: Jessica Yu <jeyu@kernel.org>
    Acked-by: Jia-Ju Bai <baijiaju1990@gmail.com>
    Acked-by: Jiri Kosina <jikos@kernel.org>
    Acked-by: Jiri Olsa <jolsa@redhat.com>
    Acked-by: Joerg Roedel <joro@8bytes.org>
    Acked-by: Johan Hovold <johan@kernel.org>
    Acked-by: Johannes Thumshirn <jth@kernel.org>
    Acked-by: Jonathan Corbet <corbet@lwn.net>
    Acked-by: Julia Lawall <julia.lawall@lip6.fr>
    Acked-by: Kees Cook <keescook@chromium.org>
    Acked-by: Kirill Tkhai <ktkhai@virtuozzo.com>
    Acked-by: Kuninori Morimoto <kuninori.morimoto.gx@renesas.com>
    Acked-by: Laurent Pinchart <laurent.pinchart@ideasonboard.com>
    Acked-by: Lina Iyer <ilina@codeaurora.org>
    Acked-by: Linus Torvalds <torvalds@linux-foundation.org>
    Acked-by: Linus Walleij <linus.walleij@linaro.org>
    Acked-by: Mark Brown <broonie@kernel.org>
    Acked-by: Masahiro Yamada <yamada.masahiro@socionext.com>
    Acked-by: Masami Hiramatsu <mhiramat@kernel.org>
    Acked-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
    Acked-by: Matias Bjørling <mb@lightnvm.io>
    Acked-by: Maxime Ripard <maxime.ripard@bootlin.com>
    Acked-by: Michael Ellerman <mpe@ellerman.id.au>
    Acked-by: Mike Rapoport <rppt@linux.ibm.com>
    Acked-by: Mimi Zohar <zohar@linux.ibm.com>
    Acked-by: Miquel Raynal <miquel.raynal@bootlin.com>
    Acked-by: Nikolay Borisov <n.borisov.lkml@gmail.com>
    Acked-by: Oded Gabbay <oded.gabbay@gmail.com>
    Acked-by: Olof Johansson <olof@lixom.net>
    Acked-by: Palmer Dabbelt <palmer@dabbelt.com>
    Acked-by: Paul E. McKenney <paulmck@linux.ibm.com>
    Acked-by: Peter Zijlstra <peterz@infradead.org>
    Acked-by: Rafael J. Wysocki <rafael@kernel.org>
    Acked-by: Richard Weinberger <richard@nod.at>
    Acked-by: Rik van Riel <riel@surriel.com>
    Acked-by: Rob Clark <robdclark@gmail.com>
    Acked-by: Rob Herring <robh@kernel.org>
    Acked-by: Rodrigo Vivi <rodrigo.vivi@intel.com>
    Acked-by: Sebastian Andrzej Siewior <bigeasy@linutronix.de>
    Acked-by: Sebastian Reichel <sre@kernel.org>
    Acked-by: Sergio Paracuellos <sergio.paracuellos@gmail.com>
    Acked-by: Shawn Guo <shawnguo@kernel.org>
    Acked-by: Shuah Khan <shuah@kernel.org>
    Acked-by: Simon Horman <horms@verge.net.au>
    Acked-by: Srinivas Kandagatla <srinivas.kandagatla@linaro.org>
    Acked-by: Stephen Hemminger <stephen@networkplumber.org>
    Acked-by: Takashi Iwai <tiwai@kernel.org>
    Acked-by: Tejun Heo <tj@kernel.org>
    Acked-by: Theodore Ts'o <tytso@mit.edu>
    Acked-by: Thierry Reding <thierry.reding@gmail.com>
    Acked-by: Thomas Gleixner <tglx@linutronix.de>
    Acked-by: Tim Bird <tim.bird@sony.com>
    Acked-by: Todd Poynor <toddpoynor@google.com>
    Acked-by: Trond Myklebust <trond.myklebust@hammerspace.com>
    Acked-by: Viresh Kumar <viresh.kumar@linaro.org>
    Acked-by: Wei Yongjun <weiyongjun1@huawei.com>
    Acked-by: YueHaibing <yuehaibing@huawei.com>
    Reviewed-by: Mauro Carvalho Chehab <mchehab@kernel.org>
    Reviewed-by: Steven Rostedt <rostedt@goodmis.org>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    masoncl authored and gregkh committed Oct 22, 2018
    Configuration menu
    Copy the full SHA
    c1d1ba8 View commit details
    Browse the repository at this point in the history
  2. Code of Conduct Interpretation: Add document explaining how the Code …

    …of Conduct is to be interpreted
    
    The Contributor Covenant Code of Conduct is a general document meant to
    provide a set of rules for almost any open source community.  Every
    open-source community is unique and the Linux kernel is no exception.
    Because of this, this document describes how we in the Linux kernel
    community will interpret it.  We also do not expect this interpretation
    to be static over time, and will adjust it as needed.
    
    This document was created with the input and feedback of the TAB as well
    as many current kernel maintainers.
    
    Co-Developed-by: Thomas Gleixner <tglx@linutronix.de>
    Co-Developed-by: Olof Johansson <olof@lixom.net>
    Acked-by: Alex Deucher <alexander.deucher@amd.com>
    Acked-by: Alexei Starovoitov <ast@kernel.org>
    Acked-by: Amir Goldstein <amir73il@gmail.com>
    Acked-by: Andrew Morton <akpm@linux-foundation.org>
    Acked-by: Andy Lutomirski <luto@kernel.org>
    Acked-by: Anna-Maria Gleixner <anna-maria@linutronix.de>
    Acked-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
    Acked-by: Benjamin Herrenschmidt <benh@kernel.crashing.org>
    Acked-by: Boris Brezillon <boris.brezillon@bootlin.com>
    Acked-by: Borislav Petkov <bp@kernel.org>
    Acked-by: Chris Mason <clm@fb.com>
    Acked-by: Christian Lütke-Stetzkamp <christian@lkamp.de>
    Acked-by: Colin Ian King <colin.king@canonical.com>
    Acked-by: Dan Carpenter <dan.carpenter@oracle.com>
    Acked-by: Dan Williams <dan.j.williams@intel.com>
    Acked-by: Daniel Borkmann <daniel@iogearbox.net>
    Acked-by: Daniel Vetter <daniel.vetter@ffwll.ch>
    Acked-by: Dave Airlie <airlied@redhat.com>
    Acked-by: Dave Hansen <dave.hansen@linux.intel.com>
    Acked-by: David Ahern <dsa@cumulusnetworks.com>
    Acked-by: David Sterba <kdave@kernel.org>
    Acked-by: Dmitry Torokhov <dmitry.torokhov@gmail.com>
    Acked-by: Dominik Brodowski <linux@dominikbrodowski.de>
    Acked-by: Eric Dumazet <eric.dumazet@gmail.com>
    Acked-by: Felipe Balbi <balbi@kernel.org>
    Acked-by: Felix Kuehling <Felix.Kuehling@amd.com>
    Acked-by: Florian Fainelli <f.fainelli@gmail.com>
    Acked-by: Geert Uytterhoeven <geert@linux-m68k.org>
    Acked-by: Grant Likely <grant.likely@secretlab.ca>
    Acked-by: Gregory CLEMENT <gregory.clement@bootlin.com>
    Acked-by: Guenter Roeck <linux@roeck-us.net>
    Acked-by: Gustavo A. R. Silva <gustavo@embeddedor.com>
    Acked-by: Hans Verkuil <hverkuil@xs4all.nl>
    Acked-by: Hans de Goede <j.w.r.degoede@gmail.com>
    Acked-by: Harry Wentland <harry.wentland@amd.com>
    Acked-by: Heiko Stuebner <heiko@sntech.de>
    Acked-by: Ingo Molnar <mingo@kernel.org>
    Acked-by: Jaegeuk Kim <jaegeuk@kernel.org>
    Acked-by: James Smart <james.smart@broadcom.com>
    Acked-by: James Smart <jsmart2021@gmail.com>
    Acked-by: Jan Kara <jack@ucw.cz>
    Acked-by: Jani Nikula <jani.nikula@intel.com>
    Acked-by: Jason A. Donenfeld <Jason@zx2c4.com>
    Acked-by: Jeff Kirsher <jeffrey.t.kirsher@intel.com>
    Acked-by: Jens Axboe <axboe@kernel.dk>
    Acked-by: Jessica Yu <jeyu@kernel.org>
    Acked-by: Jia-Ju Bai <baijiaju1990@gmail.com>
    Acked-by: Jiri Kosina <jikos@kernel.org>
    Acked-by: Jiri Olsa <jolsa@redhat.com>
    Acked-by: Joerg Roedel <joro@8bytes.org>
    Acked-by: Johan Hovold <johan@kernel.org>
    Acked-by: Johannes Thumshirn <jth@kernel.org>
    Acked-by: Jonathan Corbet <corbet@lwn.net>
    Acked-by: Julia Lawall <julia.lawall@lip6.fr>
    Acked-by: Kees Cook <keescook@chromium.org>
    Acked-by: Kirill Tkhai <ktkhai@virtuozzo.com>
    Acked-by: Kuninori Morimoto <kuninori.morimoto.gx@renesas.com>
    Acked-by: Laurent Pinchart <laurent.pinchart@ideasonboard.com>
    Acked-by: Lina Iyer <ilina@codeaurora.org>
    Acked-by: Linus Torvalds <torvalds@linux-foundation.org>
    Acked-by: Linus Walleij <linus.walleij@linaro.org>
    Acked-by: Mark Brown <broonie@kernel.org>
    Acked-by: Masahiro Yamada <yamada.masahiro@socionext.com>
    Acked-by: Masami Hiramatsu <mhiramat@kernel.org>
    Acked-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
    Acked-by: Matias Bjørling <mb@lightnvm.io>
    Acked-by: Mauro Carvalho Chehab <mchehab@kernel.org>
    Acked-by: Maxime Ripard <maxime.ripard@bootlin.com>
    Acked-by: Michael Ellerman <mpe@ellerman.id.au>
    Acked-by: Mike Rapoport <rppt@linux.ibm.com>
    Acked-by: Mimi Zohar <zohar@linux.ibm.com>
    Acked-by: Miquel Raynal <miquel.raynal@bootlin.com>
    Acked-by: Mishi Choudhary <mishi@linux.com>
    Acked-by: Nikolay Borisov <n.borisov.lkml@gmail.com>
    Acked-by: Oded Gabbay <oded.gabbay@gmail.com>
    Acked-by: Palmer Dabbelt <palmer@dabbelt.com>
    Acked-by: Paul E. McKenney <paulmck@linux.ibm.com>
    Acked-by: Peter Zijlstra <peterz@infradead.org>
    Acked-by: Rafael J. Wysocki <rafael@kernel.org>
    Acked-by: Richard Weinberger <richard@nod.at>
    Acked-by: Rik van Riel <riel@surriel.com>
    Acked-by: Rob Clark <robdclark@gmail.com>
    Acked-by: Rob Herring <robh@kernel.org>
    Acked-by: Rodrigo Vivi <rodrigo.vivi@intel.com>
    Acked-by: Sean Paul <sean@poorly.run>
    Acked-by: Sebastian Andrzej Siewior <bigeasy@linutronix.de>
    Acked-by: Sebastian Reichel <sre@kernel.org>
    Acked-by: Sergio Paracuellos <sergio.paracuellos@gmail.com>
    Acked-by: Shawn Guo <shawnguo@kernel.org>
    Acked-by: Shuah Khan <shuah@kernel.org>
    Acked-by: Simon Horman <horms@verge.net.au>
    Acked-by: Srinivas Kandagatla <srinivas.kandagatla@linaro.org>
    Acked-by: Stephen Hemminger <stephen@networkplumber.org>
    Acked-by: Takashi Iwai <tiwai@kernel.org>
    Acked-by: Tejun Heo <tj@kernel.org>
    Acked-by: Theodore Ts'o <tytso@mit.edu>
    Acked-by: Thierry Reding <thierry.reding@gmail.com>
    Acked-by: Todd Poynor <toddpoynor@google.com>
    Acked-by: Viresh Kumar <viresh.kumar@linaro.org>
    Acked-by: Wei Yongjun <weiyongjun1@huawei.com>
    Acked-by: YueHaibing <yuehaibing@huawei.com>
    Reviewed-by: Steven Rostedt <rostedt@goodmis.org>
    Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
    Signed-off-by: Olof Johansson <olof@lixom.net>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    gregkh committed Oct 22, 2018
    Configuration menu
    Copy the full SHA
    79dbeed View commit details
    Browse the repository at this point in the history
  3. Code of Conduct Interpretation: Properly reference the TAB correctly

    We use the term "TAB" before defining it later in the document.  Fix
    that up by defining it at the first location.
    
    Reported-by: Kuninori Morimoto <kuninori.morimoto.gx@renesas.com>
    Acked-by: Chris Mason <clm@fb.com>
    Acked-by: Olof Johansson <olof@lixom.net>
    Acked-by: Theodore Ts'o <tytso@mit.edu>
    Acked-by: Thomas Gleixner <tglx@linutronix.de>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    gregkh committed Oct 22, 2018
    Configuration menu
    Copy the full SHA
    d84feee View commit details
    Browse the repository at this point in the history
  4. Code of Conduct: Provide links between the two documents

    Create a link between the Code of Conduct and the Code of Conduct
    Interpretation so that people can see that they are related.
    
    Acked-by: Chris Mason <clm@fb.com>
    Acked-by: Olof Johansson <olof@lixom.net>
    Acked-by: Theodore Ts'o <tytso@mit.edu>
    Acked-by: Thomas Gleixner <tglx@linutronix.de>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    gregkh committed Oct 22, 2018
    Configuration menu
    Copy the full SHA
    f7e5858 View commit details
    Browse the repository at this point in the history
  5. Code of Conduct Interpretation: Put in the proper URL for the committee

    There was a blank <URL> reference for how to find the Code of Conduct
    Committee.  Fix that up by pointing it to the correct kernel.org website
    page location.
    
    Acked-by: Chris Mason <clm@fb.com>
    Acked-by: Olof Johansson <olof@lixom.net>
    Acked-by: Theodore Ts'o <tytso@mit.edu>
    Acked-by: Thomas Gleixner <tglx@linutronix.de>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    gregkh committed Oct 22, 2018
    Configuration menu
    Copy the full SHA
    d117a85 View commit details
    Browse the repository at this point in the history
  6. Code of Conduct: Change the contact email address

    The contact point for the kernel's Code of Conduct should now be the
    Code of Conduct Committee, not the full TAB.  Change the email address
    in the file to properly reflect this.
    
    Acked-by: Chris Mason <clm@fb.com>
    Acked-by: Olof Johansson <olof@lixom.net>
    Acked-by: Theodore Ts'o <tytso@mit.edu>
    Acked-by: Thomas Gleixner <tglx@linutronix.de>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    gregkh committed Oct 22, 2018
    Configuration menu
    Copy the full SHA
    f3f76d6 View commit details
    Browse the repository at this point in the history
  7. MAINTAINERS: Add an entry for the code of conduct

    As I introduced these files, I'm willing to be the maintainer of them as
    well.
    
    Acked-by: Chris Mason <clm@fb.com>
    Acked-by: Olof Johansson <olof@lixom.net>
    Acked-by: Steven Rostedt (VMware) <rostedt@goodmis.org>
    Acked-by: Theodore Ts'o <tytso@mit.edu>
    Acked-by: Thomas Gleixner <tglx@linutronix.de>
    Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    gregkh committed Oct 22, 2018
    Configuration menu
    Copy the full SHA
    8e630c3 View commit details
    Browse the repository at this point in the history
  8. Linux 4.19

    gregkh committed Oct 22, 2018
    Configuration menu
    Copy the full SHA
    84df952 View commit details
    Browse the repository at this point in the history