Add FPGA region API function fpga_region_free() that
undoes some of what fpga_region_program_fpga() does
to free up a region to be reprogrammed.
Signed-off-by: Alan Tull
---
drivers/fpga/fpga-region.c | 20
drivers/fpga/of-fpga-region.c| 5 +
include/linux/fpg
Support a FDT header for FPGA images. Header format is a simplified
FIT containing at most one FPGA image and one DT overlay.
The FPGA image section includes FPGA image info properties needed for
programming.
If present, the DT overlay image is applied after the FPGA is
programmed.
Both images
This patch should be rolled into the next version of my
"non-dt support for FPGA regions" patchset.
Add a pointer to the device that owns the fpga_image_info to
fpga_image_info. That way the fpga_image_info_free can
drop the 'dev' parameter and we are left with:
struct fpga_image_info *fpga_imag
Document the firmware_name attribute added for each
region.
Signed-off-by: Alan Tull
---
Documentation/ABI/testing/sysfs-class-fpga-region | 7 +++
1 file changed, 7 insertions(+)
create mode 100644 Documentation/ABI/testing/sysfs-class-fpga-region
diff --git a/Documentation/ABI/testing/sy
On Wed, Jul 19, 2017 at 06:36:53PM -0500, Franklin S Cooper Jr wrote:
> Add information regarding fixed transceiver binding. This is especially
> important for MCAN since the IP allows CAN FD mode to run significantly
> faster than what most transceivers are capable of.
>
> Signed-off-by: Franklin
On 22/07/17 02:11, Stefano Stabellini wrote:
> Send data to an active socket by copying data to the "out" ring. Take
> the active socket out_mutex so that only one function can access the
> ring at any given time.
>
> If not enough room is available on the ring, rather than returning
> immediately
On Thu, Jul 20, 2017 at 10:43:53AM +0800, Mark Yao wrote:
> Signed-off-by: Mark Yao
> ---
> Changes in v5:
> - clean document commit title
> - move changes description out of docummit commit msg
>
> Changes in v2:
> - rename rk322x to rk3228
> - correct some vop registers define
>
> Documentati
On Mon, Jul 24, 2017 at 10:25 AM, Andy Shevchenko
wrote:
> On Mon, Jul 24, 2017 at 6:09 PM, Andrey Smirnov
> wrote:
>> Add a driver for RAVE Supervisory Processor, an MCU implementing
>> varoius bits of housekeeping functionality (watchdoging, backlight
>> control, LED control, etc) on RAVE famil
Commit 0afef45654ae908536278ecb143ded5bbc713391 (staging: fsl-mc: add
support for device table matching) added kerneldoc comments for two
nonexistent structure fields, leading to these warnings in the docs build:
./include/linux/mod_devicetable.h:687: warning: Excess
struct/union/enum/typedef m
On 22/07/17 02:11, Stefano Stabellini wrote:
> Implement recvmsg by copying data from the "in" ring. If not enough data
> is available and the recvmsg call is blocking, then wait on the
> inflight_conn_req waitqueue. Take the active socket in_mutex so that
> only one function can access the ring at
On Thu, Jul 20, 2017 at 12:22:44PM +0200, Matthias Brugger wrote:
> From: Matthias Brugger
>
> This patch cleans up the binding documentation stating explicitly
> the binding and it's fallback for every SoC.
>
> Signed-off-by: Matthias Brugger
> ---
> Documentation/devicetree/bindings/watchdog
The kerneldoc comments for try_to_wake_up_local() were out of date, leading
to these documentation build warnings:
./kernel/sched/core.c:2080: warning: No description found for parameter 'rf'
./kernel/sched/core.c:2080: warning: Excess function parameter 'cookie'
description in 'try_to_wake_u
On Thu, Jul 20, 2017 at 12:22:45PM +0200, Matthias Brugger wrote:
> From: Matthias Brugger
>
> This patch adds the binding for the MT6797 SoC.
>
> Signed-off-by: Matthias Brugger
> ---
> Documentation/devicetree/bindings/watchdog/mtk-wdt.txt | 1 +
> 1 file changed, 1 insertion(+)
Acked-by: R
A couple of kerneldoc comments in had incorrect names for
macro parameters, with this unsightly result:
./include/linux/wait.h:555: warning: No description found for parameter 'wq'
./include/linux/wait.h:555: warning: Excess function parameter 'wq_head'
description in 'wait_event_interruptib
The kerneldoc comment for kthread_create() had an incorrect argument name,
leading to a warning in the docs build. Correct it, and make one more
small step toward a warning-free build.
Signed-off-by: Jonathan Corbet
---
include/linux/kthread.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(
Hi!
On thinkpad x220, USB mouse stopped working in v4.13-rc2. v4.12 was
ok, iirc.
Now, USB mouse is so common hw that I may have something wrong in my
config...? But I did not change anything there.
In v4.9:
[ 87.064408] input: Logitech USB Optical Mouse as
/devices/pci:00/:00:1d.0/us
This part of Secure Encryted Virtualization (SEV) patch series focuses on KVM
changes required to create and manage SEV guests.
SEV is an extension to the AMD-V architecture which supports running encrypted
virtual machine (VMs) under the control of a hypervisor. Encrypted VMs have
their
pages (c
Create a Documentation entry to describe the AMD Secure Encrypted
Virtualization (SEV) feature.
Signed-off-by: Brijesh Singh
---
.../virtual/kvm/amd-memory-encryption.txt | 328 +
1 file changed, 328 insertions(+)
create mode 100644 Documentation/virtual/kvm/amd-mem
Platform Security Processor (PSP) is part of AMD Secure Processor (AMD-SP),
PSP is a dedicated processor that provides the support for key management
commands in a Secure Encrypted Virtualiztion (SEV) mode, along with
software-based Tursted Executation Environment (TEE) to enable the
third-party tu
SEV-enabled guest must use ASIDs from the defined subset, while non-SEV
guests can use the remaining ASID range. The range of ASID allowed for
SEV-enabled guest is from 1 to a maximum value defined via CPUID
Fn8000_001f[ECX].
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 23 +
AMDs new Secure Encrypted Virtualization (SEV) feature allows the memory
contents of a virtual machine to be transparently encrypted with a key
unique to the guest VM. The programming and management of the encryption
keys are handled by the AMD Secure Processor (AMD-SP), which exposes the
commands
From: Tom Lendacky
Currently the nested_ctl variable in the vmcb_control_area structure is
used to indicate nested paging support. The nested paging support field
is actually defined as bit 0 of the field. In order to support a new
feature flag the usage of the nested_ctl and nested paging suppor
In current implementation, asid allocation starts from 1, this patch
adds a min_asid variable in svm_vcpu structure to allow starting asid
from something other than 1.
Signed-off-by: Brijesh Singh
Reviewed-by: Paolo Bonzini
---
arch/x86/kvm/svm.c | 4 +++-
1 file changed, 3 insertions(+), 1 del
If hardware supports encrypting then KVM_MEMORY_ENCRYPT_OP ioctl can
be used by qemu to issue platform specific memory encryption commands.
Signed-off-by: Brijesh Singh
Reviewed-by: Paolo Bonzini
---
arch/x86/include/asm/kvm_host.h | 2 ++
arch/x86/kvm/x86.c | 12
inc
From: Tom Lendacky
Define the SEV enable bit for the VMCB control structure. The hypervisor
will use this bit to enable SEV in the guest.
Signed-off-by: Tom Lendacky
Signed-off-by: Brijesh Singh
---
arch/x86/include/asm/svm.h | 1 +
1 file changed, 1 insertion(+)
diff --git a/arch/x86/includ
This CPUID provides the memory encryption support information on
AMD Platform. The complete description for CPUID leaf is available
in APM volume 2, Section 15.34
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/cpuid.c | 2 +-
arch/x86/kvm/svm.c | 6 ++
2 files changed, 7 insertions(+), 1 de
If hardware support memory encryption then KVM_MEMORY_REGISTER_RAM and
KVM_MEMORY_UNREGISTER_RAM ioctl's can be used by userspace to register/
unregister the guest memory regions which may contains the encrypted
data (e.g guest RAM, PCI BAR, SMRAM etc).
Signed-off-by: Brijesh Singh
---
arch/x86/
Hi!
On Mon 2017-07-24 15:27:18, Theodore Ts'o wrote:
> On Mon, Jul 24, 2017 at 09:15:48PM +0200, Pavel Machek wrote:
> > >
> > > Am 24.07.2017 um 20:57 schrieb Pavel Machek:
> > > >Would it be feasible to run bcache (write-through) with existing ext4
> > > >filesystem?
> > > >
> > > >I have 400GB
Hi Tejun,
On Mon, Jul 17, 2017 at 12:46:50PM -0400, Tejun Heo wrote:
> Heh, that was pretty difficult to parse, but here's my question. So,
> we're expanding reserved area so that its end aligns to page boundary
> which is completely fine. We may end up with reserved area which is a
> bit larg
Define Secure Encrypted Virtualization (SEV) key management command id
and structure. The command definition is available in SEV KM [1] spec
0.14 and Documentation/virtual/kvm/amd-memory-encryption.txt
[1] http://support.amd.com/TechDocs/55766_SEV-KM API_Specification.pdf
Signed-off-by: Brijesh S
The patch adds a new member (sev_info) in 'struct kvm_arch', and
setter/getter functions for the sev_info field.
Signed-off-by: Brijesh Singh
---
arch/x86/include/asm/kvm_host.h | 9 +
arch/x86/kvm/svm.c | 45 +
2 files changed, 54 in
SEV hardware uses ASIDs to associate memory encryption key with the
guest VMs. During the guest creation time, we use SEV_CMD_ACTIVATE
command to bind a particular ASID to the guest. Lets make sure that
VMCB is programmed with the binded ASID before a VMRUN.
Signed-off-by: Brijesh Singh
---
arch
The command initializes the SEV firmware and allocate a new ASID for
this guest from SEV ASID pool. The firmware must be initialized before
we issue guest launch command to create a new encryption context.
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 188
The command is used for encrypting the guest memory region using the VM
encryption key (VEK) created during LAUNCH_START.
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 165 +
1 file changed, 165 insertions(+)
diff --git a/arch/x86/kvm/
The command is used to bootstrap SEV guest from unencrypted boot images.
The command creates a new VM encryption key (VEK) using the guest owner's
policy, public DH certificates, and session information.
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 165 ++
On Mon, 24 Jul 2017, Pavel Machek wrote:
> On thinkpad x220, USB mouse stopped working in v4.13-rc2. v4.12 was
> ok, iirc.
>
> Now, USB mouse is so common hw that I may have something wrong in my
> config...? But I did not change anything there.
Well, your particular USB mouse requires an always
Hi Tejun,
On Mon, Jul 17, 2017 at 03:10:09PM -0400, Tejun Heo wrote:
> > /*
> > +* Initialize first chunk.
> > +* pcpu_first_chunk will always manage the dynamic region of the
> > +* first chunk. The static region is dropped as those addresses
>
> Would "not covered by any chunk
The command is used for querying the SEV guest status.
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 38 ++
1 file changed, 38 insertions(+)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index 7a77197..21f85e1 100644
--- a/arch/x86/kvm/svm.c
++
The command is used for finializing the SEV guest launch process.
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 23 +++
1 file changed, 23 insertions(+)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index 9b672eb..7a77197 100644
--- a/arch/x86/kvm/svm.c
+++ b/
The command is used to retrieve the measurement of memory encrypted
through the LAUNCH_UPDATE_DATA command. This measurement can be used
for attestation purposes.
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 52
1 file changed, 52 ins
When SEV is active, on #NPF the page fault address will contain C-bit.
We must clear the C-bit before handling the fault.
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index 0bbd050.
Extend kvm_x86_ops to add memory_encyption_enabled() ops. It returns a
boolean indicating whether memory encryption is enabled on the VCPU.
Signed-off-by: Brijesh Singh
---
arch/x86/include/asm/kvm_host.h | 1 +
arch/x86/kvm/svm.c | 8
2 files changed, 9 insertions(+)
diff
The SEV memory encryption engine uses a tweak such that two identical
plaintexts at different location will have a different ciphertexts.
So swapping or moving ciphertexts of two pages will not result in
plaintexts being swapped. Relocating (or migrating) a physical backing
pages for SEV guest will
The command copies a plain text into guest memory and encrypts it using
the VM encryption key. The command will be used for debug purposes
(e.g setting breakpoint through gdbserver)
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 174 +
1
The command is used for decrypting a guest memory region for debug
purposes.
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 160 +
1 file changed, 160 insertions(+)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index 21f85e1..933
On AMD platform, under certain conditions insn_len may be zero on #NPF.
This can happen if guest gets a page-fault on data access, but HW table
walker is not able to read the instruction page (e.g instuction page
is not present in memory).
Typically, when insn_len is zero, x86_emulate_instruction(
On #UD, x86_emulate_instruction() fetches the data from guest memory and
decodes the instruction bytes to assist further. When SEV is enabled, the
instruction bytes will be encrypted using the guest-specific key, hypervisor
will no longer able to fetch the instruction bytes to assist UD handling.
B
On 22/07/17 02:12, Stefano Stabellini wrote:
> For active sockets, check the indexes and use the inflight_conn_req
> waitqueue to wait.
>
> For passive sockets, send PVCALLS_POLL to the backend. Use the
> inflight_accept_req waitqueue if an accept is outstanding. Otherwise use
> the inflight_req w
Original Lustre ea_inode feature did not have ref counts on xattr inodes
because there was always one parent that referenced it. New
implementation expects ref count to be initialized which is not true for
Lustre case. Handle this by detecting Lustre created xattr inode and set
its ref count to 1.
On Mon, Jul 17, 2017 at 03:26:02PM -0400, Tejun Heo wrote:
> > This patch changes the allocator to only mark allocated pages for the
> > region the population bitmap is used for. Prior, the bitmap was marked
> > completely used as the first chunk was allocated and immutable. This is
> > misleading
On 22/07/17 02:12, Stefano Stabellini wrote:
> Send PVCALLS_RELEASE to the backend and wait for a reply. Take both
> in_mutex and out_mutex to avoid concurrent accesses. Then, free the
> socket.
>
> Signed-off-by: Stefano Stabellini
> CC: boris.ostrov...@oracle.com
> CC: jgr...@suse.com
> ---
>
On 22/07/17 02:12, Stefano Stabellini wrote:
> Implement pvcalls frontend removal function. Go through the list of
> active and passive sockets and free them all, one at a time.
>
> Signed-off-by: Stefano Stabellini
> CC: boris.ostrov...@oracle.com
> CC: jgr...@suse.com
Reviewed-by: Juergen Gros
On 22/07/17 02:12, Stefano Stabellini wrote:
> Also add pvcalls-front to the Makefile.
>
> Signed-off-by: Stefano Stabellini
> CC: boris.ostrov...@oracle.com
> CC: jgr...@suse.com
> ---
> drivers/xen/Kconfig | 9 +
> drivers/xen/Makefile | 1 +
> 2 files changed, 10 insertions(+)
>
> d
Hi Chunyu,
Thanks for the patch. I'm currently traveling, and will have little
time to test it. Hopefully I can get to it sometime this week.
-- Steve
On Mon, 24 Jul 2017 15:21:06 +0800
Chunyu Hu wrote:
> per_cpu trace directories and files are created for all possible cpus,
> but only the c
On Fri, Jul 21, 2017 at 10:34:49AM +0800, honghui.zh...@mediatek.com wrote:
> From: Ryder Lee
>
> Add support for MediaTek new generation controller and update related
> properities.
>
> Signed-off-by: Ryder Lee
> Signed-off-by: Honghui Zhang
> ---
> .../devicetree/bindings/pci/mediatek-pcie.
On Fri, Jul 21, 2017 at 11:57:12AM +0800, sean.w...@mediatek.com wrote:
> From: Sean Wang
>
> Update the binding document for enabling SCPSYS on MediaTek MT7622 SoC.
>
> Signed-off-by: Sean Wang
> Signed-off-by: Chen Zhong
> ---
> Documentation/devicetree/bindings/soc/mediatek/scpsys.txt | 3
On Fri, Jul 21, 2017 at 06:06:39AM +0200, linux-kernel-...@beckhoff.com wrote:
> From: Patrick Bruenn
>
> - add vendor prefix bhf for Beckhoff
> - add new board binding bhf,cx9020
>
> Signed-off-by: Patrick Bruenn
> ---
> Documentation/devicetree/bindings/arm/bhf.txt | 6 ++
> Docu
Hi!
> > On thinkpad x220, USB mouse stopped working in v4.13-rc2. v4.12 was
> > ok, iirc.
> >
> > Now, USB mouse is so common hw that I may have something wrong in my
> > config...? But I did not change anything there.
>
> Well, your particular USB mouse requires an always-poll quirk, so it's no
From: Egil Hjelmeland
Date: Mon, 24 Jul 2017 16:47:51 +0200
> This is my first patches submitted to the kernel, so I am looking
> forward to comments.
Please clean up how the dates are handled in your submission.
They are all over the place, over a period of 3 days.
Instead, they should be con
> On Jul 23, 2017, at 10:05 AM, Florian Fainelli wrote:
>> +
>> +strncpy(drvinfo->version, HNAE_DRIVER_VERSION,
>> +sizeof(drvinfo->version));
>> +drvinfo->version[sizeof(drvinfo->version) - 1] = '\0';
>
> strlcpy() would probably do that for you.
You need to be careful abou
unsubscribe linux-kernel
On Friday, July 21, 2017 04:51:24 PM Ross Zwisler wrote:
> To save someone the time of searching the ACPI spec for "Static Resource
> Affinity Table".
>
> Signed-off-by: Ross Zwisler
> ---
> drivers/acpi/numa.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/drivers/acp
From: Jason Wang
Date: Wed, 19 Jul 2017 16:54:44 +0800
> Hi:
>
> This series brings two optimizations for virtio-net XDP:
>
> - avoid reset during XDP set
> - turn off offloads on demand
>
> Changes from V1:
> - Various tweaks on commit logs and comments
> - Use virtnet_napi_enable() when enab
On Friday, July 21, 2017 03:09:29 PM Hoan Tran wrote:
> When PCCT is not available, kernel crashes as below when requests PCC
> channel 0. This patch fixes this issue.
>
> [0.920454] PCCT header not found.
> ...
> [8.031309] Unable to handle kernel NULL pointer dereference at virtual
> ad
From: Rob Herring
Date: Wed, 19 Jul 2017 10:09:13 -0500
> On Tue, Jul 18, 2017 at 4:51 PM, David Miller wrote:
>> From: Rob Herring
>> Date: Tue, 18 Jul 2017 16:43:19 -0500
>>
>>> Now that we have a custom printf format specifier, convert users of
>>> full_name to use %pOF instead. This is prep
From:
Date: Sat, 22 Jul 2017 20:45:55 +0800
> From: Sean Wang
>
> Potential dangerous invalid memory might be accessed if invalid mac value
> reflected from the forward port field in rxd4 caused by possible potential
> hardware defects. So added a simple sanity checker to avoid the kind of
> si
Hi Lars, Mark, Charles, Lee,
This is a minor revision after v3, mainly reviews from Takashi, Charles.
I did more extensive testing of load/unload of the whole serie, and apart from a
bug in wm97xx-core in touchscreen tree (for a which a patch will be sent apart),
it seems to work properly. I extr
The WM9705, WM9712 and WM9713 are highly integrated codecs, with an
audio codec, DAC and ADC, GPIO unit and a touchscreen interface.
Historically the support was spread across drivers/input/touchscreen and
sound/soc/codecs. The sharing was done through ac97 bus sharing. This
model will not withsta
Add a private data structure. This is a preparation for a codec which
would need an another data on top of snd_ac97, which will be the case
when an MFD wm97xx device will probe wm9705.
Signed-off-by: Robert Jarzmik
Acked-by: Charles Keepax
---
sound/soc/codecs/wm9705.c | 36
Add support for the new ac97 bus model, where devices are automatically
discovered on AC-Links.
Signed-off-by: Robert Jarzmik
---
sound/soc/codecs/Kconfig | 3 ++-
sound/soc/codecs/wm9713.c | 39 +++
2 files changed, 29 insertions(+), 13 deletions(-)
diff -
Add support for the new ac97 bus model, where devices are automatically
discovered on AC-Links.
Signed-off-by: Robert Jarzmik
---
sound/soc/codecs/Kconfig | 3 ++-
sound/soc/codecs/wm9712.c | 37 -
2 files changed, 26 insertions(+), 14 deletions(-)
diff --g
This adds support for the new AC97 bus code, which discovers the devices
rather than uses platform data.
As part of this discovery, it enables a multi-function device wm97xx,
which supports touchscreen, battery, ADC and an audio codec. This patch
adds the code to bind the touchscreen "cell" as the
All pxa library functions don't use the input parameters for nothing but
slot number. This simplifies their prototypes, and makes them usable by
both the legacy ac97 bus and the new ac97 bus.
Signed-off-by: Robert Jarzmik
---
include/sound/pxa2xx-lib.h | 15 +--
sound/arm/pxa2xx-ac9
Switch to the new ac97 bus support in sound/ac97 instead of the legacy
snd_ac97 one.
Signed-off-by: Robert Jarzmik
---
Since v1: split into 2 patches, the former being XXX ac97 codec agnostic
Since v2: fix driver unregistration
Since v3: added platform driver data for controller removal
---
soun
Split out from the ac97_codec.h the ac97 generic registers, which can be
used by a codec, typically a generic ac97 codec, and by the ac97 bus, to
scan an ac97 AC-Link.
This split encompasses all the AC97 standard registers, but not the
codec specific ones.
In order to have a clean split between f
wm97xx-core does several things in it initialization :
- touchscreen input device setup
- battery device creation
As the wm97xx is actually a multi-function device handling an audio
codec, a touchscreen, a gpio block and an ADC, reshape the probing to
isolate what is truly input/touchscreen spec
Add the new ac97 bus support, with ac97 bus automatic probing.
Signed-off-by: Robert Jarzmik
Acked-by: Charles Keepax
---
sound/Kconfig | 2 ++
sound/Makefile | 1 +
2 files changed, 3 insertions(+)
diff --git a/sound/Kconfig b/sound/Kconfig
index ee2e69a9ecd1..141b145c4195 100644
--- a/sound
Add support for the new ac97 bus model, where devices are automatically
discovered on AC-Links.
Signed-off-by: Robert Jarzmik
Acked-by: Charles Keepax
---
sound/soc/codecs/Kconfig | 3 ++-
sound/soc/codecs/wm9705.c | 35 +++
2 files changed, 25 insertions(+), 1
AC97 is a bus for sound usage. It enables for a AC97 AC-Link to link one
controller to 0 to 4 AC97 codecs.
The goal of this new implementation is to implement a device/driver
model for AC97, with an automatic scan of the bus and automatic
discovery of AC97 codec devices.
Signed-off-by: Robert Jar
On Thu, Jun 29, 2017 at 12:01 PM, Todd Kjos wrote:
> The binder allocator assumes that the thread that
> called binder_open will never die for the lifetime of
> that proc. That thread is normally the group_leader,
> however it may not be. Use the group_leader instead
> of current.
>
> Signed-off-b
On 07/21/2017 12:27 PM, Markus Mayer wrote:
> From: Markus Mayer
>
> This series adds the brcmstb AVS TMON driver.
>
> The driver was originally written by Brian Norris.
>
> v1 of this series can be found at https://lkml.org/lkml/2017/6/5/921
Rui, Eduardo, I can take patches 3 and 4 through th
On Monday, July 17, 2017 05:19:25 PM Florian Fainelli wrote:
> Have the core suspend/resume framework store the system-wide suspend
> state (suspend_state_t) we are about to enter, and expose it to drivers
> via pm_suspend_target_state in order to retrieve that. The state is
> assigned in suspend_d
From: Edward Cree
Date: Fri, 21 Jul 2017 14:35:17 +0100
> I managed to come up with a test for the swapped bounds in BPF_SUB, so here
> it is along with a patch that fixes it, separated out from my 'rewrite
> everything' series so it can go to -stable.
Series applied and queued up for -stable,
On Mon, Jul 24, 2017 at 10:41:12AM -0400, Alan Stern wrote:
> On Mon, 24 Jul 2017, Zdenek Kabelac wrote:
>
> > Hi
> >
> > I've problem with my USB storage devices: WD Elements 1TB.
> > (Bus 004 Device 002: ID 1058:10a8 Western Digital Technologies, Inc.
> > Elements
> > Portable (WDBUZG))
> >
On Tuesday, July 18, 2017 02:01:42 PM sean.w...@mediatek.com wrote:
> From: Sean Wang
>
> Changes since v4:
> - add back the missing Acked-by from v3
>
> Changes since v3:
> - remove the redundant line depends on ARM || ARM64 || COMPILE_TEST
> since the whole Kconfig.arm file depends on ARM || A
On Mon, Jul 24, 2017 at 2:00 PM, John Stultz wrote:
> On Thu, Jun 29, 2017 at 12:01 PM, Todd Kjos wrote:
>> The binder allocator assumes that the thread that
>> called binder_open will never die for the lifetime of
>> that proc. That thread is normally the group_leader,
>> however it may not be.
This patch series includes patches to convert sync test to use TAP13
ksft framework. In addition, fix to sync test to differentiate between
unsupported feature and access error when a non-root user runs it.
Updated kfst framework to return counters for sync test to use to print
the final pass or f
Some tests print final pass/fail message based on fail count. Add
ksft_get_*_cnt() API to kselftest framework to return counts.
Update ksft_print_cnts() to print the test results summary message with
individual pass, fail, ... counters.
Signed-off-by: Shuah Khan
---
tools/testing/selftests/ksel
Sync test doesn't differentiate between sync unsupported and test run
by non-root user and treats both as unsupported cases.
Fix it to add handling for these two different scenarios.
Signed-off-by: Shuah Khan
---
tools/testing/selftests/sync/sync_test.c | 23 +++
1 file chan
Convert test to use TAP13 ksft framework. Output after conversion:
TAP version 13
# [RUN] Testing sync framework
ok 1 [RUN] test_alloc_timeline
ok 2 [RUN] test_alloc_fence
ok 3 [RUN] test_alloc_fence_negative
ok 4 [RUN] test_fence_one_timeline_wait
ok 5 [RUN] test_fence_on
Hi Josef,
On Tue, Jul 18, 2017 at 03:15:28PM -0400, Josef Bacik wrote:
> Ok so you say that this test is better for the area map allocator, so
> presumably
> this is worst case for the bitmap allocator? What does the average case look
> like?
The bitmap allocator should perform relatively con
From: Andy Shevchenko
There are new types and helpers that are supposed to be used in new code.
As a preparation to get rid of legacy types and API functions do
the conversion here.
Cc: Tomas Winkler
Cc: Guenter Roeck
Cc: Samuel Ortiz
Signed-off-by: Andy Shevchenko
Signed-off-by: Tomas Wink
From: Kalle Valo
Date: Fri, 21 Jul 2017 19:12:54 +0300
> important fixes for net which had accumulated while I was away. I only
> applied the brcmfmac and rtlwifi patches only eight hours ago and I
> haven't seen the kbuild report yet so they might have some build
> breakage in theory. But the pa
The check for column exclusion did not verify that the event being
checked was an L2 event, and not a software event.
Software events should not be checked for column exclusion.
This resulted in a group with both software and L2 events sometimes
incorrectly rejecting the L2 event for column exclusi
>From 86f4f1f6deb76849e00c761fa30eeb479f789c35 Mon Sep 17 00:00:00 2001
From: Alexander Popov
Date: Mon, 24 Jul 2017 23:16:28 +0300
Subject: [PATCH 2/2] mm/slub.c: add a naive detection of double free or
corruption
On 06.07.2017 03:27, Kees Cook wrote:
> This SLUB free list pointer obfuscation c
The Asus T304UA convertible sports a magnetic detachable keyboard with
touchpad, which is connected over USB. Most of the keyboard hotkeys are exposed
through the same USB interface as the touchpad.
The mapping defined here is the same present in hid-asus, but when using
hid-asus to drive this tou
Some keyboard + touchpad devices have the Microsoft Win8 Wireless Radio
Controls extensions Usage Page define in the touchpad report descriptor,
so we need to support them in this driver.
Signed-off-by: João Paulo Rechi Vita
---
drivers/hid/hid-multitouch.c | 6 +-
1 file changed, 5 insertio
The Asus T304UA convertible sports a magnetic detachable keyboard with
touchpad, which is connected over USB. Most of the keyboard hotkeys are
exposed through the same USB interface as the touchpad, defined in the
report descriptor as follows:
0x06, 0x31, 0xFF, // Usage Page (Vendor Defined 0xFF3
On Mon, Jul 24, 2017 at 02:00:45PM -0700, John Stultz wrote:
> On Thu, Jun 29, 2017 at 12:01 PM, Todd Kjos wrote:
> > The binder allocator assumes that the thread that
> > called binder_open will never die for the lifetime of
> > that proc. That thread is normally the group_leader,
> > however it
On 07/24/2017 12:59 PM, Jonathan Corbet wrote:
> The kerneldoc comment for kthread_create() had an incorrect argument name,
> leading to a warning in the docs build. Correct it, and make one more
> small step toward a warning-free build.
>
> Signed-off-by: Jonathan Corbet
> ---
> include/linux/
601 - 700 of 1020 matches
Mail list logo