~vicamo/+git/ubuntu-kernel:bug-1818490/for-unstable

Last commit made on 2019-04-11
Get this branch:
git clone -b bug-1818490/for-unstable https://git.launchpad.net/~vicamo/+git/ubuntu-kernel
Only You-Sheng Yang can upload to this branch. If you are You-Sheng Yang please log in for upload directions.

Branch merges

Branch information

Name:
bug-1818490/for-unstable
Repository:
lp:~vicamo/+git/ubuntu-kernel

Recent commits

ebb4aef... by Arvind Sankar <email address hidden>

igb: Fix WARN_ONCE on runtime suspend

The runtime_suspend device callbacks are not supposed to save
configuration state or change the power state. Commit fb29f76cc566
("igb: Fix an issue that PME is not enabled during runtime suspend")
changed the driver to not save configuration state during runtime
suspend, however the driver callback still put the device into a
low-power state. This causes a warning in the pci pm core and results in
pci_pm_runtime_suspend not calling pci_save_state or pci_finish_runtime_suspend.

Fix this by not changing the power state either, leaving that to pci pm
core, and make the same change for suspend callback as well.

Also move a couple of defines into the appropriate header file instead
of inline in the .c file.

Fixes: fb29f76cc566 ("igb: Fix an issue that PME is not enabled during runtime suspend")
Signed-off-by: Arvind Sankar <email address hidden>
Reviewed-by: Kai-Heng Feng <email address hidden>
Tested-by: Aaron Brown <email address hidden>
Signed-off-by: Jeff Kirsher <email address hidden>
(cherry picked from commit dabb8338be533c18f50255cf39ff4f66d4dabdbe)
Signed-off-by: You-Sheng Yang <email address hidden>

367eb5b... by Steve French <email address hidden>

SMB3: Fix SMB3.1.1 guest mounts to Samba

BugLink: https://launchpad.net/bugs/1821053

Workaround problem with Samba responses to SMB3.1.1
null user (guest) mounts. The server doesn't set the
expected flag in the session setup response so we have
to do a similar check to what is done in smb3_validate_negotiate
where we also check if the user is a null user (but not sec=krb5
since username might not be passed in on mount for Kerberos case).

Note that the commit below tightened the conditions and forced signing
for the SMB2-TreeConnect commands as per MS-SMB2.
However, this should only apply to normal user sessions and not for
cases where there is no user (even if server forgets to set the flag
in the response) since we don't have anything useful to sign with.
This is especially important now that the more secure SMB3.1.1 protocol
is in the default dialect list.

An earlier patch ("cifs: allow guest mounts to work for smb3.11") fixed
the guest mounts to Windows.

    Fixes: 6188f28bf608 ("Tree connect for SMB3.1.1 must be signed for non-encrypted shares")

Reviewed-by: Ronnie Sahlberg <email address hidden>
Reviewed-by: Paulo Alcantara <email address hidden>
CC: Stable <email address hidden>
Signed-off-by: Steve French <email address hidden>
(cherry picked from commit 8c11a607d1d9cd6e7f01fd6b03923597fb0ef95a)
Signed-off-by: Tyler Hicks <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>

961b0e3... by Ronnie Sahlberg <email address hidden>

cifs: allow guest mounts to work for smb3.11

BugLink: https://launchpad.net/bugs/1821053

Fix Guest/Anonymous sessions so that they work with SMB 3.11.

The commit noted below tightened the conditions and forced signing for
the SMB2-TreeConnect commands as per MS-SMB2.
However, this should only apply to normal user sessions and not for
Guest/Anonumous sessions.

Fixes: 6188f28bf608 ("Tree connect for SMB3.1.1 must be signed for non-encrypted shares")

Signed-off-by: Ronnie Sahlberg <email address hidden>
CC: Stable <email address hidden>
Signed-off-by: Steve French <email address hidden>
(cherry picked from commit e71ab2aa06f731a944993120b0eef1556c63b81c)
Signed-off-by: Tyler Hicks <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>

3754856... by Xiongfeng Wang <email address hidden>

cpufreq / cppc: Work around for Hisilicon CPPC cpufreq

BugLink: https://bugs.launchpad.net/bugs/1821620

Hisilicon chips do not support delivered performance counter register
and reference performance counter register. But the platform can
calculate the real performance using its own method. We reuse the
desired performance register to store the real performance calculated by
the platform. After the platform finished the frequency adjust, it gets
the real performance and writes it into desired performance register. Os
can use it to calculate the real frequency.

Signed-off-by: Xiongfeng Wang <email address hidden>
[ rjw: Drop unnecessary braces ]
Signed-off-by: Rafael J. Wysocki <email address hidden>
(cherry picked from commit 6c8d750f9784cef32a8cffdad74c8a351b4ca3a6)
Signed-off-by: dann frazier <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>

c5817e9... by Xiongfeng Wang <email address hidden>

ACPI / CPPC: Add a helper to get desired performance

BugLink: https://bugs.launchpad.net/bugs/1821620

This patch add a helper to get the value of desired performance
register.

Signed-off-by: Xiongfeng Wang <email address hidden>
[ rjw: More white space ]
Signed-off-by: Rafael J. Wysocki <email address hidden>
(cherry picked from commit 1757d05f3112acc5c0cdbcccad3afdee99655bf9)
Signed-off-by: dann frazier <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>

11b740f... by John Johansen

UBUNTU: SAUCE: update configs and annotations for LSM stacking

Signed-off-by: John Johansen <email address hidden>
[ saf: also remove CONFIG_SECURITY_SELINUX_BOOTPARAM_VALUE from
  configs ]
Signed-off-by: Seth Forshee <email address hidden>

4208302... by John Johansen

UBUNTU: SAUCE: apparmor: update flags to no longer be exclusive

With blob sharing in place, and secid use reverted apparmor is no
longer an exclusive LSM, so it can operate separately now.

Signed-off-by: John Johansen <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>

8347e26... by John Johansen

UBUNTU: SAUCE: apparmor: add an apparmorfs entry to access current attrs

There are use cases where the proc filesystem is not available but
access to the apparmor attr interface for change_profile and
change_hat is desired.

Provide an apparmorfs based interface for the current task that
mirrors what is provided in proc.

Signed-off-by: John Johansen <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>

383da54... by John Johansen

UBUNTU: SAUCE: apparmor: add proc subdir to attrs

This patch provides a /proc/<pid>/attr/apparmor/
subdirectory. Enabling userspace to use the apparmor attributes
without having to worry about collisions with selinux or smack on
interface files in /proc/<pid>/attr.

Signed-off-by: John Johansen <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>

9dfe122... by John Johansen

UBUNTU: SAUCE: Revert "apparmor: add support for mapping secids and using secctxes"

Revert currently unused by Ubuntu apparmor features that require secid
support, to enable apparmor LSM stacking with the 5.1 LSM stacking
patchset.

This reverts commit c092921219d227b13cb80dbecd3545ee66ab89b3.

Signed-off-by: John Johansen <email address hidden>
Signed-off-by: Seth Forshee <email address hidden>