Re: [PATCH] Mark "Out of Date" addresses as undeliverable

2016-04-26 Thread Jonathan Corbet
On Thu, 21 Apr 2016 23:04:26 +0800 Zhigang Gao wrote: > Chinese maintainer for help. Contact the Chinese maintainer, if this > translation is outdated or there is problem with translation. > > -Chinese maintainer: Zhang Le > +Chinese maintainer: Zhang Le So this makes me a little uncomfo

Re: [PATCH v2 0/2] moves samples out of Documentation directory

2016-04-26 Thread Jonathan Corbet
On Mon, 25 Apr 2016 18:03:07 +0200 Arnd Bergmann wrote: > As suggested by Nicolas Pitre, here is a resend of two patches to > move the kernel modules from Documentation/*/ to samples/*/. > > With Nico's changes in place, it's no longer necessary to do this, > but it seems like a good idea anyway

Re: [PATCH] Changed the path from to the incorrect drivers/char/sysrq.c to drivers/tty/sysrq.c

2016-04-26 Thread Jonathan Corbet
On Fri, 22 Apr 2016 21:17:23 +0200 René Nyffenegger wrote: > This is my first patch submission. Please let me know if I have made a > mistake anywhere. Thank you for improving the documentation! Unfortunately, the patch was corrupted by your mail client and does not apply. Could I please ask

Re: [PATCH 20/25] arm64:ilp32: add sys_ilp32.c and a separate table (in entry.S) to use it

2016-04-26 Thread Catalin Marinas
On Mon, Apr 25, 2016 at 09:47:40PM +0300, Yury Norov wrote: > On Mon, Apr 25, 2016 at 09:19:13PM +0300, Yury Norov wrote: > > On Mon, Apr 25, 2016 at 06:26:56PM +0100, Catalin Marinas wrote: > > > On Wed, Apr 06, 2016 at 01:08:42AM +0300, Yury Norov wrote: > > > > --- a/arch/arm64/kernel/entry.S >

Re: [PATCH] Mark "Out of Date" addresses as undeliverable

2016-04-26 Thread Zefan Li
On 2016/4/26 17:52, Jonathan Corbet wrote: > On Thu, 21 Apr 2016 23:04:26 +0800 > Zhigang Gao wrote: > >> Chinese maintainer for help. Contact the Chinese maintainer, if this >> translation is outdated or there is problem with translation. >> >> -Chinese maintainer: Zhang Le >> +Chinese mai

Re: [PATCH v2 0/2] moves samples out of Documentation directory

2016-04-26 Thread Hans Verkuil
On 04/26/2016 11:59 AM, Jonathan Corbet wrote: > On Mon, 25 Apr 2016 18:03:07 +0200 > Arnd Bergmann wrote: > >> As suggested by Nicolas Pitre, here is a resend of two patches to >> move the kernel modules from Documentation/*/ to samples/*/. >> >> With Nico's changes in place, it's no longer ne

Re: [PATCH v2 0/2] moves samples out of Documentation directory

2016-04-26 Thread Mauro Carvalho Chehab
Em Tue, 26 Apr 2016 12:28:42 +0200 Hans Verkuil escreveu: > On 04/26/2016 11:59 AM, Jonathan Corbet wrote: > > On Mon, 25 Apr 2016 18:03:07 +0200 > > Arnd Bergmann wrote: > > > >> As suggested by Nicolas Pitre, here is a resend of two patches to > >> move the kernel modules from Documentation

Re: [RFC v6 00/10] vfio-pci: Allow to mmap sub-page MMIO BARs and MSI-X table

2016-04-26 Thread Alex Williamson
On Mon, 25 Apr 2016 18:05:53 +0800 Yongji Xie wrote: > Hi Alex, > > Any comment? TBH, I shuffled this to the bottom of the review pile because you're depending on a patch series for ARM MSI mapping that's still very much in flux. You've really got 3 or 4 separate patch series here that should

Re: [PATCH 20/25] arm64:ilp32: add sys_ilp32.c and a separate table (in entry.S) to use it

2016-04-26 Thread Catalin Marinas
On Wed, Apr 06, 2016 at 01:08:42AM +0300, Yury Norov wrote: > +/* Using non-compat syscalls where necessary */ > +#define compat_sys_fadvise64_64sys_fadvise64_64 > +#define compat_sys_fallocate sys_fallocate > +#define compat_sys_ftruncate64 sys_ftruncate > +#define compat

[PATCH locking 0/4] locktorture and memory-barriers.txt updates

2016-04-26 Thread Paul E. McKenney
Hello! This series contains a few memory-barriers.txt updates and a locktorture cleanup: 1. Add a disclaimer to memory-barrier.txt, courtesy of Peter Zijlstra. 2. Explicitly state the purpose of memory-barrier.txt, courtesy of David Howells. 3. Explicitly state th

[PATCH locking 1/4] documentation: Add disclaimer

2016-04-26 Thread Paul E. McKenney
From: Peter Zijlstra It appears people are reading this document as a requirements list for building hardware. This is not the intent of this document. Nor is it particularly suited for this purpose. The primary purpose of this document is our collective attempt to define a set of primitives tha

[PATCH locking 3/4] documentation: ACQUIRE applies to loads, RELEASE applies to stores

2016-04-26 Thread Paul E. McKenney
From: Will Deacon For compound atomics performing both a load and a store operation, make it clear that _acquire and _release variants refer only to the load and store portions of compound atomic. For example, xchg_acquire is an xchg operation where the load takes on ACQUIRE semantics. Cc: Paul

[PATCH locking 2/4] documentation: State purpose of memory-barriers.txt

2016-04-26 Thread Paul E. McKenney
From: David Howells There has been some confusion about the purpose of memory-barriers.txt, so this commit adds a statement of purpose. Signed-off-by: David Howells Signed-off-by: Paul E. McKenney --- Documentation/memory-barriers.txt | 16 1 file changed, 16 insertions(+) d

[PATCH locking 4/4] locktorture: Simplify torture_runnable computation

2016-04-26 Thread Paul E. McKenney
This commit replaces a #ifdef with IS_ENABLED(), saving five lines. Signed-off-by: Paul E. McKenney --- kernel/locking/locktorture.c | 7 +-- 1 file changed, 1 insertion(+), 6 deletions(-) diff --git a/kernel/locking/locktorture.c b/kernel/locking/locktorture.c index d066a50dc87e..f8c5af52a

Re: [PATCH 0/6] Intel Secure Guard Extensions

2016-04-26 Thread Pavel Machek
On Mon 2016-04-25 20:34:07, Jarkko Sakkinen wrote: > Intel(R) SGX is a set of CPU instructions that can be used by > applications to set aside private regions of code and data. The code > outside the enclave is disallowed to access the memory inside the > enclave by the CPU access control. > > Th

Re: [PATCH 0/6] Intel Secure Guard Extensions

2016-04-26 Thread Andy Lutomirski
On Tue, Apr 26, 2016 at 12:00 PM, Pavel Machek wrote: > On Mon 2016-04-25 20:34:07, Jarkko Sakkinen wrote: >> Intel(R) SGX is a set of CPU instructions that can be used by >> applications to set aside private regions of code and data. The code >> outside the enclave is disallowed to access the me

Re: [PATCH 0/6] Intel Secure Guard Extensions

2016-04-26 Thread Pavel Machek
On Tue 2016-04-26 12:05:48, Andy Lutomirski wrote: > On Tue, Apr 26, 2016 at 12:00 PM, Pavel Machek wrote: > > On Mon 2016-04-25 20:34:07, Jarkko Sakkinen wrote: > >> Intel(R) SGX is a set of CPU instructions that can be used by > >> applications to set aside private regions of code and data. The

Re: [PATCH 0/6] Intel Secure Guard Extensions

2016-04-26 Thread Andy Lutomirski
On Tue, Apr 26, 2016 at 12:41 PM, Pavel Machek wrote: > On Tue 2016-04-26 12:05:48, Andy Lutomirski wrote: >> On Tue, Apr 26, 2016 at 12:00 PM, Pavel Machek wrote: >> > On Mon 2016-04-25 20:34:07, Jarkko Sakkinen wrote: >> >> Intel(R) SGX is a set of CPU instructions that can be used by >> >> app

Re: [PATCH 0/6] Intel Secure Guard Extensions

2016-04-26 Thread Pavel Machek
Hi! > >> >> The firmware uses PRMRR registers to reserve an area of physical memory > >> >> called Enclave Page Cache (EPC). There is a hardware unit in the > >> >> processor called Memory Encryption Engine. The MEE encrypts and decrypts > >> >> the EPC pages as they enter and leave the processor

Re: [PATCH 0/6] Intel Secure Guard Extensions

2016-04-26 Thread One Thousand Gnomes
> Replay Protected Memory Block. It's a device that allows someone to > write to it and confirm that the write happened and the old contents > is no longer available. You could use it to implement an enclave that > checks a password for your disk but only allows you to try a certain > number of t

Re: [PATCH 0/6] Intel Secure Guard Extensions

2016-04-26 Thread One Thousand Gnomes
> > Storing your ssh private key encrypted such that even someone who > > completely compromises your system can't get the actual private key > > Well, if someone gets root on my system, he can get my ssh private > key right? Potentially not. If you are using a TPM or other TEE (such as SGX

Re: [PATCH 0/6] Intel Secure Guard Extensions

2016-04-26 Thread One Thousand Gnomes
> But... that will mean that my ssh will need to be SGX-aware, and that > I will not be able to switch to AMD machine in future. ... or to other > Intel machine for that matter, right? I'm not privy to AMD's CPU design plans. However I think for the ssl/ssh case you'd use the same interfaces curr

Re: [PATCH 0/6] Intel Secure Guard Extensions

2016-04-26 Thread Pavel Machek
On Tue 2016-04-26 21:59:52, One Thousand Gnomes wrote: > > But... that will mean that my ssh will need to be SGX-aware, and that > > I will not be able to switch to AMD machine in future. ... or to other > > Intel machine for that matter, right? > > I'm not privy to AMD's CPU design plans. > > Ho

Re: [PATCH 0/6] Intel Secure Guard Extensions

2016-04-26 Thread Andy Lutomirski
On Apr 26, 2016 1:11 PM, "Pavel Machek" wrote: > > Hi! > > > >> >> The firmware uses PRMRR registers to reserve an area of physical > > >> >> memory > > >> >> called Enclave Page Cache (EPC). There is a hardware unit in the > > >> >> processor called Memory Encryption Engine. The MEE encrypts and

Re: [PATCH 0/6] Intel Secure Guard Extensions

2016-04-26 Thread Andy Lutomirski
On Tue, Apr 26, 2016 at 2:52 PM, Pavel Machek wrote: > On Tue 2016-04-26 21:59:52, One Thousand Gnomes wrote: >> > But... that will mean that my ssh will need to be SGX-aware, and that >> > I will not be able to switch to AMD machine in future. ... or to other >> > Intel machine for that matter, r

[RFC PATCH v1 09/18] x86: Insure that memory areas are encrypted when possible

2016-04-26 Thread Tom Lendacky
Encrypt memory areas in place when possible (e.g. zero page, etc.) so that special handling isn't needed afterwards. Signed-off-by: Tom Lendacky --- arch/x86/kernel/head64.c | 90 +++--- arch/x86/kernel/setup.c |8 2 files changed, 93 insertion

[RFC PATCH v1 07/18] x86: Extend the early_memmap support with additional attrs

2016-04-26 Thread Tom Lendacky
Add to the early_memmap support to be able to specify encrypted and un-encrypted mappings with and without write-protection. The use of write-protection is necessary when encrypting data "in place". The write-protect attribute is considered cacheable for loads, but not stores. This implies that the

[RFC PATCH v1 03/18] x86: Secure Memory Encryption (SME) support

2016-04-26 Thread Tom Lendacky
Provide support for Secure Memory Encryption (SME). This initial support defines the memory encryption mask as a variable for quick access and an accessor for retrieving the number of physical addressing bits lost if SME is enabled. Signed-off-by: Tom Lendacky --- arch/x86/include/asm/mem_encryp

[RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear

2016-04-26 Thread Tom Lendacky
The EFI tables are not encrypted and need to be accessed as such. Be sure to memmap them without the encryption attribute set. For EFI support that lives outside of the arch/x86 tree, create a routine that uses the __weak attribute so that it can be overridden by an architecture specific routine.

[RFC PATCH v1 06/18] x86: Provide general kernel support for memory encryption

2016-04-26 Thread Tom Lendacky
Adding general kernel support for memory encryption includes: - Modify and create some page table macros to include the Secure Memory Encryption (SME) memory encryption mask - Update kernel boot support to call an SME routine that checks for and sets the SME capability (the SME routine will gro

[RFC PATCH v1 00/18] x86: Secure Memory Encryption (AMD)

2016-04-26 Thread Tom Lendacky
This RFC patch series provides support for AMD's new Secure Memory Encryption (SME) feature. SME can be used to mark individual pages of memory as encrypted through the page tables. A page of memory that is marked encrypted will be automatically decrypted when read from DRAM and will be automatica

[RFC PATCH v1 01/18] x86: Set the write-protect cache mode for AMD processors

2016-04-26 Thread Tom Lendacky
For AMD processors that support PAT, set the write-protect cache mode (_PAGE_CACHE_MODE_WP) entry to the actual write-protect value (x05). Signed-off-by: Tom Lendacky --- arch/x86/mm/pat.c | 11 +-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/arch/x86/mm/pat.c b/arch/

[RFC PATCH v1 03/18] x86: Secure Memory Encryption (SME) support

2016-04-26 Thread Tom Lendacky
Provide support for Secure Memory Encryption (SME). This initial support defines the memory encryption mask as a variable for quick access and an accessor for retrieving the number of physical addressing bits lost if SME is enabled. Signed-off-by: Tom Lendacky --- arch/x86/include/asm/mem_encryp

[RFC PATCH v1 06/18] x86: Provide general kernel support for memory encryption

2016-04-26 Thread Tom Lendacky
Adding general kernel support for memory encryption includes: - Modify and create some page table macros to include the Secure Memory Encryption (SME) memory encryption mask - Update kernel boot support to call an SME routine that checks for and sets the SME capability (the SME routine will gro

[RFC PATCH v1 02/18] x86: Secure Memory Encryption (SME) build enablement

2016-04-26 Thread Tom Lendacky
Provide the Kconfig support to build the SME support in the kernel. Signed-off-by: Tom Lendacky --- arch/x86/Kconfig |9 + 1 file changed, 9 insertions(+) diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index 7bb1574..13249b5 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@

[RFC PATCH v1 09/18] x86: Insure that memory areas are encrypted when possible

2016-04-26 Thread Tom Lendacky
Encrypt memory areas in place when possible (e.g. zero page, etc.) so that special handling isn't needed afterwards. Signed-off-by: Tom Lendacky --- arch/x86/kernel/head64.c | 90 +++--- arch/x86/kernel/setup.c |8 2 files changed, 93 insertion

[RFC PATCH v1 15/18] x86: Enable memory encryption on the APs

2016-04-26 Thread Tom Lendacky
Add support to set the memory encryption enable flag on the APs during realmode initialization. When an AP is started it checks this flag, and if set, enables memory encryption on its core. Signed-off-by: Tom Lendacky --- arch/x86/include/asm/msr-index.h |2 ++ arch/x86/include/asm/realm

[RFC PATCH v1 18/18] x86: Add support to turn on Secure Memory Encryption

2016-04-26 Thread Tom Lendacky
This patch adds the support to check for and enable SME when available on the processor and when the mem_encrypt=on command line option is set. This consists of setting the encryption mask, calculating the number of physical bits of addressing lost and encrypting the kernel "in place." Signed-off-

[RFC PATCH v1 16/18] x86: Do not specify encrypted memory for VGA mapping

2016-04-26 Thread Tom Lendacky
Since the VGA memory needs to be accessed unencrypted be sure that the memory encryption mask is not set for the VGA range being mapped. Signed-off-by: Tom Lendacky --- arch/x86/include/asm/vga.h | 13 + 1 file changed, 13 insertions(+) diff --git a/arch/x86/include/asm/vga.h b/ar

[RFC PATCH v1 00/18] x86: Secure Memory Encryption (AMD)

2016-04-26 Thread Tom Lendacky
This RFC patch series provides support for AMD's new Secure Memory Encryption (SME) feature. SME can be used to mark individual pages of memory as encrypted through the page tables. A page of memory that is marked encrypted will be automatically decrypted when read from DRAM and will be automatica

[RFC PATCH v1 05/18] x86: Handle reduction in physical address size with SME

2016-04-26 Thread Tom Lendacky
When System Memory Encryption (SME) is enabled, the physical address space is reduced. Adjust the x86_phys_bits value to reflect this reduction. Signed-off-by: Tom Lendacky --- arch/x86/kernel/cpu/common.c |2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/x86/kernel/cpu/common.c b/ar

[RFC PATCH v1 17/18] x86/kvm: Enable Secure Memory Encryption of nested page tables

2016-04-26 Thread Tom Lendacky
Update the KVM support to include the memory encryption mask when creating and using nested page tables. Signed-off-by: Tom Lendacky --- arch/x86/include/asm/kvm_host.h |2 +- arch/x86/kvm/mmu.c |7 +-- arch/x86/kvm/vmx.c |2 +- arch/x86/kvm/x86.c

[RFC PATCH v1 14/18] iommu/amd: AMD IOMMU support for memory encryption

2016-04-26 Thread Tom Lendacky
Add support to the AMD IOMMU driver to set the memory encryption mask if memory encryption is enabled. Signed-off-by: Tom Lendacky --- arch/x86/include/asm/mem_encrypt.h |2 ++ arch/x86/mm/mem_encrypt.c |5 + drivers/iommu/amd_iommu.c | 10 ++ 3 files chan

[RFC PATCH v1 01/18] x86: Set the write-protect cache mode for AMD processors

2016-04-26 Thread Tom Lendacky
For AMD processors that support PAT, set the write-protect cache mode (_PAGE_CACHE_MODE_WP) entry to the actual write-protect value (x05). Signed-off-by: Tom Lendacky --- arch/x86/mm/pat.c | 11 +-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/arch/x86/mm/pat.c b/arch/

[RFC PATCH v1 11/18] x86: Decrypt trampoline area if memory encryption is active

2016-04-26 Thread Tom Lendacky
When Secure Memory Encryption is enabled, the trampoline area must not be encrypted. A cpu running in real mode will not be able to decrypt memory that has been encrypted because it will not be able to use addresses with the memory encryption mask. Signed-off-by: Tom Lendacky --- arch/x86/realmo

[RFC PATCH v1 08/18] x86: Add support for early encryption/decryption of memory

2016-04-26 Thread Tom Lendacky
This adds support to be able to either encrypt or decrypt data during the early stages of booting the kernel. This does not change the memory encryption attribute - it is used for ensuring that data present in either an encrypted or un-encrypted memory area is in the proper state (for example the i

[RFC PATCH v1 07/18] x86: Extend the early_memmap support with additional attrs

2016-04-26 Thread Tom Lendacky
Add to the early_memmap support to be able to specify encrypted and un-encrypted mappings with and without write-protection. The use of write-protection is necessary when encrypting data "in place". The write-protect attribute is considered cacheable for loads, but not stores. This implies that the

[RFC PATCH v1 12/18] x86: Access device tree in the clear

2016-04-26 Thread Tom Lendacky
The device tree is not encrypted and needs to be accessed as such. Be sure to memmap it without the encryption mask set. Signed-off-by: Tom Lendacky --- arch/x86/kernel/devicetree.c |6 -- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/arch/x86/kernel/devicetree.c b/arch/x

[RFC PATCH v1 08/18] x86: Add support for early encryption/decryption of memory

2016-04-26 Thread Tom Lendacky
This adds support to be able to either encrypt or decrypt data during the early stages of booting the kernel. This does not change the memory encryption attribute - it is used for ensuring that data present in either an encrypted or un-encrypted memory area is in the proper state (for example the i

[RFC PATCH v1 13/18] x86: DMA support for memory encryption

2016-04-26 Thread Tom Lendacky
Since DMA addresses will effectively look like 48-bit addresses when the memory encryption mask is set, SWIOTLB is needed if the DMA mask of the device performing the DMA does not support 48-bits. SWIOTLB will be initialized to create un-encrypted bounce buffers for use by these devices. Signed-of

[RFC PATCH v1 04/18] x86: Add the Secure Memory Encryption cpu feature

2016-04-26 Thread Tom Lendacky
Update the cpu features to include identifying and reporting on the Secure Memory Encryption feature. Signed-off-by: Tom Lendacky --- arch/x86/include/asm/cpufeature.h |1 + arch/x86/include/asm/cpufeatures.h |5 - arch/x86/kernel/cpu/scattered.c|1 + 3 files changed, 6 inse

[RFC PATCH v1 02/18] x86: Secure Memory Encryption (SME) build enablement

2016-04-26 Thread Tom Lendacky
Provide the Kconfig support to build the SME support in the kernel. Signed-off-by: Tom Lendacky --- arch/x86/Kconfig |9 + 1 file changed, 9 insertions(+) diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index 7bb1574..13249b5 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@

[RFC PATCH v1 10/18] x86/efi: Access EFI related tables in the clear

2016-04-26 Thread Tom Lendacky
The EFI tables are not encrypted and need to be accessed as such. Be sure to memmap them without the encryption attribute set. For EFI support that lives outside of the arch/x86 tree, create a routine that uses the __weak attribute so that it can be overridden by an architecture specific routine.

[RFC PATCH v1 04/18] x86: Add the Secure Memory Encryption cpu feature

2016-04-26 Thread Tom Lendacky
Update the cpu features to include identifying and reporting on the Secure Memory Encryption feature. Signed-off-by: Tom Lendacky --- arch/x86/include/asm/cpufeature.h |1 + arch/x86/include/asm/cpufeatures.h |5 - arch/x86/kernel/cpu/scattered.c|1 + 3 files changed, 6 inse

[RFC PATCH v1 05/18] x86: Handle reduction in physical address size with SME

2016-04-26 Thread Tom Lendacky
When System Memory Encryption (SME) is enabled, the physical address space is reduced. Adjust the x86_phys_bits value to reflect this reduction. Signed-off-by: Tom Lendacky --- arch/x86/kernel/cpu/common.c |2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/x86/kernel/cpu/common.c b/ar

[PATCH] Documentation: fix common spelling mistakes

2016-04-26 Thread Kees Cook
This fixes several spelling mistakes in the Documentation/ tree, which are caught by checkpatch.pl's spell checking. Signed-off-by: Kees Cook --- Documentation/ABI/obsolete/sysfs-driver-hid-roccat-savu | 4 ++-- Documentation/ABI/testing/sysfs-bus-event_source-devices-hv_24x7 | 2 +- Do

Re: [PATCH] Documentation: fix common spelling mistakes

2016-04-26 Thread Kees Cook
On Tue, Apr 26, 2016 at 4:34 PM, Randy Dunlap wrote: > On 04/26/16 16:28, Kees Cook wrote: >> This fixes several spelling mistakes in the Documentation/ tree, which >> are caught by checkpatch.pl's spell checking. >> >> Signed-off-by: Kees Cook >> --- >> Documentation/ABI/obsolete/sysfs-driver-h

Re: [PATCH] Documentation: fix common spelling mistakes

2016-04-26 Thread Randy Dunlap
On 04/26/16 16:28, Kees Cook wrote: > This fixes several spelling mistakes in the Documentation/ tree, which > are caught by checkpatch.pl's spell checking. > > Signed-off-by: Kees Cook > --- > Documentation/ABI/obsolete/sysfs-driver-hid-roccat-savu | 4 ++-- > Documentation/ABI/testing

[PATCH v2] Documentation: fix common spelling mistakes

2016-04-26 Thread Kees Cook
This fixes several spelling mistakes in the Documentation/ tree, which are caught by checkpatch.pl's spell checking. Signed-off-by: Kees Cook --- Documentation/ABI/obsolete/sysfs-driver-hid-roccat-savu | 11 ++- .../ABI/testing/sysfs-bus-event_source-devices-hv_24x7| 2 +-

Re: [PATCH] Documentation: fix common spelling mistakes

2016-04-26 Thread Paul E. McKenney
On Tue, Apr 26, 2016 at 04:28:27PM -0700, Kees Cook wrote: > This fixes several spelling mistakes in the Documentation/ tree, which > are caught by checkpatch.pl's spell checking. > > Signed-off-by: Kees Cook Both "resizeable" and "resizable" are forms, but I suppose saving a few characters is u

[PATCH] scripts/spelling.txt: add "fimware" misspelling

2016-04-26 Thread Kees Cook
A few instances of "fimware" instead of "firmware" were found. Fix these and add it to the spelling.txt file. Reported-by: Randy Dunlap Signed-off-by: Kees Cook --- Looks like spelling.txt changes have been going in through -mm? --- drivers/media/usb/dvb-usb/dib0700_core.c | 2 +- drivers/

Re: [PATCH] Documentation: fix common spelling mistakes

2016-04-26 Thread Kees Cook
On Tue, Apr 26, 2016 at 4:44 PM, Paul E. McKenney wrote: > On Tue, Apr 26, 2016 at 04:28:27PM -0700, Kees Cook wrote: >> This fixes several spelling mistakes in the Documentation/ tree, which >> are caught by checkpatch.pl's spell checking. >> >> Signed-off-by: Kees Cook > > Both "resizeable" and

Re: [PATCH v2] Documentation: fix common spelling mistakes

2016-04-26 Thread Randy Dunlap
On 04/26/16 16:41, Kees Cook wrote: > This fixes several spelling mistakes in the Documentation/ tree, which > are caught by checkpatch.pl's spell checking. > > Signed-off-by: Kees Cook Acked-by: Randy Dunlap Thanks. > --- > Documentation/ABI/obsolete/sysfs-driver-hid-roccat-savu | 11

Re: [RFC v6 00/10] vfio-pci: Allow to mmap sub-page MMIO BARs and MSI-X table

2016-04-26 Thread Yongji Xie
On 2016/4/27 0:40, Alex Williamson wrote: On Mon, 25 Apr 2016 18:05:53 +0800 Yongji Xie wrote: Hi Alex, Any comment? TBH, I shuffled this to the bottom of the review pile because you're depending on a patch series for ARM MSI mapping that's still very much in flux. You've really got 3 or 4

RE: [PATCH] scripts/spelling.txt: add "fimware" misspelling

2016-04-26 Thread Zhao Lei
Hi, Kees Cook * From: Kees Cook [mailto:keesc...@chromium.org] > Sent: Wednesday, April 27, 2016 7:48 AM > To: Andrew Morton > Cc: Randy Dunlap ; Andy Whitcroft > ; Joe Perches ; Zhao Lei > ; linux-doc@vger.kernel.org; > linux-ker...@vger.kernel.org > Subject: [PATCH] scripts/spelling.txt: add "f