On Mon, Aug 22, 2016 at 09:19:36PM -0400, Greg Kroah-Hartman wrote:
> On Tue, Aug 23, 2016 at 08:36:58AM +0800, kbuild test robot wrote:
> > drivers/staging/i4l/icn/icn.c:813:11-18: WARNING opportunity for memdup_user
> >
> > Use memdup_user rather than duplicating its implementation
> > This is
On Tue, Aug 23, 2016 at 08:19:46AM +0800, Ming-Chia Chung wrote:
> On Mon, Aug 22, 2016 at 10:51:27PM +0530, Sudip Mukherjee wrote:
> > On Tue, Aug 23, 2016 at 12:54:17AM +0800, MingChia Chung wrote:
> > > This patch fixes a minor checkpatch warnings:
> > >
> > > "WARNING: Block comments use a
'completetion_status' is used in some places, e.g.,
hv_pci_protocol_negotiation(), so we should make sure it's initialized in
error case too, though the error is unlikely here.
I didn't get a real issue.
Cc: Jake Oshins
Cc: K. Y. Srinivasan
Cc: Haiyang Zhang
Cc: Vitaly Kuznetsov
Signed-off-b
I happened to find this when reading the code.
I didn't get a real issue however.
Cc: Jake Oshins
Cc: K. Y. Srinivasan
Cc: Haiyang Zhang
Cc: Vitaly Kuznetsov
Signed-off-by: Dexuan Cui
---
drivers/pci/host/pci-hyperv.c | 6 --
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a
The member is not used.
Cc: Jake Oshins
Cc: K. Y. Srinivasan
Cc: Haiyang Zhang
Cc: Vitaly Kuznetsov
Signed-off-by: Dexuan Cui
---
drivers/pci/host/pci-hyperv.c | 1 -
1 file changed, 1 deletion(-)
diff --git a/drivers/pci/host/pci-hyperv.c b/drivers/pci/host/pci-hyperv.c
index cdbadea5..ae
The 2 structs can use a zero-length array here, because dynamic memory of
the correct size is allocated in hv_pci_devices_present() and we don't
need this extra element.
No functional change.
Cc: Jake Oshins
Cc: K. Y. Srinivasan
Cc: Haiyang Zhang
Cc: Vitaly Kuznetsov
Signed-off-by: Dexuan Cu
And, rename struct pci_message's field "message_type" to "type.
This makes the code more readable.
No functionality change.
Cc: Jake Oshins
Cc: K. Y. Srinivasan
Cc: Haiyang Zhang
Cc: Vitaly Kuznetsov
Signed-off-by: Dexuan Cui
---
drivers/pci/host/pci-hyperv.c | 42
1. use zero-length array to make the code more readable.
2. remove an unused struct member.
3. small error handling improvement to some error cases.
Dexuan Cui (5):
PCI: hv: use zero-length message in struct pci_packet
PCI: hv: use pci_function_description[0] in struct definitions
PCI: hv:
> From: devel [mailto:driverdev-devel-boun...@linuxdriverproject.org] On Behalf
> Of sthem...@exchange.microsoft.com
> Sent: Tuesday, August 23, 2016 1:33
> To: KY Srinivasan ; Haiyang Zhang
>
> Cc: de...@linuxdriverproject.org; Stephen Hemminger
>
> Subject: [PATCH 2/2] hv_pci: make hv_irq funct
> From: devel [mailto:driverdev-devel-boun...@linuxdriverproject.org] On Behalf
> Of sthem...@exchange.microsoft.com
> Sent: Tuesday, August 23, 2016 1:33
> To: KY Srinivasan ; Haiyang Zhang
>
> Cc: de...@linuxdriverproject.org; Stephen Hemminger
>
> Subject: [PATCH 0/2] hyperv: minor cleanups
>
> From: devel [mailto:driverdev-devel-boun...@linuxdriverproject.org] On Behalf
> Of sthem...@exchange.microsoft.com
> Sent: Tuesday, August 23, 2016 1:33
> To: KY Srinivasan ; Haiyang Zhang
>
> Cc: de...@linuxdriverproject.org; Stephen Hemminger
>
> Subject: [PATCH 1/2] hyperv: make mmio resourc
fix checkpatch.pl warning about 'Statements should start on a
tabstop'
Signed-off-by: Clifton Barnes
---
drivers/staging/iio/accel/sca3000_core.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/staging/iio/accel/sca3000_core.c
b/drivers/staging/iio/accel/sca3000_core
On Tue, Aug 23, 2016 at 08:36:58AM +0800, kbuild test robot wrote:
> drivers/staging/i4l/icn/icn.c:813:11-18: WARNING opportunity for memdup_user
>
> Use memdup_user rather than duplicating its implementation
> This is a little bit restricted to reduce false positives
>
> Generated by: scripts/
tree: https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/staging.git
staging-testing
head: f5a9a15f8fd4168e415e94f5dce367f3cef08e03
commit: ee05e5f7113ea0b0db7eff7011a534c92fec2648 [251/347] staging: i4l: icn:
donot assign in if statement
coccinelle warnings: (new ones prefixed by >>)
drivers/staging/i4l/icn/icn.c:813:11-18: WARNING opportunity for memdup_user
Use memdup_user rather than duplicating its implementation
This is a little bit restricted to reduce false positives
Generated by: scripts/coccinelle/api/memdup_user.cocci
CC: Sudip Mukherjee
Signed-off-by: Fengguang
Сo6ерeм qля Ваc по инmeрнет базу qанныx пoтeнциальных клиентов gля Вaшeго
Бизнecа! B базe бygym всe koнmaктные gaнные нeо6xодuмые gля мacсoвoй пpoдажи
Bашuх товарoв и уcлуr. Пo Вaшему зanросу пpuшлем примeр и nодрo6нyю инфoрмацию.
Если uнmeресно зaпpocuтe подрoбноcmи сeйчac МАЙЛ: kimmideze-5...@
On Mon, Aug 22, 2016 at 10:51:27PM +0530, Sudip Mukherjee wrote:
> On Tue, Aug 23, 2016 at 12:54:17AM +0800, MingChia Chung wrote:
> > This patch fixes a minor checkpatch warnings:
> >
> > "WARNING: Block comments use a trailing */ on a separate line"
> >
> > Signed-off-by: Ming-Chia Chung
The command is used for encrypting guest memory region.
For more information see [1], section 6.2
[1] http://support.amd.com/TechDocs/55766_SEV-KM%20API_Spec.pdf
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 126
1 file changed, 126
From: Tom Lendacky
When SEV is active the virtual machine cannot set the MSR for SME, so
don't set the trampoline flag for SME.
Signed-off-by: Tom Lendacky
---
arch/x86/realmode/init.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/x86/realmode/init.c b/arch/x86/re
The patch adds initial support required for Secure Encrypted
Virtualization (SEV) guest management API's.
ASID management:
- Reserve asid range for SEV guest, SEV asid range is obtained
through CPUID Fn8000_001f[ECX]. A non-SEV guest can use any
asid outside the SEV asid range.
- SEV guest
In current implementation, asid allocation starts from 1, this patch
adds a min_asid variable in svm_vcpu structure to allow starting asid
from something other than 1.
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c |4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/ar
From: Tom Lendacky
When Secure Encrypted Virtualization is active instruction fetches are
always interpreted as being from encrypted memory so the trampoline area
must remain encrypted when SEV is active.
Signed-off-by: Tom Lendacky
---
arch/x86/realmode/init.c |9 ++---
1 file changed
From: Tom Lendacky
Signed-off-by: Tom Lendacky
---
arch/x86/kernel/acpi/boot.c |4 ++--
arch/x86/kernel/mpparse.c | 10 +-
drivers/sfi/sfi_core.c |6 +++---
3 files changed, 10 insertions(+), 10 deletions(-)
diff --git a/arch/x86/kernel/acpi/boot.c b/arch/x86/kernel/ac
From: Tom Lendacky
DMA must be performed to memory that is not mapped encrypted when running
with SEV active. So if SEV is active, do not return the encryption mask
to the IOMMU.
Signed-off-by: Tom Lendacky
---
arch/x86/mm/mem_encrypt.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
From: Tom Lendacky
Define a new KVM cpu feature for Secure Encrypted Virtualization (SEV).
The kernel will check for the presence of this feature to determine if
it is running with SEV active.
Define the SEV enable bit for the VMCB control structure. The hypervisor
will use this bit to enable SE
From: Tom Lendacky
AMD hardware adds two additional bits to aid in nested page fault handling.
Bit 32 - NPF occurred while translating the guest's final physical address
Bit 33 - NPF occurred while translating the guest page tables
The guest page tables fault indicator can be used as an aid for
From: Tom Lendacky
When Secure Encrypted Virtualization (SEV) is active, BOOT data (such as
EFI related data) is encrypted and needs to be access as such. Update the
architecture override in early_memremap to keep the encryption attribute
when mapping this data.
Signed-off-by: Tom Lendacky
---
From: Tom Lendacky
DMA access to memory mapped as encrypted while SEV is active can not be
encrypted during device write or decrypted during device read. In order
for DMA to properly work when SEV is active, the swiotlb bounce buffers
must be used.
Signed-off-by: Tom Lendacky
---
arch/x86/mm/m
From: Tom Lendacky
Provide support for Secure Encyrpted Virtualization (SEV). This initial
support defines the SEV active flag in order for the kernel to determine
if it is running with SEV active or not.
Signed-off-by: Tom Lendacky
---
arch/x86/include/asm/mem_encrypt.h |3 +++
arch/x86/k
From: Tom Lendacky
Currently the nested_ctl variable in the vmcb_control_area structure is
used to indicate nested paging support. The nested paging support field
is actually defined as bit 0 of the this field. In order to support a new
feature flag the usage of the nested_ctl and nested paging s
The command decrypts a page of guest memory for debugging purposes.
For more information see [1], section 7.1
[1] http://support.amd.com/TechDocs/55766_SEV-KM%20API_Spec.pdf
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 83
1 file
The command encrypts a region of guest memory for debugging purposes.
For more information see [1], section 7.2
[1] http://support.amd.com/TechDocs/55766_SEV-KM%20API_Spec.pdf
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 100
1 fil
From: Tom Lendacky
Early in the boot process, add a check to determine if the kernel is
running with Secure Encrypted Virtualization (SEV) enabled. If active,
the kernel will perform steps necessary to insure the proper kernel
initialization process is performed.
Signed-off-by: Tom Lendacky
---
The command initate the process to launch this guest into
SEV-enabled mode.
For more information on command structure see [1], section 6.1
[1] http://support.amd.com/TechDocs/55766_SEV-KM%20API_Spec.pdf
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 212
The driver to communicate with Secure Encrypted Virtualization (SEV)
firmware running within the AMD secure processor providing a secure key
management interface for SEV guests.
Signed-off-by: Tom Lendacky
Signed-off-by: Brijesh Singh
---
drivers/crypto/Kconfig | 11 +
drivers/crypto/Ma
The ioctl will be used by qemu to issue the Secure Encrypted
Virtualization (SEV) guest commands to transition a guest into
into SEV-enabled mode.
a typical usage:
struct kvm_sev_launch_start start;
struct kvm_sev_issue_cmd data;
data.cmd = KVM_SEV_LAUNCH_START;
data.opaque = &start;
ret = ioct
From: Tom Lendacky
Modify the SVM cpuid update function to indicate if Secure Encrypted
Virtualization (SEV) is active by setting the SEV KVM cpu features bit
if SEV is active. SEV is active if Secure Memory Encryption is active
in the host and the SEV_ENABLE bit of the VMCB is set.
Signed-off-
From: Tom Lendacky
Secure Encrypted Virtualization (SEV) does not support string I/O, so
unroll the string I/O operation into a loop operating on one element at
a time.
Signed-off-by: Tom Lendacky
---
arch/x86/include/asm/io.h | 26 ++
1 file changed, 22 insertions(+)
From: Tom Lendacky
EFI data is encrypted when the kernel is run under SEV. Update the
page table references to be sure the EFI memory areas are accessed
encrypted.
Signed-off-by: Tom Lendacky
---
arch/x86/platform/efi/efi_64.c | 14 --
1 file changed, 12 insertions(+), 2 deletion
From: Tom Lendacky
When running under SEV, some memory areas that were originally not
encrypted under SME are already encrypted. In these situations do not
attempt to encrypt them.
Signed-off-by: Tom Lendacky
---
arch/x86/kernel/head64.c |4 ++--
arch/x86/kernel/setup.c |7 ---
2
From: Tom Lendacky
When a guest causes a NPF which requires emulation, KVM sometimes walks
the guest page tables to translate the GVA to a GPA. This is unnecessary
most of the time on AMD hardware since the hardware provides the GPA in
EXITINFO2.
The only exception cases involve string operation
This RFC series provides support for AMD's new Secure Encrypted
Virtualization (SEV) feature. This RFC is build upon Secure Memory
Encryption (SME) RFC.
SEV is an extension to the AMD-V architecture which supports running
multiple VMs under the control of a hypervisor. When enabled, SEV
hardwa
From: Tom Lendacky
Update the I/O interception support to add the kvm_fast_pio_in function
to speed up the in instruction similar to the out instruction.
Signed-off-by: Tom Lendacky
---
arch/x86/include/asm/kvm_host.h |1 +
arch/x86/kvm/svm.c |5 +++--
arch/x86/kvm/x86.c
This RFC series provides support for AMD's new Secure Encrypted
Virtualization (SEV) feature. This RFC is build upon Secure Memory
Encryption (SME) RFC.
SEV is an extension to the AMD-V architecture which supports running
multiple VMs under the control of a hypervisor. When enabled, SEV
hardwa
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 23 +++
1 file changed, 23 insertions(+)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index 4af195d..88b8f89 100644
--- a/arch/x86/kvm/svm.c
+++ b/arch/x86/kvm/svm.c
@@ -5779,6 +5779,25 @@ err_1:
return r
The command is used for finializing the guest launch into SEV mode.
For more information see [1], section 6.3
[1] http://support.amd.com/TechDocs/55766_SEV-KM%20API_Spec.pdf
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 78
1 file
The command is used to query the SEV guest status.
For more information see [1], section 6.10
[1] http://support.amd.com/TechDocs/55766_SEV-KM%20API_Spec.pdf
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 41 +
1 file changed, 41 insertions(+)
On Mon, Aug 22, 2016 at 04:36:26PM -0400, Greg Kroah-Hartman wrote:
> On Mon, Aug 22, 2016 at 12:54:12PM -0400, Anson Jacob wrote:
> > *** BLURB HERE ***
>
> You forgot the blurb :)
>
Sorry about that. Uploaded a new patchset with blurb :)
___
devel mai
Fix checkpatch.pl warning for trailing */ on a separate line
Remove '+' postfix and '-' prefix from the start and end of block comments
Signed-off-by: Anson Jacob
---
drivers/staging/vt6655/rxtx.c | 41 -
1 file changed, 24 insertions(+), 17 deletions(-)
Fix checkpatch.pl warning for trailing */ on a separate line
Remove '+' postfix and '-' prefix from the start and end of block comments
Signed-off-by: Anson Jacob
---
drivers/staging/vt6655/rf.c | 19 ---
1 file changed, 12 insertions(+), 7 deletions(-)
diff --git a/drivers/stag
Fix checkpatch.pl warning for trailing */ on a separate line
Remove '+' postfix and '-' prefix from the start and end of block comments
Anson Jacob (2):
staging: vt6655: rf.c: Fix checkpatch warning
staging: vt6655: rxtx.c: Fix checkpatch warning
drivers/staging/vt6655/rf.c | 19 ++
On Mon, Aug 22, 2016 at 05:48:39PM +0100, James Simmons wrote:
>
> > On Mon, Aug 22, 2016 at 03:15:23PM +0800, kbuild test robot wrote:
> > > tree:
> > > https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/staging.git
> > > staging-testing
> > > head: f5a9a15f8fd4168e415e94f5dce367f3cef08
On Mon, Aug 22, 2016 at 10:55:42AM -0700, Joe Perches wrote:
> On Mon, 2016-08-22 at 18:41 +0100, James Simmons wrote:
> > On Fri, 2016-08-19 at 20:44 +0100, James Simmons wrote:
>
> Hi again James.
>
> > > I don't _need_ anything, but I think it'd be simpler to
> > > have just 2 directories, one
On Mon, Aug 22, 2016 at 12:54:12PM -0400, Anson Jacob wrote:
> *** BLURB HERE ***
You forgot the blurb :)
___
devel mailing list
de...@linuxdriverproject.org
http://driverdev.linuxdriverproject.org/mailman/listinfo/driverdev-devel
On Thu, Jul 28, 2016 at 04:16:48PM +, Wei Yongjun wrote:
> Using list_move_tail() instead of list_del() + list_add_tail().
>
> Signed-off-by: Wei Yongjun
Applied to pci/host-hv for v4.9, thanks!
> ---
> drivers/pci/host/pci-hyperv.c | 3 +--
> 1 file changed, 1 insertion(+), 2 deletions(-)
Some RTL8821AE devices sold in Great Britain have the country code of
0x25 encoded in their EEPROM. This value is not tested in the routine
that establishes the regulatory info for the chip. The fix is to set
this code to have the same capabilities as the EU countries. In addition,
the channels all
On 08/22/2016 10:36 AM, Kalle Valo wrote:
Larry Finger writes:
Some RTL8821AE devices sold in Great Britain have the country code of
0x25 encoded in their EEPROM. This value is not tested in the routine
that establishes the regulatory info for the chip. The fix is to set
this code to have the
From: Colin Ian King
Trivial fix to spelling mistake in dev_dbg message.
Signed-off-by: Colin Ian King
---
drivers/staging/comedi/drivers/jr3_pci.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/staging/comedi/drivers/jr3_pci.c
b/drivers/staging/comedi/drivers/jr3
On Mon, 2016-08-22 at 18:41 +0100, James Simmons wrote:
> On Fri, 2016-08-19 at 20:44 +0100, James Simmons wrote:
Hi again James.
> > I don't _need_ anything, but I think it'd be simpler to
> > have just 2 directories, one for lustre kernel stuff
> > and another for lustre uapi stuff.
> >
> > Th
> On Fri, 2016-08-19 at 20:44 +0100, James Simmons wrote:
> > > 1: I'd like to see the lustre #include files separated into
> > > only two internal/external directories akin to the
> > > include/linux and include/uapi directories used by linux.
> []
> > For the first question yes it is reaso
On Tue, Aug 23, 2016 at 12:54:17AM +0800, MingChia Chung wrote:
> This patch fixes a minor checkpatch warnings:
>
> "WARNING: Block comments use a trailing */ on a separate line"
>
> Signed-off-by: Ming-Chia Chung
> ---
> drivers/staging/rts5208/rtsx.c | 42
>
Fix checkpatch.pl warning for line over 80 characters
Signed-off-by: Anson Jacob
---
drivers/staging/vt6656/usbpipe.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/drivers/staging/vt6656/usbpipe.c b/drivers/staging/vt6656/usbpipe.c
index f546553..e9b6b21 100644
--- a/d
> tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
> master
> head: d18b09e429ad4520272dcdcd8faa01aabc171fd0
> commit: 1e1f9ff406fd5f6003a5dab2ab5a26c4c5bb8cbd [1892/3082] staging: lustre:
> llite: break ll_getxattr_common into 2 functions
> config: x86_64-randconfig
On Aug 22, 2016, at 10:57, James Simmons wrote:
>
> The function mdc_adjust_dirpages is only called on platforms which
> don't have pages 4K in size which is why kbuild only reported this
> for platforms like the Alpha. The problem was a typo in ordering of
> variables in the beginning of a while
On 08/22/2016 03:26 AM, Johanna Abrahamsson wrote:
It is not neccessary to save the value of ion_handle_validate since it
is only used once.
Acked-by: Laura Abbott
Signed-off-by: Johanna Abrahamsson
---
drivers/staging/android/ion/ion.c | 6 +-
1 file changed, 1 insertion(+), 5 deleti
On 08/22/2016 03:26 AM, Johanna Abrahamsson wrote:
The ion_free() and ion_free_nolock() functions should not BUG on a
handle client mismatch. It is not necessary to explicitly check for that
mismatch when ion_handle_validate is used.
The validate and BUG_ON are checking two slightly different
The function mdc_adjust_dirpages is only called on platforms which
don't have pages 4K in size which is why kbuild only reported this
for platforms like the Alpha. The problem was a typo in ordering of
variables in the beginning of a while loop. We were accessing the
dp pointer before it was kmappe
Fix checkpatch.pl warning for trailing */ on a separate line
Remove '+' postfix and '-' prefix from the start and end of block comments
Signed-off-by: Anson Jacob
---
drivers/staging/vt6655/rxtx.c | 41 -
1 file changed, 24 insertions(+), 17 deletions(-)
Fix checkpatch.pl warning for trailing */ on a separate line
Remove '+' postfix and '-' prefix from the start and end of block comments
Signed-off-by: Anson Jacob
---
drivers/staging/vt6655/rf.c | 19 ---
1 file changed, 12 insertions(+), 7 deletions(-)
diff --git a/drivers/stag
This patch fixes a minor checkpatch warnings:
"WARNING: Block comments use a trailing */ on a separate line"
Signed-off-by: Ming-Chia Chung
---
drivers/staging/rts5208/rtsx.c | 42 --
1 file changed, 28 insertions(+), 14 deletions(-)
diff --git a/d
*** BLURB HERE ***
Anson Jacob (2):
staging: vt6655: rf.c: Fix checkpatch warning
staging: vt6655: rxtx.c: Fix checkpatch warning
drivers/staging/vt6655/rf.c | 19 ---
drivers/staging/vt6655/rxtx.c | 41 -
2 files changed, 36 insertio
> On Mon, Aug 22, 2016 at 03:15:23PM +0800, kbuild test robot wrote:
> > tree: https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/staging.git
> > staging-testing
> > head: f5a9a15f8fd4168e415e94f5dce367f3cef08e03
> > commit: 4f76f0ec093c2f9ef049495c78d486bfb48e4de0 [201/347] staging: lust
sparse was warning about incorrect type of argument:
drivers/staging/i4l/icn/icn.c:1048:49:
warning: incorrect type in argument 2 (different address spaces)
drivers/staging/i4l/icn/icn.c:1048:49:
expected void const [noderef] *from
drivers/staging/i4l/icn/icn.c:1048:49:
got unsigned char const [us
Blank lines are not needed after starting brace or before a closing
brace.
Signed-off-by: Sudip Mukherjee
---
drivers/staging/i4l/icn/icn.c | 3 ---
1 file changed, 3 deletions(-)
diff --git a/drivers/staging/i4l/icn/icn.c b/drivers/staging/i4l/icn/icn.c
index 1f72884..45623fa 100644
--- a/driv
No need provide a space after a typecast.
Signed-off-by: Sudip Mukherjee
---
drivers/staging/i4l/icn/icn.c | 66 +--
1 file changed, 33 insertions(+), 33 deletions(-)
diff --git a/drivers/staging/i4l/icn/icn.c b/drivers/staging/i4l/icn/icn.c
index b2f4055
The macro EVAL_PLCI and MAKE_PLCI are not being used. Remove them.
But keep the comment preceding them as it contains information
regarding message format.
Signed-off-by: Sudip Mukherjee
---
drivers/staging/i4l/act2000/capi.h | 7 ---
1 file changed, 7 deletions(-)
diff --git a/drivers/stag
The macro EVAL_NCCI was only being used in capi.c and the argument
controller was not used. Remove the argument and at the same time
remove the variable which now becomes unused.
Signed-off-by: Sudip Mukherjee
---
drivers/staging/i4l/act2000/capi.c | 3 +--
drivers/staging/i4l/act2000/capi.h | 3
From: Stephen Hemminger
Sparse warnings from global data/functions that should be static
Stephen Hemminger (2):
hyperv: make mmio resource local
hv_pci: make hv_irq functions static
drivers/hv/vmbus_drv.c|4 ++--
drivers/pci/host/pci-hyperv.c |4 ++--
2 files changed, 4 ins
From: Stephen Hemminger
This fixes a sparse warning because hyperv_mmio resources
are only used in this one file and should be static.
Signed-off-by: Stephen Hemminger
---
drivers/hv/vmbus_drv.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/hv/vmbus_drv.c
From: Stephen Hemminger
Fix sparse warning because these functions only used in one file.
Signed-off-by: Stephen Hemminger
---
drivers/pci/host/pci-hyperv.c |4 ++--
1 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/pci/host/pci-hyperv.c b/drivers/pci/host/pci-hyperv.c
Larry Finger writes:
> Some RTL8821AE devices sold in Great Britain have the country code of
> 0x25 encoded in their EEPROM. This value is not tested in the routine
> that establishes the regulatory info for the chip. The fix is to set
> this code to have the same capabilities as the EU countries
This patch is needed to clean up the initialized ida structure in case
the function exits with an exception.
Signed-off-by: Christian Gromm
---
drivers/staging/most/aim-cdev/cdev.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/drivers/staging/most/aim-cdev/cdev.c
b/driv
On Mon, Aug 22, 2016 at 03:07:44PM +0100, David Binderman wrote:
> Hello there,
>
> linux-4.8-rc3/drivers/staging/rtl8723au/hal/rtl8723a_bt-coexist.c:3533]:
> (style) Condition 'pBtMgnt.ExtConfig.HCIExtensionVer>=1' is always
> true
>
> Source code is
>
> if (pBtMgnt->ExtConfig.HCIExtens
On Mon, Aug 22, 2016 at 10:02:43AM -0400, 'Greg KH' wrote:
> On Mon, Aug 22, 2016 at 10:46:10AM +, Sell, Timothy C wrote:
> > > -Original Message-
> > > From: 'Greg KH' [mailto:gre...@linuxfoundation.org]
> > > Sent: Monday, August 22, 2016 4:16 AM
> > > To: Sell, Timothy C
> > > Cc: c
Hello there,
linux-4.8-rc3/drivers/staging/rtl8723au/hal/rtl8723a_bt-coexist.c:3533]:
(style) Condition 'pBtMgnt.ExtConfig.HCIExtensionVer>=1' is always
true
Source code is
if (pBtMgnt->ExtConfig.HCIExtensionVer < 1) {
} else if (pBtMgnt->ExtConfig.HCIExtensionVer >=
On Mon, Aug 22, 2016 at 10:46:10AM +, Sell, Timothy C wrote:
> > -Original Message-
> > From: 'Greg KH' [mailto:gre...@linuxfoundation.org]
> > Sent: Monday, August 22, 2016 4:16 AM
> > To: Sell, Timothy C
> > Cc: cor...@lwn.net; t...@linutronix.de; mi...@redhat.com;
> > h...@zytor.com
This fixes remaining checkpatch.pl "Alignment should match open
parenthesis" issues.
Signed-off-by: Ben LeMasurier
---
V2: Rebased against current staging-testing staging tree.
drivers/staging/android/ion/ion.c | 42 +-
drivers/staging/android/ion/ion_chunk_h
> -Original Message-
> From: 'Greg KH' [mailto:gre...@linuxfoundation.org]
> Sent: Monday, August 22, 2016 4:16 AM
> To: Sell, Timothy C
> Cc: cor...@lwn.net; t...@linutronix.de; mi...@redhat.com;
> h...@zytor.com; Arfvidson, Erik ;
> hof...@osadl.org; dzic...@redhat.com; jes.soren...@redh
It is not neccessary to save the value of ion_handle_validate since it
is only used once.
Signed-off-by: Johanna Abrahamsson
---
drivers/staging/android/ion/ion.c | 6 +-
1 file changed, 1 insertion(+), 5 deletions(-)
diff --git a/drivers/staging/android/ion/ion.c
b/drivers/staging/android
The ion_free() and ion_free_nolock() functions should not BUG on a
handle client mismatch. It is not necessary to explicitly check for that
mismatch when ion_handle_validate is used.
Signed-off-by: Johanna Abrahamsson
---
drivers/staging/android/ion/ion.c | 4
1 file changed, 4 deletions(-)
This is a small cleanup of the ion_free() and ion_free_nolock() methods. They
are in a patchset because they depend lightly on each other, as in that patch 2
won't apply due to changes in the context. Since this is my first patchset
please let me know if I am doing it wrong.
Johanna Abrahamsson
Alignment should match open parenthesis as per checkpatch.pl.
Signed-off-by: Johanna Abrahamsson
---
drivers/staging/android/ion/ion.c | 42 +++
1 file changed, 21 insertions(+), 21 deletions(-)
diff --git a/drivers/staging/android/ion/ion.c
b/drivers/stagin
On Mon, Aug 22, 2016 at 10:58:07AM +0200, Christian Gromm wrote:
> On Sun, 21 Aug 2016 16:50:20 +0200
> Greg KH wrote:
>
> > On Fri, Aug 19, 2016 at 01:09:35PM +0200, Christian Gromm wrote:
> > > This patch moves the initialization of the idr structure towards the end
> > > of the module's init r
On Mon, Aug 22, 2016 at 04:46:04PM +0800, Shawn Lin wrote:
> We only need to zero it when repeating in order to
> avoid old garbage. Let's improve it by moving this
> before we repeat the calculation to save some cpu
> cycle.
>
> Signed-off-by: Shawn Lin
Have you noticed a change with this in a
On Mon, Aug 22, 2016 at 03:15:23PM +0800, kbuild test robot wrote:
> tree: https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/staging.git
> staging-testing
> head: f5a9a15f8fd4168e415e94f5dce367f3cef08e03
> commit: 4f76f0ec093c2f9ef049495c78d486bfb48e4de0 [201/347] staging: lustre:
> llit
On Sun, 21 Aug 2016 16:50:20 +0200
Greg KH wrote:
> On Fri, Aug 19, 2016 at 01:09:35PM +0200, Christian Gromm wrote:
> > This patch moves the initialization of the idr structure towards the end
> > of the module's init routine. This keeps the code compact and eliminates
> > the need of having to
We only need to zero it when repeating in order to
avoid old garbage. Let's improve it by moving this
before we repeat the calculation to save some cpu
cycle.
Signed-off-by: Shawn Lin
---
drivers/staging/lustre/lustre/obdclass/llog.c | 7 ---
1 file changed, 4 insertions(+), 3 deletions(-)
tree: https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/staging.git
staging-testing
head: f5a9a15f8fd4168e415e94f5dce367f3cef08e03
commit: d806f30e639b0ff5abeb012b08932691be795342 [168/347] staging: lustre:
osc: revise unstable pages accounting
config: frv-allmodconfig (attached as .conf
On Mon, Aug 22, 2016 at 02:48:18AM +, Sell, Timothy C wrote:
> > -Original Message-
> > From: Greg KH [mailto:gre...@linuxfoundation.org]
> > Sent: Sunday, August 21, 2016 2:05 PM
> > To: Kershner, David A
> > Cc: cor...@lwn.net; t...@linutronix.de; mi...@redhat.com;
> > h...@zytor.com
tree: https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/staging.git
staging-testing
head: f5a9a15f8fd4168e415e94f5dce367f3cef08e03
commit: 4f76f0ec093c2f9ef049495c78d486bfb48e4de0 [201/347] staging: lustre:
llite: move dir cache to MDC layer
config: alpha-allyesconfig (attached as .confi
100 matches
Mail list logo