Re: [GIT PULL] Compiler Attributes for v4.20-rc1

2018-11-04 Thread Martin Schwidefsky
On Fri, 2 Nov 2018 09:09:32 -0700 Linus Torvalds wrote: > On Fri, Nov 2, 2018 at 2:43 AM Andrey Ryabinin > wrote: > > > > You're right, version checks shouldn't matter here. But > > __no_sanitize_address_or_inline > > shouldn't have been added in the first place, because we already have > > a

Re: [PATCH] Documentation: cpufreq: Correct a typo

2018-11-04 Thread Viresh Kumar
+Rafael On Thu, Nov 1, 2018 at 7:06 AM Zhao Wei Liew wrote: > > Fix a typo in the admin-guide documentation for cpufreq. > > Signed-off-by: Zhao Wei Liew > --- > Documentation/admin-guide/pm/cpufreq.rst | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/Documentation/admin

[PATCH V7 3/9] misc/pvpanic: add MMIO support

2018-11-04 Thread Peng Hao
On some architectures (e.g. arm64), it's preferable to use MMIO, since this can be used standalone. Add MMIO support to the pvpanic driver. Suggested-by: Andy Shevchenko [Use acpi_dev_resource_memory API. - Andy] Reviewed-by: Andy Shevchenko Acked-by: Mark Rutland Signed-off-by: Peng Hao ---

[PATCH V7 9/9] misc/pvpanic: remove a redundant comma

2018-11-04 Thread Peng Hao
Remove a redundant comma in pvpanic_device_ids. Acked-by: Mark Rutland Signed-off-by: Peng Hao --- drivers/misc/pvpanic.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/misc/pvpanic.c b/drivers/misc/pvpanic.c index f416c01..8c4bfa6 100644 --- a/drivers/misc/pvpanic.

[PATCH V7 1/9] pvpanic: move pvpanic to misc as common driver

2018-11-04 Thread Peng Hao
Move pvpanic.c from drivers/platform/x86 to drivers/misc. Following patches will use pvpanic device in arm64. Reviewed-by: Andy Shevchenko Acked-by: Mark Rutland Signed-off-by: Peng Hao --- drivers/misc/Kconfig | 8 drivers/misc/Makefile| 1 + d

[PATCH V7 4/9] dt-bindings: misc/pvpanic: add document for pvpanic-mmio

2018-11-04 Thread Peng Hao
Add dt-bindings document for "qemu:pvpanic-mmio". Acked-by: Mark Rutland Signed-off-by: Peng Hao --- .../devicetree/bindings/misc/pvpanic-mmio.txt | 29 ++ 1 file changed, 29 insertions(+) create mode 100644 Documentation/devicetree/bindings/misc/pvpanic-mmio.txt diff

[PATCH V7 5/9] misc/pvpanic: add support to get pvpanic device info by FDT

2018-11-04 Thread Peng Hao
By default, when ACPI tables and FDT coexist for ARM64, current kernel takes precedence over FDT to get device information. Virt machine in qemu provides both FDT and ACPI table. Increases the way to get information through FDT. Acked-by: Mark Rutland Signed-off-by: Peng Hao --- drivers/misc/pv

[PATCH V7 6/9] misc/pvpanic : break dependency on ACPI

2018-11-04 Thread Peng Hao
The pvpanic driver is available for architectures that do not support ACPI.So break the dependency. Signed-off-by: Peng Hao --- drivers/misc/Kconfig | 2 +- drivers/misc/pvpanic.c | 32 ++-- 2 files changed, 27 insertions(+), 7 deletions(-) diff --git a/drivers/mi

[PATCH V7 8/9] misc/pvpanic: convert to SPDX license tags

2018-11-04 Thread Peng Hao
Updates license to use SPDX-License-Identifier instead of verbose license text. Reviewed-by: Andy Shevchenko Acked-by: Mark Rutland Signed-off-by: Peng Hao --- drivers/misc/pvpanic.c | 17 ++--- 1 file changed, 2 insertions(+), 15 deletions(-) diff --git a/drivers/misc/pvpanic.c b

[PATCH V7 2/9] misc/pvpanic: simplify the code using acpi_dev_resource_io

2018-11-04 Thread Peng Hao
Use acpi_dev_resource_io API. Suggested-by: Andy Shevchenko Reviewed-by: Andy Shevchenko Acked-by: Mark Rutland Signed-off-by: Peng Hao --- drivers/misc/pvpanic.c | 13 + 1 file changed, 5 insertions(+), 8 deletions(-) diff --git a/drivers/misc/pvpanic.c b/drivers/misc/pvpanic.c

[PATCH V7 7/9] misc/pvpanic: remove unnecessary header file

2018-11-04 Thread Peng Hao
Remove unnecessary header file init.h. Reviewed-by: Andy Shevchenko Acked-by: Mark Rutland Signed-off-by: Peng Hao --- drivers/misc/pvpanic.c | 1 - 1 file changed, 1 deletion(-) diff --git a/drivers/misc/pvpanic.c b/drivers/misc/pvpanic.c index fbb4d1f..e3d879b 100644 --- a/drivers/misc/pvpa

[PATCH 2/2 resend] Documentation/admin-guide: fix grammar in dynamic-debug-howto.rst

2018-11-04 Thread Randy Dunlap
From: Randy Dunlap Fix grammar about wildcards and insert a space between sentences. Signed-off-by: Randy Dunlap Cc: Jason Baron Cc: Jonathan Corbet Cc: linux-doc@vger.kernel.org Cc: Will Korteland --- v2: s/A another/Another/ # from Will Documentation/admin-guide/dynamic-debug-howto.rst |

[PATCH 1/2 resend] Documentation/admin-guide: fix typos in dynamic-debug-howto.rst

2018-11-04 Thread Randy Dunlap
From: Randy Dunlap Fix a few "typos" in dynamic-debug-howto.rst. s/dyndbg_query/ddebug_query/ s/sysfs/debugfs/ Signed-off-by: Randy Dunlap Cc: Jason Baron Cc: Jonathan Corbet Cc: linux-doc@vger.kernel.org --- Documentation/admin-guide/dynamic-debug-howto.rst |4 ++-- 1 file changed, 2 i

[PATCH resend] Documentation/dev-tools: clean up kselftest.rst

2018-11-04 Thread Randy Dunlap
From: Randy Dunlap This is a small cleanup to kselftest.rst: - Fix some language typos in the usage instructions. - Change one non-ASCII space to an ASCII space. Signed-off-by: Randy Dunlap Cc: Shuah Khan Cc: Jonathan Corbet Cc: linux-kselft...@vger.kernel.org Cc: linux-doc@vger.kernel.org -

[PATCH resend] Documentation/x86: fix typo in zero-page.txt

2018-11-04 Thread Randy Dunlap
From: Randy Dunlap Fix a typo in Documentation/x86/zero-page.txt. Signed-off-by: Randy Dunlap Cc: x...@kernel.org Cc: Jonathan Corbet Cc: linux-doc@vger.kernel.org --- Documentation/x86/zero-page.txt |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- linux-next-20181101.orig/Docume

[PATCH V6 0/8] KVM: X86: Introducing ROE Protection Kernel Hardening

2018-11-04 Thread Ahmed Abd El Mawgood
-- Summary -- ROE is a hypercall that enables host operating system to restrict guest's access to its own memory. This will provide a hardening mechanism that can be used to stop rootkits from manipulating kernel static data structures and code. Once a memory region is protected the guest kernel c

[PATCH V6 5/8] KVM: X86: Enable ROE for x86

2018-11-04 Thread Ahmed Abd El Mawgood
This patch implements kvm_roe_arch_commit_protection and kvm_roe_arch_is_userspace for x86, and invoke kvm_roe via the appropriate vmcall. Signed-off-by: Ahmed Abd El Mawgood --- arch/x86/include/asm/kvm_host.h | 2 +- arch/x86/kvm/Kconfig| 8 +++ arch/x86/kvm/Makefile

[PATCH V6 2/8] KVM: X86: Add arbitrary data pointer in kvm memslot iterator functions

2018-11-04 Thread Ahmed Abd El Mawgood
This will help sharing data into the slot_level_handler callback. In my case I need to a share a counter for the pages traversed to use it in some bitmap. Being able to send arbitrary memory pointer into the slot_level_handler callback made it easy. Signed-off-by: Ahmed Abd El Mawgood --- arch/x

[PATCH V6 4/8] KVM: Create architecture independent ROE skeleton

2018-11-04 Thread Ahmed Abd El Mawgood
This patch introduces a hypercall that can assist against subset of kernel rootkits, it works by place readonly protection in shadow PTE. The end result protection is also kept in a bitmap for each kvm_memory_slot and is used as reference when updating SPTEs. The whole goal is to protect the guest

[PATCH V6 3/8] KVM: Document Memory ROE

2018-11-04 Thread Ahmed Abd El Mawgood
ROE version documented here is implemented in the next 2 patches Signed-off-by: Ahmed Abd El Mawgood --- Documentation/virtual/kvm/hypercalls.txt | 31 1 file changed, 31 insertions(+) diff --git a/Documentation/virtual/kvm/hypercalls.txt b/Documentation/virtual/kvm/hy

[PATCH V6 1/8] KVM: State whether memory should be freed in kvm_free_memslot

2018-11-04 Thread Ahmed Abd El Mawgood
The conditions upon which kvm_free_memslot are kind of confusing, it will be hard to extend memslot with allocatable data that needs to be freed, so I replaced the current mechanism by the change flag, it states if the memory slot should be freed or not. Signed-off-by: Ahmed Abd El Mawgood --- v

[PATCH V6 6/8] KVM: Add support for byte granular memory ROE

2018-11-04 Thread Ahmed Abd El Mawgood
This patch documents and implements ROE_MPROTECT_CHUNK, a part of ROE hypercall designed to protect regions of a memory page with byte granularity. This feature provides a key primitive to protect against attacks involving pages remapping. Signed-off-by: Ahmed Abd El Mawgood --- Documentation/vir

[PATCH V6 7/8] KVM: X86: Port ROE_MPROTECT_CHUNK to x86

2018-11-04 Thread Ahmed Abd El Mawgood
Apply d->memslot->partial_roe_bitmap to shadow page table entries too. Signed-off-by: Ahmed Abd El Mawgood --- arch/x86/kvm/roe.c | 5 - 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/arch/x86/kvm/roe.c b/arch/x86/kvm/roe.c index cd3e6944c15f..b2b50fbcd598 100644 --- a/arch/x86

[PATCH V6 8/8] KVM: Log ROE violations in system log

2018-11-04 Thread Ahmed Abd El Mawgood
Signed-off-by: Ahmed Abd El Mawgood --- virt/kvm/kvm_main.c| 7 +++ virt/kvm/roe.c | 14 ++ virt/kvm/roe_generic.h | 2 ++ 3 files changed, 23 insertions(+) diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c index 48c5d9d9474e..d625db7f5350 100644 --- a/virt/kvm

Re: [PATCH v3 1/2] kretprobe: produce sane stack traces

2018-11-04 Thread Aleksa Sarai
On 2018-11-03, Aleksa Sarai wrote: > This is actually a general bug in ftrace as well, because (for > instance) while the unwinder calls into ftrace_graph_ret_addr() while > walking up the stack this isn't used to correct regs->ip in > perf_callchain_kernel(). I think this is the cause of the bug

Re: [PATCH v15 23/23] x86/sgx: Driver documentation

2018-11-04 Thread Mike Rapoport
On Sat, Nov 03, 2018 at 01:11:22AM +0200, Jarkko Sakkinen wrote: > Documentation of the features of the Software Guard eXtensions used > by the Linux kernel and basic design choices for the core and driver > and functionality. > > Signed-off-by: Jarkko Sakkinen > --- > Documentation/index.rst