03 Sep, 2019

1 commit

  • Pull char/misc driver fixes from Greg KH:
    "Here are some small char and misc driver fixes for reported issues for
    5.3-rc7

    Also included in here is the documentation for how we are handling
    hardware issues under embargo that everyone has finally agreed on, as
    well as a MAINTAINERS update for the suckers who agreed to handle the
    LICENSES/ files.

    All of these have been in linux-next last week with no reported
    issues"

    * tag 'char-misc-5.3-rc7' of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/char-misc:
    fsi: scom: Don't abort operations for minor errors
    vmw_balloon: Fix offline page marking with compaction
    VMCI: Release resource if the work is already queued
    Documentation/process: Embargoed hardware security issues
    lkdtm/bugs: fix build error in lkdtm_EXHAUST_STACK
    mei: me: add Tiger Lake point LP device ID
    intel_th: pci: Add Tiger Lake support
    intel_th: pci: Add support for another Lewisburg PCH
    stm class: Fix a double free of stm_source_device
    MAINTAINERS: add entry for LICENSES and SPDX stuff
    fpga: altera-ps-spi: Fix getting of optional confd gpio

    Linus Torvalds
     

01 Sep, 2019

1 commit


29 Aug, 2019

2 commits

  • As per the discussion with Nicolas Ferre[0], rename the compatible property
    to a more appropriate and specific string.

    [0] https://lore.kernel.org/netdev/CAJ2_jOFEVZQat0Yprg4hem4jRrqkB72FKSeQj4p8P5KA-+rgww@mail.gmail.com/

    Signed-off-by: Yash Shah
    Acked-by: Nicolas Ferre
    Reviewed-by: Paul Walmsley
    Reviewed-by: Rob Herring
    Signed-off-by: David S. Miller

    Yash Shah
     
  • To address the requirements of embargoed hardware issues, like Meltdown,
    Spectre, L1TF etc. it is necessary to define and document a process for
    handling embargoed hardware security issues.

    Following the discussion at the maintainer summit 2018 in Edinburgh
    (https://lwn.net/Articles/769417/) the volunteered people have worked
    out a process and a Memorandum of Understanding. The latter addresses
    the fact that the Linux kernel community cannot sign NDAs for various
    reasons.

    The initial contact point for hardware security issues is different from
    the regular kernel security contact to provide a known and neutral
    interface for hardware vendors and researchers. The initial primary
    contact team is proposed to be staffed by Linux Foundation Fellows, who
    are not associated to a vendor or a distribution and are well connected
    in the industry as a whole.

    The process is designed with the experience of the past incidents in
    mind and tries to address the remaining gaps, so future (hopefully rare)
    incidents can be handled more efficiently. It won't remove the fact,
    that most of this has to be done behind closed doors, but it is set up
    to avoid big bureaucratic hurdles for individual developers.

    The process is solely for handling hardware security issues and cannot
    be used for regular kernel (software only) security bugs.

    This memo can help with hardware companies who, and I quote, "[my
    manager] doesn't want to bet his job on the list keeping things secret."
    This despite numerous leaks directly from that company over the years,
    and none ever so far from the kernel security team. Cognitive
    dissidence seems to be a requirement to be a good manager.

    To accelerate the adoption of this process, we introduce the concept of
    ambassadors in participating companies. The ambassadors are there to
    guide people to comply with the process, but are not automatically
    involved in the disclosure of a particular incident.

    Signed-off-by: Thomas Gleixner
    Reviewed-by: Greg Kroah-Hartman
    Reviewed-by: Josh Poimboeuf
    Acked-by: Laura Abbott
    Acked-by: Ben Hutchings
    Reviewed-by: Tyler Hicks
    Reviewed-by: Konrad Rzeszutek Wilk
    Reviewed-by: Jiri Kosina
    Link: https://lore.kernel.org/r/20190815212505.GC12041@kroah.com
    Signed-off-by: Greg Kroah-Hartman

    Thomas Gleixner
     

28 Aug, 2019

1 commit

  • Pull ARC updates from Vineet Gupta:

    - support for Edge Triggered IRQs in ARC IDU intc

    - other fixes here and there

    * tag 'arc-5.3-rc7' of git://git.kernel.org/pub/scm/linux/kernel/git/vgupta/arc:
    arc: prefer __section from compiler_attributes.h
    dt-bindings: IDU-intc: Add support for edge-triggered interrupts
    dt-bindings: IDU-intc: Clean up documentation
    ARCv2: IDU-intc: Add support for edge-triggered interrupts
    ARC: unwind: Mark expected switch fall-throughs
    ARC: [plat-hsdk]: allow to switch between AXI DMAC port configurations
    ARC: fix typo in setup_dma_ops log message
    ARCv2: entry: early return from exception need not clear U & DE bits

    Linus Torvalds
     

27 Aug, 2019

2 commits


26 Aug, 2019

1 commit

  • Pull x86 fixes from Thomas Gleixner:
    "A few fixes for x86:

    - Fix a boot regression caused by the recent bootparam sanitizing
    change, which escaped the attention of all people who reviewed that
    code.

    - Address a boot problem on machines with broken E820 tables caused
    by an underflow which ended up placing the trampoline start at
    physical address 0.

    - Handle machines which do not advertise a legacy timer of any form,
    but need calibration of the local APIC timer gracefully by making
    the calibration routine independent from the tick interrupt. Marked
    for stable as well as there seems to be quite some new laptops
    rolled out which expose this.

    - Clear the RDRAND CPUID bit on AMD family 15h and 16h CPUs which are
    affected by broken firmware which does not initialize RDRAND
    correctly after resume. Add a command line parameter to override
    this for machine which either do not use suspend/resume or have a
    fixed BIOS. Unfortunately there is no way to detect this on boot,
    so the only safe decision is to turn it off by default.

    - Prevent RFLAGS from being clobbers in CALL_NOSPEC on 32bit which
    caused fast KVM instruction emulation to break.

    - Explain the Intel CPU model naming convention so that the repeating
    discussions come to an end"

    * 'x86-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
    x86/retpoline: Don't clobber RFLAGS during CALL_NOSPEC on i386
    x86/boot: Fix boot regression caused by bootparam sanitizing
    x86/CPU/AMD: Clear RDRAND CPUID bit on AMD family 15h/16h
    x86/boot/compressed/64: Fix boot on machines with broken E820 table
    x86/apic: Handle missing global clockevent gracefully
    x86/cpu: Explain Intel model naming convention

    Linus Torvalds
     

23 Aug, 2019

1 commit


20 Aug, 2019

2 commits

  • There have been reports of RDRAND issues after resuming from suspend on
    some AMD family 15h and family 16h systems. This issue stems from a BIOS
    not performing the proper steps during resume to ensure RDRAND continues
    to function properly.

    RDRAND support is indicated by CPUID Fn00000001_ECX[30]. This bit can be
    reset by clearing MSR C001_1004[62]. Any software that checks for RDRAND
    support using CPUID, including the kernel, will believe that RDRAND is
    not supported.

    Update the CPU initialization to clear the RDRAND CPUID bit for any family
    15h and 16h processor that supports RDRAND. If it is known that the family
    15h or family 16h system does not have an RDRAND resume issue or that the
    system will not be placed in suspend, the "rdrand=force" kernel parameter
    can be used to stop the clearing of the RDRAND CPUID bit.

    Additionally, update the suspend and resume path to save and restore the
    MSR C001_1004 value to ensure that the RDRAND CPUID setting remains in
    place after resuming from suspend.

    Note, that clearing the RDRAND CPUID bit does not prevent a processor
    that normally supports the RDRAND instruction from executing it. So any
    code that determined the support based on family and model won't #UD.

    Signed-off-by: Tom Lendacky
    Signed-off-by: Borislav Petkov
    Cc: Andrew Cooper
    Cc: Andrew Morton
    Cc: Chen Yu
    Cc: "H. Peter Anvin"
    Cc: Ingo Molnar
    Cc: Jonathan Corbet
    Cc: Josh Poimboeuf
    Cc: Juergen Gross
    Cc: Kees Cook
    Cc: "linux-doc@vger.kernel.org"
    Cc: "linux-pm@vger.kernel.org"
    Cc: Nathan Chancellor
    Cc: Paolo Bonzini
    Cc: Pavel Machek
    Cc: "Rafael J. Wysocki"
    Cc:
    Cc: Thomas Gleixner
    Cc: "x86@kernel.org"
    Link: https://lkml.kernel.org/r/7543af91666f491547bd86cebb1e17c66824ab9f.1566229943.git.thomas.lendacky@amd.com

    Tom Lendacky
     
  • Pull networking fixes from David Miller:

    1) Fix jmp to 1st instruction in x64 JIT, from Alexei Starovoitov.

    2) Severl kTLS fixes in mlx5 driver, from Tariq Toukan.

    3) Fix severe performance regression due to lack of SKB coalescing of
    fragments during local delivery, from Guillaume Nault.

    4) Error path memory leak in sch_taprio, from Ivan Khoronzhuk.

    5) Fix batched events in skbedit packet action, from Roman Mashak.

    6) Propagate VLAN TX offload to hw_enc_features in bond and team
    drivers, from Yue Haibing.

    7) RXRPC local endpoint refcounting fix and read after free in
    rxrpc_queue_local(), from David Howells.

    8) Fix endian bug in ibmveth multicast list handling, from Thomas
    Falcon.

    9) Oops, make nlmsg_parse() wrap around the correct function,
    __nlmsg_parse not __nla_parse(). Fix from David Ahern.

    10) Memleak in sctp_scend_reset_streams(), fro Zheng Bin.

    11) Fix memory leak in cxgb4, from Wenwen Wang.

    12) Yet another race in AF_PACKET, from Eric Dumazet.

    13) Fix false detection of retransmit failures in tipc, from Tuong
    Lien.

    14) Use after free in ravb_tstamp_skb, from Tho Vu.

    * git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net: (101 commits)
    ravb: Fix use-after-free ravb_tstamp_skb
    netfilter: nf_tables: map basechain priority to hardware priority
    net: sched: use major priority number as hardware priority
    wimax/i2400m: fix a memory leak bug
    net: cavium: fix driver name
    ibmvnic: Unmap DMA address of TX descriptor buffers after use
    bnxt_en: Fix to include flow direction in L2 key
    bnxt_en: Use correct src_fid to determine direction of the flow
    bnxt_en: Suppress HWRM errors for HWRM_NVM_GET_VARIABLE command
    bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails
    bnxt_en: Improve RX doorbell sequence.
    bnxt_en: Fix VNIC clearing logic for 57500 chips.
    net: kalmia: fix memory leaks
    cx82310_eth: fix a memory leak bug
    bnx2x: Fix VF's VLAN reconfiguration in reload.
    Bluetooth: Add debug setting for changing minimum encryption key size
    tipc: fix false detection of retransmit failures
    lan78xx: Fix memory leaks
    MAINTAINERS: r8169: Update path to the driver
    MAINTAINERS: PHY LIBRARY: Update files in the record
    ...

    Linus Torvalds
     

16 Aug, 2019

2 commits

  • 2e6422444894 ("Documentation: PCI: convert PCIEBUS-HOWTO.txt to reST")
    incorrectly renamed PCIEBUS-HOWTO.txt to picebus-howto.rst.

    Rename it to pciebus-howto.rst.

    Fixes: 2e6422444894 ("Documentation: PCI: convert PCIEBUS-HOWTO.txt to reST")
    Signed-off-by: Bjorn Helgaas

    Bjorn Helgaas
     
  • Pull devicetree fixes from Rob Herring:

    - Fix building DT binding examples for in tree builds

    - Correct some refcounting in adjust_local_phandle_references()

    - Update FSL FEC binding with deprecated properties

    - Schema fix in stm32 pinctrl

    - Fix typo in of_irq_parse_one docbook comment

    * tag 'devicetree-fixes-for-5.3-3' of git://git.kernel.org/pub/scm/linux/kernel/git/robh/linux:
    of: irq: fix a trivial typo in a doc comment
    dt-bindings: pinctrl: stm32: Fix 'st,syscfg' schema
    dt-bindings: fec: explicitly mark deprecated properties
    of: resolver: Add of_node_put() before return and break
    dt-bindings: Fix generated example files getting added to schemas

    Linus Torvalds
     

15 Aug, 2019

1 commit

  • The proper way to add additional contraints to an existing json-schema
    is using 'allOf' to reference the base schema. Using just '$ref' doesn't
    work. Fix this for the 'st,syscfg' property.

    Cc: Mark Rutland
    Cc: Maxime Coquelin
    Cc: Alexandre Torgue
    Cc: linux-gpio@vger.kernel.org
    Cc: linux-stm32@st-md-mailman.stormreply.com
    Cc: linux-arm-kernel@lists.infradead.org
    Reviewed-by: Linus Walleij
    Signed-off-by: Rob Herring

    Rob Herring
     

13 Aug, 2019

1 commit


11 Aug, 2019

1 commit

  • Pull RISC-V updates from Paul Walmsley:
    "A few minor RISC-V updates for v5.3-rc4:

    - Remove __udivdi3() from the 32-bit Linux port, converting the only
    upstream user to use do_div(), per Linux policy

    - Convert the RISC-V standard clocksource away from per-cpu data
    structures, since only one is used by Linux, even on a multi-CPU
    system

    - A set of DT binding updates that remove an obsolete text binding in
    favor of a YAML binding, fix a bogus compatible string in the
    schema (thus fixing a "make dtbs_check" warning), and clarifies the
    future values expected in one of the RISC-V CPU properties"

    * tag 'riscv/for-v5.3-rc4' of git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux:
    dt-bindings: riscv: fix the schema compatible string for the HiFive Unleashed board
    dt-bindings: riscv: remove obsolete cpus.txt
    RISC-V: Remove udivdi3
    riscv: delay: use do_div() instead of __udivdi3()
    dt-bindings: Update the riscv,isa string description
    RISC-V: Remove per cpu clocksource

    Linus Torvalds
     

09 Aug, 2019

7 commits

  • sk_validate_xmit_skb() and drivers depend on the sk member of
    struct sk_buff to identify segments requiring encryption.
    Any operation which removes or does not preserve the original TLS
    socket such as skb_orphan() or skb_clone() will cause clear text
    leaks.

    Make the TCP socket underlying an offloaded TLS connection
    mark all skbs as decrypted, if TLS TX is in offload mode.
    Then in sk_validate_xmit_skb() catch skbs which have no socket
    (or a socket with no validation) and decrypted flag set.

    Note that CONFIG_SOCK_VALIDATE_XMIT, CONFIG_TLS_DEVICE and
    sk->sk_validate_xmit_skb are slightly interchangeable right now,
    they all imply TLS offload. The new checks are guarded by
    CONFIG_TLS_DEVICE because that's the option guarding the
    sk_buff->decrypted member.

    Second, smaller issue with orphaning is that it breaks
    the guarantee that packets will be delivered to device
    queues in-order. All TLS offload drivers depend on that
    scheduling property. This means skb_orphan_partial()'s
    trick of preserving partial socket references will cause
    issues in the drivers. We need a full orphan, and as a
    result netem delay/throttling will cause all TLS offload
    skbs to be dropped.

    Reusing the sk_buff->decrypted flag also protects from
    leaking clear text when incoming, decrypted skb is redirected
    (e.g. by TC).

    See commit 0608c69c9a80 ("bpf: sk_msg, sock{map|hash} redirect
    through ULP") for justification why the internal flag is safe.
    The only location which could leak the flag in is tcp_bpf_sendmsg(),
    which is taken care of by clearing the previously unused bit.

    v2:
    - remove superfluous decrypted mark copy (Willem);
    - remove the stale doc entry (Boris);
    - rely entirely on EOR marking to prevent coalescing (Boris);
    - use an internal sendpages flag instead of marking the socket
    (Boris).
    v3 (Willem):
    - reorganize the can_skb_orphan_partial() condition;
    - fix the flag leak-in through tcp_bpf_sendmsg.

    Signed-off-by: Jakub Kicinski
    Acked-by: Willem de Bruijn
    Reviewed-by: Boris Pismenny
    Signed-off-by: David S. Miller

    Jakub Kicinski
     
  • IPX is no longer supported, but the example in the documentation
    might useful. Replace it with IPv6.

    Signed-off-by: Stephen Hemminger
    Signed-off-by: David S. Miller

    Stephen Hemminger
     
  • Both IPX and TR have not been supported for a while now.
    Remove them from the /proc/sys/net documentation.

    Signed-off-by: Stephen Hemminger
    Signed-off-by: David S. Miller

    Stephen Hemminger
     
  • The YAML binding document for SiFive boards has an incorrect
    compatible string for the HiFive Unleashed board. Change it to match
    the name of the board on the SiFive web site:

    https://www.sifive.com/boards/hifive-unleashed

    which also matches the contents of the board DT data file:

    https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/arch/riscv/boot/dts/sifive/hifive-unleashed-a00.dts#n13

    Signed-off-by: Paul Walmsley
    Acked-by: Rob Herring

    Paul Walmsley
     
  • Remove the now-obsolete riscv/cpus.txt DT binding document, since we
    are using YAML binding documentation instead.

    While doing so, transfer the explanatory text about 'harts' (with some
    edits) into the YAML file, at Rob's request.

    Link: https://lore.kernel.org/linux-riscv/CAL_JsqJs6MtvmuyAknsUxQymbmoV=G+=JfS1PQj9kNHV7fjC9g@mail.gmail.com/
    Signed-off-by: Paul Walmsley
    Cc: Rob Herring
    Reviewed-by: Rob Herring

    Paul Walmsley
     
  • Since the RISC-V specification states that ISA description strings are
    case-insensitive, there's no functional difference between mixed-case,
    upper-case, and lower-case ISA strings. Thus, to simplify parsing,
    specify that the letters present in "riscv,isa" must be all lowercase.

    Suggested-by: Paul Walmsley
    Signed-off-by: Atish Patra
    Signed-off-by: Paul Walmsley

    Atish Patra
     
  • Pull cifs fixes from Steve French:
    "Six small SMB3 fixes, two for stable"

    * tag '5.3-rc3-smb3-fixes' of git://git.samba.org/sfrench/cifs-2.6:
    SMB3: Kernel oops mounting a encryptData share with CONFIG_DEBUG_VIRTUAL
    smb3: update TODO list of missing features
    smb3: send CAP_DFS capability during session setup
    SMB3: Fix potential memory leak when processing compound chain
    SMB3: Fix deadlock in validate negotiate hits reconnect
    cifs: fix rmmod regression in cifs.ko caused by force_sig changes

    Linus Torvalds
     

07 Aug, 2019

2 commits

  • Pull networking fixes from David Miller:
    "Yeah I should have sent a pull request last week, so there is a lot
    more here than usual:

    1) Fix memory leak in ebtables compat code, from Wenwen Wang.

    2) Several kTLS bug fixes from Jakub Kicinski (circular close on
    disconnect etc.)

    3) Force slave speed check on link state recovery in bonding 802.3ad
    mode, from Thomas Falcon.

    4) Clear RX descriptor bits before assigning buffers to them in
    stmmac, from Jose Abreu.

    5) Several missing of_node_put() calls, mostly wrt. for_each_*() OF
    loops, from Nishka Dasgupta.

    6) Double kfree_skb() in peak_usb can driver, from Stephane Grosjean.

    7) Need to hold sock across skb->destructor invocation, from Cong
    Wang.

    8) IP header length needs to be validated in ipip tunnel xmit, from
    Haishuang Yan.

    9) Use after free in ip6 tunnel driver, also from Haishuang Yan.

    10) Do not use MSI interrupts on r8169 chips before RTL8168d, from
    Heiner Kallweit.

    11) Upon bridge device init failure, we need to delete the local fdb.
    From Nikolay Aleksandrov.

    12) Handle erros from of_get_mac_address() properly in stmmac, from
    Martin Blumenstingl.

    13) Handle concurrent rename vs. dump in netfilter ipset, from Jozsef
    Kadlecsik.

    14) Setting NETIF_F_LLTX on mac80211 causes complete breakage with
    some devices, so revert. From Johannes Berg.

    15) Fix deadlock in rxrpc, from David Howells.

    16) Fix Kconfig deps of enetc driver, we must have PHYLIB. From Yue
    Haibing.

    17) Fix mvpp2 crash on module removal, from Matteo Croce.

    18) Fix race in genphy_update_link, from Heiner Kallweit.

    19) bpf_xdp_adjust_head() stopped working with generic XDP when we
    fixes generic XDP to support stacked devices properly, fix from
    Jesper Dangaard Brouer.

    20) Unbalanced RCU locking in rt6_update_exception_stamp_rt(), from
    David Ahern.

    21) Several memory leaks in new sja1105 driver, from Vladimir Oltean"

    * git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net: (214 commits)
    net: dsa: sja1105: Fix memory leak on meta state machine error path
    net: dsa: sja1105: Fix memory leak on meta state machine normal path
    net: dsa: sja1105: Really fix panic on unregistering PTP clock
    net: dsa: sja1105: Use the LOCKEDS bit for SJA1105 E/T as well
    net: dsa: sja1105: Fix broken learning with vlan_filtering disabled
    net: dsa: qca8k: Add of_node_put() in qca8k_setup_mdio_bus()
    net: sched: sample: allow accessing psample_group with rtnl
    net: sched: police: allow accessing police->params with rtnl
    net: hisilicon: Fix dma_map_single failed on arm64
    net: hisilicon: fix hip04-xmit never return TX_BUSY
    net: hisilicon: make hip04_tx_reclaim non-reentrant
    tc-testing: updated vlan action tests with batch create/delete
    net sched: update vlan action for batched events operations
    net: stmmac: tc: Do not return a fragment entry
    net: stmmac: Fix issues when number of Queues >= 4
    net: stmmac: xgmac: Fix XGMAC selftests
    be2net: disable bh with spin_lock in be_process_mcc
    net: cxgb3_main: Fix a resource leak in a error path in 'init_one()'
    net: ethernet: sun4i-emac: Support phy-handle property for finding PHYs
    net: bridge: move default pvid init/deinit to NETDEV_REGISTER/UNREGISTER
    ...

    Linus Torvalds
     
  • Pull pti updates from Thomas Gleixner:
    "The performance deterioration departement is not proud at all to
    present yet another set of speculation fences to mitigate the next
    chapter in the 'what could possibly go wrong' story.

    The new vulnerability belongs to the Spectre class and affects GS
    based data accesses and has therefore been dubbed 'Grand Schemozzle'
    for secret communication purposes. It's officially listed as
    CVE-2019-1125.

    Conditional branches in the entry paths which contain a SWAPGS
    instruction (interrupts and exceptions) can be mis-speculated which
    results in speculative accesses with a wrong GS base.

    This can happen on entry from user mode through a mis-speculated
    branch which takes the entry from kernel mode path and therefore does
    not execute the SWAPGS instruction. The following speculative accesses
    are done with user GS base.

    On entry from kernel mode the mis-speculated branch executes the
    SWAPGS instruction in the entry from user mode path which has the same
    effect that the following GS based accesses are done with user GS
    base.

    If there is a disclosure gadget available in these code paths the
    mis-speculated data access can be leaked through the usual side
    channels.

    The entry from user mode issue affects all CPUs which have speculative
    execution. The entry from kernel mode issue affects only Intel CPUs
    which can speculate through SWAPGS. On CPUs from other vendors SWAPGS
    has semantics which prevent that.

    SMAP migitates both problems but only when the CPU is not affected by
    the Meltdown vulnerability.

    The mitigation is to issue LFENCE instructions in the entry from
    kernel mode path for all affected CPUs and on the affected Intel CPUs
    also in the entry from user mode path unless PTI is enabled because
    the CR3 write is serializing.

    The fences are as usual enabled conditionally and can be completely
    disabled on the kernel command line. The Spectre V1 documentation is
    updated accordingly.

    A big "Thank You!" goes to Josh for doing the heavy lifting for this
    round of hardware misfeature 'repair'. Of course also "Thank You!" to
    everybody else who contributed in one way or the other"

    * 'x86/grand-schemozzle' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
    Documentation: Add swapgs description to the Spectre v1 documentation
    x86/speculation/swapgs: Exclude ATOMs from speculation through SWAPGS
    x86/entry/64: Use JMP instead of JMPQ
    x86/speculation: Enable Spectre v1 swapgs mitigations
    x86/speculation: Prepare entry code for Spectre v1 swapgs mitigations

    Linus Torvalds
     

06 Aug, 2019

3 commits

  • minor cleanup of documentation, updating to more current status.

    Signed-off-by: Steve French

    Steve French
     
  • Looks like we were slightly overzealous with the shutdown()
    cleanup. Even though the sock->sk_state can reach CLOSED again,
    socket->state will not got back to SS_UNCONNECTED once
    connections is ESTABLISHED. Meaning we will see EISCONN if
    we try to reconnect, and EINVAL if we try to listen.

    Only listen sockets can be shutdown() and reused, but since
    ESTABLISHED sockets can never be re-connected() or used for
    listen() we don't need to try to clean up the ULP state early.

    Fixes: 32857cf57f92 ("net/tls: fix transition through disconnect with close")
    Signed-off-by: Jakub Kicinski
    Signed-off-by: David S. Miller

    Jakub Kicinski
     
  • Pull spi fixes from Mark Brown:
    "A bunch of small, device specific things here plus a DT bindings fix
    for the new validatable YAML binding format.

    The most notable thing is the fix for GPIO chip selects which fixes a
    corner case in updates of that code to modern APIs, unfortunately due
    to a historical mess the code around GPIO support is obscure, fragile
    and an ABI which makes and attempt to improve the situation painful"

    * tag 'spi-fix-v5.3-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/broonie/spi:
    spi: pxa2xx: Add support for Intel Tiger Lake
    spi: bcm2835: Fix 3-wire mode if DMA is enabled
    spi: pxa2xx: Balance runtime PM enable/disable on error
    spi: gpio: Add SPI_MASTER_GPIO_SS flag
    spi: spi-fsl-qspi: change i.MX7D RX FIFO size
    spi: dt-bindings: spi-controller: remove unnecessary 'maxItems: 1' from reg

    Linus Torvalds
     

04 Aug, 2019

1 commit


31 Jul, 2019

2 commits

  • Pull HMM fixes from Jason Gunthorpe:
    "Fix the locking around nouveau's use of the hmm_range_* APIs. It works
    correctly in the success case, but many of the the edge cases have
    missing unlocks or double unlocks.

    The diffstat is a bit big as Christoph did a comprehensive job to move
    the obsolete API from the core header and into the driver before
    fixing its flow, but the risk of regression from this code motion is
    low"

    * tag 'for-linus-hmm' of git://git.kernel.org/pub/scm/linux/kernel/git/rdma/rdma:
    nouveau: unlock mmap_sem on all errors from nouveau_range_fault
    nouveau: remove the block parameter to nouveau_range_fault
    mm/hmm: move hmm_vma_range_done and hmm_vma_fault to nouveau
    mm/hmm: always return EBUSY for invalid ranges in hmm_range_{fault,snapshot}

    Linus Torvalds
     
  • Commit 837158b847a4 ("dt-bindings: Check the examples against the
    schemas") started generating YAML encoded DT files to validate the
    examples against the schema. When running 'make dt_binding_check' in
    tree after the 1st time, the generated example .dt.yaml files are
    mistakenly added to the list of schema files. Exclude *.example.dt.yaml
    files from the search for schema files.

    Fixes: 837158b847a4 ("dt-bindings: Check the examples against the schemas")
    Reported-by: Guido Günther
    Tested-by: Guido Günther
    Signed-off-by: Rob Herring

    Rob Herring
     

29 Jul, 2019

2 commits

  • Pick up the spectre documentation so the Grand Schemozzle can be added.

    Thomas Gleixner
     
  • Pull USB fixes from Greg KH:
    "Here are some small fixes for 5.3-rc2. All of these resolve some
    reported issues, some more than others :)

    Included in here is:

    - xhci fix for an annoying issue with odd devices

    - reversion of some usb251xb patches that should not have been merged

    - usb pci quirk additions and fixups

    - usb storage fix

    - usb host controller error test fix

    All of these have been in linux-next with no reported issues"

    * tag 'usb-5.3-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb:
    xhci: Fix crash if scatter gather is used with Immediate Data Transfer (IDT).
    usb: usb251xb: Reallow swap-dx-lanes to apply to the upstream port
    Revert "usb: usb251xb: Add US port lanes inversion property"
    Revert "usb: usb251xb: Add US lanes inversion dts-bindings"
    usb: wusbcore: fix unbalanced get/put cluster_id
    usb/hcd: Fix a NULL vs IS_ERR() bug in usb_hcd_setup_local_mem()
    usb-storage: Add a limitation for blk_queue_max_hw_sectors()
    usb: pci-quirks: Minor cleanup for AMD PLL quirk
    usb: pci-quirks: Correct AMD PLL quirk detection

    Linus Torvalds
     

28 Jul, 2019

1 commit

  • …kernel/git/gustavoars/linux

    Pull Wimplicit-fallthrough enablement from Gustavo A. R. Silva:
    "This marks switch cases where we are expecting to fall through, and
    globally enables the -Wimplicit-fallthrough option in the main
    Makefile.

    Finally, some missing-break fixes that have been tagged for -stable:

    - drm/amdkfd: Fix missing break in switch statement

    - drm/amdgpu/gfx10: Fix missing break in switch statement

    With these changes, we completely get rid of all the fall-through
    warnings in the kernel"

    * tag 'Wimplicit-fallthrough-5.3-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/gustavoars/linux:
    Makefile: Globally enable fall-through warning
    drm/i915: Mark expected switch fall-throughs
    drm/amd/display: Mark expected switch fall-throughs
    drm/amdkfd/kfd_mqd_manager_v10: Avoid fall-through warning
    drm/amdgpu/gfx10: Fix missing break in switch statement
    drm/amdkfd: Fix missing break in switch statement
    perf/x86/intel: Mark expected switch fall-throughs
    mtd: onenand_base: Mark expected switch fall-through
    afs: fsclient: Mark expected switch fall-throughs
    afs: yfsclient: Mark expected switch fall-throughs
    can: mark expected switch fall-throughs
    firewire: mark expected switch fall-throughs

    Linus Torvalds
     

27 Jul, 2019

6 commits

  • Pull s390 updates from Heiko Carstens:

    - Add ABI to kernel image file which allows e.g. the file utility to
    figure out the kernel version.

    - Wire up clone3 system call.

    - Add support for kasan bitops instrumentation.

    - uapi header cleanup: use __u{16,32,64} instead of uint{16,32,64}_t.

    - Provide proper ARCH_ZONE_DMA_BITS so the s390 DMA zone is correctly
    defined with 2 GB instead of the default value of 1 MB.

    - Farhan Ali leaves the group of vfio-ccw maintainers.

    - Various small vfio-ccw fixes.

    - Add missing locking for airq_areas array in virtio code.

    - Minor qdio improvements.

    * tag 's390-5.3-3' of git://git.kernel.org/pub/scm/linux/kernel/git/s390/linux:
    MAINTAINERS: vfio-ccw: Remove myself as the maintainer
    s390/mm: use shared variables for sysctl range check
    virtio/s390: fix race on airq_areas[]
    s390/dma: provide proper ARCH_ZONE_DMA_BITS value
    s390/kasan: add bitops instrumentation
    s390/bitops: make test functions return bool
    s390: wire up clone3 system call
    kbuild: enable arch/s390/include/uapi/asm/zcrypt.h for uapi header test
    s390: use __u{16,32,64} instead of uint{16,32,64}_t in uapi header
    s390/hypfs: fix a typo in the name of a function
    s390/qdio: restrict QAOB usage to IQD unicast queues
    s390/qdio: add sanity checks to the fast-requeue path
    s390: enable detection of kernel version from bzImage
    Documentation: fix vfio-ccw doc
    vfio-ccw: Update documentation for csch/hsch
    vfio-ccw: Don't call cp_free if we are processing a channel program
    vfio-ccw: Set pa_nr to 0 if memory allocation fails for pa_iova_pfn
    vfio-ccw: Fix memory leak and don't call cp_free in cp_init
    vfio-ccw: Fix misleading comment when setting orb.cmd.c64

    Linus Torvalds
     
  • Pull Devicetree fixes from Rob Herring:
    "The nvmem changes would typically go thru Greg's tree, but they were
    missed in the merge window. [ Acked by Greg ]

    Summary:

    - Fix mismatches in $id values and actual filenames. Now checked by
    tools.

    - Convert nvmem binding to DT schema

    - Fix a typo in of_property_read_bool() kerneldoc

    - Remove some redundant description in al-fic interrupt-controller"

    * tag 'devicetree-fixes-for-5.3-2' of git://git.kernel.org/pub/scm/linux/kernel/git/robh/linux:
    dt-bindings: Fix more $id value mismatches filenames
    dt-bindings: nvmem: SID: Fix the examples node names
    dt-bindings: nvmem: Add YAML schemas for the generic NVMEM bindings
    of: Fix typo in kerneldoc
    dt-bindings: interrupt-controller: al-fic: remove redundant binding
    dt-bindings: clk: allwinner,sun4i-a10-ccu: Correct path in $id

    Linus Torvalds
     
  • The path in the schema '$id' values are wrong. Fix them.

    Signed-off-by: Rob Herring

    Rob Herring
     
  • Now that the examples are validated, the examples in the SID binding
    generates an error since the node names aren't one of the valid ones.

    Let's switch for one that is ok.

    Signed-off-by: Maxime Ripard
    Signed-off-by: Rob Herring

    Maxime Ripard
     
  • The nvmem providers and consumers have a bunch of generic properties that
    are needed in a device tree. Add a YAML schemas for those.

    Reviewed-by: Rob Herring
    Signed-off-by: Maxime Ripard
    [Srini: Changed licence to (GPL-2.0 OR BSD-2-Clause)]
    Signed-off-by: Srinivas Kandagatla
    Signed-off-by: Rob Herring

    Maxime Ripard
     
  • Saeed Mahameed says:

    ====================
    Mellanox, mlx5 fixes 2019-07-25

    This series introduces some fixes to mlx5 driver.

    1) Ariel is addressing an issue with enacp flow counter race condition
    2) Aya fixes ethtool speed handling
    3) Edward fixes modify_cq hw bits alignment
    4) Maor fixes RDMA_RX capabilities handling
    5) Mark reverses unregister devices order to address an issue with LAG
    6) From Tariq,
    - wrong max num channels indication regression
    - TLS counters naming and documentation as suggested by Jakub
    - kTLS, Call WARN_ONCE on netdev mismatch

    There is one patch in this series that touches nfp driver to align
    TLS statistics names with latest documentation, Jakub is CC'ed.

    Please pull and let me know if there is any problem.

    For -stable v4.9:
    ('net/mlx5: Use reversed order when unregister devices')

    For -stable v4.20
    ('net/mlx5e: Prevent encap flow counter update async to user query')
    ('net/mlx5: Fix modify_cq_in alignment')

    For -stable v5.1
    ('net/mlx5e: Fix matching of speed to PRM link modes')

    For -stable v5.2
    ('net/mlx5: Add missing RDMA_RX capabilities')
    ====================

    Signed-off-by: David S. Miller

    David S. Miller