[PATCH net-next 3/3] net: dsa: mv88e6xxx: add a stats setup function

2018-05-11 Thread Vivien Didelot
Now that the Global 1 specific setup function only setup the statistics unit, kill it in favor of a mv88e6xxx_stats_setup function. Signed-off-by: Vivien Didelot --- drivers/net/dsa/mv88e6xxx/chip.c | 27 ++- 1 file changed, 10 insertions(+), 17 deletions(-) diff --git a

Re: [PATCH v3 5/8] MIPS: jz4740: dts: Add bindings for the jz4740-wdt driver

2018-05-11 Thread James Hogan
On Fri, May 11, 2018 at 02:14:16PM -0700, Guenter Roeck wrote: > On Fri, May 11, 2018 at 09:54:14PM +0100, James Hogan wrote: > > On Fri, May 11, 2018 at 01:17:04PM -0300, Paul Cercueil wrote: > > > Le 11 mai 2018 11:52, James Hogan a écrit : > > > > Otherwise > > > > Acked-by: James Hogan > >

Re: [PATCH v3 5/8] MIPS: jz4740: dts: Add bindings for the jz4740-wdt driver

2018-05-11 Thread Guenter Roeck
On Fri, May 11, 2018 at 09:54:14PM +0100, James Hogan wrote: > On Fri, May 11, 2018 at 01:17:04PM -0300, Paul Cercueil wrote: > > Le 11 mai 2018 11:52, James Hogan a écrit : > > > Otherwise > > > Acked-by: James Hogan > > > > > > I'm happy to apply for 4.18 with that change if you want it to go

Re: [PATCH 00/10] Misc block layer patches for bcachefs

2018-05-11 Thread Jens Axboe
On 5/8/18 7:33 PM, Kent Overstreet wrote: > - Add separately allowed mempools, biosets: bcachefs uses both all over the >place > > - Bit of utility code - bio_copy_data_iter(), zero_fill_bio_iter() > > - bio_list_copy_data(), the bi_next check - defensiveness because of a bug I >had fu

Re: [RFC v2 3/4] ext4: add verifier check for symlink with append/immutable flags

2018-05-11 Thread Jan Kara
On Thu 10-05-18 16:13:58, Luis R. Rodriguez wrote: > The Linux VFS does not allow a way to set append/immuttable > attributes to symlinks, this is just not possible. If this is > detected inform the user as the filesystem must be corrupted. > > Signed-off-by: Luis R. Rodriguez Looks good to me.

Re: [PATCH 01/10] mempool: Add mempool_init()/mempool_exit()

2018-05-11 Thread Jens Axboe
On 5/8/18 7:33 PM, Kent Overstreet wrote: > Allows mempools to be embedded in other structs, getting rid of a > pointer indirection from allocation fastpaths. > > mempool_exit() is safe to call on an uninitialized but zeroed mempool. Looks fine to me. I'd like to carry it through the block branch

[GIT] Networking

2018-05-11 Thread David Miller
1) Verify lengths of keys provided by the user is AF_KEY, from Kevin Easton. 2) Add device ID for BCM89610 PHY. Thanks to Bhadram Varka. 3) Add Spectre guards to some ATM code, courtesy of Gustavo A. R. Silva. 4) Fix infinite loop in NSH protocol code. To Eric Dumazet we are most gra

[PATCH v5 03/23] iommu/vt-d: add a flag for pasid table bound status

2018-05-11 Thread Jacob Pan
Adding a flag in device domain into to track whether a guest or user PASID table is bound to a device. Signed-off-by: Jacob Pan --- include/linux/intel-iommu.h | 1 + 1 file changed, 1 insertion(+) diff --git a/include/linux/intel-iommu.h b/include/linux/intel-iommu.h index 304afae..ddc7d79 100

[PATCH v5 01/23] iommu: introduce bind_pasid_table API function

2018-05-11 Thread Jacob Pan
Virtual IOMMU was proposed to support Shared Virtual Memory (SVM) use in the guest: https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg05311.html As part of the proposed architecture, when an SVM capable PCI device is assigned to a guest, nested mode is turned on. Guest owns the first level

[PATCH v5 04/23] iommu/vt-d: add bind_pasid_table function

2018-05-11 Thread Jacob Pan
Add Intel VT-d ops to the generic iommu_bind_pasid_table API functions. The primary use case is for direct assignment of SVM capable device. Originated from emulated IOMMU in the guest, the request goes through many layers (e.g. VFIO). Upon calling host IOMMU driver, caller passes guest PASID tabl

[PATCH v5 08/23] iommu/vt-d: support flushing more translation cache types

2018-05-11 Thread Jacob Pan
When Shared Virtual Memory is exposed to a guest via vIOMMU, extended IOTLB invalidation may be passed down from outside IOMMU subsystems. This patch adds invalidation functions that can be used for additional translation cache types. Signed-off-by: Jacob Pan --- drivers/iommu/dmar.c| 44

[PATCH v5 00/23] IOMMU and VT-d driver support for Shared Virtual Address (SVA)

2018-05-11 Thread Jacob Pan
Shared virtual address (SVA), a.k.a, Shared virtual memory (SVM) on Intel platforms allow address space sharing between device DMA and applications. SVA can reduce programming complexity and enhance security. To enable SVA in the guest, i.e. shared guest application address space and physical devic

[PATCH v5 11/23] driver core: add per device iommu param

2018-05-11 Thread Jacob Pan
DMA faults can be detected by IOMMU at device level. Adding a pointer to struct device allows IOMMU subsystem to report relevant faults back to the device driver for further handling. For direct assigned device (or user space drivers), guest OS holds responsibility to handle and respond per device

[PATCH v5 10/23] iommu: introduce device fault data

2018-05-11 Thread Jacob Pan
Device faults detected by IOMMU can be reported outside IOMMU subsystem for further processing. This patch intends to provide a generic device fault data such that device drivers can be communicated with IOMMU faults without model specific knowledge. The proposed format is the result of discussion

[PATCH v5 02/23] iommu/vt-d: move device_domain_info to header

2018-05-11 Thread Jacob Pan
Allow both intel-iommu.c and dmar.c to access device_domain_info. Prepare for additional per device arch data used in TLB flush function Signed-off-by: Jacob Pan --- drivers/iommu/intel-iommu.c | 18 -- include/linux/intel-iommu.h | 19 +++ 2 files changed, 19 ins

[PATCH v5 09/23] iommu/vt-d: add svm/sva invalidate function

2018-05-11 Thread Jacob Pan
When Shared Virtual Address (SVA) is enabled for a guest OS via vIOMMU, we need to provide invalidation support at IOMMU API and driver level. This patch adds Intel VT-d specific function to implement iommu passdown invalidate API for shared virtual address. The use case is for supporting caching

[PATCH v5 12/23] iommu: add a timeout parameter for prq response

2018-05-11 Thread Jacob Pan
When an IO page request is processed outside IOMMU subsystem, response can be delayed or lost. Add a tunable setup parameter such that user can chooose the timeout for IOMMU to track pending page requests. This timeout mechanism is a basic safty net which can be implemented in conjunction with cre

Re: [PATCH v3 5/8] MIPS: jz4740: dts: Add bindings for the jz4740-wdt driver

2018-05-11 Thread James Hogan
On Fri, May 11, 2018 at 01:17:04PM -0300, Paul Cercueil wrote: > Le 11 mai 2018 11:52, James Hogan a écrit : > > Otherwise > > Acked-by: James Hogan > > > > I'm happy to apply for 4.18 with that change if you want it to go > > through the MIPS tree. > > Yes please! Done Thanks James sign

[PATCH v5 16/23] iommu/config: add build dependency for dmar

2018-05-11 Thread Jacob Pan
Intel VT-d interrupts come from both IRQ remapping and DMA remapping. In order to report non-recoverable faults back to device driver, we need to have access to IOMMU fault reporting APIs. This patch adds build depenency to DMAR code where fault IRQ handlers can selectively report faults. Signed-o

[PATCH v5 15/23] iommu: handle page response timeout

2018-05-11 Thread Jacob Pan
When IO page faults are reported outside IOMMU subsystem, the page request handler may fail for various reasons. E.g. a guest received page requests but did not have a chance to run for a long time. The irresponsive behavior could hold off limited resources on the pending device. There can be hardw

[PATCH v5 13/23] iommu: introduce device fault report API

2018-05-11 Thread Jacob Pan
Traditionally, device specific faults are detected and handled within their own device drivers. When IOMMU is enabled, faults such as DMA related transactions are detected by IOMMU. There is no generic reporting mechanism to report faults back to the in-kernel device driver or the guest OS in case

[PATCH v5 17/23] iommu/vt-d: report non-recoverable faults to device

2018-05-11 Thread Jacob Pan
Currently, dmar fault IRQ handler does nothing more than rate limited printk, no critical hardware handling need to be done in IRQ context. For some use case such as vIOMMU, it might be useful to report non-recoverable faults outside host IOMMU subsystem. DMAR fault can come from both DMA and inter

[PATCH v5 14/23] iommu: introduce page response function

2018-05-11 Thread Jacob Pan
IO page faults can be handled outside IOMMU subsystem. For an example, when nested translation is turned on and guest owns the first level page tables, device page request can be forwared to the guest for handling faults. As the page response returns by the guest, IOMMU driver on the host need to p

[PATCH v5 19/23] iommu/intel-svm: replace dev ops with fault report API

2018-05-11 Thread Jacob Pan
With the introduction of generic IOMMU device fault reporting API, we can replace the private fault callback functions with standard function and event data. Signed-off-by: Jacob Pan --- drivers/iommu/intel-svm.c | 7 +-- include/linux/intel-svm.h | 20 +++- 2 files changed,

[PATCH v5 06/23] iommu/vt-d: add definitions for PFSID

2018-05-11 Thread Jacob Pan
When SRIOV VF device IOTLB is invalidated, we need to provide the PF source ID such that IOMMU hardware can gauge the depth of invalidation queue which is shared among VFs. This is needed when device invalidation throttle (DIT) capability is supported. This patch adds bit definitions for checking

[PATCH v5 22/23] trace/iommu: add sva trace events

2018-05-11 Thread Jacob Pan
Signed-off-by: Jacob Pan --- include/trace/events/iommu.h | 112 +++ 1 file changed, 112 insertions(+) diff --git a/include/trace/events/iommu.h b/include/trace/events/iommu.h index 72b4582..e64eb29 100644 --- a/include/trace/events/iommu.h +++ b/include/t

[PATCH v5 23/23] iommu: use sva invalidate and device fault trace event

2018-05-11 Thread Jacob Pan
For performance and debugging purposes, these trace events help analyzing device faults and passdown invalidations that interact with IOMMU subsystem. E.g. IOMMU::00:0a.0 type=2 reason=0 addr=0x007ff000 pasid=1 group=1 last=0 prot=1 Signed-off-by: Jacob Pan --- drivers/iommu/iommu.c

[PATCH v5 21/23] iommu/vt-d: add intel iommu page response function

2018-05-11 Thread Jacob Pan
This patch adds page response support for Intel VT-d. Generic response data is taken from the IOMMU API then parsed into VT-d specific response descriptor format. Signed-off-by: Jacob Pan --- drivers/iommu/intel-iommu.c | 47 + include/linux/intel-iomm

[PATCH v5 18/23] iommu/intel-svm: report device page request

2018-05-11 Thread Jacob Pan
If the source device of a page request has its PASID table pointer bound to a guest, the first level page tables are owned by the guest. In this case, we shall let guest OS to manage page fault. This patch uses the IOMMU fault reporting API to send fault events, possibly via VFIO, to the guest OS.

[PATCH v5 20/23] iommu/intel-svm: do not flush iotlb for viommu

2018-05-11 Thread Jacob Pan
vIOMMU passdown invalidation will be inclusive, PASID cache invalidation includes TLBs. See Intel VT-d Specification Ch 6.5.2.2 for details. Signed-off-by: Jacob Pan --- drivers/iommu/intel-svm.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/drivers/iommu/intel-svm.c b/d

[PATCH v5 07/23] iommu/vt-d: fix dev iotlb pfsid use

2018-05-11 Thread Jacob Pan
PFSID should be used in the invalidation descriptor for flushing device IOTLBs on SRIOV VFs. Signed-off-by: Jacob Pan --- drivers/iommu/dmar.c| 6 +++--- drivers/iommu/intel-iommu.c | 16 +++- include/linux/intel-iommu.h | 5 ++--- 3 files changed, 20 insertions(+), 7 delet

[PATCH v5 05/23] iommu: introduce iommu invalidate API function

2018-05-11 Thread Jacob Pan
From: "Liu, Yi L" When an SVM capable device is assigned to a guest, the first level page tables are owned by the guest and the guest PASID table pointer is linked to the device context entry of the physical IOMMU. Host IOMMU driver has no knowledge of caching structure updates unless the guest

Re: INFO: rcu detected stall in kfree_skbmem

2018-05-11 Thread Marcelo Ricardo Leitner
On Fri, May 11, 2018 at 12:08:33PM -0700, Eric Dumazet wrote: > > > On 05/11/2018 11:41 AM, Marcelo Ricardo Leitner wrote: > > > But calling ip6_xmit with rcu_read_lock is expected. tcp stack also > > does it. > > Thus I think this is more of an issue with IPv6 stack. If a host has > > an extensive

Re: [V2] sched/schedutil: Don't set next_freq to UINT_MAX

2018-05-11 Thread Joel Fernandes
On Wed, May 09, 2018 at 04:05:24PM +0530, Viresh Kumar wrote: > The schedutil driver sets sg_policy->next_freq to UINT_MAX on certain > occasions to discard the cached value of next freq: > - In sugov_start(), when the schedutil governor is started for a group > of CPUs. > - And whenever we need

Re: [PATCH v3] net: phy: DP83TC811: Introduce support for the DP83TC811 phy

2018-05-11 Thread David Miller
From: Dan Murphy Date: Fri, 11 May 2018 13:08:19 -0500 > Add support for the DP83811 phy. > > The DP83811 supports both rgmii and sgmii interfaces. > There are 2 part numbers for this the DP83TC811R does not > reliably support the SGMII interface but the DP83TC811S will. > > There is not a way

Re: [PATCH v5 1/2] dt: bindings: lm3601x: Introduce the lm3601x driver

2018-05-11 Thread Jacek Anaszewski
Dan, On 05/11/2018 02:12 PM, Dan Murphy wrote: Jacek Thanks for the review On 05/10/2018 03:17 PM, Jacek Anaszewski wrote: Hi Dan, On 05/10/2018 09:10 PM, Dan Murphy wrote: On 05/10/2018 02:06 PM, Dan Murphy wrote: Pavel On 05/10/2018 01:54 PM, Pavel Machek wrote: Hi! Introduce the dev

Re: [PATCH v5 2/2] leds: lm3601x: Introduce the lm3601x LED driver

2018-05-11 Thread Jacek Anaszewski
Hi Dan, On 05/11/2018 01:56 PM, Dan Murphy wrote: Jacek Thanks for the review On 05/10/2018 03:48 PM, Jacek Anaszewski wrote: Hi Dan, Thank you for the patch. On 05/10/2018 07:47 PM, Dan Murphy wrote: Introduce the family of LED devices that can drive a torch, strobe or IR LED. The LED dr

[PATCH 24/23] LSM: Functions for dealing with struct secids

2018-05-11 Thread Casey Schaufler
From: Casey Schaufler Date: Fri, 11 May 2018 13:18:11 -0700 Subject: [PATCH 24/23] LSM: Functions for deling with struct secids These are the functions that mainipulate the collection of secids. Signed-off-by: Casey Schaufler --- security/stacking.c | 119 ++

Re: [PATCH v2] selftests/cgroup: memory controller self-tests

2018-05-11 Thread Shuah Khan
On 05/11/2018 02:02 PM, Tejun Heo wrote: > On Fri, May 11, 2018 at 01:33:26PM -0600, Shuah Khan wrote: >> Yeah. I see that. You have a switch for the KSFT_ values. Since there is no >> dependency on the cgroup tree, I would recommend having this patch go through >> kselftest tree which is the norma

Re: [PATCH v8 09/10] drivers: qcom: rpmh: add support for batch RPMH request

2018-05-11 Thread Doug Anderson
Hi, On Wed, May 9, 2018 at 10:01 AM, Lina Iyer wrote: > /** > @@ -77,12 +82,14 @@ struct rpmh_request { > * @cache: the list of cached requests > * @lock: synchronize access to the controller data > * @dirty: was the cache updated since flush > + * @batch_cache: Cache sleep and wake reques

Re: [PATCH v8 07/10] drivers: qcom: rpmh: cache sleep/wake state requests

2018-05-11 Thread Doug Anderson
Hi, On Wed, May 9, 2018 at 10:01 AM, Lina Iyer wrote: > /** > * struct rpmh_request: the message to be sent to rpmh-rsc > * > @@ -54,9 +71,15 @@ struct rpmh_request { > * struct rpmh_ctrlr: our representation of the controller > * > * @drv: the controller instance > + * @cache: the lis

Re: [PATCH v8 10/10] drivers: qcom: rpmh-rsc: allow active requests from wake TCS

2018-05-11 Thread Doug Anderson
Hi, On Wed, May 9, 2018 at 10:01 AM, Lina Iyer wrote: > Some RSCs may only have sleep and wake TCS, i.e, there is no dedicated > TCS for active mode request, but drivers may still want to make active > requests from these RSCs. In such cases re-purpose the wake TCS to send > active state requests

Re: [PATCH v8 04/10] drivers: qcom: rpmh: add RPMH helper functions

2018-05-11 Thread Doug Anderson
Hi, On Wed, May 9, 2018 at 10:01 AM, Lina Iyer wrote: > +int rpmh_write(const struct device *dev, enum rpmh_state state, > + const struct tcs_cmd *cmd, u32 n) > +{ > + DECLARE_COMPLETION_ONSTACK(compl); > + DEFINE_RPMH_MSG_ONSTACK(dev, state, &compl, rpm_msg); > + i

Re: [PATCH v8 08/10] drivers: qcom: rpmh: allow requests to be sent asynchronously

2018-05-11 Thread Doug Anderson
Hi, On Wed, May 9, 2018 at 10:01 AM, Lina Iyer wrote: > /** > @@ -137,6 +140,8 @@ void rpmh_tx_done(const struct tcs_request *msg, int r) > dev_err(rpm_msg->dev, "RPMH TX fail in msg addr=%#x, > err=%d\n", > rpm_msg->msg.cmds[0].addr, r); > > + kfre

Re: [PATCH v8 01/10] drivers: qcom: rpmh-rsc: add RPMH controller for QCOM SoCs

2018-05-11 Thread Doug Anderson
Hi, On Wed, May 9, 2018 at 10:01 AM, Lina Iyer wrote: > +int rpmh_rsc_send_data(struct rsc_drv *drv, const struct tcs_request *msg) > +{ > + int ret; > + > + if (!msg || !msg->cmds || !msg->num_cmds || > + msg->num_cmds > MAX_RPMH_PAYLOAD) { > + WARN_ON(1); > +

Re: [PATCH v7 04/10] drivers: qcom: rpmh: add RPMH helper functions

2018-05-11 Thread Doug Anderson
Hi, On Fri, May 11, 2018 at 8:06 AM, Lina Iyer wrote: >> As I've said I haven't reviewed RPMh in any amount of detail and so >> perhaps I don't understand something. >> >> OK, I dug a little more and coded up something for you. Basically >> you're doing a whole bunch of iteration / extra work he

Re: [PATCH 00/12] introduce support for early platform drivers

2018-05-11 Thread Rob Herring
On Fri, May 11, 2018 at 11:20 AM, Bartosz Golaszewski wrote: > This series is a follow-up to the RFC[1] posted a couple days ago. > > NOTE: this series applies on top of my recent patches[2] that move the > previous > implementation of early platform devices to arch/sh. > > Problem: > > Certain c

[PATCH v1 8/9] iommu: Introduce iotlb_sync_map callback

2018-05-11 Thread Dmitry Osipenko
On 11.05.2018 16:02, Robin Murphy wrote: > On 08/05/18 19:16, Dmitry Osipenko wrote: >> Introduce iotlb_sync_map() callback that is invoked in the end of >> iommu_map(). This new callback allows IOMMU drivers to avoid syncing >> on mapping of each contiguous chunk and sync only when whole mapping >

[PATCH v1 7/9] iommu/tegra: gart: Provide single domain and group for all devices

2018-05-11 Thread Dmitry Osipenko
On 11.05.2018 15:32, Robin Murphy wrote: > On 08/05/18 19:16, Dmitry Osipenko wrote: >> GART aperture is shared by all devices, hence there is a single IOMMU >> domain and group shared by these devices. Allocation of a group per >> device only wastes resources and allowance of having more than one

Re: [PATCH v3 1/3] big key: get rid of stack array allocation

2018-05-11 Thread James Morris
On Tue, 24 Apr 2018, Tycho Andersen wrote: > We're interested in getting rid of all of the stack allocated arrays in the > kernel [1]. This patch simply hardcodes the iv length to match that of the > hardcoded cipher. > > [1]: https://lkml.org/lkml/2018/3/7/621 > > v2: hardcode the length of the

Re: [PATCH v1 6/9] iommu/tegra: gart: Ignore devices without IOMMU phandle in DT

2018-05-11 Thread Dmitry Osipenko
Hi Robin, On 11.05.2018 14:34, Robin Murphy wrote: > Hi Dmitry, > > On 08/05/18 19:16, Dmitry Osipenko wrote: >> GART can't handle all devices, ignore devices that aren't related to GART. >> Device tree must explicitly assign GART IOMMU to the devices. >> >> Signed-off-by: Dmitry Osipenko >> ---

Re: [PATCH v2] selftests/cgroup: memory controller self-tests

2018-05-11 Thread Tejun Heo
On Fri, May 11, 2018 at 01:33:26PM -0600, Shuah Khan wrote: > Yeah. I see that. You have a switch for the KSFT_ values. Since there is no > dependency on the cgroup tree, I would recommend having this patch go through > kselftest tree which is the normal process for tests anyway. > > This version

Re: [PATCH net 0/5] rxrpc: Fixes

2018-05-11 Thread David Miller
From: David Howells Date: Thu, 10 May 2018 23:45:17 +0100 > Here are three fixes for AF_RXRPC and two tracepoints that were useful for > finding them: ... > The patches are tagged here: > > git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git > rxrpc-fixes-20180510 P

[RFC][PATCH 09/10] tracing: Allow histogram triggers to access ftrace internal events

2018-05-11 Thread Steven Rostedt
From: "Steven Rostedt (VMware)" Now that trace_marker can have triggers, including a histogram triggers, the onmatch() and onmax() access the trace event. To do so, the search routine to find the event file needs to use the raw __find_event_file() that does not filter out ftrace events. Signed-o

[RFC][PATCH 04/10] tracing: Add brackets in ftrace event dynamic arrays

2018-05-11 Thread Steven Rostedt
From: "Steven Rostedt (VMware)" The dynamic arrays defined for ftrace internal events, such as the buf field for trace_marker (ftrace/print) did not have brackets which makes the filter code not accept it as a string. This is not currently an issues because the filter code doesn't do anything for

[RFC][PATCH 05/10] tracing: Do not show filter file for ftrace internal events

2018-05-11 Thread Steven Rostedt
From: "Steven Rostedt (VMware)" The filter file in the ftrace internal events, like in /sys/kernel/tracing/events/ftrace/function/filter is not attached to any functionality. Do not create them as they are meaningless. In the future, if an ftrace internal event gets filter functionality, then it

[RFC][PATCH 07/10] tracing: Have zero size length in filter logic be full string

2018-05-11 Thread Steven Rostedt
From: "Steven Rostedt (VMware)" As strings in trace events may not have a nul terminating character, the filter string compares use the defined string length for the field for the compares. The trace_marker records data slightly different than do normal events. It's size is zero, meaning that th

[RFC][PATCH 06/10] tracing: Add trigger file for trace_markers tracefs/ftrace/print

2018-05-11 Thread Steven Rostedt
From: "Steven Rostedt (VMware)" Allow writing to the trace_markers file initiate triggers defined in tracefs/ftrace/print/trigger file. This will allow of user space to trigger the same type of triggers (including histograms) that the trace events use. Cc: Tom Zanussi Cc: Clark Williams Cc: Ka

[RFC][PATCH 08/10] tracing: Prevent further users of zero size static arrays in trace events

2018-05-11 Thread Steven Rostedt
From: "Steven Rostedt (VMware)" A zero size static array has special meaning in the ftrace infrastructure. Trace events are for recording data in the trace buffers that is normally difficult to obtain via probes or function tracing. There is no reason for any trace event to declare a zero size st

[RFC][PATCH 10/10] tracing: Document trace_marker triggers

2018-05-11 Thread Steven Rostedt
From: "Steven Rostedt (VMware)" Add documentation and an example on how to use trace_marker triggers. Signed-off-by: Steven Rostedt (VMware) --- Documentation/trace/events.rst| 6 +- Documentation/trace/ftrace.rst| 5 + Documentation/trace/histogram.txt | 546 ++

[RFC][PATCH 01/10] tracing: Do not reference event data in post call triggers

2018-05-11 Thread Steven Rostedt
From: "Steven Rostedt (VMware)" Trace event triggers can be called before or after the event has been committed. If it has been called after the commit, there's a possibility that the event no longer exists. Currently, the two post callers is the trigger to disable tracing (traceoff) and the one

[RFC][PATCH 00/10] tracing: Add triggers to trace_marker writes

2018-05-11 Thread Steven Rostedt
A few people have asked for this in the past, and I finally got around to implementing it. What this does is to allow writes into trace_marker to initiate a trigger. The trace_marker event is described in: tracefs/events/ftrace/print Thus the trigger file is added there: tracefs/events/ftrace

[RFC][PATCH 02/10] tracing: Add __find_event_file() to find event files without restrictions

2018-05-11 Thread Steven Rostedt
From: "Steven Rostedt (VMware)" By adding the function __find_event_file() that can search for files without restrictions, such as if the event associated with the file has a reg function, or if it has the "ignore" flag set, the files that are associated to ftrace internal events (like trace_mark

[RFC][PATCH 03/10] tracing: Have event_trace_init() called by trace_init_tracefs()

2018-05-11 Thread Steven Rostedt
From: "Steven Rostedt (VMware)" Instead of having both trace_init_tracefs() and event_trace_init() be called by fs_initcall() routines, have event_trace_init() called directly by trace_init_tracefs(). This will guarantee order of how the events are created with respect to the rest of the ftrace i

Re: [PATCH] isdn: eicon: fix a missing-check bug

2018-05-11 Thread David Miller
From: Wenwen Wang Date: Sat, 5 May 2018 14:32:46 -0500 > To avoid such issues, this patch adds a check after the second copy in the > function diva_xdi_write(). If the adapter number is not equal to the one > obtained in the first copy, (-4) will be returned to divas_write(), which > will then r

Re: [PATCH v2] vfio: platform: Make printed error messages more consistent

2018-05-11 Thread Alex Williamson
On Tue, 10 Apr 2018 16:54:11 +0200 Geert Uytterhoeven wrote: > - Capitalize the first word of error messages, > - Unwrap statements that fit on a single line, > - Use "VFIO" instead of "vfio" as the error message prefix. > > Signed-off-by: Geert Uytterhoeven > Reviewed-by: Eric Auger > -

Re: [PATCH v3 1/2] vfio: platform: Fix reset module leak in error path

2018-05-11 Thread Alex Williamson
On Wed, 11 Apr 2018 11:15:48 +0200 Geert Uytterhoeven wrote: > If the IOMMU group setup fails, the reset module is not released. > > Fixes: b5add544d677d363 ("vfio, platform: make reset driver a requirement by > default") > Signed-off-by: Geert Uytterhoeven > Reviewed-by: Eric Auger > Reviewe

Re: [PATCH v2 22/35] vfs: don't open real

2018-05-11 Thread Vivek Goyal
On Fri, May 11, 2018 at 02:54:30PM -0400, Vivek Goyal wrote: > On Mon, May 07, 2018 at 10:37:54AM +0200, Miklos Szeredi wrote: > > Let overlayfs do its thing when opening a file. > > > > This enables stacking and fixes the corner case when a file is opened for > > read, modified through a writable

Re: [PATCH v6 1/2] iommu - Enable debugfs exposure of IOMMU driver internals

2018-05-11 Thread Gary R Hook
On 05/11/2018 10:22 AM, Robin Murphy wrote: Hi Gary, Just a few trivial nitpicks below, otherwise: Reviewed-by: Robin Murphy On 11/05/18 15:34, Gary R Hook wrote: Provide base enablement for using debugfs to expose internal data of an IOMMU driver. When called, create the /sys/kernel/debug/i

Re: [PATCH v2] selftests/cgroup: memory controller self-tests

2018-05-11 Thread Shuah Khan
On 05/11/2018 12:03 PM, Roman Gushchin wrote: > On Fri, May 11, 2018 at 10:58:53AM -0600, Shuah Khan wrote: >> On 05/11/2018 10:29 AM, Tejun Heo wrote: >>> Hello, Shuah. >>> >>> On Fri, May 11, 2018 at 08:55:28AM -0600, Shuah Khan wrote: I think we don't need to create a special branch and all

Re: [lustre-devel] [PATCH] staging: lustre: fix spelling mistake: "req_ulinked" -> "req_unlinked"

2018-05-11 Thread Dilger, Andreas
On May 11, 2018, at 07:38, Colin King wrote: > > From: Colin Ian King > > Trivial fix to spelling mistake in DEBUG_REQ message text > > Signed-off-by: Colin Ian King Reviewed-by: Andreas Dilger > --- > drivers/staging/lustre/lustre/ptlrpc/client.c | 2 +- > 1 file changed, 1 insertion(+), 1

Re: [PATCH v5 0/7] proc: modernize proc to support multiple private instances

2018-05-11 Thread Al Viro
On Fri, May 11, 2018 at 09:39:23AM -0700, Linus Torvalds wrote: > On Fri, May 11, 2018 at 2:42 AM Alexey Gladkov > wrote: > > > This is RFC v5 to modernize procfs and make it able to support multiple > > private instances per the same pid namespace. > > So I have no big objections, but I would *

[linux-next PATCH 4/4] ARM: keystone: k2g: enable micrel and dp83867 phys

2018-05-11 Thread Murali Karicheri
Enable micrel and dp83867 phys for K2G Boards in keystone_defconfig to support Network driver on these boards (K2G ICE and GP EVM). Signed-off-by: Murali Karicheri --- arch/arm/configs/keystone_defconfig | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/arm/configs/keystone_defconfig b

[linux-next PATCH 0/4] Enable network driver on K2G ICE and GP EVMs

2018-05-11 Thread Murali Karicheri
Now that NetCP driver patches for K2G SoC is merged to linux-next master this series add patches to enable network driver on K2G ICE and GP EVMs. Thanks Applied the patches on top of latest linux-next master, built kernel and booted up on both EVMs. The logs are below K2G GP EVM: https://pastebi

[linux-next PATCH 2/4] ARM: dts: keystone-k2g-evm: Enable netcp network driver

2018-05-11 Thread Murali Karicheri
Add dt bindings to enable netcp network driver on K2G GP EVM. This consists of enabling bindings for nss qmss, pktdma, 2u ethss, mdio, pinmux and netcp devices. Signed-off-by: Murali Karicheri --- arch/arm/boot/dts/keystone-k2g-evm.dts | 53 ++ 1 file changed, 53

[linux-next PATCH 3/4] ARM: dts: keystone-k2g-ice: Enable netcp network driver

2018-05-11 Thread Murali Karicheri
This patch adds dt bindings to enable netcp network driver on K2G ICE boards. This consists of enabling bindings for NSS qmss, pktdma, 2u ethss, mdio, pinmux and netcp devices as well as DP83867 phy. EVM hardware spec recommends to add 0.25 nsec delay in the tx direction and 2.25 nsec delay in the

[linux-next PATCH 1/4] ARM: dts: k2g: add dt bindings to support network driver

2018-05-11 Thread Murali Karicheri
This patch add dt bindings to support network driver based on Network Sub System (NSS) found on k2g SoC. This consists of bindings for netcp node, nss qmss , pktdma, cpsw 2u version of ethss and mdio. In order to support transitioning between non-promiscuous and promiscuous modes in K2G's ethernet

[PATCH V2] mlx4_core: allocate ICM memory in page size chunks

2018-05-11 Thread Qing Huang
When a system is under memory presure (high usage with fragments), the original 256KB ICM chunk allocations will likely trigger kernel memory management to enter slow path doing memory compact/migration ops in order to complete high order memory allocations. When that happens, user processes calli

Re: [PATCH] mlx4_core: allocate 4KB ICM chunks

2018-05-11 Thread Qing Huang
On 5/11/2018 3:27 AM, Håkon Bugge wrote: On 11 May 2018, at 01:31, Qing Huang wrote: When a system is under memory presure (high usage with fragments), the original 256KB ICM chunk allocations will likely trigger kernel memory management to enter slow path doing memory compact/migration ops in

Re: [PATCH v3] net: phy: DP83TC811: Introduce support for the DP83TC811 phy

2018-05-11 Thread David Miller
From: Andrew Lunn Date: Fri, 11 May 2018 21:10:11 +0200 > Humm, i thought i had given one. But i cannot find it in the mail > archive. Going senile :-( You aren't going senile, there is just are a huge number of patches being submitted since net-next openned up.

Re: [PATCH v3] net: phy: DP83TC811: Introduce support for the DP83TC811 phy

2018-05-11 Thread Florian Fainelli
On 05/11/2018 11:08 AM, Dan Murphy wrote: > Add support for the DP83811 phy. > > The DP83811 supports both rgmii and sgmii interfaces. > There are 2 part numbers for this the DP83TC811R does not > reliably support the SGMII interface but the DP83TC811S will. > > There is not a way to differentiat

Re: [PATCH v3] net: phy: DP83TC811: Introduce support for the DP83TC811 phy

2018-05-11 Thread Andrew Lunn
On Fri, May 11, 2018 at 01:51:28PM -0500, Dan Murphy wrote: > Andrew > > On 05/11/2018 01:30 PM, Andrew Lunn wrote: > > On Fri, May 11, 2018 at 01:08:19PM -0500, Dan Murphy wrote: > >> Add support for the DP83811 phy. > >> > >> The DP83811 supports both rgmii and sgmii interfaces. > >> There are 2

Re: [PATCH] pci/aer: Get rid of aer_recover_work_func() forward declaration

2018-05-11 Thread Borislav Petkov
On Fri, May 11, 2018 at 02:00:13PM -0500, Bjorn Helgaas wrote: > On Fri, May 11, 2018 at 06:39:23PM +0200, Borislav Petkov wrote: > > From: Borislav Petkov > > > > Just move the actual function up so that it is visible to its user > > aer_recover_queue(). > > Good idea. > > Not *directly* relat

Re: INFO: rcu detected stall in kfree_skbmem

2018-05-11 Thread Eric Dumazet
On 05/11/2018 11:41 AM, Marcelo Ricardo Leitner wrote: > But calling ip6_xmit with rcu_read_lock is expected. tcp stack also > does it. > Thus I think this is more of an issue with IPv6 stack. If a host has > an extensive ip6tables ruleset, it probably generates this more > easily. > >>> sctp_

[PATCH v2] mm: Adding new return type vm_fault_t

2018-05-11 Thread Souptick Joarder
Use new return type vm_fault_t for fault handler in struct vm_operations_struct. For now, this is just documenting that the function returns a VM_FAULT value rather than an errno. Once all instances are converted, vm_fault_t will become a distinct type. commit 1c8f422059ae ("mm: change return ty

[GIT PULL] arch/sh regression fixes for 4.17

2018-05-11 Thread Rich Felker
Linus, Please pull these changes for arch/sh. They fix regressions introduced in 4.15 and 4.17-rc1 that prevent booting on affected systems. Rich The following changes since commit 6da6c0db5316275015e8cc2959f12a17584aeb64: Linux v4.17-rc3 (2018-04-29 14:17:42 -0700) are available in the gi

Re: [PATCH] tpm_tis: verify locality released before returning from release_locality

2018-05-11 Thread Laurent Bigonville
Le 05/05/18 à 22:03, Jerry Snitselaar a écrit : On Sat May 05 18, Jerry Snitselaar wrote: For certain tpm chips releasing locality can take long enough that a subsequent call to request_locality will see the locality as being active when the access register is read in check_locality. So check th

Re: [PATCH] pci/aer: Get rid of aer_recover_work_func() forward declaration

2018-05-11 Thread Bjorn Helgaas
On Fri, May 11, 2018 at 06:39:23PM +0200, Borislav Petkov wrote: > From: Borislav Petkov > > Just move the actual function up so that it is visible to its user > aer_recover_queue(). Good idea. Not *directly* related, but I'm really tired of the clutter of all these separate files, and I'm thin

Re: [PATCH] x86: pad assembly functions with INT3

2018-05-11 Thread H. Peter Anvin
On 05/10/18 09:39, David Laight wrote: > From: Alexey Dobriyan >> Sent: 07 May 2018 22:38 >> >> Use INT3 instead of NOP. All that padding between functions is >> an illegal area, no legitimate code should jump into it. >> >> I've checked x86_64 allyesconfig disassembly, all changes looks sane: >> I

Re: [PATCH v2 22/35] vfs: don't open real

2018-05-11 Thread Vivek Goyal
On Mon, May 07, 2018 at 10:37:54AM +0200, Miklos Szeredi wrote: > Let overlayfs do its thing when opening a file. > > This enables stacking and fixes the corner case when a file is opened for > read, modified through a writable open, and data is read from the read-only > file. After this patch th

Re: [PATCH v3] net: phy: DP83TC811: Introduce support for the DP83TC811 phy

2018-05-11 Thread Dan Murphy
Andrew On 05/11/2018 01:30 PM, Andrew Lunn wrote: > On Fri, May 11, 2018 at 01:08:19PM -0500, Dan Murphy wrote: >> Add support for the DP83811 phy. >> >> The DP83811 supports both rgmii and sgmii interfaces. >> There are 2 part numbers for this the DP83TC811R does not >> reliably support the SGMII

Re: INFO: rcu detected stall in kfree_skbmem

2018-05-11 Thread Marcelo Ricardo Leitner
On Fri, May 11, 2018 at 12:00:38PM +0200, Dmitry Vyukov wrote: > On Mon, Apr 30, 2018 at 8:09 PM, syzbot > wrote: > > Hello, > > > > syzbot found the following crash on: > > > > HEAD commit:5d1365940a68 Merge > > git://git.kernel.org/pub/scm/linux/kerne... > > git tree: net-next > > cons

Re: possible deadlock in sk_diag_fill

2018-05-11 Thread Andrei Vagin
On Sat, May 05, 2018 at 10:59:02AM -0700, syzbot wrote: > Hello, > > syzbot found the following crash on: > > HEAD commit:c1c07416cdd4 Merge tag 'kbuild-fixes-v4.17' of git://git.k.. > git tree: upstream > console output: https://syzkaller.appspot.com/x/log.txt?x=12164c9780 > kernel

Re: [PATCH v3] net: phy: DP83TC811: Introduce support for the DP83TC811 phy

2018-05-11 Thread Andrew Lunn
On Fri, May 11, 2018 at 01:08:19PM -0500, Dan Murphy wrote: > Add support for the DP83811 phy. > > The DP83811 supports both rgmii and sgmii interfaces. > There are 2 part numbers for this the DP83TC811R does not > reliably support the SGMII interface but the DP83TC811S will. > > There is not a w

Re: [PATCH v2] mm: Change return type to vm_fault_t

2018-05-11 Thread Souptick Joarder
On Fri, May 11, 2018 at 11:45 PM, Matthew Wilcox wrote: > On Fri, May 11, 2018 at 11:36:39PM +0530, Souptick Joarder wrote: >> mm/hugetlb.c | 2 +- >> mm/mmap.c| 4 ++-- >> 2 files changed, 3 insertions(+), 3 deletions(-) > > Don't we also need to convert include/linux/mm_types.h: > > @@ -621

Re: [PATCH 3/3] iommu: armsmmu: set iommu ops for rpmsg bus

2018-05-11 Thread Robin Murphy
On 07/05/18 20:28, Bjorn Andersson wrote: On Fri, Mar 2, 2018 at 8:59 AM, Robin Murphy wrote: On 02/03/18 14:55, srinivas.kandaga...@linaro.org wrote: From: Srinivas Kandagatla On Qualcomm SoCs, ADSP exposes many functions like audio and others. These services need iommu access to allocate

Re: [PATCH] gpu: drm: tegra: Adding new typedef vm_fault_t

2018-05-11 Thread Souptick Joarder
On Mon, Apr 23, 2018 at 4:24 PM, Matthew Wilcox wrote: > On Wed, Apr 18, 2018 at 10:24:39AM +0200, Thierry Reding wrote: >> > @@ -437,20 +436,7 @@ static int tegra_bo_fault(struct vm_fault *vmf) >> > offset = (vmf->address - vma->vm_start) >> PAGE_SHIFT; >> > page = bo->pages[offset]; >> >

Re: [PATCH net V2] tun: fix use after free for ptr_ring

2018-05-11 Thread Michael S. Tsirkin
On Fri, May 11, 2018 at 10:49:25AM +0800, Jason Wang wrote: > We used to initialize ptr_ring during TUNSETIFF, this is because its > size depends on the tx_queue_len of netdevice. And we try to clean it > up when socket were detached from netdevice. A race were spotted when > trying to do uninit du

Re: [PATCH v2] mm: Change return type to vm_fault_t

2018-05-11 Thread Matthew Wilcox
On Fri, May 11, 2018 at 11:36:39PM +0530, Souptick Joarder wrote: > mm/hugetlb.c | 2 +- > mm/mmap.c| 4 ++-- > 2 files changed, 3 insertions(+), 3 deletions(-) Don't we also need to convert include/linux/mm_types.h: @@ -621,7 +621,7 @@ struct vm_special_mapping { * If non-NULL, the

[PATCH v3] net: phy: DP83TC811: Introduce support for the DP83TC811 phy

2018-05-11 Thread Dan Murphy
Add support for the DP83811 phy. The DP83811 supports both rgmii and sgmii interfaces. There are 2 part numbers for this the DP83TC811R does not reliably support the SGMII interface but the DP83TC811S will. There is not a way to differentiate these parts from the hardware or register set. So thi

<    1   2   3   4   5   6   7   >