Re: [PATCH v2] cpuidle: Add 'above' and 'below' idle state metrics

2018-12-11 Thread Rafael J. Wysocki
On Mon, Dec 10, 2018 at 11:51 PM Peter Zijlstra wrote: > > On Mon, Dec 10, 2018 at 10:36:40PM +0100, Rafael J. Wysocki wrote: > > On Mon, Dec 10, 2018 at 1:21 PM Peter Zijlstra wrote: > > > > One question on this; why is this tracked unconditionally? > > > > Because I didn't quite see how to make

Re: [PATCH 1/2] cpufreq: intel_pstate: Force HWP min perf before offline

2018-12-11 Thread Rafael J. Wysocki
On Friday, November 16, 2018 11:24:19 PM CET Srinivas Pandruvada wrote: > Force HWP Request MAX = HWP Request MIN = HWP Capability MIN and EPP to > 0xFF. In this way the performance limits on the offlined CPU will not > influence performance limits on its sibling CPU, which is still online. > > If

Re: [PATCH 2/3] kbuild: generate asm-generic wrappers if mandatory headers are missing

2018-12-11 Thread Masahiro Yamada
Hi Christoph, On Fri, Dec 7, 2018 at 12:04 AM Christoph Hellwig wrote: > > On Wed, Dec 05, 2018 at 08:28:05PM +0900, Masahiro Yamada wrote: > > Some time ago, Sam pointed out a certain degree of overwrap between > > generic-y and mandatory-y. (https://lkml.org/lkml/2017/7/10/121) > > > > I a bit

Re: [PATCH 2/3] kbuild: generate asm-generic wrappers if mandatory headers are missing

2018-12-11 Thread Masahiro Yamada
Hi Sam, On Fri, Dec 7, 2018 at 3:06 AM Sam Ravnborg wrote: > > On Wed, Dec 05, 2018 at 08:28:05PM +0900, Masahiro Yamada wrote: > > Some time ago, Sam pointed out a certain degree of overwrap between > > generic-y and mandatory-y. (https://lkml.org/lkml/2017/7/10/121) > > > > I a bit tweaked the

Re: [PATCH v3] kbuild: Add support for DT binding schema checks

2018-12-11 Thread Rob Herring
On Mon, Dec 10, 2018 at 10:39 PM Masahiro Yamada wrote: > > Hi Rob, > > On Tue, Dec 11, 2018 at 5:50 AM Rob Herring wrote: > > > > This adds the build infrastructure for checking DT binding schema > > documents and validating dts files using the binding schema. > > > > Check DT binding schema doc

Re: [PATCH v13 00/25] kasan: add software tag-based mode for arm64

2018-12-11 Thread Will Deacon
Hi Andrey, On Thu, Dec 06, 2018 at 01:24:18PM +0100, Andrey Konovalov wrote: > This patchset adds a new software tag-based mode to KASAN [1]. > (Initially this mode was called KHWASAN, but it got renamed, > see the naming rationale at the end of this section). > > The plan is to implement HWASan

Re: [PATCH v13 05/25] kasan: add CONFIG_KASAN_GENERIC and CONFIG_KASAN_SW_TAGS

2018-12-11 Thread Luc Van Oostenryck
On Thu, Dec 06, 2018 at 01:24:23PM +0100, Andrey Konovalov wrote: > diff --git a/include/linux/compiler-clang.h b/include/linux/compiler-clang.h > index 3e7dafb3ea80..39f668d5066b 100644 > --- a/include/linux/compiler-clang.h > +++ b/include/linux/compiler-clang.h > @@ -16,9 +16,13 @@ > /* all cla

Re: [PATCH v13 00/25] kasan: add software tag-based mode for arm64

2018-12-11 Thread Will Deacon
[moving akpm to To:] On Tue, Dec 11, 2018 at 04:57:27PM +0100, Andrey Konovalov wrote: > On Tue, Dec 11, 2018 at 4:18 PM Will Deacon wrote: > > On Thu, Dec 06, 2018 at 01:24:18PM +0100, Andrey Konovalov wrote: > > > This patchset adds a new software tag-based mode to KASAN [1]. > > > (Initially t

Re: [PATCH v13 00/25] kasan: add software tag-based mode for arm64

2018-12-11 Thread Andrey Konovalov
On Tue, Dec 11, 2018 at 4:18 PM Will Deacon wrote: > > Hi Andrey, > > On Thu, Dec 06, 2018 at 01:24:18PM +0100, Andrey Konovalov wrote: > > This patchset adds a new software tag-based mode to KASAN [1]. > > (Initially this mode was called KHWASAN, but it got renamed, > > see the naming rationale

Re: [PATCH v13 05/25] kasan: add CONFIG_KASAN_GENERIC and CONFIG_KASAN_SW_TAGS

2018-12-11 Thread Andrey Konovalov
On Tue, Dec 11, 2018 at 4:28 PM Luc Van Oostenryck wrote: > > On Thu, Dec 06, 2018 at 01:24:23PM +0100, Andrey Konovalov wrote: > > diff --git a/include/linux/compiler-clang.h b/include/linux/compiler-clang.h > > index 3e7dafb3ea80..39f668d5066b 100644 > > --- a/include/linux/compiler-clang.h > >

Re: [PATCH v3] kbuild: Add support for DT binding schema checks

2018-12-11 Thread Masahiro Yamada
On Wed, Dec 12, 2018 at 12:13 AM Rob Herring wrote: > > > > +$(obj)/%.example.dts: $(src)/%.yaml FORCE > > > + $(call if_changed,chk_binding) > > > + > > > +DT_TMP_SCHEMA := .schema.yaml.tmp > > > > > > BTW, why does this file start with a period? > > What is the meaning of '.tmp' extension

Re: [PATCH v13 19/25] kasan: add hooks implementation for tag-based mode

2018-12-11 Thread Vincenzo Frascino
Hi Andrey, On 06/12/2018 12:24, Andrey Konovalov wrote: > This commit adds tag-based KASAN specific hooks implementation and > adjusts common generic and tag-based KASAN ones. > > 1. When a new slab cache is created, tag-based KASAN rounds up the size of >the objects in this cache to KASAN_SH

Re: [PATCH v5 4/7] cgroup: cgroup v2 freezer

2018-12-11 Thread Oleg Nesterov
On 12/07, Roman Gushchin wrote: > > Cgroup v2 freezer tries to put tasks into a state similar to jobctl > stop. This means that tasks can be killed, ptraced (using > PTRACE_SEIZE*), and interrupted. It is possible to attach to > a frozen task, get some information (e.g. read registers) and detach.

Re: [PATCH 2/3] kbuild: generate asm-generic wrappers if mandatory headers are missing

2018-12-11 Thread Palmer Dabbelt
On Tue, 11 Dec 2018 04:59:26 PST (-0800), yamada.masah...@socionext.com wrote: > Hi Christoph, > > > On Fri, Dec 7, 2018 at 12:04 AM Christoph Hellwig wrote: >> >> On Wed, Dec 05, 2018 at 08:28:05PM +0900, Masahiro Yamada wrote: >> > Some time ago, Sam pointed out a certain degree of overwrap betw

Re: [PATCH v11 00/13] Intel SGX1 support

2018-12-11 Thread Dave Hansen
On 12/10/18 3:12 PM, Josh Triplett wrote: >> Or maybe even python/shell scripts? It looked to me like virtual >> memory will be "interesting" for enclaves. > Memory management doesn't seem that hard to deal with. The problems are: 1. SGX enclave memory (EPC) is statically allocated at boot and ca

Re: [PATCH v11 00/13] Intel SGX1 support

2018-12-11 Thread Sean Christopherson
On Tue, Dec 11, 2018 at 10:10:38AM -0800, Dave Hansen wrote: > On 12/10/18 3:12 PM, Josh Triplett wrote: > >> Or maybe even python/shell scripts? It looked to me like virtual > >> memory will be "interesting" for enclaves. > > Memory management doesn't seem that hard to deal with. > > The problems

Re: [PATCH v3] kbuild: Add support for DT binding schema checks

2018-12-11 Thread Rob Herring
On Tue, Dec 11, 2018 at 10:03 AM Masahiro Yamada wrote: > > On Wed, Dec 12, 2018 at 12:13 AM Rob Herring wrote: > > > > > > > +$(obj)/%.example.dts: $(src)/%.yaml FORCE > > > > + $(call if_changed,chk_binding) > > > > + > > > > +DT_TMP_SCHEMA := .schema.yaml.tmp > > > > > > > > > BTW, why d

Re: [PATCH v5 4/7] cgroup: cgroup v2 freezer

2018-12-11 Thread Roman Gushchin
On Tue, Dec 11, 2018 at 05:26:32PM +0100, Oleg Nesterov wrote: > On 12/07, Roman Gushchin wrote: > > > > Cgroup v2 freezer tries to put tasks into a state similar to jobctl > > stop. This means that tasks can be killed, ptraced (using > > PTRACE_SEIZE*), and interrupted. It is possible to attach to

[PATCH v4] kbuild: Add support for DT binding schema checks

2018-12-11 Thread Rob Herring
This adds the build infrastructure for checking DT binding schema documents and validating dts files using the binding schema. Check DT binding schema documents: make dt_binding_check Build dts files and check using DT binding schema: make dtbs_check Optionally, DT_SCHEMA_FILES can be passed in

Re: [PATCH v13 00/25] kasan: add software tag-based mode for arm64

2018-12-11 Thread Andrew Morton
On Tue, 11 Dec 2018 16:00:19 + Will Deacon wrote: > > Yes, that was the intention of sending v13. Should have I sent a > > separate patch with v12->v13 fixes instead? I don't know what's the > > usual way to make changes to the patchset once it's in the mm tree. I usually convert replacement

Re: [PATCH V2 3/7] fscrypt: remove filesystem specific build config option

2018-12-11 Thread Guenter Roeck
9: recipe for target 'allnoconfig' failed Reverting the patch fixes the problem. Guenter --- bisect log: # bad: [60bec71b5acb0b469d07e73a348f6610236ae7fa] Add linux-next specific files for 20181211 # good: [40e020c129cfc991e8ab4736d2665351ffd1468d] Linux

Re: [PATCH V2 3/7] fscrypt: remove filesystem specific build config option

2018-12-11 Thread Eric Biggers
On Tue, Dec 11, 2018 at 05:52:11PM -0800, Guenter Roeck wrote: > Hi, > > On Tue, Dec 04, 2018 at 03:26:46PM +0530, Chandan Rajendra wrote: > > In order to have a common code base for fscrypt "post read" processing > > for all filesystems which support encryption, this commit removes > > filesystem

Re: [PATCH v3] kbuild: Add support for DT binding schema checks

2018-12-11 Thread Masahiro Yamada
On Wed, Dec 12, 2018 at 3:36 AM Rob Herring wrote: > > On Tue, Dec 11, 2018 at 10:03 AM Masahiro Yamada > wrote: > > > > On Wed, Dec 12, 2018 at 12:13 AM Rob Herring wrote: > > > > > > > > > > +$(obj)/%.example.dts: $(src)/%.yaml FORCE > > > > > + $(call if_changed,chk_binding) > > > > > +

Re: [PATCH v4] kbuild: Add support for DT binding schema checks

2018-12-11 Thread Masahiro Yamada
On Wed, Dec 12, 2018 at 5:24 AM Rob Herring wrote: > > This adds the build infrastructure for checking DT binding schema > documents and validating dts files using the binding schema. > > Check DT binding schema documents: > make dt_binding_check > > Build dts files and check using DT binding sche

Re: [PATCH V2 3/7] fscrypt: remove filesystem specific build config option

2018-12-11 Thread Guenter Roeck
On 12/11/18 6:48 PM, Eric Biggers wrote: On Tue, Dec 11, 2018 at 05:52:11PM -0800, Guenter Roeck wrote: Hi, On Tue, Dec 04, 2018 at 03:26:46PM +0530, Chandan Rajendra wrote: In order to have a common code base for fscrypt "post read" processing for all filesystems which support encryption, thi

[PATCH V4 2/9] f2fs: use IS_ENCRYPTED() to check encryption status

2018-12-11 Thread Chandan Rajendra
This commit removes the f2fs specific f2fs_encrypted_inode() and makes use of the generic IS_ENCRYPTED() macro to check for the encryption status of an inode. Acked-by: Chao Yu Reviewed-by: Eric Biggers Signed-off-by: Chandan Rajendra --- fs/f2fs/data.c | 4 ++-- fs/f2fs/dir.c | 10 +--

[PATCH V4 1/9] ext4: use IS_ENCRYPTED() to check encryption status

2018-12-11 Thread Chandan Rajendra
This commit removes the ext4 specific ext4_encrypted_inode() and makes use of the generic IS_ENCRYPTED() macro to check for the encryption status of an inode. Reviewed-by: Eric Biggers Signed-off-by: Chandan Rajendra --- fs/ext4/dir.c | 8 fs/ext4/ext4.h| 5 - fs/

[PATCH V4 4/9] Add S_VERITY and IS_VERITY()

2018-12-11 Thread Chandan Rajendra
Similar to S_ENCRYPTED/IS_ENCRYPTED(), this commit adds S_VERITY/IS_VERITY() to be able to check if a VFS inode has verity information associated with it. Reviewed-by: Eric Biggers Signed-off-by: Chandan Rajendra --- include/linux/fs.h | 2 ++ 1 file changed, 2 insertions(+) diff --git a/inclu

[PATCH V4 3/9] fscrypt: remove filesystem specific build config option

2018-12-11 Thread Chandan Rajendra
In order to have a common code base for fscrypt "post read" processing for all filesystems which support encryption, this commit removes filesystem specific build config option (e.g. CONFIG_EXT4_FS_ENCRYPTION) and replaces it with a build option (i.e. CONFIG_FS_ENCRYPTION) whose value affects all t

[PATCH V4 0/9] Remove fs specific fscrypt and fsverity build config options

2018-12-11 Thread Chandan Rajendra
In order to have a common code base for fscrypt & fsverity "post read" processing across filesystems which implement fscrypt/fsverity, this commit removes filesystem specific build config option (CONFIG_EXT4_FS_ENCRYPTION, CONFIG_EXT4_FS_VERITY, CONFIG_F2FS_FS_ENCRYPTION, CONFIG_F2FS_FS_VERITY and

[PATCH V4 8/9] fsverity: Move verity status check to fsverity_file_open

2018-12-11 Thread Chandan Rajendra
Instead of conditionally checking for verity status of an inode before invoking fsverity_file_open(), this commit moves the check inside the definition of fsverity_file_open(). Signed-off-by: Chandan Rajendra --- fs/ext4/file.c | 8 +++- fs/f2fs/file.c | 8 +++- fs/ve

[PATCH V4 9/9] fsverity: Move verity status check to fsverity_prepare_setattr

2018-12-11 Thread Chandan Rajendra
Instead of conditionally checking for verity status of an inode before invoking fsverity_prepare_setattr(), this commit moves the check inside the definition of fsverity_prepare_setattr(). Signed-off-by: Chandan Rajendra --- fs/ext4/inode.c | 8 +++- fs/f2fs/file.c | 8 +++

[PATCH V4 5/9] ext4: use IS_VERITY() to check inode's fsverity status

2018-12-11 Thread Chandan Rajendra
This commit removes the ext4 specific ext4_verity_inode() and makes use of the generic IS_ENCRYPTED() macro or ext4_test_inode_flag() to check for the encryption status of an inode. Reviewed-by: Eric Biggers Signed-off-by: Chandan Rajendra --- fs/ext4/ext4.h | 9 - fs/ext4/file.c

[PATCH V4 6/9] f2fs: use IS_VERITY() to check inode's fsverity status

2018-12-11 Thread Chandan Rajendra
This commit removes the f2fs specific f2fs_verity_file() and makes use of the generic IS_VERITY() macro or file_is_verity() to check for the verity status of an inode. Reviewed-by: Eric Biggers Signed-off-by: Chandan Rajendra --- fs/f2fs/f2fs.h | 7 +-- fs/f2fs/file.c | 6 +++--- fs/f2fs/

[PATCH V4 7/9] fsverity: Remove filesystem specific build config option

2018-12-11 Thread Chandan Rajendra
In order to have a common code base for fsverity "post read" processing for all filesystems which support fsverity, this commit removes filesystem specific build config option (e.g. CONFIG_EXT4_FS_VERITY) and replaces it with a build option (i.e. CONFIG_FS_VERITY) whose value affects all the filesy

Re: [PATCH V2 3/7] fscrypt: remove filesystem specific build config option

2018-12-11 Thread Chandan Rajendra
On Wednesday, December 12, 2018 8:18:12 AM IST Eric Biggers wrote: > On Tue, Dec 11, 2018 at 05:52:11PM -0800, Guenter Roeck wrote: > > Hi, > > > > On Tue, Dec 04, 2018 at 03:26:46PM +0530, Chandan Rajendra wrote: > > > In order to have a common code base for fscrypt "post read" processing > > > f

Re: [PATCH] docs/networking: fix formatting of Intel drivers documentation

2018-12-11 Thread David Miller
From: Mike Rapoport Date: Sun, 9 Dec 2018 18:09:51 +0200 > The documentation of Intel drivers is missing the heading adornment for > document titles. > > This causes the generated html to have TOC entries from these documents to > appear as top level TOC entries: > > * Linux* Base Driver for I