1. 30 Jun, 2020 40 commits
    • Nathan Chancellor's avatar
      ACPI: sysfs: Fix pm_profile_attr type · 2523f245
      Nathan Chancellor authored
      commit e6d701dc upstream.
      
      When running a kernel with Clang's Control Flow Integrity implemented,
      there is a violation that happens when accessing
      /sys/firmware/acpi/pm_profile:
      
      $ cat /sys/firmware/acpi/pm_profile
      0
      
      $ dmesg
      ...
      [   17.352564] ------------[ cut here ]------------
      [   17.352568] CFI failure (target: acpi_show_profile+0x0/0x8):
      [   17.352572] WARNING: CPU: 3 PID: 497 at kernel/cfi.c:29 __cfi_check_fail+0x33/0x40
      [   17.352573] Modules linked in:
      [   17.352575] CPU: 3 PID: 497 Comm: cat Tainted: G        W         5.7.0-microsoft-standard+ #1
      [   17.352576] RIP: 0010:__cfi_check_fail+0x33/0x40
      [   17.352577] Code: 48 c7 c7 50 b3 85 84 48 c7 c6 50 0a 4e 84 e8 a4 d8 60 00 85 c0 75 02 5b c3 48 c7 c7 dc 5e 49 84 48 89 de 31 c0 e8 7d 06 eb ff <0f> 0b 5b c3 00 00 cc cc 00 00 cc cc 00 85 f6 74 25 41 b9 ea ff ff
      [   17.352577] RSP: 0018:ffffaa6dc3c53d30 EFLAGS: 00010246
      [   17.352578] RAX: 331267e0c06cee00 RBX: ffffffff83d85890 RCX: ffffffff8483a6f8
      [   17.352579] RDX: ffff9cceabbb37c0 RSI: 0000000000000082 RDI: ffffffff84bb9e1c
      [   17.352579] RBP: ffffffff845b2bc8 R08: 0000000000000001 R09: ffff9cceabbba200
      [   17.352579] R10: 000000000000019d R11: 0000000000000000 R12: ffff9cc947766f00
      [   17.352580] R13: ffffffff83d6bd50 R14: ffff9ccc6fa80000 R15: ffffffff845bd328
      [   17.352582] FS:  00007fdbc8d13580(0000) GS:ffff9cce91ac0000(0000) knlGS:0000000000000000
      [   17.352582] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
      [   17.352583] CR2: 00007fdbc858e000 CR3: 00000005174d0000 CR4: 0000000000340ea0
      [   17.352584] Call Trace:
      [   17.352586]  ? rev_id_show+0x8/0x8
      [   17.352587]  ? __cfi_check+0x45bac/0x4b640
      [   17.352589]  ? kobj_attr_show+0x73/0x80
      [   17.352590]  ? sysfs_kf_seq_show+0xc1/0x140
      [   17.352592]  ? ext4_seq_options_show.cfi_jt+0x8/0x8
      [   17.352593]  ? seq_read+0x180/0x600
      [   17.352595]  ? sysfs_create_file_ns.cfi_jt+0x10/0x10
      [   17.352596]  ? tlbflush_read_file+0x8/0x8
      [   17.352597]  ? __vfs_read+0x6b/0x220
      [   17.352598]  ? handle_mm_fault+0xa23/0x11b0
      [   17.352599]  ? vfs_read+0xa2/0x130
      [   17.352599]  ? ksys_read+0x6a/0xd0
      [   17.352601]  ? __do_sys_getpgrp+0x8/0x8
      [   17.352602]  ? do_syscall_64+0x72/0x120
      [   17.352603]  ? entry_SYSCALL_64_after_hwframe+0x44/0xa9
      [   17.352604] ---[ end trace 7b1fa81dc897e419 ]---
      
      When /sys/firmware/acpi/pm_profile is read, sysfs_kf_seq_show is called,
      which in turn calls kobj_attr_show, which gets the ->show callback
      member by calling container_of on attr (casting it to struct
      kobj_attribute) then calls it.
      
      There is a CFI violation because pm_profile_attr is of type
      struct device_attribute but kobj_attr_show calls ->show expecting it
      to be from struct kobj_attribute. CFI checking ensures that function
      pointer types match when doing indirect calls. Fix pm_profile_attr to
      be defined in terms of kobj_attribute so there is no violation or
      mismatch.
      
      Fixes: 362b6460 ("ACPI: Export FADT pm_profile integer value to userspace")
      Link: https://github.com/ClangBuiltLinux/linux/issues/1051Reported-by: default avataryuu ichii <byahu140@heisei.be>
      Signed-off-by: default avatarNathan Chancellor <natechancellor@gmail.com>
      Cc: 3.10+ <stable@vger.kernel.org> # 3.10+
      Signed-off-by: default avatarRafael J. Wysocki <rafael.j.wysocki@intel.com>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      2523f245
    • Aaron Plattner's avatar
      ALSA: hda: Add NVIDIA codec IDs 9a & 9d through a0 to patch table · 981bcb1d
      Aaron Plattner authored
      commit adb36a82 upstream.
      
      These IDs are for upcoming NVIDIA chips with audio functions that are largely
      similar to the existing ones.
      Signed-off-by: default avatarAaron Plattner <aplattner@nvidia.com>
      Cc: <stable@vger.kernel.org>
      Link: https://lore.kernel.org/r/20200611180845.39942-1-aplattner@nvidia.comSigned-off-by: default avatarTakashi Iwai <tiwai@suse.de>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      981bcb1d
    • Luis Chamberlain's avatar
      blktrace: break out of blktrace setup on concurrent calls · c032e65b
      Luis Chamberlain authored
      [ Upstream commit 1b0b2836 ]
      
      We use one blktrace per request_queue, that means one per the entire
      disk.  So we cannot run one blktrace on say /dev/vda and then /dev/vda1,
      or just two calls on /dev/vda.
      
      We check for concurrent setup only at the very end of the blktrace setup though.
      
      If we try to run two concurrent blktraces on the same block device the
      second one will fail, and the first one seems to go on. However when
      one tries to kill the first one one will see things like this:
      
      The kernel will show these:
      
      ```
      debugfs: File 'dropped' in directory 'nvme1n1' already present!
      debugfs: File 'msg' in directory 'nvme1n1' already present!
      debugfs: File 'trace0' in directory 'nvme1n1' already present!
      ``
      
      And userspace just sees this error message for the second call:
      
      ```
      blktrace /dev/nvme1n1
      BLKTRACESETUP(2) /dev/nvme1n1 failed: 5/Input/output error
      ```
      
      The first userspace process #1 will also claim that the files
      were taken underneath their nose as well. The files are taken
      away form the first process given that when the second blktrace
      fails, it will follow up with a BLKTRACESTOP and BLKTRACETEARDOWN.
      This means that even if go-happy process #1 is waiting for blktrace
      data, we *have* been asked to take teardown the blktrace.
      
      This can easily be reproduced with break-blktrace [0] run_0005.sh test.
      
      Just break out early if we know we're already going to fail, this will
      prevent trying to create the files all over again, which we know still
      exist.
      
      [0] https://github.com/mcgrof/break-blktraceSigned-off-by: default avatarLuis Chamberlain <mcgrof@kernel.org>
      Signed-off-by: default avatarJan Kara <jack@suse.cz>
      Reviewed-by: default avatarBart Van Assche <bvanassche@acm.org>
      Reviewed-by: default avatarChristoph Hellwig <hch@lst.de>
      Signed-off-by: default avatarJens Axboe <axboe@kernel.dk>
      Signed-off-by: default avatarSasha Levin <sashal@kernel.org>
      c032e65b
    • Masahiro Yamada's avatar
      kbuild: improve cc-option to clean up all temporary files · 48427c3b
      Masahiro Yamada authored
      [ Upstream commit f2f02ebd ]
      
      When cc-option and friends evaluate compiler flags, the temporary file
      $$TMP is created as an output object, and automatically cleaned up.
      The actual file path of $$TMP is .<pid>.tmp, here <pid> is the process
      ID of $(shell ...) invoked from cc-option. (Please note $$$$ is the
      escape sequence of $$).
      
      Such garbage files are cleaned up in most cases, but some compiler flags
      create additional output files.
      
      For example, -gsplit-dwarf creates a .dwo file.
      
      When CONFIG_DEBUG_INFO_SPLIT=y, you will see a bunch of .<pid>.dwo files
      left in the top of build directories. You may not notice them unless you
      do 'ls -a', but the garbage files will increase every time you run 'make'.
      
      This commit changes the temporary object path to .tmp_<pid>/tmp, and
      removes .tmp_<pid> directory when exiting. Separate build artifacts such
      as *.dwo will be cleaned up all together because their file paths are
      usually determined based on the base name of the object.
      
      Another example is -ftest-coverage, which outputs the coverage data into
      <base-name-of-object>.gcno
      Signed-off-by: default avatarMasahiro Yamada <masahiroy@kernel.org>
      Signed-off-by: default avatarSasha Levin <sashal@kernel.org>
      48427c3b
    • Sven Schnelle's avatar
      s390/ptrace: fix setting syscall number · 31a2029d
      Sven Schnelle authored
      [ Upstream commit 873e5a76 ]
      
      When strace wants to update the syscall number, it sets GPR2
      to the desired number and updates the GPR via PTRACE_SETREGSET.
      It doesn't update regs->int_code which would cause the old syscall
      executed on syscall restart. As we cannot change the ptrace ABI and
      don't have a field for the interruption code, check whether the tracee
      is in a syscall and the last instruction was svc. In that case assume
      that the tracer wants to update the syscall number and copy the GPR2
      value to regs->int_code.
      Signed-off-by: default avatarSven Schnelle <svens@linux.ibm.com>
      Signed-off-by: default avatarVasily Gorbik <gor@linux.ibm.com>
      Signed-off-by: default avatarSasha Levin <sashal@kernel.org>
      31a2029d
    • Zekun Shen's avatar
      net: alx: fix race condition in alx_remove · 70a5b8b3
      Zekun Shen authored
      [ Upstream commit e89df5c4 ]
      
      There is a race condition exist during termination. The path is
      alx_stop and then alx_remove. An alx_schedule_link_check could be called
      before alx_stop by interrupt handler and invoke alx_link_check later.
      Alx_stop frees the napis, and alx_remove cancels any pending works.
      If any of the work is scheduled before termination and invoked before
      alx_remove, a null-ptr-deref occurs because both expect alx->napis[i].
      
      This patch fix the race condition by moving cancel_work_sync functions
      before alx_free_napis inside alx_stop. Because interrupt handler can call
      alx_schedule_link_check again, alx_free_irq is moved before
      cancel_work_sync calls too.
      Signed-off-by: default avatarZekun Shen <bruceshenzk@gmail.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      Signed-off-by: default avatarSasha Levin <sashal@kernel.org>
      70a5b8b3
    • Ye Bin's avatar
      ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function · 5fef1b31
      Ye Bin authored
      [ Upstream commit f650ef61 ]
      
      BUG: KASAN: use-after-free in ata_scsi_mode_select_xlat+0x10bd/0x10f0
      drivers/ata/libata-scsi.c:4045
      Read of size 1 at addr ffff88803b8cd003 by task syz-executor.6/12621
      
      CPU: 1 PID: 12621 Comm: syz-executor.6 Not tainted 4.19.95 #1
      Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
      1.10.2-1ubuntu1 04/01/2014
      Call Trace:
      __dump_stack lib/dump_stack.c:77 [inline]
      dump_stack+0xac/0xee lib/dump_stack.c:118
      print_address_description+0x60/0x223 mm/kasan/report.c:253
      kasan_report_error mm/kasan/report.c:351 [inline]
      kasan_report mm/kasan/report.c:409 [inline]
      kasan_report.cold+0xae/0x2d8 mm/kasan/report.c:393
      ata_scsi_mode_select_xlat+0x10bd/0x10f0 drivers/ata/libata-scsi.c:4045
      ata_scsi_translate+0x2da/0x680 drivers/ata/libata-scsi.c:2035
      __ata_scsi_queuecmd drivers/ata/libata-scsi.c:4360 [inline]
      ata_scsi_queuecmd+0x2e4/0x790 drivers/ata/libata-scsi.c:4409
      scsi_dispatch_cmd+0x2ee/0x6c0 drivers/scsi/scsi_lib.c:1867
      scsi_queue_rq+0xfd7/0x1990 drivers/scsi/scsi_lib.c:2170
      blk_mq_dispatch_rq_list+0x1e1/0x19a0 block/blk-mq.c:1186
      blk_mq_do_dispatch_sched+0x147/0x3d0 block/blk-mq-sched.c:108
      blk_mq_sched_dispatch_requests+0x427/0x680 block/blk-mq-sched.c:204
      __blk_mq_run_hw_queue+0xbc/0x200 block/blk-mq.c:1308
      __blk_mq_delay_run_hw_queue+0x3c0/0x460 block/blk-mq.c:1376
      blk_mq_run_hw_queue+0x152/0x310 block/blk-mq.c:1413
      blk_mq_sched_insert_request+0x337/0x6c0 block/blk-mq-sched.c:397
      blk_execute_rq_nowait+0x124/0x320 block/blk-exec.c:64
      blk_execute_rq+0xc5/0x112 block/blk-exec.c:101
      sg_scsi_ioctl+0x3b0/0x6a0 block/scsi_ioctl.c:507
      sg_ioctl+0xd37/0x23f0 drivers/scsi/sg.c:1106
      vfs_ioctl fs/ioctl.c:46 [inline]
      file_ioctl fs/ioctl.c:501 [inline]
      do_vfs_ioctl+0xae6/0x1030 fs/ioctl.c:688
      ksys_ioctl+0x76/0xa0 fs/ioctl.c:705
      __do_sys_ioctl fs/ioctl.c:712 [inline]
      __se_sys_ioctl fs/ioctl.c:710 [inline]
      __x64_sys_ioctl+0x6f/0xb0 fs/ioctl.c:710
      do_syscall_64+0xa0/0x2e0 arch/x86/entry/common.c:293
      entry_SYSCALL_64_after_hwframe+0x44/0xa9
      RIP: 0033:0x45c479
      Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89
      f7 48
      89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff
      ff 0f
      83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
      RSP: 002b:00007fb0e9602c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
      RAX: ffffffffffffffda RBX: 00007fb0e96036d4 RCX: 000000000045c479
      RDX: 0000000020000040 RSI: 0000000000000001 RDI: 0000000000000003
      RBP: 000000000076bfc0 R08: 0000000000000000 R09: 0000000000000000
      R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff
      R13: 000000000000046d R14: 00000000004c6e1a R15: 000000000076bfcc
      
      Allocated by task 12577:
      set_track mm/kasan/kasan.c:460 [inline]
      kasan_kmalloc mm/kasan/kasan.c:553 [inline]
      kasan_kmalloc+0xbf/0xe0 mm/kasan/kasan.c:531
      __kmalloc+0xf3/0x1e0 mm/slub.c:3749
      kmalloc include/linux/slab.h:520 [inline]
      load_elf_phdrs+0x118/0x1b0 fs/binfmt_elf.c:441
      load_elf_binary+0x2de/0x4610 fs/binfmt_elf.c:737
      search_binary_handler fs/exec.c:1654 [inline]
      search_binary_handler+0x15c/0x4e0 fs/exec.c:1632
      exec_binprm fs/exec.c:1696 [inline]
      __do_execve_file.isra.0+0xf52/0x1a90 fs/exec.c:1820
      do_execveat_common fs/exec.c:1866 [inline]
      do_execve fs/exec.c:1883 [inline]
      __do_sys_execve fs/exec.c:1964 [inline]
      __se_sys_execve fs/exec.c:1959 [inline]
      __x64_sys_execve+0x8a/0xb0 fs/exec.c:1959
      do_syscall_64+0xa0/0x2e0 arch/x86/entry/common.c:293
      entry_SYSCALL_64_after_hwframe+0x44/0xa9
      
      Freed by task 12577:
      set_track mm/kasan/kasan.c:460 [inline]
      __kasan_slab_free+0x129/0x170 mm/kasan/kasan.c:521
      slab_free_hook mm/slub.c:1370 [inline]
      slab_free_freelist_hook mm/slub.c:1397 [inline]
      slab_free mm/slub.c:2952 [inline]
      kfree+0x8b/0x1a0 mm/slub.c:3904
      load_elf_binary+0x1be7/0x4610 fs/binfmt_elf.c:1118
      search_binary_handler fs/exec.c:1654 [inline]
      search_binary_handler+0x15c/0x4e0 fs/exec.c:1632
      exec_binprm fs/exec.c:1696 [inline]
      __do_execve_file.isra.0+0xf52/0x1a90 fs/exec.c:1820
      do_execveat_common fs/exec.c:1866 [inline]
      do_execve fs/exec.c:1883 [inline]
      __do_sys_execve fs/exec.c:1964 [inline]
      __se_sys_execve fs/exec.c:1959 [inline]
      __x64_sys_execve+0x8a/0xb0 fs/exec.c:1959
      do_syscall_64+0xa0/0x2e0 arch/x86/entry/common.c:293
      entry_SYSCALL_64_after_hwframe+0x44/0xa9
      
      The buggy address belongs to the object at ffff88803b8ccf00
      which belongs to the cache kmalloc-512 of size 512
      The buggy address is located 259 bytes inside of
      512-byte region [ffff88803b8ccf00, ffff88803b8cd100)
      The buggy address belongs to the page:
      page:ffffea0000ee3300 count:1 mapcount:0 mapping:ffff88806cc03080
      index:0xffff88803b8cc780 compound_mapcount: 0
      flags: 0x100000000008100(slab|head)
      raw: 0100000000008100 ffffea0001104080 0000000200000002 ffff88806cc03080
      raw: ffff88803b8cc780 00000000800c000b 00000001ffffffff 0000000000000000
      page dumped because: kasan: bad access detected
      
      Memory state around the buggy address:
      ffff88803b8ccf00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
      ffff88803b8ccf80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
      >ffff88803b8cd000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
      ^
      ffff88803b8cd080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
      ffff88803b8cd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
      
      You can refer to "https://www.lkml.org/lkml/2019/1/17/474" reproduce
      this error.
      
      The exception code is "bd_len = p[3];", "p" value is ffff88803b8cd000
      which belongs to the cache kmalloc-512 of size 512. The "page_address(sg_page(scsi_sglist(scmd)))"
      maybe from sg_scsi_ioctl function "buffer" which allocated by kzalloc, so "buffer"
      may not page aligned.
      This also looks completely buggy on highmem systems and really needs to use a
      kmap_atomic.      --Christoph Hellwig
      To address above bugs, Paolo Bonzini advise to simpler to just make a char array
      of size CACHE_MPAGE_LEN+8+8+4-2(or just 64 to make it easy), use sg_copy_to_buffer
      to copy from the sglist into the buffer, and workthere.
      Signed-off-by: default avatarYe Bin <yebin10@huawei.com>
      Signed-off-by: default avatarJens Axboe <axboe@kernel.dk>
      Signed-off-by: default avatarSasha Levin <sashal@kernel.org>
      5fef1b31
    • Juri Lelli's avatar
      sched/core: Fix PI boosting between RT and DEADLINE tasks · 37b31f4f
      Juri Lelli authored
      [ Upstream commit 740797ce ]
      
      syzbot reported the following warning:
      
       WARNING: CPU: 1 PID: 6351 at kernel/sched/deadline.c:628
       enqueue_task_dl+0x22da/0x38a0 kernel/sched/deadline.c:1504
      
      At deadline.c:628 we have:
      
       623 static inline void setup_new_dl_entity(struct sched_dl_entity *dl_se)
       624 {
       625 	struct dl_rq *dl_rq = dl_rq_of_se(dl_se);
       626 	struct rq *rq = rq_of_dl_rq(dl_rq);
       627
       628 	WARN_ON(dl_se->dl_boosted);
       629 	WARN_ON(dl_time_before(rq_clock(rq), dl_se->deadline));
              [...]
           }
      
      Which means that setup_new_dl_entity() has been called on a task
      currently boosted. This shouldn't happen though, as setup_new_dl_entity()
      is only called when the 'dynamic' deadline of the new entity
      is in the past w.r.t. rq_clock and boosted tasks shouldn't verify this
      condition.
      
      Digging through the PI code I noticed that what above might in fact happen
      if an RT tasks blocks on an rt_mutex hold by a DEADLINE task. In the
      first branch of boosting conditions we check only if a pi_task 'dynamic'
      deadline is earlier than mutex holder's and in this case we set mutex
      holder to be dl_boosted. However, since RT 'dynamic' deadlines are only
      initialized if such tasks get boosted at some point (or if they become
      DEADLINE of course), in general RT 'dynamic' deadlines are usually equal
      to 0 and this verifies the aforementioned condition.
      
      Fix it by checking that the potential donor task is actually (even if
      temporary because in turn boosted) running at DEADLINE priority before
      using its 'dynamic' deadline value.
      
      Fixes: 2d3d891d ("sched/deadline: Add SCHED_DEADLINE inheritance logic")
      Reported-by: syzbot+119ba87189432ead09b4@syzkaller.appspotmail.com
      Signed-off-by: default avatarJuri Lelli <juri.lelli@redhat.com>
      Signed-off-by: default avatarPeter Zijlstra (Intel) <peterz@infradead.org>
      Signed-off-by: default avatarIngo Molnar <mingo@kernel.org>
      Reviewed-by: default avatarDaniel Bristot de Oliveira <bristot@redhat.com>
      Tested-by: default avatarDaniel Wagner <dwagner@suse.de>
      Link: https://lkml.kernel.org/r/20181119153201.GB2119@localhost.localdomainSigned-off-by: default avatarSasha Levin <sashal@kernel.org>
      37b31f4f
    • Russell King's avatar
      netfilter: ipset: fix unaligned atomic access · 6423d903
      Russell King authored
      [ Upstream commit 71502846 ]
      
      When using ip_set with counters and comment, traffic causes the kernel
      to panic on 32-bit ARM:
      
      Alignment trap: not handling instruction e1b82f9f at [<bf01b0dc>]
      Unhandled fault: alignment exception (0x221) at 0xea08133c
      PC is at ip_set_match_extensions+0xe0/0x224 [ip_set]
      
      The problem occurs when we try to update the 64-bit counters - the
      faulting address above is not 64-bit aligned.  The problem occurs
      due to the way elements are allocated, for example:
      
      	set->dsize = ip_set_elem_len(set, tb, 0, 0);
      	map = ip_set_alloc(sizeof(*map) + elements * set->dsize);
      
      If the element has a requirement for a member to be 64-bit aligned,
      and set->dsize is not a multiple of 8, but is a multiple of four,
      then every odd numbered elements will be misaligned - and hitting
      an atomic64_add() on that element will cause the kernel to panic.
      
      ip_set_elem_len() must return a size that is rounded to the maximum
      alignment of any extension field stored in the element.  This change
      ensures that is the case.
      
      Fixes: 95ad1f4a ("netfilter: ipset: Fix extension alignment")
      Signed-off-by: default avatarRussell King <rmk+kernel@armlinux.org.uk>
      Acked-by: default avatarJozsef Kadlecsik <kadlec@netfilter.org>
      Signed-off-by: default avatarPablo Neira Ayuso <pablo@netfilter.org>
      Signed-off-by: default avatarSasha Levin <sashal@kernel.org>
      6423d903
    • Dan Carpenter's avatar
      usb: gadget: udc: Potential Oops in error handling code · 19a197ff
      Dan Carpenter authored
      [ Upstream commit e55f3c37 ]
      
      If this is in "transceiver" mode the the ->qwork isn't required and is
      a NULL pointer.  This can lead to a NULL dereference when we call
      destroy_workqueue(udc->qwork).
      
      Fixes: 3517c31a ("usb: gadget: mv_udc: use devm_xxx for probe")
      Signed-off-by: default avatarDan Carpenter <dan.carpenter@oracle.com>
      Signed-off-by: default avatarFelipe Balbi <balbi@kernel.org>
      Signed-off-by: default avatarSasha Levin <sashal@kernel.org>
      19a197ff
    • yu kuai's avatar
      ARM: imx5: add missing put_device() call in imx_suspend_alloc_ocram() · 6edb24f2
      yu kuai authored
      [ Upstream commit 586745f1 ]
      
      if of_find_device_by_node() succeed, imx_suspend_alloc_ocram() doesn't
      have a corresponding put_device(). Thus add a jump target to fix the
      exception handling for this function implementation.
      
      Fixes: 1579c7b9 ("ARM: imx53: Set DDR pins to high impedance when in suspend to RAM.")
      Signed-off-by: default avataryu kuai <yukuai3@huawei.com>
      Signed-off-by: default avatarShawn Guo <shawnguo@kernel.org>
      Signed-off-by: default avatarSasha Levin <sashal@kernel.org>
      6edb24f2
    • Alexander Lobakin's avatar
      net: qed: fix excessive QM ILT lines consumption · 386907cf
      Alexander Lobakin authored
      [ Upstream commit d434d02f ]
      
      This is likely a copy'n'paste mistake. The amount of ILT lines to
      reserve for a single VF was being multiplied by the total VFs count.
      This led to a huge redundancy in reservation and potential lines
      drainouts.
      
      Fixes: 1408cc1f ("qed: Introduce VFs")
      Signed-off-by: default avatarAlexander Lobakin <alobakin@marvell.com>
      Signed-off-by: default avatarIgor Russkikh <irusskikh@marvell.com>
      Signed-off-by: default avatarMichal Kalderon <michal.kalderon@marvell.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      Signed-off-by: default avatarSasha Levin <sashal@kernel.org>
      386907cf
    • Alexander Lobakin's avatar
      net: qed: fix NVMe login fails over VFs · 6a7cfbd6
      Alexander Lobakin authored
      [ Upstream commit ccd7c7ce ]
      
      25ms sleep cycles in waiting for PF response are excessive and may lead
      to different timeout failures.
      
      Start to wait with short udelays, and in most cases polling will end
      here. If the time was not sufficient, switch to msleeps.
      usleep_range() may go far beyond 100us depending on platform and tick
      configuration, hence atomic udelays for consistency.
      
      Also add explicit DMA barriers since 'done' always comes from a shared
      request-response DMA pool, and note that in the comment nearby.
      
      Fixes: 1408cc1f ("qed: Introduce VFs")
      Signed-off-by: default avatarAlexander Lobakin <alobakin@marvell.com>
      Signed-off-by: default avatarIgor Russkikh <irusskikh@marvell.com>
      Signed-off-by: default avatarMichal Kalderon <michal.kalderon@marvell.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      Signed-off-by: default avatarSasha Levin <sashal@kernel.org>
      6a7cfbd6
    • Alexander Lobakin's avatar
      net: qed: fix left elements count calculation · ea6eb20c
      Alexander Lobakin authored
      [ Upstream commit 97dd1abd ]
      
      qed_chain_get_element_left{,_u32} returned 0 when the difference
      between producer and consumer page count was equal to the total
      page count.
      Fix this by conditional expanding of producer value (vs
      unconditional). This allowed to eliminate normalizaton against
      total page count, which was the cause of this bug.
      
      Misc: replace open-coded constants with common defines.
      
      Fixes: a91eb52a ("qed: Revisit chain implementation")
      Signed-off-by: default avatarAlexander Lobakin <alobakin@marvell.com>
      Signed-off-by: default avatarIgor Russkikh <irusskikh@marvell.com>
      Signed-off-by: default avatarMichal Kalderon <michal.kalderon@marvell.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      Signed-off-by: default avatarSasha Levin <sashal@kernel.org>
      ea6eb20c
    • Fan Guo's avatar
      RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads() · 79eb4f02
      Fan Guo authored
      [ Upstream commit a17f4bed ]
      
      If ib_dma_mapping_error() returns non-zero value,
      ib_mad_post_receive_mads() will jump out of loops and return -ENOMEM
      without freeing mad_priv. Fix this memory-leak problem by freeing mad_priv
      in this case.
      
      Fixes: 2c34e68f ("IB/mad: Check and handle potential DMA mapping errors")
      Link: https://lore.kernel.org/r/20200612063824.180611-1-guofan5@huawei.comSigned-off-by: default avatarFan Guo <guofan5@huawei.com>
      Signed-off-by: default avatarJason Gunthorpe <jgg@mellanox.com>
      Signed-off-by: default avatarSasha Levin <sashal@kernel.org>
      79eb4f02
    • Qiushi Wu's avatar
      efi/esrt: Fix reference count leak in esre_create_sysfs_entry. · 83fc0cb8
      Qiushi Wu authored
      [ Upstream commit 4ddf4739 ]
      
      kobject_init_and_add() takes reference even when it fails.
      If this function returns an error, kobject_put() must be called to
      properly clean up the memory associated with the object. Previous
      commit "b8eb7183" fixed a similar problem.
      
      Fixes: 0bb54905 ("efi: Add esrt support")
      Signed-off-by: default avatarQiushi Wu <wu000273@umn.edu>
      Link: https://lore.kernel.org/r/20200528183804.4497-1-wu000273@umn.eduSigned-off-by: default avatarArd Biesheuvel <ardb@kernel.org>
      Signed-off-by: default avatarSasha Levin <sashal@kernel.org>
      83fc0cb8
    • Zhang Xiaoxu's avatar
      cifs/smb3: Fix data inconsistent when zero file range · 7e2632ca
      Zhang Xiaoxu authored
      [ Upstream commit 6b690402 ]
      
      CIFS implements the fallocate(FALLOC_FL_ZERO_RANGE) with send SMB
      ioctl(FSCTL_SET_ZERO_DATA) to server. It just set the range of the
      remote file to zero, but local page cache not update, then the data
      inconsistent with server, which leads the xfstest generic/008 failed.
      
      So we need to remove the local page caches before send SMB
      ioctl(FSCTL_SET_ZERO_DATA) to server. After next read, it will
      re-cache it.
      
      Fixes: 30175628 ("[SMB3] Enable fallocate -z support for SMB3 mounts")
      Reported-by: default avatarHulk Robot <hulkci@huawei.com>
      Signed-off-by: default avatarZhang Xiaoxu <zhangxiaoxu5@huawei.com>
      Reviewed-by: default avatarPavel Shilovsky <pshilov@microsoft.com>
      Cc: stable@vger.kernel.org # v3.17
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      Signed-off-by: default avatarSasha Levin <sashal@kernel.org>
      7e2632ca
    • Zhang Xiaoxu's avatar
      cifs/smb3: Fix data inconsistent when punch hole · 2306f635
      Zhang Xiaoxu authored
      [ Upstream commit acc91c2d ]
      
      When punch hole success, we also can read old data from file:
        # strace -e trace=pread64,fallocate xfs_io -f -c "pread 20 40" \
                 -c "fpunch 20 40" -c"pread 20 40" file
        pread64(3, " version 5.8.0-rc1+"..., 40, 20) = 40
        fallocate(3, FALLOC_FL_KEEP_SIZE|FALLOC_FL_PUNCH_HOLE, 20, 40) = 0
        pread64(3, " version 5.8.0-rc1+"..., 40, 20) = 40
      
      CIFS implements the fallocate(FALLOCATE_FL_PUNCH_HOLE) with send SMB
      ioctl(FSCTL_SET_ZERO_DATA) to server. It just set the range of the
      remote file to zero, but local page caches not updated, then the
      local page caches inconsistent with server.
      
      Also can be found by xfstests generic/316.
      
      So, we need to remove the page caches before send the SMB
      ioctl(FSCTL_SET_ZERO_DATA) to server.
      
      Fixes: 31742c5a ("enable fallocate punch hole ("fallocate -p") for SMB3")
      Suggested-by: default avatarPavel Shilovsky <pshilov@microsoft.com>
      Reviewed-by: default avatarPavel Shilovsky <pshilov@microsoft.com>
      Signed-off-by: default avatarZhang Xiaoxu <zhangxiaoxu5@huawei.com>
      Cc: stable@vger.kernel.org # v3.17
      Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
      Signed-off-by: default avatarSasha Levin <sashal@kernel.org>
      2306f635
    • Kai-Heng Feng's avatar
      xhci: Poll for U0 after disabling USB2 LPM · dfa2cacd
      Kai-Heng Feng authored
      [ Upstream commit b3d71abd ]
      
      USB2 devices with LPM enabled may interrupt the system suspend:
      [  932.510475] usb 1-7: usb suspend, wakeup 0
      [  932.510549] hub 1-0:1.0: hub_suspend
      [  932.510581] usb usb1: bus suspend, wakeup 0
      [  932.510590] xhci_hcd 0000:00:14.0: port 9 not suspended
      [  932.510593] xhci_hcd 0000:00:14.0: port 8 not suspended
      ..
      [  932.520323] xhci_hcd 0000:00:14.0: Port change event, 1-7, id 7, portsc: 0x400e03
      ..
      [  932.591405] PM: pci_pm_suspend(): hcd_pci_suspend+0x0/0x30 returns -16
      [  932.591414] PM: dpm_run_callback(): pci_pm_suspend+0x0/0x160 returns -16
      [  932.591418] PM: Device 0000:00:14.0 failed to suspend async: error -16
      
      During system suspend, USB core will let HC suspends the device if it
      doesn't have remote wakeup enabled and doesn't have any children.
      However, from the log above we can see that the usb 1-7 doesn't get bus
      suspended due to not in U0. After a while the port finished U2 -> U0
      transition, interrupts the suspend process.
      
      The observation is that after disabling LPM, port doesn't transit to U0
      immediately and can linger in U2. xHCI spec 4.23.5.2 states that the
      maximum exit latency for USB2 LPM should be BESL + 10us. The BESL for
      the affected device is advertised as 400us, which is still not enough
      based on my testing result.
      
      So let's use the maximum permitted latency, 10000, to poll for U0
      status to solve the issue.
      
      Cc: stable@vger.kernel.org
      Signed-off-by: default avatarKai-Heng Feng <kai.heng.feng@canonical.com>
      Signed-off-by: default avatarMathias Nyman <mathias.nyman@linux.intel.com>
      Link: https://lore.kernel.org/r/20200624135949.22611-6-mathias.nyman@linux.intel.comSigned-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      Signed-off-by: default avatarSasha Levin <sashal@kernel.org>
      dfa2cacd
    • Takashi Iwai's avatar
      ALSA: usb-audio: Fix OOB access of mixer element list · f05360bf
      Takashi Iwai authored
      [ Upstream commit 220345e9 ]
      
      The USB-audio mixer code holds a linked list of usb_mixer_elem_list,
      and several operations are performed for each mixer element.  A few of
      them (snd_usb_mixer_notify_id() and snd_usb_mixer_interrupt_v2())
      assume each mixer element being a usb_mixer_elem_info object that is a
      subclass of usb_mixer_elem_list, cast via container_of() and access it
      members.  This may result in an out-of-bound access when a
      non-standard list element has been added, as spotted by syzkaller
      recently.
      
      This patch adds a new field, is_std_info, in usb_mixer_elem_list to
      indicate that the element is the usb_mixer_elem_info type or not, and
      skip the access to such an element if needed.
      
      Reported-by: syzbot+fb14314433463ad51625@syzkaller.appspotmail.com
      Reported-by: syzbot+2405ca3401e943c538b5@syzkaller.appspotmail.com
      Cc: <stable@vger.kernel.org>
      Link: https://lore.kernel.org/r/20200624122340.9615-1-tiwai@suse.deSigned-off-by: default avatarTakashi Iwai <tiwai@suse.de>
      Signed-off-by: default avatarSasha Levin <sashal@kernel.org>
      f05360bf
    • Takashi Iwai's avatar
      ALSA: usb-audio: Clean up mixer element list traverse · 380006c7
      Takashi Iwai authored
      [ Upstream commit 8c558076 ]
      
      Introduce a new macro for iterating over mixer element list for
      avoiding the open codes in many places.  Also the open-coded
      container_of() and the forced cast to struct usb_mixer_elem_info are
      replaced with another simple macro, too.
      
      No functional changes but just readability improvement.
      Signed-off-by: default avatarTakashi Iwai <tiwai@suse.de>
      Signed-off-by: default avatarSasha Levin <sashal@kernel.org>
      380006c7
    • Julian Scheel's avatar
      ALSA: usb-audio: uac1: Invalidate ctl on interrupt · 65f4bed1
      Julian Scheel authored
      [ Upstream commit b2500b58 ]
      
      When an interrupt occurs, the value of at least one of the belonging
      controls should have changed. To make sure they get re-read from device
      on the next read, invalidate the cache. This was correctly implemented
      for uac2 already, but missing for uac1.
      Signed-off-by: default avatarJulian Scheel <julian@jusst.de>
      Signed-off-by: default avatarTakashi Iwai <tiwai@suse.de>
      Signed-off-by: default avatarSasha Levin <sashal@kernel.org>
      65f4bed1
    • Joakim Tjernlund's avatar
      cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip · 8de06e1d
      Joakim Tjernlund authored
      commit 03894573 upstream.
      
      USB_DEVICE(0x0424, 0x274e) can send data before cdc_acm is ready,
      causing garbage chars on the TTY causing stray input to the shell
      and/or login prompt.
      Signed-off-by: default avatarJoakim Tjernlund <joakim.tjernlund@infinera.com>
      Cc: stable@vger.kernel.org
      Acked-by: default avatarOliver Neukum <oneukum@suse.com>
      Link: https://lore.kernel.org/r/20200605105418.22263-1-joakim.tjernlund@infinera.comSigned-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      8de06e1d
    • Al Cooper's avatar
      xhci: Fix enumeration issue when setting max packet size for FS devices. · dbf2c1a8
      Al Cooper authored
      commit a73d9d9c upstream.
      
      Unable to complete the enumeration of a USB TV Tuner device.
      
      Per XHCI spec (4.6.5), the EP state field of the input context shall
      be cleared for a set address command. In the special case of an FS
      device that has "MaxPacketSize0 = 8", the Linux XHCI driver does
      not do this before evaluating the context. With an XHCI controller
      that checks the EP state field for parameter context error this
      causes a problem in cases such as the device getting reset again
      after enumeration.
      
      When that field is cleared, the problem does not occur.
      
      This was found and fixed by Sasi Kumar.
      
      Cc: stable@vger.kernel.org
      Signed-off-by: default avatarAl Cooper <alcooperx@gmail.com>
      Signed-off-by: default avatarMathias Nyman <mathias.nyman@linux.intel.com>
      Link: https://lore.kernel.org/r/20200624135949.22611-3-mathias.nyman@linux.intel.comSigned-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      dbf2c1a8
    • Mathias Nyman's avatar
      xhci: Fix incorrect EP_STATE_MASK · f0a2a8d0
      Mathias Nyman authored
      commit dceea670 upstream.
      
      EP_STATE_MASK should be 0x7 instead of 0xf
      
      xhci spec 6.2.3 shows that the EP state field in the endpoint context data
      structure consist of bits [2:0].
      The old value included a bit from the next field which fortunately is a
       RsvdZ region. So hopefully this hasn't caused too much harm
      
      Cc: stable@vger.kernel.org
      Signed-off-by: default avatarMathias Nyman <mathias.nyman@linux.intel.com>
      Link: https://lore.kernel.org/r/20200624135949.22611-2-mathias.nyman@linux.intel.comSigned-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      f0a2a8d0
    • Yick W. Tse's avatar
      ALSA: usb-audio: add quirk for Denon DCD-1500RE · fc652867
      Yick W. Tse authored
      commit c9808bbf upstream.
      
      fix error "clock source 41 is not valid, cannot use"
      
      [] New USB device found, idVendor=154e, idProduct=1002, bcdDevice= 1.00
      [] New USB device strings: Mfr=1, Product=2, SerialNumber=0
      [] Product: DCD-1500RE
      [] Manufacturer: D & M Holdings Inc.
      []
      [] clock source 41 is not valid, cannot use
      [] usbcore: registered new interface driver snd-usb-audio
      Signed-off-by: default avatarYick W. Tse <y_w_tse@yahoo.com.hk>
      Cc: <stable@vger.kernel.org>
      Link: https://lore.kernel.org/r/1373857985.210365.1592048406997@mail.yahoo.comSigned-off-by: default avatarTakashi Iwai <tiwai@suse.de>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      fc652867
    • Tang Bin's avatar
      usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() · 6119a89a
      Tang Bin authored
      commit 44ed240d upstream.
      
      If the function platform_get_irq() failed, the negative value
      returned will not be detected here. So fix error handling in
      exynos_ehci_probe(). And when get irq failed, the function
      platform_get_irq() logs an error message, so remove redundant
      message here.
      
      Fixes: 1bcc5aa8 ("USB: Add initial S5P EHCI driver")
      Cc: stable <stable@vger.kernel.org>
      Signed-off-by: default avatarZhang Shengju <zhangshengju@cmss.chinamobile.com>
      Signed-off-by: default avatarTang Bin <tangbin@cmss.chinamobile.com>
      Link: https://lore.kernel.org/r/20200602114708.28620-1-tangbin@cmss.chinamobile.comSigned-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      6119a89a
    • Longfang Liu's avatar
      USB: ehci: reopen solution for Synopsys HC bug · 469adc4c
      Longfang Liu authored
      commit 1ddcb71a upstream.
      
      A Synopsys USB2.0 core used in Huawei Kunpeng920 SoC has a bug which
      might cause the host controller not issuing ping.
      
      Bug description:
      After indicating an Interrupt on Async Advance, the software uses the
      doorbell mechanism to delete the Next Link queue head of the last
      executed queue head. At this time, the host controller still references
      the removed queue head(the queue head is NULL). NULL reference causes
      the host controller to lose the USB device.
      
      Solution:
      After deleting the Next Link queue head, when has_synopsys_hc_bug set
      to 1,the software can write one of the valid queue head addresses to
      the ASYNCLISTADDR register to allow the host controller to get
      the valid queue head. in order to solve that problem, this patch set
      the flag for Huawei Kunpeng920
      
      There are detailed instructions and solutions in this patch:
      commit 2f7ac6c1 ("USB: ehci: add workaround for Synopsys HC bug")
      Signed-off-by: default avatarLongfang Liu <liulongfang@huawei.com>
      Cc: stable <stable@vger.kernel.org>
      Acked-by: default avatarAlan Stern <stern@rowland.harvard.edu>
      Link: https://lore.kernel.org/r/1591588019-44284-1-git-send-email-liulongfang@huawei.comSigned-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      469adc4c
    • Tomasz Meresiński's avatar
      usb: add USB_QUIRK_DELAY_INIT for Logitech C922 · 4813288a
      Tomasz Meresiński authored
      commit 5d802192 upstream.
      
      The Logitech C922, just like other Logitech webcams,
      needs the USB_QUIRK_DELAY_INIT or it will randomly
      not respond after device connection
      Signed-off-by: default avatarTomasz Meresiński <tomasz@meresinski.eu>
      Cc: stable <stable@vger.kernel.org>
      Link: https://lore.kernel.org/r/20200603203347.7792-1-tomasz@meresinski.euSigned-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      4813288a
    • Minas Harutyunyan's avatar
      usb: dwc2: Postponed gadget registration to the udc class driver · aedf21cf
      Minas Harutyunyan authored
      commit 207324a3 upstream.
      
      During dwc2 driver probe, after gadget registration to the udc class
      driver, if exist any builtin function driver it immediately bound to
      dwc2 and after init host side (dwc2_hcd_init()) stucked in host mode.
      Patch postpone gadget registration after host side initialization done.
      
      Fixes: 117777b2 ("usb: dwc2: Move gadget probe function into platform code")
      Reported-by: default avatarkbuild test robot <lkp@intel.com>
      Tested-by: default avatarMarek Vasut <marex@denx.de>
      Cc: stable <stable@vger.kernel.org>
      Signed-off-by: default avatarMinas Harutyunyan <hminas@synopsys.com>
      Link: https://lore.kernel.org/r/f21cb38fecc72a230b86155d94c7e60c9cb66f58.1591690938.git.hminas@synopsys.comSigned-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      aedf21cf
    • Chuhong Yuan's avatar
      USB: ohci-sm501: Add missed iounmap() in remove · b680168b
      Chuhong Yuan authored
      commit 07c112fb upstream.
      
      This driver misses calling iounmap() in remove to undo the ioremap()
      called in probe.
      Add the missed call to fix it.
      
      Fixes: f54aab6e ("usb: ohci-sm501 driver")
      Cc: stable <stable@vger.kernel.org>
      Signed-off-by: default avatarChuhong Yuan <hslester96@gmail.com>
      Acked-by: default avatarAlan Stern <stern@rowland.harvard.edu>
      Link: https://lore.kernel.org/r/20200610024844.3628408-1-hslester96@gmail.comSigned-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      b680168b
    • Taehee Yoo's avatar
      net: core: reduce recursion limit value · 6aa66b71
      Taehee Yoo authored
      [ Upstream commit fb7861d1 ]
      
      In the current code, ->ndo_start_xmit() can be executed recursively only
      10 times because of stack memory.
      But, in the case of the vxlan, 10 recursion limit value results in
      a stack overflow.
      In the current code, the nested interface is limited by 8 depth.
      There is no critical reason that the recursion limitation value should
      be 10.
      So, it would be good to be the same value with the limitation value of
      nesting interface depth.
      
      Test commands:
          ip link add vxlan10 type vxlan vni 10 dstport 4789 srcport 4789 4789
          ip link set vxlan10 up
          ip a a 192.168.10.1/24 dev vxlan10
          ip n a 192.168.10.2 dev vxlan10 lladdr fc:22:33:44:55:66 nud permanent
      
          for i in {9..0}
          do
              let A=$i+1
      	ip link add vxlan$i type vxlan vni $i dstport 4789 srcport 4789 4789
      	ip link set vxlan$i up
      	ip a a 192.168.$i.1/24 dev vxlan$i
      	ip n a 192.168.$i.2 dev vxlan$i lladdr fc:22:33:44:55:66 nud permanent
      	bridge fdb add fc:22:33:44:55:66 dev vxlan$A dst 192.168.$i.2 self
          done
          hping3 192.168.10.2 -2 -d 60000
      
      Splat looks like:
      [  103.814237][ T1127] =============================================================================
      [  103.871955][ T1127] BUG kmalloc-2k (Tainted: G    B            ): Padding overwritten. 0x00000000897a2e4f-0x000
      [  103.873187][ T1127] -----------------------------------------------------------------------------
      [  103.873187][ T1127]
      [  103.874252][ T1127] INFO: Slab 0x000000005cccc724 objects=5 used=5 fp=0x0000000000000000 flags=0x10000000001020
      [  103.881323][ T1127] CPU: 3 PID: 1127 Comm: hping3 Tainted: G    B             5.7.0+ #575
      [  103.882131][ T1127] Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
      [  103.883006][ T1127] Call Trace:
      [  103.883324][ T1127]  dump_stack+0x96/0xdb
      [  103.883716][ T1127]  slab_err+0xad/0xd0
      [  103.884106][ T1127]  ? _raw_spin_unlock+0x1f/0x30
      [  103.884620][ T1127]  ? get_partial_node.isra.78+0x140/0x360
      [  103.885214][ T1127]  slab_pad_check.part.53+0xf7/0x160
      [  103.885769][ T1127]  ? pskb_expand_head+0x110/0xe10
      [  103.886316][ T1127]  check_slab+0x97/0xb0
      [  103.886763][ T1127]  alloc_debug_processing+0x84/0x1a0
      [  103.887308][ T1127]  ___slab_alloc+0x5a5/0x630
      [  103.887765][ T1127]  ? pskb_expand_head+0x110/0xe10
      [  103.888265][ T1127]  ? lock_downgrade+0x730/0x730
      [  103.888762][ T1127]  ? pskb_expand_head+0x110/0xe10
      [  103.889244][ T1127]  ? __slab_alloc+0x3e/0x80
      [  103.889675][ T1127]  __slab_alloc+0x3e/0x80
      [  103.890108][ T1127]  __kmalloc_node_track_caller+0xc7/0x420
      [ ... ]
      
      Fixes: 11a766ce ("net: Increase xmit RECURSION_LIMIT to 10.")
      Signed-off-by: default avatarTaehee Yoo <ap420073@gmail.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      6aa66b71
    • Tariq Toukan's avatar
      net: Do not clear the sock TX queue in sk_set_socket() · 67321215
      Tariq Toukan authored
      [ Upstream commit 41b14fb8 ]
      
      Clearing the sock TX queue in sk_set_socket() might cause unexpected
      out-of-order transmit when called from sock_orphan(), as outstanding
      packets can pick a different TX queue and bypass the ones already queued.
      
      This is undesired in general. More specifically, it breaks the in-order
      scheduling property guarantee for device-offloaded TLS sockets.
      
      Remove the call to sk_tx_queue_clear() in sk_set_socket(), and add it
      explicitly only where needed.
      
      Fixes: e022f0b4 ("net: Introduce sk_tx_queue_mapping")
      Signed-off-by: default avatarTariq Toukan <tariqt@mellanox.com>
      Reviewed-by: default avatarBoris Pismenny <borisp@mellanox.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      67321215
    • guodeqing's avatar
      net: Fix the arp error in some cases · 6ac341ce
      guodeqing authored
      [ Upstream commit 5eea3a63 ]
      
      ie.,
      $ ifconfig eth0 6.6.6.6 netmask 255.255.255.0
      
      $ ip rule add from 6.6.6.6 table 6666
      
      $ ip route add 9.9.9.9 via 6.6.6.6
      
      $ ping -I 6.6.6.6 9.9.9.9
      PING 9.9.9.9 (9.9.9.9) from 6.6.6.6 : 56(84) bytes of data.
      
      3 packets transmitted, 0 received, 100% packet loss, time 2079ms
      
      $ arp
      Address     HWtype  HWaddress           Flags Mask            Iface
      6.6.6.6             (incomplete)                              eth0
      
      The arp request address is error, this is because fib_table_lookup in
      fib_check_nh lookup the destnation 9.9.9.9 nexthop, the scope of
      the fib result is RT_SCOPE_LINK,the correct scope is RT_SCOPE_HOST.
      Here I add a check of whether this is RT_TABLE_MAIN to solve this problem.
      
      Fixes: 3bfd8472 ("net: Use passed in table for nexthop lookups")
      Signed-off-by: default avatarguodeqing <geffrey.guo@huawei.com>
      Reviewed-by: default avatarDavid Ahern <dsahern@gmail.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      6ac341ce
    • Marcelo Ricardo Leitner's avatar
      sctp: Don't advertise IPv4 addresses if ipv6only is set on the socket · 5030f668
      Marcelo Ricardo Leitner authored
      [ Upstream commit 471e39df ]
      
      If a socket is set ipv6only, it will still send IPv4 addresses in the
      INIT and INIT_ACK packets. This potentially misleads the peer into using
      them, which then would cause association termination.
      
      The fix is to not add IPv4 addresses to ipv6only sockets.
      
      Fixes: 1da177e4 ("Linux-2.6.12-rc2")
      Reported-by: default avatarCorey Minyard <cminyard@mvista.com>
      Signed-off-by: default avatarMarcelo Ricardo Leitner <marcelo.leitner@gmail.com>
      Tested-by: default avatarCorey Minyard <cminyard@mvista.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      5030f668
    • Eric Dumazet's avatar
      tcp: grow window for OOO packets only for SACK flows · 05cc8235
      Eric Dumazet authored
      [ Upstream commit 66205121 ]
      
      Back in 2013, we made a change that broke fast retransmit
      for non SACK flows.
      
      Indeed, for these flows, a sender needs to receive three duplicate
      ACK before starting fast retransmit. Sending ACK with different
      receive window do not count.
      
      Even if enabling SACK is strongly recommended these days,
      there still are some cases where it has to be disabled.
      
      Not increasing the window seems better than having to
      rely on RTO.
      
      After the fix, following packetdrill test gives :
      
      // Initialize connection
          0 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3
         +0 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0
         +0 bind(3, ..., ...) = 0
         +0 listen(3, 1) = 0
      
         +0 < S 0:0(0) win 32792 <mss 1000,nop,wscale 7>
         +0 > S. 0:0(0) ack 1 <mss 1460,nop,wscale 8>
         +0 < . 1:1(0) ack 1 win 514
      
         +0 accept(3, ..., ...) = 4
      
         +0 < . 1:1001(1000) ack 1 win 514
      // Quick ack
         +0 > . 1:1(0) ack 1001 win 264
      
         +0 < . 2001:3001(1000) ack 1 win 514
      // DUPACK : Normally we should not change the window
         +0 > . 1:1(0) ack 1001 win 264
      
         +0 < . 3001:4001(1000) ack 1 win 514
      // DUPACK : Normally we should not change the window
         +0 > . 1:1(0) ack 1001 win 264
      
         +0 < . 4001:5001(1000) ack 1 win 514
      // DUPACK : Normally we should not change the window
          +0 > . 1:1(0) ack 1001 win 264
      
         +0 < . 1001:2001(1000) ack 1 win 514
      // Hole is repaired.
         +0 > . 1:1(0) ack 5001 win 272
      
      Fixes: 4e4f1fc2 ("tcp: properly increase rcv_ssthresh for ofo packets")
      Signed-off-by: default avatarEric Dumazet <edumazet@google.com>
      Reported-by: default avatarVenkat Venkatsubra <venkat.x.venkatsubra@oracle.com>
      Acked-by: default avatarNeal Cardwell <ncardwell@google.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      05cc8235
    • Taehee Yoo's avatar
      ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() · 743475d9
      Taehee Yoo authored
      [ Upstream commit dafabb65 ]
      
      In the datapath, the ip6gre_tunnel_lookup() is used and it internally uses
      fallback tunnel device pointer, which is fb_tunnel_dev.
      This pointer variable should be set to NULL when a fb interface is deleted.
      But there is no routine to set fb_tunnel_dev pointer to NULL.
      So, this pointer will be still used after interface is deleted and
      it eventually results in the use-after-free problem.
      
      Test commands:
          ip netns add A
          ip netns add B
          ip link add eth0 type veth peer name eth1
          ip link set eth0 netns A
          ip link set eth1 netns B
      
          ip netns exec A ip link set lo up
          ip netns exec A ip link set eth0 up
          ip netns exec A ip link add ip6gre1 type ip6gre local fc:0::1 \
      	    remote fc:0::2
          ip netns exec A ip -6 a a fc:100::1/64 dev ip6gre1
          ip netns exec A ip link set ip6gre1 up
          ip netns exec A ip -6 a a fc:0::1/64 dev eth0
          ip netns exec A ip link set ip6gre0 up
      
          ip netns exec B ip link set lo up
          ip netns exec B ip link set eth1 up
          ip netns exec B ip link add ip6gre1 type ip6gre local fc:0::2 \
      	    remote fc:0::1
          ip netns exec B ip -6 a a fc:100::2/64 dev ip6gre1
          ip netns exec B ip link set ip6gre1 up
          ip netns exec B ip -6 a a fc:0::2/64 dev eth1
          ip netns exec B ip link set ip6gre0 up
          ip netns exec A ping fc:100::2 -s 60000 &
          ip netns del B
      
      Splat looks like:
      [   73.087285][    C1] BUG: KASAN: use-after-free in ip6gre_tunnel_lookup+0x1064/0x13f0 [ip6_gre]
      [   73.088361][    C1] Read of size 4 at addr ffff888040559218 by task ping/1429
      [   73.089317][    C1]
      [   73.089638][    C1] CPU: 1 PID: 1429 Comm: ping Not tainted 5.7.0+ #602
      [   73.090531][    C1] Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
      [   73.091725][    C1] Call Trace:
      [   73.092160][    C1]  <IRQ>
      [   73.092556][    C1]  dump_stack+0x96/0xdb
      [   73.093122][    C1]  print_address_description.constprop.6+0x2cc/0x450
      [   73.094016][    C1]  ? ip6gre_tunnel_lookup+0x1064/0x13f0 [ip6_gre]
      [   73.094894][    C1]  ? ip6gre_tunnel_lookup+0x1064/0x13f0 [ip6_gre]
      [   73.095767][    C1]  ? ip6gre_tunnel_lookup+0x1064/0x13f0 [ip6_gre]
      [   73.096619][    C1]  kasan_report+0x154/0x190
      [   73.097209][    C1]  ? ip6gre_tunnel_lookup+0x1064/0x13f0 [ip6_gre]
      [   73.097989][    C1]  ip6gre_tunnel_lookup+0x1064/0x13f0 [ip6_gre]
      [   73.098750][    C1]  ? gre_del_protocol+0x60/0x60 [gre]
      [   73.099500][    C1]  gre_rcv+0x1c5/0x1450 [ip6_gre]
      [   73.100199][    C1]  ? ip6gre_header+0xf00/0xf00 [ip6_gre]
      [   73.100985][    C1]  ? rcu_read_lock_sched_held+0xc0/0xc0
      [   73.101830][    C1]  ? ip6_input_finish+0x5/0xf0
      [   73.102483][    C1]  ip6_protocol_deliver_rcu+0xcbb/0x1510
      [   73.103296][    C1]  ip6_input_finish+0x5b/0xf0
      [   73.103920][    C1]  ip6_input+0xcd/0x2c0
      [   73.104473][    C1]  ? ip6_input_finish+0xf0/0xf0
      [   73.105115][    C1]  ? rcu_read_lock_held+0x90/0xa0
      [   73.105783][    C1]  ? rcu_read_lock_sched_held+0xc0/0xc0
      [   73.106548][    C1]  ipv6_rcv+0x1f1/0x300
      [ ... ]
      Suggested-by: default avatarEric Dumazet <eric.dumazet@gmail.com>
      Fixes: c12b395a ("gre: Support GRE over IPv6")
      Signed-off-by: default avatarTaehee Yoo <ap420073@gmail.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      743475d9
    • Neal Cardwell's avatar
      tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT · 98d3884b
      Neal Cardwell authored
      [ Upstream commit b344579c ]
      
      Mirja Kuehlewind reported a bug in Linux TCP CUBIC Hystart, where
      Hystart HYSTART_DELAY mechanism can exit Slow Start spuriously on an
      ACK when the minimum rtt of a connection goes down. From inspection it
      is clear from the existing code that this could happen in an example
      like the following:
      
      o The first 8 RTT samples in a round trip are 150ms, resulting in a
        curr_rtt of 150ms and a delay_min of 150ms.
      
      o The 9th RTT sample is 100ms. The curr_rtt does not change after the
        first 8 samples, so curr_rtt remains 150ms. But delay_min can be
        lowered at any time, so delay_min falls to 100ms. The code executes
        the HYSTART_DELAY comparison between curr_rtt of 150ms and delay_min
        of 100ms, and the curr_rtt is declared far enough above delay_min to
        force a (spurious) exit of Slow start.
      
      The fix here is simple: allow every RTT sample in a round trip to
      lower the curr_rtt.
      
      Fixes: ae27e98a ("[TCP] CUBIC v2.3")
      Reported-by: default avatarMirja Kuehlewind <mirja.kuehlewind@ericsson.com>
      Signed-off-by: default avatarNeal Cardwell <ncardwell@google.com>
      Signed-off-by: default avatarEric Dumazet <edumazet@google.com>
      Acked-by: default avatarSoheil Hassas Yeganeh <soheil@google.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      98d3884b
    • Taehee Yoo's avatar
      ip_tunnel: fix use-after-free in ip_tunnel_lookup() · ae1c468b
      Taehee Yoo authored
      [ Upstream commit ba61539c ]
      
      In the datapath, the ip_tunnel_lookup() is used and it internally uses
      fallback tunnel device pointer, which is fb_tunnel_dev.
      This pointer variable should be set to NULL when a fb interface is deleted.
      But there is no routine to set fb_tunnel_dev pointer to NULL.
      So, this pointer will be still used after interface is deleted and
      it eventually results in the use-after-free problem.
      
      Test commands:
          ip netns add A
          ip netns add B
          ip link add eth0 type veth peer name eth1
          ip link set eth0 netns A
          ip link set eth1 netns B
      
          ip netns exec A ip link set lo up
          ip netns exec A ip link set eth0 up
          ip netns exec A ip link add gre1 type gre local 10.0.0.1 \
      	    remote 10.0.0.2
          ip netns exec A ip link set gre1 up
          ip netns exec A ip a a 10.0.100.1/24 dev gre1
          ip netns exec A ip a a 10.0.0.1/24 dev eth0
      
          ip netns exec B ip link set lo up
          ip netns exec B ip link set eth1 up
          ip netns exec B ip link add gre1 type gre local 10.0.0.2 \
      	    remote 10.0.0.1
          ip netns exec B ip link set gre1 up
          ip netns exec B ip a a 10.0.100.2/24 dev gre1
          ip netns exec B ip a a 10.0.0.2/24 dev eth1
          ip netns exec A hping3 10.0.100.2 -2 --flood -d 60000 &
          ip netns del B
      
      Splat looks like:
      [   77.793450][    C3] ==================================================================
      [   77.794702][    C3] BUG: KASAN: use-after-free in ip_tunnel_lookup+0xcc4/0xf30
      [   77.795573][    C3] Read of size 4 at addr ffff888060bd9c84 by task hping3/2905
      [   77.796398][    C3]
      [   77.796664][    C3] CPU: 3 PID: 2905 Comm: hping3 Not tainted 5.8.0-rc1+ #616
      [   77.797474][    C3] Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006
      [   77.798453][    C3] Call Trace:
      [   77.798815][    C3]  <IRQ>
      [   77.799142][    C3]  dump_stack+0x9d/0xdb
      [   77.799605][    C3]  print_address_description.constprop.7+0x2cc/0x450
      [   77.800365][    C3]  ? ip_tunnel_lookup+0xcc4/0xf30
      [   77.800908][    C3]  ? ip_tunnel_lookup+0xcc4/0xf30
      [   77.801517][    C3]  ? ip_tunnel_lookup+0xcc4/0xf30
      [   77.802145][    C3]  kasan_report+0x154/0x190
      [   77.802821][    C3]  ? ip_tunnel_lookup+0xcc4/0xf30
      [   77.803503][    C3]  ip_tunnel_lookup+0xcc4/0xf30
      [   77.804165][    C3]  __ipgre_rcv+0x1ab/0xaa0 [ip_gre]
      [   77.804862][    C3]  ? rcu_read_lock_sched_held+0xc0/0xc0
      [   77.805621][    C3]  gre_rcv+0x304/0x1910 [ip_gre]
      [   77.806293][    C3]  ? lock_acquire+0x1a9/0x870
      [   77.806925][    C3]  ? gre_rcv+0xfe/0x354 [gre]
      [   77.807559][    C3]  ? erspan_xmit+0x2e60/0x2e60 [ip_gre]
      [   77.808305][    C3]  ? rcu_read_lock_sched_held+0xc0/0xc0
      [   77.809032][    C3]  ? rcu_read_lock_held+0x90/0xa0
      [   77.809713][    C3]  gre_rcv+0x1b8/0x354 [gre]
      [ ... ]
      Suggested-by: default avatarEric Dumazet <eric.dumazet@gmail.com>
      Fixes: c5441932 ("GRE: Refactor GRE tunneling code.")
      Signed-off-by: default avatarTaehee Yoo <ap420073@gmail.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      ae1c468b
    • David Christensen's avatar
      tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes · b6e5086c
      David Christensen authored
      [ Upstream commit 3a2656a2 ]
      
      The driver function tg3_io_error_detected() calls napi_disable twice,
      without an intervening napi_enable, when the number of EEH errors exceeds
      eeh_max_freezes, resulting in an indefinite sleep while holding rtnl_lock.
      
      Add check for pcierr_recovery which skips code already executed for the
      "Frozen" state.
      Signed-off-by: default avatarDavid Christensen <drc@linux.vnet.ibm.com>
      Reviewed-by: default avatarMichael Chan <michael.chan@broadcom.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      b6e5086c