2019-06-07 18:23:54

by Greg Kroah-Hartman

[permalink] [raw]
Subject: [PATCH 5.1 00/85] 5.1.8-stable review

This is the start of the stable review cycle for the 5.1.8 release.
There are 85 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let me know.

Responses should be made by Sun 09 Jun 2019 03:37:09 PM UTC.
Anything received after that time might be too late.

The whole patch series can be found in one patch at:
https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.1.8-rc1.gz
or in the git tree and branch at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.1.y
and the diffstat can be found below.

thanks,

greg k-h

-------------
Pseudo-Shortlog of commits:

Greg Kroah-Hartman <[email protected]>
Linux 5.1.8-rc1

Nadav Amit <[email protected]>
x86/kprobes: Set instruction page as executable

Greg Kroah-Hartman <[email protected]>
Revert "x86/build: Move _etext to actual end of .text"

Noralf Trønnes <[email protected]>
drm/cma-helper: Fix drm_gem_cma_free_object()

Daniel Vetter <[email protected]>
drm/lease: Make sure implicit planes are leased

Vicente Bergas <[email protected]>
drm/rockchip: shutdown drm subsystem on shutdown

Deepak Rawat <[email protected]>
drm: Expose "FB_DAMAGE_CLIPS" property to atomic aware user-space only

Daniel Vetter <[email protected]>
drm/atomic: Wire file_priv through for property changes

Noralf Trønnes <[email protected]>
drm/fb-helper: generic: Call drm_client_add() after setup is done

Philipp Zabel <[email protected]>
drm/imx: ipuv3-plane: fix atomic update status query for non-plus i.MX6Q

Jernej Skrabec <[email protected]>
drm/sun4i: Fix sun8i HDMI PHY configuration for > 148.5 MHz

Jernej Skrabec <[email protected]>
drm/sun4i: Fix sun8i HDMI PHY clock initialization

Thomas Hellstrom <[email protected]>
drm/vmwgfx: Don't send drm sysfs hotplug events on initial master set

Thomas Hellstrom <[email protected]>
drm/vmwgfx: Fix compat mode shader operation

Thomas Hellstrom <[email protected]>
drm/vmwgfx: Fix user space handle equal to zero

Dmitry Osipenko <[email protected]>
drm/tegra: gem: Fix CPU-cache maintenance for BO's allocated using get_pages()

Kees Cook <[email protected]>
gcc-plugins: Fix build failures under Darwin host

Benjamin Coddington <[email protected]>
Revert "lockd: Show pid of lockd for remote locks"

Roberto Bergantinos Corpas <[email protected]>
CIFS: cifs_read_allocate_pages: don't iterate through whole page array on ENOMEM

Colin Ian King <[email protected]>
cifs: fix memory leak of pneg_inbuf on -EOPNOTSUPP ioctl case

Tim Collier <[email protected]>
staging: wlan-ng: fix adapter initialization failure

Dan Carpenter <[email protected]>
staging: vc04_services: prevent integer overflow in create_pagelist()

George G. Davis <[email protected]>
serial: sh-sci: disable DMA for uart_console

Grzegorz Halat <[email protected]>
vt/fbcon: deinitialize resources in visual_init() after failed memory allocation

Peng Fan <[email protected]>
clk: imx: imx8mm: fix int pll clk gate

Roberto Sassu <[email protected]>
evm: check hash algorithm passed to init_desc()

Roberto Sassu <[email protected]>
ima: show rules with IMA_INMASK correctly

Petr Vorel <[email protected]>
ima: fix wrong signed policy requirement when not appraising

Scott Wood <[email protected]>
x86/ima: Check EFI_RUNTIME_SERVICES before using

Jonathan Corbet <[email protected]>
doc: Cope with Sphinx logging deprecations

Jonathan Corbet <[email protected]>
doc: Cope with the deprecation of AutoReporter

Jonathan Corbet <[email protected]>
docs: Fix conf.py for Sphinx 2.0

Catalin Marinas <[email protected]>
arm64: Fix the arm64_personality() syscall wrapper redirection

Suzuki K Poulose <[email protected]>
mm, compaction: make sure we isolate a valid PFN

Eric W. Biederman <[email protected]>
signal/arm64: Use force_sig not force_sig_fault for SIGKILL

Zhenliang Wei <[email protected]>
kernel/signal.c: trace_signal_deliver when signal_group_exit

Nathan Chancellor <[email protected]>
kasan: initialize tag to 0xff in __kasan_kmalloc

Jiri Slaby <[email protected]>
memcg: make it work on sparse non-0-node systems

Chris Down <[email protected]>
mm, memcg: consider subtrees in memory.events

Joe Burmeister <[email protected]>
tty: max310x: Fix external crystal register setup

Jorge Ramirez-Ortiz <[email protected]>
tty: serial: msm_serial: Fix XON/XOFF

Masahisa Kojima <[email protected]>
i2c: synquacer: fix synquacer_i2c_doxfer() return value

Vadim Pasternak <[email protected]>
i2c: mlxcpld: Fix wrong initialization order in probe

Lyude Paul <[email protected]>
drm/nouveau/i2c: Disable i2c bus access after ->fini()

Thomas Huth <[email protected]>
KVM: s390: Do not report unusabled IDs via KVM_CAP_MAX_VCPU_ID

Hui Wang <[email protected]>
ALSA: hda/realtek - Improve the headset mic for Acer Aspire laptops

Kailang Yang <[email protected]>
ALSA: hda/realtek - Set default power save node to 0

Takashi Iwai <[email protected]>
ALSA: line6: Assure canceling delayed work at disconnection

Thiago Jung Bauermann <[email protected]>
powerpc/kexec: Fix loading of kernel + initramfs with kexec_file_load()

Ravi Bangoria <[email protected]>
powerpc/perf: Fix MMCRA corruption by bhrb_filter

Suraj Jitindar Singh <[email protected]>
KVM: PPC: Book3S HV: Restore SPRG3 in kvmhv_p9_guest_entry()

Paul Mackerras <[email protected]>
KVM: PPC: Book3S HV: Fix lockdep warning when entering guest on POWER9

Cédric Le Goater <[email protected]>
KVM: PPC: Book3S HV: XIVE: Do not clear IRQ data of passthrough interrupts

Harald Freudenberger <[email protected]>
s390/crypto: fix possible sleep during spinlock aquired

Harald Freudenberger <[email protected]>
s390/crypto: fix gcm-aes-s390 selftest failures

Sean Nyekjaer <[email protected]>
iio: adc: ti-ads8688: fix timestamp is not updated in buffer

Tomer Maimon <[email protected]>
iio: adc: modify NPCM ADC read reference voltage

Vincent Stehlé <[email protected]>
iio: adc: ads124: avoid buffer overflow

Ruslan Babayev <[email protected]>
iio: dac: ds4422/ds4424 fix chip verification

Qu Wenruo <[email protected]>
btrfs: reloc: Also queue orphan reloc tree for cleanup to avoid BUG_ON()

Filipe Manana <[email protected]>
Btrfs: incremental send, fix file corruption when no-holes feature is enabled

Qu Wenruo <[email protected]>
btrfs: qgroup: Check bg while resuming relocation to avoid NULL pointer dereference

Dennis Zhou <[email protected]>
btrfs: correct zstd workspace manager lock to use spin_lock_bh()

Filipe Manana <[email protected]>
Btrfs: fix fsync not persisting changed attributes of a directory

Filipe Manana <[email protected]>
Btrfs: fix race updating log root item during fsync

Filipe Manana <[email protected]>
Btrfs: fix wrong ctime and mtime of a directory after log replay

Tomas Bortoli <[email protected]>
tracing: Avoid memory leak in predicate_parse()

Steffen Maier <[email protected]>
scsi: zfcp: fix to prevent port_remove with pure auto scan LUNs (only sdevs)

Steffen Maier <[email protected]>
scsi: zfcp: fix missing zfcp_port reference put on -EBUSY from port_remove

Piotr Figiel <[email protected]>
brcmfmac: fix NULL pointer derefence during USB disconnect

Mauro Carvalho Chehab <[email protected]>
media: smsusb: better handle optional alignment

Alan Stern <[email protected]>
media: usb: siano: Fix false-positive "uninitialized variable" warning

Alan Stern <[email protected]>
media: usb: siano: Fix general protection fault in smsusb

Oliver Neukum <[email protected]>
USB: rio500: fix memory leak in close after disconnect

Oliver Neukum <[email protected]>
USB: rio500: refuse more than one device at a time

Maximilian Luz <[email protected]>
USB: Add LPM quirk for Surface Dock GigE adapter

Oliver Neukum <[email protected]>
USB: sisusbvga: fix oops in error path of sisusb_probe

Alan Stern <[email protected]>
USB: Fix slab-out-of-bounds write in usb_get_bos_descriptor

Shuah Khan <[email protected]>
usbip: usbip_host: fix stub_dev lock context imbalance regression

Shuah Khan <[email protected]>
usbip: usbip_host: fix BUG: sleeping function called from invalid context

Carsten Schmid <[email protected]>
usb: xhci: avoid null pointer deref when bos field is NULL

Andrey Smirnov <[email protected]>
xhci: Convert xhci_handshake() to use readl_poll_timeout_atomic()

Fabio Estevam <[email protected]>
xhci: Use %zu for printing size_t type

Henry Lin <[email protected]>
xhci: update bounce buffer with correct sg num

Rasmus Villemoes <[email protected]>
include/linux/bitops.h: sanitize rotate primitives

James Clarke <[email protected]>
sparc64: Fix regression in non-hypervisor TLB flush xcall


-------------

Diffstat:

Documentation/admin-guide/cgroup-v2.rst | 9 ++
Documentation/conf.py | 2 +-
Documentation/sphinx/kerneldoc.py | 44 ++++--
Documentation/sphinx/kernellog.py | 28 ++++
Documentation/sphinx/kfigure.py | 40 +++---
Makefile | 4 +-
arch/arm64/kernel/sys.c | 2 +-
arch/arm64/kernel/traps.c | 5 +-
arch/mips/kvm/mips.c | 3 +
arch/powerpc/kernel/kexec_elf_64.c | 6 +-
arch/powerpc/kvm/book3s_hv.c | 8 +-
arch/powerpc/kvm/book3s_xive.c | 4 +-
arch/powerpc/kvm/powerpc.c | 3 +
arch/powerpc/perf/core-book3s.c | 6 +-
arch/powerpc/perf/power8-pmu.c | 3 +
arch/powerpc/perf/power9-pmu.c | 3 +
arch/s390/crypto/aes_s390.c | 156 +++++++++++++++------
arch/s390/crypto/des_s390.c | 7 +-
arch/s390/kvm/kvm-s390.c | 1 +
arch/sparc/mm/ultra.S | 4 +-
arch/x86/kernel/ima_arch.c | 5 +
arch/x86/kernel/kprobes/core.c | 24 +++-
arch/x86/kernel/vmlinux.lds.S | 6 +-
arch/x86/kvm/x86.c | 3 +
drivers/clk/imx/clk-imx8mm.c | 12 +-
drivers/gpu/drm/drm_atomic_uapi.c | 32 +++--
drivers/gpu/drm/drm_crtc.c | 4 +
drivers/gpu/drm/drm_crtc_internal.h | 1 +
drivers/gpu/drm/drm_fb_helper.c | 4 +-
drivers/gpu/drm/drm_gem_cma_helper.c | 8 +-
drivers/gpu/drm/drm_mode_config.c | 5 +-
drivers/gpu/drm/drm_mode_object.c | 5 +-
drivers/gpu/drm/drm_plane.c | 8 ++
drivers/gpu/drm/imx/ipuv3-plane.c | 13 +-
drivers/gpu/drm/imx/ipuv3-plane.h | 1 -
drivers/gpu/drm/nouveau/include/nvkm/subdev/i2c.h | 2 +
drivers/gpu/drm/nouveau/nvkm/subdev/i2c/aux.c | 26 +++-
drivers/gpu/drm/nouveau/nvkm/subdev/i2c/aux.h | 2 +
drivers/gpu/drm/nouveau/nvkm/subdev/i2c/base.c | 15 ++
drivers/gpu/drm/nouveau/nvkm/subdev/i2c/bus.c | 21 ++-
drivers/gpu/drm/nouveau/nvkm/subdev/i2c/bus.h | 1 +
drivers/gpu/drm/rockchip/rockchip_drm_drv.c | 9 ++
drivers/gpu/drm/sun4i/sun8i_hdmi_phy.c | 29 ++--
drivers/gpu/drm/tegra/gem.c | 4 +-
drivers/gpu/drm/vmwgfx/ttm_object.c | 2 +-
drivers/gpu/drm/vmwgfx/vmwgfx_drv.c | 8 +-
drivers/gpu/drm/vmwgfx/vmwgfx_execbuf.c | 13 ++
drivers/i2c/busses/i2c-mlxcpld.c | 2 +-
drivers/i2c/busses/i2c-synquacer.c | 2 +-
drivers/iio/adc/npcm_adc.c | 2 +-
drivers/iio/adc/ti-ads124s08.c | 2 +-
drivers/iio/adc/ti-ads8688.c | 2 +-
drivers/iio/dac/ds4424.c | 2 +-
drivers/media/usb/siano/smsusb.c | 33 +++--
.../wireless/broadcom/brcm80211/brcmfmac/bcdc.c | 11 +-
.../wireless/broadcom/brcm80211/brcmfmac/bcdc.h | 6 +-
.../wireless/broadcom/brcm80211/brcmfmac/core.c | 4 +-
.../broadcom/brcm80211/brcmfmac/fwsignal.c | 16 ++-
.../broadcom/brcm80211/brcmfmac/fwsignal.h | 3 +-
.../wireless/broadcom/brcm80211/brcmfmac/proto.c | 10 +-
.../wireless/broadcom/brcm80211/brcmfmac/proto.h | 3 +-
drivers/s390/scsi/zfcp_ext.h | 1 +
drivers/s390/scsi/zfcp_scsi.c | 9 ++
drivers/s390/scsi/zfcp_sysfs.c | 55 +++++++-
drivers/s390/scsi/zfcp_unit.c | 8 +-
.../interface/vchiq_arm/vchiq_2835_arm.c | 9 ++
drivers/staging/wlan-ng/hfa384x_usb.c | 3 +-
drivers/tty/serial/max310x.c | 2 +-
drivers/tty/serial/msm_serial.c | 5 +-
drivers/tty/serial/sh-sci.c | 7 +
drivers/tty/vt/vt.c | 11 +-
drivers/usb/core/config.c | 4 +-
drivers/usb/core/quirks.c | 3 +
drivers/usb/host/xhci-ring.c | 17 ++-
drivers/usb/host/xhci.c | 24 ++--
drivers/usb/misc/rio500.c | 41 ++++--
drivers/usb/misc/sisusbvga/sisusb.c | 15 +-
drivers/usb/usbip/stub_dev.c | 75 +++++++---
drivers/video/fbdev/core/fbcon.c | 2 +-
fs/btrfs/inode.c | 14 +-
fs/btrfs/qgroup.c | 8 +-
fs/btrfs/relocation.c | 27 ++--
fs/btrfs/send.c | 6 +
fs/btrfs/tree-log.c | 20 +--
fs/btrfs/zstd.c | 20 +--
fs/cifs/file.c | 4 +-
fs/cifs/smb2pdu.c | 3 +-
fs/lockd/xdr.c | 4 +-
fs/lockd/xdr4.c | 4 +-
include/linux/bitops.h | 16 +--
include/linux/cgroup-defs.h | 5 +
include/linux/list_lru.h | 1 +
include/linux/memcontrol.h | 10 +-
kernel/cgroup/cgroup.c | 16 ++-
kernel/signal.c | 2 +
kernel/trace/trace_events_filter.c | 8 +-
mm/compaction.c | 2 +-
mm/kasan/common.c | 2 +-
mm/list_lru.c | 8 +-
scripts/gcc-plugins/gcc-common.h | 4 +
security/integrity/evm/evm_crypto.c | 3 +
security/integrity/ima/ima_policy.c | 28 ++--
sound/pci/hda/patch_realtek.c | 18 ++-
sound/usb/line6/driver.c | 12 ++
sound/usb/line6/driver.h | 4 +
sound/usb/line6/toneport.c | 15 +-
virt/kvm/arm/arm.c | 3 +
virt/kvm/kvm_main.c | 2 -
108 files changed, 913 insertions(+), 346 deletions(-)



2019-06-07 18:24:08

by Greg Kroah-Hartman

[permalink] [raw]
Subject: [PATCH 5.1 16/85] media: smsusb: better handle optional alignment

From: Mauro Carvalho Chehab <[email protected]>

commit a47686636d84eaec5c9c6e84bd5f96bed34d526d upstream.

Most Siano devices require an alignment for the response.

Changeset f3be52b0056a ("media: usb: siano: Fix general protection fault in smsusb")
changed the logic with gets such aligment, but it now produces a
sparce warning:

drivers/media/usb/siano/smsusb.c: In function 'smsusb_init_device':
drivers/media/usb/siano/smsusb.c:447:37: warning: 'in_maxp' may be used uninitialized in this function [-Wmaybe-uninitialized]
447 | dev->response_alignment = in_maxp - sizeof(struct sms_msg_hdr);
| ~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~

The sparse message itself is bogus, but a broken (or fake) USB
eeprom could produce a negative value for response_alignment.

So, change the code in order to check if the result is not
negative.

Fixes: 31e0456de5be ("media: usb: siano: Fix general protection fault in smsusb")
CC: <[email protected]>
Signed-off-by: Mauro Carvalho Chehab <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>

---
drivers/media/usb/siano/smsusb.c | 8 ++++----
1 file changed, 4 insertions(+), 4 deletions(-)

--- a/drivers/media/usb/siano/smsusb.c
+++ b/drivers/media/usb/siano/smsusb.c
@@ -400,7 +400,7 @@ static int smsusb_init_device(struct usb
struct smsusb_device_t *dev;
void *mdev;
int i, rc;
- int in_maxp = 0;
+ int align = 0;

/* create device object */
dev = kzalloc(sizeof(struct smsusb_device_t), GFP_KERNEL);
@@ -418,14 +418,14 @@ static int smsusb_init_device(struct usb

if (desc->bEndpointAddress & USB_DIR_IN) {
dev->in_ep = desc->bEndpointAddress;
- in_maxp = usb_endpoint_maxp(desc);
+ align = usb_endpoint_maxp(desc) - sizeof(struct sms_msg_hdr);
} else {
dev->out_ep = desc->bEndpointAddress;
}
}

pr_debug("in_ep = %02x, out_ep = %02x\n", dev->in_ep, dev->out_ep);
- if (!dev->in_ep || !dev->out_ep) { /* Missing endpoints? */
+ if (!dev->in_ep || !dev->out_ep || align < 0) { /* Missing endpoints? */
smsusb_term_device(intf);
return -ENODEV;
}
@@ -444,7 +444,7 @@ static int smsusb_init_device(struct usb
/* fall-thru */
default:
dev->buffer_size = USB2_BUFFER_SIZE;
- dev->response_alignment = in_maxp - sizeof(struct sms_msg_hdr);
+ dev->response_alignment = align;

params.flags |= SMS_DEVICE_FAMILY2;
break;


2019-06-07 18:24:08

by Greg Kroah-Hartman

[permalink] [raw]
Subject: [PATCH 5.1 51/85] kernel/signal.c: trace_signal_deliver when signal_group_exit

From: Zhenliang Wei <[email protected]>

commit 98af37d624ed8c83f1953b1b6b2f6866011fc064 upstream.

In the fixes commit, removing SIGKILL from each thread signal mask and
executing "goto fatal" directly will skip the call to
"trace_signal_deliver". At this point, the delivery tracking of the
SIGKILL signal will be inaccurate.

Therefore, we need to add trace_signal_deliver before "goto fatal" after
executing sigdelset.

Note: SEND_SIG_NOINFO matches the fact that SIGKILL doesn't have any info.

Link: http://lkml.kernel.org/r/[email protected]
Fixes: cf43a757fd4944 ("signal: Restore the stop PTRACE_EVENT_EXIT")
Signed-off-by: Zhenliang Wei <[email protected]>
Reviewed-by: Christian Brauner <[email protected]>
Reviewed-by: Oleg Nesterov <[email protected]>
Cc: Eric W. Biederman <[email protected]>
Cc: Ivan Delalande <[email protected]>
Cc: Arnd Bergmann <[email protected]>
Cc: Thomas Gleixner <[email protected]>
Cc: Deepa Dinamani <[email protected]>
Cc: Greg Kroah-Hartman <[email protected]>
Cc: <[email protected]>
Signed-off-by: Andrew Morton <[email protected]>
Signed-off-by: Linus Torvalds <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>

---
kernel/signal.c | 2 ++
1 file changed, 2 insertions(+)

--- a/kernel/signal.c
+++ b/kernel/signal.c
@@ -2441,6 +2441,8 @@ relock:
if (signal_group_exit(signal)) {
ksig->info.si_signo = signr = SIGKILL;
sigdelset(&current->pending.signal, SIGKILL);
+ trace_signal_deliver(SIGKILL, SEND_SIG_NOINFO,
+ &sighand->action[SIGKILL - 1]);
recalc_sigpending();
goto fatal;
}


2019-06-07 18:24:10

by Greg Kroah-Hartman

[permalink] [raw]
Subject: [PATCH 5.1 04/85] xhci: Use %zu for printing size_t type

From: Fabio Estevam <[email protected]>

commit c1a145a3ed9a40f3b6145feb97789e8eb49c5566 upstream.

Commit 597c56e372da ("xhci: update bounce buffer with correct sg num")
caused the following build warnings:

drivers/usb/host/xhci-ring.c:676:19: warning: format '%ld' expects argument of type 'long int', but argument 3 has type 'size_t {aka unsigned int}' [-Wformat=]

Use %zu for printing size_t type in order to fix the warnings.

Fixes: 597c56e372da ("xhci: update bounce buffer with correct sg num")
Reported-by: kbuild test robot <[email protected]>
Signed-off-by: Fabio Estevam <[email protected]>
Cc: stable <[email protected]>
Acked-by: Mathias Nyman <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>

---
drivers/usb/host/xhci-ring.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)

--- a/drivers/usb/host/xhci-ring.c
+++ b/drivers/usb/host/xhci-ring.c
@@ -673,7 +673,7 @@ static void xhci_unmap_td_bounce_buffer(
len = sg_pcopy_from_buffer(urb->sg, urb->num_sgs, seg->bounce_buf,
seg->bounce_len, seg->bounce_offs);
if (len != seg->bounce_len)
- xhci_warn(xhci, "WARN Wrong bounce buffer read length: %ld != %d\n",
+ xhci_warn(xhci, "WARN Wrong bounce buffer read length: %zu != %d\n",
len, seg->bounce_len);
seg->bounce_len = 0;
seg->bounce_offs = 0;
@@ -3162,7 +3162,7 @@ static int xhci_align_td(struct xhci_hcd
seg->bounce_buf, new_buff_len, enqd_len);
if (len != seg->bounce_len)
xhci_warn(xhci,
- "WARN Wrong bounce buffer write length: %ld != %d\n",
+ "WARN Wrong bounce buffer write length: %zu != %d\n",
len, seg->bounce_len);
seg->bounce_dma = dma_map_single(dev, seg->bounce_buf,
max_pkt, DMA_TO_DEVICE);


2019-06-07 18:24:26

by Greg Kroah-Hartman

[permalink] [raw]
Subject: [PATCH 5.1 32/85] s390/crypto: fix gcm-aes-s390 selftest failures

From: Harald Freudenberger <[email protected]>

commit bef9f0ba300a55d79a69aa172156072182176515 upstream.

The current kernel uses improved crypto selftests. These
tests showed that the current implementation of gcm-aes-s390
is not able to deal with chunks of output buffers which are
not a multiple of 16 bytes. This patch introduces a rework
of the gcm aes s390 scatter walk handling which now is able
to handle any input and output scatter list chunk sizes
correctly.

Code has been verified by the crypto selftests, the tcrypt
kernel module and additional tests ran via the af_alg interface.

Cc: <[email protected]>
Reported-by: Julian Wiedmann <[email protected]>
Reviewed-by: Patrick Steuer <[email protected]>
Signed-off-by: Harald Freudenberger <[email protected]>
Signed-off-by: Heiko Carstens <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>

---
arch/s390/crypto/aes_s390.c | 148 +++++++++++++++++++++++++++++++-------------
1 file changed, 107 insertions(+), 41 deletions(-)

--- a/arch/s390/crypto/aes_s390.c
+++ b/arch/s390/crypto/aes_s390.c
@@ -826,19 +826,45 @@ static int gcm_aes_setauthsize(struct cr
return 0;
}

-static void gcm_sg_walk_start(struct gcm_sg_walk *gw, struct scatterlist *sg,
- unsigned int len)
+static void gcm_walk_start(struct gcm_sg_walk *gw, struct scatterlist *sg,
+ unsigned int len)
{
memset(gw, 0, sizeof(*gw));
gw->walk_bytes_remain = len;
scatterwalk_start(&gw->walk, sg);
}

-static int gcm_sg_walk_go(struct gcm_sg_walk *gw, unsigned int minbytesneeded)
+static inline unsigned int _gcm_sg_clamp_and_map(struct gcm_sg_walk *gw)
+{
+ struct scatterlist *nextsg;
+
+ gw->walk_bytes = scatterwalk_clamp(&gw->walk, gw->walk_bytes_remain);
+ while (!gw->walk_bytes) {
+ nextsg = sg_next(gw->walk.sg);
+ if (!nextsg)
+ return 0;
+ scatterwalk_start(&gw->walk, nextsg);
+ gw->walk_bytes = scatterwalk_clamp(&gw->walk,
+ gw->walk_bytes_remain);
+ }
+ gw->walk_ptr = scatterwalk_map(&gw->walk);
+ return gw->walk_bytes;
+}
+
+static inline void _gcm_sg_unmap_and_advance(struct gcm_sg_walk *gw,
+ unsigned int nbytes)
+{
+ gw->walk_bytes_remain -= nbytes;
+ scatterwalk_unmap(&gw->walk);
+ scatterwalk_advance(&gw->walk, nbytes);
+ scatterwalk_done(&gw->walk, 0, gw->walk_bytes_remain);
+ gw->walk_ptr = NULL;
+}
+
+static int gcm_in_walk_go(struct gcm_sg_walk *gw, unsigned int minbytesneeded)
{
int n;

- /* minbytesneeded <= AES_BLOCK_SIZE */
if (gw->buf_bytes && gw->buf_bytes >= minbytesneeded) {
gw->ptr = gw->buf;
gw->nbytes = gw->buf_bytes;
@@ -851,13 +877,11 @@ static int gcm_sg_walk_go(struct gcm_sg_
goto out;
}

- gw->walk_bytes = scatterwalk_clamp(&gw->walk, gw->walk_bytes_remain);
- if (!gw->walk_bytes) {
- scatterwalk_start(&gw->walk, sg_next(gw->walk.sg));
- gw->walk_bytes = scatterwalk_clamp(&gw->walk,
- gw->walk_bytes_remain);
+ if (!_gcm_sg_clamp_and_map(gw)) {
+ gw->ptr = NULL;
+ gw->nbytes = 0;
+ goto out;
}
- gw->walk_ptr = scatterwalk_map(&gw->walk);

if (!gw->buf_bytes && gw->walk_bytes >= minbytesneeded) {
gw->ptr = gw->walk_ptr;
@@ -869,51 +893,90 @@ static int gcm_sg_walk_go(struct gcm_sg_
n = min(gw->walk_bytes, AES_BLOCK_SIZE - gw->buf_bytes);
memcpy(gw->buf + gw->buf_bytes, gw->walk_ptr, n);
gw->buf_bytes += n;
- gw->walk_bytes_remain -= n;
- scatterwalk_unmap(&gw->walk);
- scatterwalk_advance(&gw->walk, n);
- scatterwalk_done(&gw->walk, 0, gw->walk_bytes_remain);
-
+ _gcm_sg_unmap_and_advance(gw, n);
if (gw->buf_bytes >= minbytesneeded) {
gw->ptr = gw->buf;
gw->nbytes = gw->buf_bytes;
goto out;
}
-
- gw->walk_bytes = scatterwalk_clamp(&gw->walk,
- gw->walk_bytes_remain);
- if (!gw->walk_bytes) {
- scatterwalk_start(&gw->walk, sg_next(gw->walk.sg));
- gw->walk_bytes = scatterwalk_clamp(&gw->walk,
- gw->walk_bytes_remain);
+ if (!_gcm_sg_clamp_and_map(gw)) {
+ gw->ptr = NULL;
+ gw->nbytes = 0;
+ goto out;
}
- gw->walk_ptr = scatterwalk_map(&gw->walk);
}

out:
return gw->nbytes;
}

-static void gcm_sg_walk_done(struct gcm_sg_walk *gw, unsigned int bytesdone)
+static int gcm_out_walk_go(struct gcm_sg_walk *gw, unsigned int minbytesneeded)
{
- int n;
+ if (gw->walk_bytes_remain == 0) {
+ gw->ptr = NULL;
+ gw->nbytes = 0;
+ goto out;
+ }
+
+ if (!_gcm_sg_clamp_and_map(gw)) {
+ gw->ptr = NULL;
+ gw->nbytes = 0;
+ goto out;
+ }

+ if (gw->walk_bytes >= minbytesneeded) {
+ gw->ptr = gw->walk_ptr;
+ gw->nbytes = gw->walk_bytes;
+ goto out;
+ }
+
+ scatterwalk_unmap(&gw->walk);
+ gw->walk_ptr = NULL;
+
+ gw->ptr = gw->buf;
+ gw->nbytes = sizeof(gw->buf);
+
+out:
+ return gw->nbytes;
+}
+
+static int gcm_in_walk_done(struct gcm_sg_walk *gw, unsigned int bytesdone)
+{
if (gw->ptr == NULL)
- return;
+ return 0;

if (gw->ptr == gw->buf) {
- n = gw->buf_bytes - bytesdone;
+ int n = gw->buf_bytes - bytesdone;
if (n > 0) {
memmove(gw->buf, gw->buf + bytesdone, n);
- gw->buf_bytes -= n;
+ gw->buf_bytes = n;
} else
gw->buf_bytes = 0;
- } else {
- gw->walk_bytes_remain -= bytesdone;
- scatterwalk_unmap(&gw->walk);
- scatterwalk_advance(&gw->walk, bytesdone);
- scatterwalk_done(&gw->walk, 0, gw->walk_bytes_remain);
- }
+ } else
+ _gcm_sg_unmap_and_advance(gw, bytesdone);
+
+ return bytesdone;
+}
+
+static int gcm_out_walk_done(struct gcm_sg_walk *gw, unsigned int bytesdone)
+{
+ int i, n;
+
+ if (gw->ptr == NULL)
+ return 0;
+
+ if (gw->ptr == gw->buf) {
+ for (i = 0; i < bytesdone; i += n) {
+ if (!_gcm_sg_clamp_and_map(gw))
+ return i;
+ n = min(gw->walk_bytes, bytesdone - i);
+ memcpy(gw->walk_ptr, gw->buf + i, n);
+ _gcm_sg_unmap_and_advance(gw, n);
+ }
+ } else
+ _gcm_sg_unmap_and_advance(gw, bytesdone);
+
+ return bytesdone;
}

static int gcm_aes_crypt(struct aead_request *req, unsigned int flags)
@@ -926,7 +989,7 @@ static int gcm_aes_crypt(struct aead_req
unsigned int pclen = req->cryptlen;
int ret = 0;

- unsigned int len, in_bytes, out_bytes,
+ unsigned int n, len, in_bytes, out_bytes,
min_bytes, bytes, aad_bytes, pc_bytes;
struct gcm_sg_walk gw_in, gw_out;
u8 tag[GHASH_DIGEST_SIZE];
@@ -963,14 +1026,14 @@ static int gcm_aes_crypt(struct aead_req
*(u32 *)(param.j0 + ivsize) = 1;
memcpy(param.k, ctx->key, ctx->key_len);

- gcm_sg_walk_start(&gw_in, req->src, len);
- gcm_sg_walk_start(&gw_out, req->dst, len);
+ gcm_walk_start(&gw_in, req->src, len);
+ gcm_walk_start(&gw_out, req->dst, len);

do {
min_bytes = min_t(unsigned int,
aadlen > 0 ? aadlen : pclen, AES_BLOCK_SIZE);
- in_bytes = gcm_sg_walk_go(&gw_in, min_bytes);
- out_bytes = gcm_sg_walk_go(&gw_out, min_bytes);
+ in_bytes = gcm_in_walk_go(&gw_in, min_bytes);
+ out_bytes = gcm_out_walk_go(&gw_out, min_bytes);
bytes = min(in_bytes, out_bytes);

if (aadlen + pclen <= bytes) {
@@ -997,8 +1060,11 @@ static int gcm_aes_crypt(struct aead_req
gw_in.ptr + aad_bytes, pc_bytes,
gw_in.ptr, aad_bytes);

- gcm_sg_walk_done(&gw_in, aad_bytes + pc_bytes);
- gcm_sg_walk_done(&gw_out, aad_bytes + pc_bytes);
+ n = aad_bytes + pc_bytes;
+ if (gcm_in_walk_done(&gw_in, n) != n)
+ return -ENOMEM;
+ if (gcm_out_walk_done(&gw_out, n) != n)
+ return -ENOMEM;
aadlen -= aad_bytes;
pclen -= pc_bytes;
} while (aadlen + pclen > 0);


2019-06-07 18:25:29

by Greg Kroah-Hartman

[permalink] [raw]
Subject: [PATCH 5.1 63/85] vt/fbcon: deinitialize resources in visual_init() after failed memory allocation

From: Grzegorz Halat <[email protected]>

commit a1ad1cc9704f64c169261a76e1aee1cf1ae51832 upstream.

After memory allocation failure vc_allocate() doesn't clean up data
which has been initialized in visual_init(). In case of fbcon this
leads to divide-by-0 in fbcon_init() on next open of the same tty.

memory allocation in vc_allocate() may fail here:
1097: vc->vc_screenbuf = kzalloc(vc->vc_screenbuf_size, GFP_KERNEL);

on next open() fbcon_init() skips vc_font.data initialization:
1088: if (!p->fontdata) {

division by zero in fbcon_init() happens here:
1149: new_cols /= vc->vc_font.width;

Additional check is needed in fbcon_deinit() to prevent
usage of uninitialized vc_screenbuf:

1251: if (vc->vc_hi_font_mask && vc->vc_screenbuf)
1252: set_vc_hi_font(vc, false);

Crash:

#6 [ffffc90001eafa60] divide_error at ffffffff81a00be4
[exception RIP: fbcon_init+463]
RIP: ffffffff814b860f RSP: ffffc90001eafb18 RFLAGS: 00010246
...
#7 [ffffc90001eafb60] visual_init at ffffffff8154c36e
#8 [ffffc90001eafb80] vc_allocate at ffffffff8154f53c
#9 [ffffc90001eafbc8] con_install at ffffffff8154f624
...

Signed-off-by: Grzegorz Halat <[email protected]>
Reviewed-by: Oleksandr Natalenko <[email protected]>
Acked-by: Bartlomiej Zolnierkiewicz <[email protected]>
Cc: stable <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>

---
drivers/tty/vt/vt.c | 11 +++++++++--
drivers/video/fbdev/core/fbcon.c | 2 +-
2 files changed, 10 insertions(+), 3 deletions(-)

--- a/drivers/tty/vt/vt.c
+++ b/drivers/tty/vt/vt.c
@@ -1056,6 +1056,13 @@ static void visual_init(struct vc_data *
vc->vc_screenbuf_size = vc->vc_rows * vc->vc_size_row;
}

+
+static void visual_deinit(struct vc_data *vc)
+{
+ vc->vc_sw->con_deinit(vc);
+ module_put(vc->vc_sw->owner);
+}
+
int vc_allocate(unsigned int currcons) /* return 0 on success */
{
struct vt_notifier_param param;
@@ -1103,6 +1110,7 @@ int vc_allocate(unsigned int currcons) /

return 0;
err_free:
+ visual_deinit(vc);
kfree(vc);
vc_cons[currcons].d = NULL;
return -ENOMEM;
@@ -1331,9 +1339,8 @@ struct vc_data *vc_deallocate(unsigned i
param.vc = vc = vc_cons[currcons].d;
atomic_notifier_call_chain(&vt_notifier_list, VT_DEALLOCATE, &param);
vcs_remove_sysfs(currcons);
- vc->vc_sw->con_deinit(vc);
+ visual_deinit(vc);
put_pid(vc->vt_pid);
- module_put(vc->vc_sw->owner);
vc_uniscr_set(vc, NULL);
kfree(vc->vc_screenbuf);
vc_cons[currcons].d = NULL;
--- a/drivers/video/fbdev/core/fbcon.c
+++ b/drivers/video/fbdev/core/fbcon.c
@@ -1248,7 +1248,7 @@ finished:
if (free_font)
vc->vc_font.data = NULL;

- if (vc->vc_hi_font_mask)
+ if (vc->vc_hi_font_mask && vc->vc_screenbuf)
set_vc_hi_font(vc, false);

if (!con_is_bound(&fb_con))


2019-06-07 18:33:36

by Greg Kroah-Hartman

[permalink] [raw]
Subject: [PATCH 5.1 64/85] serial: sh-sci: disable DMA for uart_console

From: George G. Davis <[email protected]>

commit 099506cbbc79c0bd52b19cb6b930f256dabc3950 upstream.

As noted in commit 84b40e3b57ee ("serial: 8250: omap: Disable DMA for
console UART"), UART console lines use low-level PIO only access functions
which will conflict with use of the line when DMA is enabled, e.g. when
the console line is also used for systemd messages. So disable DMA
support for UART console lines.

Reported-by: Michael Rodin <[email protected]>
Link: https://patchwork.kernel.org/patch/10929511/
Tested-by: Eugeniu Rosca <[email protected]>
Reviewed-by: Simon Horman <[email protected]>
Reviewed-by: Wolfram Sang <[email protected]>
Reviewed-by: Geert Uytterhoeven <[email protected]>
Cc: [email protected]
Signed-off-by: George G. Davis <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>

---
drivers/tty/serial/sh-sci.c | 7 +++++++
1 file changed, 7 insertions(+)

--- a/drivers/tty/serial/sh-sci.c
+++ b/drivers/tty/serial/sh-sci.c
@@ -1557,6 +1557,13 @@ static void sci_request_dma(struct uart_

dev_dbg(port->dev, "%s: port %d\n", __func__, port->line);

+ /*
+ * DMA on console may interfere with Kernel log messages which use
+ * plain putchar(). So, simply don't use it with a console.
+ */
+ if (uart_console(port))
+ return;
+
if (!port->dev->of_node)
return;



2019-06-07 19:12:57

by Greg Kroah-Hartman

[permalink] [raw]
Subject: [PATCH 5.1 70/85] gcc-plugins: Fix build failures under Darwin host

From: Kees Cook <[email protected]>

commit 7210e060155b9cf557fb13128353c3e494fa5ed3 upstream.

The gcc-common.h file did not take into account certain macros that
might have already been defined in the build environment. This updates
the header to avoid redefining the macros, as seen on a Darwin host
using gcc 4.9.2:

HOSTCXX -fPIC scripts/gcc-plugins/arm_ssp_per_task_plugin.o - due to: scripts/gcc-plugins/gcc-common.h
In file included from scripts/gcc-plugins/arm_ssp_per_task_plugin.c:3:0:
scripts/gcc-plugins/gcc-common.h:153:0: warning: "__unused" redefined
^
In file included from /usr/include/stdio.h:64:0,
from /Users/hns/Documents/Projects/QuantumSTEP/System/Library/Frameworks/System.framework/Versions-jessie/x86_64-apple-darwin15.0.0/gcc/arm-linux-gnueabi/bin/../lib/gcc/arm-linux-gnueabi/4.9.2/plugin/include/system.h:40,
from /Users/hns/Documents/Projects/QuantumSTEP/System/Library/Frameworks/System.framework/Versions-jessie/x86_64-apple-darwin15.0.0/gcc/arm-linux-gnueabi/bin/../lib/gcc/arm-linux-gnueabi/4.9.2/plugin/include/gcc-plugin.h:28,
from /Users/hns/Documents/Projects/QuantumSTEP/System/Library/Frameworks/System.framework/Versions-jessie/x86_64-apple-darwin15.0.0/gcc/arm-linux-gnueabi/bin/../lib/gcc/arm-linux-gnueabi/4.9.2/plugin/include/plugin.h:23,
from scripts/gcc-plugins/gcc-common.h:9,
from scripts/gcc-plugins/arm_ssp_per_task_plugin.c:3:
/usr/include/sys/cdefs.h:161:0: note: this is the location of the previous definition
^

Reported-and-tested-by: "H. Nikolaus Schaller" <[email protected]>
Fixes: 189af4657186 ("ARM: smp: add support for per-task stack canaries")
Cc: [email protected]
Signed-off-by: Kees Cook <[email protected]>
Signed-off-by: Greg Kroah-Hartman <[email protected]>

---
scripts/gcc-plugins/gcc-common.h | 4 ++++
1 file changed, 4 insertions(+)

--- a/scripts/gcc-plugins/gcc-common.h
+++ b/scripts/gcc-plugins/gcc-common.h
@@ -150,8 +150,12 @@ void print_gimple_expr(FILE *, gimple, i
void dump_gimple_stmt(pretty_printer *, gimple, int, int);
#endif

+#ifndef __unused
#define __unused __attribute__((__unused__))
+#endif
+#ifndef __visible
#define __visible __attribute__((visibility("default")))
+#endif

#define DECL_NAME_POINTER(node) IDENTIFIER_POINTER(DECL_NAME(node))
#define DECL_NAME_LENGTH(node) IDENTIFIER_LENGTH(DECL_NAME(node))


2019-06-07 19:12:57

by Greg Kroah-Hartman

[permalink] [raw]
Subject: [PATCH 5.1 85/85] x86/kprobes: Set instruction page as executable

[ Upstream commit 7298e24f904224fa79eb8fd7e0fbd78950ccf2db ]

Set the page as executable after allocation. This patch is a
preparatory patch for a following patch that makes module allocated
pages non-executable.

While at it, do some small cleanup of what appears to be unnecessary
masking.

Signed-off-by: Nadav Amit <[email protected]>
Signed-off-by: Rick Edgecombe <[email protected]>
Signed-off-by: Peter Zijlstra (Intel) <[email protected]>
Cc: <[email protected]>
Cc: <[email protected]>
Cc: <[email protected]>
Cc: <[email protected]>
Cc: <[email protected]>
Cc: <[email protected]>
Cc: <[email protected]>
Cc: Andy Lutomirski <[email protected]>
Cc: Borislav Petkov <[email protected]>
Cc: Dave Hansen <[email protected]>
Cc: H. Peter Anvin <[email protected]>
Cc: Linus Torvalds <[email protected]>
Cc: Rik van Riel <[email protected]>
Cc: Thomas Gleixner <[email protected]>
Link: https://lkml.kernel.org/r/[email protected]
Signed-off-by: Ingo Molnar <[email protected]>
Signed-off-by: Sasha Levin <[email protected]>
---
arch/x86/kernel/kprobes/core.c | 24 ++++++++++++++++++++----
1 file changed, 20 insertions(+), 4 deletions(-)

diff --git a/arch/x86/kernel/kprobes/core.c b/arch/x86/kernel/kprobes/core.c
index fed46ddb1eef..06058c44ab57 100644
--- a/arch/x86/kernel/kprobes/core.c
+++ b/arch/x86/kernel/kprobes/core.c
@@ -431,8 +431,20 @@ void *alloc_insn_page(void)
void *page;

page = module_alloc(PAGE_SIZE);
- if (page)
- set_memory_ro((unsigned long)page & PAGE_MASK, 1);
+ if (!page)
+ return NULL;
+
+ /*
+ * First make the page read-only, and only then make it executable to
+ * prevent it from being W+X in between.
+ */
+ set_memory_ro((unsigned long)page, 1);
+
+ /*
+ * TODO: Once additional kernel code protection mechanisms are set, ensure
+ * that the page was not maliciously altered and it is still zeroed.
+ */
+ set_memory_x((unsigned long)page, 1);

return page;
}
@@ -440,8 +452,12 @@ void *alloc_insn_page(void)
/* Recover page to RW mode before releasing it */
void free_insn_page(void *page)
{
- set_memory_nx((unsigned long)page & PAGE_MASK, 1);
- set_memory_rw((unsigned long)page & PAGE_MASK, 1);
+ /*
+ * First make the page non-executable, and only then make it writable to
+ * prevent it from being W+X in between.
+ */
+ set_memory_nx((unsigned long)page, 1);
+ set_memory_rw((unsigned long)page, 1);
module_memfree(page);
}

--
2.20.1



2019-06-07 20:07:30

by kernelci.org bot

[permalink] [raw]
Subject: Re: [PATCH 5.1 00/85] 5.1.8-stable review

stable-rc/linux-5.1.y boot: 131 boots: 1 failed, 117 passed with 12 offline, 1 conflict (v5.1.7-86-g0765c25688d0)

Full Boot Summary: https://kernelci.org/boot/all/job/stable-rc/branch/linux-5.1.y/kernel/v5.1.7-86-g0765c25688d0/
Full Build Summary: https://kernelci.org/build/stable-rc/branch/linux-5.1.y/kernel/v5.1.7-86-g0765c25688d0/

Tree: stable-rc
Branch: linux-5.1.y
Git Describe: v5.1.7-86-g0765c25688d0
Git Commit: 0765c25688d0a4d2e117d61e5771cea2fff45a98
Git URL: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git
Tested: 74 unique boards, 23 SoC families, 14 builds out of 209

Boot Regressions Detected:

arm64:

defconfig:
gcc-8:
meson-gxl-s905x-khadas-vim:
lab-baylibre-seattle: new failure (last pass: v5.1.7)

Boot Failure Detected:

arm:
multi_v7_defconfig:
gcc-8:
bcm4708-smartrg-sr400ac: 1 failed lab

Offline Platforms:

arm:

bcm2835_defconfig:
gcc-8
bcm2835-rpi-b: 1 offline lab

sama5_defconfig:
gcc-8
at91-sama5d4_xplained: 1 offline lab
at91-sama5d4ek: 1 offline lab

multi_v7_defconfig:
gcc-8
alpine-db: 1 offline lab
at91-sama5d4_xplained: 1 offline lab
at91-sama5d4ek: 1 offline lab
sun5i-r8-chip: 1 offline lab

sunxi_defconfig:
gcc-8
sun5i-r8-chip: 1 offline lab

davinci_all_defconfig:
gcc-8
dm365evm,legacy: 1 offline lab

arm64:

defconfig:
gcc-8
apq8016-sbc: 1 offline lab
juno-r2: 1 offline lab
mt7622-rfb1: 1 offline lab

Conflicting Boot Failure Detected: (These likely are not failures as other labs are reporting PASS. Needs review.)

arm64:
defconfig:
meson-gxl-s905x-khadas-vim:
lab-baylibre-seattle: FAIL (gcc-8)
lab-baylibre: PASS (gcc-8)

---
For more info write to <[email protected]>

2019-06-07 20:30:54

by Jiunn Chang

[permalink] [raw]
Subject: Re: [PATCH 5.1 00/85] 5.1.8-stable review

On Fri, Jun 07, 2019 at 05:38:45PM +0200, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 5.1.8 release.
> There are 85 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me know.
>
> Responses should be made by Sun 09 Jun 2019 03:37:09 PM UTC.
> Anything received after that time might be too late.
>
> The whole patch series can be found in one patch at:
> https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.1.8-rc1.gz
> or in the git tree and branch at:
> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.1.y
> and the diffstat can be found below.
>
> thanks,
>
> greg k-h
>
> -------------

Compiled and booted. No regessions on x86_64.

THX

2019-06-08 07:57:29

by Naresh Kamboju

[permalink] [raw]
Subject: Re: [PATCH 5.1 00/85] 5.1.8-stable review

On Fri, 7 Jun 2019 at 21:18, Greg Kroah-Hartman
<[email protected]> wrote:
>
> This is the start of the stable review cycle for the 5.1.8 release.
> There are 85 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me know.
>
> Responses should be made by Sun 09 Jun 2019 03:37:09 PM UTC.
> Anything received after that time might be too late.
>
> The whole patch series can be found in one patch at:
> https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.1.8-rc1.gz
> or in the git tree and branch at:
> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.1.y
> and the diffstat can be found below.
>
> thanks,
>
> greg k-h
>

Results from Linaro’s test farm.
No regressions on arm64, arm, x86_64, and i386.

NOTE:
selftest sources version updated to 5.1
Following test cases reported pass after upgrade
kselftest:
* bpf_test_libbpf.sh
* bpf_test_select_reuseport
* bpf_test_tcpbpf_user
* bpf_test_verifier
* seccomp_seccomp_bpf
* timers_set-timer-lat

Few kselftest test cases reported failure and we are investigating.
* bpf_test_netcnt
* net_ip_defrag.sh
* net_xfrm_policy.sh
* timestamping_txtimestamp.sh
* tpm2_test_smoke.sh
* tpm2_test_space.sh
* ...

LTP version upgrade to 20190517
New test case tgkill03 is an intermittent failure reported on qemu devices.
Following test cases reported failures and we are investigating
* ioctl_ns05
* ioctl_ns06
* aio02
* acct01

Summary
------------------------------------------------------------------------

kernel: 5.1.8-rc1
git repo: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git
git branch: linux-5.1.y
git commit: cef30fd8e063aacee3601ac8df2c4d1c5980b759
git describe: v5.1.7-86-gcef30fd8e063
Test details: https://qa-reports.linaro.org/lkft/linux-stable-rc-5.1-oe/build/v5.1.7-86-gcef30fd8e063

No regressions (compared to build v5.1.7)


Fixes (compared to build v5.1.7)
------------------------------------------------------------------------
kselftest:
* bpf_test_libbpf.sh
* bpf_test_select_reuseport
* bpf_test_tcpbpf_user
* bpf_test_verifier
* seccomp_seccomp_bpf
* timers_set-timer-lat

Ran 16135 total tests in the following environments and test suites.

Environments
--------------
- dragonboard-410c
- hi6220-hikey
- i386
- juno-r2
- qemu_arm
- qemu_arm64
- qemu_i386
- qemu_x86_64
- x15
- x86

Test Suites
-----------
* build
* install-android-platform-tools-r2600
* kselftest
* libgpiod
* libhugetlbfs
* ltp-cap_bounds-tests
* ltp-commands-tests
* ltp-containers-tests
* ltp-cpuhotplug-tests
* ltp-cve-tests
* ltp-dio-tests
* ltp-fcntl-locktests-tests
* ltp-filecaps-tests
* ltp-fs_bind-tests
* ltp-fs_perms_simple-tests
* ltp-fsx-tests
* ltp-hugetlb-tests
* ltp-io-tests
* ltp-ipc-tests
* ltp-math-tests
* ltp-mm-tests
* ltp-nptl-tests
* ltp-pty-tests
* ltp-sched-tests
* ltp-securebits-tests
* ltp-syscalls-tests
* ltp-timers-tests
* network-basic-tests
* perf
* spectre-meltdown-checker-test
* v4l2-compliance
* ltp-fs-tests
* ltp-open-posix-tests
* kselftest-vsyscall-mode-native
* kselftest-vsyscall-mode-none
* kvm-unit-tests

--
Linaro LKFT
https://lkft.linaro.org

2019-06-08 09:33:54

by Greg Kroah-Hartman

[permalink] [raw]
Subject: Re: [PATCH 5.1 00/85] 5.1.8-stable review

On Fri, Jun 07, 2019 at 03:19:17PM -0500, Jiunn Chang wrote:
> On Fri, Jun 07, 2019 at 05:38:45PM +0200, Greg Kroah-Hartman wrote:
> > This is the start of the stable review cycle for the 5.1.8 release.
> > There are 85 patches in this series, all will be posted as a response
> > to this one. If anyone has any issues with these being applied, please
> > let me know.
> >
> > Responses should be made by Sun 09 Jun 2019 03:37:09 PM UTC.
> > Anything received after that time might be too late.
> >
> > The whole patch series can be found in one patch at:
> > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.1.8-rc1.gz
> > or in the git tree and branch at:
> > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.1.y
> > and the diffstat can be found below.
> >
> > thanks,
> >
> > greg k-h
> >
> > -------------
>
> Compiled and booted. No regessions on x86_64.

thanks for testing and letting me know.

greg k-h

2019-06-08 09:35:45

by Greg Kroah-Hartman

[permalink] [raw]
Subject: Re: [PATCH 5.1 00/85] 5.1.8-stable review

On Sat, Jun 08, 2019 at 01:24:41PM +0530, Naresh Kamboju wrote:
> On Fri, 7 Jun 2019 at 21:18, Greg Kroah-Hartman
> <[email protected]> wrote:
> >
> > This is the start of the stable review cycle for the 5.1.8 release.
> > There are 85 patches in this series, all will be posted as a response
> > to this one. If anyone has any issues with these being applied, please
> > let me know.
> >
> > Responses should be made by Sun 09 Jun 2019 03:37:09 PM UTC.
> > Anything received after that time might be too late.
> >
> > The whole patch series can be found in one patch at:
> > https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.1.8-rc1.gz
> > or in the git tree and branch at:
> > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.1.y
> > and the diffstat can be found below.
> >
> > thanks,
> >
> > greg k-h
> >
>
> Results from Linaro’s test farm.
> No regressions on arm64, arm, x86_64, and i386.
>
> NOTE:
> selftest sources version updated to 5.1
> Following test cases reported pass after upgrade
> kselftest:
> * bpf_test_libbpf.sh
> * bpf_test_select_reuseport
> * bpf_test_tcpbpf_user
> * bpf_test_verifier
> * seccomp_seccomp_bpf
> * timers_set-timer-lat
>
> Few kselftest test cases reported failure and we are investigating.
> * bpf_test_netcnt
> * net_ip_defrag.sh
> * net_xfrm_policy.sh
> * timestamping_txtimestamp.sh
> * tpm2_test_smoke.sh
> * tpm2_test_space.sh
> * ...
>
> LTP version upgrade to 20190517
> New test case tgkill03 is an intermittent failure reported on qemu devices.
> Following test cases reported failures and we are investigating
> * ioctl_ns05
> * ioctl_ns06
> * aio02
> * acct01

Thanks for testing and letting me know.

greg k-h

2019-06-08 18:52:59

by Guenter Roeck

[permalink] [raw]
Subject: Re: [PATCH 5.1 00/85] 5.1.8-stable review

On 6/7/19 8:38 AM, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 5.1.8 release.
> There are 85 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me know.
>
> Responses should be made by Sun 09 Jun 2019 03:37:09 PM UTC.
> Anything received after that time might be too late.
>

Build results:
total: 159 pass: 159 fail: 0
Qemu test results:
total: 351 pass: 351 fail: 0

Guenter

2019-06-09 07:19:36

by Greg Kroah-Hartman

[permalink] [raw]
Subject: Re: [PATCH 5.1 00/85] 5.1.8-stable review

On Sat, Jun 08, 2019 at 11:50:30AM -0700, Guenter Roeck wrote:
> On 6/7/19 8:38 AM, Greg Kroah-Hartman wrote:
> > This is the start of the stable review cycle for the 5.1.8 release.
> > There are 85 patches in this series, all will be posted as a response
> > to this one. If anyone has any issues with these being applied, please
> > let me know.
> >
> > Responses should be made by Sun 09 Jun 2019 03:37:09 PM UTC.
> > Anything received after that time might be too late.
> >
>
> Build results:
> total: 159 pass: 159 fail: 0
> Qemu test results:
> total: 351 pass: 351 fail: 0

Wonderful, thanks for testing all of these and letting me know.

greg k-h