~vicamo/+git/ubuntu-kernel:bug-1838951/add-dell-laptop-dmi-whitelist/bionic

Last commit made on 2019-10-03
Get this branch:
git clone -b bug-1838951/add-dell-laptop-dmi-whitelist/bionic https://git.launchpad.net/~vicamo/+git/ubuntu-kernel
Only You-Sheng Yang can upload to this branch. If you are You-Sheng Yang please log in for upload directions.

Branch merges

Branch information

Name:
bug-1838951/add-dell-laptop-dmi-whitelist/bionic
Repository:
lp:~vicamo/+git/ubuntu-kernel

Recent commits

7292583... by You-Sheng Yang

Bug 1838951: dell-laptop: add more DMI whitelist

40097f5... by Alexander Abrosimov <email address hidden>

platform/x86: dell-laptop: Removed duplicates in DMI whitelist

Fixed a mistake in which several entries were duplicated in the DMI list
from the below commit
fe486138 platform/x86: dell-laptop: Add 2-in-1 devices to the DMI whitelist

Signed-off-by: Alexander Abrosimov <email address hidden>
Reviewed-by: Pali Rohár <email address hidden>
Signed-off-by: Andy Shevchenko <email address hidden>
(cherry picked from commit c8ba9db2a790c0fcf2f6c4cafd45ff3a0751800e)
Signed-off-by: You-Sheng Yang <email address hidden>

37898dc... by Alexander Abrosimov <email address hidden>

platform/x86: dell-laptop: Add 2-in-1 devices to the DMI whitelist

SMBIOS 3.0.0 Specification introduced new Chassis Types field values for
2-in-1 devices like tablets, convertibles and detachables. Dell's
Inspiron 2-in-1 and XPS 2-in-1 fall into this category and they have to
be added to the DMI whitelist, so rfkill and backlight can be controlled
for them as for other laptops.

Signed-off-by: Alexander Abrosimov <email address hidden>
Reviewed-by: Mario Limonciello <email address hidden>
Signed-off-by: Darren Hart (VMware) <email address hidden>
(cherry picked from commit fe486138788ba435ffa918c8d7aba05a77b6289a)
Signed-off-by: You-Sheng Yang <email address hidden>

879d34c... by Khaled El Mously

UBUNTU: Ubuntu-4.15.0-66.75

Signed-off-by: Khalid Elmously <email address hidden>

1b2d428... by Khaled El Mously

UBUNTU: link-to-tracker: update tracking bug

BugLink: https://bugs.launchpad.net/bugs/1846131
Properties: no-test-build
Signed-off-by: Khalid Elmously <email address hidden>

3aa4ec4... by Khaled El Mously

UBUNTU: Start new release

Ignore: yes
Signed-off-by: Khalid Elmously <email address hidden>

e10e516... by Khaled El Mously

UBUNTU: [Packaging] update helper scripts

BugLink: http://bugs.launchpad.net/bugs/1786013
Signed-off-by: Khalid Elmously <email address hidden>

e1d81dc... by Sanjay Konduri <email address hidden>

rsi: add fix for crash during assertions

CVE-2018-21008

Observed crash in some scenarios when assertion has occurred,
this is because hw structure is freed and is tried to get
accessed in some functions where null check is already
present. So, avoided the crash by making the hw to NULL after
freeing.

Signed-off-by: Sanjay Konduri <email address hidden>
Signed-off-by: Sushant Kumar Mishra <email address hidden>
Signed-off-by: Kalle Valo <email address hidden>
(cherry picked from commit abd39c6ded9db53aa44c2540092bdd5fb6590fa8)
Signed-off-by: Connor Kuehl <email address hidden>
Acked-by: Tyler Hicks <email address hidden>
Acked-by: Kleber Sacilotto de Souza <email address hidden>
Signed-off-by: Kleber Sacilotto de Souza <email address hidden>

7ef825d... by Nicolas Dichtel

ipv6: fix neighbour resolution with raw socket

BugLink: https://bugs.launchpad.net/bugs/1834465

The scenario is the following: the user uses a raw socket to send an ipv6
packet, destinated to a not-connected network, and specify a connected nh.
Here is the corresponding python script to reproduce this scenario:

 import socket
 IPPROTO_RAW = 255
 send_s = socket.socket(socket.AF_INET6, socket.SOCK_RAW, IPPROTO_RAW)
 # scapy
 # p = IPv6(src='fd00:100::1', dst='fd00:200::fa')/ICMPv6EchoRequest()
 # str(p)
 req = b'`\x00\x00\x00\x00\x08:@\xfd\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xfd\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfa\x80\x00\x81\xc0\x00\x00\x00\x00'
 send_s.sendto(req, ('fd00:175::2', 0, 0, 0))

fd00:175::/64 is a connected route and fd00:200::fa is not a connected
host.

With this scenario, the kernel starts by sending a NS to resolve
fd00:175::2. When it receives the NA, it flushes its queue and try to send
the initial packet. But instead of sending it, it sends another NS to
resolve fd00:200::fa, which obvioulsy fails, thus the packet is dropped. If
the user sends again the packet, it now uses the right nh (fd00:175::2).

The problem is that ip6_dst_lookup_neigh() uses the rt6i_gateway, which is
:: because the associated route is a connected route, thus it uses the dst
addr of the packet. Let's use rt6_nexthop() to choose the right nh.

Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
Signed-off-by: David S. Miller <email address hidden>
(backported from commit 2c6b55f45d53420d8310d41310e0e2cd41fe073f)
[nicolas.dichtel:
 The upstream patch was slightly modified because ip6_dst_lookup_neigh()
 does not exist in v4.15. It has been introduced in v4.18 by the upstream
 commit f8a1b43b709d ("net/ipv6: Create a neigh_lookup for FIB entries"). In
 fact, ip6_dst_lookup_neigh() just calls ip6_neigh_lookup().]
Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
Acked-by: Stefan Bader <email address hidden>
Acked-by: Kleber Sacilotto de Souza <email address hidden>
Signed-off-by: Kleber Sacilotto de Souza <email address hidden>

fdfc428... by Nicolas Dichtel

ipv6: constify rt6_nexthop()

BugLink: https://bugs.launchpad.net/bugs/1834465

There is no functional change in this patch, it only prepares the next one.

rt6_nexthop() will be used by ip6_dst_lookup_neigh(), which uses const
variables.

Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
Reported-by: kbuild test robot <email address hidden>
Acked-by: Nick Desaulniers <email address hidden>
Signed-off-by: David S. Miller <email address hidden>
(backported from commit 9b1c1ef13b35fa35051b635ca9fbda39fe6bbc70)
Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
Acked-by: Stefan Bader <email address hidden>
Acked-by: Kleber Sacilotto de Souza <email address hidden>
Signed-off-by: Kleber Sacilotto de Souza <email address hidden>