<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux.git/arch, branch v4.19.59</title>
<subtitle>Clone of https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git</subtitle>
<link rel='alternate' type='text/html' href='https://git.exis.tech/linux.git/'/>
<entry>
<title>MIPS: Remove superfluous check for __linux__</title>
<updated>2019-07-14T06:11:21+00:00</updated>
<author>
<name>Sean Young</name>
<email>sean@mess.org</email>
</author>
<published>2018-11-16T16:09:39+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/linux.git/commit/?id=cc396afa1959f8224a8289d57d8dd3dc9a3a745d'/>
<id>cc396afa1959f8224a8289d57d8dd3dc9a3a745d</id>
<content type='text'>
commit 1287533d3d95d5ad8b02773733044500b1be06bc upstream.

When building BPF code using "clang -target bpf -c", clang does not
define __linux__.

To build BPF IR decoders the include linux/lirc.h is needed which
includes linux/types.h. Currently this workaround is needed:

https://git.linuxtv.org/v4l-utils.git/commit/?id=dd3ff81f58c4e1e6f33765dc61ad33c48ae6bb07

This check might otherwise be useful to stop users from using a non-linux
compiler, but if you're doing that you are going to have a lot more
trouble anyway.

Signed-off-by: Sean Young &lt;sean@mess.org&gt;
Signed-off-by: Paul Burton &lt;paul.burton@mips.com&gt;
Patchwork: https://patchwork.linux-mips.org/patch/21149/
Cc: Ralf Baechle &lt;ralf@linux-mips.org&gt;
Cc: James Hogan &lt;jhogan@kernel.org&gt;
Cc: linux-mips@linux-mips.org
Cc: linux-kernel@vger.kernel.org
Cc: Hauke Mehrtens &lt;hauke@hauke-m.de&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
commit 1287533d3d95d5ad8b02773733044500b1be06bc upstream.

When building BPF code using "clang -target bpf -c", clang does not
define __linux__.

To build BPF IR decoders the include linux/lirc.h is needed which
includes linux/types.h. Currently this workaround is needed:

https://git.linuxtv.org/v4l-utils.git/commit/?id=dd3ff81f58c4e1e6f33765dc61ad33c48ae6bb07

This check might otherwise be useful to stop users from using a non-linux
compiler, but if you're doing that you are going to have a lot more
trouble anyway.

Signed-off-by: Sean Young &lt;sean@mess.org&gt;
Signed-off-by: Paul Burton &lt;paul.burton@mips.com&gt;
Patchwork: https://patchwork.linux-mips.org/patch/21149/
Cc: Ralf Baechle &lt;ralf@linux-mips.org&gt;
Cc: James Hogan &lt;jhogan@kernel.org&gt;
Cc: linux-mips@linux-mips.org
Cc: linux-kernel@vger.kernel.org
Cc: Hauke Mehrtens &lt;hauke@hauke-m.de&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>x86/tls: Fix possible spectre-v1 in do_get_thread_area()</title>
<updated>2019-07-14T06:11:17+00:00</updated>
<author>
<name>Dianzhang Chen</name>
<email>dianzhangchen0@gmail.com</email>
</author>
<published>2019-06-26T04:50:30+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/linux.git/commit/?id=bd9604022eb36742cca4feb02e7d3d50a49f0993'/>
<id>bd9604022eb36742cca4feb02e7d3d50a49f0993</id>
<content type='text'>
commit 993773d11d45c90cb1c6481c2638c3d9f092ea5b upstream.

The index to access the threads tls array is controlled by userspace
via syscall: sys_ptrace(), hence leading to a potential exploitation
of the Spectre variant 1 vulnerability.

The index can be controlled from:
        ptrace -&gt; arch_ptrace -&gt; do_get_thread_area.

Fix this by sanitizing the user supplied index before using it to access
the p-&gt;thread.tls_array.

Signed-off-by: Dianzhang Chen &lt;dianzhangchen0@gmail.com&gt;
Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;
Cc: bp@alien8.de
Cc: hpa@zytor.com
Cc: stable@vger.kernel.org
Link: https://lkml.kernel.org/r/1561524630-3642-1-git-send-email-dianzhangchen0@gmail.com
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
commit 993773d11d45c90cb1c6481c2638c3d9f092ea5b upstream.

The index to access the threads tls array is controlled by userspace
via syscall: sys_ptrace(), hence leading to a potential exploitation
of the Spectre variant 1 vulnerability.

The index can be controlled from:
        ptrace -&gt; arch_ptrace -&gt; do_get_thread_area.

Fix this by sanitizing the user supplied index before using it to access
the p-&gt;thread.tls_array.

Signed-off-by: Dianzhang Chen &lt;dianzhangchen0@gmail.com&gt;
Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;
Cc: bp@alien8.de
Cc: hpa@zytor.com
Cc: stable@vger.kernel.org
Link: https://lkml.kernel.org/r/1561524630-3642-1-git-send-email-dianzhangchen0@gmail.com
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()</title>
<updated>2019-07-14T06:11:17+00:00</updated>
<author>
<name>Dianzhang Chen</name>
<email>dianzhangchen0@gmail.com</email>
</author>
<published>2019-06-25T15:30:17+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/linux.git/commit/?id=68ff28291a4f52861542f1387fe1d5b9cebd3851'/>
<id>68ff28291a4f52861542f1387fe1d5b9cebd3851</id>
<content type='text'>
commit 31a2fbb390fee4231281b939e1979e810f945415 upstream.

The index to access the threads ptrace_bps is controlled by userspace via
syscall: sys_ptrace(), hence leading to a potential exploitation of the
Spectre variant 1 vulnerability.

The index can be controlled from:
    ptrace -&gt; arch_ptrace -&gt; ptrace_get_debugreg.

Fix this by sanitizing the user supplied index before using it access
thread-&gt;ptrace_bps.

Signed-off-by: Dianzhang Chen &lt;dianzhangchen0@gmail.com&gt;
Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;
Cc: bp@alien8.de
Cc: hpa@zytor.com
Cc: stable@vger.kernel.org
Link: https://lkml.kernel.org/r/1561476617-3759-1-git-send-email-dianzhangchen0@gmail.com
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
commit 31a2fbb390fee4231281b939e1979e810f945415 upstream.

The index to access the threads ptrace_bps is controlled by userspace via
syscall: sys_ptrace(), hence leading to a potential exploitation of the
Spectre variant 1 vulnerability.

The index can be controlled from:
    ptrace -&gt; arch_ptrace -&gt; ptrace_get_debugreg.

Fix this by sanitizing the user supplied index before using it access
thread-&gt;ptrace_bps.

Signed-off-by: Dianzhang Chen &lt;dianzhangchen0@gmail.com&gt;
Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;
Cc: bp@alien8.de
Cc: hpa@zytor.com
Cc: stable@vger.kernel.org
Link: https://lkml.kernel.org/r/1561476617-3759-1-git-send-email-dianzhangchen0@gmail.com
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</pre>
</div>
</content>
</entry>
<entry>
<title>bpf, x64: fix stack layout of JITed bpf code</title>
<updated>2019-07-14T06:11:12+00:00</updated>
<author>
<name>Alexei Starovoitov</name>
<email>ast@kernel.org</email>
</author>
<published>2019-06-14T22:43:28+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/linux.git/commit/?id=292ba5b1faf4eb44e2f72c8d1651040bc98a1949'/>
<id>292ba5b1faf4eb44e2f72c8d1651040bc98a1949</id>
<content type='text'>
[ Upstream commit fe8d9571dc50232b569242fac7ea6332a654f186 ]

Since commit 177366bf7ceb the %rbp stopped pointing to %rbp of the
previous stack frame. That broke frame pointer based stack unwinding.
This commit is a partial revert of it.
Note that the location of tail_call_cnt is fixed, since the verifier
enforces MAX_BPF_STACK stack size for programs with tail calls.

Fixes: 177366bf7ceb ("bpf: change x86 JITed program stack layout")
Signed-off-by: Alexei Starovoitov &lt;ast@kernel.org&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
[ Upstream commit fe8d9571dc50232b569242fac7ea6332a654f186 ]

Since commit 177366bf7ceb the %rbp stopped pointing to %rbp of the
previous stack frame. That broke frame pointer based stack unwinding.
This commit is a partial revert of it.
Note that the location of tail_call_cnt is fixed, since the verifier
enforces MAX_BPF_STACK stack size for programs with tail calls.

Fixes: 177366bf7ceb ("bpf: change x86 JITed program stack layout")
Signed-off-by: Alexei Starovoitov &lt;ast@kernel.org&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>ARM: davinci: da8xx: specify dma_coherent_mask for lcdc</title>
<updated>2019-07-14T06:11:10+00:00</updated>
<author>
<name>Bartosz Golaszewski</name>
<email>bgolaszewski@baylibre.com</email>
</author>
<published>2019-06-07T14:33:50+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/linux.git/commit/?id=9c2dd6d4713173c7d50f666a50a0cfa24a9add94'/>
<id>9c2dd6d4713173c7d50f666a50a0cfa24a9add94</id>
<content type='text'>
[ Upstream commit 68f2515bb31a664ba3e2bc1eb78dd9f529b10067 ]

The lcdc device is missing the dma_coherent_mask definition causing the
following warning on da850-evm:

da8xx_lcdc da8xx_lcdc.0: found Sharp_LK043T1DG01 panel
------------[ cut here ]------------
WARNING: CPU: 0 PID: 1 at kernel/dma/mapping.c:247 dma_alloc_attrs+0xc8/0x110
Modules linked in:
CPU: 0 PID: 1 Comm: swapper Not tainted 5.2.0-rc3-00077-g16d72dd4891f #18
Hardware name: DaVinci DA850/OMAP-L138/AM18x EVM
[&lt;c000fce8&gt;] (unwind_backtrace) from [&lt;c000d900&gt;] (show_stack+0x10/0x14)
[&lt;c000d900&gt;] (show_stack) from [&lt;c001a4f8&gt;] (__warn+0xec/0x114)
[&lt;c001a4f8&gt;] (__warn) from [&lt;c001a634&gt;] (warn_slowpath_null+0x3c/0x48)
[&lt;c001a634&gt;] (warn_slowpath_null) from [&lt;c0065860&gt;] (dma_alloc_attrs+0xc8/0x110)
[&lt;c0065860&gt;] (dma_alloc_attrs) from [&lt;c02820f8&gt;] (fb_probe+0x228/0x5a8)
[&lt;c02820f8&gt;] (fb_probe) from [&lt;c02d3e9c&gt;] (platform_drv_probe+0x48/0x9c)
[&lt;c02d3e9c&gt;] (platform_drv_probe) from [&lt;c02d221c&gt;] (really_probe+0x1d8/0x2d4)
[&lt;c02d221c&gt;] (really_probe) from [&lt;c02d2474&gt;] (driver_probe_device+0x5c/0x168)
[&lt;c02d2474&gt;] (driver_probe_device) from [&lt;c02d2728&gt;] (device_driver_attach+0x58/0x60)
[&lt;c02d2728&gt;] (device_driver_attach) from [&lt;c02d27b0&gt;] (__driver_attach+0x80/0xbc)
[&lt;c02d27b0&gt;] (__driver_attach) from [&lt;c02d047c&gt;] (bus_for_each_dev+0x64/0xb4)
[&lt;c02d047c&gt;] (bus_for_each_dev) from [&lt;c02d1590&gt;] (bus_add_driver+0xe4/0x1d8)
[&lt;c02d1590&gt;] (bus_add_driver) from [&lt;c02d301c&gt;] (driver_register+0x78/0x10c)
[&lt;c02d301c&gt;] (driver_register) from [&lt;c000a5c0&gt;] (do_one_initcall+0x48/0x1bc)
[&lt;c000a5c0&gt;] (do_one_initcall) from [&lt;c05cae6c&gt;] (kernel_init_freeable+0x10c/0x1d8)
[&lt;c05cae6c&gt;] (kernel_init_freeable) from [&lt;c048a000&gt;] (kernel_init+0x8/0xf4)
[&lt;c048a000&gt;] (kernel_init) from [&lt;c00090e0&gt;] (ret_from_fork+0x14/0x34)
Exception stack(0xc6837fb0 to 0xc6837ff8)
7fa0:                                     00000000 00000000 00000000 00000000
7fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
7fe0: 00000000 00000000 00000000 00000000 00000013 00000000
---[ end trace 8a8073511be81dd2 ]---

Add a 32-bit mask to the platform device's definition.

Signed-off-by: Bartosz Golaszewski &lt;bgolaszewski@baylibre.com&gt;

Signed-off-by: Sekhar Nori &lt;nsekhar@ti.com&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
[ Upstream commit 68f2515bb31a664ba3e2bc1eb78dd9f529b10067 ]

The lcdc device is missing the dma_coherent_mask definition causing the
following warning on da850-evm:

da8xx_lcdc da8xx_lcdc.0: found Sharp_LK043T1DG01 panel
------------[ cut here ]------------
WARNING: CPU: 0 PID: 1 at kernel/dma/mapping.c:247 dma_alloc_attrs+0xc8/0x110
Modules linked in:
CPU: 0 PID: 1 Comm: swapper Not tainted 5.2.0-rc3-00077-g16d72dd4891f #18
Hardware name: DaVinci DA850/OMAP-L138/AM18x EVM
[&lt;c000fce8&gt;] (unwind_backtrace) from [&lt;c000d900&gt;] (show_stack+0x10/0x14)
[&lt;c000d900&gt;] (show_stack) from [&lt;c001a4f8&gt;] (__warn+0xec/0x114)
[&lt;c001a4f8&gt;] (__warn) from [&lt;c001a634&gt;] (warn_slowpath_null+0x3c/0x48)
[&lt;c001a634&gt;] (warn_slowpath_null) from [&lt;c0065860&gt;] (dma_alloc_attrs+0xc8/0x110)
[&lt;c0065860&gt;] (dma_alloc_attrs) from [&lt;c02820f8&gt;] (fb_probe+0x228/0x5a8)
[&lt;c02820f8&gt;] (fb_probe) from [&lt;c02d3e9c&gt;] (platform_drv_probe+0x48/0x9c)
[&lt;c02d3e9c&gt;] (platform_drv_probe) from [&lt;c02d221c&gt;] (really_probe+0x1d8/0x2d4)
[&lt;c02d221c&gt;] (really_probe) from [&lt;c02d2474&gt;] (driver_probe_device+0x5c/0x168)
[&lt;c02d2474&gt;] (driver_probe_device) from [&lt;c02d2728&gt;] (device_driver_attach+0x58/0x60)
[&lt;c02d2728&gt;] (device_driver_attach) from [&lt;c02d27b0&gt;] (__driver_attach+0x80/0xbc)
[&lt;c02d27b0&gt;] (__driver_attach) from [&lt;c02d047c&gt;] (bus_for_each_dev+0x64/0xb4)
[&lt;c02d047c&gt;] (bus_for_each_dev) from [&lt;c02d1590&gt;] (bus_add_driver+0xe4/0x1d8)
[&lt;c02d1590&gt;] (bus_add_driver) from [&lt;c02d301c&gt;] (driver_register+0x78/0x10c)
[&lt;c02d301c&gt;] (driver_register) from [&lt;c000a5c0&gt;] (do_one_initcall+0x48/0x1bc)
[&lt;c000a5c0&gt;] (do_one_initcall) from [&lt;c05cae6c&gt;] (kernel_init_freeable+0x10c/0x1d8)
[&lt;c05cae6c&gt;] (kernel_init_freeable) from [&lt;c048a000&gt;] (kernel_init+0x8/0xf4)
[&lt;c048a000&gt;] (kernel_init) from [&lt;c00090e0&gt;] (ret_from_fork+0x14/0x34)
Exception stack(0xc6837fb0 to 0xc6837ff8)
7fa0:                                     00000000 00000000 00000000 00000000
7fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
7fe0: 00000000 00000000 00000000 00000000 00000013 00000000
---[ end trace 8a8073511be81dd2 ]---

Add a 32-bit mask to the platform device's definition.

Signed-off-by: Bartosz Golaszewski &lt;bgolaszewski@baylibre.com&gt;

Signed-off-by: Sekhar Nori &lt;nsekhar@ti.com&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>ARM: davinci: da850-evm: call regulator_has_full_constraints()</title>
<updated>2019-07-14T06:11:10+00:00</updated>
<author>
<name>Bartosz Golaszewski</name>
<email>bgolaszewski@baylibre.com</email>
</author>
<published>2019-06-07T09:02:01+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/linux.git/commit/?id=3bbcc8b9ad37bcb1feee4e8e7f3ee4147e55b261'/>
<id>3bbcc8b9ad37bcb1feee4e8e7f3ee4147e55b261</id>
<content type='text'>
[ Upstream commit 0c0c9b5753cd04601b17de09da1ed2885a3b42fe ]

The BB expander at 0x21 i2c bus 1 fails to probe on da850-evm because
the board doesn't set has_full_constraints to true in the regulator
API.

Call regulator_has_full_constraints() at the end of board registration
just like we do in da850-lcdk and da830-evm.

Reviewed-by: Linus Walleij &lt;linus.walleij@linaro.org&gt;
Signed-off-by: Bartosz Golaszewski &lt;bgolaszewski@baylibre.com&gt;
Signed-off-by: Sekhar Nori &lt;nsekhar@ti.com&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
[ Upstream commit 0c0c9b5753cd04601b17de09da1ed2885a3b42fe ]

The BB expander at 0x21 i2c bus 1 fails to probe on da850-evm because
the board doesn't set has_full_constraints to true in the regulator
API.

Call regulator_has_full_constraints() at the end of board registration
just like we do in da850-lcdk and da830-evm.

Reviewed-by: Linus Walleij &lt;linus.walleij@linaro.org&gt;
Signed-off-by: Bartosz Golaszewski &lt;bgolaszewski@baylibre.com&gt;
Signed-off-by: Sekhar Nori &lt;nsekhar@ti.com&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>riscv: Fix udelay in RV32.</title>
<updated>2019-07-14T06:11:09+00:00</updated>
<author>
<name>Nick Hu</name>
<email>nickhu@andestech.com</email>
</author>
<published>2019-05-30T07:01:17+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/linux.git/commit/?id=b71f312e9bf7eb2ae09c927773c319dbb53f1ab5'/>
<id>b71f312e9bf7eb2ae09c927773c319dbb53f1ab5</id>
<content type='text'>
[ Upstream commit d0e1f2110a5eeb6e410b2dd37d98bc5b30da7bc7 ]

In RV32, udelay would delay the wrong cycle. When it shifts right
"UDELAY_SHIFT" bits, it either delays 0 cycle or 1 cycle. It only works
correctly in RV64. Because the 'ucycles' always needs to be 64 bits
variable.

Signed-off-by: Nick Hu &lt;nickhu@andestech.com&gt;
Reviewed-by: Palmer Dabbelt &lt;palmer@sifive.com&gt;
[paul.walmsley@sifive.com: fixed minor spelling error]
Signed-off-by: Paul Walmsley &lt;paul.walmsley@sifive.com&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
[ Upstream commit d0e1f2110a5eeb6e410b2dd37d98bc5b30da7bc7 ]

In RV32, udelay would delay the wrong cycle. When it shifts right
"UDELAY_SHIFT" bits, it either delays 0 cycle or 1 cycle. It only works
correctly in RV64. Because the 'ucycles' always needs to be 64 bits
variable.

Signed-off-by: Nick Hu &lt;nickhu@andestech.com&gt;
Reviewed-by: Palmer Dabbelt &lt;palmer@sifive.com&gt;
[paul.walmsley@sifive.com: fixed minor spelling error]
Signed-off-by: Paul Walmsley &lt;paul.walmsley@sifive.com&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>s390/boot: disable address-of-packed-member warning</title>
<updated>2019-07-14T06:11:09+00:00</updated>
<author>
<name>Heiko Carstens</name>
<email>heiko.carstens@de.ibm.com</email>
</author>
<published>2019-06-04T11:10:51+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/linux.git/commit/?id=c0b12abd18284160b66bca4b6cee4ccfd6e944cf'/>
<id>c0b12abd18284160b66bca4b6cee4ccfd6e944cf</id>
<content type='text'>
[ Upstream commit f9364df30420987e77599c4789ec0065c609a507 ]

Get rid of gcc9 warnings like this:

arch/s390/boot/ipl_report.c: In function 'find_bootdata_space':
arch/s390/boot/ipl_report.c:42:26: warning: taking address of packed member of 'struct ipl_rb_components' may result in an unaligned pointer value [-Waddress-of-packed-member]
   42 |  for_each_rb_entry(comp, comps)
      |                          ^~~~~

This is effectively the s390 variant of commit 20c6c1890455
("x86/boot: Disable the address-of-packed-member compiler warning").

Reviewed-by: Vasily Gorbik &lt;gor@linux.ibm.com&gt;
Signed-off-by: Heiko Carstens &lt;heiko.carstens@de.ibm.com&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
[ Upstream commit f9364df30420987e77599c4789ec0065c609a507 ]

Get rid of gcc9 warnings like this:

arch/s390/boot/ipl_report.c: In function 'find_bootdata_space':
arch/s390/boot/ipl_report.c:42:26: warning: taking address of packed member of 'struct ipl_rb_components' may result in an unaligned pointer value [-Waddress-of-packed-member]
   42 |  for_each_rb_entry(comp, comps)
      |                          ^~~~~

This is effectively the s390 variant of commit 20c6c1890455
("x86/boot: Disable the address-of-packed-member compiler warning").

Reviewed-by: Vasily Gorbik &lt;gor@linux.ibm.com&gt;
Signed-off-by: Heiko Carstens &lt;heiko.carstens@de.ibm.com&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>ARM: dts: am335x phytec boards: Fix cd-gpios active level</title>
<updated>2019-07-14T06:11:09+00:00</updated>
<author>
<name>Teresa Remmet</name>
<email>t.remmet@phytec.de</email>
</author>
<published>2019-05-24T13:19:57+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/linux.git/commit/?id=e71daed5176f909112fe1489795618f9b86e590a'/>
<id>e71daed5176f909112fe1489795618f9b86e590a</id>
<content type='text'>
[ Upstream commit 8a0098c05a272c9a68f6885e09755755b612459c ]

Active level of the mmc1 cd gpio needs to be low instead of high.
Fix PCM-953 and phyBOARD-WEGA.

Signed-off-by: Teresa Remmet &lt;t.remmet@phytec.de&gt;
Signed-off-by: Tony Lindgren &lt;tony@atomide.com&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
[ Upstream commit 8a0098c05a272c9a68f6885e09755755b612459c ]

Active level of the mmc1 cd gpio needs to be low instead of high.
Fix PCM-953 and phyBOARD-WEGA.

Signed-off-by: Teresa Remmet &lt;t.remmet@phytec.de&gt;
Signed-off-by: Tony Lindgren &lt;tony@atomide.com&gt;
Signed-off-by: Sasha Levin &lt;sashal@kernel.org&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>MIPS: have "plain" make calls build dtbs for selected platforms</title>
<updated>2019-07-10T07:53:48+00:00</updated>
<author>
<name>Cedric Hombourger</name>
<email>Cedric_Hombourger@mentor.com</email>
</author>
<published>2019-06-13T08:52:50+00:00</published>
<link rel='alternate' type='text/html' href='https://git.exis.tech/linux.git/commit/?id=870de149950551a3f9735f359b6440e69ab7ccf9'/>
<id>870de149950551a3f9735f359b6440e69ab7ccf9</id>
<content type='text'>
commit 637dfa0fad6d91a9a709dc70549a6d20fa77f615 upstream.

scripts/package/builddeb calls "make dtbs_install" after executing
a plain make (i.e. no build targets specified). It will fail if dtbs
were not built beforehand. Match the arm64 architecture where DTBs get
built by the "all" target.

Signed-off-by: Cedric Hombourger &lt;Cedric_Hombourger@mentor.com&gt;
[paul.burton@mips.com: s/builddep/builddeb]
Signed-off-by: Paul Burton &lt;paul.burton@mips.com&gt;
Cc: linux-mips@vger.kernel.org
Cc: stable@vger.kernel.org # v4.1+
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
commit 637dfa0fad6d91a9a709dc70549a6d20fa77f615 upstream.

scripts/package/builddeb calls "make dtbs_install" after executing
a plain make (i.e. no build targets specified). It will fail if dtbs
were not built beforehand. Match the arm64 architecture where DTBs get
built by the "all" target.

Signed-off-by: Cedric Hombourger &lt;Cedric_Hombourger@mentor.com&gt;
[paul.burton@mips.com: s/builddep/builddeb]
Signed-off-by: Paul Burton &lt;paul.burton@mips.com&gt;
Cc: linux-mips@vger.kernel.org
Cc: stable@vger.kernel.org # v4.1+
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</pre>
</div>
</content>
</entry>
</feed>
