Re: [PATCH 1/3] userfaultfd: selftest: cleanup help messages

2018-09-29 Thread Peter Xu
On Sat, Sep 29, 2018 at 01:28:12PM +0300, Mike Rapoport wrote: [...] > > +const char *examples = > > +"# 100MiB 9 bounces\n" > > +"./userfaultfd anon 100 9\n" > > +"\n" > > +"# 1GiB 99 bounces\n" > > +"./userfaultfd anon 1000 99\n" > > +"\n" > > +"# 10MiB-~6GiB

Re: [RFC/RFT PATCH v1 0/9] mtd: fsl: quadspi: Fixes for fsl-quadspi.c driver (vybrid HW)

2018-09-29 Thread Boris Brezillon
Hi Lukasz, On Sat, 29 Sep 2018 23:02:40 +0200 Lukasz Majewski wrote: > > Talking about that, can you try to port your fixes on top of Frieder's > > patchset? I'm pretty sure some bug fixes are irrelevant after the > > migration to spi-mem (patch 1, 3, 4, 5, 6, 7 and 9 should be dropped I > > thi

Re: [PATCH v2] ASoC: wm8731: Fix a unused function gcc warning

2018-09-29 Thread kbuild test robot
Hi zhong, Thank you for the patch! Yet something to improve: [auto build test ERROR on asoc/for-next] [also build test ERROR on v4.19-rc5 next-20180928] [if your patch is applied to the wrong git tree, please drop us a note to help improve the system] url: https://github.com/0day-ci/linux/c

Re: [PATCH 0/3] namei: implement various scoping AT_* flags

2018-09-29 Thread Aleksa Sarai
On 2018-09-29, Christian Brauner wrote: > > Currently I've only enabled these for openat(2) and the stat(2) family. > > I would hope we could enable it for basically every *at(2) syscall -- > > but many of them appear to not have a @flags argument and thus we'll > > need to add several new syscall

Re: [PATCH 1/3] namei: implement O_BENEATH-style AT_* flags

2018-09-29 Thread Aleksa Sarai
On 2018-09-29, Aleksa Sarai wrote: > * AT_XDEV: Disallow mount-point crossing (both *down* into one, or *up* > from one). The primary "scoping" use is to blocking resolution that > crosses a bind-mount, which has a similar property to a symlink (in > the way that it allows for escape from th

Re: [PATCH 0/9] AHCI and SATA PHY support for BCM63138

2018-09-29 Thread Florian Fainelli
On September 29, 2018 7:35:14 PM PDT, Jens Axboe wrote: >On 9/29/18 2:56 AM, Tejun Heo wrote: >> On Fri, Sep 28, 2018 at 03:41:23PM -0700, Florian Fainelli wrote: >>> On 09/25/2018 09:12 AM, Florian Fainelli wrote: On 09/24/2018 11:19 PM, Kishon Vijay Abraham I wrote: > On Friday 21 Se

[PATCH V3 0/3] Add i.MX6ULZ SoC support

2018-09-29 Thread Anson Huang
This patch set adds i.MX6ULZ SoC support, i.MX6ULZ is a new SoC of i.MX6 family, compared to i.MX6ULL, it removes below modules: - UART5/UART6/UART7/UART8; - PWM5/PWM6/PWM7/PWM8; - eCSPI3/eCSPI4; - CAN1/CAN2; - FEC1/FEC2; - I2C3/I2C4; - EPIT2; - LCDIF; - GPT2;

[PATCH V3 1/3] ARM: imx: add i.mx6ulz msl support

2018-09-29 Thread Anson Huang
The i.MX 6ULZ processor is a high-performance, ultra cost-efficient consumer Linux processor featuring an advanced implementation of a single Arm® Cortex®-A7 core, which operates at speeds up to 900 MHz. This patch adds basic MSL support for i.MX6ULZ, the i.MX6ULZ has same soc_id as i.MX6ULL, and

[PATCH V3 2/3] dt-bindings: arm: add compatible for i.MX6ULZ 14x14 EVK board

2018-09-29 Thread Anson Huang
This patch adds compatible for i.MX6ULZ 14x14 EVK board. Signed-off-by: Anson Huang --- changes since V2: Add "fsl,imx6ull" according to dts change. Documentation/devicetree/bindings/arm/fsl.txt | 4 1 file changed, 4 insertions(+) diff --git a/Documentation/devicetree/bindings/arm

[PATCH V3 3/3] ARM: dts: imx: add i.mx6ulz and i.mx6ulz 14x14 evk support

2018-09-29 Thread Anson Huang
i.MX6ULZ is new SoC of i.MX6 family, compared to i.MX6ULL, it removes below modules: - UART5/UART6/UART7/UART8; - PWM5/PWM6/PWM7/PWM8; - eCSPI3/eCSPI4; - CAN1/CAN2; - FEC1/FEC2; - I2C3/I2C4; - EPIT2; - LCDIF; - GPT2; - ADC1; - TSC; This patch adds support for i.MX6ULZ and i.MX6ULZ 14x14 EVK board

[LKP] [timens] 3cc8de9dcb: RIP:posix_get_boottime

2018-09-29 Thread kernel test robot
FYI, we noticed the following commit (built with gcc-6): commit: 3cc8de9dcbe53955edcc65122f169666b4f6cbd9 ("[RFC 04/20] timens: Introduce CLOCK_BOOTTIME offset") url: https://github.com/0day-ci/linux/commits/Dmitry-Safonov/ns-Introduce-Time-Namespace/20180920-194322 in testcase: boot on test

[LKP] [rcutorture] 5aa56a54ce: WARNING:at_kernel/rcu/rcutorture.c:#rcu_torture_fwd_prog

2018-09-29 Thread kernel test robot
FYI, we noticed the following commit (built with gcc-7): commit: 5aa56a54ce92761e974f93592f69b75b8c2398a8 ("rcutorture: Add call_rcu() flooding forward-progress tests") https://git.kernel.org/cgit/linux/kernel/git/paulmck/linux-rcu.git dev in testcase: trinity with following parameters:

[LKP] [posix] 25217c6e39: BUG:KASAN:null-ptr-deref_in_c

2018-09-29 Thread kernel test robot
FYI, we noticed the following commit (built with gcc-4.9): commit: 25217c6e39560eeadb338e0140ee215410200b67 ("[RFC 13/20] posix-timers/timens: Take into account clock offsets") url: https://github.com/0day-ci/linux/commits/Dmitry-Safonov/ns-Introduce-Time-Namespace/20180920-194322 in testcase:

RE: [PATCH V2 1/4] ARM: imx: add i.mx6ulz msl support

2018-09-29 Thread Anson Huang
Hi, Shawn Anson Huang Best Regards! > -Original Message- > From: Shawn Guo > Sent: Sunday, September 30, 2018 11:06 AM > To: Anson Huang > Cc: robh...@kernel.org; mark.rutl...@arm.com; s.ha...@pengutronix.de; > ker...@pengutronix.de; Fabio Estevam ; > li...@armlinux.org.uk; mturque...@

Re: [PATCH V2 1/4] ARM: imx: add i.mx6ulz msl support

2018-09-29 Thread Shawn Guo
On Fri, Sep 28, 2018 at 09:07:28AM +, Anson Huang wrote: > Hi, Shawn > > Anson Huang > Best Regards! > > > > -Original Message- > > From: Shawn Guo > > Sent: Friday, September 28, 2018 4:45 PM > > To: Anson Huang > > Cc: robh...@kernel.org; mark.rutl...@arm.com; s.ha...@pengutronix

[PATCH 07/11] ALSA: hda/ca0132 - Add ZxR DSP post-download commands

2018-09-29 Thread Connor McAdams
This patch adds commands for setting up the ZxR after the DSP is downloaded. The ZxR already shares most of the post-download commands from the regular Sound Blaster Z. Signed-off-by: Connor McAdams --- sound/pci/hda/patch_ca0132.c | 37 - 1 file changed, 24 i

[PATCH 05/11] ALSA: hda/ca0132 - Add DBpro hda_codec_ops

2018-09-29 Thread Connor McAdams
This patch adds separate hda_codec_ops for the DBPro daughter board, as it behaves more like a generic HDA codec than the other ca0132 cards, despite having a ca0132 on board. Signed-off-by: Connor McAdams --- sound/pci/hda/patch_ca0132.c | 100 +++ 1 file

[PATCH 10/11] ALSA: hda/ca0132 - Add ZxR 600 ohm gain control

2018-09-29 Thread Connor McAdams
This patch adds a control for 600 ohm gain on the Sound Blaster ZxR. Signed-off-by: Connor McAdams --- sound/pci/hda/patch_ca0132.c | 44 ++-- 1 file changed, 42 insertions(+), 2 deletions(-) diff --git a/sound/pci/hda/patch_ca0132.c b/sound/pci/hda/patch

[PATCH 04/11] ALSA: hda/ca0132 - Add ZxR pincfg

2018-09-29 Thread Connor McAdams
This patch adds a pincfg for the ZxR, and defines which pins are used for both. Signed-off-by: Connor McAdams --- sound/pci/hda/patch_ca0132.c | 50 1 file changed, 50 insertions(+) diff --git a/sound/pci/hda/patch_ca0132.c b/sound/pci/hda/patch_ca01

[PATCH 09/11] ALSA: hda/ca0132 - Remove input select enum for ZxR

2018-09-29 Thread Connor McAdams
This patch removes the input select control for the ZxR, as it only has one input option, rear microphone. Signed-off-by: Connor McAdams --- sound/pci/hda/patch_ca0132.c | 15 ++- 1 file changed, 14 insertions(+), 1 deletion(-) diff --git a/sound/pci/hda/patch_ca0132.c b/sound/pci/h

[PATCH 02/11] ALSA: hda/ca0132 - Fix surround sound with output effects

2018-09-29 Thread Connor McAdams
This patch fixes an issue where if surround sound was the selected output and output effects were enabled, the sound wasn't sent to all channels correctly. Signed-off-by: Connor McAdams --- sound/pci/hda/patch_ca0132.c | 19 ++- 1 file changed, 14 insertions(+), 5 deletions(-) d

[PATCH 03/11] ALSA: hda/ca0132 - Add ZxR quirks + new quirk check function

2018-09-29 Thread Connor McAdams
This patch adds quirk ID's for the ZxR and it's daughter board, the DBPro. It also adds a function for determining the quirk for each board through HDA subsytem ID's instead of PCI subsystem ID's. Signed-off-by: Connor McAdams --- sound/pci/hda/patch_ca0132.c | 28 1

[PATCH 11/11] ALSA: hda/ca0132 - Add ZxR exit commands

2018-09-29 Thread Connor McAdams
This patch adds exit operations for the Sound Blaster ZxR. Signed-off-by: Connor McAdams --- sound/pci/hda/patch_ca0132.c | 33 + 1 file changed, 33 insertions(+) diff --git a/sound/pci/hda/patch_ca0132.c b/sound/pci/hda/patch_ca0132.c index 90e6a96..b098504 1006

[PATCH 06/11] ALSA: hda/ca0132 - Add ZxR init commands

2018-09-29 Thread Connor McAdams
This patch adds init commands for the main Sound Blaster ZxR card. Signed-off-by: Connor McAdams --- sound/pci/hda/patch_ca0132.c | 14 +- 1 file changed, 13 insertions(+), 1 deletion(-) diff --git a/sound/pci/hda/patch_ca0132.c b/sound/pci/hda/patch_ca0132.c index a543b23..6e48c3d

[PATCH 08/11] ALSA: hda/ca0132 - Add ZxR input/output select commands

2018-09-29 Thread Connor McAdams
This patch adds commands for selecting input and output on the Sound Blaster ZxR. The ZxR has no front panel header, and has line-in on the separate daughter board, so it only does rear-mic. Signed-off-by: Connor McAdams --- sound/pci/hda/patch_ca0132.c | 25 + 1 file cha

[PATCH 01/11] ALSA: hda/ca0132 - Fix AE-5 control type

2018-09-29 Thread Connor McAdams
This patch corrects the control type of the additional AE-5 controls added in a previous patch from HDA_INPUT to HDA_OUTPUT. Signed-off-by: Connor McAdams --- sound/pci/hda/patch_ca0132.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/sound/pci/hda/patch_ca0132.c b/sound

[PATCH 00/11] Add ZxR support + bugfixes

2018-09-29 Thread Connor McAdams
This patch series adds support for the Sound Blaster ZxR, as well as a few bug fixes. This should be the last ca0132 based Creative card that needed support to be added. Also, I did check to make sure each patch compiles properly this time, but you can check yourself just to be sure. :) Connor Mc

RE: [PATCH 2/2] spi: spi-fsl-dspi: Fix support for XSPI transport mode

2018-09-29 Thread Chuanhua Han
> -Original Message- > From: Esben Haabendal On Behalf Of Esben > Haabendal > Sent: 2018年9月29日 22:56 > To: Chuanhua Han > Cc: broo...@kernel.org; linux-...@vger.kernel.org; > linux-kernel@vger.kernel.org; boris.brezil...@bootlin.com > Subject: Re: [PATCH 2/2] spi: spi-fsl-dspi: Fix supp

[PATCH] ARM: makefile: pass -march=armv4 to assembler even on CPU32v3

2018-09-29 Thread Jason A. Donenfeld
Per the discussion about half-way down in [1], the kernel doesn't actually support the ARMv3 ISA, but selects it for some ARMv4 ISA hardware that benefits from ARMv3 code generation. Such a consideration, then, only applies to the compiler but not to the assembler. This commit passes -march=armv4 t

[PATCH v2] ASoC: wm8731: Fix a unused function gcc warning

2018-09-29 Thread zhong jiang
Fix the following compile warning: sound/soc/codecs/wm8731.c:575:12: warning: 'wm8731_request_supplies' defined but not used [-Wunused-function] sound/soc/codecs/wm8731.c:600:12: warning: 'wm8731_hw_init' defined but not used [-Wunused-function] Signed-off-by: zhong jiang --- v1->v2: - Move

Re: [PATCH 0/9] AHCI and SATA PHY support for BCM63138

2018-09-29 Thread Jens Axboe
On 9/29/18 2:56 AM, Tejun Heo wrote: > On Fri, Sep 28, 2018 at 03:41:23PM -0700, Florian Fainelli wrote: >> On 09/25/2018 09:12 AM, Florian Fainelli wrote: >>> On 09/24/2018 11:19 PM, Kishon Vijay Abraham I wrote: On Friday 21 September 2018 12:49 AM, Florian Fainelli wrote: > On 09/20/201

Re: [PATCH] ASoC: wm8731: Fix a unused function gcc warning

2018-09-29 Thread zhong jiang
On 2018/9/30 10:17, Joe Perches wrote: > On Sun, 2018-09-30 at 09:45 +0800, zhong jiang wrote: >> Fix the following compile warning: >> >> sound/soc/codecs/wm8731.c:575:12: warning: 'wm8731_request_supplies' defined >> but not used [-Wunused-function] >> sound/soc/codecs/wm8731.c:600:12: warning:

Re: [PATCH] ASoC: wm8731: Fix a unused function gcc warning

2018-09-29 Thread kbuild test robot
Hi zhong, Thank you for the patch! Yet something to improve: [auto build test ERROR on asoc/for-next] [also build test ERROR on v4.19-rc5 next-20180928] [if your patch is applied to the wrong git tree, please drop us a note to help improve the system] url: https://github.com/0day-ci/linux/c

Re: [PATCH] ASoC: wm8731: Fix a unused function gcc warning

2018-09-29 Thread Joe Perches
On Sun, 2018-09-30 at 09:45 +0800, zhong jiang wrote: > Fix the following compile warning: > > sound/soc/codecs/wm8731.c:575:12: warning: 'wm8731_request_supplies' defined > but not used [-Wunused-function] > sound/soc/codecs/wm8731.c:600:12: warning: 'wm8731_hw_init' defined but not > used [-Wu

Re: [PATCH v2 1/3] arm64: dts: actions: s900: Enable Tx DMA for UART5

2018-09-29 Thread kbuild test robot
/linux/commits/Manivannan-Sadhasivam/Add-slave-DMA-support-for-Actions-Semi-S900-SoC/20180929-155016 base: https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git tty-testing config: arm64-defconfig (attached as .config) compiler: aarch64-linux-gnu-gcc (Debian 7.2.0-11) 7.2.0 reproduce

[PATCH] ASoC: wm8731: Fix a unused function gcc warning

2018-09-29 Thread zhong jiang
Fix the following compile warning: sound/soc/codecs/wm8731.c:575:12: warning: 'wm8731_request_supplies' defined but not used [-Wunused-function] sound/soc/codecs/wm8731.c:600:12: warning: 'wm8731_hw_init' defined but not used [-Wunused-function] Signed-off-by: zhong jiang --- sound/soc/codecs

RE: [kbuild-all] [PATCH RT 2/2] watchdog, rt: prevent deferral of watchdogd wakeup

2018-09-29 Thread Li, Philip
> Subject: Re: [kbuild-all] [PATCH RT 2/2] watchdog, rt: prevent deferral of > watchdogd wakeup > > On 2018-09-29 08:38:55 [+0200], Thomas Gleixner wrote: > > On Sat, 29 Sep 2018, kbuild test robot wrote: > > > [also build test ERROR on v4.19-rc5 next-20180928] > > > [if your patch is applied to t

linux-next: commits in the cisco tree

2018-09-29 Thread Stephen Rothwell
Hi Daniel, I noticed that you have added some commits to the cisco tree today. Just a couple of comments: Fristly, commits 734245aec283 ("This code allows architectures to use a generic builtin command line." and b17f223f16f2 ("This code allows architectures to use a generic builtin co

[PATCH net] r8169: always autoneg on resume

2018-09-29 Thread Alex Xu (Hello71)
This affects at least versions 25 and 33, so assume all cards are broken and just renegotiate by default. Fixes: a2965f12fde6 ("r8169: remove rtl8169_set_speed_xmii") Signed-off-by: Alex Xu (Hello71) --- drivers/net/ethernet/realtek/r8169.c | 7 +++ 1 file changed, 3 insertions(+), 4 deletio

Re: [PATCH v6 2/2] iio: proximity: vl53l0x: add interrupt support

2018-09-29 Thread Rob Herring
On Sat, Sep 29, 2018 at 6:10 AM Jonathan Cameron wrote: > > On Fri, 28 Sep 2018 18:52:13 -0500 > Rob Herring wrote: > > > On Fri, Sep 28, 2018 at 4:36 AM Song Qiang > > wrote: > > > > > > On Wed, Sep 26, 2018 at 05:46:18PM -0500, Rob Herring wrote: > > > > On Sat, Sep 22, 2018 at 04:05:23PM +01

Re: [GIT pull] timer fixes for 4.19

2018-09-29 Thread Greg Kroah-Hartman
On Sat, Sep 29, 2018 at 08:25:47PM +0200, Thomas Gleixner wrote: > Greg, > > please pull the latest timers-urgent-for-linus git tree from: > >git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git > timers-urgent-for-linus Now pulled, thanks. greg k-h

Re: [GIT pull] perf fix for 4.19

2018-09-29 Thread Greg Kroah-Hartman
On Sat, Sep 29, 2018 at 08:25:47PM +0200, Thomas Gleixner wrote: > Greg, > > please pull the latest perf-urgent-for-linus git tree from: > >git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git > perf-urgent-for-linus Now pulled, thanks. greg k-h

Re: [GIT pull] x86 fix for 4.19

2018-09-29 Thread Greg Kroah-Hartman
On Sat, Sep 29, 2018 at 08:25:48PM +0200, Thomas Gleixner wrote: > Greg, > > please pull the latest x86-urgent-for-linus git tree from: > >git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git > x86-urgent-for-linus Now pulled, thanks. greg k-h

Re: [PATCH RT 2/2] watchdog, rt: prevent deferral of watchdogd wakeup

2018-09-29 Thread Sebastian Andrzej Siewior
On 2018-09-29 08:38:55 [+0200], Thomas Gleixner wrote: > On Sat, 29 Sep 2018, kbuild test robot wrote: > > [also build test ERROR on v4.19-rc5 next-20180928] > > [if your patch is applied to the wrong git tree, please drop us a note to > > help improve the system] > > > > It's against the RT tre

[PATCH 3.16 013/131] x86/speculation: Create spec-ctrl.h to avoid include hell

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit 28a2775217b17208811fa43a9e96bd1fdf417b86 upstream. Having everything in nospec-branch.h creates a hell of dependencies when adding the prctl based switching mechanism. M

[PATCH 3.16 015/131] x86/process: Allow runtime control of Speculative Store Bypass

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit 885f82bfbc6fefb6664ea27965c3ab9ac4194b8c upstream. The Speculative Store Bypass vulnerability can be mitigated with the Reduced Data Speculation (RDS) feature. To allow

[PATCH 3.16 017/131] nospec: Allow getting/setting on non-current task

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Kees Cook commit 7bbf1373e228840bb0295a2ca26d548ef37f448e upstream. Adjust arch_prctl_get/set_spec_ctrl() to operate on tasks other than current. This is needed both for /proc/$pid/status que

[PATCH 3.16 019/131] seccomp: Enable speculation flaw mitigations

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Kees Cook commit 5c3070890d06ff82eecb808d02d2ca39169533ef upstream. When speculation flaw mitigations are opt-in (via prctl), using seccomp will automatically opt-in to these protections, sinc

[PATCH 3.16 016/131] x86/speculation: Add prctl for Speculative Store Bypass mitigation

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit a73ec77ee17ec556fe7f165d00314cb7c047b1ac upstream. Add prctl based control for Speculative Store Bypass mitigation and make it the default mitigation for Intel and AMD.

[PATCH 3.16 018/131] proc: Provide details on speculation flaw mitigations

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Kees Cook commit fae1fa0fc6cca8beee3ab8ed71d54f9a78fa3f64 upstream. As done with seccomp and no_new_privs, also show speculation flaw mitigation state in /proc/$pid/status. Signed-off-by: Kee

[PATCH 3.16 002/131] x86/bugs: Concentrate bug detection into a separate function

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Konrad Rzeszutek Wilk commit 4a28bfe3267b68e22c663ac26185aa16c9b879ef upstream. Combine the various logic which goes through all those x86_cpu_id matching structures in one function. Suggeste

[PATCH 3.16 014/131] prctl: Add speculation control prctls

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit b617cfc858161140d69cc0b5cc211996b557a1c7 upstream. Add two new prctls to control aspects of speculation related vulnerabilites and their mitigations to provide finer gra

[PATCH 3.16 007/131] x86/cpufeatures: Add X86_FEATURE_RDS

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Konrad Rzeszutek Wilk commit 0cc5fa00b0a88dad140b4e5c2cead9951ad36822 upstream. Add the CPU feature bit CPUID.7.0.EDX[31] which indicates whether the CPU supports Reduced Data Speculation. [

[PATCH 3.16 005/131] x86/bugs, KVM: Support the combination of guest and host IBRS

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Konrad Rzeszutek Wilk commit 5cf687548705412da47c9cec342fd952d71ed3d5 upstream. A guest may modify the SPEC_CTRL MSR from the value used by the kernel. Since the kernel doesn't use IBRS, this

[PATCH 3.16 010/131] x86/bugs: Whitelist allowed SPEC_CTRL MSR values

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Konrad Rzeszutek Wilk commit 1115a859f33276fe8afb31c60cf9d8e657872558 upstream. Intel and AMD SPEC_CTRL (0x48) MSR semantics may differ in the future (or in fact use different MSRs for the sam

[PATCH 3.16 008/131] x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Konrad Rzeszutek Wilk commit 24f7fc83b9204d20f878c57cb77d261ae825e033 upstream. Contemporary high performance processors use a common industry-wide optimization known as "Speculative Store Byp

[PATCH 3.16 000/131] 3.16.59-rc1 review

2018-09-29 Thread Ben Hutchings
This is the start of the stable review cycle for the 3.16.59 release. There are 131 patches in this series, which will be posted as responses to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Mon Oct 01 21:43:06 UTC 2018. Anything rece

[PATCH 3.16 003/131] x86/bugs: Concentrate bug reporting into a separate function

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Konrad Rzeszutek Wilk commit d1059518b4789cabe34bb4b714d07e6089c82ca1 upstream. Those SysFS functions have a similar preamble, as such make common code to handle them. Suggested-by: Borislav

[PATCH 3.16 012/131] x86/KVM/VMX: Expose SPEC_CTRL Bit(2) to the guest

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Konrad Rzeszutek Wilk commit da39556f66f5cfe8f9c989206974f1cb16ca5d7c upstream. Expose the CPUID.7.EDX[31] bit to the guest, and also guard against various combinations of SPEC_CTRL MSR values

[PATCH 3.16 001/131] x86/nospec: Simplify alternative_msr_write()

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Linus Torvalds commit 1aa7a5735a41418d8e01fa7c9565eb2657e2ea3f upstream. The macro is not type safe and I did look for why that "g" constraint for the asm doesn't work: it's because the asm is

[PATCH 3.16 004/131] x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Konrad Rzeszutek Wilk commit 1b86883ccb8d5d9506529d42dbe1a5257cb30b18 upstream. The 336996-Speculative-Execution-Side-Channel-Mitigations.pdf refers to all the other bits as reserved. The Inte

[PATCH 3.16 006/131] x86/bugs: Expose /sys/../spec_store_bypass

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Konrad Rzeszutek Wilk commit c456442cd3a59eeb1d60293c26cbe2ff2c4e42cf upstream. Add the sysfs file for the new vulerability. It does not do much except show the words 'Vulnerable' for recent x

[PATCH 3.16 124/131] x86/tools: Fix gcc-7 warning in relocs.c

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Markus Trippelsdorf commit 7ebb916782949621ff6819acf373a06902df7679 upstream. gcc-7 warns: In file included from arch/x86/tools/relocs_64.c:17:0: arch/x86/tools/relocs.c: In function ‘process

[PATCH 3.16 131/131] exec: Limit arg stack to at most 75% of _STK_LIM

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Kees Cook commit da029c11e6b12f321f36dac8771e833b65cec962 upstream. To avoid pathological stack usage or the need to special-case setuid execs, just limit all arg stack usage to at most 75% of

[PATCH 3.16 009/131] x86/bugs/intel: Set proper CPU features and setup RDS

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Konrad Rzeszutek Wilk commit 772439717dbf703b39990be58d8d4e3e4ad0598a upstream. Intel CPUs expose methods to: - Detect whether RDS capability is available via CPUID.7.0.EDX[31], - The SPEC

[PATCH 3.16 126/131] irda: Fix memory leak caused by repeated binds of irda socket

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Tyler Hicks The irda_bind() function allocates memory for self->ias_obj without checking to see if the socket is already bound. A userspace process could repeatedly bind the socket, have each n

[PATCH 3.16 128/131] floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Andy Whitcroft commit 65eea8edc315589d6c993cf12dbb5d0e9ef1fe4e upstream. The final field of a floppy_struct is the field "name", which is a pointer to a string in kernel memory. The kernel po

[PATCH 3.16 011/131] x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Konrad Rzeszutek Wilk commit 764f3c21588a059cd783c6ba0734d4db2d72822d upstream. AMD does not need the Speculative Store Bypass mitigation to be enabled. The parameters for this are already av

[PATCH 3.16 116/131] x86/speculation/l1tf: Invert all not present mappings

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Andi Kleen commit f22cc87f6c1f771b57c407555cfefd811cdd9507 upstream. For kernel mappings PAGE_PROTNONE is not necessarily set for a non present mapping, but the inversion logic explicitely che

[PATCH 3.16 127/131] irda: Only insert new objects into the global database via setsockopt

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Tyler Hicks The irda_setsockopt() function conditionally allocates memory for a new self->ias_object or, in some cases, reuses the existing self->ias_object. Existing objects were incorrectly r

[PATCH 3.16 114/131] x86/speculation/l1tf: Fix up pte->pfn conversion for PAE

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Michal Hocko commit e14d7dfb41f5807a0c1c26a13f2b8ef16af24935 upstream. Jan has noticed that pte_pfn and co. resp. pfn_pte are incorrect for CONFIG_PAE because phys_addr_t is wider than unsigne

[PATCH 3.16 112/131] x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Vlastimil Babka commit 9df9516940a61d29aedf4d91b483ca6597e7d480 upstream. On 32bit PAE kernels on 64bit hardware with enough physical bits, l1tf_pfn_limit() will overflow unsigned long. This i

[PATCH 3.16 119/131] x86/speculation/l1tf: Make pmd/pud_mknotpresent() invert

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Andi Kleen commit 0768f91530ff46683e0b372df14fd79fe8d156e5 upstream. Some cases in THP like: - MADV_FREE - mprotect - split mark the PMD non present for temporarily to prevent races. Th

[PATCH 3.16 122/131] x86/speculation/l1tf: Suggest what to do on systems with too much RAM

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Vlastimil Babka commit 6a012288d6906fee1dbc244050ade1dafe4a9c8d upstream. Two users have reported [1] that they have an "extremely unlikely" system with more than MAX_PA/2 memory and L1TF miti

[PATCH 3.16 113/131] x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Vlastimil Babka commit b0a182f875689647b014bc01d36b340217792852 upstream. Two users have reported [1] that they have an "extremely unlikely" system with more than MAX_PA/2 memory and L1TF miti

[PATCH 3.16 111/131] x86/speculation/l1tf: Protect PAE swap entries against L1TF

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Vlastimil Babka commit 0d0f6249058834ffe1ceaad0bb31464af66f6e7a upstream. The PAE 3-level paging code currently doesn't mitigate L1TF by flipping the offset bits, and uses the high PTE word, t

[PATCH 3.16 130/131] scsi: target: iscsi: Use hex2bin instead of a re-implementation

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Vincent Pelletier commit 1816494330a83f2a064499d8ed2797045641f92c upstream. This change has the following effects, in order of descreasing importance: 1) Prevent a stack buffer overflow 2) D

[PATCH 3.16 129/131] HID: debug: check length before copy_to_user()

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Daniel Rosenberg commit 717adfdaf14704fd3ec7fa2c04520c0723247eac upstream. If our length is greater than the size of the buffer, we overflow the buffer Signed-off-by: Daniel Rosenberg Review

[PATCH 3.16 108/131] x86/init: fix build with CONFIG_SWAP=n

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Vlastimil Babka commit 792adb90fa724ce07c0171cbc96b9215af4b1045 upstream. The introduction of generic_max_swapfile_size and arch-specific versions has broken linking on x86 with CONFIG_SWAP=n

[PATCH 3.16 123/131] via-cuda: Use spinlock_irq_save/restore instead of enable/disable_irq

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Finn Thain commit ac39452e942af6a212e8f89e8a36b71354323845 upstream. The cuda_start() function uses spinlock_irq_save/restore for mutual exclusion. Let's have cuda_poll() do the same when poll

[PATCH 3.16 115/131] x86/speculation/l1tf: Unbreak !__HAVE_ARCH_PFN_MODIFY_ALLOWED architectures

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Jiri Kosina commit 6c26fcd2abfe0a56bbd95271fce02df2896cfd24 upstream. pfn_modify_allowed() and arch_has_pfn_modify_check() are outside of the !__ASSEMBLY__ section in include/asm-generic/pgtab

[PATCH 3.16 120/131] x86/mm/pat: Make set_memory_np() L1TF safe

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Andi Kleen commit 958f79b9ee55dfaf00c8106ed1c22a2919e0028b upstream. set_memory_np() is used to mark kernel mappings not present, but it has it's own open coded mechanism which does not have t

[PATCH 3.16 096/131] x86: mm: Add PUD functions

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Ben Hutchings These are extracted from commit a00cc7d9dd93 "mm, x86: add support for PUD-sized transparent hugepages" and will be used by later patches. Signed-off-by: Ben Hutchings --- ---

[PATCH 3.16 095/131] x86/speculation/l1tf: Protect swap entries against L1TF

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Linus Torvalds commit 2f22b4cd45b67b3496f4aa4c7180a1271c6452f6 upstream. With L1 terminal fault the CPU speculates into unmapped PTEs, and resulting side effects allow to read the memory the P

[PATCH 3.16 109/131] x86/bugs: Move the l1tf function and define pr_fmt properly

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Konrad Rzeszutek Wilk commit 56563f53d3066afa9e63d6c997bf67e76a8b05c0 upstream. The pr_warn in l1tf_select_mitigation would have used the prior pr_fmt which was defined as "Spectre V2 : ". Mo

[PATCH 3.16 125/131] mm/vmstat: Make NR_TLB_REMOTE_FLUSH_RECEIVED available even on UP

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Andy Lutomirski commit 5dd0b16cdaff9b94da06074d5888b03235c0bf17 upstream. This fixes CONFIG_SMP=n, CONFIG_DEBUG_TLBFLUSH=y without introducing further #ifdef soup. Caught by a Kbuild bot rand

[PATCH 3.16 102/131] x86/io: add interface to reserve io memtype for a resource range. (v1.1)

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Dave Airlie commit 8ef4227615e158faa4ee85a1d6466782f7e22f2f upstream. A recent change to the mm code in: 87744ab3832b mm: fix cache mode tracking in vm_insert_mixed() started enforcing checki

[PATCH 3.16 107/131] x86/speculation/l1tf: Limit swap file size to MAX_PA/2

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Andi Kleen commit 377eeaa8e11fe815b1d07c81c4a0e2843a8c15eb upstream. For the L1TF workaround its necessary to limit the swap file size to below MAX_PA/2, so that the higher bits of the swap of

[PATCH 3.16 100/131] mm: Add vm_insert_pfn_prot()

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Andy Lutomirski commit 1745cbc5d0dee0749a6bc0ea8e872c5db0074061 upstream. The x86 vvar vma contains pages with differing cacheability flags. x86 currently implements this by manually insertin

[PATCH 3.16 101/131] mm: fix cache mode tracking in vm_insert_mixed()

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Dan Williams commit 87744ab3832b83ba71b931f86f9cfdb000d07da5 upstream. vm_insert_mixed() unlike vm_insert_pfn_prot() and vmf_insert_pfn_pmd(), fails to check the pgprot_t it uses for the mappi

[PATCH 3.16 110/131] x86/speculation/l1tf: Extend 64bit swap file size limit

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Vlastimil Babka commit 1a7ed1ba4bba6c075d5ad61bb75e3fbc870840d6 upstream. The previous patch has limited swap file size so that large offsets cannot clear bits above MAX_PA/2 in the pte and in

[PATCH 3.16 098/131] x86/speculation/l1tf: Make sure the first page is always reserved

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Andi Kleen commit 10a70416e1f067f6c4efda6ffd8ea96002ac4223 upstream. The L1TF workaround doesn't make any attempt to mitigate speculate accesses to the first physical page for zeroed PTEs. Nor

[PATCH 3.16 106/131] x86/speculation/l1tf: Disallow non privileged high MMIO PROT_NONE mappings

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Andi Kleen commit 42e4089c7890725fcd32252dc489b72f2921 upstream. For L1TF PROT_NONE mappings are protected by inverting the PFN in the page table entry. This sets the high bits in the CPU'

[PATCH 3.16 097/131] x86/speculation/l1tf: Protect PROT_NONE PTEs against speculation

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Andi Kleen commit 6b28baca9b1f0d4a42b865da7a05b1c81424bd5c upstream. When PTEs are set to PROT_NONE the kernel just clears the Present bit and preserves the PFN, which creates attack surface f

[PATCH 3.16 103/131] drm/drivers: add support for using the arch wc mapping API.

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Dave Airlie commit 7cf321d118a825c1541b43ca45294126fd474efa upstream. This fixes a regression in all these drivers since the cache mode tracking was fixed for mixed mappings. It uses the new a

[PATCH 3.16 092/131] x86/mm: Move swap offset/type up in PTE to work around erratum

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Dave Hansen commit 00839ee3b299303c6a5e26a0a2485427a3afcbbf upstream. This erratum can result in Accessed/Dirty getting set by the hardware when we do not expect them to be (on !Present PTEs).

[PATCH 3.16 104/131] mm/pagewalk: remove pgd_entry() and pud_entry()

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Naoya Horiguchi commit 0b1fbfe50006c41014cc25660c0e735d21c34939 upstream. Currently no user of page table walker sets ->pgd_entry() or ->pud_entry(), so checking their existence in each loop i

[PATCH 3.16 094/131] x86/speculation/l1tf: Change order of offset/type in swap entry

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Linus Torvalds commit bcd11afa7adad8d720e7ba5ef58bdcd9775cf45f upstream. If pages are swapped out, the swap entry is stored in the corresponding PTE, which has the Present bit cleared. CPUs vu

[PATCH 3.16 118/131] x86/speculation/l1tf: Protect NUMA-balance entries against L1TF

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Ben Hutchings NUMA balancing has its own functions that manipulated the PRESENT flag in PTEs and PMDs. These were not affected by the changes in commit 6b28baca9b1f "x86/speculation/l1tf: Prot

[PATCH 3.16 105/131] pagewalk: improve vma handling

2018-09-29 Thread Ben Hutchings
3.16.59-rc1 review patch. If anyone has any objections, please let me know. -- From: Naoya Horiguchi commit fafaa4264eba49fd10695c193a82760558d093f4 upstream. Current implementation of page table walker has a fundamental problem in vma handling, which started when we tried to

  1   2   3   4   >