Re: [RFC PATCH v3 3/5] KVM: x86: Add notifications for Heki policy configuration and violation

2024-05-15 Thread Sean Christopherson
On Tue, May 14, 2024, Mickaël Salaün wrote: > On Fri, May 10, 2024 at 10:07:00AM +, Nicolas Saenz Julienne wrote: > > Development happens > > https://github.com/vianpl/{linux,qemu,kvm-unit-tests} and the vsm-next > > branch, but I'd advice against looking into it until we add some order > > to

Re: [PATCH 05/12] dmaengine: Add STM32 DMA3 support

2024-05-15 Thread Frank Li
On Tue, Apr 23, 2024 at 02:32:55PM +0200, Amelie Delaunay wrote: > STM32 DMA3 driver supports the 3 hardware configurations of the STM32 DMA3 > controller: > - LPDMA (Low Power): 4 channels, no FIFO > - GPDMA (General Purpose): 16 channels, FIFO from 8 to 32 bytes > - HPDMA (High Performance): 16

Re: [PATCH 05/12] dmaengine: Add STM32 DMA3 support

2024-05-15 Thread Frank Li
On Mon, May 13, 2024 at 11:21:18AM +0200, Amelie Delaunay wrote: > Hi Frank, > > On 5/7/24 22:26, Frank Li wrote: > > On Tue, May 07, 2024 at 01:33:31PM +0200, Amelie Delaunay wrote: > > > Hi Vinod, > > > > > > Thanks for the review. > > > > > > On 5/4/24 14:40, Vinod Koul wrote: > > > > On

Re: [RFC] Mitigating unexpected arithmetic overflow

2024-05-15 Thread Justin Stitt
Hi Peter, On Wed, May 15, 2024 at 12:36 AM Peter Zijlstra wrote: > > On Wed, May 08, 2024 at 04:47:25PM -0700, Linus Torvalds wrote: > > For example, the most common case of overflow we've ever had has very > > much been array indexing. Now, sometimes that has actually been actual > > undefined

Re: [PATCH v2] fs: remove accidental overflow during wraparound check

2024-05-15 Thread Christian Brauner
On Mon, 13 May 2024 17:50:30 +, Justin Stitt wrote: > Running syzkaller with the newly enabled signed integer overflow > sanitizer produces this report: > > [ 195.401651] [ cut here ] > [ 195.404808] UBSAN: signed-integer-overflow in ../fs/open.c:321:15 > [

Re: [linux-next:master] [mm/slab] 7bd230a266: WARNING:at_mm/util.c:#kvmalloc_node_noprof

2024-05-15 Thread Suren Baghdasaryan
fs > 39: 48 rex.W > 3a: 2b .byte 0x2b > 3b: 04 25 add$0x25,%al > 3d: 28 00 sub%al,(%rax) > ... > > Code starting with the faulting instruction > ==

Re: [PATCH v2] scsi: sr: fix unintentional arithmetic wraparound

2024-05-15 Thread Martin K. Petersen
Justin, > Running syzkaller with the newly reintroduced signed integer overflow > sanitizer produces this report: > > [ 65.194362] [ cut here ] > [ 65.197752] UBSAN: signed-integer-overflow in > ../drivers/scsi/sr_ioctl.c:436:9 > [ 65.203607] -2147483648 * 177

Re: [RFC] Mitigating unexpected arithmetic overflow

2024-05-15 Thread Peter Zijlstra
On Wed, May 08, 2024 at 04:47:25PM -0700, Linus Torvalds wrote: > Now, another thing to do might be to treat assignments (and again, > implicit casts) to 'size_t' specially. In most compilers (certainly in > gcc), "size_t" is a special type. > > Now, in the kernel, we don't actually use

Re: [RFC] Mitigating unexpected arithmetic overflow

2024-05-15 Thread Peter Zijlstra
On Wed, May 08, 2024 at 04:47:25PM -0700, Linus Torvalds wrote: > For example, the most common case of overflow we've ever had has very > much been array indexing. Now, sometimes that has actually been actual > undefined behavior, because it's been overflow in signed variables, > and those are

Re: [PATCH] ubsan: Restore dependency on ARCH_HAS_UBSAN

2024-05-15 Thread Marco Elver
On Wed, 15 May 2024 at 01:38, Kees Cook wrote: > > While removing CONFIG_UBSAN_SANITIZE_ALL, ARCH_HAS_UBSAN wasn't correctly > depended on. Restore this, as we do not want to attempt UBSAN builds > unless it's actually been tested on a given architecture. > > Reported-by: Masahiro Yamada >