Re: [PATCH net-next V2 0/5] Refine virtio-net XDP

2017-07-24 Thread Michael S. Tsirkin
On Mon, Jul 24, 2017 at 01:38:59PM -0700, David Miller wrote: > From: Jason Wang > Date: Wed, 19 Jul 2017 16:54:44 +0800 > > > Hi: > > > > This series brings two optimizations for virtio-net XDP: > > > > - avoid reset during XDP set > > - turn off offloads on demand > > > > Changes from V1: >

Re: [PATCH net-next V2 5/5] virtio-net: switch off offloads on demand if possible on XDP set

2017-07-24 Thread Michael S. Tsirkin
On Wed, Jul 19, 2017 at 04:54:49PM +0800, Jason Wang wrote: > Current XDP implementation wants guest offloads feature to be disabled > on device. This is inconvenient and means guest can't benefit from > offloads if XDP is not used. This patch tries to address this > limitation by disabling the off

RE: Is it possible to use ftrace to measure secondary CPU bootup time

2017-07-24 Thread Brandt, Todd E
> > On Mon, 24 Jul 2017 13:46:07 +0800 > "Huang\, Ying" wrote: > > > Hi, Steven, > > > > We are working on parallelizing secondary CPU bootup. So we need to > > measure the bootup time of secondary CPU, that is, measure time spent in > > smp_init() and its callees. But we found that ftrace no

[PATCH tip/core/rcu 2/6] doc: RCU documentation update

2017-07-24 Thread Paul E. McKenney
Signed-off-by: Paul E. McKenney --- Documentation/RCU/checklist.txt | 121 +++ Documentation/RCU/rcu.txt| 9 +-- Documentation/RCU/rcubarrier.txt | 5 ++ Documentation/RCU/torture.txt| 20 +-- Documentation/RCU/whatisRCU.txt | 5 +- 5 f

Re: [PATCH 09/10] percpu: replace area map allocator with bitmap allocator

2017-07-24 Thread Dennis Zhou
On Mon, Jul 17, 2017 at 07:27:56PM -0400, Tejun Heo wrote: > I think it'd be nice to have a similar table for allocation patterns > which aren't ideal for the original allocator. The biggest goal is > avoiding cases where the allocator collapses and just glancing at the > table doesn't seem very c

[PATCH tip/core/rcu 3/6] doc: Update memory-barriers.txt for read-to-write dependencies

2017-07-24 Thread Paul E. McKenney
The memory-barriers.txt document contains an obsolete passage stating that smp_read_barrier_depends() is required to force ordering for read-to-write dependencies. We now know that this is not required, even for DEC Alpha. This commit therefore updates this passage to state that read-to-write depe

[PATCH tip/core/rcu 6/6] doc: Set down RCU's scheduling-clock-interrupt needs

2017-07-24 Thread Paul E. McKenney
This commit documents the situations in which RCU needs the scheduling-clock interrupt to be enabled, along with the consequences of failing to meet RCU's needs in this area. Signed-off-by: Paul E. McKenney --- .../RCU/Design/Requirements/Requirements.html | 130 + 1 fil

[PATCH tip/core/rcu 4/6] doc: Add RCU files to docbook-generation files

2017-07-24 Thread Paul E. McKenney
Suggested-by: Jonathan Corbet Signed-off-by: Paul E. McKenney --- Documentation/core-api/kernel-api.rst | 49 +++ 1 file changed, 49 insertions(+) diff --git a/Documentation/core-api/kernel-api.rst b/Documentation/core-api/kernel-api.rst index 17b00914c6ab..8282

[PATCH tip/core/rcu 1/6] documentation: Fix relation between nohz_full and rcu_nocbs

2017-07-24 Thread Paul E. McKenney
If a CPU is specified in the nohz_full= kernel boot parameter to a kernel built with CONFIG_NO_HZ_FULL=y, then that CPU's callbacks will be offloaded, just as if that CPU had also been specified in the rcu_nocbs= kernel boot parameter. But the current documentation states that the user must keep t

Re: [PATCH net-next 5/5] virtio-net: switch off offloads on demand if possible on XDP set

2017-07-24 Thread Michael S. Tsirkin
On Wed, Jul 19, 2017 at 10:39:53AM +0800, Jason Wang wrote: > > > On 2017年07月19日 04:07, Michael S. Tsirkin wrote: > > On Mon, Jul 17, 2017 at 08:44:01PM +0800, Jason Wang wrote: > > > Current XDP implementation want guest offloads feature to be disabled > > s/want/wants/ > > > > > on qemu cli. >

[PATCH tip/core/rcu 5/6] doc: No longer allowed to use rcu_dereference on non-pointers

2017-07-24 Thread Paul E. McKenney
Signed-off-by: Paul E. McKenney --- Documentation/RCU/rcu_dereference.txt | 61 --- 1 file changed, 21 insertions(+), 40 deletions(-) diff --git a/Documentation/RCU/rcu_dereference.txt b/Documentation/RCU/rcu_dereference.txt index b2a613f16d74..1acb26b09b48 10064

[PATCH tip/core/rcu 0/6] Documentation updates

2017-07-24 Thread Paul E. McKenney
Hello! This series contains documentation updates: 1. Fix documentation of relation between nohz_full and rcu_nocbs. 2. General documentation update. 3. Update memory-barriers.txt for read-to-write dependencies. 4. Add RCU files to docbook-generation lists. 5. Documen

[PATCH] kmod: fix spelling mistake: "EMTPY" -> "EMPTY"

2017-07-24 Thread Colin King
From: Colin Ian King Trivial fix to spelling mistake in snprintf text Signed-off-by: Colin Ian King --- lib/test_kmod.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/lib/test_kmod.c b/lib/test_kmod.c index 6c1d678bcf8b..90c91541fc16 100644 --- a/lib/test_kmod.c +++ b/

[PATCH] x86/nmi: Use raw lock

2017-07-24 Thread Scott Wood
register_nmi_handler() can be called from PREEMPT_RT atomic context (e.g. wakeup_cpu_via_init_nmi() or native_stop_other_cpus()), and thus ordinary spinlocks cannot be used. Signed-off-by: Scott Wood --- arch/x86/kernel/nmi.c | 18 +- 1 file changed, 9 insertions(+), 9 deletions(

Re: [PATCH] kthread: Fix documentation build warning

2017-07-24 Thread Jonathan Corbet
On Mon, 24 Jul 2017 14:24:44 -0700 Randy Dunlap wrote: > > + * @arg...: arguments for @namefmt. > > * > > Hm, Documentation/doc-guide/kernel-doc.rst says: > If a function parameter is ``...`` (varargs), it should be listed > in kernel-doc notation as: ``@...:``. > > but the patch here is fo

Re: [PATCH net-next V2 5/5] virtio-net: switch off offloads on demand if possible on XDP set

2017-07-24 Thread Michael S. Tsirkin
On Wed, Jul 19, 2017 at 04:54:49PM +0800, Jason Wang wrote: > Current XDP implementation wants guest offloads feature to be disabled > on device. This is inconvenient and means guest can't benefit from > offloads if XDP is not used. This patch tries to address this > limitation by disabling the off

Re: [PATCH v3 3/9] perf annotate: Fix wrong --show-total-period option showing number of samples

2017-07-24 Thread Taeung Song
On 07/25/2017 02:37 AM, Arnaldo Carvalho de Melo wrote: Em Mon, Jul 24, 2017 at 10:51:58AM +0900, Taeung Song escreveu: Hi Arnaldo, Sorry, I'm too late. On 07/21/2017 08:24 PM, Arnaldo Carvalho de Melo wrote: Em Fri, Jul 21, 2017 at 06:41:29PM +0900, Taeung Song escreveu: On 07/21/2017 04:

[PATCH v3 2/2] memory: ti-emif-sram: introduce relocatable suspend/resume handlers

2017-07-24 Thread Dave Gerlach
Certain SoCs like Texas Instruments AM335x and AM437x require parts of the EMIF PM code to run late in the suspend sequence from SRAM, such as saving and restoring the EMIF context and placing the memory into self-refresh. One requirement for these SoCs to suspend and enter its lowest power mode,

[PATCH v3 0/2] memory: Introduce ti-emif-sram driver

2017-07-24 Thread Dave Gerlach
This is v3 of the series introduces a ti-emif-sram driver to be used on am335x and am437x, based on v4.13-rc2. This version addresses some comments from Russell King and Johan Hovold in v2 found here [1]. Main changes are to patch two with grouping all the driver data into a single struct and allo

[PATCH v3 1/2] Documentation: dt: Update ti,emif bindings

2017-07-24 Thread Dave Gerlach
Update the Texas Instruments EMIF binding document to include the device tree bindings for ti,emif-am3352 and ti,emif-am4372 which are used by the ti-emif-sram driver to provide low-level PM functionality. Acked-by: Rob Herring Acked-by: Tony Lindgren Signed-off-by: Dave Gerlach --- .../device

Re: [PATCH] kthread: Fix documentation build warning

2017-07-24 Thread Randy Dunlap
On 07/24/2017 12:59 PM, Jonathan Corbet wrote: > The kerneldoc comment for kthread_create() had an incorrect argument name, > leading to a warning in the docs build. Correct it, and make one more > small step toward a warning-free build. > > Signed-off-by: Jonathan Corbet > --- > include/linux/

Re: [PATCH 02/37] binder: use group leader instead of open thread

2017-07-24 Thread Greg Kroah-Hartman
On Mon, Jul 24, 2017 at 02:00:45PM -0700, John Stultz wrote: > On Thu, Jun 29, 2017 at 12:01 PM, Todd Kjos wrote: > > The binder allocator assumes that the thread that > > called binder_open will never die for the lifetime of > > that proc. That thread is normally the group_leader, > > however it

[PATCH 1/2] HID: multitouch: Support HID_GD_WIRELESS_RADIO_CTLS

2017-07-24 Thread João Paulo Rechi Vita
Some keyboard + touchpad devices have the Microsoft Win8 Wireless Radio Controls extensions Usage Page define in the touchpad report descriptor, so we need to support them in this driver. Signed-off-by: João Paulo Rechi Vita --- drivers/hid/hid-multitouch.c | 6 +- 1 file changed, 5 insertio

[PATCH 2/2] HID: multitouch: Support Asus T304UA media keys

2017-07-24 Thread João Paulo Rechi Vita
The Asus T304UA convertible sports a magnetic detachable keyboard with touchpad, which is connected over USB. Most of the keyboard hotkeys are exposed through the same USB interface as the touchpad, defined in the report descriptor as follows: 0x06, 0x31, 0xFF, // Usage Page (Vendor Defined 0xFF3

[PATCH 0/2] HID: multitouch: Support Asus T304UA media keys

2017-07-24 Thread João Paulo Rechi Vita
The Asus T304UA convertible sports a magnetic detachable keyboard with touchpad, which is connected over USB. Most of the keyboard hotkeys are exposed through the same USB interface as the touchpad. The mapping defined here is the same present in hid-asus, but when using hid-asus to drive this tou

Re: [v3] mm: Add SLUB free list pointer obfuscation

2017-07-24 Thread Alexander Popov
>From 86f4f1f6deb76849e00c761fa30eeb479f789c35 Mon Sep 17 00:00:00 2001 From: Alexander Popov Date: Mon, 24 Jul 2017 23:16:28 +0300 Subject: [PATCH 2/2] mm/slub.c: add a naive detection of double free or corruption On 06.07.2017 03:27, Kees Cook wrote: > This SLUB free list pointer obfuscation c

[PATCH] perf: qcom_l2: fix column exclusion check

2017-07-24 Thread Neil Leeder
The check for column exclusion did not verify that the event being checked was an L2 event, and not a software event. Software events should not be checked for column exclusion. This resulted in a group with both software and L2 events sometimes incorrectly rejecting the L2 event for column exclusi

Re: pull-request: wireless-drivers 2017-07-21

2017-07-24 Thread David Miller
From: Kalle Valo Date: Fri, 21 Jul 2017 19:12:54 +0300 > important fixes for net which had accumulated while I was away. I only > applied the brcmfmac and rtlwifi patches only eight hours ago and I > haven't seen the kbuild report yet so they might have some build > breakage in theory. But the pa

[PATCH v2 2/6] mei: Switch to use new generic UUID API

2017-07-24 Thread Tomas Winkler
From: Andy Shevchenko There are new types and helpers that are supposed to be used in new code. As a preparation to get rid of legacy types and API functions do the conversion here. Cc: Tomas Winkler Cc: Guenter Roeck Cc: Samuel Ortiz Signed-off-by: Andy Shevchenko Signed-off-by: Tomas Wink

Re: [PATCH 00/10] percpu: replace percpu area map allocator with bitmap allocator

2017-07-24 Thread Dennis Zhou
Hi Josef, On Tue, Jul 18, 2017 at 03:15:28PM -0400, Josef Bacik wrote: > Ok so you say that this test is better for the area map allocator, so > presumably > this is worst case for the bitmap allocator? What does the average case look > like? The bitmap allocator should perform relatively con

[PATCH 3/3] selftests: sync: convert to use TAP13 ksft framework

2017-07-24 Thread Shuah Khan
Convert test to use TAP13 ksft framework. Output after conversion: TAP version 13 # [RUN] Testing sync framework ok 1 [RUN] test_alloc_timeline ok 2 [RUN] test_alloc_fence ok 3 [RUN] test_alloc_fence_negative ok 4 [RUN] test_fence_one_timeline_wait ok 5 [RUN] test_fence_on

[PATCH 2/3] selftests: kselftest framework: add API to return pass/fail/* counts

2017-07-24 Thread Shuah Khan
Some tests print final pass/fail message based on fail count. Add ksft_get_*_cnt() API to kselftest framework to return counts. Update ksft_print_cnts() to print the test results summary message with individual pass, fail, ... counters. Signed-off-by: Shuah Khan --- tools/testing/selftests/ksel

[PATCH 1/3] selftests: sync: differentiate between sync unsupported and access errors

2017-07-24 Thread Shuah Khan
Sync test doesn't differentiate between sync unsupported and test run by non-root user and treats both as unsupported cases. Fix it to add handling for these two different scenarios. Signed-off-by: Shuah Khan --- tools/testing/selftests/sync/sync_test.c | 23 +++ 1 file chan

[PATCH 0/3] selftests: sync test conversion to TAP13

2017-07-24 Thread Shuah Khan
This patch series includes patches to convert sync test to use TAP13 ksft framework. In addition, fix to sync test to differentiate between unsupported feature and access error when a non-root user runs it. Updated kfst framework to return counters for sync test to use to print the final pass or f

Re: [PATCH 02/37] binder: use group leader instead of open thread

2017-07-24 Thread John Stultz
On Mon, Jul 24, 2017 at 2:00 PM, John Stultz wrote: > On Thu, Jun 29, 2017 at 12:01 PM, Todd Kjos wrote: >> The binder allocator assumes that the thread that >> called binder_open will never die for the lifetime of >> that proc. That thread is normally the group_leader, >> however it may not be.

Re: [PATCH v5 0/3] some fixups for MediaTek cpufreq driver

2017-07-24 Thread Rafael J. Wysocki
On Tuesday, July 18, 2017 02:01:42 PM sean.w...@mediatek.com wrote: > From: Sean Wang > > Changes since v4: > - add back the missing Acked-by from v3 > > Changes since v3: > - remove the redundant line depends on ARM || ARM64 || COMPILE_TEST > since the whole Kconfig.arm file depends on ARM || A

Re: USB disk speed regression WD Elements - with bisect result 22547c4cc4fe20698a6a85a55b8788859134b8e4

2017-07-24 Thread Guenter Roeck
On Mon, Jul 24, 2017 at 10:41:12AM -0400, Alan Stern wrote: > On Mon, 24 Jul 2017, Zdenek Kabelac wrote: > > > Hi > > > > I've problem with my USB storage devices: WD Elements 1TB. > > (Bus 004 Device 002: ID 1058:10a8 Western Digital Technologies, Inc. > > Elements > > Portable (WDBUZG)) > >

Re: [PATCH net 0/2] bpf: fix verifier min/max handling in BPF_SUB

2017-07-24 Thread David Miller
From: Edward Cree Date: Fri, 21 Jul 2017 14:35:17 +0100 > I managed to come up with a test for the swapped bounds in BPF_SUB, so here > it is along with a patch that fixes it, separated out from my 'rewrite > everything' series so it can go to -stable. Series applied and queued up for -stable,

Re: [PATCH v4] PM / suspend: Export pm_suspend_target_state

2017-07-24 Thread Rafael J. Wysocki
On Monday, July 17, 2017 05:19:25 PM Florian Fainelli wrote: > Have the core suspend/resume framework store the system-wide suspend > state (suspend_state_t) we are about to enter, and expose it to drivers > via pm_suspend_target_state in order to retrieve that. The state is > assigned in suspend_d

Re: [PATCH v2 0/4] thermal: add brcmstb AVS TMON driver

2017-07-24 Thread Florian Fainelli
On 07/21/2017 12:27 PM, Markus Mayer wrote: > From: Markus Mayer > > This series adds the brcmstb AVS TMON driver. > > The driver was originally written by Brian Norris. > > v1 of this series can be found at https://lkml.org/lkml/2017/6/5/921 Rui, Eduardo, I can take patches 3 and 4 through th

Re: [PATCH 02/37] binder: use group leader instead of open thread

2017-07-24 Thread John Stultz
On Thu, Jun 29, 2017 at 12:01 PM, Todd Kjos wrote: > The binder allocator assumes that the thread that > called binder_open will never die for the lifetime of > that proc. That thread is normally the group_leader, > however it may not be. Use the group_leader instead > of current. > > Signed-off-b

[PATCH v4 02/12] ALSA: ac97: add an ac97 bus

2017-07-24 Thread Robert Jarzmik
AC97 is a bus for sound usage. It enables for a AC97 AC-Link to link one controller to 0 to 4 AC97 codecs. The goal of this new implementation is to implement a device/driver model for AC97, with an automatic scan of the bus and automatic discovery of AC97 codec devices. Signed-off-by: Robert Jar

[PATCH v4 03/12] ASoC: add new ac97 bus support

2017-07-24 Thread Robert Jarzmik
Add the new ac97 bus support, with ac97 bus automatic probing. Signed-off-by: Robert Jarzmik Acked-by: Charles Keepax --- sound/Kconfig | 2 ++ sound/Makefile | 1 + 2 files changed, 3 insertions(+) diff --git a/sound/Kconfig b/sound/Kconfig index ee2e69a9ecd1..141b145c4195 100644 --- a/sound

[PATCH v4 11/12] ASoC: wm9705: add ac97 new bus support

2017-07-24 Thread Robert Jarzmik
Add support for the new ac97 bus model, where devices are automatically discovered on AC-Links. Signed-off-by: Robert Jarzmik Acked-by: Charles Keepax --- sound/soc/codecs/Kconfig | 3 ++- sound/soc/codecs/wm9705.c | 35 +++ 2 files changed, 25 insertions(+), 1

[PATCH v4 05/12] Input: wm97xx: split out touchscreen registering

2017-07-24 Thread Robert Jarzmik
wm97xx-core does several things in it initialization : - touchscreen input device setup - battery device creation As the wm97xx is actually a multi-function device handling an audio codec, a touchscreen, a gpio block and an ADC, reshape the probing to isolate what is truly input/touchscreen spec

[PATCH v4 01/12] ALSA: ac97: split out the generic ac97 registers

2017-07-24 Thread Robert Jarzmik
Split out from the ac97_codec.h the ac97 generic registers, which can be used by a codec, typically a generic ac97 codec, and by the ac97 bus, to scan an ac97 AC-Link. This split encompasses all the AC97 standard registers, but not the codec specific ones. In order to have a clean split between f

[PATCH v4 04/12] ASoC: arm: make pxa2xx-ac97-lib ac97 codec agnostic

2017-07-24 Thread Robert Jarzmik
All pxa library functions don't use the input parameters for nothing but slot number. This simplifies their prototypes, and makes them usable by both the legacy ac97 bus and the new ac97 bus. Signed-off-by: Robert Jarzmik --- include/sound/pxa2xx-lib.h | 15 +-- sound/arm/pxa2xx-ac9

[PATCH v4 12/12] ASoC: pxa: switch to new ac97 bus support

2017-07-24 Thread Robert Jarzmik
Switch to the new ac97 bus support in sound/ac97 instead of the legacy snd_ac97 one. Signed-off-by: Robert Jarzmik --- Since v1: split into 2 patches, the former being XXX ac97 codec agnostic Since v2: fix driver unregistration Since v3: added platform driver data for controller removal --- soun

[PATCH v4 09/12] ASoC: wm9712: add ac97 new bus support

2017-07-24 Thread Robert Jarzmik
Add support for the new ac97 bus model, where devices are automatically discovered on AC-Links. Signed-off-by: Robert Jarzmik --- sound/soc/codecs/Kconfig | 3 ++- sound/soc/codecs/wm9712.c | 37 - 2 files changed, 26 insertions(+), 14 deletions(-) diff --g

[PATCH v4 07/12] Input: wm97xx: add new AC97 bus support

2017-07-24 Thread Robert Jarzmik
This adds support for the new AC97 bus code, which discovers the devices rather than uses platform data. As part of this discovery, it enables a multi-function device wm97xx, which supports touchscreen, battery, ADC and an audio codec. This patch adds the code to bind the touchscreen "cell" as the

[PATCH v4 10/12] ASoC: wm9705: add private structure

2017-07-24 Thread Robert Jarzmik
Add a private data structure. This is a preparation for a codec which would need an another data on top of snd_ac97, which will be the case when an MFD wm97xx device will probe wm9705. Signed-off-by: Robert Jarzmik Acked-by: Charles Keepax --- sound/soc/codecs/wm9705.c | 36

[PATCH v4 08/12] ASoC: wm9713: add ac97 new bus support

2017-07-24 Thread Robert Jarzmik
Add support for the new ac97 bus model, where devices are automatically discovered on AC-Links. Signed-off-by: Robert Jarzmik --- sound/soc/codecs/Kconfig | 3 ++- sound/soc/codecs/wm9713.c | 39 +++ 2 files changed, 29 insertions(+), 13 deletions(-) diff -

[PATCH v4 06/12] mfd: wm97xx-core: core support for wm97xx Codec

2017-07-24 Thread Robert Jarzmik
The WM9705, WM9712 and WM9713 are highly integrated codecs, with an audio codec, DAC and ADC, GPIO unit and a touchscreen interface. Historically the support was spread across drivers/input/touchscreen and sound/soc/codecs. The sharing was done through ac97 bus sharing. This model will not withsta

[PATCH v4 00/12] AC97 device/driver model revamp

2017-07-24 Thread Robert Jarzmik
Hi Lars, Mark, Charles, Lee, This is a minor revision after v3, mainly reviews from Takashi, Charles. I did more extensive testing of load/unload of the whole serie, and apart from a bug in wm97xx-core in touchscreen tree (for a which a patch will be sent apart), it seems to work properly. I extr

Re: [PATCH v2 net] net: ethernet: mediatek: avoid potential invalid memory access

2017-07-24 Thread David Miller
From: Date: Sat, 22 Jul 2017 20:45:55 +0800 > From: Sean Wang > > Potential dangerous invalid memory might be accessed if invalid mac value > reflected from the forward port field in rxd4 caused by possible potential > hardware defects. So added a simple sanity checker to avoid the kind of > si

Re: [PATCH] net: Convert to using %pOF instead of full_name

2017-07-24 Thread David Miller
From: Rob Herring Date: Wed, 19 Jul 2017 10:09:13 -0500 > On Tue, Jul 18, 2017 at 4:51 PM, David Miller wrote: >> From: Rob Herring >> Date: Tue, 18 Jul 2017 16:43:19 -0500 >> >>> Now that we have a custom printf format specifier, convert users of >>> full_name to use %pOF instead. This is prep

Re: [PATCH] mailbox: pcc: Fix crash when request PCC channel 0

2017-07-24 Thread Rafael J. Wysocki
On Friday, July 21, 2017 03:09:29 PM Hoan Tran wrote: > When PCCT is not available, kernel crashes as below when requests PCC > channel 0. This patch fixes this issue. > > [0.920454] PCCT header not found. > ... > [8.031309] Unable to handle kernel NULL pointer dereference at virtual > ad

Re: [PATCH net-next V2 0/5] Refine virtio-net XDP

2017-07-24 Thread David Miller
From: Jason Wang Date: Wed, 19 Jul 2017 16:54:44 +0800 > Hi: > > This series brings two optimizations for virtio-net XDP: > > - avoid reset during XDP set > - turn off offloads on demand > > Changes from V1: > - Various tweaks on commit logs and comments > - Use virtnet_napi_enable() when enab

Re: [PATCH 2/2] acpi: Fix typo in SRAT table name

2017-07-24 Thread Rafael J. Wysocki
On Friday, July 21, 2017 04:51:24 PM Ross Zwisler wrote: > To save someone the time of searching the ACPI spec for "Static Resource > Affinity Table". > > Signed-off-by: Ross Zwisler > --- > drivers/acpi/numa.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/drivers/acp

[Kein Betreff]

2017-07-24 Thread Lars Reichardt
unsubscribe linux-kernel

Re: [PATCH V4 net-next 7/8] net: hns3: Add Ethtool support to HNS3 driver

2017-07-24 Thread Rustad, Mark D
> On Jul 23, 2017, at 10:05 AM, Florian Fainelli wrote: >> + >> +strncpy(drvinfo->version, HNAE_DRIVER_VERSION, >> +sizeof(drvinfo->version)); >> +drvinfo->version[sizeof(drvinfo->version) - 1] = '\0'; > > strlcpy() would probably do that for you. You need to be careful abou

Re: [PATCH 00/13] net: dsa: lan9303: unicast offload, fdb,mdb,STP

2017-07-24 Thread David Miller
From: Egil Hjelmeland Date: Mon, 24 Jul 2017 16:47:51 +0200 > This is my first patches submitted to the kernel, so I am looking > forward to comments. Please clean up how the dates are handled in your submission. They are all over the place, over a period of 3 days. Instead, they should be con

Re: v4.13-rc2: usb mouse stopped working?

2017-07-24 Thread Pavel Machek
Hi! > > On thinkpad x220, USB mouse stopped working in v4.13-rc2. v4.12 was > > ok, iirc. > > > > Now, USB mouse is so common hw that I may have something wrong in my > > config...? But I did not change anything there. > > Well, your particular USB mouse requires an always-poll quirk, so it's no

Re: [PATCH v4 1/2] dt-bindings: arm: Add entry for Beckhoff CX9020

2017-07-24 Thread Rob Herring
On Fri, Jul 21, 2017 at 06:06:39AM +0200, linux-kernel-...@beckhoff.com wrote: > From: Patrick Bruenn > > - add vendor prefix bhf for Beckhoff > - add new board binding bhf,cx9020 > > Signed-off-by: Patrick Bruenn > --- > Documentation/devicetree/bindings/arm/bhf.txt | 6 ++ > Docu

Re: [PATCH 1/3] dt-bindings: soc: update the binding document for SCPSYS on MediaTek MT7622 SoC

2017-07-24 Thread Rob Herring
On Fri, Jul 21, 2017 at 11:57:12AM +0800, sean.w...@mediatek.com wrote: > From: Sean Wang > > Update the binding document for enabling SCPSYS on MediaTek MT7622 SoC. > > Signed-off-by: Sean Wang > Signed-off-by: Chen Zhong > --- > Documentation/devicetree/bindings/soc/mediatek/scpsys.txt | 3

Re: [PATCH 5/5] dt-bindings: PCI: add support for new generation controller

2017-07-24 Thread Rob Herring
On Fri, Jul 21, 2017 at 10:34:49AM +0800, honghui.zh...@mediatek.com wrote: > From: Ryder Lee > > Add support for MediaTek new generation controller and update related > properities. > > Signed-off-by: Ryder Lee > Signed-off-by: Honghui Zhang > --- > .../devicetree/bindings/pci/mediatek-pcie.

Re: [PATCH] tracing: Fix trace_pipe_raw read panic

2017-07-24 Thread Steven Rostedt
Hi Chunyu, Thanks for the patch. I'm currently traveling, and will have little time to test it. Hopefully I can get to it sometime this week. -- Steve On Mon, 24 Jul 2017 15:21:06 +0800 Chunyu Hu wrote: > per_cpu trace directories and files are created for all possible cpus, > but only the c

Re: [PATCH v1 13/13] xen: introduce a Kconfig option to enable the pvcalls frontend

2017-07-24 Thread Juergen Gross
On 22/07/17 02:12, Stefano Stabellini wrote: > Also add pvcalls-front to the Makefile. > > Signed-off-by: Stefano Stabellini > CC: boris.ostrov...@oracle.com > CC: jgr...@suse.com > --- > drivers/xen/Kconfig | 9 + > drivers/xen/Makefile | 1 + > 2 files changed, 10 insertions(+) > > d

Re: [PATCH v1 12/13] xen/pvcalls: implement frontend disconnect

2017-07-24 Thread Juergen Gross
On 22/07/17 02:12, Stefano Stabellini wrote: > Implement pvcalls frontend removal function. Go through the list of > active and passive sockets and free them all, one at a time. > > Signed-off-by: Stefano Stabellini > CC: boris.ostrov...@oracle.com > CC: jgr...@suse.com Reviewed-by: Juergen Gros

Re: [PATCH v1 11/13] xen/pvcalls: implement release command

2017-07-24 Thread Juergen Gross
On 22/07/17 02:12, Stefano Stabellini wrote: > Send PVCALLS_RELEASE to the backend and wait for a reply. Take both > in_mutex and out_mutex to avoid concurrent accesses. Then, free the > socket. > > Signed-off-by: Stefano Stabellini > CC: boris.ostrov...@oracle.com > CC: jgr...@suse.com > --- >

Re: [PATCH 08/10] percpu: change the number of pages marked in the first_chunk bitmaps

2017-07-24 Thread Dennis Zhou
On Mon, Jul 17, 2017 at 03:26:02PM -0400, Tejun Heo wrote: > > This patch changes the allocator to only mark allocated pages for the > > region the population bitmap is used for. Prior, the bitmap was marked > > completely used as the first chunk was allocated and immutable. This is > > misleading

[PATCH] ext4: backward compatibility support for Lustre ea_inode implementation

2017-07-24 Thread Tahsin Erdogan
Original Lustre ea_inode feature did not have ref counts on xattr inodes because there was always one parent that referenced it. New implementation expects ref count to be initialized which is not true for Lustre case. Handle this by detecting Lustre created xattr inode and set its ref count to 1.

Re: [PATCH v1 10/13] xen/pvcalls: implement poll command

2017-07-24 Thread Juergen Gross
On 22/07/17 02:12, Stefano Stabellini wrote: > For active sockets, check the indexes and use the inflight_conn_req > waitqueue to wait. > > For passive sockets, send PVCALLS_POLL to the backend. Use the > inflight_accept_req waitqueue if an accept is outstanding. Otherwise use > the inflight_req w

[RFC Part2 PATCH v3 25/26] KVM: SVM: Do not install #UD intercept when SEV is enabled

2017-07-24 Thread Brijesh Singh
On #UD, x86_emulate_instruction() fetches the data from guest memory and decodes the instruction bytes to assist further. When SEV is enabled, the instruction bytes will be encrypted using the guest-specific key, hypervisor will no longer able to fetch the instruction bytes to assist UD handling. B

[RFC Part2 PATCH v3 26/26] KVM: X86: Restart the guest when insn_len is zero and SEV is enabled

2017-07-24 Thread Brijesh Singh
On AMD platform, under certain conditions insn_len may be zero on #NPF. This can happen if guest gets a page-fault on data access, but HW table walker is not able to read the instruction page (e.g instuction page is not present in memory). Typically, when insn_len is zero, x86_emulate_instruction(

[RFC Part2 PATCH v3 20/26] KVM: SVM: Add support for SEV DEBUG_DECRYPT command

2017-07-24 Thread Brijesh Singh
The command is used for decrypting a guest memory region for debug purposes. Signed-off-by: Brijesh Singh --- arch/x86/kvm/svm.c | 160 + 1 file changed, 160 insertions(+) diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index 21f85e1..933

[RFC Part2 PATCH v3 21/26] KVM: SVM: Add support for SEV DEBUG_ENCRYPT command

2017-07-24 Thread Brijesh Singh
The command copies a plain text into guest memory and encrypts it using the VM encryption key. The command will be used for debug purposes (e.g setting breakpoint through gdbserver) Signed-off-by: Brijesh Singh --- arch/x86/kvm/svm.c | 174 + 1

[RFC Part2 PATCH v3 22/26] KVM: SVM: Pin guest memory when SEV is active

2017-07-24 Thread Brijesh Singh
The SEV memory encryption engine uses a tweak such that two identical plaintexts at different location will have a different ciphertexts. So swapping or moving ciphertexts of two pages will not result in plaintexts being swapped. Relocating (or migrating) a physical backing pages for SEV guest will

[RFC Part2 PATCH v3 23/26] KVM: X86: Add memory encryption enabled ops

2017-07-24 Thread Brijesh Singh
Extend kvm_x86_ops to add memory_encyption_enabled() ops. It returns a boolean indicating whether memory encryption is enabled on the VCPU. Signed-off-by: Brijesh Singh --- arch/x86/include/asm/kvm_host.h | 1 + arch/x86/kvm/svm.c | 8 2 files changed, 9 insertions(+) diff

[RFC Part2 PATCH v3 24/26] KVM: SVM: Clear C-bit from the page fault address

2017-07-24 Thread Brijesh Singh
When SEV is active, on #NPF the page fault address will contain C-bit. We must clear the C-bit before handling the fault. Signed-off-by: Brijesh Singh --- arch/x86/kvm/svm.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index 0bbd050.

[RFC Part2 PATCH v3 17/26] KVM: SVM: Add support for SEV LAUNCH_MEASURE command

2017-07-24 Thread Brijesh Singh
The command is used to retrieve the measurement of memory encrypted through the LAUNCH_UPDATE_DATA command. This measurement can be used for attestation purposes. Signed-off-by: Brijesh Singh --- arch/x86/kvm/svm.c | 52 1 file changed, 52 ins

[RFC Part2 PATCH v3 19/26] KVM: svm: Add support for SEV GUEST_STATUS command

2017-07-24 Thread Brijesh Singh
The command is used for querying the SEV guest status. Signed-off-by: Brijesh Singh --- arch/x86/kvm/svm.c | 38 ++ 1 file changed, 38 insertions(+) diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index 7a77197..21f85e1 100644 --- a/arch/x86/kvm/svm.c ++

[RFC Part2 PATCH v3 18/26] KVM: SVM: Add support for SEV LAUNCH_FINISH command

2017-07-24 Thread Brijesh Singh
The command is used for finializing the SEV guest launch process. Signed-off-by: Brijesh Singh --- arch/x86/kvm/svm.c | 23 +++ 1 file changed, 23 insertions(+) diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index 9b672eb..7a77197 100644 --- a/arch/x86/kvm/svm.c +++ b/

Re: [PATCH 07/10] percpu: fix misnomer in schunk/dchunk variable names

2017-07-24 Thread Dennis Zhou
Hi Tejun, On Mon, Jul 17, 2017 at 03:10:09PM -0400, Tejun Heo wrote: > > /* > > +* Initialize first chunk. > > +* pcpu_first_chunk will always manage the dynamic region of the > > +* first chunk. The static region is dropped as those addresses > > Would "not covered by any chunk

Re: v4.13-rc2: usb mouse stopped working?

2017-07-24 Thread Jiri Kosina
On Mon, 24 Jul 2017, Pavel Machek wrote: > On thinkpad x220, USB mouse stopped working in v4.13-rc2. v4.12 was > ok, iirc. > > Now, USB mouse is so common hw that I may have something wrong in my > config...? But I did not change anything there. Well, your particular USB mouse requires an always

[RFC Part2 PATCH v3 15/26] KVM: SVM: Add support for SEV LAUNCH_START command

2017-07-24 Thread Brijesh Singh
The command is used to bootstrap SEV guest from unencrypted boot images. The command creates a new VM encryption key (VEK) using the guest owner's policy, public DH certificates, and session information. Signed-off-by: Brijesh Singh --- arch/x86/kvm/svm.c | 165 ++

[RFC Part2 PATCH v3 16/26] KVM: SVM: Add support for SEV LAUNCH_UPDATE_DATA command

2017-07-24 Thread Brijesh Singh
The command is used for encrypting the guest memory region using the VM encryption key (VEK) created during LAUNCH_START. Signed-off-by: Brijesh Singh --- arch/x86/kvm/svm.c | 165 + 1 file changed, 165 insertions(+) diff --git a/arch/x86/kvm/

[RFC Part2 PATCH v3 13/26] KVM: SVM: Add KVM_SEV_INIT command

2017-07-24 Thread Brijesh Singh
The command initializes the SEV firmware and allocate a new ASID for this guest from SEV ASID pool. The firmware must be initialized before we issue guest launch command to create a new encryption context. Signed-off-by: Brijesh Singh --- arch/x86/kvm/svm.c | 188

[RFC Part2 PATCH v3 14/26] KVM: SVM: VMRUN should use assosiated ASID when SEV is enabled

2017-07-24 Thread Brijesh Singh
SEV hardware uses ASIDs to associate memory encryption key with the guest VMs. During the guest creation time, we use SEV_CMD_ACTIVATE command to bind a particular ASID to the guest. Lets make sure that VMCB is programmed with the binded ASID before a VMRUN. Signed-off-by: Brijesh Singh --- arch

[RFC Part2 PATCH v3 11/26] KVM: X86: Extend struct kvm_arch to include SEV information

2017-07-24 Thread Brijesh Singh
The patch adds a new member (sev_info) in 'struct kvm_arch', and setter/getter functions for the sev_info field. Signed-off-by: Brijesh Singh --- arch/x86/include/asm/kvm_host.h | 9 + arch/x86/kvm/svm.c | 45 + 2 files changed, 54 in

[RFC Part2 PATCH v3 12/26] KVM: Define SEV key management command id

2017-07-24 Thread Brijesh Singh
Define Secure Encrypted Virtualization (SEV) key management command id and structure. The command definition is available in SEV KM [1] spec 0.14 and Documentation/virtual/kvm/amd-memory-encryption.txt [1] http://support.amd.com/TechDocs/55766_SEV-KM API_Specification.pdf Signed-off-by: Brijesh S

Re: [PATCH 05/10] percpu: change reserved_size to end page aligned

2017-07-24 Thread Dennis Zhou
Hi Tejun, On Mon, Jul 17, 2017 at 12:46:50PM -0400, Tejun Heo wrote: > Heh, that was pretty difficult to parse, but here's my question. So, > we're expanding reserved area so that its end aligns to page boundary > which is completely fine. We may end up with reserved area which is a > bit larg

Re: bcache with existing ext4 filesystem

2017-07-24 Thread Pavel Machek
Hi! On Mon 2017-07-24 15:27:18, Theodore Ts'o wrote: > On Mon, Jul 24, 2017 at 09:15:48PM +0200, Pavel Machek wrote: > > > > > > Am 24.07.2017 um 20:57 schrieb Pavel Machek: > > > >Would it be feasible to run bcache (write-through) with existing ext4 > > > >filesystem? > > > > > > > >I have 400GB

[RFC Part2 PATCH v3 10/26] KVM: Introduce KVM_MEMORY_ENCRYPT_REGISTER/UNREGISTER_RAM ioctl

2017-07-24 Thread Brijesh Singh
If hardware support memory encryption then KVM_MEMORY_REGISTER_RAM and KVM_MEMORY_UNREGISTER_RAM ioctl's can be used by userspace to register/ unregister the guest memory regions which may contains the encrypted data (e.g guest RAM, PCI BAR, SMRAM etc). Signed-off-by: Brijesh Singh --- arch/x86/

[RFC Part2 PATCH v3 08/26] KVM: X86: Extend CPUID range to include new leaf

2017-07-24 Thread Brijesh Singh
This CPUID provides the memory encryption support information on AMD Platform. The complete description for CPUID leaf is available in APM volume 2, Section 15.34 Signed-off-by: Brijesh Singh --- arch/x86/kvm/cpuid.c | 2 +- arch/x86/kvm/svm.c | 6 ++ 2 files changed, 7 insertions(+), 1 de

[RFC Part2 PATCH v3 07/26] KVM: SVM: Add SEV feature definitions to KVM

2017-07-24 Thread Brijesh Singh
From: Tom Lendacky Define the SEV enable bit for the VMCB control structure. The hypervisor will use this bit to enable SEV in the guest. Signed-off-by: Tom Lendacky Signed-off-by: Brijesh Singh --- arch/x86/include/asm/svm.h | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/x86/includ

[RFC Part2 PATCH v3 09/26] KVM: Introduce KVM_MEMORY_ENCRYPT_OP ioctl

2017-07-24 Thread Brijesh Singh
If hardware supports encrypting then KVM_MEMORY_ENCRYPT_OP ioctl can be used by qemu to issue platform specific memory encryption commands. Signed-off-by: Brijesh Singh Reviewed-by: Paolo Bonzini --- arch/x86/include/asm/kvm_host.h | 2 ++ arch/x86/kvm/x86.c | 12 inc

[RFC Part2 PATCH v3 04/26] KVM: SVM: Prepare to reserve asid for SEV guest

2017-07-24 Thread Brijesh Singh
In current implementation, asid allocation starts from 1, this patch adds a min_asid variable in svm_vcpu structure to allow starting asid from something other than 1. Signed-off-by: Brijesh Singh Reviewed-by: Paolo Bonzini --- arch/x86/kvm/svm.c | 4 +++- 1 file changed, 3 insertions(+), 1 del

[RFC Part2 PATCH v3 06/26] KVM: SVM: Prepare for new bit definition in nested_ctl

2017-07-24 Thread Brijesh Singh
From: Tom Lendacky Currently the nested_ctl variable in the vmcb_control_area structure is used to indicate nested paging support. The nested paging support field is actually defined as bit 0 of the field. In order to support a new feature flag the usage of the nested_ctl and nested paging suppor

[RFC Part2 PATCH v3 03/26] crypto: ccp: Add Secure Encrypted Virtualization (SEV) device support

2017-07-24 Thread Brijesh Singh
AMDs new Secure Encrypted Virtualization (SEV) feature allows the memory contents of a virtual machine to be transparently encrypted with a key unique to the guest VM. The programming and management of the encryption keys are handled by the AMD Secure Processor (AMD-SP), which exposes the commands

<    1   2   3   4   5   6   7   8   9   10   >