~claudiotiecher/ubuntu/+source/linux:master-next

Last commit made on 2023-03-31
Get this branch:
git clone -b master-next https://git.launchpad.net/~claudiotiecher/ubuntu/+source/linux
Only Claudio Tiecher can upload to this branch. If you are Claudio Tiecher please log in for upload directions.

Branch merges

Branch information

Name:
master-next
Repository:
lp:~claudiotiecher/ubuntu/+source/linux

Recent commits

e7e9633... by Claudio Tiecher

ALSA: hda/conexant: Add quirk for LENOVO Ideapad 310 Notebook model

63b23a4... by Po-Hsu Lin

selftests: net: devlink_port_split.py: skip test if no suitable device available

BugLink: https://bugs.launchpad.net/bugs/1937133

The `devlink -j port show` command output may not contain the "flavour"
key, an example from Ubuntu 22.10 s390x LPAR(5.19.0-37-generic), with
mlx4 driver and iproute2-5.15.0:
  {"port":{"pci/0001:00:00.0/1":{"type":"eth","netdev":"ens301"},
           "pci/0001:00:00.0/2":{"type":"eth","netdev":"ens301d1"},
           "pci/0002:00:00.0/1":{"type":"eth","netdev":"ens317"},
           "pci/0002:00:00.0/2":{"type":"eth","netdev":"ens317d1"}}}

This will cause a KeyError exception.

Create a validate_devlink_output() to check for this "flavour" from
devlink command output to avoid this KeyError exception. Also let
it handle the check for `devlink -j dev show` output in main().

Apart from this, if the test was not started because the max lanes of
the designated device is 0. The script will still return 0 and thus
causing a false-negative test result.

Use a found_max_lanes flag to determine if these tests were skipped
due to this reason and return KSFT_SKIP to make it more clear.

Link: https://bugs.launchpad.net/bugs/1937133
Fixes: f3348a82e727 ("selftests: net: Add port split test")
Signed-off-by: Po-Hsu Lin <email address hidden>
Link: https://<email address hidden>
Signed-off-by: Jakub Kicinski <email address hidden>

(cherry picked from commit 3de66d08d37a565eba1adfe1e107593cae978a20)
Signed-off-by: Po-Hsu Lin <email address hidden>
Acked-by: Roxana Nicolescu <email address hidden>
Acked-by: Tim Gardner <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

64e1a9e... by Eric Dumazet <email address hidden>

netfilter: conntrack: adopt safer max chain length

BugLink: https://bugs.launchpad.net/bugs/2011616

Customers using GKE 1.25 and 1.26 are facing conntrack issues
root caused to commit c9c3b6811f74 ("netfilter: conntrack: make
max chain length random").

Even if we assume Uniform Hashing, a bucket often reachs 8 chained
items while the load factor of the hash table is smaller than 0.5

With a limit of 16, we reach load factors of 3.
With a limit of 32, we reach load factors of 11.
With a limit of 40, we reach load factors of 15.
With a limit of 50, we reach load factors of 24.

This patch changes MIN_CHAINLEN to 50, to minimize risks.

Ideally, we could in the future add a cushion based on expected
load factor (2 * nf_conntrack_max / nf_conntrack_buckets),
because some setups might expect unusual values.

Fixes: c9c3b6811f74 ("netfilter: conntrack: make max chain length random")
Signed-off-by: Eric Dumazet <email address hidden>
Signed-off-by: Pablo Neira Ayuso <email address hidden>

(cherry picked from commit c77737b736ceb50fdf150434347dbd81ec76dbb1)
Signed-off-by: Khalid Elmously <email address hidden>
Acked-by: Tim Gardner <email address hidden>
Acked-by: Cengiz Can <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

076ee9b... by Kamal Mostafa

UBUNTU: Upstream stable to v5.15.94

BugLink: https://bugs.launchpad.net/bugs/2012673

Ignore: yes
Signed-off-by: Kamal Mostafa <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

2fbdf1a... by Greg Kroah-Hartman <email address hidden>

Linux 5.15.94

BugLink: https://bugs.launchpad.net/bugs/2012673

Link: https://<email address hidden>
Tested-by: Florian Fainelli <email address hidden>
Tested-by: Allen Pais <email address hidden>
Tested-by: Shuah Khan <email address hidden>
Tested-by: Bagas Sanjaya <email address hidden>
Tested-by: Linux Kernel Functional Testing <email address hidden>
Tested-by: Sudip Mukherjee <email address hidden>
Tested-by: Ron Economos <email address hidden>
Tested-by: Jon Hunter <email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Kamal Mostafa <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

8030958... by Tom Lendacky

Documentation/hw-vuln: Add documentation for Cross-Thread Return Predictions

BugLink: https://bugs.launchpad.net/bugs/2012673

commit 493a2c2d23ca91afba96ac32b6cbafb54382c2a3 upstream.

Add the admin guide for the Cross-Thread Return Predictions vulnerability.

Signed-off-by: Tom Lendacky <email address hidden>
Message-Id: <60f9c0b4396956ce70499ae180cb548720b25c7e<email address hidden>>
Signed-off-by: Paolo Bonzini <email address hidden>
Signed-off-by: Sasha Levin <email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Kamal Mostafa <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

75ba656... by Tom Lendacky

KVM: x86: Mitigate the cross-thread return address predictions bug

BugLink: https://bugs.launchpad.net/bugs/2012673

commit 6f0f2d5ef895d66a3f2b32dd05189ec34afa5a55 upstream.

By default, KVM/SVM will intercept attempts by the guest to transition
out of C0. However, the KVM_CAP_X86_DISABLE_EXITS capability can be used
by a VMM to change this behavior. To mitigate the cross-thread return
address predictions bug (X86_BUG_SMT_RSB), a VMM must not be allowed to
override the default behavior to intercept C0 transitions.

Use a module parameter to control the mitigation on processors that are
vulnerable to X86_BUG_SMT_RSB. If the processor is vulnerable to the
X86_BUG_SMT_RSB bug and the module parameter is set to mitigate the bug,
KVM will not allow the disabling of the HLT, MWAIT and CSTATE exits.

Signed-off-by: Tom Lendacky <email address hidden>
Message-Id: <4019348b5e07148eb4d593380a5f6713b93c9a16<email address hidden>>
Signed-off-by: Paolo Bonzini <email address hidden>
Signed-off-by: Sasha Levin <email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Kamal Mostafa <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

5c02836... by Tom Lendacky

x86/speculation: Identify processors vulnerable to SMT RSB predictions

BugLink: https://bugs.launchpad.net/bugs/2012673

commit be8de49bea505e7777a69ef63d60e02ac1712683 upstream.

Certain AMD processors are vulnerable to a cross-thread return address
predictions bug. When running in SMT mode and one of the sibling threads
transitions out of C0 state, the other sibling thread could use return
target predictions from the sibling thread that transitioned out of C0.

The Spectre v2 mitigations cover the Linux kernel, as it fills the RSB
when context switching to the idle thread. However, KVM allows a VMM to
prevent exiting guest mode when transitioning out of C0. A guest could
act maliciously in this situation, so create a new x86 BUG that can be
used to detect if the processor is vulnerable.

Reviewed-by: Borislav Petkov (AMD) <email address hidden>
Signed-off-by: Tom Lendacky <email address hidden>
Message-Id: <91cec885656ca1fcd4f0185ce403a53dd9edecb7<email address hidden>>
Signed-off-by: Paolo Bonzini <email address hidden>
Signed-off-by: Sasha Levin <email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Kamal Mostafa <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

4117c99... by =?utf-8?b?VmlsbGUgU3lyasOkbMOk?= <email address hidden>

drm/i915: Fix VBT DSI DVO port handling

BugLink: https://bugs.launchpad.net/bugs/2012673

commit 6a7ff131f17f44c593173c5ee30e2c03ef211685 upstream.

Turns out modern (icl+) VBTs still declare their DSI ports
as MIPI-A and MIPI-C despite the PHYs now being A and B.
Remap appropriately to allow the panels declared as MIPI-C
to work.

Cc: <email address hidden>
Closes: https://gitlab.freedesktop.org/drm/intel/-/issues/8016
Signed-off-by: Ville Syrjälä <email address hidden>
Link: https://patchwork.<email address hidden>
Reviewed-by: Jani Nikula <email address hidden>
(cherry picked from commit 118b5c136c04da705b274b0d39982bb8b7430fc5)
Signed-off-by: Rodrigo Vivi <email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Kamal Mostafa <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

40601b8... by Aravind Iddamsetty <email address hidden>

drm/i915: Initialize the obj flags for shmem objects

BugLink: https://bugs.launchpad.net/bugs/2012673

commit 44e4c5684fcc82d8f099656c4ea39d9571e2a8ac upstream.

Obj flags for shmem objects is not being set correctly. Fixes in setting
BO_ALLOC_USER flag which applies to shmem objs as well.

v2: Add fixes tag (Tvrtko, Matt A)

Fixes: 13d29c823738 ("drm/i915/ehl: unconditionally flush the pages on acquire")
Cc: <email address hidden> # v5.15+
Cc: Matthew Auld <email address hidden>
Cc: Tvrtko Ursulin <email address hidden>
Reviewed-by: Matthew Auld <email address hidden>
Signed-off-by: Aravind Iddamsetty <email address hidden>
Reviewed-by: Andrzej Hajda <email address hidden>
Signed-off-by: Tvrtko Ursulin <email address hidden>
[tursulin: Grouped all tags together.]
Link: https://patchwork.freedesktop<email address hidden>
(cherry picked from commit bca0d1d3ceeb07be45a51c0fa4d57a0ce31b6aed)
Signed-off-by: Rodrigo Vivi <email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Kamal Mostafa <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>