Re: kernel BUG at crypto/asymmetric_keys/public_key.c:80

2017-11-23 Thread Johannes Berg
On Thu, 2017-11-23 at 09:47 -0800, Florian Fainelli wrote: > Absolutely, please find it enclosed. Thanks. This is a bit odd. I didn't think the most likely reason is that you have CONFIG_CRYPTO_SHA256=m but everything else built-in. Thus, when loading the certificate, there's no way to calcula

Re: [PATCH 1/1] Input: ims-pcu - fix typo in an error log

2017-11-23 Thread Leizhen (ThunderTown)
On 2017/11/24 15:17, Joe Perches wrote: > On Fri, 2017-11-24 at 14:59 +0800, Zhen Lei wrote: >> Tiny typo fixed in an error log. >> >> I found this when I backported the CVE-2017-16645 patch: >> ea04efee7635 ("Input: ims-psu - check if CDC union descriptor is sane") >> >> Signed-off-by: Zhen Lei

Re: [PATCH v2 18/18] arm64: select ARCH_SUPPORTS_LTO_CLANG

2017-11-23 Thread Dmitry Vyukov
On Thu, Nov 23, 2017 at 2:42 PM, Alexander Potapenko wrote: > >> > Ideally we'd get the toolchain people to commit to supporting the > >> > kernel > >> > memory model along side the C11 one. That would help a ton. > >> > >> Does anyone from the kernel side participate in

Re: [PATCH] media: coda: fix comparision of decoded frames' indexes

2017-11-23 Thread Martin Kepplinger
Am 22.11.2017 14:43 schrieb Philipp Zabel: Hi Martin, On Fri, 2017-11-17 at 15:30 +0100, Martin Kepplinger wrote: At this point the driver looks the currently decoded frame's index and compares is to VPU-specific state values. Directly before this if and else statements the indexes are read (in

Re: [PATCH] mm: Do not stall register_shrinker

2017-11-23 Thread Michal Hocko
On Fri 24-11-17 09:04:59, Minchan Kim wrote: > Shakeel Butt reported, he have observed in production system that > the job loader gets stuck for 10s of seconds while doing mount > operation. It turns out that it was stuck in register_shrinker() > and some unrelated job was under memory pressure and

Re: [PATCH v2] fs: handle shrinker registration failure in sget_userns

2017-11-23 Thread Michal Hocko
On Fri 24-11-17 06:51:09, Tetsuo Handa wrote: > Al Viro wrote: > > On Fri, Nov 24, 2017 at 12:35:29AM +0900, Tetsuo Handa wrote: > > > Al Viro wrote: > > > > On Fri, Nov 24, 2017 at 12:04:23AM +0900, Tetsuo Handa wrote: > > > > > Al Viro wrote: > > > > > > On Thu, Nov 23, 2017 at 03:35:37PM +0100,

Re: [PATCH] Add slowpath enter/exit trace events

2017-11-23 Thread peter enderborg
On 11/23/2017 02:43 PM, Tetsuo Handa wrote: > Please see my attempt at > http://lkml.kernel.org/r/1510833448-19918-1-git-send-email-penguin-ker...@i-love.sakura.ne.jp > . > Printing just current thread is not sufficient for me. > > Seems to  me that it is a lot more overhead with timers and stuff.

[PATCH 4/4] ASoC: wm2000: Improve a size determination in wm2000_i2c_probe()

2017-11-23 Thread SF Markus Elfring
From: Markus Elfring Date: Fri, 24 Nov 2017 08:18:14 +0100 Replace the specification of a data structure by a pointer dereference as the parameter for the operator "sizeof" to make the corresponding size determination a bit safer according to the Linux coding style convention. This issue was det

[PATCH v2] xfs: handle register_shrinker error

2017-11-23 Thread Michal Hocko
On Fri 24-11-17 09:00:46, Dave Chinner wrote: > On Thu, Nov 23, 2017 at 05:11:37PM +0100, Michal Hocko wrote: > > On Fri 24-11-17 01:01:10, Tetsuo Handa wrote: > > > Michal Hocko wrote: > > > > On Thu 23-11-17 05:26:33, Christoph Hellwig wrote: > > > > > Looks good, > > > > > > > > > > Reviewed-by

[PATCH 3/4] ASoC: wm2000: Fix a typo in a comment line

2017-11-23 Thread SF Markus Elfring
From: Markus Elfring Date: Fri, 24 Nov 2017 08:02:57 +0100 Delete a duplicate character in a word of this description. Signed-off-by: Markus Elfring --- sound/soc/codecs/wm2000.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/sound/soc/codecs/wm2000.c b/sound/soc/codecs/wm

[PATCH 2/4] ASoC: wm2000: One function call less in wm2000_i2c_probe() after error detection

2017-11-23 Thread SF Markus Elfring
From: Markus Elfring Date: Fri, 24 Nov 2017 07:45:59 +0100 The release_firmware() function was called in a few cases by the wm2000_i2c_probe() function during error handling even if the passed variable contained a null pointer. * Adjust jump targets according to the Linux coding style convention

Re: [PATCH] schedule: use unlikely()

2017-11-23 Thread Ingo Molnar
* Mikulas Patocka wrote: > A small patch for schedule(), so that the code goes straght in the common > case. > > Signed-off-by: Mikulas Patocka > > --- > include/linux/blkdev.h |2 +- > kernel/sched/core.c|2 +- > 2 files changed, 2 insertions(+), 2 deletions(-) > > Index: linux

[PATCH 1/4] ASoC: wm2000: Delete an error message for a failed memory allocation in wm2000_i2c_probe()

2017-11-23 Thread SF Markus Elfring
From: Markus Elfring Date: Thu, 23 Nov 2017 22:28:00 +0100 Omit an extra message for a memory allocation failure in this function. This issue was detected by using the Coccinelle software. Signed-off-by: Markus Elfring --- sound/soc/codecs/wm2000.c | 1 - 1 file changed, 1 deletion(-) diff -

RE: [dm-devel] [PATCH 3/4] dm: convert dm_dev_internal.count from atomic_t to refcount_t

2017-11-23 Thread Reshetova, Elena
> On Fri, Oct 20, 2017 at 10:37:38AM +0300, Elena Reshetova wrote: > > } else if (dd->dm_dev->mode != (mode | dd->dm_dev->mode)) { > > r = upgrade_mode(dd, mode, t->md); > > if (r) > > return r; > > + refcount_inc(&dd->count); > > } > >

[PATCH 0/4] ASoC: wm2000: Adjustments for wm2000_i2c_probe()

2017-11-23 Thread SF Markus Elfring
From: Markus Elfring Date: Fri, 24 Nov 2017 08:26:56 +0100 A few update suggestions were taken into account from static source code analysis. Markus Elfring (4): Delete an error message for a failed memory allocation One function call less in wm2000_i2c_probe() after error detection Fix a

Re: [PATCH 00/23] [v4] KAISER: unmap most of the kernel from userspace page tables

2017-11-23 Thread Ingo Molnar
* Dave Hansen wrote: > On 11/23/2017 10:35 PM, Ingo Molnar wrote: > > So the pteval_t changes break the build on most non-x86 architectures > > (alpha, arm, > > arm64, etc.), because most of them don't have an asm/pgtable_types.h file. > > > > pteval_t is an x86-ism. > > > > So I left out th

NULL pointer dereference in process_one_work

2017-11-23 Thread baiyaowei
Hi,tj and jiangshan, I build a ceph storage pool to run some benchmarks with 3.10 kernel. Occasionally, when the cpus' load is very high, some nodes crash with message below. [292273.612014] BUG: unable to handle kernel NULL pointer dereference at 0008 [292273.612057] IP: [] process_o

[PATCH 1/2] powerpc/lib/code-patching: refactor patch_instruction()

2017-11-23 Thread Christophe Leroy
patch_instruction() uses almost the same sequence as __patch_instruction() This patch refactor it so that patch_instruction() uses __patch_instruction() instead of duplicating code. Signed-off-by: Christophe Leroy --- arch/powerpc/lib/code-patching.c | 30 +++--- 1 file

[PATCH 2/2] powerpc/lib/feature-fixups: use raw_patch_instruction()

2017-11-23 Thread Christophe Leroy
feature fixups need to use patch_instruction() early in the boot, even before the code is relocated to its final address, requiring patch_instruction() to use PTRRELOC() in order to address data. But feature fixups applies on code before it is set to read only, even for modules. Therefore, feature

Re: [PATCH v2] gpio: davinci: Assign first bank regs for unbanked case

2017-11-23 Thread Keerthy
On Friday 10 November 2017 04:43 PM, Keerthy wrote: > As per the re-design assign the first bank regs for unbanked > irq case. This was missed out in the original patch. Linus, A gentle ping. - Keerthy > > Signed-off-by: Keerthy > Fixes: b5cf3fd827d2e1 ("gpio: davinci: Redesign driver to ac

Re: [PATCH 2/2] scripts: leaking_addresses: help screen updates

2017-11-23 Thread Kaiwan N Billimoria
On Fri, Nov 24, 2017 at 11:29 AM, Tobin C. Harding wrote: > Neither of these patches applies to my tree. Are you editing the diff's > by hand? I noticed the patches don't end with the version signature, like > this: > > > 2.7.4 I cloned your tree from here: https://github.com/tcharding/lin

Re: [PATCH 1/1] Input: ims-pcu - fix typo in an error log

2017-11-23 Thread Joe Perches
On Fri, 2017-11-24 at 14:59 +0800, Zhen Lei wrote: > Tiny typo fixed in an error log. > > I found this when I backported the CVE-2017-16645 patch: > ea04efee7635 ("Input: ims-psu - check if CDC union descriptor is sane") > > Signed-off-by: Zhen Lei > --- > drivers/input/misc/ims-pcu.c | 2 +- >

[PATCH 1/1] Input: ims-pcu - fix typo in an error log

2017-11-23 Thread Zhen Lei
Tiny typo fixed in an error log. I found this when I backported the CVE-2017-16645 patch: ea04efee7635 ("Input: ims-psu - check if CDC union descriptor is sane") Signed-off-by: Zhen Lei --- drivers/input/misc/ims-pcu.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/

[PATCH 2/6] clk: lpc32xx: pr_err() strings should end with newlines

2017-11-23 Thread Arvind Yadav
pr_err() messages should end with a new-line to avoid other messages being concatenated. Signed-off-by: Arvind Yadav --- drivers/clk/nxp/clk-lpc32xx.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/clk/nxp/clk-lpc32xx.c b/drivers/clk/nxp/clk-lpc32xx.c index 7b359

[PATCH 6/6] clk: h8300: pr_err() strings should end with newlines

2017-11-23 Thread Arvind Yadav
pr_err() messages should end with a new-line to avoid other messages being concatenated. Signed-off-by: Arvind Yadav --- drivers/clk/h8300/clk-div.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/clk/h8300/clk-div.c b/drivers/clk/h8300/clk-div.c index 4ae6244..d4

Re: [PATCH] arm64: dts: Hi3660: Fix state id for 'CPU_NAP' state

2017-11-23 Thread Leo Yan
Hi Sudeep, On Thu, Nov 23, 2017 at 02:03:51PM +, Sudeep Holla wrote: > Hi Daniel, > > Thanks a lot for pointing me to this and having some useful discussion > in private. That helped to dig a bit further on this. > > On 23/11/17 05:40, Leo Yan wrote: > > Thanks a lot for Vincent Guittot care

[PATCH 1/6] clk: stm32f4: pr_err() strings should end with newlines

2017-11-23 Thread Arvind Yadav
pr_err() messages should end with a new-line to avoid other messages being concatenated. Signed-off-by: Arvind Yadav --- drivers/clk/clk-stm32f4.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/clk/clk-stm32f4.c b/drivers/clk/clk-stm32f4.c index 96c6b6b..da44f8d 1006

[PATCH 3/6] clk: SPEAr: pr_err() strings should end with newlines

2017-11-23 Thread Arvind Yadav
pr_err() messages should end with a new-line to avoid other messages being concatenated. Signed-off-by: Arvind Yadav --- drivers/clk/spear/clk-frac-synth.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/clk/spear/clk-frac-synth.c b/drivers/clk/spear/clk-frac-synth.c

[PATCH 5/6] clk: h8s2678: pr_err() strings should end with newlines

2017-11-23 Thread Arvind Yadav
pr_err() messages should end with a new-line to avoid other messages being concatenated. Signed-off-by: Arvind Yadav --- drivers/clk/h8300/clk-h8s2678.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/drivers/clk/h8300/clk-h8s2678.c b/drivers/clk/h8300/clk-h8s2678.c ind

[PATCH 4/6] SPEAr: clk: pr_err() strings should end with newlines

2017-11-23 Thread Arvind Yadav
pr_err() messages should end with a new-line to avoid other messages being concatenated. Signed-off-by: Arvind Yadav --- drivers/clk/spear/clk-gpt-synth.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/clk/spear/clk-gpt-synth.c b/drivers/clk/spear/clk-gpt-synth.c in

[PATCH 0/6] clk: pr_err() strings should end with newlines

2017-11-23 Thread Arvind Yadav
pr_err() messages should end with a new-line to avoid other messages being concatenated. Arvind Yadav (6): [PATCH 1/6] clk: stm32f4: pr_err() strings should end with newlines [PATCH 2/6] clk: lpc32xx: pr_err() strings should end with newlines [PATCH 3/6] clk: SPEAr: pr_err() strings should e

$27M USD

2017-11-23 Thread Sgt. Britta Lopez
Apologies! I am a military woman ,seeking your kind assistance. --- This email has been checked for viruses by Avast antivirus software. https://www.avast.com/antivirus

Re: [PATCH] fat: Fix sb_rdonly() change

2017-11-23 Thread Joe Perches
On Fri, 2017-11-24 at 15:07 +0900, OGAWA Hirofumi wrote: > Joe Perches writes: > > > On Thu, 2017-11-23 at 15:29 +0900, OGAWA Hirofumi wrote: > > > Ouch forgot to add stable@ > > > > > > -- > > > commit bc98a42c1f7d0f886c0c1b75a92a004976a46d9f introduced bug. > > > > I think your commit messag

Re: Review of "[PATCH v2 0/3] virt: Add vboxguest driver for Virtual Box Guest integration"

2017-11-23 Thread Greg Kroah-Hartman
On Thu, Nov 23, 2017 at 07:37:48PM +0100, Hans de Goede wrote: > Hi Arnd, Greg, > > It seems that since there are no obvious glaring issues > with v2 of my vboxguest driver series it is now stuck > waiting for review. It's also the merge window and I can't do anything then... > Larry Finger (in

Re: [PATCH 00/23] [v4] KAISER: unmap most of the kernel from userspace page tables

2017-11-23 Thread Dave Hansen
On 11/23/2017 10:35 PM, Ingo Molnar wrote: > So the pteval_t changes break the build on most non-x86 architectures (alpha, > arm, > arm64, etc.), because most of them don't have an asm/pgtable_types.h file. > > pteval_t is an x86-ism. > > So I left out the changes below. There was a warning on

Re: [PATCH 00/23] [v4] KAISER: unmap most of the kernel from userspace page tables

2017-11-23 Thread Ingo Molnar
til after CR3 switch) > > Rather than re-spamming everyone, the resulting branch is here: > > https://git.kernel.org/pub/scm/linux/kernel/git/daveh/x86-kaiser.git/log/?h=kaiser-414-tipwip-20171123 > > If anyone wants to be re-spammed, just say the word. So the pteval_t changes break t

Re: [PATCH 1/6] perf: Add new type PERF_TYPE_PROBE

2017-11-23 Thread Alexei Starovoitov
On 11/23/17 2:02 AM, Peter Zijlstra wrote: On Wed, Nov 15, 2017 at 09:23:33AM -0800, Song Liu wrote: Note: We use type __u64 for pointer probe_desc instead of __aligned_u64. The reason here is to avoid changing the size of struct perf_event_attr, and breaking new-kernel-old-utility scenario. To

Re: [PATCH RT 03/10] random: avoid preempt_disable()ed section

2017-11-23 Thread Alex Shi
Hi Steve, I just build the patches, a build error found here: drivers/char/random.c: In function ‘get_random_int’: drivers/char/random.c:1816:7: error: assignment from incompatible pointer type [-Werror=incompatible-pointer-types] hash = &get_locked_var(hash_entropy_int_lock, get_random_int_ha

Re: [PATCH v2 00/11] Rockchip ISP1 Driver

2017-11-23 Thread Jacob Chen
HI all, 2017-11-24 10:36 GMT+08:00 Jacob Chen : > This patch series add a ISP(Camera) v4l2 driver for rockchip rk3288/rk3399 > SoC. > > Kernel Branch: > https://github.com/wzyy2/linux/tree/rkisp1/drivers/media/platform/rockchip/isp1 > > Below are some infomations about driver/hardware: > > Rockch

Re: regression: 4.13 cannot follow symlinks on some ext3 fs

2017-11-23 Thread Andreas Dilger
On Nov 23, 2017, at 7:04 PM, Andi Kleen wrote: > >> As a workaround, you could delete and recreate the symlink with the new > > I revert the patch for now. Everything seems to work. > >> kernel to create a proper fast symlink. It would be useful to scan >> the image to see if there are other s

Re: [PATCH] fat: Fix sb_rdonly() change

2017-11-23 Thread OGAWA Hirofumi
Joe Perches writes: > On Thu, 2017-11-23 at 15:29 +0900, OGAWA Hirofumi wrote: >> Ouch forgot to add stable@ >> >> -- >> commit bc98a42c1f7d0f886c0c1b75a92a004976a46d9f introduced bug. > > I think your commit message needs a bit more information. > > It'd be useful to describe that the introduc

Re: [PATCH 2/2] scripts: leaking_addresses: help screen updates

2017-11-23 Thread Tobin C. Harding
On Thu, Nov 23, 2017 at 10:45:31AM +0530, kaiwan.billimo...@gmail.com wrote: > The current leaking_addresses.pl script only supports showing "leaked" > 64-bit kernel virtual addresses. This patch modifies the "help" screen in the > following manner: > - the '--raw', '--suppress-dmesg', '--squash-by

[RFC v2] dma-coherent: introduce no-align to avoid allocation failure and save memory

2017-11-23 Thread Jaewon Kim
dma-coherent uses bitmap APIs which internally consider align based on the requested size. If most of allocations are small size like KBs, using alignment scheme seems to be good for anti-fragmentation. But if large allocation are commonly used, then an allocation could be failed because of the ali

Re: [PATCH 1/2] scripts: leaking_addresses: add support for 32-bit kernel addresses

2017-11-23 Thread Tobin C. Harding
Hi Kaiwan, thanks for the patches! On Thu, Nov 23, 2017 at 10:44:00AM +0530, kaiwan.billimo...@gmail.com wrote: > The current leaking_addresses.pl script only supports showing "leaked" > 64-bit kernel virtual addresses. This patch adds support for showing > "leaked" 32-bit kernel virtual addresse

Re: [PATCH v2 1/5] mm: memory_hotplug: Memory hotplug (add) support for arm64

2017-11-23 Thread Arun KS
On Thu, Nov 23, 2017 at 4:43 PM, Maciej Bielski wrote: > Introduces memory hotplug functionality (hot-add) for arm64. > > Changes v1->v2: > - swapper pgtable updated in place on hot add, avoiding unnecessary copy: > all changes are additive and non destructive. > > - stop_machine used to updated

Re: [PATCH] crypto: arm64/aes - do not call crypto_unregister_skcipher twice on error

2017-11-23 Thread LABBE Corentin
On Wed, Nov 22, 2017 at 08:55:14AM +, Ard Biesheuvel wrote: > Hello Corentin, > > On 22 November 2017 at 08:08, Corentin Labbe wrote: > > When a cipher fail > > fails > > > to register in aes_init(), the error path go thought > > goes through > > > aes_exit() then crypto_unregister_skciph

[PATCH 1/2] dt-bindings: clocksource: Add Spreadtrum SC9860 timer

2017-11-23 Thread Baolin Wang
This patch adds documentation of device tree bindings for the timers found on Spreadtrum SC9860 platform. Signed-off-by: Baolin Wang --- .../bindings/timer/spreadtrum,sprd-timer.txt | 20 1 file changed, 20 insertions(+) create mode 100644 Documentation/devicetree/

[PATCH 2/2] clocksource: sprd: Add timer driver for Spreadtrum SC9860 platform

2017-11-23 Thread Baolin Wang
The Spreadtrum SC9860 platform will use the architected timers as local clock events, but we also need a broadcast timer device to wakeup the cpus when the cpus are in sleep mode. Thus this patch registers the timer0 to be a broadcast timer supporting periodic and oneshot events. Signed-off-by: B

Re: [PATCH] ASoC: amd: added error checks in dma driver

2017-11-23 Thread Mukunda,Vijendar
On Thursday 23 November 2017 10:59 PM, Mark Brown wrote: On Thu, Nov 23, 2017 at 08:59:43AM -0800, Guenter Roeck wrote: On Thu, Nov 23, 2017 at 8:30 AM, Vijendar Mukunda wrote: added error checks in acp dma driver Signed-off-by: Vijendar Mukunda Signed-off-by: Akshu Agrawal Signed-off-by:

Re: [PATCH v2 1/2] s390/virtio: remove the old KVM virtio headers

2017-11-23 Thread Thomas Huth
On 24.11.2017 06:21, Michael S. Tsirkin wrote: > commit 7fb2b2d51 ("s390/virtio: remove the old KVM virtio transport") > dropped the transport support. We don't need to keep the header around. > > Cc: Thomas Huth > Cc: Cornelia Huck > Cc: Halil Pasic > Cc: Heiko Carstens > Cc: Martin Schwidefs

[PATCH v2 3/4] platform/x86: intel_telemetry: Improve S0ix logs

2017-11-23 Thread Souvik Kumar Chakravarty
Suspend with shallow wakes is not a useful parameter since the phenomena does not exist on deployed devices and is only a parameter of use during device power-on phase. The field always reads zero. Additionally there are other easier methods to detect it, e.g., if the S0ix counter increments by mor

[PATCH v3 2/4] platform/x86: intel_telemetry: Fix suspend stats

2017-11-23 Thread Souvik Kumar Chakravarty
Suspend stats are not reported consistently due to a limitation in the PMC firmware. This limitation causes a delay in updating the s0ix counters and residencies in the telemetry log upon s0ix exit. As a consequence, reading these counters from the suspend-exit notifier may result in zero read. Th

[PATCH v1 1/4] platform/x86: intel_pmc_ipc: Add read64 API

2017-11-23 Thread Souvik Kumar Chakravarty
Add intel_pmc_gcr_read64() API for reading from 64-bit GCR registers. This API will be called from intel_telemetry. Update description of intel_pmc_gcr_read(). Signed-off-by: Souvik Kumar Chakravarty --- arch/x86/include/asm/intel_pmc_ipc.h | 6 ++ drivers/platform/x86/intel_pmc_ipc.c | 33

[PATCH v2 4/4] platform/x86: intel_telemetry: Remove redundancies

2017-11-23 Thread Souvik Kumar Chakravarty
This patch removes unnecessary header files and newlines. It also fixes some alignment issues. Signed-off-by: Souvik Kumar Chakravarty --- drivers/platform/x86/intel_telemetry_debugfs.c | 13 +++-- 1 file changed, 3 insertions(+), 10 deletions(-) Changes since v1: * Consolidated alignm

[PATCH v3 0/4] platform/x86: intel_telemetry: Fix logs and formatting

2017-11-23 Thread Souvik Kumar Chakravarty
This patchset fixes https://bugzilla.kernel.org/show_bug.cgi?id=197833, and other issues related to telemetry counters. It also cleans up formatting and removes redundant code. It is rebased on top of the TESTING branch. Changes since v2: * Changes in GCR read API name and adding back static qua

[PATCH v2 1/2] s390/virtio: remove the old KVM virtio headers

2017-11-23 Thread Michael S. Tsirkin
commit 7fb2b2d51 ("s390/virtio: remove the old KVM virtio transport") dropped the transport support. We don't need to keep the header around. Cc: Thomas Huth Cc: Cornelia Huck Cc: Halil Pasic Cc: Heiko Carstens Cc: Martin Schwidefsky Signed-off-by: Michael S. Tsirkin --- arch/s390/include/u

[PATCH v2 2/2] s390/virtio: add BSD license to virtio-ccw

2017-11-23 Thread Michael S. Tsirkin
The original intent of the virtio header relicensing from 2008 was to make sure anyone can implement compatible devices/drivers. The virtio-ccw was omitted by mistake. We have an ack from the only contributor as well as the maintainer from IBM, so it's not too late to fix that. Make it dual-licen

Re: [PATCH] net-sysfs: export gso_max_size attribute

2017-11-23 Thread Stephen Hemminger
On Wed, 22 Nov 2017 16:30:41 -0800 Solio Sarabia wrote: > The netdevice gso_max_size is exposed to allow users fine-control on > systems with multiple NICs with different GSO buffer sizes, and where > the virtual devices like bridge and veth, need to be aware of the GSO > size of the underlying d

Re: [PATCH] frv: fix build failure

2017-11-23 Thread Alexey Brodkin
Hi Sudip, On Thu, 2017-11-23 at 23:01 +, Sudip Mukherjee wrote: > Hi Alexey, > > On Thu, Nov 23, 2017 at 05:17:19PM +, Alexey Brodkin wrote: > > > > Hi Sudip, > > > > On Tue, 2017-11-21 at 22:10 +, Sudip Mukherjee wrote: > > > > > > The frv defconfig build is failing with the error

Re: [PATCH] crypto: arm64/aes - do not call crypto_unregister_skcipher twice on error

2017-11-23 Thread Herbert Xu
On Wed, Nov 22, 2017 at 08:55:14AM +, Ard Biesheuvel wrote: > > Would this also fix it? Looks good. Could you resubmit with a sign-off? Thanks, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

Re: [PATCH 1/3] scsi: arcmsr: Add driver module parameter msi_enable

2017-11-23 Thread Ching Huang
Hello Dan, On Thu, 2017-11-23 at 13:44 +0300, Dan Carpenter wrote: > On Thu, Nov 23, 2017 at 09:27:19AM +0800, Ching Huang wrote: > > From: Ching Huang > > > > Add module parameter msi_enable to has a chance to disable msi interrupt if > > it does not work properly. > > > > Signed-off-by: Chin

[PATCH v3 01/19] x86/asm/64: Allocate and enable the SYSENTER stack

2017-11-23 Thread Andy Lutomirski
This will simplify future changes that want scratch variables early in the SYSENTER handler -- they'll be able to spill registers to the stack. It also lets us get rid of a SWAPGS_UNSAFE_STACK user. This does not depend on CONFIG_IA32_EMULATION because we'll want the stack space even without IA32

[PATCH v3 03/19] x86/gdt: Put per-cpu GDT remaps in ascending order

2017-11-23 Thread Andy Lutomirski
We currently have CPU 0's GDT at the top of the GDT range and higher-numbered CPUs at lower addresses. This happens because the fixmap is upside down (index 0 is the top of the fixmap). Flip it so that GDTs are in ascending order by virtual address. This will simplify a future patch that will gen

[PATCH v3 05/19] x86/kasan/64: Teach KASAN about the cpu_entry_area

2017-11-23 Thread Andy Lutomirski
The cpu_entry_area will contain stacks. Make sure that KASAN has appropriate shadow mappings for them. Cc: Andrey Ryabinin Cc: Alexander Potapenko Cc: Dmitry Vyukov Cc: kasan-...@googlegroups.com Signed-off-by: Andy Lutomirski --- arch/x86/mm/kasan_init_64.c | 13 - 1 file change

[PATCH v3 02/19] x86/dumpstack: Add get_stack_info() support for the SYSENTER stack

2017-11-23 Thread Andy Lutomirski
get_stack_info() doesn't currently know about the SYSENTER stack, so unwinding will fail if we entered the kernel on the SYSENTER stack and haven't fully switched off. Teach get_stack_info() about the SYSENTER stack. With future patches applied that run part of the entry code on the SYSENTER stac

[PATCH v3 07/19] x86/dumpstack: Handle stack overflow on all stacks

2017-11-23 Thread Andy Lutomirski
We currently special-case stack overflow on the task stack. We're going to start putting special stacks in the fixmap with a custom layout, so they'll have guard pages, too. Teach the unwinder to be able to unwind an overflow of any of the stacks. Reviewed-by: Borislav Petkov Signed-off-by: And

[PATCH v3 10/19] x86/asm/64: Separate cpu_current_top_of_stack from TSS.sp0

2017-11-23 Thread Andy Lutomirski
On 64-bit kernels, we used to assume that TSS.sp0 was the current top of stack. With the addition of an entry trampoline, this will no longer be the case. Store the current top of stack in TSS.sp1, which is otherwise unused but shares the same cacheline. Reviewed-by: Thomas Gleixner Signed-off-

[PATCH v3 09/19] x86/asm: Remap the TSS into the cpu entry area

2017-11-23 Thread Andy Lutomirski
This has a secondary purpose: it puts the entry stack into a region with a well-controlled layout. A subsequent patch will take advantage of this to streamline the SYSCALL entry code to be able to find it more easily. Reviewed-by: Thomas Gleixner Signed-off-by: Andy Lutomirski --- arch/x86/ent

[PATCH v3 08/19] x86/asm: Move SYSENTER_stack to the beginning of struct tss_struct

2017-11-23 Thread Andy Lutomirski
SYSENTER_stack should have reliable overflow detection, which means that it needs to be at the bottom of a page, not the top. Move it to the beginning of struct tss_struct and page-align it. Also add an assertion to make sure that the fixed hardware TSS doesn't cross a page boundary. Reviewed-by:

[PATCH v3 14/19] x86/entry/64: Create a percpu SYSCALL entry trampoline

2017-11-23 Thread Andy Lutomirski
Handling SYSCALL is tricky: the SYSCALL handler is entered with every single register (except FLAGS), including RSP, live. It somehow needs to set RSP to point to a valid stack, which means it needs to save the user RSP somewhere and find its own stack pointer. The canonical way to do this is wit

[PATCH v3 16/19] x86/irq/64: In the stack overflow warning, print the offending IP

2017-11-23 Thread Andy Lutomirski
In case something goes wrong with unwind (not unlikely in case of overflow), print the offending IP where we detected the overflow. Signed-off-by: Andy Lutomirski --- arch/x86/kernel/irq_64.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/x86/kernel/irq_64.c b/arch/

[PATCH v3 13/19] x86/asm/64: Return to userspace from the trampoline stack

2017-11-23 Thread Andy Lutomirski
By itself, this is useless. It gives us the ability to run some final code before exit that cannnot run on the kernel stack. This could include a CR3 switch a la KAISER or some kernel stack erasing, for example. (Or even weird things like *changing* which kernel stack gets used as an ASLR-streng

[PATCH v3 18/19] x86/entry/64: Remove the SYSENTER stack canary

2017-11-23 Thread Andy Lutomirski
Now that the SYSENTER stack has a guard page, there's no need for a canary to detect overflow after the fact. Signed-off-by: Andy Lutomirski --- arch/x86/include/asm/processor.h | 1 - arch/x86/kernel/dumpstack.c | 3 +-- arch/x86/kernel/process.c| 1 - arch/x86/kernel/traps.c

[PATCH v3 12/19] x86/asm/64: Use a percpu trampoline stack for IDT entries

2017-11-23 Thread Andy Lutomirski
Historically, IDT entries from usermode have always gone directly to the running task's kernel stack. Rearrange it so that we enter on a percpu trampoline stack and then manually switch to the task's stack. This touches a couple of extra cachelines, but it gives us a chance to run some code before

[PATCH v3 15/19] x86/irq: Remove an old outdated comment about context tracking races

2017-11-23 Thread Andy Lutomirski
That race has been fixed and code cleaned up for a while now. Signed-off-by: Andy Lutomirski --- arch/x86/kernel/irq.c | 12 1 file changed, 12 deletions(-) diff --git a/arch/x86/kernel/irq.c b/arch/x86/kernel/irq.c index 49cfd9fe7589..68e1867cca80 100644 --- a/arch/x86/kernel/irq.

[PATCH v3 17/19] x86/entry/64: Move the IST stacks into cpu_entry_area

2017-11-23 Thread Andy Lutomirski
The IST stacks are needed when an IST exception occurs and are accessed before any kernel code at all runs. Move them into cpu_entry_area. Signed-off-by: Andy Lutomirski --- arch/x86/include/asm/fixmap.h | 10 ++ arch/x86/kernel/cpu/common.c | 40 +--

[PATCH v3 11/19] x86/espfix/64: Stop assuming that pt_regs is on the entry stack

2017-11-23 Thread Andy Lutomirski
When we start using an entry trampoline, a #GP from userspace will be delivered on the entry stack, not on the task stack. Fix the espfix64 #DF fixup to set up #GP according to TSS.SP0, rather than assuming that pt_regs + 1 == SP0. This won't change anything without an entry stack, but it will ma

[PATCH v3 00/19] Entry stack switching

2017-11-23 Thread Andy Lutomirski
This sets up stack switching, including for SYSCALL. I think it's in decent shape. I'm fiddling with a patch to make the TSS remap read-only on 64-bit. Known issues: - I think we're going to want a way to turn the stack switching on and off either at boot time or at runtime. It should be fa

[PATCH v3 19/19] x86/entry: Clean up SYSENTER_stack code

2017-11-23 Thread Andy Lutomirski
The existing code was a mess, mainly because C arrays are nasty. Turn SYSENTER_stack into a struct, add a helper to find it, and do all the obvious cleanups this enables. Signed-off-by: Andy Lutomirski --- arch/x86/entry/entry_32.S| 4 ++-- arch/x86/entry/entry_64.S| 2 +- arch

[PATCH v3 04/19] x86/fixmap: Generalize the GDT fixmap mechanism

2017-11-23 Thread Andy Lutomirski
Currently, the GDT is an ad-hoc array of pages, one per CPU, in the fixmap. Generalize it to be an array of a new struct cpu_entry_area so that we can cleanly add new things to it. Reviewed-by: Thomas Gleixner Signed-off-by: Andy Lutomirski --- arch/x86/include/asm/desc.h | 9 + arc

[PATCH v3 06/19] x86/asm: Fix assumptions that the HW TSS is at the beginning of cpu_tss

2017-11-23 Thread Andy Lutomirski
A future patch will move SYSENTER_stack to the beginning of cpu_tss to help detect overflow. Before this can happen, fix several code paths that hardcode assumptions about the old layout Reviewed-by: Borislav Petkov Reviewed-by: Thomas Gleixner Signed-off-by: Andy Lutomirski --- arch/x86/incl

Re: XArray documentation

2017-11-23 Thread Andreas Dilger
On Nov 23, 2017, at 6:16 PM, Matthew Wilcox wrote: > > Here's the current state of the documentation for the XArray. Suggestions > for improvement gratefully received. > > == > XArray > == > > Overview > > > The XArray is an array of ULONG_MAX entries. Each entry can be eith

Re: [PATCH v8 4/5] crash: export paddr_vmcoreinfo_note()

2017-11-23 Thread Michael S. Tsirkin
On Thu, Nov 23, 2017 at 06:36:57AM -0800, Christoph Hellwig wrote: > On Thu, Nov 23, 2017 at 03:02:05PM +0100, Marc-André Lureau wrote: > > The following patch is going to use the symbol from the fw_cfg module, > > to call the function and write the note location details in the > > vmcoreinfo entry

Re: [PATCH v2 10/18] x86/asm: Remap the TSS into the cpu entry area

2017-11-23 Thread Andy Lutomirski
On Thu, Nov 23, 2017 at 6:40 PM, Andy Lutomirski wrote: > On Thu, Nov 23, 2017 at 12:37 PM, Borislav Petkov wrote: >> On Thu, Nov 23, 2017 at 12:15:14PM -0800, Andy Lutomirski wrote: >>> >> diff --git a/arch/x86/kernel/asm-offsets.c >>> >> b/arch/x86/kernel/asm-offsets.c >>> >> index b275863128e

Re: [PATCH v2 13/18] x86/asm/64: Use a percpu trampoline stack for IDT entries

2017-11-23 Thread Andy Lutomirski
On Thu, Nov 23, 2017 at 3:44 PM, Thomas Gleixner wrote: > On Tue, 21 Nov 2017, Andy Lutomirski wrote: >> The asm isn't exactly beautiful, > > Delightful euphemism :) > >> but I think that fully refactoring >> it can wait. > >> @@ -560,6 +560,14 @@ END(irq_entries_start) >> .macro interrupt f

RE: [PATCH 1/3] dt-bindings: Add vendor prefix for Allo.com

2017-11-23 Thread sudeep kumar
Acked-by : sudeep -Original Message- From: Andreas Färber [mailto:afaer...@suse.de] Sent: Tuesday, November 14, 2017 11:31 PM To: linux-arm-ker...@lists.infradead.org Cc: Thomas Liau ; Jeff Chen ; 张东风 ; 刘炜 ; 张天益 ; 梅利 ; Ioan B ; Sudeep Kumar ; linux-kernel@vger.kernel.org; Andreas Fär

RE: [PATCH 2/3] dt-bindings: arm: actions: Add Sparky

2017-11-23 Thread sudeep kumar
Acked-by : sudeep -Original Message- From: Andreas Färber [mailto:afaer...@suse.de] Sent: Tuesday, November 14, 2017 11:31 PM To: linux-arm-ker...@lists.infradead.org Cc: Thomas Liau ; Jeff Chen ; 张东风 ; 刘炜 ; 张天益 ; 梅利 ; Ioan B ; Sudeep Kumar ; linux-kernel@vger.kernel.org; Andreas Fär

[git pull] drm for 4.15 part 2 (updated)

2017-11-23 Thread Dave Airlie
Hi Linus, This is an incremental pull on top of yesterdays, it contains all of that, Summary from first pull: This is just some bits and pieces for the second half of the merge window, 1. Remove the MSM dt-bindings file Rob managed to push in the previous pull. 2. Add a property/edid quirk to de

Re: [GIT PULL] Second batch of KVM changes for Linux 4.15

2017-11-23 Thread Linus Torvalds
On Mon, Nov 20, 2017 at 2:06 PM, Paolo Bonzini wrote: > > I am not including the host side of AMD SEV, because it wouldn't have gotten > enough time in linux-next even with a "regular-length" merge window. It > will be in 4.16. So I pulled it, but then checked, None of this was in linux-next 20

Re: [PATCH] r8152: disable rx checksum offload on Dell TB dock

2017-11-23 Thread Kai Heng Feng
> On 23 Nov 2017, at 5:24 PM, Greg KH wrote: > > On Thu, Nov 23, 2017 at 04:53:41PM +0800, Kai Heng Feng wrote: >> >> What I want to do here is to finding this connection: >> Realtek r8153 <-> SMSC hub (USD ID: 0424:5537) <-> >> ASMedia XHCI controller (PCI ID: 1b21:1142). >> >> Is there a s

Re: [GIT PULL] UBI/UBIFS updates for 4.15-rc1

2017-11-23 Thread Linus Torvalds
On Thu, Nov 23, 2017 at 4:37 AM, Richard Weinberger wrote: > > git://git.infradead.org/linux-ubifs.git tags/upstream-4.15-rc1 Similarly to the arch/um case, none of this seems to have been in linux-next, and is sent late in the merge window, so I'm skipping it. Linus

Re: [GIT PULL] UML updates for 4.15-rc1

2017-11-23 Thread Linus Torvalds
On Thu, Nov 23, 2017 at 4:36 AM, Richard Weinberger wrote: > > git://git.kernel.org/pub/scm/linux/kernel/git/rw/uml.git for-linus-4.15-rc1 I asked people to send me their pull requests early before I was traveling, and this second week I'm only taking fixes, or things that were in linux-next.

Re: [PATCH 0/3] scsi: arcmsr: add driver module parameter - msi_enable, msix_enable

2017-11-23 Thread Ching Huang
On Thu, 2017-11-23 at 04:57 -0800, Christoph Hellwig wrote: > On Thu, Nov 23, 2017 at 09:22:03AM +0800, Ching Huang wrote: > > From: Ching Huang > > > > Hi all, > > > > The following patches apply to Martin's 4.16/scsi-queue. > > > > Patch 1: Add module parameter msi_enable to has a chance to d

Re: [PATCH 2/3] scsi: arcmsr: Add driver module parameter msix_enable

2017-11-23 Thread Ching Huang
On Thu, 2017-11-23 at 14:43 +0300, Dan Carpenter wrote: > On Thu, Nov 23, 2017 at 09:31:14AM +0800, Ching Huang wrote: > > @@ -829,12 +833,15 @@ arcmsr_request_irq(struct pci_dev *pdev, > > unsigned long flags; > > int nvec, i; > > > > + if (msix_enable == 0) > > + goto msi_in

Re: [PATCH 1/3] lockdep: Apply crossrelease to PG_locked locks

2017-11-23 Thread Byungchul Park
On Thu, Nov 16, 2017 at 02:07:46PM +0100, Michal Hocko wrote: > On Thu 16-11-17 21:48:05, Byungchul Park wrote: > > On 11/16/2017 9:02 PM, Michal Hocko wrote: > > > for each struct page. So you are doubling the size. Who is going to > > > enable this config option? You are moving this to page_ext i

[tip:WIP.x86/mm 37/50] arch/x86/events/intel/ds.c:296:2: note: in expansion of macro 'if'

2017-11-23 Thread kbuild test robot
tree: https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git WIP.x86/mm head: 7d2da250f83856bbf697d58a3c10c5673e8146bc commit: 93e8b1bed0d21ad5a5bf0e1151a9163a72f89072 [37/50] x86/mm/kaiser: Map virtually-addressed performance monitoring buffers config: i386-randconfig-x019-201747 (attach

RE: [PATCH v2 2/4] platform/x86: intel_telemetry: Fix suspend stats

2017-11-23 Thread Chakravarty, Souvik K
On Fri, November 24, 2017 at 2:55 AM, Andy Shevchenko wrote: > On Tue, Nov 21, 2017 at 4:36 PM, Souvik Kumar Chakravarty > wrote: > > Suspend stats are not reported consistently due to a limitation in the > > PMC firmware. This limitation causes a delay in updating the s0ix > > counters and resi

[PATCH v2 04/11] media: rkisp1: add Rockchip MIPI Synopsys DPHY driver

2017-11-23 Thread Jacob Chen
From: Jacob Chen This commit adds a subdev driver for Rockchip MIPI Synopsys DPHY driver. The phy driver is kind of independent compare to the other parts, but i'd like to keep it in rkisp1 driver, unless people want to generalize it Signed-off-by: Jacob Chen Signed-off-by: Shunqian Zheng Sig

linux-next: Tree for Nov 24

2017-11-23 Thread Stephen Rothwell
Hi all, Please do not add any v4.16 material to your linux-next included trees until v4.15-rc1 has been released. Changes since 20171123: The drm tree gained a conflict against Linus' tree. Non-merge commits (relative to Linus' tree): 766 849 files changed, 17680 insertions(+), 8497

Re: [PATCH v2 10/18] x86/asm: Remap the TSS into the cpu entry area

2017-11-23 Thread Andy Lutomirski
On Thu, Nov 23, 2017 at 12:37 PM, Borislav Petkov wrote: > On Thu, Nov 23, 2017 at 12:15:14PM -0800, Andy Lutomirski wrote: >> >> diff --git a/arch/x86/kernel/asm-offsets.c b/arch/x86/kernel/asm-offsets.c >> >> index b275863128eb..55858b277cf6 100644 >> >> --- a/arch/x86/kernel/asm-offsets.c >> >>

  1   2   3   4   5   6   7   >