Re: [PATCH v3 03/11] iommufd: Introduce IOMMUFD_OBJ_VIOMMU and its related struct

2024-10-15 Thread Nicolin Chen
On Wed, Oct 16, 2024 at 09:56:51AM +0800, Zhangfei Gao wrote: > On Wed, 16 Oct 2024 at 02:44, Nicolin Chen wrote: > > > > On Mon, Oct 14, 2024 at 07:01:40PM -0700, Nicolin Chen wrote: > > > On Tue, Oct 15, 2024 at 09:15:01AM +0800, Zhangfei Gao wrote: > > > > > > > > > iommufd_device_bind > > > >

Re: [PATCH v3 04/11] iommufd/viommu: Add IOMMU_VIOMMU_ALLOC ioctl

2024-10-15 Thread Nicolin Chen
On Wed, Oct 09, 2024 at 09:38:04AM -0700, Nicolin Chen wrote: > +int iommufd_viommu_alloc_ioctl(struct iommufd_ucmd *ucmd) [...] > + if (cmd->type == IOMMU_VIOMMU_TYPE_DEFAULT) { > + viommu = __iommufd_viommu_alloc(ucmd->ictx, sizeof(*viommu), > +

Re: [PATCH v2 1/3] pidfd: extend pidfd_get_pid() and de-duplicate pid lookup

2024-10-15 Thread Lorenzo Stoakes
On Tue, Oct 15, 2024 at 12:40:41PM -0700, Suren Baghdasaryan wrote: [snip] > > -struct pid *pidfd_get_pid(unsigned int fd, unsigned int *flags) > > +struct pid *__pidfd_get_pid(unsigned int pidfd, bool pin_pid, > > + bool allow_proc, unsigned int *flags, > > +

[PATCH v2] selftest/tcp-ao: Add filter tests

2024-10-15 Thread Leo Stone
Add tests that check if getsockopt(TCP_AO_GET_KEYS) returns the right keys when using different filters. Sample output: > # ok 114 filter keys: by sndid, rcvid, address > # ok 115 filter keys: by is_current > # ok 116 filter keys: by is_rnext > # ok 117 filter keys: by sndid, rcvid > # ok 118 fil

[PATCH v3] remoteproc: Add a new remoteproc state RPROC_DEFUNCT

2024-10-15 Thread Mukesh Ojha
Multiple call to glink_subdev_stop() for the same remoteproc can happen if rproc_stop() fails from Process-A that leaves the rproc state to RPROC_CRASHED state later a call to recovery_store from user space in Process B triggers rproc_trigger_recovery() of the same remoteproc to recover it results

Re: [PATCH v2] remoteproc: Add a new remoteproc state RPROC_DEFUNCT

2024-10-15 Thread kernel test robot
Hi Mukesh, kernel test robot noticed the following build warnings: [auto build test WARNING on remoteproc/rproc-next] [also build test WARNING on linus/master v6.12-rc3 next-20241015] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to

Re: [PATCH v2] remoteproc: Add a new remoteproc state RPROC_DEFUNCT

2024-10-15 Thread kernel test robot
Hi Mukesh, kernel test robot noticed the following build warnings: [auto build test WARNING on remoteproc/rproc-next] [also build test WARNING on linus/master v6.12-rc3 next-20241015] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to

Re: [PATCH net-next v2 1/3] connector/cn_proc: Add hash table for threads

2024-10-15 Thread Anjali Kulkarni
[..snip..] >> +void cn_hash_free_elem(struct uexit_pid_hnode *elem); >> +int cn_hash_add_elem(struct cn_hash_dev *hdev, __u32 uexit_code, pid_t pid); >> +int cn_hash_del_elem(struct cn_hash_dev *hdev, pid_t pid); >> +__u32 cn_hash_del_get_exval(struct cn_hash_dev *hdev, pid_t pid); >> +__u32 cn_

Re: [PATCH rcu] configs/debug: make sure PROVE_RCU_LIST=y takes effect

2024-10-15 Thread Joel Fernandes
On Tue, Oct 15, 2024 at 06:11:44PM -0700, Jakub Kicinski wrote: > Commit 0aaa8977acbf ("configs: introduce debug.config for CI-like setup") > added CONFIG_PROVE_RCU_LIST=y to the common CI config, > but RCU_EXPERT is not set, and it's a dependency for > CONFIG_PROVE_RCU_LIST=y. Make sure CIs take a

Re: [PATCH v3 03/11] iommufd: Introduce IOMMUFD_OBJ_VIOMMU and its related struct

2024-10-15 Thread Zhangfei Gao
On Wed, 16 Oct 2024 at 02:44, Nicolin Chen wrote: > > On Mon, Oct 14, 2024 at 07:01:40PM -0700, Nicolin Chen wrote: > > On Tue, Oct 15, 2024 at 09:15:01AM +0800, Zhangfei Gao wrote: > > > > > > > iommufd_device_bind > > > > > iommufd_device_attach > > > > > iommufd_vdevice_alloc_ioctl > > > > > >

Re: [PATCH net-next v3 0/9] do not leave dangling sk pointers in pf->create functions

2024-10-15 Thread patchwork-bot+netdevbpf
Hello: This series was applied to netdev/net-next.git (main) by Jakub Kicinski : On Mon, 14 Oct 2024 16:37:59 +0100 you wrote: > Some protocol family create() implementations have an error path after > allocating the sk object and calling sock_init_data(). sock_init_data() > attaches the allocate

[PATCH rcu] configs/debug: make sure PROVE_RCU_LIST=y takes effect

2024-10-15 Thread Jakub Kicinski
Commit 0aaa8977acbf ("configs: introduce debug.config for CI-like setup") added CONFIG_PROVE_RCU_LIST=y to the common CI config, but RCU_EXPERT is not set, and it's a dependency for CONFIG_PROVE_RCU_LIST=y. Make sure CIs take advantage of CONFIG_PROVE_RCU_LIST=y, recent fixes in networking indicate

[PATCH net-next v9 23/23] testing/selftest: add test tool and scripts for ovpn module

2024-10-15 Thread Antonio Quartulli
The ovpn-cli tool can be compiled and used as selftest for the ovpn kernel module. It implements the netlink API and can thus be integrated in any script for more automated testing. Along with the tool, 2 scripts are added that perform basic functionality tests by means of network namespaces. Th

[PATCH net-next v9 22/23] ovpn: add basic ethtool support

2024-10-15 Thread Antonio Quartulli
Implement support for basic ethtool functionality. Note that ovpn is a virtual device driver, therefore various ethtool APIs are just not meaningful and thus not implemented. Signed-off-by: Antonio Quartulli Reviewed-by: Andrew Lunn --- drivers/net/ovpn/main.c | 15 +++ 1 file chan

[PATCH net-next v9 21/23] ovpn: notify userspace when a peer is deleted

2024-10-15 Thread Antonio Quartulli
Whenever a peer is deleted, send a notification to userspace so that it can react accordingly. This is most important when a peer is deleted due to ping timeout, because it all happens in kernelspace and thus userspace has no direct way to learn about it. Signed-off-by: Antonio Quartulli --- dr

[PATCH net-next v9 20/23] ovpn: kill key and notify userspace in case of IV exhaustion

2024-10-15 Thread Antonio Quartulli
IV wrap-around is cryptographically dangerous for a number of ciphers, therefore kill the key and inform userspace (via netlink) should the IV space go exhausted. Userspace has two ways of deciding when the key has to be renewed before exhausting the IV space: 1) time based approach: after X se

[PATCH net-next v9 19/23] ovpn: implement key add/del/swap via netlink

2024-10-15 Thread Antonio Quartulli
This change introduces the netlink commands needed to add, delete and swap keys for a specific peer. Userspace is expected to use these commands to create, destroy and rotate session keys for a specific peer. Signed-off-by: Antonio Quartulli --- drivers/net/ovpn/netlink.c | 210

[PATCH net-next v9 18/23] ovpn: implement peer add/dump/delete via netlink

2024-10-15 Thread Antonio Quartulli
This change introduces the netlink command needed to add, delete and retrieve/dump known peers. Userspace is expected to use these commands to handle known peer lifecycles. Signed-off-by: Antonio Quartulli --- drivers/net/ovpn/netlink.c | 578 - driver

[PATCH net-next v9 17/23] ovpn: add support for peer floating

2024-10-15 Thread Antonio Quartulli
A peer connected via UDP may change its IP address without reconnecting (float). Add support for detecting and updating the new peer IP/port in case of floating. Signed-off-by: Antonio Quartulli --- drivers/net/ovpn/bind.c | 10 ++-- drivers/net/ovpn/io.c | 9 drivers/net/ovpn/peer.c

[PATCH net-next v9 16/23] ovpn: add support for updating local UDP endpoint

2024-10-15 Thread Antonio Quartulli
In case of UDP links, the local endpoint used to communicate with a given peer may change without a connection restart. Add support for learning the new address in case of change. Signed-off-by: Antonio Quartulli --- drivers/net/ovpn/peer.c | 45 + dr

[PATCH net-next v9 15/23] ovpn: implement keepalive mechanism

2024-10-15 Thread Antonio Quartulli
OpenVPN supports configuring a periodic keepalive packet. message to allow the remote endpoint detect link failures. This change implements the keepalive sending and timer expiring logic. Signed-off-by: Antonio Quartulli --- drivers/net/ovpn/io.c | 77 + drivers/net/ovp

[PATCH net-next v9 14/23] ovpn: implement peer lookup logic

2024-10-15 Thread Antonio Quartulli
In a multi-peer scenario there are a number of situations when a specific peer needs to be looked up. We may want to lookup a peer by: 1. its ID 2. its VPN destination IP 3. its transport IP/port couple For each of the above, there is a specific routing table referencing all peers for fast look u

[PATCH net-next v9 13/23] ovpn: implement multi-peer support

2024-10-15 Thread Antonio Quartulli
With this change an ovpn instance will be able to stay connected to multiple remote endpoints. This functionality is strictly required when running ovpn on an OpenVPN server. Signed-off-by: Antonio Quartulli --- drivers/net/ovpn/main.c | 55 +- drivers/net/ovpn/ovpnstruct.h |

[PATCH net-next v9 12/23] ovpn: implement TCP transport

2024-10-15 Thread Antonio Quartulli
With this change ovpn is allowed to communicate to peers also via TCP. Parsing of incoming messages is implemented through the strparser API. Signed-off-by: Antonio Quartulli --- drivers/net/Kconfig | 1 + drivers/net/ovpn/Makefile | 1 + drivers/net/ovpn/io.c | 4 + drivers/net/

[PATCH net-next v9 11/23] ovpn: store tunnel and transport statistics

2024-10-15 Thread Antonio Quartulli
Byte/packet counters for in-tunnel and transport streams are now initialized and updated as needed. To be exported via netlink. Signed-off-by: Antonio Quartulli --- drivers/net/ovpn/Makefile | 1 + drivers/net/ovpn/crypto_aead.c | 2 ++ drivers/net/ovpn/io.c | 12 +++ dr

[PATCH net-next v9 10/23] ovpn: implement packet processing

2024-10-15 Thread Antonio Quartulli
This change implements encryption/decryption and encapsulation/decapsulation of OpenVPN packets. Support for generic crypto state is added along with a wrapper for the AEAD crypto kernel API. Signed-off-by: Antonio Quartulli --- drivers/net/ovpn/Makefile | 3 + drivers/net/ovpn/crypto.c

[PATCH net-next v9 09/23] ovpn: implement basic RX path (UDP)

2024-10-15 Thread Antonio Quartulli
Packets received over the socket are forwarded to the user device. Implementation is UDP only. TCP will be added by a later patch. Note: no decryption/decapsulation exists yet, packets are forwarded as they arrive without much processing. Signed-off-by: Antonio Quartulli --- drivers/net/ovpn/i

[PATCH net-next v9 08/23] ovpn: implement basic TX path (UDP)

2024-10-15 Thread Antonio Quartulli
Packets sent over the ovpn interface are processed and transmitted to the connected peer, if any. Implementation is UDP only. TCP will be added by a later patch. Note: no crypto/encapsulation exists yet. packets are just captured and sent. Signed-off-by: Antonio Quartulli --- drivers/net/ovpn/

[PATCH net-next v9 07/23] ovpn: introduce the ovpn_socket object

2024-10-15 Thread Antonio Quartulli
This specific structure is used in the ovpn kernel module to wrap and carry around a standard kernel socket. ovpn takes ownership of passed sockets and therefore an ovpn specific objects is attached to them for status tracking purposes. Initially only UDP support is introduced. TCP will come in a

[PATCH net-next v9 06/23] ovpn: introduce the ovpn_peer object

2024-10-15 Thread Antonio Quartulli
An ovpn_peer object holds the whole status of a remote peer (regardless whether it is a server or a client). This includes status for crypto, tx/rx buffers, napi, etc. Only support for one peer is introduced (P2P mode). Multi peer support is introduced with a later patch. Along with the ovpn_pee

[PATCH net-next v9 05/23] ovpn: keep carrier always on

2024-10-15 Thread Antonio Quartulli
An ovpn interface will keep carrier always on and let the user decide when an interface should be considered disconnected. This way, even if an ovpn interface is not connected to any peer, it can still retain all IPs and routes and thus prevent any data leak. Signed-off-by: Antonio Quartulli Rev

[PATCH net-next v9 04/23] ovpn: add basic interface creation/destruction/management routines

2024-10-15 Thread Antonio Quartulli
Add basic infrastructure for handling ovpn interfaces. Signed-off-by: Antonio Quartulli --- drivers/net/ovpn/main.c | 115 -- drivers/net/ovpn/main.h | 7 +++ drivers/net/ovpn/ovpnstruct.h | 8 +++ drivers/net/ovpn/packet.h | 40 ++

[PATCH net-next v9 03/23] ovpn: add basic netlink support

2024-10-15 Thread Antonio Quartulli
This commit introduces basic netlink support with family registration/unregistration functionalities and stub pre/post-doit. More importantly it introduces the YAML uAPI description along with its auto-generated files: - include/uapi/linux/ovpn.h - drivers/net/ovpn/netlink-gen.c - drivers/net/ovpn

[PATCH net-next v9 02/23] net: introduce OpenVPN Data Channel Offload (ovpn)

2024-10-15 Thread Antonio Quartulli
OpenVPN is a userspace software existing since around 2005 that allows users to create secure tunnels. So far OpenVPN has implemented all operations in userspace, which implies several back and forth between kernel and user land in order to process packets (encapsulate/decapsulate, encrypt/decrypt

[PATCH net-next v9 00/23] Introducing OpenVPN Data Channel Offload

2024-10-15 Thread Antonio Quartulli
This is the 9th version of the ovpn patchset. It re-introduces the RTNL Link ops and brings some changes to the Netlink API as well. Notably: * removed CMD_DEV_NEW/DEL from netlink API * re-added rtnl_link_ops.newlink implementation * removed all 'value-start: 0' from ovpn.yaml * added CMD_KEY_GE

[PATCH net-next v9 01/23] netlink: add NLA_POLICY_MAX_LEN macro

2024-10-15 Thread Antonio Quartulli
Similarly to NLA_POLICY_MIN_LEN, NLA_POLICY_MAX_LEN defines a policy with a maximum length value. The netlink generator for YAML specs has been extended accordingly. Cc: donald.hun...@gmail.com Signed-off-by: Antonio Quartulli --- include/net/netlink.h | 1 + tools/net/ynl/ynl-gen-c.py | 4

Re: [PATCH 1/3] selftests: Add a few missing gitignore files

2024-10-15 Thread Zhijian Li (Fujitsu)
On 15/10/2024 23:38, Shuah Khan wrote: > On 10/14/24 19:08, Li Zhijian wrote: >> Binary files should be added to .gitignore >> >> 'git status' complains: >> Untracked files: >> (use "git add ..." to include in what will be committed) >>   alsa/global-timer >>   alsa/utimer-test >>  

Re: [PATCH net-next v2 3/3] connector/cn_proc: Selftest for threads

2024-10-15 Thread Liam R. Howlett
* Anjali Kulkarni [241015 17:28]: > > > > On Oct 15, 2024, at 12:27 PM, Liam Howlett wrote: > > > > * Anjali Kulkarni [241015 13:30]: > >> Test to check if setting PROC_CN_MCAST_NOTIFY in proc connector API, allows > >> a thread's non-zero exit status to be returned to proc_filter. > >> > >>

Re: [PATCH net-next v2 2/3] connector/cn_proc: Kunit tests for threads hash table

2024-10-15 Thread Liam R. Howlett
* Anjali Kulkarni [241015 17:11]: ... > >> +MODULE_DESCRIPTION("KUnit test for the connector threads hashtable code"); > >> +MODULE_LICENSE("GPL"); > >> diff --git a/lib/cn_hash_test.h b/lib/cn_hash_test.h > >> new file mode 100644 > >> index ..46fcda31b25c > >> --- /dev/null > >> ++

Re: [PATCH rcu 0/3] RCU CPU stall-warning changes for v6.13

2024-10-15 Thread Joel Fernandes
On Tue, Oct 15, 2024 at 04:02:37PM -0700, Paul E. McKenney wrote: > On Tue, Oct 15, 2024 at 02:49:06PM -0400, Joel Fernandes wrote: > > On Wed, Oct 09, 2024 at 11:05:02AM -0700, Paul E. McKenney wrote: > > > Hello! > > > > > > This series contains RCU CPU stall-warning changes for v6.13: > > > >

Re: [RFC PATCH 26/39] KVM: guest_memfd: Track faultability within a struct kvm_gmem_private

2024-10-15 Thread Ackerley Tng
Peter Xu writes: > On Fri, Oct 11, 2024 at 11:32:11PM +, Ackerley Tng wrote: >> Peter Xu writes: >> >> > On Tue, Sep 10, 2024 at 11:43:57PM +, Ackerley Tng wrote: >> >> The faultability xarray is stored on the inode since faultability is a >> >> property of the guest_memfd's memory cont

Re: [PATCH v5 14/16] modules: Support extended MODVERSIONS info

2024-10-15 Thread Matthew Maurer
So, the basic things I can think of to test here are: 1. The kernel can still load the previous MODVERSIONS format 2. The kernel can load the new MODVERSIONS format 3. If we artificially tweak a CRC in the previous format, it will fail to load. 4. If we artificially tweak a CRC in the new format,

[PATCH v6 5/5] export_report: Use new version info format

2024-10-15 Thread Matthew Maurer
The new version info format has a superset of symbols in the old format. Since this is a tool for in-tree modules, we don't need to parse the old one with this tool any longer. Even if we build without CONFIG_EXTENDED_MODVERSIONS, these are still in the `.mod.c` file. Their presence in the final m

[PATCH v6 4/5] modpost: Produce extended MODVERSIONS information

2024-10-15 Thread Matthew Maurer
Generate both the existing modversions format and the new extended one when running modpost. Presence of this metadata in the final .ko is guarded by CONFIG_EXTENDED_MODVERSIONS. We no longer generate an error on long symbols in modpost if CONFIG_EXTENDED_MODVERSIONS is set, as they can now be app

[PATCH v6 3/5] export_report: Tolerate additional `.mod.c` content

2024-10-15 Thread Matthew Maurer
Currently, `export_report.pl` will error out if it sees a hex number not in the context of the original `__versions` array. This adds a "finished" state so that it does not attempt to parse content past the end of the array, and requires the array to be terminated. This is prepwork for the subsequ

[PATCH v6 2/5] modules: Support extended MODVERSIONS info

2024-10-15 Thread Matthew Maurer
Adds a new format for MODVERSIONS which stores each field in a separate ELF section. This initially adds support for variable length names, but could later be used to add additional fields to MODVERSIONS in a backwards compatible way if needed. Any new fields will be ignored by old user tooling, un

[PATCH v6 1/5] export_report: Rehabilitate script

2024-10-15 Thread Matthew Maurer
The `export_report.pl` script was broken [1] a while back due to a code cleanup causing the regex to no longer match. Additionally, it assumes a `modules.order` file containing `.ko` in a build directory with `.mod.c` files. I cannot find when this would have been the case in the history, as normal

[PATCH v6 0/5] Extended MODVERSIONS Support

2024-10-15 Thread Matthew Maurer
This patch series is intended for use alongside the Implement MODVERSIONS for RUST [1] series as a replacement for the symbol name hashing approach used there to enable RUST and MODVERSIONS at the same time. Elsewhere, we've seen a desire for long symbol name support for LTO symbol names [2], and

[PATCH 12/12] module: Reformat struct for code style

2024-10-15 Thread Matthew Maurer
Using commas to declare struct members makes adding new members to this struct not as nice with patch management. Signed-off-by: Matthew Maurer --- kernel/module/internal.h | 7 ++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/kernel/module/internal.h b/kernel/module/internal

[PATCH 11/12] module: Additional validation in elf_validity_cache_strtab

2024-10-15 Thread Matthew Maurer
Validate properties of the strtab that are depended on elsewhere, but were previously unchecked: * String table nonempty (offset 0 is valid) * String table has a leading NUL (offset 0 corresponds to "") * String table is NUL terminated (strfoo functions won't run out of the table while reading).

[PATCH 10/12] module: Factor out elf_validity_cache_strtab

2024-10-15 Thread Matthew Maurer
This patch only moves the existing strtab population to a function. Validation comes in a following patch, this is split out to make the new validation checks more clearly separated. Signed-off-by: Matthew Maurer --- kernel/module/main.c | 23 --- 1 file changed, 20 insertion

[PATCH 09/12] module: Group section index calculations together

2024-10-15 Thread Matthew Maurer
Group all the index detection together to make the parent function easier to read. Signed-off-by: Matthew Maurer --- kernel/module/main.c | 68 +--- 1 file changed, 51 insertions(+), 17 deletions(-) diff --git a/kernel/module/main.c b/kernel/module/main.c

[PATCH 08/12] module: Factor out elf_validity_cache_index_str

2024-10-15 Thread Matthew Maurer
Pull out index validation for the symbol string section. Note that this does not validate the *contents* of the string table, only shape and presence of the section. Signed-off-by: Matthew Maurer --- kernel/module/main.c | 37 - 1 file changed, 28 insertions(

[PATCH 07/12] module: Factor out elf_validity_cache_index_sym

2024-10-15 Thread Matthew Maurer
Centralize symbol table detection and property validation. Signed-off-by: Matthew Maurer --- kernel/module/main.c | 73 ++-- 1 file changed, 44 insertions(+), 29 deletions(-) diff --git a/kernel/module/main.c b/kernel/module/main.c index b633347d5d98..955

[PATCH 06/12] module: Factor out elf_validity_cache_index_mod

2024-10-15 Thread Matthew Maurer
Centralize .gnu.linkonce.this_module detection and property validation. Signed-off-by: Matthew Maurer --- kernel/module/main.c | 129 ++- 1 file changed, 67 insertions(+), 62 deletions(-) diff --git a/kernel/module/main.c b/kernel/module/main.c index 6747

[PATCH 05/12] module: Factor out elf_validity_cache_index_info

2024-10-15 Thread Matthew Maurer
Centralize .modinfo detection and property validation. Signed-off-by: Matthew Maurer --- kernel/module/main.c | 82 1 file changed, 68 insertions(+), 14 deletions(-) diff --git a/kernel/module/main.c b/kernel/module/main.c index 473f1fb25de2..6747cbc

[PATCH 04/12] module: Factor out elf_validity_cache_secstrings

2024-10-15 Thread Matthew Maurer
Factor out the validation of section names. There are two behavioral changes: 1. Previously, we did not validate non-SHF_ALLOC sections. This may have once been safe, as find_sec skips non-SHF_ALLOC sections, but find_any_sec, which will be used to load BTF if that is enabled, ignores th

[PATCH 03/12] module: Factor out elf_validity_cache_sechdrs

2024-10-15 Thread Matthew Maurer
Factor out and document the validation of section headers. Because we now validate all section offsets and lengths before accessing them, we can remove the ad-hoc checks. Signed-off-by: Matthew Maurer --- kernel/module/main.c | 125 --- 1 file changed, 82

[PATCH 02/12] module: Factor out elf_validity_ehdr

2024-10-15 Thread Matthew Maurer
Factor out verification of the ELF header and document what is checked. Signed-off-by: Matthew Maurer --- kernel/module/main.c | 70 +--- 1 file changed, 47 insertions(+), 23 deletions(-) diff --git a/kernel/module/main.c b/kernel/module/main.c index 1ed1

[PATCH 01/12] module: Take const arg in validate_section_offset

2024-10-15 Thread Matthew Maurer
`validate_section_offset` doesn't modify the info passed in. Make this clear by adjusting the type signature. Signed-off-by: Matthew Maurer --- kernel/module/main.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/module/main.c b/kernel/module/main.c index ef54733bd7d2.

[PATCH 00/12] Module Validation Refactor

2024-10-15 Thread Matthew Maurer
Split out from Extended MODVERSIONS Support [1] This series refactors module validation during loading to ensure that everything is checked on its way in. This is intended to make the code robust enough that we can more confidently add new pieces like extended MODVERSIONS. [1] https://lore.kernel

Re: [PATCH rcu 0/3] RCU CPU stall-warning changes for v6.13

2024-10-15 Thread Paul E. McKenney
On Tue, Oct 15, 2024 at 02:49:06PM -0400, Joel Fernandes wrote: > On Wed, Oct 09, 2024 at 11:05:02AM -0700, Paul E. McKenney wrote: > > Hello! > > > > This series contains RCU CPU stall-warning changes for v6.13: > > > > 1. Delete unused rcu_gp_might_be_stalled() function. > > > > 2. Stop stal

Re: [RFC PATCH 26/39] KVM: guest_memfd: Track faultability within a struct kvm_gmem_private

2024-10-15 Thread Peter Xu
On Fri, Oct 11, 2024 at 11:32:11PM +, Ackerley Tng wrote: > Peter Xu writes: > > > On Tue, Sep 10, 2024 at 11:43:57PM +, Ackerley Tng wrote: > >> The faultability xarray is stored on the inode since faultability is a > >> property of the guest_memfd's memory contents. > >> > >> In this R

Re: [PATCH net-next v2 3/3] connector/cn_proc: Selftest for threads

2024-10-15 Thread Anjali Kulkarni
> On Oct 15, 2024, at 12:27 PM, Liam Howlett wrote: > > * Anjali Kulkarni [241015 13:30]: >> Test to check if setting PROC_CN_MCAST_NOTIFY in proc connector API, allows >> a thread's non-zero exit status to be returned to proc_filter. >> >> The threads.c program creates 2 child threads. 1st t

Re: [PATCH net-next v2 2/3] connector/cn_proc: Kunit tests for threads hash table

2024-10-15 Thread Anjali Kulkarni
> On Oct 15, 2024, at 12:16 PM, Liam Howlett wrote: > > * Anjali Kulkarni [241015 13:30]: >> Kunit tests to test hash table add, delete, duplicate add and delete. >> Add following configs and compile kernel code: >> >> CONFIG_CONNECTOR=y >> CONFIG_PROC_EVENTS=y >> CONFIG_NET=y >> CONFIG_KUNIT

Re: [PATCH v1 4/5] dt-bindings: remoteproc: add binding for Microchip IPC remoteproc

2024-10-15 Thread Conor Dooley
On Tue, Oct 15, 2024 at 03:35:46PM +0200, Krzysztof Kozlowski wrote: > On 15/10/2024 14:09, valentina.fernandezala...@microchip.com wrote: > > On 16/09/2024 21:14, Krzysztof Kozlowski wrote: > >> EXTERNAL EMAIL: Do not click links or open attachments unless you know the > >> content is safe > >> >

Re: [PATCH 1/3] KVM: x86, vmx: Add function for event delivery error generation

2024-10-15 Thread Ivan Orlov
Hi Sean, On Fri, Oct 11, 2024 at 04:20:46PM -0700, Sean Christopherson wrote: > "KVM: VMX:" for the scope. See "Shortlog" in > Documentation/process/maintainer-kvm-x86.rst > Ah, will update in the next version, thanks! > On Fri, Sep 27, 2024, Ivan Orlov wrote: > > Extract KVM_INTERNAL_ERROR_DE

Re: [PATCH v2 1/3] pidfd: extend pidfd_get_pid() and de-duplicate pid lookup

2024-10-15 Thread Suren Baghdasaryan
On Fri, Oct 11, 2024 at 4:06 AM Lorenzo Stoakes wrote: > > The means by which a pid is determined from a pidfd is duplicated, with > some callers holding a reference to the (pid)fd, and others explicitly > pinning the pid. > > Introduce __pidfd_get_pid() which abstracts both approaches and provide

Re: [PATCH net-next v2 3/3] connector/cn_proc: Selftest for threads

2024-10-15 Thread Liam R. Howlett
* Anjali Kulkarni [241015 13:30]: > Test to check if setting PROC_CN_MCAST_NOTIFY in proc connector API, allows > a thread's non-zero exit status to be returned to proc_filter. > > The threads.c program creates 2 child threads. 1st thread handles signal > SIGSEGV, and 2nd thread needs to indicate

Re: [PATCH net-next v2 2/3] connector/cn_proc: Kunit tests for threads hash table

2024-10-15 Thread Liam R. Howlett
* Anjali Kulkarni [241015 13:30]: > Kunit tests to test hash table add, delete, duplicate add and delete. > Add following configs and compile kernel code: > > CONFIG_CONNECTOR=y > CONFIG_PROC_EVENTS=y > CONFIG_NET=y > CONFIG_KUNIT=m > CONFIG_CN_HASH_KUNIT_TEST=m > > To run kunit tests: > sudo mo

Re: [PATCH net-next v2 1/3] connector/cn_proc: Add hash table for threads

2024-10-15 Thread Anjali Kulkarni
Thanks for the review! See below: > On Oct 15, 2024, at 11:28 AM, Liam Howlett wrote: > > * Anjali Kulkarni [241015 13:30]: >> Add a new type PROC_CN_MCAST_NOTIFY to proc connector API, which allows a >> thread to notify the kernel that is going to exit with a non-zero exit >> code and specify

Re: [PATCH rcu 0/3] RCU CPU stall-warning changes for v6.13

2024-10-15 Thread Joel Fernandes
On Wed, Oct 09, 2024 at 11:05:02AM -0700, Paul E. McKenney wrote: > Hello! > > This series contains RCU CPU stall-warning changes for v6.13: > > 1.Delete unused rcu_gp_might_be_stalled() function. > > 2.Stop stall warning from dumping stacks if grace period ends. > > 3.Finer-grained

Re: [PATCH rcu 2/3] rcu: Stop stall warning from dumping stacks if grace period ends

2024-10-15 Thread Joel Fernandes
On Wed, Oct 09, 2024 at 11:05:08AM -0700, Paul E. McKenney wrote: > Currently, once an RCU CPU stall warning decides to dump the stalling > CPUs' stacks, the rcu_dump_cpu_stacks() function persists until it > has gone through the full list. Unfortunately, if the stalled grace > periods ends midway

Re: [PATCH v3 03/11] iommufd: Introduce IOMMUFD_OBJ_VIOMMU and its related struct

2024-10-15 Thread Nicolin Chen
On Mon, Oct 14, 2024 at 07:01:40PM -0700, Nicolin Chen wrote: > On Tue, Oct 15, 2024 at 09:15:01AM +0800, Zhangfei Gao wrote: > > > > > iommufd_device_bind > > > > iommufd_device_attach > > > > iommufd_vdevice_alloc_ioctl > > > > > > > > iommufd_device_detach > > > > iommufd_device_unbind // refco

Re: [PATCH net-next v2 1/3] connector/cn_proc: Add hash table for threads

2024-10-15 Thread Liam R. Howlett
* Anjali Kulkarni [241015 13:30]: > Add a new type PROC_CN_MCAST_NOTIFY to proc connector API, which allows a > thread to notify the kernel that is going to exit with a non-zero exit > code and specify the exit code in it. When thread exits in the kernel, > it will send this exit code as a proc fi

Re: [PATCH] rpmsg_ns: Work around TI non-standard message

2024-10-15 Thread Richard Weinberger
Am Dienstag, 15. Oktober 2024, 19:56:08 CEST schrieb Mathieu Poirier: > > > In my opinion the real fix here is to get TI to use the standard message > > > announcement structure. The ->desc field doesn't seem to be that useful > > > since > > > it gets discarted. > > > > This is for the future,

Re: [PATCH net v2 0/2] mptcp: prevent MPC handshake on port-based signal endpoints

2024-10-15 Thread patchwork-bot+netdevbpf
Hello: This series was applied to netdev/net.git (main) by Jakub Kicinski : On Mon, 14 Oct 2024 16:05:59 +0200 you wrote: > MPTCP connection requests toward a listening socket created by the > in-kernel PM for a port based signal endpoint will never be accepted, > they need to be explicitly rejec

Re: [PATCH] rpmsg_ns: Work around TI non-standard message

2024-10-15 Thread Mathieu Poirier
On Tue, Oct 15, 2024 at 06:58:33PM +0200, Richard Weinberger wrote: > Mathieu, > > Am Dienstag, 15. Oktober 2024, 18:48:08 CEST schrieb Mathieu Poirier: > > Good morning Richard, > > > > On Fri, Oct 11, 2024 at 02:39:22PM +0200, Richard Weinberger wrote: > > > Texas Instruments ships a patch in t

[RFC PATCH 6/7] mm/damon: remove DAMON debugfs interface kunit tests

2024-10-15 Thread SeongJae Park
It's time to remove DAMON debugfs interface, which has deprecated long before in February 2023. Read the cover letter of this patch series for more details. Remove kunit tests for the interface, to prevent unnecessary test failures. Signed-off-by: SeongJae Park --- mm/damon/Kconfig

[RFC PATCH 5/7] kunit: configs: remove configs for DAMON debugfs interface tests

2024-10-15 Thread SeongJae Park
It's time to remove DAMON debugfs interface, which has deprecated long before in February 2023. Read the cover letter of this patch series for more details. Remove kernel configs for running DAMON debugfs interface kunit tests from the kunit all_tests configuration, to prevent unnecessary noises

[RFC PATCH 4/7] selftests/damon: remove tests for DAMON debugfs interface

2024-10-15 Thread SeongJae Park
It's time to remove DAMON debugfs interface, which has deprecated long before in February 2023. Read the cover letter of this patch series for more details. Remove selftests for the interface, to prevent causing unnecessary test failures. Signed-off-by: SeongJae Park --- tools/testing/selftest

[RFC PATCH 3/7] selftests/damon/config: remove configs for DAMON debugfs interface selftests

2024-10-15 Thread SeongJae Park
It's time to remove DAMON debugfs interface, which has deprecated long before in February 2023. Read the cover letter of this patch series for more details. Remove configs for selftests of it from DAMON selftests config file, to prevent unnecessary noises from the tests. [1] https://lore.kernel.

Re: [PATCH 00/10] remoteproc: few dev_err_probe() and other cleanups/improvements

2024-10-15 Thread Mathieu Poirier
On Fri, Oct 11, 2024 at 03:09:08PM +0200, Krzysztof Kozlowski wrote: > Simplify drivers in few places around probe function. > > Best regards, > Krzysztof > > --- > Krzysztof Kozlowski (10): > remoteproc: da8xx: Handle deferred probe > remoteproc: da8xx: Simplify with dev_err_probe()

[PATCH net-next v2 3/3] connector/cn_proc: Selftest for threads

2024-10-15 Thread Anjali Kulkarni
Test to check if setting PROC_CN_MCAST_NOTIFY in proc connector API, allows a thread's non-zero exit status to be returned to proc_filter. The threads.c program creates 2 child threads. 1st thread handles signal SIGSEGV, and 2nd thread needs to indicate some error condition (value 1) to the kernel

[PATCH net-next v2 2/3] connector/cn_proc: Kunit tests for threads hash table

2024-10-15 Thread Anjali Kulkarni
Kunit tests to test hash table add, delete, duplicate add and delete. Add following configs and compile kernel code: CONFIG_CONNECTOR=y CONFIG_PROC_EVENTS=y CONFIG_NET=y CONFIG_KUNIT=m CONFIG_CN_HASH_KUNIT_TEST=m To run kunit tests: sudo modprobe cn_hash_test Output of kunit tests and hash table

[PATCH net-next v2 1/3] connector/cn_proc: Add hash table for threads

2024-10-15 Thread Anjali Kulkarni
Add a new type PROC_CN_MCAST_NOTIFY to proc connector API, which allows a thread to notify the kernel that is going to exit with a non-zero exit code and specify the exit code in it. When thread exits in the kernel, it will send this exit code as a proc filter notification to any listening process.

[PATCH net-next v2 0/3] Threads support in proc connector

2024-10-15 Thread Anjali Kulkarni
Recently we committed a fix to allow processes to receive notifications for non-zero exits via the process connector module. Commit is a4c9a56e6a2c. However, for threads, when it does a pthread_exit(&exit_status) call, the kernel is not aware of the exit status with which pthread_exit is called. I

Re: [PATCH net-next v04 0/3] net: af_packet: allow joining a fanout when link is down

2024-10-15 Thread patchwork-bot+netdevbpf
Hello: This series was applied to netdev/net-next.git (main) by Jakub Kicinski : On Sun, 13 Oct 2024 10:15:24 +0300 you wrote: > PACKET socket can retain its fanout membership through link down and up > and leave a fanout while closed regardless of link state. > However, socket was forbidden from

[PATCH v3] selftests: tc-testing: Fix spelling errors in cgroup.json and flow.json

2024-10-15 Thread Karan Sanghavi
This patch corrects typographical errors in the "name" fields of the JSON objects with IDs "4319" and "4341" in the tc-testing selftests. - "diffferent" is corrected to "different". - "muliple" is corrected to "multiple". Signed-off-by: Karan Sanghavi --- v3: - Corrected the change logs to make

Re: [PATCH] rpmsg_ns: Work around TI non-standard message

2024-10-15 Thread Richard Weinberger
Mathieu, Am Dienstag, 15. Oktober 2024, 18:48:08 CEST schrieb Mathieu Poirier: > Good morning Richard, > > On Fri, Oct 11, 2024 at 02:39:22PM +0200, Richard Weinberger wrote: > > Texas Instruments ships a patch in their vendor kernels, > > which adds a new NS message that includes a description f

Re: [PATCH net-next v1 0/3] Threads support in proc connector

2024-10-15 Thread Anjali Kulkarni
On 10/15/24, 9:48 AM, "Jakub Kicinski" mailto:k...@kernel.org>> wrote: On Tue, 15 Oct 2024 16:22:24 + Anjali Kulkarni wrote: > Thank you! However, looking at the MAINTAINERS file, > drivers/connector/ is listed under NETWORKING DRIVERS. > Hence sending on net-next is the most appropriate p

Re: [PATCH net-next v1 0/3] Threads support in proc connector

2024-10-15 Thread Jakub Kicinski
On Tue, 15 Oct 2024 16:22:24 + Anjali Kulkarni wrote: > Thank you! However, looking at the MAINTAINERS file, > drivers/connector/ is listed under NETWORKING DRIVERS. > Hence sending on net-next is the most appropriate place? Hm. It was done relatively recently in commit 46cf789b68b25744be3

Re: [PATCH] rpmsg_ns: Work around TI non-standard message

2024-10-15 Thread Mathieu Poirier
Good morning Richard, On Fri, Oct 11, 2024 at 02:39:22PM +0200, Richard Weinberger wrote: > Texas Instruments ships a patch in their vendor kernels, > which adds a new NS message that includes a description field. > While TI is free to do whatever they want in their copy of the kernel, > it become

Re: [PATCH net-next v1 0/3] Threads support in proc connector

2024-10-15 Thread Anjali Kulkarni
On 10/15/24, 9:02 AM, "Jakub Kicinski" mailto:k...@kernel.org>> wrote: On Sun, 13 Oct 2024 10:06:14 -0700 Anjali Kulkarni wrote: > However, for threads, when it does a pthread_exit(&exit_status) call, the > kernel is not aware of the exit status with which pthread_exit is called. > It is sent

[PATCH rcu 11/15] rcutorture: Add reader_flavor parameter for SRCU readers

2024-10-15 Thread Paul E. McKenney
This commit adds an rcutorture.reader_flavor parameter whose bits correspond to reader flavors. For example, SRCU's readers are 0x1 for normal and 0x2 for NMI-safe. Signed-off-by: Paul E. McKenney Cc: Alexei Starovoitov Cc: Andrii Nakryiko Cc: Peter Zijlstra Cc: Kent Overstreet Cc: --- ...

[PATCH rcu 14/15] refscale: Add srcu_read_lock_lite() support using "srcu-lite"

2024-10-15 Thread Paul E. McKenney
This commit creates a new srcu-lite option for the refscale.scale_type module parameter that selects srcu_read_lock_lite() and srcu_read_unlock_lite(). Signed-off-by: Paul E. McKenney Cc: Alexei Starovoitov Cc: Andrii Nakryiko Cc: Peter Zijlstra Cc: Kent Overstreet Cc: --- kernel/rcu/refsca

[PATCH rcu 12/15] rcutorture: Add srcu_read_lock_lite() support to rcutorture.reader_flavor

2024-10-15 Thread Paul E. McKenney
This commit causes bit 0x4 of rcutorture.reader_flavor to select the new srcu_read_lock_lite() and srcu_read_unlock_lite() functions. Signed-off-by: Paul E. McKenney Cc: Alexei Starovoitov Cc: Andrii Nakryiko Cc: Peter Zijlstra Cc: Kent Overstreet Cc: --- Documentation/admin-guide/kernel-pa

[PATCH rcu 15/15] srcu: Improve srcu_read_lock_lite() kernel-doc comment

2024-10-15 Thread Paul E. McKenney
Where RCU is watching is where it is OK to invoke rcu_read_lock(). Reported-by: Andrii Nakryiko Signed-off-by: Paul E. McKenney Acked-by: Andrii Nakryiko --- include/linux/srcu.h | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/include/linux/srcu.h b/include/linux/srcu.h i

[PATCH rcu 09/15] srcu: Allow inlining of __srcu_read_{,un}lock_lite()

2024-10-15 Thread Paul E. McKenney
This commit moves __srcu_read_lock_lite() and __srcu_read_unlock_lite() into include/linux/srcu.h and marks them "static inline" so that they can be inlined into srcu_read_lock_lite() and srcu_read_unlock_lite(), respectively. They are not hand-inlined due to Tree SRCU and Tiny SRCU having differe

[PATCH rcu 13/15] rcutorture: Add light-weight SRCU scenario

2024-10-15 Thread Paul E. McKenney
This commit adds an rcutorture scenario that tests light-weight SRCU readers. While in the area, it adjusts the size of the TREE10 scenario. Signed-off-by: Paul E. McKenney Cc: Alexei Starovoitov Cc: Andrii Nakryiko Cc: Peter Zijlstra Cc: Kent Overstreet Cc: --- tools/testing/selftests/rcu

  1   2   >