Changelog in Linux kernel 6.1.124

 
af_packet: fix vlan_get_protocol_dgram() vs MSG_PEEK [+ + +]
Author: Eric Dumazet <[email protected]>
Date:   Mon Dec 30 16:10:04 2024 +0000

    af_packet: fix vlan_get_protocol_dgram() vs MSG_PEEK
    
    [ Upstream commit f91a5b8089389eb408501af2762f168c3aaa7b79 ]
    
    Blamed commit forgot MSG_PEEK case, allowing a crash [1] as found
    by syzbot.
    
    Rework vlan_get_protocol_dgram() to not touch skb at all,
    so that it can be used from many cpus on the same skb.
    
    Add a const qualifier to skb argument.
    
    [1]
    skbuff: skb_under_panic: text:ffffffff8a8ccd05 len:29 put:14 head:ffff88807fc8e400 data:ffff88807fc8e3f4 tail:0x11 end:0x140 dev:<NULL>
    ------------[ cut here ]------------
     kernel BUG at net/core/skbuff.c:206 !
    Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
    CPU: 1 UID: 0 PID: 5892 Comm: syz-executor883 Not tainted 6.13.0-rc4-syzkaller-00054-gd6ef8b40d075 #0
    Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
     RIP: 0010:skb_panic net/core/skbuff.c:206 [inline]
     RIP: 0010:skb_under_panic+0x14b/0x150 net/core/skbuff.c:216
    Code: 0b 8d 48 c7 c6 86 d5 25 8e 48 8b 54 24 08 8b 0c 24 44 8b 44 24 04 4d 89 e9 50 41 54 41 57 41 56 e8 5a 69 79 f7 48 83 c4 20 90 <0f> 0b 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3
    RSP: 0018:ffffc900038d7638 EFLAGS: 00010282
    RAX: 0000000000000087 RBX: dffffc0000000000 RCX: 609ffd18ea660600
    RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000
    RBP: ffff88802483c8d0 R08: ffffffff817f0a8c R09: 1ffff9200071ae60
    R10: dffffc0000000000 R11: fffff5200071ae61 R12: 0000000000000140
    R13: ffff88807fc8e400 R14: ffff88807fc8e3f4 R15: 0000000000000011
    FS:  00007fbac5e006c0(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 00007fbac5e00d58 CR3: 000000001238e000 CR4: 00000000003526f0
    DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
    Call Trace:
     <TASK>
      skb_push+0xe5/0x100 net/core/skbuff.c:2636
      vlan_get_protocol_dgram+0x165/0x290 net/packet/af_packet.c:585
      packet_recvmsg+0x948/0x1ef0 net/packet/af_packet.c:3552
      sock_recvmsg_nosec net/socket.c:1033 [inline]
      sock_recvmsg+0x22f/0x280 net/socket.c:1055
      ____sys_recvmsg+0x1c6/0x480 net/socket.c:2803
      ___sys_recvmsg net/socket.c:2845 [inline]
      do_recvmmsg+0x426/0xab0 net/socket.c:2940
      __sys_recvmmsg net/socket.c:3014 [inline]
      __do_sys_recvmmsg net/socket.c:3037 [inline]
      __se_sys_recvmmsg net/socket.c:3030 [inline]
      __x64_sys_recvmmsg+0x199/0x250 net/socket.c:3030
      do_syscall_x64 arch/x86/entry/common.c:52 [inline]
      do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
     entry_SYSCALL_64_after_hwframe+0x77/0x7f
    
    Fixes: 79eecf631c14 ("af_packet: Handle outgoing VLAN packets without hardware offloading")
    Reported-by: [email protected]
    Closes: https://lore.kernel.org/netdev/[email protected]/T/#u
    Signed-off-by: Eric Dumazet <[email protected]>
    Cc: Chengen Du <[email protected]>
    Reviewed-by: Willem de Bruijn <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

af_packet: fix vlan_get_tci() vs MSG_PEEK [+ + +]
Author: Eric Dumazet <[email protected]>
Date:   Mon Dec 30 16:10:03 2024 +0000

    af_packet: fix vlan_get_tci() vs MSG_PEEK
    
    [ Upstream commit 77ee7a6d16b6ec07b5c3ae2b6b60a24c1afbed09 ]
    
    Blamed commit forgot MSG_PEEK case, allowing a crash [1] as found
    by syzbot.
    
    Rework vlan_get_tci() to not touch skb at all,
    so that it can be used from many cpus on the same skb.
    
    Add a const qualifier to skb argument.
    
    [1]
    skbuff: skb_under_panic: text:ffffffff8a8da482 len:32 put:14 head:ffff88807a1d5800 data:ffff88807a1d5810 tail:0x14 end:0x140 dev:<NULL>
    ------------[ cut here ]------------
     kernel BUG at net/core/skbuff.c:206 !
    Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
    CPU: 0 UID: 0 PID: 5880 Comm: syz-executor172 Not tainted 6.13.0-rc3-syzkaller-00762-g9268abe611b0 #0
    Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
     RIP: 0010:skb_panic net/core/skbuff.c:206 [inline]
     RIP: 0010:skb_under_panic+0x14b/0x150 net/core/skbuff.c:216
    Code: 0b 8d 48 c7 c6 9e 6c 26 8e 48 8b 54 24 08 8b 0c 24 44 8b 44 24 04 4d 89 e9 50 41 54 41 57 41 56 e8 3a 5a 79 f7 48 83 c4 20 90 <0f> 0b 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3
    RSP: 0018:ffffc90003baf5b8 EFLAGS: 00010286
    RAX: 0000000000000087 RBX: dffffc0000000000 RCX: 8565c1eec37aa000
    RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000
    RBP: ffff88802616fb50 R08: ffffffff817f0a4c R09: 1ffff92000775e50
    R10: dffffc0000000000 R11: fffff52000775e51 R12: 0000000000000140
    R13: ffff88807a1d5800 R14: ffff88807a1d5810 R15: 0000000000000014
    FS:  00007fa03261f6c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000
    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 00007ffd65753000 CR3: 0000000031720000 CR4: 00000000003526f0
    DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
    Call Trace:
     <TASK>
      skb_push+0xe5/0x100 net/core/skbuff.c:2636
      vlan_get_tci+0x272/0x550 net/packet/af_packet.c:565
      packet_recvmsg+0x13c9/0x1ef0 net/packet/af_packet.c:3616
      sock_recvmsg_nosec net/socket.c:1044 [inline]
      sock_recvmsg+0x22f/0x280 net/socket.c:1066
      ____sys_recvmsg+0x1c6/0x480 net/socket.c:2814
      ___sys_recvmsg net/socket.c:2856 [inline]
      do_recvmmsg+0x426/0xab0 net/socket.c:2951
      __sys_recvmmsg net/socket.c:3025 [inline]
      __do_sys_recvmmsg net/socket.c:3048 [inline]
      __se_sys_recvmmsg net/socket.c:3041 [inline]
      __x64_sys_recvmmsg+0x199/0x250 net/socket.c:3041
      do_syscall_x64 arch/x86/entry/common.c:52 [inline]
      do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
    
    Fixes: 79eecf631c14 ("af_packet: Handle outgoing VLAN packets without hardware offloading")
    Reported-by: [email protected]
    Closes: https://lore.kernel.org/netdev/[email protected]/T/#u
    Signed-off-by: Eric Dumazet <[email protected]>
    Cc: Chengen Du <[email protected]>
    Reviewed-by: Willem de Bruijn <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

 
ALSA hda/realtek: Add quirk for Framework F111:000C [+ + +]
Author: Daniel Schaefer <[email protected]>
Date:   Tue Dec 31 12:59:58 2024 +0800

    ALSA hda/realtek: Add quirk for Framework F111:000C
    
    commit 7b509910b3ad6d7aacead24c8744de10daf8715d upstream.
    
    Similar to commit eb91c456f371
    ("ALSA: hda/realtek: Add Framework Laptop 13 (Intel Core Ultra) to quirks")
    and previous quirks for Framework systems with
    Realtek codecs.
    
    000C is a new platform that will also have an ALC285 codec and needs the
    same quirk.
    
    Cc: Jaroslav Kysela <[email protected]>
    Cc: Takashi Iwai <[email protected]>
    Cc: [email protected]
    Cc: Dustin L. Howett <[email protected]>
    Signed-off-by: Daniel Schaefer <[email protected]>
    Cc: <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Takashi Iwai <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
ALSA: hda/realtek: Add new alc2xx-fixup-headset-mic model [+ + +]
Author: Vasiliy Kovalev <[email protected]>
Date:   Sat Dec 7 23:18:36 2024 +0300

    ALSA: hda/realtek: Add new alc2xx-fixup-headset-mic model
    
    [ Upstream commit 50db91fccea0da5c669bc68e2429e8de303758d3 ]
    
    Introduces the alc2xx-fixup-headset-mic model to simplify enabling
    headset microphones on ALC2XX codecs.
    
    Many recent configurations, as well as older systems that lacked this
    fix for a long time, leave headset microphones inactive by default.
    This addition provides a flexible workaround using the existing
    ALC2XX_FIXUP_HEADSET_MIC quirk.
    
    Signed-off-by: Vasiliy Kovalev <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Takashi Iwai <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

ALSA: seq: oss: Fix races at processing SysEx messages [+ + +]
Author: Takashi Iwai <[email protected]>
Date:   Mon Dec 30 12:05:35 2024 +0100

    ALSA: seq: oss: Fix races at processing SysEx messages
    
    commit 0179488ca992d79908b8e26b9213f1554fc5bacc upstream.
    
    OSS sequencer handles the SysEx messages split in 6 bytes packets, and
    ALSA sequencer OSS layer tries to combine those.  It stores the data
    in the internal buffer and this access is racy as of now, which may
    lead to the out-of-bounds access.
    
    As a temporary band-aid fix, introduce a mutex for serializing the
    process of the SysEx message packets.
    
    Reported-by: Kun Hu <[email protected]>
    Closes: https://lore.kernel.org/[email protected]
    Cc: <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Takashi Iwai <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

ALSA: usb-audio: US16x08: Initialize array before use [+ + +]
Author: Tanya Agarwal <[email protected]>
Date:   Sun Dec 29 11:32:42 2024 +0530

    ALSA: usb-audio: US16x08: Initialize array before use
    
    [ Upstream commit b06a6187ef983f501e93faa56209169752d3bde3 ]
    
    Initialize meter_urb array before use in mixer_us16x08.c.
    
    CID 1410197: (#1 of 1): Uninitialized scalar variable (UNINIT)
    uninit_use_in_call: Using uninitialized value *meter_urb when
    calling get_meter_levels_from_urb.
    
    Coverity Link:
    https://scan7.scan.coverity.com/#/project-view/52849/11354?selectedIssue=1410197
    
    Fixes: d2bb390a2081 ("ALSA: usb-audio: Tascam US-16x08 DSP mixer quirk")
    Signed-off-by: Tanya Agarwal <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Takashi Iwai <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

 
ARC: build: Try to guess GCC variant of cross compiler [+ + +]
Author: Leon Romanovsky <[email protected]>
Date:   Tue Dec 3 14:37:15 2024 +0200

    ARC: build: Try to guess GCC variant of cross compiler
    
    [ Upstream commit 824927e88456331c7a999fdf5d9d27923b619590 ]
    
    ARC GCC compiler is packaged starting from Fedora 39i and the GCC
    variant of cross compile tools has arc-linux-gnu- prefix and not
    arc-linux-. This is causing that CROSS_COMPILE variable is left unset.
    
    This change allows builds without need to supply CROSS_COMPILE argument
    if distro package is used.
    
    Before this change:
    $ make -j 128 ARCH=arc W=1 drivers/infiniband/hw/mlx4/
      gcc: warning: ‘-mcpu=’ is deprecated; use ‘-mtune=’ or ‘-march=’ instead
      gcc: error: unrecognized command-line option ‘-mmedium-calls’
      gcc: error: unrecognized command-line option ‘-mlock’
      gcc: error: unrecognized command-line option ‘-munaligned-access’
    
    [1] https://packages.fedoraproject.org/pkgs/cross-gcc/gcc-arc-linux-gnu/index.html
    Signed-off-by: Leon Romanovsky <[email protected]>
    Signed-off-by: Vineet Gupta <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

 
Bluetooth: hci_core: Fix sleeping function called from invalid context [+ + +]
Author: Luiz Augusto von Dentz <[email protected]>
Date:   Tue Dec 3 16:07:32 2024 -0500

    Bluetooth: hci_core: Fix sleeping function called from invalid context
    
    [ Upstream commit 4d94f05558271654670d18c26c912da0c1c15549 ]
    
    This reworks hci_cb_list to not use mutex hci_cb_list_lock to avoid bugs
    like the bellow:
    
    BUG: sleeping function called from invalid context at kernel/locking/mutex.c:585
    in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 5070, name: kworker/u9:2
    preempt_count: 0, expected: 0
    RCU nest depth: 1, expected: 0
    4 locks held by kworker/u9:2/5070:
     #0: ffff888015be3948 ((wq_completion)hci0#2){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3229 [inline]
     #0: ffff888015be3948 ((wq_completion)hci0#2){+.+.}-{0:0}, at: process_scheduled_works+0x8e0/0x1770 kernel/workqueue.c:3335
     #1: ffffc90003b6fd00 ((work_completion)(&hdev->rx_work)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3230 [inline]
     #1: ffffc90003b6fd00 ((work_completion)(&hdev->rx_work)){+.+.}-{0:0}, at: process_scheduled_works+0x91b/0x1770 kernel/workqueue.c:3335
     #2: ffff8880665d0078 (&hdev->lock){+.+.}-{3:3}, at: hci_le_create_big_complete_evt+0xcf/0xae0 net/bluetooth/hci_event.c:6914
     #3: ffffffff8e132020 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline]
     #3: ffffffff8e132020 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:750 [inline]
     #3: ffffffff8e132020 (rcu_read_lock){....}-{1:2}, at: hci_le_create_big_complete_evt+0xdb/0xae0 net/bluetooth/hci_event.c:6915
    CPU: 0 PID: 5070 Comm: kworker/u9:2 Not tainted 6.8.0-syzkaller-08073-g480e035fc4c7 #0
    Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
    Workqueue: hci0 hci_rx_work
    Call Trace:
     <TASK>
     __dump_stack lib/dump_stack.c:88 [inline]
     dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
     __might_resched+0x5d4/0x780 kernel/sched/core.c:10187
     __mutex_lock_common kernel/locking/mutex.c:585 [inline]
     __mutex_lock+0xc1/0xd70 kernel/locking/mutex.c:752
     hci_connect_cfm include/net/bluetooth/hci_core.h:2004 [inline]
     hci_le_create_big_complete_evt+0x3d9/0xae0 net/bluetooth/hci_event.c:6939
     hci_event_func net/bluetooth/hci_event.c:7514 [inline]
     hci_event_packet+0xa53/0x1540 net/bluetooth/hci_event.c:7569
     hci_rx_work+0x3e8/0xca0 net/bluetooth/hci_core.c:4171
     process_one_work kernel/workqueue.c:3254 [inline]
     process_scheduled_works+0xa00/0x1770 kernel/workqueue.c:3335
     worker_thread+0x86d/0xd70 kernel/workqueue.c:3416
     kthread+0x2f0/0x390 kernel/kthread.c:388
     ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
     ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243
     </TASK>
    
    Reported-by: [email protected]
    Tested-by: [email protected]
    Closes: https://syzkaller.appspot.com/bug?extid=2fb0835e0c9cefc34614
    Signed-off-by: Luiz Augusto von Dentz <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

 
bpf: fix potential error return [+ + +]
Author: Anton Protopopov <[email protected]>
Date:   Tue Dec 10 11:42:45 2024 +0000

    bpf: fix potential error return
    
    [ Upstream commit c4441ca86afe4814039ee1b32c39d833c1a16bbc ]
    
    The bpf_remove_insns() function returns WARN_ON_ONCE(error), where
    error is a result of bpf_adj_branches(), and thus should be always 0
    However, if for any reason it is not 0, then it will be converted to
    boolean by WARN_ON_ONCE and returned to user space as 1, not an actual
    error value. Fix this by returning the original err after the WARN check.
    
    Signed-off-by: Anton Protopopov <[email protected]>
    Acked-by: Jiri Olsa <[email protected]>
    Acked-by: Andrii Nakryiko <[email protected]>
    Link: https://lore.kernel.org/r/[email protected]
    Signed-off-by: Alexei Starovoitov <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

 
btrfs: fix use-after-free in btrfs_encoded_read_endio() [+ + +]
Author: Johannes Thumshirn <[email protected]>
Date:   Wed Nov 13 18:16:48 2024 +0100

    btrfs: fix use-after-free in btrfs_encoded_read_endio()
    
    commit 05b36b04d74a517d6675bf2f90829ff1ac7e28dc upstream.
    
    Shinichiro reported the following use-after free that sometimes is
    happening in our CI system when running fstests' btrfs/284 on a TCMU
    runner device:
    
      BUG: KASAN: slab-use-after-free in lock_release+0x708/0x780
      Read of size 8 at addr ffff888106a83f18 by task kworker/u80:6/219
    
      CPU: 8 UID: 0 PID: 219 Comm: kworker/u80:6 Not tainted 6.12.0-rc6-kts+ #15
      Hardware name: Supermicro Super Server/X11SPi-TF, BIOS 3.3 02/21/2020
      Workqueue: btrfs-endio btrfs_end_bio_work [btrfs]
      Call Trace:
       <TASK>
       dump_stack_lvl+0x6e/0xa0
       ? lock_release+0x708/0x780
       print_report+0x174/0x505
       ? lock_release+0x708/0x780
       ? __virt_addr_valid+0x224/0x410
       ? lock_release+0x708/0x780
       kasan_report+0xda/0x1b0
       ? lock_release+0x708/0x780
       ? __wake_up+0x44/0x60
       lock_release+0x708/0x780
       ? __pfx_lock_release+0x10/0x10
       ? __pfx_do_raw_spin_lock+0x10/0x10
       ? lock_is_held_type+0x9a/0x110
       _raw_spin_unlock_irqrestore+0x1f/0x60
       __wake_up+0x44/0x60
       btrfs_encoded_read_endio+0x14b/0x190 [btrfs]
       btrfs_check_read_bio+0x8d9/0x1360 [btrfs]
       ? lock_release+0x1b0/0x780
       ? trace_lock_acquire+0x12f/0x1a0
       ? __pfx_btrfs_check_read_bio+0x10/0x10 [btrfs]
       ? process_one_work+0x7e3/0x1460
       ? lock_acquire+0x31/0xc0
       ? process_one_work+0x7e3/0x1460
       process_one_work+0x85c/0x1460
       ? __pfx_process_one_work+0x10/0x10
       ? assign_work+0x16c/0x240
       worker_thread+0x5e6/0xfc0
       ? __pfx_worker_thread+0x10/0x10
       kthread+0x2c3/0x3a0
       ? __pfx_kthread+0x10/0x10
       ret_from_fork+0x31/0x70
       ? __pfx_kthread+0x10/0x10
       ret_from_fork_asm+0x1a/0x30
       </TASK>
    
      Allocated by task 3661:
       kasan_save_stack+0x30/0x50
       kasan_save_track+0x14/0x30
       __kasan_kmalloc+0xaa/0xb0
       btrfs_encoded_read_regular_fill_pages+0x16c/0x6d0 [btrfs]
       send_extent_data+0xf0f/0x24a0 [btrfs]
       process_extent+0x48a/0x1830 [btrfs]
       changed_cb+0x178b/0x2ea0 [btrfs]
       btrfs_ioctl_send+0x3bf9/0x5c20 [btrfs]
       _btrfs_ioctl_send+0x117/0x330 [btrfs]
       btrfs_ioctl+0x184a/0x60a0 [btrfs]
       __x64_sys_ioctl+0x12e/0x1a0
       do_syscall_64+0x95/0x180
       entry_SYSCALL_64_after_hwframe+0x76/0x7e
    
      Freed by task 3661:
       kasan_save_stack+0x30/0x50
       kasan_save_track+0x14/0x30
       kasan_save_free_info+0x3b/0x70
       __kasan_slab_free+0x4f/0x70
       kfree+0x143/0x490
       btrfs_encoded_read_regular_fill_pages+0x531/0x6d0 [btrfs]
       send_extent_data+0xf0f/0x24a0 [btrfs]
       process_extent+0x48a/0x1830 [btrfs]
       changed_cb+0x178b/0x2ea0 [btrfs]
       btrfs_ioctl_send+0x3bf9/0x5c20 [btrfs]
       _btrfs_ioctl_send+0x117/0x330 [btrfs]
       btrfs_ioctl+0x184a/0x60a0 [btrfs]
       __x64_sys_ioctl+0x12e/0x1a0
       do_syscall_64+0x95/0x180
       entry_SYSCALL_64_after_hwframe+0x76/0x7e
    
      The buggy address belongs to the object at ffff888106a83f00
       which belongs to the cache kmalloc-rnd-07-96 of size 96
      The buggy address is located 24 bytes inside of
       freed 96-byte region [ffff888106a83f00, ffff888106a83f60)
    
      The buggy address belongs to the physical page:
      page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888106a83800 pfn:0x106a83
      flags: 0x17ffffc0000000(node=0|zone=2|lastcpupid=0x1fffff)
      page_type: f5(slab)
      raw: 0017ffffc0000000 ffff888100053680 ffffea0004917200 0000000000000004
      raw: ffff888106a83800 0000000080200019 00000001f5000000 0000000000000000
      page dumped because: kasan: bad access detected
    
      Memory state around the buggy address:
       ffff888106a83e00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
       ffff888106a83e80: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
      >ffff888106a83f00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
                                  ^
       ffff888106a83f80: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
       ffff888106a84000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
      ==================================================================
    
    Further analyzing the trace and the crash dump's vmcore file shows that
    the wake_up() call in btrfs_encoded_read_endio() is calling wake_up() on
    the wait_queue that is in the private data passed to the end_io handler.
    
    Commit 4ff47df40447 ("btrfs: move priv off stack in
    btrfs_encoded_read_regular_fill_pages()") moved 'struct
    btrfs_encoded_read_private' off the stack.
    
    Before that commit one can see a corruption of the private data when
    analyzing the vmcore after a crash:
    
    *(struct btrfs_encoded_read_private *)0xffff88815626eec8 = {
            .wait = (wait_queue_head_t){
                    .lock = (spinlock_t){
                            .rlock = (struct raw_spinlock){
                                    .raw_lock = (arch_spinlock_t){
                                            .val = (atomic_t){
                                                    .counter = (int)-2005885696,
                                            },
                                            .locked = (u8)0,
                                            .pending = (u8)157,
                                            .locked_pending = (u16)40192,
                                            .tail = (u16)34928,
                                    },
                                    .magic = (unsigned int)536325682,
                                    .owner_cpu = (unsigned int)29,
                                    .owner = (void *)__SCT__tp_func_btrfs_transaction_commit+0x0 = 0x0,
                                    .dep_map = (struct lockdep_map){
                                            .key = (struct lock_class_key *)0xffff8881575a3b6c,
                                            .class_cache = (struct lock_class *[2]){ 0xffff8882a71985c0, 0xffffea00066f5d40 },
                                            .name = (const char *)0xffff88815626f100 = "",
                                            .wait_type_outer = (u8)37,
                                            .wait_type_inner = (u8)178,
                                            .lock_type = (u8)154,
                                    },
                            },
                            .__padding = (u8 [24]){ 0, 157, 112, 136, 50, 174, 247, 31, 29 },
                            .dep_map = (struct lockdep_map){
                                    .key = (struct lock_class_key *)0xffff8881575a3b6c,
                                    .class_cache = (struct lock_class *[2]){ 0xffff8882a71985c0, 0xffffea00066f5d40 },
                                    .name = (const char *)0xffff88815626f100 = "",
                                    .wait_type_outer = (u8)37,
                                    .wait_type_inner = (u8)178,
                                    .lock_type = (u8)154,
                            },
                    },
                    .head = (struct list_head){
                            .next = (struct list_head *)0x112cca,
                            .prev = (struct list_head *)0x47,
                    },
            },
            .pending = (atomic_t){
                    .counter = (int)-1491499288,
            },
            .status = (blk_status_t)130,
    }
    
    Here we can see several indicators of in-memory data corruption, e.g. the
    large negative atomic values of ->pending or
    ->wait->lock->rlock->raw_lock->val, as well as the bogus spinlock magic
    0x1ff7ae32 (decimal 536325682 above) instead of 0xdead4ead or the bogus
    pointer values for ->wait->head.
    
    To fix this, change atomic_dec_return() to atomic_dec_and_test() to fix the
    corruption, as atomic_dec_return() is defined as two instructions on
    x86_64, whereas atomic_dec_and_test() is defined as a single atomic
    operation. This can lead to a situation where counter value is already
    decremented but the if statement in btrfs_encoded_read_endio() is not
    completely processed, i.e. the 0 test has not completed. If another thread
    continues executing btrfs_encoded_read_regular_fill_pages() the
    atomic_dec_return() there can see an already updated ->pending counter and
    continues by freeing the private data. Continuing in the endio handler the
    test for 0 succeeds and the wait_queue is woken up, resulting in a
    use-after-free.
    
    Reported-by: Shinichiro Kawasaki <[email protected]>
    Suggested-by: Damien Le Moal <[email protected]>
    Fixes: 1881fba89bd5 ("btrfs: add BTRFS_IOC_ENCODED_READ ioctl")
    CC: [email protected] # 6.1+
    Reviewed-by: Filipe Manana <[email protected]>
    Reviewed-by: Qu Wenruo <[email protected]>
    Signed-off-by: Johannes Thumshirn <[email protected]>
    Reviewed-by: David Sterba <[email protected]>
    Signed-off-by: David Sterba <[email protected]>
    Signed-off-by: Alva Lan <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

btrfs: fix use-after-free when COWing tree bock and tracing is enabled [+ + +]
Author: Filipe Manana <[email protected]>
Date:   Wed Dec 11 16:08:07 2024 +0000

    btrfs: fix use-after-free when COWing tree bock and tracing is enabled
    
    [ Upstream commit 44f52bbe96dfdbe4aca3818a2534520082a07040 ]
    
    When a COWing a tree block, at btrfs_cow_block(), and we have the
    tracepoint trace_btrfs_cow_block() enabled and preemption is also enabled
    (CONFIG_PREEMPT=y), we can trigger a use-after-free in the COWed extent
    buffer while inside the tracepoint code. This is because in some paths
    that call btrfs_cow_block(), such as btrfs_search_slot(), we are holding
    the last reference on the extent buffer @buf so btrfs_force_cow_block()
    drops the last reference on the @buf extent buffer when it calls
    free_extent_buffer_stale(buf), which schedules the release of the extent
    buffer with RCU. This means that if we are on a kernel with preemption,
    the current task may be preempted before calling trace_btrfs_cow_block()
    and the extent buffer already released by the time trace_btrfs_cow_block()
    is called, resulting in a use-after-free.
    
    Fix this by moving the trace_btrfs_cow_block() from btrfs_cow_block() to
    btrfs_force_cow_block() before the COWed extent buffer is freed.
    This also has a side effect of invoking the tracepoint in the tree defrag
    code, at defrag.c:btrfs_realloc_node(), since btrfs_force_cow_block() is
    called there, but this is fine and it was actually missing there.
    
    Reported-by: [email protected]
    Link: https://lore.kernel.org/linux-btrfs/[email protected]/
    CC: [email protected] # 5.4+
    Reviewed-by: Qu Wenruo <[email protected]>
    Signed-off-by: Filipe Manana <[email protected]>
    Signed-off-by: David Sterba <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount [+ + +]
Author: Filipe Manana <[email protected]>
Date:   Tue Dec 3 11:53:27 2024 +0000

    btrfs: flush delalloc workers queue before stopping cleaner kthread during unmount
    
    [ Upstream commit f10bef73fb355e3fc85e63a50386798be68ff486 ]
    
    During the unmount path, at close_ctree(), we first stop the cleaner
    kthread, using kthread_stop() which frees the associated task_struct, and
    then stop and destroy all the work queues. However after we stopped the
    cleaner we may still have a worker from the delalloc_workers queue running
    inode.c:submit_compressed_extents(), which calls btrfs_add_delayed_iput(),
    which in turn tries to wake up the cleaner kthread - which was already
    destroyed before, resulting in a use-after-free on the task_struct.
    
    Syzbot reported this with the following stack traces:
    
      BUG: KASAN: slab-use-after-free in __lock_acquire+0x78/0x2100 kernel/locking/lockdep.c:5089
      Read of size 8 at addr ffff8880259d2818 by task kworker/u8:3/52
    
      CPU: 1 UID: 0 PID: 52 Comm: kworker/u8:3 Not tainted 6.13.0-rc1-syzkaller-00002-gcdd30ebb1b9f #0
      Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
      Workqueue: btrfs-delalloc btrfs_work_helper
      Call Trace:
       <TASK>
       __dump_stack lib/dump_stack.c:94 [inline]
       dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
       print_address_description mm/kasan/report.c:378 [inline]
       print_report+0x169/0x550 mm/kasan/report.c:489
       kasan_report+0x143/0x180 mm/kasan/report.c:602
       __lock_acquire+0x78/0x2100 kernel/locking/lockdep.c:5089
       lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5849
       __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
       _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162
       class_raw_spinlock_irqsave_constructor include/linux/spinlock.h:551 [inline]
       try_to_wake_up+0xc2/0x1470 kernel/sched/core.c:4205
       submit_compressed_extents+0xdf/0x16e0 fs/btrfs/inode.c:1615
       run_ordered_work fs/btrfs/async-thread.c:288 [inline]
       btrfs_work_helper+0x96f/0xc40 fs/btrfs/async-thread.c:324
       process_one_work kernel/workqueue.c:3229 [inline]
       process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310
       worker_thread+0x870/0xd30 kernel/workqueue.c:3391
       kthread+0x2f0/0x390 kernel/kthread.c:389
       ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
       ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
       </TASK>
    
      Allocated by task 2:
       kasan_save_stack mm/kasan/common.c:47 [inline]
       kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
       unpoison_slab_object mm/kasan/common.c:319 [inline]
       __kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:345
       kasan_slab_alloc include/linux/kasan.h:250 [inline]
       slab_post_alloc_hook mm/slub.c:4104 [inline]
       slab_alloc_node mm/slub.c:4153 [inline]
       kmem_cache_alloc_node_noprof+0x1d9/0x380 mm/slub.c:4205
       alloc_task_struct_node kernel/fork.c:180 [inline]
       dup_task_struct+0x57/0x8c0 kernel/fork.c:1113
       copy_process+0x5d1/0x3d50 kernel/fork.c:2225
       kernel_clone+0x223/0x870 kernel/fork.c:2807
       kernel_thread+0x1bc/0x240 kernel/fork.c:2869
       create_kthread kernel/kthread.c:412 [inline]
       kthreadd+0x60d/0x810 kernel/kthread.c:767
       ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
       ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
    
      Freed by task 24:
       kasan_save_stack mm/kasan/common.c:47 [inline]
       kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
       kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:582
       poison_slab_object mm/kasan/common.c:247 [inline]
       __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264
       kasan_slab_free include/linux/kasan.h:233 [inline]
       slab_free_hook mm/slub.c:2338 [inline]
       slab_free mm/slub.c:4598 [inline]
       kmem_cache_free+0x195/0x410 mm/slub.c:4700
       put_task_struct include/linux/sched/task.h:144 [inline]
       delayed_put_task_struct+0x125/0x300 kernel/exit.c:227
       rcu_do_batch kernel/rcu/tree.c:2567 [inline]
       rcu_core+0xaaa/0x17a0 kernel/rcu/tree.c:2823
       handle_softirqs+0x2d4/0x9b0 kernel/softirq.c:554
       run_ksoftirqd+0xca/0x130 kernel/softirq.c:943
       smpboot_thread_fn+0x544/0xa30 kernel/smpboot.c:164
       kthread+0x2f0/0x390 kernel/kthread.c:389
       ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
       ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
    
      Last potentially related work creation:
       kasan_save_stack+0x3f/0x60 mm/kasan/common.c:47
       __kasan_record_aux_stack+0xac/0xc0 mm/kasan/generic.c:544
       __call_rcu_common kernel/rcu/tree.c:3086 [inline]
       call_rcu+0x167/0xa70 kernel/rcu/tree.c:3190
       context_switch kernel/sched/core.c:5372 [inline]
       __schedule+0x1803/0x4be0 kernel/sched/core.c:6756
       __schedule_loop kernel/sched/core.c:6833 [inline]
       schedule+0x14b/0x320 kernel/sched/core.c:6848
       schedule_timeout+0xb0/0x290 kernel/time/sleep_timeout.c:75
       do_wait_for_common kernel/sched/completion.c:95 [inline]
       __wait_for_common kernel/sched/completion.c:116 [inline]
       wait_for_common kernel/sched/completion.c:127 [inline]
       wait_for_completion+0x355/0x620 kernel/sched/completion.c:148
       kthread_stop+0x19e/0x640 kernel/kthread.c:712
       close_ctree+0x524/0xd60 fs/btrfs/disk-io.c:4328
       generic_shutdown_super+0x139/0x2d0 fs/super.c:642
       kill_anon_super+0x3b/0x70 fs/super.c:1237
       btrfs_kill_super+0x41/0x50 fs/btrfs/super.c:2112
       deactivate_locked_super+0xc4/0x130 fs/super.c:473
       cleanup_mnt+0x41f/0x4b0 fs/namespace.c:1373
       task_work_run+0x24f/0x310 kernel/task_work.c:239
       ptrace_notify+0x2d2/0x380 kernel/signal.c:2503
       ptrace_report_syscall include/linux/ptrace.h:415 [inline]
       ptrace_report_syscall_exit include/linux/ptrace.h:477 [inline]
       syscall_exit_work+0xc7/0x1d0 kernel/entry/common.c:173
       syscall_exit_to_user_mode_prepare kernel/entry/common.c:200 [inline]
       __syscall_exit_to_user_mode_work kernel/entry/common.c:205 [inline]
       syscall_exit_to_user_mode+0x24a/0x340 kernel/entry/common.c:218
       do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89
       entry_SYSCALL_64_after_hwframe+0x77/0x7f
    
      The buggy address belongs to the object at ffff8880259d1e00
       which belongs to the cache task_struct of size 7424
      The buggy address is located 2584 bytes inside of
       freed 7424-byte region [ffff8880259d1e00, ffff8880259d3b00)
    
      The buggy address belongs to the physical page:
      page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x259d0
      head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
      memcg:ffff88802f4b56c1
      flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff)
      page_type: f5(slab)
      raw: 00fff00000000040 ffff88801bafe500 dead000000000100 dead000000000122
      raw: 0000000000000000 0000000000040004 00000001f5000000 ffff88802f4b56c1
      head: 00fff00000000040 ffff88801bafe500 dead000000000100 dead000000000122
      head: 0000000000000000 0000000000040004 00000001f5000000 ffff88802f4b56c1
      head: 00fff00000000003 ffffea0000967401 ffffffffffffffff 0000000000000000
      head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
      page dumped because: kasan: bad access detected
      page_owner tracks the page as allocated
      page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 12, tgid 12 (kworker/u8:1), ts 7328037942, free_ts 0
       set_page_owner include/linux/page_owner.h:32 [inline]
       post_alloc_hook+0x1f3/0x230 mm/page_alloc.c:1556
       prep_new_page mm/page_alloc.c:1564 [inline]
       get_page_from_freelist+0x3651/0x37a0 mm/page_alloc.c:3474
       __alloc_pages_noprof+0x292/0x710 mm/page_alloc.c:4751
       alloc_pages_mpol_noprof+0x3e8/0x680 mm/mempolicy.c:2265
       alloc_slab_page+0x6a/0x140 mm/slub.c:2408
       allocate_slab+0x5a/0x2f0 mm/slub.c:2574
       new_slab mm/slub.c:2627 [inline]
       ___slab_alloc+0xcd1/0x14b0 mm/slub.c:3815
       __slab_alloc+0x58/0xa0 mm/slub.c:3905
       __slab_alloc_node mm/slub.c:3980 [inline]
       slab_alloc_node mm/slub.c:4141 [inline]
       kmem_cache_alloc_node_noprof+0x269/0x380 mm/slub.c:4205
       alloc_task_struct_node kernel/fork.c:180 [inline]
       dup_task_struct+0x57/0x8c0 kernel/fork.c:1113
       copy_process+0x5d1/0x3d50 kernel/fork.c:2225
       kernel_clone+0x223/0x870 kernel/fork.c:2807
       user_mode_thread+0x132/0x1a0 kernel/fork.c:2885
       call_usermodehelper_exec_work+0x5c/0x230 kernel/umh.c:171
       process_one_work kernel/workqueue.c:3229 [inline]
       process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310
       worker_thread+0x870/0xd30 kernel/workqueue.c:3391
      page_owner free stack trace missing
    
      Memory state around the buggy address:
       ffff8880259d2700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
       ffff8880259d2780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
      >ffff8880259d2800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                                  ^
       ffff8880259d2880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
       ffff8880259d2900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
      ==================================================================
    
    Fix this by flushing the delalloc workers queue before stopping the
    cleaner kthread.
    
    Reported-by: [email protected]
    Link: https://lore.kernel.org/linux-btrfs/[email protected]/
    Reviewed-by: Qu Wenruo <[email protected]>
    Signed-off-by: Filipe Manana <[email protected]>
    Reviewed-by: David Sterba <[email protected]>
    Signed-off-by: David Sterba <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

btrfs: rename and export __btrfs_cow_block() [+ + +]
Author: Filipe Manana <[email protected]>
Date:   Wed Sep 27 12:09:26 2023 +0100

    btrfs: rename and export __btrfs_cow_block()
    
    [ Upstream commit 95f93bc4cbcac6121a5ee85cd5019ee8e7447e0b ]
    
    Rename and export __btrfs_cow_block() as btrfs_force_cow_block(). This is
    to allow to move defrag specific code out of ctree.c and into defrag.c in
    one of the next patches.
    
    Signed-off-by: Filipe Manana <[email protected]>
    Reviewed-by: David Sterba <[email protected]>
    Signed-off-by: David Sterba <[email protected]>
    Stable-dep-of: 44f52bbe96df ("btrfs: fix use-after-free when COWing tree bock and tracing is enabled")
    Signed-off-by: Sasha Levin <[email protected]>

 
drm/amdkfd: Correct the migration DMA map direction [+ + +]
Author: Prike Liang <[email protected]>
Date:   Tue Nov 5 09:57:42 2024 +0800

    drm/amdkfd: Correct the migration DMA map direction
    
    [ Upstream commit 5c3de6b02d38eb9386edf50490e050bb44398e40 ]
    
    The SVM DMA device map direction should be set the same as
    the DMA unmap setting, otherwise the DMA core will report
    the following warning.
    
    Before finialize this solution, there're some discussion on
    the DMA mapping type(stream-based or coherent) in this KFD
    migration case, followed by https://lore.kernel.org/all/04d4ab32
    [email protected]/T/.
    
    As there's no dma_sync_single_for_*() in the DMA buffer accessed
    that because this migration operation should be sync properly and
    automatically. Give that there's might not be a performance problem
    in various cache sync policy of DMA sync. Therefore, in order to
    simplify the DMA direction setting alignment, let's set the DMA map
    direction as BIDIRECTIONAL.
    
    [  150.834218] WARNING: CPU: 8 PID: 1812 at kernel/dma/debug.c:1028 check_unmap+0x1cc/0x930
    [  150.834225] Modules linked in: amdgpu(OE) amdxcp drm_exec(OE) gpu_sched drm_buddy(OE) drm_ttm_helper(OE) ttm(OE) drm_suballoc_helper(OE) drm_display_helper(OE) drm_kms_helper(OE) i2c_algo_bit rpcsec_gss_krb5 auth_rpcgss nfsv4 nfs lockd grace netfs xt_conntrack xt_MASQUERADE nf_conntrack_netlink xfrm_user xfrm_algo iptable_nat xt_addrtype iptable_filter br_netfilter nvme_fabrics overlay nfnetlink_cttimeout nfnetlink openvswitch nsh nf_conncount nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c bridge stp llc sch_fq_codel intel_rapl_msr amd_atl intel_rapl_common snd_hda_codec_realtek snd_hda_codec_generic snd_hda_scodec_component snd_hda_codec_hdmi snd_hda_intel snd_intel_dspcfg edac_mce_amd snd_pci_acp6x snd_hda_codec snd_acp_config snd_hda_core snd_hwdep snd_soc_acpi kvm_amd sunrpc snd_pcm kvm binfmt_misc snd_seq_midi crct10dif_pclmul snd_seq_midi_event ghash_clmulni_intel sha512_ssse3 snd_rawmidi nls_iso8859_1 sha256_ssse3 sha1_ssse3 snd_seq aesni_intel snd_seq_device crypto_simd snd_timer cryptd input_leds
    [  150.834310]  wmi_bmof serio_raw k10temp rapl snd sp5100_tco ipmi_devintf soundcore ccp ipmi_msghandler cm32181 industrialio mac_hid msr parport_pc ppdev lp parport efi_pstore drm(OE) ip_tables x_tables pci_stub crc32_pclmul nvme ahci libahci i2c_piix4 r8169 nvme_core i2c_designware_pci realtek i2c_ccgx_ucsi video wmi hid_generic cdc_ether usbnet usbhid hid r8152 mii
    [  150.834354] CPU: 8 PID: 1812 Comm: rocrtst64 Tainted: G           OE      6.10.0-custom #492
    [  150.834358] Hardware name: AMD Majolica-RN/Majolica-RN, BIOS RMJ1009A 06/13/2021
    [  150.834360] RIP: 0010:check_unmap+0x1cc/0x930
    [  150.834363] Code: c0 4c 89 4d c8 e8 34 bf 86 00 4c 8b 4d c8 4c 8b 45 c0 48 8b 4d b8 48 89 c6 41 57 4c 89 ea 48 c7 c7 80 49 b4 84 e8 b4 81 f3 ff <0f> 0b 48 c7 c7 04 83 ac 84 e8 76 ba fc ff 41 8b 76 4c 49 8d 7e 50
    [  150.834365] RSP: 0018:ffffaac5023739e0 EFLAGS: 00010086
    [  150.834368] RAX: 0000000000000000 RBX: ffffffff8566a2e0 RCX: 0000000000000027
    [  150.834370] RDX: ffff8f6a8f621688 RSI: 0000000000000001 RDI: ffff8f6a8f621680
    [  150.834372] RBP: ffffaac502373a30 R08: 00000000000000c9 R09: ffffaac502373850
    [  150.834373] R10: ffffaac502373848 R11: ffffffff84f46328 R12: ffffaac502373a40
    [  150.834375] R13: ffff8f6741045330 R14: ffff8f6741a77700 R15: ffffffff84ac831b
    [  150.834377] FS:  00007faf0fc94c00(0000) GS:ffff8f6a8f600000(0000) knlGS:0000000000000000
    [  150.834379] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    [  150.834381] CR2: 00007faf0b600020 CR3: 000000010a52e000 CR4: 0000000000350ef0
    [  150.834383] Call Trace:
    [  150.834385]  <TASK>
    [  150.834387]  ? show_regs+0x6d/0x80
    [  150.834393]  ? __warn+0x8c/0x140
    [  150.834397]  ? check_unmap+0x1cc/0x930
    [  150.834400]  ? report_bug+0x193/0x1a0
    [  150.834406]  ? handle_bug+0x46/0x80
    [  150.834410]  ? exc_invalid_op+0x1d/0x80
    [  150.834413]  ? asm_exc_invalid_op+0x1f/0x30
    [  150.834420]  ? check_unmap+0x1cc/0x930
    [  150.834425]  debug_dma_unmap_page+0x86/0x90
    [  150.834431]  ? srso_return_thunk+0x5/0x5f
    [  150.834435]  ? rmap_walk+0x28/0x50
    [  150.834438]  ? srso_return_thunk+0x5/0x5f
    [  150.834441]  ? remove_migration_ptes+0x79/0x80
    [  150.834445]  ? srso_return_thunk+0x5/0x5f
    [  150.834448]  dma_unmap_page_attrs+0xfa/0x1d0
    [  150.834453]  svm_range_dma_unmap_dev+0x8a/0xf0 [amdgpu]
    [  150.834710]  svm_migrate_ram_to_vram+0x361/0x740 [amdgpu]
    [  150.834914]  svm_migrate_to_vram+0xa8/0xe0 [amdgpu]
    [  150.835111]  svm_range_set_attr+0xff2/0x1450 [amdgpu]
    [  150.835311]  svm_ioctl+0x4a/0x50 [amdgpu]
    [  150.835510]  kfd_ioctl_svm+0x54/0x90 [amdgpu]
    [  150.835701]  kfd_ioctl+0x3c2/0x530 [amdgpu]
    [  150.835888]  ? __pfx_kfd_ioctl_svm+0x10/0x10 [amdgpu]
    [  150.836075]  ? srso_return_thunk+0x5/0x5f
    [  150.836080]  ? tomoyo_file_ioctl+0x20/0x30
    [  150.836086]  __x64_sys_ioctl+0x9c/0xd0
    [  150.836091]  x64_sys_call+0x1219/0x20d0
    [  150.836095]  do_syscall_64+0x51/0x120
    [  150.836098]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
    [  150.836102] RIP: 0033:0x7faf0f11a94f
    [  150.836105] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <41> 89 c0 3d 00 f0 ff ff 77 1f 48 8b 44 24 18 64 48 2b 04 25 28 00
    [  150.836107] RSP: 002b:00007ffeced26bc0 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
    [  150.836110] RAX: ffffffffffffffda RBX: 000055c683528fb0 RCX: 00007faf0f11a94f
    [  150.836112] RDX: 00007ffeced26c60 RSI: 00000000c0484b20 RDI: 0000000000000003
    [  150.836114] RBP: 00007ffeced26c50 R08: 0000000000000000 R09: 0000000000000001
    [  150.836115] R10: 0000000000000032 R11: 0000000000000246 R12: 000055c683528bd0
    [  150.836117] R13: 0000000000000000 R14: 0000000000000021 R15: 0000000000000000
    [  150.836122]  </TASK>
    [  150.836124] ---[ end trace 0000000000000000 ]---
    
    Signed-off-by: Prike Liang <[email protected]>
    Reviewed-by: Felix Kuehling <[email protected]>
    Signed-off-by: Alex Deucher <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

 
drm/bridge: adv7511_audio: Update Audio InfoFrame properly [+ + +]
Author: Stefan Ekenberg <[email protected]>
Date:   Tue Nov 19 08:40:29 2024 +0100

    drm/bridge: adv7511_audio: Update Audio InfoFrame properly
    
    [ Upstream commit 902806baf3c1e8383c1fe3ff0b6042b8cb5c2707 ]
    
    AUDIO_UPDATE bit (Bit 5 of MAIN register 0x4A) needs to be set to 1
    while updating Audio InfoFrame information and then set to 0 when done.
    Otherwise partially updated Audio InfoFrames could be sent out. Two
    cases where this rule were not followed are fixed:
     - In adv7511_hdmi_hw_params() make sure AUDIO_UPDATE bit is updated
       before/after setting ADV7511_REG_AUDIO_INFOFRAME.
     - In audio_startup() use the correct register for clearing
       AUDIO_UPDATE bit.
    
    The problem with corrupted audio infoframes were discovered by letting
    a HDMI logic analyser check the output of ADV7535.
    
    Note that this patchs replaces writing REG_GC(1) with
    REG_INFOFRAME_UPDATE. Bit 5 of REG_GC(1) is positioned within field
    GC_PP[3:0] and that field doesn't control audio infoframe and is read-
    only. My conclusion therefore was that the author if this code meant to
    clear bit 5 of REG_INFOFRAME_UPDATE from the very beginning.
    
    Tested-by: Biju Das <[email protected]>
    Fixes: 53c515befe28 ("drm/bridge: adv7511: Add Audio support")
    Signed-off-by: Stefan Ekenberg <[email protected]>
    Reviewed-by: Dmitry Baryshkov <[email protected]>
    Link: https://patchwork.freedesktop.org/patch/msgid/[email protected]
    Signed-off-by: Dmitry Baryshkov <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

 
drm/i915/dg1: Fix power gate sequence. [+ + +]
Author: Rodrigo Vivi <[email protected]>
Date:   Thu Dec 19 16:00:19 2024 -0500

    drm/i915/dg1: Fix power gate sequence.
    
    [ Upstream commit 20e7c5313ffbf11c34a46395345677adbe890bee ]
    
    sub-pipe PG is not present on DG1. Setting these bits can disable
    other power gates and cause GPU hangs on video playbacks.
    
    VLK: 16314, 4304
    
    Closes: https://gitlab.freedesktop.org/drm/i915/kernel/-/issues/13381
    Fixes: 85a12d7eb8fe ("drm/i915/tgl: Fix Media power gate sequence.")
    Cc: Vinay Belgaumkar <[email protected]>
    Cc: Himal Prasad Ghimiray <[email protected]>
    Reviewed-by: Vinay Belgaumkar <[email protected]>
    Reviewed-by: Himal Prasad Ghimiray <[email protected]>
    Link: https://patchwork.freedesktop.org/patch/msgid/[email protected]
    Signed-off-by: Rodrigo Vivi <[email protected]>
    (cherry picked from commit de7061947b4ed4be857d452c60d5fb795831d79e)
    Signed-off-by: Tvrtko Ursulin <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

 
drm: adv7511: Drop dsi single lane support [+ + +]
Author: Biju Das <[email protected]>
Date:   Tue Nov 19 19:20:31 2024 +0000

    drm: adv7511: Drop dsi single lane support
    
    commit 79d67c499c3f886202a40c5cb27e747e4fa4d738 upstream.
    
    As per [1] and [2], ADV7535/7533 supports only 2-, 3-, or 4-lane. Drop
    unsupported 1-lane.
    
    [1] https://www.analog.com/media/en/technical-documentation/data-sheets/ADV7535.pdf
    [2] https://www.analog.com/media/en/technical-documentation/data-sheets/ADV7533.pdf
    
    Fixes: 1e4d58cd7f88 ("drm/bridge: adv7533: Create a MIPI DSI device")
    Reported-by: Hien Huynh <[email protected]>
    Cc: [email protected]
    Reviewed-by: Laurent Pinchart <[email protected]>
    Reviewed-by: Adam Ford <[email protected]>
    Signed-off-by: Biju Das <[email protected]>
    Link: https://patchwork.freedesktop.org/patch/msgid/[email protected]
    Signed-off-by: Dmitry Baryshkov <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
dt-bindings: display: adi,adv7533: Drop single lane support [+ + +]
Author: Biju Das <[email protected]>
Date:   Tue Nov 19 19:20:30 2024 +0000

    dt-bindings: display: adi,adv7533: Drop single lane support
    
    commit ee8f9ed57a397605434caeef351bafa3ec4dfdd4 upstream.
    
    As per [1] and [2], ADV7535/7533 supports only 2-, 3-, or 4-lane. Drop
    unsupported 1-lane from bindings.
    
    [1] https://www.analog.com/media/en/technical-documentation/data-sheets/ADV7535.pdf
    [2] https://www.analog.com/media/en/technical-documentation/data-sheets/ADV7533.pdf
    
    Fixes: 1e4d58cd7f88 ("drm/bridge: adv7533: Create a MIPI DSI device")
    Cc: [email protected]
    Acked-by: Krzysztof Kozlowski <[email protected]>
    Reviewed-by: Geert Uytterhoeven <[email protected]>
    Reviewed-by: Laurent Pinchart <[email protected]>
    Signed-off-by: Biju Das <[email protected]>
    Link: https://patchwork.freedesktop.org/patch/msgid/[email protected]
    Signed-off-by: Dmitry Baryshkov <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
eth: bcmsysport: fix call balance of priv->clk handling routines [+ + +]
Author: Vitalii Mordan <[email protected]>
Date:   Fri Dec 27 15:30:07 2024 +0300

    eth: bcmsysport: fix call balance of priv->clk handling routines
    
    [ Upstream commit b255ef45fcc2141c1bf98456796abb956d843a27 ]
    
    Check the return value of clk_prepare_enable to ensure that priv->clk has
    been successfully enabled.
    
    If priv->clk was not enabled during bcm_sysport_probe, bcm_sysport_resume,
    or bcm_sysport_open, it must not be disabled in any subsequent execution
    paths.
    
    Fixes: 31bc72d97656 ("net: systemport: fetch and use clock resources")
    Signed-off-by: Vitalii Mordan <[email protected]>
    Reviewed-by: Florian Fainelli <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

 
ila: serialize calls to nf_register_net_hooks() [+ + +]
Author: Eric Dumazet <[email protected]>
Date:   Mon Dec 30 16:28:49 2024 +0000

    ila: serialize calls to nf_register_net_hooks()
    
    [ Upstream commit 260466b576bca0081a7d4acecc8e93687aa22d0e ]
    
    syzbot found a race in ila_add_mapping() [1]
    
    commit 031ae72825ce ("ila: call nf_unregister_net_hooks() sooner")
    attempted to fix a similar issue.
    
    Looking at the syzbot repro, we have concurrent ILA_CMD_ADD commands.
    
    Add a mutex to make sure at most one thread is calling nf_register_net_hooks().
    
    [1]
     BUG: KASAN: slab-use-after-free in rht_key_hashfn include/linux/rhashtable.h:159 [inline]
     BUG: KASAN: slab-use-after-free in __rhashtable_lookup.constprop.0+0x426/0x550 include/linux/rhashtable.h:604
    Read of size 4 at addr ffff888028f40008 by task dhcpcd/5501
    
    CPU: 1 UID: 0 PID: 5501 Comm: dhcpcd Not tainted 6.13.0-rc4-syzkaller-00054-gd6ef8b40d075 #0
    Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
    Call Trace:
     <IRQ>
      __dump_stack lib/dump_stack.c:94 [inline]
      dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
      print_address_description mm/kasan/report.c:378 [inline]
      print_report+0xc3/0x620 mm/kasan/report.c:489
      kasan_report+0xd9/0x110 mm/kasan/report.c:602
      rht_key_hashfn include/linux/rhashtable.h:159 [inline]
      __rhashtable_lookup.constprop.0+0x426/0x550 include/linux/rhashtable.h:604
      rhashtable_lookup include/linux/rhashtable.h:646 [inline]
      rhashtable_lookup_fast include/linux/rhashtable.h:672 [inline]
      ila_lookup_wildcards net/ipv6/ila/ila_xlat.c:127 [inline]
      ila_xlat_addr net/ipv6/ila/ila_xlat.c:652 [inline]
      ila_nf_input+0x1ee/0x620 net/ipv6/ila/ila_xlat.c:185
      nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
      nf_hook_slow+0xbb/0x200 net/netfilter/core.c:626
      nf_hook.constprop.0+0x42e/0x750 include/linux/netfilter.h:269
      NF_HOOK include/linux/netfilter.h:312 [inline]
      ipv6_rcv+0xa4/0x680 net/ipv6/ip6_input.c:309
      __netif_receive_skb_one_core+0x12e/0x1e0 net/core/dev.c:5672
      __netif_receive_skb+0x1d/0x160 net/core/dev.c:5785
      process_backlog+0x443/0x15f0 net/core/dev.c:6117
      __napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:6883
      napi_poll net/core/dev.c:6952 [inline]
      net_rx_action+0xa94/0x1010 net/core/dev.c:7074
      handle_softirqs+0x213/0x8f0 kernel/softirq.c:561
      __do_softirq kernel/softirq.c:595 [inline]
      invoke_softirq kernel/softirq.c:435 [inline]
      __irq_exit_rcu+0x109/0x170 kernel/softirq.c:662
      irq_exit_rcu+0x9/0x30 kernel/softirq.c:678
      instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline]
      sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1049
    
    Fixes: 7f00feaf1076 ("ila: Add generic ILA translation facility")
    Reported-by: [email protected]
    Closes: https://lore.kernel.org/netdev/[email protected]/T/#u
    Signed-off-by: Eric Dumazet <[email protected]>
    Cc: Florian Westphal <[email protected]>
    Cc: Tom Herbert <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

 
ip_tunnel: annotate data-races around t->parms.link [+ + +]
Author: Eric Dumazet <[email protected]>
Date:   Tue Feb 13 06:32:34 2024 +0000

    ip_tunnel: annotate data-races around t->parms.link
    
    [ Upstream commit f694eee9e1c00d6ca06c5e59c04e3b6ff7d64aa9 ]
    
    t->parms.link is read locklessly, annotate these reads
    and opposite writes accordingly.
    
    Signed-off-by: Eric Dumazet <[email protected]>
    Signed-off-by: David S. Miller <[email protected]>
    Stable-dep-of: b5a7b661a073 ("net: Fix netns for ip_tunnel_init_flow()")
    Signed-off-by: Sasha Levin <[email protected]>

 
ipip,ip_tunnel,sit: Add FOU support for externally controlled ipip devices [+ + +]
Author: Christian Ehrig <[email protected]>
Date:   Fri Apr 7 15:38:53 2023 +0200

    ipip,ip_tunnel,sit: Add FOU support for externally controlled ipip devices
    
    [ Upstream commit ac931d4cdec3df8b6eac3bc40a6871123021f078 ]
    
    Today ipip devices in collect-metadata mode don't allow for sending FOU
    or GUE encapsulated packets. This patch lifts the restriction by adding
    a struct ip_tunnel_encap to the tunnel metadata.
    
    On the egress path, the members of this struct can be set by the
    bpf_skb_set_fou_encap kfunc via a BPF tc-hook. Instead of dropping packets
    wishing to use additional UDP encapsulation, ip_md_tunnel_xmit now
    evaluates the contents of this struct and adds the corresponding FOU or
    GUE header. Furthermore, it is making sure that additional header bytes
    are taken into account for PMTU discovery.
    
    On the ingress path, an ipip device in collect-metadata mode will fill this
    struct and a BPF tc-hook can obtain the information via a call to the
    bpf_skb_get_fou_encap kfunc.
    
    The minor change to ip_tunnel_encap, which now takes a pointer to
    struct ip_tunnel_encap instead of struct ip_tunnel, allows us to control
    FOU encap type and parameters on a per packet-level.
    
    Signed-off-by: Christian Ehrig <[email protected]>
    Link: https://lore.kernel.org/r/cfea47de655d0f870248abf725932f851b53960a.1680874078.git.cehrig@cloudflare.com
    Signed-off-by: Alexei Starovoitov <[email protected]>
    Stable-dep-of: b5a7b661a073 ("net: Fix netns for ip_tunnel_init_flow()")
    Signed-off-by: Sasha Levin <[email protected]>

 
ipv4: ip_tunnel: Unmask upper DSCP bits in ip_md_tunnel_xmit() [+ + +]
Author: Ido Schimmel <[email protected]>
Date:   Thu Sep 5 19:51:34 2024 +0300

    ipv4: ip_tunnel: Unmask upper DSCP bits in ip_md_tunnel_xmit()
    
    [ Upstream commit c34cfe72bb260fc49660d9e6a9ba95ba01669ae2 ]
    
    Unmask the upper DSCP bits when initializing an IPv4 flow key via
    ip_tunnel_init_flow() before passing it to ip_route_output_key() so that
    in the future we could perform the FIB lookup according to the full DSCP
    value.
    
    Note that the 'tos' variable includes the full DS field. Either the one
    specified via the tunnel key or the one inherited from the inner packet.
    
    Signed-off-by: Ido Schimmel <[email protected]>
    Reviewed-by: Guillaume Nault <[email protected]>
    Signed-off-by: David S. Miller <[email protected]>
    Stable-dep-of: b5a7b661a073 ("net: Fix netns for ip_tunnel_init_flow()")
    Signed-off-by: Sasha Levin <[email protected]>

ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_bind_dev() [+ + +]
Author: Ido Schimmel <[email protected]>
Date:   Thu Sep 5 19:51:33 2024 +0300

    ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_bind_dev()
    
    [ Upstream commit e7191e517a03d025405c7df730b400ad4118474e ]
    
    Unmask the upper DSCP bits when initializing an IPv4 flow key via
    ip_tunnel_init_flow() before passing it to ip_route_output_key() so that
    in the future we could perform the FIB lookup according to the full DSCP
    value.
    
    Signed-off-by: Ido Schimmel <[email protected]>
    Reviewed-by: Guillaume Nault <[email protected]>
    Signed-off-by: David S. Miller <[email protected]>
    Stable-dep-of: b5a7b661a073 ("net: Fix netns for ip_tunnel_init_flow()")
    Signed-off-by: Sasha Levin <[email protected]>

ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_xmit() [+ + +]
Author: Ido Schimmel <[email protected]>
Date:   Thu Sep 5 19:51:35 2024 +0300

    ipv4: ip_tunnel: Unmask upper DSCP bits in ip_tunnel_xmit()
    
    [ Upstream commit c2b639f9f3b7a058ca9c7349b096f355773f2cd8 ]
    
    Unmask the upper DSCP bits when initializing an IPv4 flow key via
    ip_tunnel_init_flow() before passing it to ip_route_output_key() so that
    in the future we could perform the FIB lookup according to the full DSCP
    value.
    
    Note that the 'tos' variable includes the full DS field. Either the one
    specified as part of the tunnel parameters or the one inherited from the
    inner packet.
    
    Signed-off-by: Ido Schimmel <[email protected]>
    Reviewed-by: Guillaume Nault <[email protected]>
    Signed-off-by: David S. Miller <[email protected]>
    Stable-dep-of: b5a7b661a073 ("net: Fix netns for ip_tunnel_init_flow()")
    Signed-off-by: Sasha Levin <[email protected]>

 
irqchip/gic: Correct declaration of *percpu_base pointer in union gic_base [+ + +]
Author: Uros Bizjak <[email protected]>
Date:   Fri Dec 13 15:57:53 2024 +0100

    irqchip/gic: Correct declaration of *percpu_base pointer in union gic_base
    
    [ Upstream commit a1855f1b7c33642c9f7a01991fb763342a312e9b ]
    
    percpu_base is used in various percpu functions that expect variable in
    __percpu address space. Correct the declaration of percpu_base to
    
    void __iomem * __percpu *percpu_base;
    
    to declare the variable as __percpu pointer.
    
    The patch fixes several sparse warnings:
    
    irq-gic.c:1172:44: warning: incorrect type in assignment (different address spaces)
    irq-gic.c:1172:44:    expected void [noderef] __percpu *[noderef] __iomem *percpu_base
    irq-gic.c:1172:44:    got void [noderef] __iomem *[noderef] __percpu *
    ...
    irq-gic.c:1231:43: warning: incorrect type in argument 1 (different address spaces)
    irq-gic.c:1231:43:    expected void [noderef] __percpu *__pdata
    irq-gic.c:1231:43:    got void [noderef] __percpu *[noderef] __iomem *percpu_base
    
    There were no changes in the resulting object files.
    
    Signed-off-by: Uros Bizjak <[email protected]>
    Signed-off-by: Thomas Gleixner <[email protected]>
    Acked-by: Marc Zyngier <[email protected]>
    Link: https://lore.kernel.org/all/[email protected]
    Signed-off-by: Sasha Levin <[email protected]>

 
kcov: mark in_softirq_really() as __always_inline [+ + +]
Author: Arnd Bergmann <[email protected]>
Date:   Tue Dec 17 08:18:10 2024 +0100

    kcov: mark in_softirq_really() as __always_inline
    
    commit cb0ca08b326aa03f87fe94bb91872ce8d2ef1ed8 upstream.
    
    If gcc decides not to inline in_softirq_really(), objtool warns about a
    function call with UACCESS enabled:
    
    kernel/kcov.o: warning: objtool: __sanitizer_cov_trace_pc+0x1e: call to in_softirq_really() with UACCESS enabled
    kernel/kcov.o: warning: objtool: check_kcov_mode+0x11: call to in_softirq_really() with UACCESS enabled
    
    Mark this as __always_inline to avoid the problem.
    
    Link: https://lkml.kernel.org/r/[email protected]
    Fixes: 7d4df2dad312 ("kcov: properly check for softirq context")
    Signed-off-by: Arnd Bergmann <[email protected]>
    Reviewed-by: Marco Elver <[email protected]>
    Cc: Aleksandr Nogikh <[email protected]>
    Cc: Andrey Konovalov <[email protected]>
    Cc: Dmitry Vyukov <[email protected]>
    Cc: Josh Poimboeuf <[email protected]>
    Cc: Peter Zijlstra <[email protected]>
    Cc: <[email protected]>
    Signed-off-by: Andrew Morton <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
ksmbd: retry iterate_dir in smb2_query_dir [+ + +]
Author: Hobin Woo <[email protected]>
Date:   Thu Dec 5 11:31:19 2024 +0900

    ksmbd: retry iterate_dir in smb2_query_dir
    
    [ Upstream commit 2b904d61a97e8ba79e3bc216ba290fd7e1d85028 ]
    
    Some file systems do not ensure that the single call of iterate_dir
    reaches the end of the directory. For example, FUSE fetches entries from
    a daemon using 4KB buffer and stops fetching if entries exceed the
    buffer. And then an actor of caller, KSMBD, is used to fill the entries
    from the buffer.
    Thus, pattern searching on FUSE, files located after the 4KB could not
    be found and STATUS_NO_SUCH_FILE was returned.
    
    Signed-off-by: Hobin Woo <[email protected]>
    Reviewed-by: Sungjong Seo <[email protected]>
    Reviewed-by: Namjae Jeon <[email protected]>
    Tested-by: Yoonho Shin <[email protected]>
    Acked-by: Namjae Jeon <[email protected]>
    Signed-off-by: Steve French <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

 
Linux: Linux 6.1.124 [+ + +]
Author: Greg Kroah-Hartman <[email protected]>
Date:   Thu Jan 9 13:30:07 2025 +0100

    Linux 6.1.124
    
    Link: https://lore.kernel.org/r/[email protected]
    Tested-by: Pavel Machek (CIP) <[email protected]>
    Tested-by: Florian Fainelli <[email protected]>
    Tested-by: Salvatore Bonaccorso <[email protected]>
    Tested-by: Peter Schneider <[email protected]>
    Tested-by: SeongJae Park <[email protected]>
    Tested-by: Ron Economos <[email protected]>
    Tested-by: Mark Brown <[email protected]>
    Tested-by: Linux Kernel Functional Testing <[email protected]>
    Tested-by: Jon Hunter <[email protected]>
    Tested-by: Shuah Khan <[email protected]>
    Tested-by: kernelci.org bot <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
mm/readahead: fix large folio support in async readahead [+ + +]
Author: Yafang Shao <[email protected]>
Date:   Fri Dec 6 16:30:25 2024 +0800

    mm/readahead: fix large folio support in async readahead
    
    commit 158cdce87c8c172787063998ad5dd3e2f658b963 upstream.
    
    When testing large folio support with XFS on our servers, we observed that
    only a few large folios are mapped when reading large files via mmap.
    After a thorough analysis, I identified it was caused by the
    `/sys/block/*/queue/read_ahead_kb` setting.  On our test servers, this
    parameter is set to 128KB.  After I tune it to 2MB, the large folio can
    work as expected.  However, I believe the large folio behavior should not
    be dependent on the value of read_ahead_kb.  It would be more robust if
    the kernel can automatically adopt to it.
    
    With /sys/block/*/queue/read_ahead_kb set to 128KB and performing a
    sequential read on a 1GB file using MADV_HUGEPAGE, the differences in
    /proc/meminfo are as follows:
    
    - before this patch
      FileHugePages:     18432 kB
      FilePmdMapped:      4096 kB
    
    - after this patch
      FileHugePages:   1067008 kB
      FilePmdMapped:   1048576 kB
    
    This shows that after applying the patch, the entire 1GB file is mapped to
    huge pages.  The stable list is CCed, as without this patch, large folios
    don't function optimally in the readahead path.
    
    It's worth noting that if read_ahead_kb is set to a larger value that
    isn't aligned with huge page sizes (e.g., 4MB + 128KB), it may still fail
    to map to hugepages.
    
    Link: https://lkml.kernel.org/r/[email protected]
    Link: https://lkml.kernel.org/r/[email protected]
    Fixes: 4687fdbb805a ("mm/filemap: Support VM_HUGEPAGE for file mappings")
    Signed-off-by: Yafang Shao <[email protected]>
    Tested-by: kernel test robot <[email protected]>
    Cc: Matthew Wilcox <[email protected]>
    Cc: David Hildenbrand <[email protected]>
    Cc: <[email protected]>
    Signed-off-by: Andrew Morton <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim() [+ + +]
Author: Seiji Nishikawa <[email protected]>
Date:   Sun Dec 1 01:12:34 2024 +0900

    mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim()
    
    commit 6aaced5abd32e2a57cd94fd64f824514d0361da8 upstream.
    
    The task sometimes continues looping in throttle_direct_reclaim() because
    allow_direct_reclaim(pgdat) keeps returning false.
    
     #0 [ffff80002cb6f8d0] __switch_to at ffff8000080095ac
     #1 [ffff80002cb6f900] __schedule at ffff800008abbd1c
     #2 [ffff80002cb6f990] schedule at ffff800008abc50c
     #3 [ffff80002cb6f9b0] throttle_direct_reclaim at ffff800008273550
     #4 [ffff80002cb6fa20] try_to_free_pages at ffff800008277b68
     #5 [ffff80002cb6fae0] __alloc_pages_nodemask at ffff8000082c4660
     #6 [ffff80002cb6fc50] alloc_pages_vma at ffff8000082e4a98
     #7 [ffff80002cb6fca0] do_anonymous_page at ffff80000829f5a8
     #8 [ffff80002cb6fce0] __handle_mm_fault at ffff8000082a5974
     #9 [ffff80002cb6fd90] handle_mm_fault at ffff8000082a5bd4
    
    At this point, the pgdat contains the following two zones:
    
            NODE: 4  ZONE: 0  ADDR: ffff00817fffe540  NAME: "DMA32"
              SIZE: 20480  MIN/LOW/HIGH: 11/28/45
              VM_STAT:
                    NR_FREE_PAGES: 359
            NR_ZONE_INACTIVE_ANON: 18813
              NR_ZONE_ACTIVE_ANON: 0
            NR_ZONE_INACTIVE_FILE: 50
              NR_ZONE_ACTIVE_FILE: 0
              NR_ZONE_UNEVICTABLE: 0
            NR_ZONE_WRITE_PENDING: 0
                         NR_MLOCK: 0
                        NR_BOUNCE: 0
                       NR_ZSPAGES: 0
                NR_FREE_CMA_PAGES: 0
    
            NODE: 4  ZONE: 1  ADDR: ffff00817fffec00  NAME: "Normal"
              SIZE: 8454144  PRESENT: 98304  MIN/LOW/HIGH: 68/166/264
              VM_STAT:
                    NR_FREE_PAGES: 146
            NR_ZONE_INACTIVE_ANON: 94668
              NR_ZONE_ACTIVE_ANON: 3
            NR_ZONE_INACTIVE_FILE: 735
              NR_ZONE_ACTIVE_FILE: 78
              NR_ZONE_UNEVICTABLE: 0
            NR_ZONE_WRITE_PENDING: 0
                         NR_MLOCK: 0
                        NR_BOUNCE: 0
                       NR_ZSPAGES: 0
                NR_FREE_CMA_PAGES: 0
    
    In allow_direct_reclaim(), while processing ZONE_DMA32, the sum of
    inactive/active file-backed pages calculated in zone_reclaimable_pages()
    based on the result of zone_page_state_snapshot() is zero.
    
    Additionally, since this system lacks swap, the calculation of inactive/
    active anonymous pages is skipped.
    
            crash> p nr_swap_pages
            nr_swap_pages = $1937 = {
              counter = 0
            }
    
    As a result, ZONE_DMA32 is deemed unreclaimable and skipped, moving on to
    the processing of the next zone, ZONE_NORMAL, despite ZONE_DMA32 having
    free pages significantly exceeding the high watermark.
    
    The problem is that the pgdat->kswapd_failures hasn't been incremented.
    
            crash> px ((struct pglist_data *) 0xffff00817fffe540)->kswapd_failures
            $1935 = 0x0
    
    This is because the node deemed balanced.  The node balancing logic in
    balance_pgdat() evaluates all zones collectively.  If one or more zones
    (e.g., ZONE_DMA32) have enough free pages to meet their watermarks, the
    entire node is deemed balanced.  This causes balance_pgdat() to exit early
    before incrementing the kswapd_failures, as it considers the overall
    memory state acceptable, even though some zones (like ZONE_NORMAL) remain
    under significant pressure.
    
    
    The patch ensures that zone_reclaimable_pages() includes free pages
    (NR_FREE_PAGES) in its calculation when no other reclaimable pages are
    available (e.g., file-backed or anonymous pages).  This change prevents
    zones like ZONE_DMA32, which have sufficient free pages, from being
    mistakenly deemed unreclaimable.  By doing so, the patch ensures proper
    node balancing, avoids masking pressure on other zones like ZONE_NORMAL,
    and prevents infinite loops in throttle_direct_reclaim() caused by
    allow_direct_reclaim(pgdat) repeatedly returning false.
    
    
    The kernel hangs due to a task stuck in throttle_direct_reclaim(), caused
    by a node being incorrectly deemed balanced despite pressure in certain
    zones, such as ZONE_NORMAL.  This issue arises from
    zone_reclaimable_pages() returning 0 for zones without reclaimable file-
    backed or anonymous pages, causing zones like ZONE_DMA32 with sufficient
    free pages to be skipped.
    
    The lack of swap or reclaimable pages results in ZONE_DMA32 being ignored
    during reclaim, masking pressure in other zones.  Consequently,
    pgdat->kswapd_failures remains 0 in balance_pgdat(), preventing fallback
    mechanisms in allow_direct_reclaim() from being triggered, leading to an
    infinite loop in throttle_direct_reclaim().
    
    This patch modifies zone_reclaimable_pages() to account for free pages
    (NR_FREE_PAGES) when no other reclaimable pages exist.  This ensures zones
    with sufficient free pages are not skipped, enabling proper balancing and
    reclaim behavior.
    
    [[email protected]: coding-style cleanups]
    Link: https://lkml.kernel.org/r/[email protected]
    Link: https://lkml.kernel.org/r/[email protected]
    Fixes: 5a1c84b404a7 ("mm: remove reclaim and compaction retry approximations")
    Signed-off-by: Seiji Nishikawa <[email protected]>
    Cc: Mel Gorman <[email protected]>
    Cc: <[email protected]>
    Signed-off-by: Andrew Morton <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
modpost: fix input MODULE_DEVICE_TABLE() built for 64-bit on 32-bit host [+ + +]
Author: Masahiro Yamada <[email protected]>
Date:   Sun Nov 3 21:52:57 2024 +0900

    modpost: fix input MODULE_DEVICE_TABLE() built for 64-bit on 32-bit host
    
    [ Upstream commit 77dc55a978e69625f9718460012e5ef0172dc4de ]
    
    When building a 64-bit kernel on a 32-bit build host, incorrect
    input MODULE_ALIAS() entries may be generated.
    
    For example, when compiling a 64-bit kernel with CONFIG_INPUT_MOUSEDEV=m
    on a 64-bit build machine, you will get the correct output:
    
      $ grep MODULE_ALIAS drivers/input/mousedev.mod.c
      MODULE_ALIAS("input:b*v*p*e*-e*1,*2,*k*110,*r*0,*1,*a*m*l*s*f*w*");
      MODULE_ALIAS("input:b*v*p*e*-e*1,*2,*k*r*8,*a*m*l*s*f*w*");
      MODULE_ALIAS("input:b*v*p*e*-e*1,*3,*k*14A,*r*a*0,*1,*m*l*s*f*w*");
      MODULE_ALIAS("input:b*v*p*e*-e*1,*3,*k*145,*r*a*0,*1,*18,*1C,*m*l*s*f*w*");
      MODULE_ALIAS("input:b*v*p*e*-e*1,*3,*k*110,*r*a*0,*1,*m*l*s*f*w*");
    
    However, building the same kernel on a 32-bit machine results in
    incorrect output:
    
      $ grep MODULE_ALIAS drivers/input/mousedev.mod.c
      MODULE_ALIAS("input:b*v*p*e*-e*1,*2,*k*110,*130,*r*0,*1,*a*m*l*s*f*w*");
      MODULE_ALIAS("input:b*v*p*e*-e*1,*2,*k*r*8,*a*m*l*s*f*w*");
      MODULE_ALIAS("input:b*v*p*e*-e*1,*3,*k*14A,*16A,*r*a*0,*1,*20,*21,*m*l*s*f*w*");
      MODULE_ALIAS("input:b*v*p*e*-e*1,*3,*k*145,*165,*r*a*0,*1,*18,*1C,*20,*21,*38,*3C,*m*l*s*f*w*");
      MODULE_ALIAS("input:b*v*p*e*-e*1,*3,*k*110,*130,*r*a*0,*1,*20,*21,*m*l*s*f*w*");
    
    A similar issue occurs with CONFIG_INPUT_JOYDEV=m. On a 64-bit build
    machine, the output is:
    
      $ grep MODULE_ALIAS drivers/input/joydev.mod.c
      MODULE_ALIAS("input:b*v*p*e*-e*3,*k*r*a*0,*m*l*s*f*w*");
      MODULE_ALIAS("input:b*v*p*e*-e*3,*k*r*a*2,*m*l*s*f*w*");
      MODULE_ALIAS("input:b*v*p*e*-e*3,*k*r*a*8,*m*l*s*f*w*");
      MODULE_ALIAS("input:b*v*p*e*-e*3,*k*r*a*6,*m*l*s*f*w*");
      MODULE_ALIAS("input:b*v*p*e*-e*1,*k*120,*r*a*m*l*s*f*w*");
      MODULE_ALIAS("input:b*v*p*e*-e*1,*k*130,*r*a*m*l*s*f*w*");
      MODULE_ALIAS("input:b*v*p*e*-e*1,*k*2C0,*r*a*m*l*s*f*w*");
    
    However, on a 32-bit machine, the output is incorrect:
    
      $ grep MODULE_ALIAS drivers/input/joydev.mod.c
      MODULE_ALIAS("input:b*v*p*e*-e*3,*k*r*a*0,*20,*m*l*s*f*w*");
      MODULE_ALIAS("input:b*v*p*e*-e*3,*k*r*a*2,*22,*m*l*s*f*w*");
      MODULE_ALIAS("input:b*v*p*e*-e*3,*k*r*a*8,*28,*m*l*s*f*w*");
      MODULE_ALIAS("input:b*v*p*e*-e*3,*k*r*a*6,*26,*m*l*s*f*w*");
      MODULE_ALIAS("input:b*v*p*e*-e*1,*k*11F,*13F,*r*a*m*l*s*f*w*");
      MODULE_ALIAS("input:b*v*p*e*-e*1,*k*11F,*13F,*r*a*m*l*s*f*w*");
      MODULE_ALIAS("input:b*v*p*e*-e*1,*k*2C0,*2E0,*r*a*m*l*s*f*w*");
    
    When building a 64-bit kernel, BITS_PER_LONG is defined as 64. However,
    on a 32-bit build machine, the constant 1L is a signed 32-bit value.
    Left-shifting it beyond 32 bits causes wraparound, and shifting by 31
    or 63 bits makes it a negative value.
    
    The fix in commit e0e92632715f ("[PATCH] PATCH: 1 line 2.6.18 bugfix:
    modpost-64bit-fix.patch") is incorrect; it only addresses cases where
    a 64-bit kernel is built on a 64-bit build machine, overlooking cases
    on a 32-bit build machine.
    
    Using 1ULL ensures a 64-bit width on both 32-bit and 64-bit machines,
    avoiding the wraparound issue.
    
    Fixes: e0e92632715f ("[PATCH] PATCH: 1 line 2.6.18 bugfix: modpost-64bit-fix.patch")
    Signed-off-by: Masahiro Yamada <[email protected]>
    Stable-dep-of: bf36b4bf1b9a ("modpost: fix the missed iteration for the max bit in do_input()")
    Signed-off-by: Sasha Levin <[email protected]>

modpost: fix the missed iteration for the max bit in do_input() [+ + +]
Author: Masahiro Yamada <[email protected]>
Date:   Thu Dec 26 00:33:35 2024 +0900

    modpost: fix the missed iteration for the max bit in do_input()
    
    [ Upstream commit bf36b4bf1b9a7a0015610e2f038ee84ddb085de2 ]
    
    This loop should iterate over the range from 'min' to 'max' inclusively.
    The last interation is missed.
    
    Fixes: 1d8f430c15b3 ("[PATCH] Input: add modalias support")
    Signed-off-by: Masahiro Yamada <[email protected]>
    Tested-by: John Paul Adrian Glaubitz <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

 
mptcp: don't always assume copied data in mptcp_cleanup_rbuf() [+ + +]
Author: Paolo Abeni <[email protected]>
Date:   Mon Dec 30 19:12:31 2024 +0100

    mptcp: don't always assume copied data in mptcp_cleanup_rbuf()
    
    commit 551844f26da2a9f76c0a698baaffa631d1178645 upstream.
    
    Under some corner cases the MPTCP protocol can end-up invoking
    mptcp_cleanup_rbuf() when no data has been copied, but such helper
    assumes the opposite condition.
    
    Explicitly drop such assumption and performs the costly call only
    when strictly needed - before releasing the msk socket lock.
    
    Fixes: fd8976790a6c ("mptcp: be careful on MPTCP-level ack.")
    Cc: [email protected]
    Signed-off-by: Paolo Abeni <[email protected]>
    Reviewed-by: Mat Martineau <[email protected]>
    Signed-off-by: Matthieu Baerts (NGI0) <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

mptcp: fix recvbuffer adjust on sleeping rcvmsg [+ + +]
Author: Paolo Abeni <[email protected]>
Date:   Mon Dec 30 19:12:30 2024 +0100

    mptcp: fix recvbuffer adjust on sleeping rcvmsg
    
    commit 449e6912a2522af672e99992e1201a454910864e upstream.
    
    If the recvmsg() blocks after receiving some data - i.e. due to
    SO_RCVLOWAT - the MPTCP code will attempt multiple times to
    adjust the receive buffer size, wrongly accounting every time the
    cumulative of received data - instead of accounting only for the
    delta.
    
    Address the issue moving mptcp_rcv_space_adjust just after the
    data reception and passing it only the just received bytes.
    
    This also removes an unneeded difference between the TCP and MPTCP
    RX code path implementation.
    
    Fixes: 581302298524 ("mptcp: error out earlier on disconnect")
    Cc: [email protected]
    Signed-off-by: Paolo Abeni <[email protected]>
    Reviewed-by: Mat Martineau <[email protected]>
    Signed-off-by: Matthieu Baerts (NGI0) <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

mptcp: fix TCP options overflow. [+ + +]
Author: Paolo Abeni <[email protected]>
Date:   Sat Dec 21 09:51:46 2024 +0100

    mptcp: fix TCP options overflow.
    
    commit cbb26f7d8451fe56ccac802c6db48d16240feebd upstream.
    
    Syzbot reported the following splat:
    
    Oops: general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN PTI
    KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
    CPU: 1 UID: 0 PID: 5836 Comm: sshd Not tainted 6.13.0-rc3-syzkaller #0
    Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024
    RIP: 0010:_compound_head include/linux/page-flags.h:242 [inline]
    RIP: 0010:put_page+0x23/0x260 include/linux/mm.h:1552
    Code: 90 90 90 90 90 90 90 55 41 57 41 56 53 49 89 fe 48 bd 00 00 00 00 00 fc ff df e8 f8 5e 12 f8 49 8d 5e 08 48 89 d8 48 c1 e8 03 <80> 3c 28 00 74 08 48 89 df e8 8f c7 78 f8 48 8b 1b 48 89 de 48 83
    RSP: 0000:ffffc90003916c90 EFLAGS: 00010202
    RAX: 0000000000000001 RBX: 0000000000000008 RCX: ffff888030458000
    RDX: 0000000000000100 RSI: 0000000000000000 RDI: 0000000000000000
    RBP: dffffc0000000000 R08: ffffffff898ca81d R09: 1ffff110054414ac
    R10: dffffc0000000000 R11: ffffed10054414ad R12: 0000000000000007
    R13: ffff88802a20a542 R14: 0000000000000000 R15: 0000000000000000
    FS:  00007f34f496e800(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 00007f9d6ec9ec28 CR3: 000000004d260000 CR4: 00000000003526f0
    DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
    Call Trace:
     <TASK>
     skb_page_unref include/linux/skbuff_ref.h:43 [inline]
     __skb_frag_unref include/linux/skbuff_ref.h:56 [inline]
     skb_release_data+0x483/0x8a0 net/core/skbuff.c:1119
     skb_release_all net/core/skbuff.c:1190 [inline]
     __kfree_skb+0x55/0x70 net/core/skbuff.c:1204
     tcp_clean_rtx_queue net/ipv4/tcp_input.c:3436 [inline]
     tcp_ack+0x2442/0x6bc0 net/ipv4/tcp_input.c:4032
     tcp_rcv_state_process+0x8eb/0x44e0 net/ipv4/tcp_input.c:6805
     tcp_v4_do_rcv+0x77d/0xc70 net/ipv4/tcp_ipv4.c:1939
     tcp_v4_rcv+0x2dc0/0x37f0 net/ipv4/tcp_ipv4.c:2351
     ip_protocol_deliver_rcu+0x22e/0x440 net/ipv4/ip_input.c:205
     ip_local_deliver_finish+0x341/0x5f0 net/ipv4/ip_input.c:233
     NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314
     NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314
     __netif_receive_skb_one_core net/core/dev.c:5672 [inline]
     __netif_receive_skb+0x2bf/0x650 net/core/dev.c:5785
     process_backlog+0x662/0x15b0 net/core/dev.c:6117
     __napi_poll+0xcb/0x490 net/core/dev.c:6883
     napi_poll net/core/dev.c:6952 [inline]
     net_rx_action+0x89b/0x1240 net/core/dev.c:7074
     handle_softirqs+0x2d4/0x9b0 kernel/softirq.c:561
     __do_softirq kernel/softirq.c:595 [inline]
     invoke_softirq kernel/softirq.c:435 [inline]
     __irq_exit_rcu+0xf7/0x220 kernel/softirq.c:662
     irq_exit_rcu+0x9/0x30 kernel/softirq.c:678
     instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline]
     sysvec_apic_timer_interrupt+0x57/0xc0 arch/x86/kernel/apic/apic.c:1049
     asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
    RIP: 0033:0x7f34f4519ad5
    Code: 85 d2 74 0d 0f 10 02 48 8d 54 24 20 0f 11 44 24 20 64 8b 04 25 18 00 00 00 85 c0 75 27 41 b8 08 00 00 00 b8 0f 01 00 00 0f 05 <48> 3d 00 f0 ff ff 76 75 48 8b 15 24 73 0d 00 f7 d8 64 89 02 48 83
    RSP: 002b:00007ffec5b32ce0 EFLAGS: 00000246
    RAX: 0000000000000001 RBX: 00000000000668a0 RCX: 00007f34f4519ad5
    RDX: 00007ffec5b32d00 RSI: 0000000000000004 RDI: 0000564f4bc6cae0
    RBP: 0000564f4bc6b5a0 R08: 0000000000000008 R09: 0000000000000000
    R10: 00007ffec5b32de8 R11: 0000000000000246 R12: 0000564f48ea8aa4
    R13: 0000000000000001 R14: 0000564f48ea93e8 R15: 00007ffec5b32d68
     </TASK>
    
    Eric noted a probable shinfo->nr_frags corruption, which indeed
    occurs.
    
    The root cause is a buggy MPTCP option len computation in some
    circumstances: the ADD_ADDR option should be mutually exclusive
    with DSS since the blamed commit.
    
    Still, mptcp_established_options_add_addr() tries to set the
    relevant info in mptcp_out_options, if the remaining space is
    large enough even when DSS is present.
    
    Since the ADD_ADDR infos and the DSS share the same union
    fields, adding first corrupts the latter. In the worst-case
    scenario, such corruption increases the DSS binary layout,
    exceeding the computed length and possibly overwriting the
    skb shared info.
    
    Address the issue by enforcing mutual exclusion in
    mptcp_established_options_add_addr(), too.
    
    Cc: [email protected]
    Reported-by: [email protected]
    Closes: https://github.com/multipath-tcp/mptcp_net-next/issues/538
    Fixes: 1bff1e43a30e ("mptcp: optimize out option generation")
    Signed-off-by: Paolo Abeni <[email protected]>
    Reviewed-by: Matthieu Baerts (NGI0) <[email protected]>
    Reviewed-by: Eric Dumazet <[email protected]>
    Link: https://patch.msgid.link/025d9df8cde3c9a557befc47e9bc08fbbe3476e5.1734771049.git.pabeni@redhat.com
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
net/sctp: Prevent autoclose integer overflow in sctp_association_init() [+ + +]
Author: Nikolay Kuratov <[email protected]>
Date:   Thu Dec 19 19:21:14 2024 +0300

    net/sctp: Prevent autoclose integer overflow in sctp_association_init()
    
    commit 4e86729d1ff329815a6e8a920cb554a1d4cb5b8d upstream.
    
    While by default max_autoclose equals to INT_MAX / HZ, one may set
    net.sctp.max_autoclose to UINT_MAX. There is code in
    sctp_association_init() that can consequently trigger overflow.
    
    Cc: [email protected]
    Fixes: 9f70f46bd4c7 ("sctp: properly latch and use autoclose value from sock to association")
    Signed-off-by: Nikolay Kuratov <[email protected]>
    Acked-by: Xin Long <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
net: dsa: microchip: add ksz_rmw8() function [+ + +]
Author: Oleksij Rempel <[email protected]>
Date:   Mon Dec 5 06:22:29 2022 +0100

    net: dsa: microchip: add ksz_rmw8() function
    
    [ Upstream commit 6f1b986a43ce9aa67b11a7e54ac75530705d04e7 ]
    
    Add ksz_rmw8(), it will be used in the next patch.
    
    Signed-off-by: Oleksij Rempel <[email protected]>
    Acked-by: Arun Ramadoss <[email protected]>
    Reviewed-by: Florian Fainelli <[email protected]>
    Signed-off-by: Paolo Abeni <[email protected]>
    Stable-dep-of: bb9869043438 ("net: dsa: microchip: Fix LAN937X set_ageing_time function")
    Signed-off-by: Sasha Levin <[email protected]>

net: dsa: microchip: Fix KSZ9477 set_ageing_time function [+ + +]
Author: Tristram Ha <[email protected]>
Date:   Tue Dec 17 18:02:23 2024 -0800

    net: dsa: microchip: Fix KSZ9477 set_ageing_time function
    
    [ Upstream commit 262bfba8ab820641c8cfbbf03b86d6c00242c078 ]
    
    The aging count is not a simple 11-bit value but comprises a 3-bit
    multiplier and an 8-bit second count.  The code tries to use the
    original multiplier which is 4 as the second count is still 300 seconds
    by default.
    
    Fixes: 2c119d9982b1 ("net: dsa: microchip: add the support for set_ageing_time")
    Signed-off-by: Tristram Ha <[email protected]>
    Reviewed-by: Andrew Lunn <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

net: dsa: microchip: Fix LAN937X set_ageing_time function [+ + +]
Author: Tristram Ha <[email protected]>
Date:   Tue Dec 17 18:02:24 2024 -0800

    net: dsa: microchip: Fix LAN937X set_ageing_time function
    
    [ Upstream commit bb9869043438af5b94230f94fb4c39206525d758 ]
    
    The aging count is not a simple 20-bit value but comprises a 3-bit
    multiplier and a 20-bit second time.  The code tries to use the
    original multiplier which is 4 as the second count is still 300 seconds
    by default.
    
    As the 20-bit number is now too large for practical use there is an option
    to interpret it as microseconds instead of seconds.
    
    Fixes: 2c119d9982b1 ("net: dsa: microchip: add the support for set_ageing_time")
    Signed-off-by: Tristram Ha <[email protected]>
    Reviewed-by: Andrew Lunn <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

net: fix memory leak in tcp_conn_request() [+ + +]
Author: Wang Liang <[email protected]>
Date:   Thu Dec 19 15:28:59 2024 +0800

    net: fix memory leak in tcp_conn_request()
    
    [ Upstream commit 4f4aa4aa28142d53f8b06585c478476cfe325cfc ]
    
    If inet_csk_reqsk_queue_hash_add() return false, tcp_conn_request() will
    return without free the dst memory, which allocated in af_ops->route_req.
    
    Here is the kmemleak stack:
    
    unreferenced object 0xffff8881198631c0 (size 240):
      comm "softirq", pid 0, jiffies 4299266571 (age 1802.392s)
      hex dump (first 32 bytes):
        00 10 9b 03 81 88 ff ff 80 98 da bc ff ff ff ff  ................
        81 55 18 bb ff ff ff ff 00 00 00 00 00 00 00 00  .U..............
      backtrace:
        [<ffffffffb93e8d4c>] kmem_cache_alloc+0x60c/0xa80
        [<ffffffffba11b4c5>] dst_alloc+0x55/0x250
        [<ffffffffba227bf6>] rt_dst_alloc+0x46/0x1d0
        [<ffffffffba23050a>] __mkroute_output+0x29a/0xa50
        [<ffffffffba23456b>] ip_route_output_key_hash+0x10b/0x240
        [<ffffffffba2346bd>] ip_route_output_flow+0x1d/0x90
        [<ffffffffba254855>] inet_csk_route_req+0x2c5/0x500
        [<ffffffffba26b331>] tcp_conn_request+0x691/0x12c0
        [<ffffffffba27bd08>] tcp_rcv_state_process+0x3c8/0x11b0
        [<ffffffffba2965c6>] tcp_v4_do_rcv+0x156/0x3b0
        [<ffffffffba299c98>] tcp_v4_rcv+0x1cf8/0x1d80
        [<ffffffffba239656>] ip_protocol_deliver_rcu+0xf6/0x360
        [<ffffffffba2399a6>] ip_local_deliver_finish+0xe6/0x1e0
        [<ffffffffba239b8e>] ip_local_deliver+0xee/0x360
        [<ffffffffba239ead>] ip_rcv+0xad/0x2f0
        [<ffffffffba110943>] __netif_receive_skb_one_core+0x123/0x140
    
    Call dst_release() to free the dst memory when
    inet_csk_reqsk_queue_hash_add() return false in tcp_conn_request().
    
    Fixes: ff46e3b44219 ("Fix race for duplicate reqsk on identical SYN")
    Signed-off-by: Wang Liang <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

net: Fix netns for ip_tunnel_init_flow() [+ + +]
Author: Xiao Liang <[email protected]>
Date:   Thu Dec 19 21:03:36 2024 +0800

    net: Fix netns for ip_tunnel_init_flow()
    
    [ Upstream commit b5a7b661a073727219fedc35f5619f62418ffe72 ]
    
    The device denoted by tunnel->parms.link resides in the underlay net
    namespace. Therefore pass tunnel->net to ip_tunnel_init_flow().
    
    Fixes: db53cd3d88dc ("net: Handle l3mdev in ip_tunnel_init_flow")
    Signed-off-by: Xiao Liang <[email protected]>
    Reviewed-by: Ido Schimmel <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

net: llc: reset skb->transport_header [+ + +]
Author: Antonio Pastor <[email protected]>
Date:   Tue Dec 24 20:07:20 2024 -0500

    net: llc: reset skb->transport_header
    
    [ Upstream commit a024e377efed31ecfb39210bed562932321345b3 ]
    
    802.2+LLC+SNAP frames received by napi_complete_done with GRO and DSA
    have skb->transport_header set two bytes short, or pointing 2 bytes
    before network_header & skb->data. As snap_rcv expects transport_header
    to point to SNAP header (OID:PID) after LLC processing advances offset
    over LLC header (llc_rcv & llc_fixup_skb), code doesn't find a match
    and packet is dropped.
    
    Between napi_complete_done and snap_rcv, transport_header is not used
    until __netif_receive_skb_core, where originally it was being reset.
    Commit fda55eca5a33 ("net: introduce skb_transport_header_was_set()")
    only does so if not set, on the assumption the value was set correctly
    by GRO (and also on assumption that "network stacks usually reset the
    transport header anyway"). Afterwards it is moved forward by
    llc_fixup_skb.
    
    Locally generated traffic shows up at __netif_receive_skb_core with no
    transport_header set and is processed without issue. On a setup with
    GRO but no DSA, transport_header and network_header are both set to
    point to skb->data which is also correct.
    
    As issue is LLC specific, to avoid impacting non-LLC traffic, and to
    follow up on original assumption made on previous code change,
    llc_fixup_skb to reset the offset after skb pull. llc_fixup_skb
    assumes the LLC header is at skb->data, and by definition SNAP header
    immediately follows.
    
    Fixes: fda55eca5a33 ("net: introduce skb_transport_header_was_set()")
    Signed-off-by: Antonio Pastor <[email protected]>
    Reviewed-by: Eric Dumazet <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

net: mctp: handle skb cleanup on sock_queue failures [+ + +]
Author: Jeremy Kerr <[email protected]>
Date:   Wed Dec 18 11:53:01 2024 +0800

    net: mctp: handle skb cleanup on sock_queue failures
    
    [ Upstream commit ce1219c3f76bb131d095e90521506d3c6ccfa086 ]
    
    Currently, we don't use the return value from sock_queue_rcv_skb, which
    means we may leak skbs if a message is not successfully queued to a
    socket.
    
    Instead, ensure that we're freeing the skb where the sock hasn't
    otherwise taken ownership of the skb by adding checks on the
    sock_queue_rcv_skb() to invoke a kfree on failure.
    
    In doing so, rather than using the 'rc' value to trigger the
    kfree_skb(), use the skb pointer itself, which is more explicit.
    
    Also, add a kunit test for the sock delivery failure cases.
    
    Fixes: 4a992bbd3650 ("mctp: Implement message fragmentation & reassembly")
    Cc: [email protected]
    Signed-off-by: Jeremy Kerr <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Paolo Abeni <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

net: mv643xx_eth: fix an OF node reference leak [+ + +]
Author: Joe Hattori <[email protected]>
Date:   Sat Dec 21 17:14:48 2024 +0900

    net: mv643xx_eth: fix an OF node reference leak
    
    [ Upstream commit ad5c318086e2e23b577eca33559c5ebf89bc7eb9 ]
    
    Current implementation of mv643xx_eth_shared_of_add_port() calls
    of_parse_phandle(), but does not release the refcount on error. Call
    of_node_put() in the error path and in mv643xx_eth_shared_of_remove().
    
    This bug was found by an experimental verification tool that I am
    developing.
    
    Fixes: 76723bca2802 ("net: mv643xx_eth: add DT parsing support")
    Signed-off-by: Joe Hattori <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets [+ + +]
Author: Willem de Bruijn <[email protected]>
Date:   Wed Jan 1 11:47:40 2025 -0500

    net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets
    
    [ Upstream commit 68e068cabd2c6c533ef934c2e5151609cf6ecc6d ]
    
    The blamed commit disabled hardware offoad of IPv6 packets with
    extension headers on devices that advertise NETIF_F_IPV6_CSUM,
    based on the definition of that feature in skbuff.h:
    
     *   * - %NETIF_F_IPV6_CSUM
     *     - Driver (device) is only able to checksum plain
     *       TCP or UDP packets over IPv6. These are specifically
     *       unencapsulated packets of the form IPv6|TCP or
     *       IPv6|UDP where the Next Header field in the IPv6
     *       header is either TCP or UDP. IPv6 extension headers
     *       are not supported with this feature. This feature
     *       cannot be set in features for a device with
     *       NETIF_F_HW_CSUM also set. This feature is being
     *       DEPRECATED (see below).
    
    The change causes skb_warn_bad_offload to fire for BIG TCP
    packets.
    
    [  496.310233] WARNING: CPU: 13 PID: 23472 at net/core/dev.c:3129 skb_warn_bad_offload+0xc4/0xe0
    
    [  496.310297]  ? skb_warn_bad_offload+0xc4/0xe0
    [  496.310300]  skb_checksum_help+0x129/0x1f0
    [  496.310303]  skb_csum_hwoffload_help+0x150/0x1b0
    [  496.310306]  validate_xmit_skb+0x159/0x270
    [  496.310309]  validate_xmit_skb_list+0x41/0x70
    [  496.310312]  sch_direct_xmit+0x5c/0x250
    [  496.310317]  __qdisc_run+0x388/0x620
    
    BIG TCP introduced an IPV6_TLV_JUMBO IPv6 extension header to
    communicate packet length, as this is an IPv6 jumbogram. But, the
    feature is only enabled on devices that support BIG TCP TSO. The
    header is only present for PF_PACKET taps like tcpdump, and not
    transmitted by physical devices.
    
    For this specific case of extension headers that are not
    transmitted, return to the situation before the blamed commit
    and support hardware offload.
    
    ipv6_has_hopopt_jumbo() tests not only whether this header is present,
    but also that it is the only extension header before a terminal (L4)
    header.
    
    Fixes: 04c20a9356f2 ("net: skip offload for NETIF_F_IPV6_CSUM if ipv6 header contains extension")
    Reported-by: syzbot <[email protected]>
    Reported-by: Eric Dumazet <[email protected]>
    Closes: https://lore.kernel.org/netdev/CANn89iK1hdC3Nt8KPhOtTF8vCPc1AHDCtse_BTNki1pWxAByTQ@mail.gmail.com/
    Signed-off-by: Willem de Bruijn <[email protected]>
    Reviewed-by: Eric Dumazet <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

net: restrict SO_REUSEPORT to inet sockets [+ + +]
Author: Eric Dumazet <[email protected]>
Date:   Tue Dec 31 16:05:27 2024 +0000

    net: restrict SO_REUSEPORT to inet sockets
    
    [ Upstream commit 5b0af621c3f6ef9261cf6067812f2fd9943acb4b ]
    
    After blamed commit, crypto sockets could accidentally be destroyed
    from RCU call back, as spotted by zyzbot [1].
    
    Trying to acquire a mutex in RCU callback is not allowed.
    
    Restrict SO_REUSEPORT socket option to inet sockets.
    
    v1 of this patch supported TCP, UDP and SCTP sockets,
    but fcnal-test.sh test needed RAW and ICMP support.
    
    [1]
    BUG: sleeping function called from invalid context at kernel/locking/mutex.c:562
    in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 24, name: ksoftirqd/1
    preempt_count: 100, expected: 0
    RCU nest depth: 0, expected: 0
    1 lock held by ksoftirqd/1/24:
      #0: ffffffff8e937ba0 (rcu_callback){....}-{0:0}, at: rcu_lock_acquire include/linux/rcupdate.h:337 [inline]
      #0: ffffffff8e937ba0 (rcu_callback){....}-{0:0}, at: rcu_do_batch kernel/rcu/tree.c:2561 [inline]
      #0: ffffffff8e937ba0 (rcu_callback){....}-{0:0}, at: rcu_core+0xa37/0x17a0 kernel/rcu/tree.c:2823
    Preemption disabled at:
     [<ffffffff8161c8c8>] softirq_handle_begin kernel/softirq.c:402 [inline]
     [<ffffffff8161c8c8>] handle_softirqs+0x128/0x9b0 kernel/softirq.c:537
    CPU: 1 UID: 0 PID: 24 Comm: ksoftirqd/1 Not tainted 6.13.0-rc3-syzkaller-00174-ga024e377efed #0
    Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
    Call Trace:
     <TASK>
      __dump_stack lib/dump_stack.c:94 [inline]
      dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
      __might_resched+0x5d4/0x780 kernel/sched/core.c:8758
      __mutex_lock_common kernel/locking/mutex.c:562 [inline]
      __mutex_lock+0x131/0xee0 kernel/locking/mutex.c:735
      crypto_put_default_null_skcipher+0x18/0x70 crypto/crypto_null.c:179
      aead_release+0x3d/0x50 crypto/algif_aead.c:489
      alg_do_release crypto/af_alg.c:118 [inline]
      alg_sock_destruct+0x86/0xc0 crypto/af_alg.c:502
      __sk_destruct+0x58/0x5f0 net/core/sock.c:2260
      rcu_do_batch kernel/rcu/tree.c:2567 [inline]
      rcu_core+0xaaa/0x17a0 kernel/rcu/tree.c:2823
      handle_softirqs+0x2d4/0x9b0 kernel/softirq.c:561
      run_ksoftirqd+0xca/0x130 kernel/softirq.c:950
      smpboot_thread_fn+0x544/0xa30 kernel/smpboot.c:164
      kthread+0x2f0/0x390 kernel/kthread.c:389
      ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
      ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
     </TASK>
    
    Fixes: 8c7138b33e5c ("net: Unpublish sk from sk_reuseport_cb before call_rcu")
    Reported-by: [email protected]
    Closes: https://lore.kernel.org/netdev/[email protected]/T/#u
    Signed-off-by: Eric Dumazet <[email protected]>
    Cc: Martin KaFai Lau <[email protected]>
    Reviewed-by: Kuniyuki Iwashima <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

net: stmmac: don't create a MDIO bus if unnecessary [+ + +]
Author: Andrew Halaney <[email protected]>
Date:   Tue Dec 12 16:07:36 2023 -0600

    net: stmmac: don't create a MDIO bus if unnecessary
    
    [ Upstream commit f3c2caacee824ce4a331cdafb0b8dc8e987f105e ]
    
    Currently a MDIO bus is created if the devicetree description is either:
    
        1. Not fixed-link
        2. fixed-link but contains a MDIO bus as well
    
    The "1" case above isn't always accurate. If there's a phy-handle,
    it could be referencing a phy on another MDIO controller's bus[1]. In
    this case, where the MDIO bus is not described at all, currently
    stmmac will make a MDIO bus and scan its address space to discover
    phys (of which there are none). This process takes time scanning a bus
    that is known to be empty, delaying time to complete probe.
    
    There are also a lot of upstream devicetrees[2] that expect a MDIO bus
    to be created, scanned for phys, and the first one found connected
    to the MAC. This case can be inferred from the platform description by
    not having a phy-handle && not being fixed-link. This hits case "1" in
    the current driver's logic, and must be handled in any logic change here
    since it is a valid legacy dt-binding.
    
    Let's improve the logic to create a MDIO bus if either:
    
        - Devicetree contains a MDIO bus
        - !fixed-link && !phy-handle (legacy handling)
    
    This way the case where no MDIO bus should be made is handled, as well
    as retaining backwards compatibility with the valid cases.
    
    Below devicetree snippets can be found that explain some of
    the cases above more concretely.
    
    Here's[0] a devicetree example where the MAC is both fixed-link and
    driving a switch on MDIO (case "2" above). This needs a MDIO bus to
    be created:
    
        &fec1 {
                phy-mode = "rmii";
    
                fixed-link {
                        speed = <100>;
                        full-duplex;
                };
    
                mdio1: mdio {
                        switch0: switch0@0 {
                                compatible = "marvell,mv88e6190";
                                pinctrl-0 = <&pinctrl_gpio_switch0>;
                        };
                };
        };
    
    Here's[1] an example where there is no MDIO bus or fixed-link for
    the ethernet1 MAC, so no MDIO bus should be created since ethernet0
    is the MDIO master for ethernet1's phy:
    
        ðernet0 {
                phy-mode = "sgmii";
                phy-handle = <&sgmii_phy0>;
    
                mdio {
                        compatible = "snps,dwmac-mdio";
                        sgmii_phy0: phy@8 {
                                compatible = "ethernet-phy-id0141.0dd4";
                                reg = <0x8>;
                                device_type = "ethernet-phy";
                        };
    
                        sgmii_phy1: phy@a {
                                compatible = "ethernet-phy-id0141.0dd4";
                                reg = <0xa>;
                                device_type = "ethernet-phy";
                        };
                };
        };
    
        ðernet1 {
                phy-mode = "sgmii";
                phy-handle = <&sgmii_phy1>;
        };
    
    Finally there's descriptions like this[2] which don't describe the
    MDIO bus but expect it to be created and the whole address space
    scanned for a phy since there's no phy-handle or fixed-link described:
    
        &gmac {
                phy-supply = <&vcc_lan>;
                phy-mode = "rmii";
                snps,reset-gpio = <&gpio3 RK_PB4 GPIO_ACTIVE_HIGH>;
                snps,reset-active-low;
                snps,reset-delays-us = <0 10000 1000000>;
        };
    
    [0] https://elixir.bootlin.com/linux/v6.5-rc5/source/arch/arm/boot/dts/nxp/vf/vf610-zii-ssmb-dtu.dts
    [1] https://elixir.bootlin.com/linux/v6.6-rc5/source/arch/arm64/boot/dts/qcom/sa8775p-ride.dts
    [2] https://elixir.bootlin.com/linux/v6.6-rc5/source/arch/arm64/boot/dts/rockchip/rk3368-r88.dts#L164
    
    Reviewed-by: Serge Semin <[email protected]>
    Co-developed-by: Bartosz Golaszewski <[email protected]>
    Signed-off-by: Bartosz Golaszewski <[email protected]>
    Signed-off-by: Andrew Halaney <[email protected]>
    Signed-off-by: David S. Miller <[email protected]>
    Stable-dep-of: 2b6ffcd7873b ("net: stmmac: restructure the error path of stmmac_probe_config_dt()")
    Signed-off-by: Sasha Levin <[email protected]>

net: stmmac: platform: provide devm_stmmac_probe_config_dt() [+ + +]
Author: Bartosz Golaszewski <[email protected]>
Date:   Fri Jun 23 12:04:14 2023 +0200

    net: stmmac: platform: provide devm_stmmac_probe_config_dt()
    
    [ Upstream commit d74065427374da6659a2d7fad4ec55c8926d43c4 ]
    
    Provide a devres variant of stmmac_probe_config_dt() that allows users to
    skip calling stmmac_remove_config_dt() at driver detach.
    
    Signed-off-by: Bartosz Golaszewski <[email protected]>
    Link: https://lore.kernel.org/r/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    Stable-dep-of: 2b6ffcd7873b ("net: stmmac: restructure the error path of stmmac_probe_config_dt()")
    Signed-off-by: Sasha Levin <[email protected]>

net: stmmac: restructure the error path of stmmac_probe_config_dt() [+ + +]
Author: Joe Hattori <[email protected]>
Date:   Thu Dec 19 11:41:19 2024 +0900

    net: stmmac: restructure the error path of stmmac_probe_config_dt()
    
    [ Upstream commit 2b6ffcd7873b7e8a62c3e15a6f305bfc747c466b ]
    
    Current implementation of stmmac_probe_config_dt() does not release the
    OF node reference obtained by of_parse_phandle() in some error paths.
    The problem is that some error paths call stmmac_remove_config_dt() to
    clean up but others use and unwind ladder.  These two types of error
    handling have not kept in sync and have been a recurring source of bugs.
    Re-write the error handling in stmmac_probe_config_dt() to use an unwind
    ladder. Consequently, stmmac_remove_config_dt() is not needed anymore,
    thus remove it.
    
    This bug was found by an experimental verification tool that I am
    developing.
    
    Fixes: 4838a5405028 ("net: stmmac: Fix wrapper drivers not detecting PHY")
    Signed-off-by: Joe Hattori <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

net: usb: qmi_wwan: add Telit FE910C04 compositions [+ + +]
Author: Daniele Palmas <[email protected]>
Date:   Mon Dec 9 16:18:21 2024 +0100

    net: usb: qmi_wwan: add Telit FE910C04 compositions
    
    [ Upstream commit 3b58b53a26598209a7ad8259a5114ce71f7c3d64 ]
    
    Add the following Telit FE910C04 compositions:
    
    0x10c0: rmnet + tty (AT/NMEA) + tty (AT) + tty (diag)
    T:  Bus=02 Lev=01 Prnt=03 Port=06 Cnt=01 Dev#= 13 Spd=480  MxCh= 0
    D:  Ver= 2.00 Cls=00(>ifc ) Sub=00 Prot=00 MxPS=64 #Cfgs=  1
    P:  Vendor=1bc7 ProdID=10c0 Rev=05.15
    S:  Manufacturer=Telit Cinterion
    S:  Product=FE910
    S:  SerialNumber=f71b8b32
    C:  #Ifs= 4 Cfg#= 1 Atr=e0 MxPwr=500mA
    I:  If#= 0 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=50 Driver=qmi_wwan
    E:  Ad=01(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=81(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=82(I) Atr=03(Int.) MxPS=   8 Ivl=32ms
    I:  If#= 1 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=60 Driver=option
    E:  Ad=02(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=83(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=84(I) Atr=03(Int.) MxPS=  10 Ivl=32ms
    I:  If#= 2 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=40 Driver=option
    E:  Ad=03(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=85(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=86(I) Atr=03(Int.) MxPS=  10 Ivl=32ms
    I:  If#= 3 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=ff Prot=30 Driver=option
    E:  Ad=04(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=87(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    
    0x10c4: rmnet + tty (AT) + tty (AT) + tty (diag)
    T:  Bus=02 Lev=01 Prnt=03 Port=06 Cnt=01 Dev#= 14 Spd=480  MxCh= 0
    D:  Ver= 2.00 Cls=00(>ifc ) Sub=00 Prot=00 MxPS=64 #Cfgs=  1
    P:  Vendor=1bc7 ProdID=10c4 Rev=05.15
    S:  Manufacturer=Telit Cinterion
    S:  Product=FE910
    S:  SerialNumber=f71b8b32
    C:  #Ifs= 4 Cfg#= 1 Atr=e0 MxPwr=500mA
    I:  If#= 0 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=50 Driver=qmi_wwan
    E:  Ad=01(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=81(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=82(I) Atr=03(Int.) MxPS=   8 Ivl=32ms
    I:  If#= 1 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=40 Driver=option
    E:  Ad=02(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=83(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=84(I) Atr=03(Int.) MxPS=  10 Ivl=32ms
    I:  If#= 2 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=40 Driver=option
    E:  Ad=03(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=85(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=86(I) Atr=03(Int.) MxPS=  10 Ivl=32ms
    I:  If#= 3 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=ff Prot=30 Driver=option
    E:  Ad=04(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=87(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    
    0x10c8: rmnet + tty (AT) + tty (diag) + DPL (data packet logging) + adb
    T:  Bus=02 Lev=01 Prnt=03 Port=06 Cnt=01 Dev#= 17 Spd=480  MxCh= 0
    D:  Ver= 2.00 Cls=00(>ifc ) Sub=00 Prot=00 MxPS=64 #Cfgs=  1
    P:  Vendor=1bc7 ProdID=10c8 Rev=05.15
    S:  Manufacturer=Telit Cinterion
    S:  Product=FE910
    S:  SerialNumber=f71b8b32
    C:  #Ifs= 5 Cfg#= 1 Atr=e0 MxPwr=500mA
    I:  If#= 0 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=50 Driver=qmi_wwan
    E:  Ad=01(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=81(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=82(I) Atr=03(Int.) MxPS=   8 Ivl=32ms
    I:  If#= 1 Alt= 0 #EPs= 3 Cls=ff(vend.) Sub=ff Prot=40 Driver=option
    E:  Ad=02(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=83(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=84(I) Atr=03(Int.) MxPS=  10 Ivl=32ms
    I:  If#= 2 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=ff Prot=30 Driver=option
    E:  Ad=03(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=85(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    I:  If#= 3 Alt= 0 #EPs= 1 Cls=ff(vend.) Sub=ff Prot=80 Driver=(none)
    E:  Ad=86(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    I:  If#= 4 Alt= 0 #EPs= 2 Cls=ff(vend.) Sub=42 Prot=01 Driver=(none)
    E:  Ad=04(O) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    E:  Ad=87(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms
    
    Signed-off-by: Daniele Palmas <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

net: wwan: iosm: Properly check for valid exec stage in ipc_mmio_init() [+ + +]
Author: Maciej S. Szmigiero <[email protected]>
Date:   Sun Dec 29 17:46:58 2024 +0100

    net: wwan: iosm: Properly check for valid exec stage in ipc_mmio_init()
    
    [ Upstream commit a7af435df0e04cfb4a4004136d597c42639a2ae7 ]
    
    ipc_mmio_init() used the post-decrement operator in its loop continuing
    condition of "retries" counter being "> 0", which meant that when this
    condition caused loop exit "retries" counter reached -1.
    
    But the later valid exec stage failure check only tests for "retries"
    counter being exactly zero, so it didn't trigger in this case (but
    would wrongly trigger if the code reaches a valid exec stage in the
    very last loop iteration).
    
    Fix this by using the pre-decrement operator instead, so the loop counter
    is exactly zero on valid exec stage failure.
    
    Fixes: dc0514f5d828 ("net: iosm: mmio scratchpad")
    Signed-off-by: Maciej S. Szmigiero <[email protected]>
    Link: https://patch.msgid.link/8b19125a825f9dcdd81c667c1e5c48ba28d505a6.1735490770.git.mail@maciej.szmigiero.name
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

net: wwan: t7xx: Fix FSM command timeout issue [+ + +]
Author: Jinjian Song <[email protected]>
Date:   Tue Dec 24 12:15:52 2024 +0800

    net: wwan: t7xx: Fix FSM command timeout issue
    
    [ Upstream commit 4f619d518db9cd1a933c3a095a5f95d0c1584ae8 ]
    
    When driver processes the internal state change command, it use an
    asynchronous thread to process the command operation. If the main
    thread detects that the task has timed out, the asynchronous thread
    will panic when executing the completion notification because the
    main thread completion object has been released.
    
    BUG: unable to handle page fault for address: fffffffffffffff8
    PGD 1f283a067 P4D 1f283a067 PUD 1f283c067 PMD 0
    Oops: 0000 [#1] PREEMPT SMP NOPTI
    RIP: 0010:complete_all+0x3e/0xa0
    [...]
    Call Trace:
     <TASK>
     ? __die_body+0x68/0xb0
     ? page_fault_oops+0x379/0x3e0
     ? exc_page_fault+0x69/0xa0
     ? asm_exc_page_fault+0x22/0x30
     ? complete_all+0x3e/0xa0
     fsm_main_thread+0xa3/0x9c0 [mtk_t7xx (HASH:1400 5)]
     ? __pfx_autoremove_wake_function+0x10/0x10
     kthread+0xd8/0x110
     ? __pfx_fsm_main_thread+0x10/0x10 [mtk_t7xx (HASH:1400 5)]
     ? __pfx_kthread+0x10/0x10
     ret_from_fork+0x38/0x50
     ? __pfx_kthread+0x10/0x10
     ret_from_fork_asm+0x1b/0x30
     </TASK>
    [...]
    CR2: fffffffffffffff8
    ---[ end trace 0000000000000000 ]---
    
    Use the reference counter to ensure safe release as Sergey suggests:
    https://lore.kernel.org/all/[email protected]/
    
    Fixes: 13e920d93e37 ("net: wwan: t7xx: Add core components")
    Signed-off-by: Jinjian Song <[email protected]>
    Acked-by: Sergey Ryazanov <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

 
netfilter: nft_set_hash: unaligned atomic read on struct nft_set_ext [+ + +]
Author: Pablo Neira Ayuso <[email protected]>
Date:   Sat Dec 21 00:29:20 2024 +0100

    netfilter: nft_set_hash: unaligned atomic read on struct nft_set_ext
    
    [ Upstream commit 542ed8145e6f9392e3d0a86a0e9027d2ffd183e4 ]
    
    Access to genmask field in struct nft_set_ext results in unaligned
    atomic read:
    
    [   72.130109] Unable to handle kernel paging request at virtual address ffff0000c2bb708c
    [   72.131036] Mem abort info:
    [   72.131213]   ESR = 0x0000000096000021
    [   72.131446]   EC = 0x25: DABT (current EL), IL = 32 bits
    [   72.132209]   SET = 0, FnV = 0
    [   72.133216]   EA = 0, S1PTW = 0
    [   72.134080]   FSC = 0x21: alignment fault
    [   72.135593] Data abort info:
    [   72.137194]   ISV = 0, ISS = 0x00000021, ISS2 = 0x00000000
    [   72.142351]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
    [   72.145989]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
    [   72.150115] swapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000237d27000
    [   72.154893] [ffff0000c2bb708c] pgd=0000000000000000, p4d=180000023ffff403, pud=180000023f84b403, pmd=180000023f835403,
    +pte=0068000102bb7707
    [   72.163021] Internal error: Oops: 0000000096000021 [#1] SMP
    [...]
    [   72.170041] CPU: 7 UID: 0 PID: 54 Comm: kworker/7:0 Tainted: G            E      6.13.0-rc3+ #2
    [   72.170509] Tainted: [E]=UNSIGNED_MODULE
    [   72.170720] Hardware name: QEMU QEMU Virtual Machine, BIOS edk2-stable202302-for-qemu 03/01/2023
    [   72.171192] Workqueue: events_power_efficient nft_rhash_gc [nf_tables]
    [   72.171552] pstate: 21400005 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
    [   72.171915] pc : nft_rhash_gc+0x200/0x2d8 [nf_tables]
    [   72.172166] lr : nft_rhash_gc+0x128/0x2d8 [nf_tables]
    [   72.172546] sp : ffff800081f2bce0
    [   72.172724] x29: ffff800081f2bd40 x28: ffff0000c2bb708c x27: 0000000000000038
    [   72.173078] x26: ffff0000c6780ef0 x25: ffff0000c643df00 x24: ffff0000c6778f78
    [   72.173431] x23: 000000000000001a x22: ffff0000c4b1f000 x21: ffff0000c6780f78
    [   72.173782] x20: ffff0000c2bb70dc x19: ffff0000c2bb7080 x18: 0000000000000000
    [   72.174135] x17: ffff0000c0a4e1c0 x16: 0000000000003000 x15: 0000ac26d173b978
    [   72.174485] x14: ffffffffffffffff x13: 0000000000000030 x12: ffff0000c6780ef0
    [   72.174841] x11: 0000000000000000 x10: ffff800081f2bcf8 x9 : ffff0000c3000000
    [   72.175193] x8 : 00000000000004be x7 : 0000000000000000 x6 : 0000000000000000
    [   72.175544] x5 : 0000000000000040 x4 : ffff0000c3000010 x3 : 0000000000000000
    [   72.175871] x2 : 0000000000003a98 x1 : ffff0000c2bb708c x0 : 0000000000000004
    [   72.176207] Call trace:
    [   72.176316]  nft_rhash_gc+0x200/0x2d8 [nf_tables] (P)
    [   72.176653]  process_one_work+0x178/0x3d0
    [   72.176831]  worker_thread+0x200/0x3f0
    [   72.176995]  kthread+0xe8/0xf8
    [   72.177130]  ret_from_fork+0x10/0x20
    [   72.177289] Code: 54fff984 d503201f d2800080 91003261 (f820303f)
    [   72.177557] ---[ end trace 0000000000000000 ]---
    
    Align struct nft_set_ext to word size to address this and
    documentation it.
    
    pahole reports that this increases the size of elements for rhash and
    pipapo in 8 bytes on x86_64.
    
    Fixes: 7ffc7481153b ("netfilter: nft_set_hash: skip duplicated elements pending gc run")
    Signed-off-by: Pablo Neira Ayuso <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

 
netrom: check buffer length before accessing it [+ + +]
Author: Ilya Shchipletsov <[email protected]>
Date:   Thu Dec 19 08:23:07 2024 +0000

    netrom: check buffer length before accessing it
    
    [ Upstream commit a4fd163aed2edd967a244499754dec991d8b4c7d ]
    
    Syzkaller reports an uninit value read from ax25cmp when sending raw message
    through ieee802154 implementation.
    
    =====================================================
    BUG: KMSAN: uninit-value in ax25cmp+0x3a5/0x460 net/ax25/ax25_addr.c:119
     ax25cmp+0x3a5/0x460 net/ax25/ax25_addr.c:119
     nr_dev_get+0x20e/0x450 net/netrom/nr_route.c:601
     nr_route_frame+0x1a2/0xfc0 net/netrom/nr_route.c:774
     nr_xmit+0x5a/0x1c0 net/netrom/nr_dev.c:144
     __netdev_start_xmit include/linux/netdevice.h:4940 [inline]
     netdev_start_xmit include/linux/netdevice.h:4954 [inline]
     xmit_one net/core/dev.c:3548 [inline]
     dev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564
     __dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349
     dev_queue_xmit include/linux/netdevice.h:3134 [inline]
     raw_sendmsg+0x654/0xc10 net/ieee802154/socket.c:299
     ieee802154_sock_sendmsg+0x91/0xc0 net/ieee802154/socket.c:96
     sock_sendmsg_nosec net/socket.c:730 [inline]
     __sock_sendmsg net/socket.c:745 [inline]
     ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584
     ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
     __sys_sendmsg net/socket.c:2667 [inline]
     __do_sys_sendmsg net/socket.c:2676 [inline]
     __se_sys_sendmsg net/socket.c:2674 [inline]
     __x64_sys_sendmsg+0x307/0x490 net/socket.c:2674
     do_syscall_x64 arch/x86/entry/common.c:52 [inline]
     do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83
     entry_SYSCALL_64_after_hwframe+0x63/0x6b
    
    Uninit was created at:
     slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768
     slab_alloc_node mm/slub.c:3478 [inline]
     kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c:3523
     kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560
     __alloc_skb+0x318/0x740 net/core/skbuff.c:651
     alloc_skb include/linux/skbuff.h:1286 [inline]
     alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334
     sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2780
     sock_alloc_send_skb include/net/sock.h:1884 [inline]
     raw_sendmsg+0x36d/0xc10 net/ieee802154/socket.c:282
     ieee802154_sock_sendmsg+0x91/0xc0 net/ieee802154/socket.c:96
     sock_sendmsg_nosec net/socket.c:730 [inline]
     __sock_sendmsg net/socket.c:745 [inline]
     ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584
     ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
     __sys_sendmsg net/socket.c:2667 [inline]
     __do_sys_sendmsg net/socket.c:2676 [inline]
     __se_sys_sendmsg net/socket.c:2674 [inline]
     __x64_sys_sendmsg+0x307/0x490 net/socket.c:2674
     do_syscall_x64 arch/x86/entry/common.c:52 [inline]
     do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83
     entry_SYSCALL_64_after_hwframe+0x63/0x6b
    
    CPU: 0 PID: 5037 Comm: syz-executor166 Not tainted 6.7.0-rc7-syzkaller-00003-gfbafc3e621c3 #0
    Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023
    =====================================================
    
    This issue occurs because the skb buffer is too small, and it's actual
    allocation is aligned. This hides an actual issue, which is that nr_route_frame
    does not validate the buffer size before using it.
    
    Fix this issue by checking skb->len before accessing any fields in skb->data.
    
    Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    
    Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2")
    Co-developed-by: Nikita Marushkin <[email protected]>
    Signed-off-by: Nikita Marushkin <[email protected]>
    Signed-off-by: Ilya Shchipletsov <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

 
pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking [+ + +]
Author: Evgenii Shatokhin <[email protected]>
Date:   Mon Dec 9 10:46:59 2024 +0300

    pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking
    
    commit a37eecb705f33726f1fb7cd2a67e514a15dfe693 upstream.
    
    If a device uses MCP23xxx IO expander to receive IRQs, the following
    bug can happen:
    
      BUG: sleeping function called from invalid context
        at kernel/locking/mutex.c:283
      in_atomic(): 1, irqs_disabled(): 1, non_block: 0, ...
      preempt_count: 1, expected: 0
      ...
      Call Trace:
      ...
      __might_resched+0x104/0x10e
      __might_sleep+0x3e/0x62
      mutex_lock+0x20/0x4c
      regmap_lock_mutex+0x10/0x18
      regmap_update_bits_base+0x2c/0x66
      mcp23s08_irq_set_type+0x1ae/0x1d6
      __irq_set_trigger+0x56/0x172
      __setup_irq+0x1e6/0x646
      request_threaded_irq+0xb6/0x160
      ...
    
    We observed the problem while experimenting with a touchscreen driver which
    used MCP23017 IO expander (I2C).
    
    The regmap in the pinctrl-mcp23s08 driver uses a mutex for protection from
    concurrent accesses, which is the default for regmaps without .fast_io,
    .disable_locking, etc.
    
    mcp23s08_irq_set_type() calls regmap_update_bits_base(), and the latter
    locks the mutex.
    
    However, __setup_irq() locks desc->lock spinlock before calling these
    functions. As a result, the system tries to lock the mutex whole holding
    the spinlock.
    
    It seems, the internal regmap locks are not needed in this driver at all.
    mcp->lock seems to protect the regmap from concurrent accesses already,
    except, probably, in mcp_pinconf_get/set.
    
    mcp23s08_irq_set_type() and mcp23s08_irq_mask/unmask() are called under
    chip_bus_lock(), which calls mcp23s08_irq_bus_lock(). The latter takes
    mcp->lock and enables regmap caching, so that the potentially slow I2C
    accesses are deferred until chip_bus_unlock().
    
    The accesses to the regmap from mcp23s08_probe_one() do not need additional
    locking.
    
    In all remaining places where the regmap is accessed, except
    mcp_pinconf_get/set(), the driver already takes mcp->lock.
    
    This patch adds locking in mcp_pinconf_get/set() and disables internal
    locking in the regmap config. Among other things, it fixes the sleeping
    in atomic context described above.
    
    Fixes: 8f38910ba4f6 ("pinctrl: mcp23s08: switch to regmap caching")
    Cc: [email protected]
    Signed-off-by: Evgenii Shatokhin <[email protected]>
    Link: https://lore.kernel.org/[email protected]
    Signed-off-by: Linus Walleij <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
RDMA/bnxt_re: Add check for path mtu in modify_qp [+ + +]
Author: Saravanan Vajravel <[email protected]>
Date:   Wed Dec 11 14:09:28 2024 +0530

    RDMA/bnxt_re: Add check for path mtu in modify_qp
    
    [ Upstream commit 798653a0ee30d3cd495099282751c0f248614ae7 ]
    
    When RDMA app configures path MTU, add a check in modify_qp verb
    to make sure that it doesn't go beyond interface MTU. If this
    check fails, driver will fail the modify_qp verb.
    
    Fixes: 1ac5a4047975 ("RDMA/bnxt_re: Add bnxt_re RoCE driver")
    Reviewed-by: Kalesh AP <[email protected]>
    Signed-off-by: Saravanan Vajravel <[email protected]>
    Signed-off-by: Selvin Xavier <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Leon Romanovsky <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

RDMA/bnxt_re: Fix max_qp_wrs reported [+ + +]
Author: Selvin Xavier <[email protected]>
Date:   Tue Dec 17 15:56:45 2024 +0530

    RDMA/bnxt_re: Fix max_qp_wrs reported
    
    [ Upstream commit 40be32303ec829ea12f9883e499bfd3fe9e52baf ]
    
    While creating qps, driver adds one extra entry to the sq size
    passed by the ULPs in order to avoid queue full condition.
    When ULPs creates QPs with max_qp_wr reported, driver creates
    QP with 1 more than the max_wqes supported by HW. Create QP fails
    in this case. To avoid this error, reduce 1 entry in max_qp_wqes
    and report it to the stack.
    
    Fixes: 1ac5a4047975 ("RDMA/bnxt_re: Add bnxt_re RoCE driver")
    Reviewed-by: Kalesh AP <[email protected]>
    Signed-off-by: Selvin Xavier <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Leon Romanovsky <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

RDMA/bnxt_re: Fix reporting hw_ver in query_device [+ + +]
Author: Kalesh AP <[email protected]>
Date:   Wed Dec 11 14:09:31 2024 +0530

    RDMA/bnxt_re: Fix reporting hw_ver in query_device
    
    [ Upstream commit 7179fe0074a3c962e43a9e51169304c4911989ed ]
    
    Driver currently populates subsystem_device id in the
    "hw_ver" field of ib_attr structure in query_device.
    
    Updated to populate PCI revision ID.
    
    Fixes: 1ac5a4047975 ("RDMA/bnxt_re: Add bnxt_re RoCE driver")
    Reviewed-by: Preethi G <[email protected]>
    Signed-off-by: Kalesh AP <[email protected]>
    Signed-off-by: Selvin Xavier <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Leon Romanovsky <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

RDMA/bnxt_re: Fix the locking while accessing the QP table [+ + +]
Author: Selvin Xavier <[email protected]>
Date:   Tue Dec 17 15:56:49 2024 +0530

    RDMA/bnxt_re: Fix the locking while accessing the QP table
    
    [ Upstream commit 9272cba0ded71b5a2084da3004ec7806b8cb7fd2 ]
    
    QP table handling is synchronized with destroy QP and Async
    event from the HW. The same needs to be synchronized
    during create_qp also. Use the same lock in create_qp also.
    
    Fixes: 76d3ddff7153 ("RDMA/bnxt_re: synchronize the qp-handle table array")
    Fixes: f218d67ef004 ("RDMA/bnxt_re: Allow posting when QPs are in error")
    Fixes: 84cf229f4001 ("RDMA/bnxt_re: Fix the qp table indexing")
    Signed-off-by: Selvin Xavier <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Leon Romanovsky <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

 
RDMA/hns: Fix mapping error of zero-hop WQE buffer [+ + +]
Author: wenglianfa <[email protected]>
Date:   Fri Dec 20 13:52:46 2024 +0800

    RDMA/hns: Fix mapping error of zero-hop WQE buffer
    
    [ Upstream commit 8673a6c2d9e483dfeeef83a1f06f59e05636f4d1 ]
    
    Due to HW limitation, the three region of WQE buffer must be mapped
    and set to HW in a fixed order: SQ buffer, SGE buffer, and RQ buffer.
    
    Currently when one region is zero-hop while the other two are not,
    the zero-hop region will not be mapped. This violate the limitation
    above and leads to address error.
    
    Fixes: 38389eaa4db1 ("RDMA/hns: Add mtr support for mixed multihop addressing")
    Signed-off-by: wenglianfa <[email protected]>
    Signed-off-by: Junxian Huang <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Leon Romanovsky <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

RDMA/hns: Fix missing flush CQE for DWQE [+ + +]
Author: Chengchang Tang <[email protected]>
Date:   Fri Dec 20 13:52:49 2024 +0800

    RDMA/hns: Fix missing flush CQE for DWQE
    
    [ Upstream commit e3debdd48423d3d75b9d366399228d7225d902cd ]
    
    Flush CQE handler has not been called if QP state gets into errored
    mode in DWQE path. So, the new added outstanding WQEs will never be
    flushed.
    
    It leads to a hung task timeout when using NFS over RDMA:
        __switch_to+0x7c/0xd0
        __schedule+0x350/0x750
        schedule+0x50/0xf0
        schedule_timeout+0x2c8/0x340
        wait_for_common+0xf4/0x2b0
        wait_for_completion+0x20/0x40
        __ib_drain_sq+0x140/0x1d0 [ib_core]
        ib_drain_sq+0x98/0xb0 [ib_core]
        rpcrdma_xprt_disconnect+0x68/0x270 [rpcrdma]
        xprt_rdma_close+0x20/0x60 [rpcrdma]
        xprt_autoclose+0x64/0x1cc [sunrpc]
        process_one_work+0x1d8/0x4e0
        worker_thread+0x154/0x420
        kthread+0x108/0x150
        ret_from_fork+0x10/0x18
    
    Fixes: 01584a5edcc4 ("RDMA/hns: Add support of direct wqe")
    Signed-off-by: Chengchang Tang <[email protected]>
    Signed-off-by: Junxian Huang <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Leon Romanovsky <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

RDMA/hns: Fix warning storm caused by invalid input in IO path [+ + +]
Author: Chengchang Tang <[email protected]>
Date:   Fri Dec 20 13:52:48 2024 +0800

    RDMA/hns: Fix warning storm caused by invalid input in IO path
    
    [ Upstream commit fa5c4ba8cdbfd2c2d6422e001311c8213283ebbf ]
    
    WARN_ON() is called in the IO path. And it could lead to a warning
    storm. Use WARN_ON_ONCE() instead of WARN_ON().
    
    Fixes: 12542f1de179 ("RDMA/hns: Refactor process about opcode in post_send()")
    Signed-off-by: Chengchang Tang <[email protected]>
    Signed-off-by: Junxian Huang <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Leon Romanovsky <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

RDMA/hns: Refactor mtr find [+ + +]
Author: Chengchang Tang <[email protected]>
Date:   Sat Jan 13 16:59:30 2024 +0800

    RDMA/hns: Refactor mtr find
    
    [ Upstream commit a4ca341080758d847db155b97887bff6f84016a4 ]
    
    hns_roce_mtr_find() is a collection of multiple functions, and the
    return value is also difficult to understand, which is not conducive
    to modification and maintenance.
    
    Separate the function of obtaining MTR root BA from this function.
    And some adjustments has been made to improve readability.
    
    Signed-off-by: Chengchang Tang <[email protected]>
    Signed-off-by: Junxian Huang <[email protected]>
    Link: https://lore.kernel.org/r/[email protected]
    Signed-off-by: Leon Romanovsky <[email protected]>
    Stable-dep-of: 8673a6c2d9e4 ("RDMA/hns: Fix mapping error of zero-hop WQE buffer")
    Signed-off-by: Sasha Levin <[email protected]>

RDMA/hns: Remove unused parameters and variables [+ + +]
Author: Chengchang Tang <[email protected]>
Date:   Fri Apr 12 17:16:08 2024 +0800

    RDMA/hns: Remove unused parameters and variables
    
    [ Upstream commit f4caa864af84f801a5821ea2ba6c1cc46f8252c1 ]
    
    Remove unused parameters and variables.
    
    Signed-off-by: Chengchang Tang <[email protected]>
    Signed-off-by: Junxian Huang <[email protected]>
    Link: https://lore.kernel.org/r/[email protected]
    Signed-off-by: Leon Romanovsky <[email protected]>
    Stable-dep-of: 8673a6c2d9e4 ("RDMA/hns: Fix mapping error of zero-hop WQE buffer")
    Signed-off-by: Sasha Levin <[email protected]>

 
RDMA/mlx5: Enforce same type port association for multiport RoCE [+ + +]
Author: Patrisious Haddad <[email protected]>
Date:   Tue Dec 3 15:45:37 2024 +0200

    RDMA/mlx5: Enforce same type port association for multiport RoCE
    
    [ Upstream commit e05feab22fd7dabcd6d272c4e2401ec1acdfdb9b ]
    
    Different core device types such as PFs and VFs shouldn't be affiliated
    together since they have different capabilities, fix that by enforcing
    type check before doing the affiliation.
    
    Fixes: 32f69e4be269 ("{net, IB}/mlx5: Manage port association for multiport RoCE")
    Reviewed-by: Mark Bloch <[email protected]>
    Signed-off-by: Patrisious Haddad <[email protected]>
    Link: https://patch.msgid.link/88699500f690dff1c1852c1ddb71f8a1cc8b956e.1733233480.git.leonro@nvidia.com
    Reviewed-by: Mateusz Polchlopek <[email protected]>
    Signed-off-by: Leon Romanovsky <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

 
RDMA/rtrs: Ensure 'ib_sge list' is accessible [+ + +]
Author: Li Zhijian <[email protected]>
Date:   Tue Dec 31 09:34:16 2024 +0800

    RDMA/rtrs: Ensure 'ib_sge list' is accessible
    
    [ Upstream commit fb514b31395946022f13a08e06a435f53cf9e8b3 ]
    
    Move the declaration of the 'ib_sge list' variable outside the
    'always_invalidate' block to ensure it remains accessible for use
    throughout the function.
    
    Previously, 'ib_sge list' was declared within the 'always_invalidate'
    block, limiting its accessibility, then caused a
    'BUG: kernel NULL pointer dereference'[1].
     ? __die_body.cold+0x19/0x27
     ? page_fault_oops+0x15a/0x2d0
     ? search_module_extables+0x19/0x60
     ? search_bpf_extables+0x5f/0x80
     ? exc_page_fault+0x7e/0x180
     ? asm_exc_page_fault+0x26/0x30
     ? memcpy_orig+0xd5/0x140
     rxe_mr_copy+0x1c3/0x200 [rdma_rxe]
     ? rxe_pool_get_index+0x4b/0x80 [rdma_rxe]
     copy_data+0xa5/0x230 [rdma_rxe]
     rxe_requester+0xd9b/0xf70 [rdma_rxe]
     ? finish_task_switch.isra.0+0x99/0x2e0
     rxe_sender+0x13/0x40 [rdma_rxe]
     do_task+0x68/0x1e0 [rdma_rxe]
     process_one_work+0x177/0x330
     worker_thread+0x252/0x390
     ? __pfx_worker_thread+0x10/0x10
    
    This change ensures the variable is available for subsequent operations
    that require it.
    
    [1] https://lore.kernel.org/linux-rdma/[email protected]/
    
    Fixes: 9cb837480424 ("RDMA/rtrs: server: main functionality")
    Signed-off-by: Li Zhijian <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Leon Romanovsky <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

 
RDMA/uverbs: Prevent integer overflow issue [+ + +]
Author: Dan Carpenter <[email protected]>
Date:   Sat Nov 30 13:06:41 2024 +0300

    RDMA/uverbs: Prevent integer overflow issue
    
    commit d0257e089d1bbd35c69b6c97ff73e3690ab149a9 upstream.
    
    In the expression "cmd.wqe_size * cmd.wr_count", both variables are u32
    values that come from the user so the multiplication can lead to integer
    wrapping.  Then we pass the result to uverbs_request_next_ptr() which also
    could potentially wrap.  The "cmd.sge_count * sizeof(struct ib_uverbs_sge)"
    multiplication can also overflow on 32bit systems although it's fine on
    64bit systems.
    
    This patch does two things.  First, I've re-arranged the condition in
    uverbs_request_next_ptr() so that the use controlled variable "len" is on
    one side of the comparison by itself without any math.  Then I've modified
    all the callers to use size_mul() for the multiplications.
    
    Fixes: 67cdb40ca444 ("[IB] uverbs: Implement more commands")
    Cc: [email protected]
    Signed-off-by: Dan Carpenter <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Leon Romanovsky <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
selinux: ignore unknown extended permissions [+ + +]
Author: Thiébaud Weksteen <[email protected]>
Date:   Thu Dec 5 12:09:19 2024 +1100

    selinux: ignore unknown extended permissions
    
    commit 900f83cf376bdaf798b6f5dcb2eae0c822e908b6 upstream.
    
    When evaluating extended permissions, ignore unknown permissions instead
    of calling BUG(). This commit ensures that future permissions can be
    added without interfering with older kernels.
    
    Cc: [email protected]
    Fixes: fa1aa143ac4a ("selinux: extended permissions for ioctls")
    Signed-off-by: Thiébaud Weksteen <[email protected]>
    Signed-off-by: Paul Moore <[email protected]>
    Acked-by: Paul Moore <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
sky2: Add device ID 11ab:4373 for Marvell 88E8075 [+ + +]
Author: Pascal Hambourg <[email protected]>
Date:   Mon Dec 23 17:44:01 2024 +0100

    sky2: Add device ID 11ab:4373 for Marvell 88E8075
    
    commit 03c8d0af2e409e15c16130b185e12b5efba0a6b9 upstream.
    
    A Marvell 88E8075 ethernet controller has this device ID instead of
    11ab:4370 and works fine with the sky2 driver.
    
    Signed-off-by: Pascal Hambourg <[email protected]>
    Cc: [email protected]
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Jakub Kicinski <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
sound: usb: enable DSD output for ddHiFi TC44C [+ + +]
Author: Adrian Ratiu <[email protected]>
Date:   Mon Dec 9 11:05:28 2024 +0200

    sound: usb: enable DSD output for ddHiFi TC44C
    
    [ Upstream commit c84bd6c810d1880194fea2229c7086e4b73fddc1 ]
    
    This is a UAC 2 DAC capable of raw DSD on intf 2 alt 4:
    
    Bus 007 Device 004: ID 262a:9302 SAVITECH Corp. TC44C
    Device Descriptor:
      bLength                18
      bDescriptorType         1
      bcdUSB               2.00
      bDeviceClass          239 Miscellaneous Device
      bDeviceSubClass         2 [unknown]
      bDeviceProtocol         1 Interface Association
      bMaxPacketSize0        64
      idVendor           0x262a SAVITECH Corp.
      idProduct          0x9302 TC44C
      bcdDevice            0.01
      iManufacturer           1 DDHIFI
      iProduct                2 TC44C
      iSerial                 6 5000000001
    .......
        Interface Descriptor:
          bLength                 9
          bDescriptorType         4
          bInterfaceNumber        2
          bAlternateSetting       4
          bNumEndpoints           2
          bInterfaceClass         1 Audio
          bInterfaceSubClass      2 Streaming
          bInterfaceProtocol      32
          iInterface              0
            AudioStreaming Interface Descriptor:
              bLength                16
              bDescriptorType        36
              bDescriptorSubtype     1 (AS_GENERAL)
              bTerminalLink          3
              bmControls             0x00
              bFormatType            1
              bmFormats              0x80000000
              bNrChannels            2
              bmChannelConfig        0x00000000
              iChannelNames          0
    .......
    
    Signed-off-by: Adrian Ratiu <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Takashi Iwai <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

sound: usb: format: don't warn that raw DSD is unsupported [+ + +]
Author: Adrian Ratiu <[email protected]>
Date:   Mon Dec 9 11:05:29 2024 +0200

    sound: usb: format: don't warn that raw DSD is unsupported
    
    [ Upstream commit b50a3e98442b8d72f061617c7f7a71f7dba19484 ]
    
    UAC 2 & 3 DAC's set bit 31 of the format to signal support for a
    RAW_DATA type, typically used for DSD playback.
    
    This is correctly tested by (format & UAC*_FORMAT_TYPE_I_RAW_DATA),
    fp->dsd_raw = true; and call snd_usb_interface_dsd_format_quirks(),
    however a confusing and unnecessary message gets printed because
    the bit is not properly tested in the last "unsupported" if test:
    if (format & ~0x3F) { ... }
    
    For example the output:
    
    usb 7-1: new high-speed USB device number 5 using xhci_hcd
    usb 7-1: New USB device found, idVendor=262a, idProduct=9302, bcdDevice=0.01
    usb 7-1: New USB device strings: Mfr=1, Product=2, SerialNumber=6
    usb 7-1: Product: TC44C
    usb 7-1: Manufacturer: TC44C
    usb 7-1: SerialNumber: 5000000001
    hid-generic 0003:262A:9302.001E: No inputs registered, leaving
    hid-generic 0003:262A:9302.001E: hidraw6: USB HID v1.00 Device [DDHIFI TC44C] on usb-0000:08:00.3-1/input0
    usb 7-1: 2:4 : unsupported format bits 0x100000000
    
    This last "unsupported format" is actually wrong: we know the
    format is a RAW_DATA which we assume is DSD, so there is no need
    to print the confusing message.
    
    This we unset bit 31 of the format after recognizing it, to avoid
    the message.
    
    Suggested-by: Takashi Iwai <[email protected]>
    Signed-off-by: Adrian Ratiu <[email protected]>
    Link: https://patch.msgid.link/[email protected]
    Signed-off-by: Takashi Iwai <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

 
thunderbolt: Add support for Intel Lunar Lake [+ + +]
Author: Mika Westerberg <[email protected]>
Date:   Fri May 20 13:47:11 2022 +0300

    thunderbolt: Add support for Intel Lunar Lake
    
    [ Upstream commit 2cd3da4e37453019e21a486d9de3144f46b4fdf7 ]
    
    Intel Lunar Lake has similar integrated Thunderbolt/USB4 controller as
    Intel Meteor Lake with some small differences in the host router (it has
    3 DP IN adapters for instance). Add the Intel Lunar Lake PCI IDs to the
    driver list of supported devices.
    
    Tested-by: Pengfei Xu <[email protected]>
    Signed-off-by: Mika Westerberg <[email protected]>
    Stable-dep-of: 8644b48714dc ("thunderbolt: Add support for Intel Panther Lake-M/P")
    Signed-off-by: Sasha Levin <[email protected]>

thunderbolt: Add support for Intel Panther Lake-M/P [+ + +]
Author: Mika Westerberg <[email protected]>
Date:   Tue May 14 10:15:14 2024 +0300

    thunderbolt: Add support for Intel Panther Lake-M/P
    
    [ Upstream commit 8644b48714dca8bf2f42a4ff8311de8efc9bd8c3 ]
    
    Intel Panther Lake-M/P has the same integrated Thunderbolt/USB4
    controller as Lunar Lake. Add these PCI IDs to the driver list of
    supported devices.
    
    Cc: [email protected]
    Signed-off-by: Mika Westerberg <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

thunderbolt: Don't display nvm_version unless upgrade supported [+ + +]
Author: Mario Limonciello <[email protected]>
Date:   Mon Dec 9 10:25:51 2024 -0600

    thunderbolt: Don't display nvm_version unless upgrade supported
    
    [ Upstream commit e34f1717ef0632fcec5cb827e5e0e9f223d70c9b ]
    
    The read will never succeed if NVM wasn't initialized due to an unknown
    format.
    
    Add a new callback for visibility to only show when supported.
    
    Cc: [email protected]
    Fixes: aef9c693e7e5 ("thunderbolt: Move vendor specific NVM handling into nvm.c")
    Reported-by: Richard Hughes <[email protected]>
    Closes: https://github.com/fwupd/fwupd/issues/8200
    Signed-off-by: Mario Limonciello <[email protected]>
    Signed-off-by: Mika Westerberg <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

 
tracing: Have process_string() also allow arrays [+ + +]
Author: Steven Rostedt <[email protected]>
Date:   Tue Dec 31 00:06:46 2024 -0500

    tracing: Have process_string() also allow arrays
    
    commit afc6717628f959941d7b33728570568b4af1c4b8 upstream.
    
    In order to catch a common bug where a TRACE_EVENT() TP_fast_assign()
    assigns an address of an allocated string to the ring buffer and then
    references it in TP_printk(), which can be executed hours later when the
    string is free, the function test_event_printk() runs on all events as
    they are registered to make sure there's no unwanted dereferencing.
    
    It calls process_string() to handle cases in TP_printk() format that has
    "%s". It returns whether or not the string is safe. But it can have some
    false positives.
    
    For instance, xe_bo_move() has:
    
     TP_printk("move_lacks_source:%s, migrate object %p [size %zu] from %s to %s device_id:%s",
                __entry->move_lacks_source ? "yes" : "no", __entry->bo, __entry->size,
                xe_mem_type_to_name[__entry->old_placement],
                xe_mem_type_to_name[__entry->new_placement], __get_str(device_id))
    
    Where the "%s" references into xe_mem_type_to_name[]. This is an array of
    pointers that should be safe for the event to access. Instead of flagging
    this as a bad reference, if a reference points to an array, where the
    record field is the index, consider it safe.
    
    Link: https://lore.kernel.org/all/[email protected]/
    
    Cc: [email protected]
    Cc: Masami Hiramatsu <[email protected]>
    Cc: Mathieu Desnoyers <[email protected]>
    Link: https://lore.kernel.org/[email protected]
    Fixes: 65a25d9f7ac02 ("tracing: Add "%s" check in test_event_printk()")
    Reported-by: Genes Lists <[email protected]>
    Tested-by: Gene C <[email protected]>
    Signed-off-by: Steven Rostedt (Google) <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>

 
usb: xhci: Avoid queuing redundant Stop Endpoint commands [+ + +]
Author: Michal Pecio <[email protected]>
Date:   Wed Nov 6 12:14:59 2024 +0200

    usb: xhci: Avoid queuing redundant Stop Endpoint commands
    
    [ Upstream commit 474538b8dd1cd9c666e56cfe8ef60fbb0fb513f4 ]
    
    Stop Endpoint command on an already stopped endpoint fails and may be
    misinterpreted as a known hardware bug by the completion handler. This
    results in an unnecessary delay with repeated retries of the command.
    
    Avoid queuing this command when endpoint state flags indicate that it's
    stopped or halted and the command will fail. If commands are pending on
    the endpoint, their completion handlers will process cancelled TDs so
    it's done. In case of waiting for external operations like clearing TT
    buffer, the endpoint is stopped and cancelled TDs can be processed now.
    
    This eliminates practically all unnecessary retries because an endpoint
    with pending URBs is maintained in Running state by the driver, unless
    aforementioned commands or other operations are pending on it. This is
    guaranteed by xhci_ring_ep_doorbell() and by the fact that it is called
    every time any of those operations completes.
    
    The only known exceptions are hardware bugs (the endpoint never starts
    at all) and Stream Protocol errors not associated with any TRB, which
    cause an endpoint reset not followed by restart. Sounds like a bug.
    
    Generally, these retries are only expected to happen when the endpoint
    fails to start for unknown/no reason, which is a worse problem itself,
    and fixing the bug eliminates the retries too.
    
    All cases were tested and found to work as expected. SET_DEQ_PENDING
    was produced by patching uvcvideo to unlink URBs in 100us intervals,
    which then runs into this case very often. EP_HALTED was produced by
    restarting 'cat /dev/ttyUSB0' on a serial dongle with broken cable.
    EP_CLEARING_TT by the same, with the dongle on an external hub.
    
    Fixes: fd9d55d190c0 ("xhci: retry Stop Endpoint on buggy NEC controllers")
    CC: [email protected]
    Signed-off-by: Michal Pecio <[email protected]>
    Signed-off-by: Mathias Nyman <[email protected]>
    Link: https://lore.kernel.org/r/[email protected]
    Signed-off-by: Greg Kroah-Hartman <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

usb: xhci: Limit Stop Endpoint retries [+ + +]
Author: Michal Pecio <[email protected]>
Date:   Wed Nov 6 12:14:57 2024 +0200

    usb: xhci: Limit Stop Endpoint retries
    
    [ Upstream commit 42b7581376015c1bbcbe5831f043cd0ac119d028 ]
    
    Some host controllers fail to atomically transition an endpoint to the
    Running state on a doorbell ring and enter a hidden "Restarting" state,
    which looks very much like Stopped, with the important difference that
    it will spontaneously transition to Running anytime soon.
    
    A Stop Endpoint command queued in the Restarting state typically fails
    with Context State Error and the completion handler sees the Endpoint
    Context State as either still Stopped or already Running. Even a case
    of Halted was observed, when an error occurred right after the restart.
    
    The Halted state is already recovered from by resetting the endpoint.
    The Running state is handled by retrying Stop Endpoint.
    
    The Stopped state was recognized as a problem on NEC controllers and
    worked around also by retrying, because the endpoint soon restarts and
    then stops for good. But there is a risk: the command may fail if the
    endpoint is "stopped for good" already, and retries will fail forever.
    
    The possibility of this was not realized at the time, but a number of
    cases were discovered later and reproduced. Some proved difficult to
    deal with, and it is outright impossible to predict if an endpoint may
    fail to ever start at all due to a hardware bug. One such bug (albeit
    on ASM3142, not on NEC) was found to be reliably triggered simply by
    toggling an AX88179 NIC up/down in a tight loop for a few seconds.
    
    An endless retries storm is quite nasty. Besides putting needless load
    on the xHC and CPU, it causes URBs never to be given back, paralyzing
    the device and connection/disconnection logic for the whole bus if the
    device is unplugged. User processes waiting for URBs become unkillable,
    drivers and kworker threads lock up and xhci_hcd cannot be reloaded.
    
    For peace of mind, impose a timeout on Stop Endpoint retries in this
    case. If they don't succeed in 100ms, consider the endpoint stopped
    permanently for some reason and just give back the unlinked URBs. This
    failure case is rare already and work is under way to make it rarer.
    
    Start this work today by also handling one simple case of race with
    Reset Endpoint, because it costs just two lines to implement.
    
    Fixes: fd9d55d190c0 ("xhci: retry Stop Endpoint on buggy NEC controllers")
    CC: [email protected]
    Signed-off-by: Michal Pecio <[email protected]>
    Signed-off-by: Mathias Nyman <[email protected]>
    Link: https://lore.kernel.org/r/[email protected]
    Signed-off-by: Greg Kroah-Hartman <[email protected]>
    Stable-dep-of: e21ebe51af68 ("xhci: Turn NEC specific quirk for handling Stop Endpoint errors generic")
    Signed-off-by: Sasha Levin <[email protected]>

 
wifi: mac80211: wake the queues in case of failure in resume [+ + +]
Author: Emmanuel Grumbach <[email protected]>
Date:   Tue Nov 19 17:35:39 2024 +0200

    wifi: mac80211: wake the queues in case of failure in resume
    
    [ Upstream commit 220bf000530f9b1114fa2a1022a871c7ce8a0b38 ]
    
    In case we fail to resume, we'll WARN with
    "Hardware became unavailable during restart." and we'll wait until user
    space does something. It'll typically bring the interface down and up to
    recover. This won't work though because the queues are still stopped on
    IEEE80211_QUEUE_STOP_REASON_SUSPEND reason.
    Make sure we clear that reason so that we give a chance to the recovery
    to succeed.
    
    Signed-off-by: Emmanuel Grumbach <[email protected]>
    Closes: https://bugzilla.kernel.org/show_bug.cgi?id=219447
    Signed-off-by: Miri Korenblit <[email protected]>
    Link: https://patch.msgid.link/20241119173108.cd628f560f97.I76a15fdb92de450e5329940125f3c58916be3942@changeid
    Signed-off-by: Johannes Berg <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

 
x86/hyperv: Fix hv tsc page based sched_clock for hibernation [+ + +]
Author: Naman Jain <[email protected]>
Date:   Tue Sep 17 11:09:17 2024 +0530

    x86/hyperv: Fix hv tsc page based sched_clock for hibernation
    
    commit bcc80dec91ee745b3d66f3e48f0ec2efdea97149 upstream.
    
    read_hv_sched_clock_tsc() assumes that the Hyper-V clock counter is
    bigger than the variable hv_sched_clock_offset, which is cached during
    early boot, but depending on the timing this assumption may be false
    when a hibernated VM starts again (the clock counter starts from 0
    again) and is resuming back (Note: hv_init_tsc_clocksource() is not
    called during hibernation/resume); consequently,
    read_hv_sched_clock_tsc() may return a negative integer (which is
    interpreted as a huge positive integer since the return type is u64)
    and new kernel messages are prefixed with huge timestamps before
    read_hv_sched_clock_tsc() grows big enough (which typically takes
    several seconds).
    
    Fix the issue by saving the Hyper-V clock counter just before the
    suspend, and using it to correct the hv_sched_clock_offset in
    resume. This makes hv tsc page based sched_clock continuous and ensures
    that post resume, it starts from where it left off during suspend.
    Override x86_platform.save_sched_clock_state and
    x86_platform.restore_sched_clock_state routines to correct this as soon
    as possible.
    
    Note: if Invariant TSC is available, the issue doesn't happen because
    1) we don't register read_hv_sched_clock_tsc() for sched clock:
    See commit e5313f1c5404 ("clocksource/drivers/hyper-v: Rework
    clocksource and sched clock setup");
    2) the common x86 code adjusts TSC similarly: see
    __restore_processor_state() ->  tsc_verify_tsc_adjust(true) and
    x86_platform.restore_sched_clock_state().
    
    Cc: [email protected]
    Fixes: 1349401ff1aa ("clocksource/drivers/hyper-v: Suspend/resume Hyper-V clocksource for hibernation")
    Co-developed-by: Dexuan Cui <[email protected]>
    Signed-off-by: Dexuan Cui <[email protected]>
    Signed-off-by: Naman Jain <[email protected]>
    Reviewed-by: Michael Kelley <[email protected]>
    Link: https://lore.kernel.org/r/[email protected]
    Signed-off-by: Wei Liu <[email protected]>
    Message-ID: <[email protected]>
    Signed-off-by: Naman Jain <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>
 
xhci: retry Stop Endpoint on buggy NEC controllers [+ + +]
Author: Michal Pecio <[email protected]>
Date:   Thu Feb 29 16:14:36 2024 +0200

    xhci: retry Stop Endpoint on buggy NEC controllers
    
    [ Upstream commit fd9d55d190c0e5fefd3a9165ea361809427885a1 ]
    
    Two NEC uPD720200 adapters have been observed to randomly misbehave:
    a Stop Endpoint command fails with Context Error, the Output Context
    indicates Stopped state, and the endpoint keeps running. Very often,
    Set TR Dequeue Pointer is seen to fail next with Context Error too,
    in addition to problems from unexpectedly completed cancelled work.
    
    The pathology is common on fast running isoc endpoints like uvcvideo,
    but has also been reproduced on a full-speed bulk endpoint of pl2303.
    It seems all EPs are affected, with risk proportional to their load.
    
    Reproduction involves receiving any kind of stream and closing it to
    make the device driver cancel URBs already queued in advance.
    
    Deal with it by retrying the command like in the Running state.
    
    Signed-off-by: Michal Pecio <[email protected]>
    Signed-off-by: Mathias Nyman <[email protected]>
    Link: https://lore.kernel.org/r/[email protected]
    Signed-off-by: Greg Kroah-Hartman <[email protected]>
    Stable-dep-of: e21ebe51af68 ("xhci: Turn NEC specific quirk for handling Stop Endpoint errors generic")
    Signed-off-by: Sasha Levin <[email protected]>

xhci: Turn NEC specific quirk for handling Stop Endpoint errors generic [+ + +]
Author: Mathias Nyman <[email protected]>
Date:   Tue Dec 17 12:21:21 2024 +0200

    xhci: Turn NEC specific quirk for handling Stop Endpoint errors generic
    
    [ Upstream commit e21ebe51af688eb98fd6269240212a3c7300deea ]
    
    xHC hosts from several vendors have the same issue where endpoints start
    so slowly that a later queued 'Stop Endpoint' command may complete before
    endpoint is up and running.
    
    The 'Stop Endpoint' command fails with context state error as the endpoint
    still appears as  stopped.
    
    See commit 42b758137601 ("usb: xhci: Limit Stop Endpoint retries") for
    details
    
    CC: [email protected]
    Signed-off-by: Mathias Nyman <[email protected]>
    Link: https://lore.kernel.org/r/[email protected]
    Signed-off-by: Greg Kroah-Hartman <[email protected]>
    Signed-off-by: Sasha Levin <[email protected]>

 
zram: check comp is non-NULL before calling comp_destroy [+ + +]
Author: Dominique Martinet <[email protected]>
Date:   Tue Jan 7 16:16:04 2025 +0900

    zram: check comp is non-NULL before calling comp_destroy
    
    This is a pre-requisite for the backport of commit 74363ec674cb ("zram:
    fix uninitialized ZRAM not releasing backing device"), which has been
    implemented differently in commit 7ac07a26dea7 ("zram: preparation for
    multi-zcomp support") upstream.
    
    We only need to ensure that zcomp_destroy is not called with a NULL
    comp, so add this check as the other commit cannot be backported easily.
    
    Stable-dep-of: 74363ec674cb ("zram: fix uninitialized ZRAM not releasing backing device")
    Link: https://lore.kernel.org/[email protected]
    Suggested-by: Kairui Song <[email protected]>
    Signed-off-by: Dominique Martinet <[email protected]>
    Signed-off-by: Greg Kroah-Hartman <[email protected]>