~ubuntu-kernel/ubuntu/+source/linux/+git/focal:master-next--2024.04.01-1

Last commit made on 2024-04-23
Get this branch:
git clone -b master-next--2024.04.01-1 https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/focal
Members of Ubuntu Kernel Repositories can upload to this branch. Log in for directions.

Branch merges

Branch information

Name:
master-next--2024.04.01-1
Repository:
lp:~ubuntu-kernel/ubuntu/+source/linux/+git/focal

Recent commits

2b30655... by Roxana Nicolescu

UBUNTU: [Packaging] drop getabis data

BugLink: https://bugs.launchpad.net/bugs/1786013
Signed-off-by: Roxana Nicolescu <email address hidden>

5a8641d... by Magali Lemes do Sacramento

UBUNTU: [Packaging] Remove fips-checks script

BugLink: https://bugs.launchpad.net/bugs/2055083

This script is now part of `cranky` and there is no need for it to live
in debian/ anymore, so remove it.

Signed-off-by: Magali Lemes <email address hidden>
Acked-by: Stefan Bader <email address hidden>
Acked-by: Roxana Nicolescu <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

f2c6091... by Roxana Nicolescu

UBUNTU: [Packaging] Remove getabis

BugLink: https://bugs.launchpad.net/bugs/2059143

With ABI checks removed from the tree (#LP2055685), there's no need to
download the buildinfo from a previous version.

Signed-off-by: Roxana Nicolescu <email address hidden>
Acked-by: Andrea Righi <email address hidden>
Acked-by: Stefan Bader <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

1810701... by Manuel Diewald

UBUNTU: Upstream stable to v5.4.269

BugLink: https://bugs.launchpad.net/bugs/2058948

Ignore: yes
Signed-off-by: Manuel Diewald <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

6e33f61... by Greg Kroah-Hartman <email address hidden>

Linux 5.4.269

BugLink: https://bugs.launchpad.net/bugs/2058948

Link: https://<email address hidden>
Tested-by: Jon Hunter <email address hidden>
Tested-by: Florian Fainelli <email address hidden>
Tested-by: Shuah Khan <email address hidden>
Tested-by: kernelci.org bot <email address hidden>
Tested-by: Harshit Mogalapalli <email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Manuel Diewald <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

817b6d0... by Frank Rowand <email address hidden>

of: gpio unittest kfree() wrong object

BugLink: https://bugs.launchpad.net/bugs/2058948

commit fb227f597d612c6660888d1947e68a25fed7b9cc upstream.

kernel test robot reported "WARNING: held lock freed!" triggered by
unittest_gpio_remove(). unittest_gpio_remove() was unexpectedly
called due to an error in overlay tracking. The remove had not
been tested because the gpio overlay removal tests have not been
implemented.

kfree() gdev instead of pdev.

Fixes: f4056e705b2e ("of: unittest: add overlay gpio test to catch gpio hog problem")
Reported-by: kernel test robot <email address hidden>
Signed-off-by: Frank Rowand <email address hidden>
Reviewed-by: Geert Uytterhoeven <email address hidden>
Signed-off-by: Rob Herring <email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Manuel Diewald <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

efd56da... by Frank Rowand <email address hidden>

of: unittest: fix EXPECT text for gpio hog errors

BugLink: https://bugs.launchpad.net/bugs/2058948

commit e85860e5bc077865a04f0a88d0b0335d3200484a upstream.

The console message text for gpio hog errors does not match
what unittest expects.

Fixes: f4056e705b2ef ("of: unittest: add overlay gpio test to catch gpio hog problem")
Signed-off-by: Frank Rowand <email address hidden>
Link: https://<email address hidden>
Signed-off-by: Rob Herring <email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Manuel Diewald <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

464c6e2... by Florian Fainelli <email address hidden>

net: bcmgenet: Fix EEE implementation

BugLink: https://bugs.launchpad.net/bugs/2058948

commit a9f31047baca57d47440c879cf259b86f900260c upstream.

We had a number of short comings:

- EEE must be re-evaluated whenever the state machine detects a link
  change as wight be switching from a link partner with EEE
  enabled/disabled

- tx_lpi_enabled controls whether EEE should be enabled/disabled for the
  transmit path, which applies to the TBUF block

- We do not need to forcibly enable EEE upon system resume, as the PHY
  state machine will trigger a link event that will do that, too

Fixes: 6ef398ea60d9 ("net: bcmgenet: add EEE support")
Signed-off-by: Florian Fainelli <email address hidden>
Reviewed-by: Russell King (Oracle) <email address hidden>
Link: https://<email address hidden>
Signed-off-by: Jakub Kicinski <email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Manuel Diewald <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

721d287... by Max Krummenacher <email address hidden>

Revert "Revert "mtd: rawnand: gpmi: Fix setting busy timeout setting""

BugLink: https://bugs.launchpad.net/bugs/2058948

This reverts commit 15a3adfe75937c9e4e0e48f0ed40dd39a0e526e2.

The backport of [1] relies on having [2] also backported. Having only
one of the two results in a bogus hw->timing1 setting.

If only [2] is backportet the 16 bit register value likely underflows
resulting in a busy_wait_timeout of 0.
Or if only [1] is applied the value likely overflows with chances of
having last 16 LSBs all 0 which would then result in a
busy_wait_timeout of 0 too.

Both cases may lead to NAND data corruption, e.g. on a Colibri iMX7
setup this has been seen.

[1] commit 0fddf9ad06fd ("mtd: rawnand: gpmi: Set WAIT_FOR_READY timeout based on program/erase times")
[2] commit 06781a5026350 ("mtd: rawnand: gpmi: Fix setting busy timeout setting")

Signed-off-by: Max Krummenacher <email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Manuel Diewald <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

f83b606... by Alfred Piccioni <email address hidden>

lsm: new security_file_ioctl_compat() hook

BugLink: https://bugs.launchpad.net/bugs/2058948

commit f1bb47a31dff6d4b34fb14e99850860ee74bb003 upstream.

Some ioctl commands do not require ioctl permission, but are routed to
other permissions such as FILE_GETATTR or FILE_SETATTR. This routing is
done by comparing the ioctl cmd to a set of 64-bit flags (FS_IOC_*).

However, if a 32-bit process is running on a 64-bit kernel, it emits
32-bit flags (FS_IOC32_*) for certain ioctl operations. These flags are
being checked erroneously, which leads to these ioctl operations being
routed to the ioctl permission, rather than the correct file
permissions.

This was also noted in a RED-PEN finding from a while back -
"/* RED-PEN how should LSM module know it's handling 32bit? */".

This patch introduces a new hook, security_file_ioctl_compat(), that is
called from the compat ioctl syscall. All current LSMs have been changed
to support this hook.

Reviewing the three places where we are currently using
security_file_ioctl(), it appears that only SELinux needs a dedicated
compat change; TOMOYO and SMACK appear to be functional without any
change.

Cc: <email address hidden>
Fixes: 0b24dcb7f2f7 ("Revert "selinux: simplify ioctl checking"")
Signed-off-by: Alfred Piccioni <email address hidden>
Reviewed-by: Stephen Smalley <email address hidden>
[PM: subject tweak, line length fixes, and alignment corrections]
Signed-off-by: Paul Moore <email address hidden>
Signed-off-by: Eric Biggers <email address hidden>
Signed-off-by: Greg Kroah-Hartman <email address hidden>
Signed-off-by: Manuel Diewald <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>