Re: [PATCH] [fs] exportfs/expfs.c Validate the dentry in exportfs_decode_fh function

2018-10-20 Thread Amir Goldstein
On Sun, Oct 21, 2018 at 8:42 AM Monthero Ronald wrote: > > Linux kernel 3.16 > So basically, you want to backport Neil Brown's upstream commit 09bb8bfffd29 exportfs: be careful to only return expected errors. to stable kernel 3.16 maintained by Ben Hutchings. You got the wrong address for th

Re: [Ksummit-discuss] [PATCH 6/7] Code of Conduct: Change the contact email address

2018-10-20 Thread Thomas Gleixner
On Sun, 21 Oct 2018, Alan Cox wrote: > > I don't see it specifically stating that 'If someone is offensive at a > kernel summit we are going to refuse to listen' Kernel summit or Maintainer summit is covered by the CoC of the conference it is attached to. Thanks, tglx

[PATCH] staging: iio: ad2s1210: Switch to the gpio descriptor interface

2018-10-20 Thread Nishad Kamdar
Use the gpiod interface instead of the deprecated old non-descriptor interface. Signed-off-by: Nishad Kamdar --- drivers/staging/iio/resolver/ad2s1210.c | 110 +++- drivers/staging/iio/resolver/ad2s1210.h | 3 - 2 files changed, 71 insertions(+), 42 deletions(-) diff --git

Re: [PATCH] fs: ufs: Remove switch statement from ufs_set_de_type function

2018-10-20 Thread Amir Goldstein
On Sun, Oct 21, 2018 at 1:27 AM Matthew Wilcox wrote: > > On Sat, Oct 20, 2018 at 11:09:57PM +0100, Phillip Potter wrote: > > Remove switch statement from ufs_set_de_type function in fs/ufs/util.h > > header and replace with simple assignment. For each case, S_IFx >> 12 > > is equal to DT_x, so in

Re: [PATCH 0/6] Tracing register accesses with pstore and dynamic debug

2018-10-20 Thread Joel Fernandes
On Sun, Oct 21, 2018 at 09:16:59AM +0530, Sai Prakash Ranjan wrote: > On 10/20/2018 9:57 PM, Joel Fernandes wrote: > > On Sat, Oct 20, 2018 at 12:02:37PM +0530, Sai Prakash Ranjan wrote: > > > On 10/20/2018 10:55 AM, Joel Fernandes wrote: > > > > On Sun, Sep 09, 2018 at 01:57:01AM +0530, Sai Prakas

Re: [PATCH 0/6] Tracing register accesses with pstore and dynamic debug

2018-10-20 Thread Sai Prakash Ranjan
On 10/21/2018 9:16 AM, Sai Prakash Ranjan wrote: On 10/20/2018 9:57 PM, Joel Fernandes wrote: On Sat, Oct 20, 2018 at 12:02:37PM +0530, Sai Prakash Ranjan wrote: On 10/20/2018 10:55 AM, Joel Fernandes wrote: On Sun, Sep 09, 2018 at 01:57:01AM +0530, Sai Prakash Ranjan wrote: Hi, This patch s

Your Consignment at JFK International Airport.

2018-10-20 Thread Mr.Will Clark
Attention Beneficiary I am Mr.Will Clark, A senior officer at JFK International Airport. I am contacting you regarding an abandoned diplomatic consignment box and the x-ray scan report box revealed some U.S dollar bill in it which could be approximately 12,5Million Dollars and the official pape

Re: [PATCH 3/5] Drivers: hv: kvp: Fix the recent regression caused by incorrect clean-up

2018-10-20 Thread Miguel Ojeda
Hi Dan, On Sat, Oct 20, 2018 at 9:22 PM Dan Carpenter wrote: > > On Sat, Oct 20, 2018 at 04:42:07PM +0200, Miguel Ojeda wrote: > > Using an attribute is indeed better whenever possible. In C++17 it is > > an standard attribute and there have been proposals to include some of > > them for C as wel

Re: [RFC 00/20] ns: Introduce Time Namespace

2018-10-20 Thread Andrei Vagin
On Sat, Oct 20, 2018 at 06:41:23PM -0700, Andrei Vagin wrote: > On Fri, Sep 28, 2018 at 07:03:22PM +0200, Eric W. Biederman wrote: > > Thomas Gleixner writes: > > > > > On Wed, 26 Sep 2018, Eric W. Biederman wrote: > > >> Reading the code the calling sequence there is: > > >> tick_sched_do_timer

Re: [PATCH 0/6] Tracing register accesses with pstore and dynamic debug

2018-10-20 Thread Sai Prakash Ranjan
On 10/20/2018 9:57 PM, Joel Fernandes wrote: On Sat, Oct 20, 2018 at 12:02:37PM +0530, Sai Prakash Ranjan wrote: On 10/20/2018 10:55 AM, Joel Fernandes wrote: On Sun, Sep 09, 2018 at 01:57:01AM +0530, Sai Prakash Ranjan wrote: Hi, This patch series adds Event tracing support to pstore and is

Re: [RFC 00/20] ns: Introduce Time Namespace

2018-10-20 Thread Andrei Vagin
On Fri, Sep 28, 2018 at 07:03:22PM +0200, Eric W. Biederman wrote: > Thomas Gleixner writes: > > > On Wed, 26 Sep 2018, Eric W. Biederman wrote: > >> Reading the code the calling sequence there is: > >> tick_sched_do_timer > >>tick_do_update_jiffies64 > >> update_wall_time > >>

[ANNOUNCE] Call for Papers - linux.conf.au Kernel Miniconf, Christchurch NZ, 21-25 Jan 2019

2018-10-20 Thread Andrew Donnellan
The linux.conf.au Kernel Miniconf is happening once again, this time in Christchurch on 22 Jan 2019. *** Submissions close on 2018-12-16, 23:59 AoE, with early submissions (before 2018-11-16, 23:59 AoE) given priority. *** *** Submission details: http://lca-kernel.ozlabs.org/2019-cfp.html ***

Re: [PATCH 03/34] teach move_mount(2) to work with OPEN_TREE_CLONE [ver #12]

2018-10-20 Thread David Howells
Alan Jenkins wrote: > diff --git a/fs/namespace.c b/fs/namespace.c > index 4dfe7e23b7ee..e8d61d5f581d 100644 > --- a/fs/namespace.c > +++ b/fs/namespace.c > @@ -1763,7 +1763,7 @@ void dissolve_on_fput(struct vfsmount *mnt) > { > namespace_lock(); > lock_mount_hash(); > - if (!rea

RE: [PATCH] iw_cxgb4: fix a missing-check bug

2018-10-20 Thread Steve Wise
> -Original Message- > From: Wenwen Wang > Sent: Saturday, October 20, 2018 6:56 PM > To: sw...@opengridcomputing.com > Cc: Kangjie Lu ; sw...@chelsio.com; dledf...@redhat.com; > j...@ziepe.ca; linux-r...@vger.kernel.org; open list ker...@vger.kernel.org>; Wenwen Wang > Subject: Re: [

Re: [Ksummit-discuss] [PATCH 6/7] Code of Conduct: Change the contact email address

2018-10-20 Thread Alan Cox
> > Data protection law, reporting laws in some > > countries and the like mean that anyone expecting an incident to remain > > confidential from the person it was reported against is living in > > dreamland and are going to get a nasty shock. > > OK - you seem to be talking about keeping the in

Re: [PATCH] iw_cxgb4: fix a missing-check bug

2018-10-20 Thread Wenwen Wang
On Sat, Oct 20, 2018 at 6:41 PM Steve Wise wrote: > > Hey Wenwen, > > > Subject: [PATCH] iw_cxgb4: fix a missing-check bug > > > > In c4iw_flush_hw_cq, the next CQE is acquired through t4_next_hw_cqe(). In > > t4_next_hw_cqe(), the CQE, i.e., 'cq->queue[cq->cidx]', is checked to see > > whether it

Editors 4

2018-10-20 Thread Linda
We are one image studio who is able to process 300+ photos a day. If you need any image editing, please let us know. We can do it for you such as: Image cut out for photos and clipping path, masking for your photos, They are mostly used for ecommerce photos, jewelry photos retouching, beauty and

Editors 4

2018-10-20 Thread Linda
We are one image studio who is able to process 300+ photos a day. If you need any image editing, please let us know. We can do it for you such as: Image cut out for photos and clipping path, masking for your photos, They are mostly used for ecommerce photos, jewelry photos retouching, beauty and

RE: [PATCH] iw_cxgb4: fix a missing-check bug

2018-10-20 Thread Steve Wise
Hey Wenwen, > Subject: [PATCH] iw_cxgb4: fix a missing-check bug > > In c4iw_flush_hw_cq, the next CQE is acquired through t4_next_hw_cqe(). In > t4_next_hw_cqe(), the CQE, i.e., 'cq->queue[cq->cidx]', is checked to see > whether it is valid through t4_valid_cqe(). If it is valid, the address of

Re: [PATCH] fs: ufs: Remove switch statement from ufs_set_de_type function

2018-10-20 Thread Al Viro
On Sat, Oct 20, 2018 at 03:26:37PM -0700, Matthew Wilcox wrote: > On Sat, Oct 20, 2018 at 11:09:57PM +0100, Phillip Potter wrote: > > Remove switch statement from ufs_set_de_type function in fs/ufs/util.h > > header and replace with simple assignment. For each case, S_IFx >> 12 > > is equal to DT_x

[PATCH v2] KVM/nVMX: Do not validate that posted_intr_desc_addr is page aligned

2018-10-20 Thread KarimAllah Ahmed
The spec only requires the posted interrupt descriptor address to be 64-bytes aligned (i.e. bits[0:5] == 0). Using page_address_valid also forces the address to be page aligned. Only validate that the address does not cross the maximum physical address without enforcing a page alignment. v1 -> v2

RE: [PATCH] tpm: tpm_try_transmit() refactor error flow.

2018-10-20 Thread Winkler, Tomas
> > On Thu, 18 Oct 2018, Winkler, Tomas wrote: > >> -Original Message- > >> From: Jarkko Sakkinen [mailto:jarkko.sakki...@linux.intel.com] > >> Sent: Thursday, October 18, 2018 03:15 > >> To: Winkler, Tomas > >> Cc: Jarkko Sakkinen ; Jason > >> Gunthorpe ; Nayna Jain ; > >> Usyskin, Alexa

Broken dwarf unwinding - wrong stack pointer register value?

2018-10-20 Thread Milian Wolff
Hey all, I'm on the quest to figure out why perf regularly fails to unwind (some) samples. I am seeing very strange behavior, where an apparently wrong stack pointer value is read from the register - see below for more information and the end of this (long) mail for my open questions. Any help

Re: [PATCH v3 1/3] code-of-conduct: Fix the ambiguity about collecting email addresses

2018-10-20 Thread Michael Tirado
James, and our other friends, On Tue, Oct 16, 2018 at 2:59 PM James Bottomley wrote: > > The current code of conduct has an ambiguity More than one ambiguity. This whole file needs to go. >* Trolling, Who decides what is trolling, and what is a technique for raising awareness or sparking disc

Re: [PATCH] fs: ufs: Remove switch statement from ufs_set_de_type function

2018-10-20 Thread Matthew Wilcox
On Sat, Oct 20, 2018 at 11:09:57PM +0100, Phillip Potter wrote: > Remove switch statement from ufs_set_de_type function in fs/ufs/util.h > header and replace with simple assignment. For each case, S_IFx >> 12 > is equal to DT_x, so in valid cases (mode & S_IFMT) >> 12 should give > us the correct f

[PATCH v3 06/13] KVM/nVMX: Use kvm_vcpu_map when mapping the L1 MSR bitmap

2018-10-20 Thread KarimAllah Ahmed
Use kvm_vcpu_map when mapping the L1 MSR bitmap since using kvm_vcpu_gpa_to_page() and kmap() will only work for guest memory that has a "struct page". Signed-off-by: KarimAllah Ahmed --- v1 -> v2: - Do not change the lifecycle of the mapping (pbonzini) --- arch/x86/kvm/vmx.c | 14 --

[PATCH v3 01/13] X86/nVMX: handle_vmon: Read 4 bytes from guest memory

2018-10-20 Thread KarimAllah Ahmed
Read the data directly from guest memory instead of the map->read->unmap sequence. This also avoids using kvm_vcpu_gpa_to_page() and kmap() which assumes that there is a "struct page" for guest memory. Suggested-by: Jim Mattson Signed-off-by: KarimAllah Ahmed --- v1 -> v2: - Massage commit messa

[PATCH v3 05/13] KVM: Introduce a new guest mapping API

2018-10-20 Thread KarimAllah Ahmed
In KVM, specially for nested guests, there is a dominant pattern of: => map guest memory -> do_something -> unmap guest memory In addition to all this unnecessarily noise in the code due to boiler plate code, most of the time the mapping function does not properly handle memory that is no

[PATCH v3 03/13] X86/nVMX: Update the PML table without mapping and unmapping the page

2018-10-20 Thread KarimAllah Ahmed
Update the PML table without mapping and unmapping the page. This also avoids using kvm_vcpu_gpa_to_page(..) which assumes that there is a "struct page" for guest memory. Signed-off-by: KarimAllah Ahmed --- v1 -> v2: - Use kvm_write_guest_page instead of kvm_write_guest (pbonzini) - Do not use po

[PATCH v3 11/13] KVM/X86: hyperv: Use kvm_vcpu_map in synic_deliver_msg

2018-10-20 Thread KarimAllah Ahmed
Use kvm_vcpu_map in synic_deliver_msg since using kvm_vcpu_gpa_to_page() and kmap() will only work for guest memory that has a "struct page". Signed-off-by: KarimAllah Ahmed --- v1 -> v2: - Update to match the new API return codes --- arch/x86/kvm/hyperv.c | 12 ++-- 1 file changed, 6 in

[PATCH v3 10/13] KVM/X86: hyperv: Use kvm_vcpu_map in synic_clear_sint_msg_pending

2018-10-20 Thread KarimAllah Ahmed
Use kvm_vcpu_map in synic_clear_sint_msg_pending since using kvm_vcpu_gpa_to_page() and kmap() will only work for guest memory that has a "struct page". Signed-off-by: KarimAllah Ahmed --- v1 -> v2: - Update to match the new API return codes --- arch/x86/kvm/hyperv.c | 16 ++-- 1 fil

[PATCH v3 07/13] KVM/nVMX: Use kvm_vcpu_map when mapping the virtual APIC page

2018-10-20 Thread KarimAllah Ahmed
Use kvm_vcpu_map when mapping the virtual APIC page since using kvm_vcpu_gpa_to_page() and kmap() will only work for guest memory that has a "struct page". One additional semantic change is that the virtual host mapping lifecycle has changed a bit. It now has the same lifetime of the pinning of th

[PATCH v3 09/13] KVM/X86: Use kvm_vcpu_map in emulator_cmpxchg_emulated

2018-10-20 Thread KarimAllah Ahmed
Use kvm_vcpu_map in emulator_cmpxchg_emulated since using kvm_vcpu_gpa_to_page() and kmap() will only work for guest memory that has a "struct page". Signed-off-by: KarimAllah Ahmed --- v1 -> v2: - Update to match the new API return codes --- arch/x86/kvm/x86.c | 13 ++--- 1 file changed

[PATCH v3 00/13] KVM/X86: Introduce a new guest mapping interface

2018-10-20 Thread KarimAllah Ahmed
Guest memory can either be directly managed by the kernel (i.e. have a "struct page") or they can simply live outside kernel control (i.e. do not have a "struct page"). KVM mostly support these two modes, except in a few places where the code seems to assume that guest memory must have a "struct pa

[PATCH v3 13/13] KVM/nVMX: Use kvm_vcpu_map for accessing the shadow VMCS

2018-10-20 Thread KarimAllah Ahmed
Use kvm_vcpu_map for accessing the shadow VMCS since using kvm_vcpu_gpa_to_page() and kmap() will only work for guest memory that has a "struct page". Signed-off-by: KarimAllah Ahmed --- arch/x86/kvm/vmx.c | 25 - 1 file changed, 12 insertions(+), 13 deletions(-) diff --

[PATCH v3 12/13] KVM/nSVM: Use the new mapping API for mapping guest memory

2018-10-20 Thread KarimAllah Ahmed
Use the new mapping API for mapping guest memory to avoid depending on "struct page". Signed-off-by: KarimAllah Ahmed --- arch/x86/kvm/svm.c | 97 +++--- 1 file changed, 49 insertions(+), 48 deletions(-) diff --git a/arch/x86/kvm/svm.c b/arch/x86/

[PATCH v3 02/13] X86/nVMX: handle_vmptrld: Copy the VMCS12 directly from guest memory

2018-10-20 Thread KarimAllah Ahmed
Copy the VMCS12 directly from guest memory instead of the map->copy->unmap sequence. This also avoids using kvm_vcpu_gpa_to_page() and kmap() which assumes that there is a "struct page" for guest memory. Signed-off-by: KarimAllah Ahmed --- v1 -> v2: - Massage commit message a bit. --- arch/x86/k

[PATCH V4 3/5] KVM: X86: Adding skeleton for Memory ROE

2018-10-20 Thread Ahmed Abd El Mawgood
This patch introduces a hypercall implemented for X86 that can assist against subset of kernel rootkits, it works by place readonly protection in shadow PTE. The end result protection is also kept in a bitmap for each kvm_memory_slot and is used as reference when updating SPTEs. The whole goal is t

[PATCH v3 08/13] KVM/nVMX: Use kvm_vcpu_map when mapping the posted interrupt descriptor table

2018-10-20 Thread KarimAllah Ahmed
Use kvm_vcpu_map when mapping the posted interrupt descriptor table since using kvm_vcpu_gpa_to_page() and kmap() will only work for guest memory that has a "struct page". One additional semantic change is that the virtual host mapping lifecycle has changed a bit. It now has the same lifetime of t

[PATCH v3 04/13] X86/KVM: Handle PFNs outside of kernel reach when touching GPTEs

2018-10-20 Thread KarimAllah Ahmed
From: Filippo Sironi cmpxchg_gpte() calls get_user_pages_fast() to retrieve the number of pages and the respective struct page to map in the kernel virtual address space. This doesn't work if get_user_pages_fast() is invoked with a userspace virtual address that's backed by PFNs outside of kernel

[PATCH] fs: ufs: Remove switch statement from ufs_set_de_type function

2018-10-20 Thread Phillip Potter
Remove switch statement from ufs_set_de_type function in fs/ufs/util.h header and replace with simple assignment. For each case, S_IFx >> 12 is equal to DT_x, so in valid cases (mode & S_IFMT) >> 12 should give us the correct file type. It is expected that for *nix compatibility reasons, the relati

[PATCH] iw_cxgb4: fix a missing-check bug

2018-10-20 Thread Wenwen Wang
In c4iw_flush_hw_cq, the next CQE is acquired through t4_next_hw_cqe(). In t4_next_hw_cqe(), the CQE, i.e., 'cq->queue[cq->cidx]', is checked to see whether it is valid through t4_valid_cqe(). If it is valid, the address of the CQE is then saved to 'hw_cqe'. Later on, the CQE is copied to the local

[PATCH] KVM/nVMX: Do not validate that posted_intr_desc_addr is page aligned

2018-10-20 Thread KarimAllah Ahmed
The spec only requires the posted interrupt descriptor address to be 64-bytes aligned (i.e. bits[0:5] == 0). Using page_address_valid also forces the address to be page aligned. Only validate that the address does not cross the maximum physical address without enforcing a page alignment. Cc: Paol

Re: [PATCH] mfd: tps6586x: Handle interrupts on suspend

2018-10-20 Thread Dmitry Osipenko
On 10/19/18 4:22 PM, Jon Hunter wrote: > From: Jonathan Hunter > > The tps6586x driver creates an irqchip that is used by its various child > devices for managing interrupts. The tps6586x-rtc device is one of its > children that uses the tps6586x irqchip. When using the tps6586x-rtc as > a wake-u

Re: Interrupts, smp_load_acquire(), smp_store_release(), etc.

2018-10-20 Thread Paul E. McKenney
On Sat, Oct 20, 2018 at 10:22:29PM +0200, Andrea Parri wrote: > [...] > > > The second (informal) litmus test has a more interesting Linux-kernel > > counterpart: > > > > void t1_interrupt(void) > > { > > r0 = READ_ONCE(y); > > smp_store_release(&x, 1); > > } >

Re: Interrupts, smp_load_acquire(), smp_store_release(), etc.

2018-10-20 Thread Paul E. McKenney
On Sat, Oct 20, 2018 at 04:18:37PM -0400, Alan Stern wrote: > On Sat, 20 Oct 2018, Paul E. McKenney wrote: > > > The second (informal) litmus test has a more interesting Linux-kernel > > counterpart: > > > > void t1_interrupt(void) > > { > > r0 = READ_ONCE(y); > >

Imaging 39

2018-10-20 Thread Linda
We are one image studio who is able to process 300+ photos a day. If you need any image editing, please let us know. We can do it for you such as: Image cut out for photos and clipping path, masking for your photos, They are mostly used for ecommerce photos, jewelry photos retouching, beauty and

Re: Interrupts, smp_load_acquire(), smp_store_release(), etc.

2018-10-20 Thread Andrea Parri
[...] > The second (informal) litmus test has a more interesting Linux-kernel > counterpart: > > void t1_interrupt(void) > { > r0 = READ_ONCE(y); > smp_store_release(&x, 1); > } > > void t1(void) > { > smp_store_release(&y,

Re: Interrupts, smp_load_acquire(), smp_store_release(), etc.

2018-10-20 Thread Alan Stern
On Sat, 20 Oct 2018, Paul E. McKenney wrote: > The second (informal) litmus test has a more interesting Linux-kernel > counterpart: > > void t1_interrupt(void) > { > r0 = READ_ONCE(y); > smp_store_release(&x, 1); > } > > void t1(void) > {

[PATCH] thunderbolt: fix a missing-check bug

2018-10-20 Thread Wenwen Wang
In tb_ring_poll(), the flag of the frame, i.e., 'ring->descriptors[ring->tail].flags', is checked to see whether the frame is completed. If yes, the frame including the flag will be read from the ring and returned to the caller. The problem here is that the flag is actually in a DMA region, which i

[GIT PULL] code of conduct fixes for 4.19-rc8

2018-10-20 Thread James Bottomley
This is the series of patches which has been discussed on both ksummit- discuss and linux-kernel for the past few weeks. As Shuah said when kicking off the process, it's designed as a starting point for the next phase of the discussion, not as the end point, so it's only really a set of minor upda

Re: [Ksummit-discuss] [PATCH 6/7] Code of Conduct: Change the contact email address

2018-10-20 Thread James Bottomley
On Sat, 2018-10-20 at 19:28 +0100, Alan Cox wrote: > > +to the circumstances. The Code of Conduct Committee is obligated > > to > > +maintain confidentiality with regard to the reporter of an > > incident. > > +Further details of specific enforcement policies may be posted > > +separately. > > Unf

Re: [Ksummit-discuss] [PATCH 6/7] Code of Conduct: Change the contact email address

2018-10-20 Thread Trond Myklebust
On Sat, 2018-10-20 at 19:24 +, tim.b...@sony.com wrote: > The scope of the code of conduct basically means that it covers > online interactions (communication via mailing list, git commits > and Bugzilla). Not to be flippant, but those are hardly mediums > that are susceptible to executing ph

[PATCH] thunderbolt: fix a missing-check bug

2018-10-20 Thread Wenwen Wang
In ring_work(), the first while loop is used to collect all completed frames from the ring buffer. In each iteration of this loop, the flag of the frame, i.e., 'ring->descriptors[ring->tail].flags' is firstly check to see whether the frame is completed. If yes, the descriptor of the frame, includin

Solutions

2018-10-20 Thread Linda
We are one image studio who is able to process 300+ photos a day. If you need any image editing, please let us know. We can do it for you such as: Image cut out for photos and clipping path, masking for your photos, They are mostly used for ecommerce photos, jewelry photos retouching, beauty and

RE: [Ksummit-discuss] [PATCH 6/7] Code of Conduct: Change the contact email address

2018-10-20 Thread Tim.Bird
> -Original Message- > From: Alan Cox > > > +to the circumstances. The Code of Conduct Committee is obligated to > > +maintain confidentiality with regard to the reporter of an incident. > > +Further details of specific enforcement policies may be posted > > +separately. > > Unfortunately

Re: [PATCH 3/5] Drivers: hv: kvp: Fix the recent regression caused by incorrect clean-up

2018-10-20 Thread Dan Carpenter
On Sat, Oct 20, 2018 at 04:42:07PM +0200, Miguel Ojeda wrote: > +On Wed, Oct 17, 2018 at 8:25 AM Dan Carpenter > wrote: > > > > It's not common at all. It should be wrapped in a macro and put into > > compiler.h. > > > > But I hope it does become adopted. It's better than randomly grepping > >

Re: [Ksummit-discuss] [PATCH 6/7] Code of Conduct: Change the contact email address

2018-10-20 Thread jonsm...@gmail.com
On Sat, Oct 20, 2018 at 2:47 PM Trond Myklebust wrote: > > On Sat, 2018-10-20 at 19:28 +0100, Alan Cox wrote: > > > +to the circumstances. The Code of Conduct Committee is obligated > > > to > > > +maintain confidentiality with regard to the reporter of an > > > incident. > > > +Further details of

Re: [PATCH 5/7] Code of Conduct Interpretation: Put in the proper URL for the committee

2018-10-20 Thread Geert Uytterhoeven
Hi Greg, On Sat, Oct 20, 2018 at 3:53 PM Greg Kroah-Hartman wrote: > There was a blank reference for how to find the Code of Conduct > Committee. Fix that up by pointing it to the correct kernel.org website > page location. > > Acked-by: Chris Mason > Acked-by: Olof Johansson > Acked-by: Theo

Re: [PATCH] thunderbolt: Fix a missing-check bug

2018-10-20 Thread Yehezkel Bernat
On Sat, Oct 20, 2018 at 12:25 AM Wenwen Wang wrote: > > On Thu, Oct 18, 2018 at 4:13 AM Mika Westerberg > wrote: > > > > Hi Wenwen, > > > > On Wed, Oct 17, 2018 at 09:00:29AM -0500, Wenwen Wang wrote: > > > In tb_cfg_copy(), the header of the received control package, which is in > > > the buffer

Re: [Ksummit-discuss] [PATCH 6/7] Code of Conduct: Change the contact email address

2018-10-20 Thread Trond Myklebust
On Sat, 2018-10-20 at 19:28 +0100, Alan Cox wrote: > > +to the circumstances. The Code of Conduct Committee is obligated > > to > > +maintain confidentiality with regard to the reporter of an > > incident. > > +Further details of specific enforcement policies may be posted > > +separately. > > Unf

[PATCH] thunderbolt: fix a missing-check bug

2018-10-20 Thread Wenwen Wang
In icm_copy(), the packet id 'hdr->packet_id' is firstly compared against 'req->npackets'. If it is less than 'req->npackets', the received packet. i.e., 'pkg->buffer', is then copied to 'req->response + offset' through memcpy(). It is worth noting that 'offset' is also calculated based on 'hdr->pa

Re: [PATCH 6/7] Code of Conduct: Change the contact email address

2018-10-20 Thread Alan Cox
> +to the circumstances. The Code of Conduct Committee is obligated to > +maintain confidentiality with regard to the reporter of an incident. > +Further details of specific enforcement policies may be posted > +separately. Unfortunately by ignoring the other suggestions on this you've left this

[PATCH] thunderbolt: Fix a missing-check bug

2018-10-20 Thread Wenwen Wang
In tb_ctl_rx_callback(), the checksum of the received control packet is calculated on 'pkg->buffer' through tb_crc() and saved to 'crc32', Then, 'crc32' is compared with the received checksum to confirm the integrity of the received packet. If the checksum does not match, the packet will be dropped

[no subject]

2018-10-20 Thread Steven Utonbury
I wrote you about late Engr M.M. and the deposit he made at the bank here.I sent you an email earlier and been expecting to hear from you. Please try and get back to me. Steven

Re: [PATCH v2 5/5] nfs: don't clear STATX_ATIME from result_mask

2018-10-20 Thread Trond Myklebust
On Fri, 2018-10-19 at 22:48 +0200, Miklos Szeredi wrote: > On Fri, Oct 19, 2018 at 8:14 PM, Trond Myklebust > wrote: > > On Fri, 2018-10-19 at 19:46 +0200, Miklos Szeredi wrote: > > > How is it then that only STATX_ATIME is cleared and not the other > > > fields? > > > > It isn't just the atime.

Re: [PATCH v2] x86/microcode: Handle negative microcode revisions

2018-10-20 Thread Borislav Petkov
Dropping stable. On Sat, Oct 20, 2018 at 07:41:58AM -0700, Andi Kleen wrote: > From: Andi Kleen > > The Intel microcode revision space is unsigned. Inside Intel there are special > microcodes that have the highest bit set, and they are considered to have > a higher revision than any microcodes t

Re: Memory management issue in 4.18.15

2018-10-20 Thread Roman Gushchin
On Sat, Oct 20, 2018 at 08:37:28AM -0700, Randy Dunlap wrote: > [add linux-mm mailing list + people] > > > On 10/20/18 4:41 AM, Spock wrote: > > Hello, > > > > I have a workload, which creates lots of cache pages. Before 4.18.15, > > the behavior was very stable: pagecache is constantly growing

Re: [PATCH RFC v3 0/3] Rlimit for module space

2018-10-20 Thread Ard Biesheuvel
Hi Rick, On 19 October 2018 at 22:47, Rick Edgecombe wrote: > If BPF JIT is on, there is no effective limit to prevent filling the entire > module space with JITed e/BPF filters. Why do BPF filters use the module space, and does this reason apply to all architectures? On arm64, we already suppo

KASAN: use-after-free Read in kvm_put_kvm

2018-10-20 Thread syzbot
Hello, syzbot found the following crash on: HEAD commit:8c60c36d0b8c Add linux-next specific files for 20181019 git tree: linux-next console output: https://syzkaller.appspot.com/x/log.txt?x=12d808b540 kernel config: https://syzkaller.appspot.com/x/.config?x=8b6d7c4c81535e89 dashb

possible deadlock in flush_workqueue (2)

2018-10-20 Thread syzbot
Hello, syzbot found the following crash on: HEAD commit:91b15613ce7f Merge git://git.kernel.org/pub/scm/linux/kern.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=1011410940 kernel config: https://syzkaller.appspot.com/x/.config?x=b3f55cb3dfcc6c33 da

Re: [PATCH 0/7] Add some fixes and new feature for SPRD DMA

2018-10-20 Thread Vinod
On 18-10-18, 17:29, Baolin Wang wrote: > Hi Vinod, > > On 29 September 2018 at 13:48, Baolin Wang wrote: > > This patchset removes the direction usage from struct dma_slave_config, > > and add one new field to save the direction. It also fixes some issues > > for link-list transfer. Moreover this

Re: [PATCH 0/6] Tracing register accesses with pstore and dynamic debug

2018-10-20 Thread Joel Fernandes
On Sat, Oct 20, 2018 at 12:02:37PM +0530, Sai Prakash Ranjan wrote: > On 10/20/2018 10:55 AM, Joel Fernandes wrote: > > On Sun, Sep 09, 2018 at 01:57:01AM +0530, Sai Prakash Ranjan wrote: > > > Hi, > > > > > > This patch series adds Event tracing support to pstore and is continuation > > > to the

Re: [[PATCH] 8/9] DMA-UART-Driver-for-AST2500

2018-10-20 Thread Vinod
On 19-10-18, 12:41, sudheer.v wrote: > On Fri, Oct 19, 2018 at 10:32:24AM +1100, Benjamin Herrenschmidt wrote: > > On Thu, 2018-10-18 at 15:25 +0530, Vinod wrote: > > > > > > > It's not a dmaengine driver. It's a serial UART driver that happens to > > > > use a dedicated DMA engine. > > > > > > T

Re: possible deadlock in __generic_file_fsync

2018-10-20 Thread syzbot
syzbot has found a reproducer for the following crash on: HEAD commit:270b77a0f30e Merge tag 'drm-fixes-2018-10-20-1' of git://a.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=146f4ad940 kernel config: https://syzkaller.appspot.com/x/.config?x=b3f55c

Interrupts, smp_load_acquire(), smp_store_release(), etc.

2018-10-20 Thread Paul E. McKenney
Hello! David Goldblatt (CCed) came up with an interesting pair of C++ litmus tests involving POSIX signals that have Linux-kernel counterparts involving interrupts. These litmus tests can (in paranoid theory, anyway) produce counter-intuitive results on architectures that use explicit fences to e

Re: Memory management issue in 4.18.15

2018-10-20 Thread Randy Dunlap
[add linux-mm mailing list + people] On 10/20/18 4:41 AM, Spock wrote: > Hello, > > I have a workload, which creates lots of cache pages. Before 4.18.15, > the behavior was very stable: pagecache is constantly growing until it > consumes all the free memory, and then kswapd is balancing it aroun

Re: [PATCH 3/5] Drivers: hv: kvp: Fix the recent regression caused by incorrect clean-up

2018-10-20 Thread Miguel Ojeda
+On Wed, Oct 17, 2018 at 8:25 AM Dan Carpenter wrote: > > It's not common at all. It should be wrapped in a macro and put into > compiler.h. > > But I hope it does become adopted. It's better than randomly grepping > for non-standard comments. Using an attribute is indeed better whenever possib

[PATCH v2] x86/microcode: Handle negative microcode revisions

2018-10-20 Thread Andi Kleen
From: Andi Kleen The Intel microcode revision space is unsigned. Inside Intel there are special microcodes that have the highest bit set, and they are considered to have a higher revision than any microcodes that don't have this bit set. The function comparing the microcode revision in the Linux

Re: [PATCH v2 1/2] x86/cpufeature: Add facility to match microcode revisions

2018-10-20 Thread Andi Kleen
On Sat, Oct 20, 2018 at 10:19:37AM +0200, Thomas Gleixner wrote: > On Fri, 19 Oct 2018, Andi Kleen wrote: > > > > > + u32 min_ucode; > > > > +}; > > > > + > > > > +const struct x86_ucode_id *x86_match_ucode(const struct x86_ucode_id > > > > *match) > > > > > > What's the point of returning

Re: [PATCH v2 1/2] dt-bindings: serial: add documentation for the SiFive UART driver

2018-10-20 Thread Rob Herring
On Fri, Oct 19, 2018 at 5:06 PM Paul Walmsley wrote: > > > On 10/19/18 1:45 PM, Rob Herring wrote: > > On Fri, Oct 19, 2018 at 1:48 PM Paul Walmsley > > wrote: > >> Add DT binding documentation for the Linux driver for the SiFive > >> asynchronous serial IP block. Nothing too exotic. > >> > >>

Re: [PATCH 0/2] modpost: skip section mismatch warnings on ELF local symbols by default

2018-10-20 Thread Sam Ravnborg
Hi Paul. > modpost: skip section mismatch warnings on ELF local symbols by default > > modpost, by default, reports section mismatch warnings on ELF local > symbols. This caused false positive warnings to be reported for a > local symbol name that would otherwise be elided by matching against a

Re: [PATCH v1] x86/microcode: Handle negative microcode revisions

2018-10-20 Thread Andi Kleen
On Sat, Oct 20, 2018 at 03:42:05PM +0200, Thomas Gleixner wrote: > Andi, > > On Fri, 19 Oct 2018, Andi Kleen wrote: > > Change the comparison to unsigned. With that the loading works > > as expected. > > > > I assume that wants a fixes tag and needs to be backported to stable, > right? I think t

Re: [PATCH v3 3/4] arm64: implement live patching

2018-10-20 Thread Ard Biesheuvel
On 19 October 2018 at 23:21, Miroslav Benes wrote: > >> >> Ad relocations. I checked that everything in struct mod_arch_specific >> >> stays after the module is load. Both core and init get SHF_ALLOC set >> >> (mod->arch.core.plt->sh_flags in module_frob_arch_sections(). It is >> >> important beca

[PATCH 4/7] Code of Conduct: Provide links between the two documents

2018-10-20 Thread Greg Kroah-Hartman
Create a link between the Code of Conduct and the Code of Conduct Interpretation so that people can see that they are related. Acked-by: Chris Mason Acked-by: Olof Johansson Acked-by: Theodore Ts'o Acked-by: Thomas Gleixner Signed-off-by: Greg Kroah-Hartman --- Documentation/process/code-of-

[PATCH 6/7] Code of Conduct: Change the contact email address

2018-10-20 Thread Greg Kroah-Hartman
The contact point for the kernel's Code of Conduct should now be the Code of Conduct Committee, not the full TAB. Change the email address in the file to properly reflect this. Acked-by: Chris Mason Acked-by: Olof Johansson Acked-by: Theodore Ts'o Acked-by: Thomas Gleixner Signed-off-by: Greg

[PATCH 7/7] MAINTAINERS: Add an entry for the code of conduct

2018-10-20 Thread Greg Kroah-Hartman
As I introduced these files, I'm willing to be the maintainer of them as well. Acked-by: Chris Mason Acked-by: Olof Johansson Acked-by: Steven Rostedt (VMware) Acked-by: Theodore Ts'o Acked-by: Thomas Gleixner Signed-off-by: Greg Kroah-Hartman --- MAINTAINERS | 6 ++ 1 file changed, 6 i

[PATCH 2/7] Code of Conduct Interpretation: Add document explaining how the Code of Conduct is to be interpreted

2018-10-20 Thread Greg Kroah-Hartman
The Contributor Covenant Code of Conduct is a general document meant to provide a set of rules for almost any open source community. Every open-source community is unique and the Linux kernel is no exception. Because of this, this document describes how we in the Linux kernel community will interp

[PATCH 3/7] Code of Conduct Interpretation: Properly reference the TAB correctly

2018-10-20 Thread Greg Kroah-Hartman
We use the term "TAB" before defining it later in the document. Fix that up by defining it at the first location. Reported-by: Kuninori Morimoto Acked-by: Chris Mason Acked-by: Olof Johansson Acked-by: Theodore Ts'o Acked-by: Thomas Gleixner Signed-off-by: Greg Kroah-Hartman --- .../proces

[PATCH 5/7] Code of Conduct Interpretation: Put in the proper URL for the committee

2018-10-20 Thread Greg Kroah-Hartman
There was a blank reference for how to find the Code of Conduct Committee. Fix that up by pointing it to the correct kernel.org website page location. Acked-by: Chris Mason Acked-by: Olof Johansson Acked-by: Theodore Ts'o Acked-by: Thomas Gleixner Signed-off-by: Greg Kroah-Hartman --- Docu

[PATCH 1/7] Code of conduct: Fix wording around maintainers enforcing the code of conduct

2018-10-20 Thread Greg Kroah-Hartman
From: Chris Mason As it was originally worded, this paragraph requires maintainers to enforce the code of conduct, or face potential repercussions. It sends the wrong message, when really we just want maintainers to be part of the solution and not violate the code of conduct themselves. Removin

[PATCH 0/7] Code of Conduct: Fix some wording, and add an interpretation document

2018-10-20 Thread Greg Kroah-Hartman
Hi all, As everyone knows by now, we added a new Code of Conduct to the kernel tree a few weeks ago. When we did this, it raised a number of questions as to how this would affect the kernel community. To help address these issues, I, and a few other kernel developers including the TAB, have come

[PATCH v2 2/3] dt-bindings: clk: add documentation for the SiFive PRCI driver

2018-10-20 Thread Paul Walmsley
Add DT binding documentation for the Linux driver for the SiFive PRCI clock & reset control IP block, as found on the SiFive FU540 chip. Cc: Michael Turquette Cc: Stephen Boyd Cc: Rob Herring Cc: Mark Rutland Cc: Palmer Dabbelt Cc: Megan Wachs Cc: linux-...@vger.kernel.org Cc: devicet...@vge

[PATCH v2 3/3] clk: sifive: add a driver for the SiFive FU540 PRCI IP block

2018-10-20 Thread Paul Walmsley
Add driver code for the SiFive FU540 PRCI IP block. This IP block handles reset and clock control for the SiFive FU540 device and implements SoC-level clock tree controls and dividers. Based on code written by Wesley Terpstra : https://github.com/riscv/riscv-linux/commit/999529edf517ed75b56659d45

[PATCH v2 0/3] clk: add driver for the SiFive FU540 PRCI and PLLs it controls

2018-10-20 Thread Paul Walmsley
Add a driver for the SiFive FU540 PRCI IP block, which handles clock and some device reset control for the SiFive FU540 chip. Also add a driver- independent library for the Analog Bits Wide-Range PLL (WRPLL), used by the PRCI driver to monitor and control the WRPLL instances on the FU540 chip. It

[PATCH v2 1/3] clk: analogbits: add Wide-Range PLL library

2018-10-20 Thread Paul Walmsley
Add common library code for the Analog Bits Wide-Range PLL (WRPLL) as implemented in TSMC CLN28HPC. There is no bus interface or register target associated with this PLL. This library is intended to be used by drivers for IP blocks that expose registers connected to the PLL configuration and statu

Re: [PATCH v1] x86/microcode: Handle negative microcode revisions

2018-10-20 Thread Thomas Gleixner
Andi, On Fri, 19 Oct 2018, Andi Kleen wrote: > Change the comparison to unsigned. With that the loading works > as expected. > I assume that wants a fixes tag and needs to be backported to stable, right? Thanks, tglx

[PATCH 1/3] clk: analogbits: add Wide-Range PLL library

2018-10-20 Thread Paul Walmsley
Add common library code for the Analog Bits Wide-Range PLL (WRPLL) as implemented in TSMC CLN28HPC. There is no bus interface or register target associated with this PLL. This library is intended to be used by drivers for IP blocks that expose registers connected to the PLL configuration and statu

[PATCH 2/3] dt-bindings: clk: add documentation for the SiFive PRCI driver

2018-10-20 Thread Paul Walmsley
Add DT binding documentation for the Linux driver for the SiFive PRCI clock & reset control IP block, as found on the SiFive FU540 chip. Cc: Michael Turquette Cc: Stephen Boyd Cc: Rob Herring Cc: Mark Rutland Cc: Palmer Dabbelt Cc: Megan Wachs

[PATCH 3/3] clk: sifive: add a driver for the SiFive FU540 PRCI IP block

2018-10-20 Thread Paul Walmsley
Add driver code for the SiFive FU540 PRCI IP block. This IP block handles reset and clock control for the SiFive FU540 device and implements SoC-level clock tree controls and dividers. Based on code written by Wesley Terpstra : https://github.com/riscv/riscv-linux/commit/999529edf517ed75b56659d45

  1   2   >