Re: [PATCH v3] drm: bridge: synopsys/dw-hdmi: Enable cec clock

2017-11-24 Thread Archit Taneja
Hi, On 11/20/2017 06:00 PM, Hans Verkuil wrote: I didn't see this merged for 4.15, is it too late to include this? All other changes needed to get CEC to work on rk3288 and rk3399 are all merged. Sorry for the late reply. I was out last week. Dave recently sent the second pull request for 4.1

Re: [PATCH] mm,madvise: bugfix of madvise systemcall infinite loop under special circumstances.

2017-11-24 Thread Michal Hocko
On Fri 24-11-17 10:27:57, guoxuenan wrote: > From: chenjie > > The madvise() system call supported a set of "conventional" advice values, > the MADV_WILLNEED parameter will trigger an infinite loop under direct > access mode(DAX). In DAX mode, the function madvise_vma() will return > directly wit

Re: VMs freezing when host is running 4.14

2017-11-24 Thread Marc Haber
On Thu, Nov 23, 2017 at 06:26:36PM +0200, Liran Alon wrote: > If there is no nested guest so no. My fix here probably won't help. I can confirm that I am not running nested virt, the host is running directly on the APU. I also have three other machines that are running flawlessly with 4.14, and an

Re: [PATCH] ASoC: amd: added error checks in dma driver

2017-11-24 Thread Guenter Roeck
On Fri, Nov 24, 2017 at 3:07 AM, Mukunda,Vijendar wrote: > > > > On Thursday 23 November 2017 10:59 PM, Mark Brown wrote: >> >> On Thu, Nov 23, 2017 at 08:59:43AM -0800, Guenter Roeck wrote: >>> >>> On Thu, Nov 23, 2017 at 8:30 AM, Vijendar Mukunda >>> wrote: added error checks in acp d

Re: [PATCH 1/3] lockdep: Apply crossrelease to PG_locked locks

2017-11-24 Thread Michal Hocko
On Fri 24-11-17 12:02:36, Byungchul Park wrote: > On Thu, Nov 16, 2017 at 02:07:46PM +0100, Michal Hocko wrote: > > On Thu 16-11-17 21:48:05, Byungchul Park wrote: > > > On 11/16/2017 9:02 PM, Michal Hocko wrote: > > > > for each struct page. So you are doubling the size. Who is going to > > > > en

Re: [PATCH 1/4] ASoC: wm2000: Delete an error message for a failed memory allocation in wm2000_i2c_probe()

2017-11-24 Thread Charles Keepax
On Fri, Nov 24, 2017 at 08:36:17AM +0100, SF Markus Elfring wrote: > From: Markus Elfring > Date: Thu, 23 Nov 2017 22:28:00 +0100 > > Omit an extra message for a memory allocation failure in this function. > > This issue was detected by using the Coccinelle software. > > Signed-off-by: Markus E

Linux 3.18.84

2017-11-24 Thread Greg KH
I'm announcing the release of the 3.18.84 kernel. All users of the 3.18 kernel series must upgrade. The updated 3.18.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-3.18.y and can be browsed at the normal kernel.org git web browser:

Re: Linux 3.18.84

2017-11-24 Thread Greg KH
diff --git a/Makefile b/Makefile index 8a1e51e5b0cf..107b5778b864 100644 --- a/Makefile +++ b/Makefile @@ -1,6 +1,6 @@ VERSION = 3 PATCHLEVEL = 18 -SUBLEVEL = 83 +SUBLEVEL = 84 EXTRAVERSION = NAME = Diseased Newt diff --git a/drivers/char/ipmi/ipmi_msghandler.c b/drivers/char/ipmi/ipmi_msgha

Re: Linux 4.4.101

2017-11-24 Thread Greg KH
diff --git a/Makefile b/Makefile index 91dd7832f499..0d7b050427ed 100644 --- a/Makefile +++ b/Makefile @@ -1,6 +1,6 @@ VERSION = 4 PATCHLEVEL = 4 -SUBLEVEL = 100 +SUBLEVEL = 101 EXTRAVERSION = NAME = Blurry Fish Butt diff --git a/arch/arm64/kernel/traps.c b/arch/arm64/kernel/traps.c index 210

Linux 4.4.101

2017-11-24 Thread Greg KH
I'm announcing the release of the 4.4.101 kernel. All users of the 4.4 kernel series must upgrade. The updated 4.4.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.4.y and can be browsed at the normal kernel.org git web browser:

Re: Linux 4.9.65

2017-11-24 Thread Greg KH
diff --git a/Makefile b/Makefile index d29cace0da6d..87a641515e9c 100644 --- a/Makefile +++ b/Makefile @@ -1,6 +1,6 @@ VERSION = 4 PATCHLEVEL = 9 -SUBLEVEL = 64 +SUBLEVEL = 65 EXTRAVERSION = NAME = Roaring Lionus diff --git a/crypto/dh.c b/crypto/dh.c index 9d19360e7189..99e20fc63cc9 100644 -

Linux 4.9.65

2017-11-24 Thread Greg KH
I'm announcing the release of the 4.9.65 kernel. All users of the 4.9 kernel series must upgrade. The updated 4.9.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.9.y and can be browsed at the normal kernel.org git web browser:

Re: Linux 4.13.16

2017-11-24 Thread Greg KH
diff --git a/Makefile b/Makefile index 3bd5d9d148d3..bc9a897e0431 100644 --- a/Makefile +++ b/Makefile @@ -1,6 +1,6 @@ VERSION = 4 PATCHLEVEL = 13 -SUBLEVEL = 15 +SUBLEVEL = 16 EXTRAVERSION = NAME = Fearless Coyote diff --git a/arch/x86/kernel/cpu/intel_cacheinfo.c b/arch/x86/kernel/cpu/inte

Linux 4.13.16

2017-11-24 Thread Greg KH
--- Please note, this is the LAST 4.13.y kernel to be released, it is now end-of-life. Move to 4.14.y now. --- I'm announcing the release of the 4.13.16 kernel. All users of the 4.13 kernel series must upgrade. The updated 4.13.y git tree

Linux 4.14.2

2017-11-24 Thread Greg KH
I'm announcing the release of the 4.14.2 kernel. All users of the 4.14 kernel series must upgrade. The updated 4.14.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.14.y and can be browsed at the normal kernel.org git web browser:

Re: Linux 4.14.2

2017-11-24 Thread Greg KH
diff --git a/Makefile b/Makefile index 01f9df1af256..75d89dc2b94a 100644 --- a/Makefile +++ b/Makefile @@ -1,7 +1,7 @@ # SPDX-License-Identifier: GPL-2.0 VERSION = 4 PATCHLEVEL = 14 -SUBLEVEL = 1 +SUBLEVEL = 2 EXTRAVERSION = NAME = Petit Gorille diff --git a/block/bio.c b/block/bio.c index 1

[PATCH v2] ARM64: crypto: do not call crypto_unregister_skcipher twice on error

2017-11-24 Thread Corentin Labbe
When a cipher fails to register in aes_init(), the error path goes thought aes_exit() then crypto_unregister_skciphers(). Since aes_exit calls also crypto_unregister_skcipher, this triggers a refcount_t: underflow; use-after-free. Signed-off-by: Corentin Labbe --- Changes since v1: - Instead of d

Re: [PATCH v2 13/13] nubus: Add support for the driver model

2017-11-24 Thread Greg Kroah-Hartman
On Fri, Nov 24, 2017 at 10:40:20AM +1100, Finn Thain wrote: > On Thu, 23 Nov 2017, Greg Kroah-Hartman wrote: > > > On Thu, Nov 23, 2017 at 11:24:38AM +1100, Finn Thain wrote: > > > On Mon, 20 Nov 2017, I wrote: > > > > > > > > You need to free up the memory allocated, and I don't see that > > >

Re: [kernel-hardening] [PATCH v3 1/2] Protected FIFOs and regular files

2017-11-24 Thread Salvatore Mesoraca
2017-11-23 23:43 GMT+01:00 Tobin C. Harding : > On Wed, Nov 22, 2017 at 09:01:45AM +0100, Salvatore Mesoraca wrote: > > Please take these comments in all humility, my English is a long way > from perfect. These are English grammar comments only. If this is viewed > as trivial please stop reading no

Re: [PATCH] r8152: disable rx checksum offload on Dell TB dock

2017-11-24 Thread Greg KH
On Fri, Nov 24, 2017 at 11:44:02AM +0800, Kai Heng Feng wrote: > > > > On 23 Nov 2017, at 5:24 PM, Greg KH wrote: > > > > On Thu, Nov 23, 2017 at 04:53:41PM +0800, Kai Heng Feng wrote: > >> > >> What I want to do here is to finding this connection: > >> Realtek r8153 <-> SMSC hub (USD ID: 0424

Re: [PATCH] MAINTAINERS: change maintainer for Rockchip drm drivers

2017-11-24 Thread Heiko Stuebner
Hi Daniel, [somehow my email address seems to have gotten lost, so only saw this by chance on the list itself now. I've also re-added Sandy to the recipients] Am Montag, 20. November 2017, 08:48:48 CET schrieb Daniel Vetter: > On Mon, Nov 13, 2017 at 06:15:31PM +0800, Mark Yao wrote: > > For pers

RE: [PATCH 4/4] dm: convert table_device.count from atomic_t to refcount_t

2017-11-24 Thread Reshetova, Elena
> Dne 20.10.2017 v 09:37 Elena Reshetova napsal(a): > > atomic_t variables are currently used to implement reference > > counters with the following properties: > > - counter is initialized to 1 using atomic_set() > > - a resource is freed upon counter reaching zero > > - once counter reache

Re: [PATCH] r8152: disable rx checksum offload on Dell TB dock

2017-11-24 Thread Greg KH
On Fri, Nov 24, 2017 at 09:28:05AM +0100, Greg KH wrote: > On Fri, Nov 24, 2017 at 11:44:02AM +0800, Kai Heng Feng wrote: > > > > > > > On 23 Nov 2017, at 5:24 PM, Greg KH wrote: > > > > > > On Thu, Nov 23, 2017 at 04:53:41PM +0800, Kai Heng Feng wrote: > > >> > > >> What I want to do here is

Re: [PATCH 1/6] perf: Add new type PERF_TYPE_PROBE

2017-11-24 Thread Peter Zijlstra
On Thu, Nov 23, 2017 at 10:31:29PM -0800, Alexei Starovoitov wrote: > unfortunately 32-bit is more screwed than it seems: > > $ cat align.c > #include > > struct S { > unsigned long long a; > } s; > > struct U { > unsigned long long a; > } u; > > int main() > { > printf("%d, %d\n",

Re: [PATCH v3 2/2] Protected O_CREAT open in sticky directories

2017-11-24 Thread Salvatore Mesoraca
2017-11-22 14:22 GMT+01:00 Matthew Wilcox : > On Wed, Nov 22, 2017 at 09:01:46AM +0100, Salvatore Mesoraca wrote: >> +An O_CREAT open missing the O_EXCL flag in a sticky directory is, >> +often, a bug or a synthom of the fact that the program is not >> +using appropriate procedures to access sticky

[PATCH v2 1/1] Input: ims-pcu - fix typo in an error log

2017-11-24 Thread Zhen Lei
1. change "to" to "too". 2. move ")" to the front of "\n", which discovered by Joe Perches. Signed-off-by: Zhen Lei Reviewed-by: Joe Perches --- drivers/input/misc/ims-pcu.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/input/misc/ims-pcu.c b/drivers/input/misc/im

Re: [PATCH v3 2/2] Protected O_CREAT open in sticky directories

2017-11-24 Thread Salvatore Mesoraca
2017-11-22 17:51 GMT+01:00 Alan Cox : > On Wed, 22 Nov 2017 09:01:46 +0100 > Salvatore Mesoraca wrote: > >> Disallows O_CREAT open missing the O_EXCL flag, in world or >> group writable directories, even if the file doesn't exist yet. >> With few exceptions (e.g. shared lock files based on flock()

Re: [kernel-hardening] [PATCH v3 2/2] Protected O_CREAT open in sticky directories

2017-11-24 Thread Salvatore Mesoraca
2017-11-23 23:57 GMT+01:00 Tobin C. Harding : > On Wed, Nov 22, 2017 at 09:01:46AM +0100, Salvatore Mesoraca wrote: > > Same caveat about this being English language comments only as for patch > 1/2. Please ignore if this is too trivial. My grammar is a long way from > perfect, especially please fe

Re: [PATCH 2/4] ASoC: wm2000: One function call less in wm2000_i2c_probe() after error detection

2017-11-24 Thread Charles Keepax
On Fri, Nov 24, 2017 at 08:37:41AM +0100, SF Markus Elfring wrote: > From: Markus Elfring > Date: Fri, 24 Nov 2017 07:45:59 +0100 > > The release_firmware() function was called in a few cases by the > wm2000_i2c_probe() function during error handling even if > the passed variable contained a null

Re: [PATCH 4/4] ASoC: wm2000: Improve a size determination in wm2000_i2c_probe()

2017-11-24 Thread Charles Keepax
On Fri, Nov 24, 2017 at 08:40:22AM +0100, SF Markus Elfring wrote: > From: Markus Elfring > Date: Fri, 24 Nov 2017 08:18:14 +0100 > > Replace the specification of a data structure by a pointer dereference > as the parameter for the operator "sizeof" to make the corresponding size > determination

Re: [PATCH 3/4] ASoC: wm2000: Fix a typo in a comment line

2017-11-24 Thread Charles Keepax
On Fri, Nov 24, 2017 at 08:39:02AM +0100, SF Markus Elfring wrote: > From: Markus Elfring > Date: Fri, 24 Nov 2017 08:02:57 +0100 > > Delete a duplicate character in a word of this description. > > Signed-off-by: Markus Elfring > --- Acked-by: Charles Keepax Thanks, Charles

Re: [PATCH] Add slowpath enter/exit trace events

2017-11-24 Thread peter enderborg
On 11/23/2017 03:01 PM, Michal Hocko wrote: > I am not sure adding a probe on a production system will fly in many > cases. A static tracepoint would be much easier in that case. But I > agree there are other means to accomplish the same thing. My main point > was to have an easy out-of-the-box way

Re: [PATCH v3] drm: bridge: synopsys/dw-hdmi: Enable cec clock

2017-11-24 Thread Hans Verkuil
On 11/24/2017 09:04 AM, Archit Taneja wrote: > Hi, > > On 11/20/2017 06:00 PM, Hans Verkuil wrote: >> I didn't see this merged for 4.15, is it too late to include this? >> All other changes needed to get CEC to work on rk3288 and rk3399 are all >> merged. > > Sorry for the late reply. I was out

[PATCH] x86/xen: support early interrupts in xen pv guests

2017-11-24 Thread Juergen Gross
Add early interrupt handlers activated by idt_setup_early_handler() to the handlers supported by Xen pv guests. This will allow for early WARN() calls not crashing the guest. Suggested-by: Andy Lutomirski Signed-off-by: Juergen Gross --- arch/x86/include/asm/segment.h | 12 arch/x8

Re: [PATCH] ASoC: amd: added error checks in dma driver

2017-11-24 Thread Mukunda,Vijendar
On Friday 24 November 2017 01:41 PM, Guenter Roeck wrote: On Fri, Nov 24, 2017 at 3:07 AM, Mukunda,Vijendar wrote: On Thursday 23 November 2017 10:59 PM, Mark Brown wrote: On Thu, Nov 23, 2017 at 08:59:43AM -0800, Guenter Roeck wrote: On Thu, Nov 23, 2017 at 8:30 AM, Vijendar Mukunda wro

[tip:sched/urgent] sched/debug: Fix task state recording/printout

2017-11-24 Thread tip-bot for Thomas Gleixner
Commit-ID: 3f5fe9fef5b2da06b6319fab8123056da5217c3f Gitweb: https://git.kernel.org/tip/3f5fe9fef5b2da06b6319fab8123056da5217c3f Author: Thomas Gleixner AuthorDate: Wed, 22 Nov 2017 13:05:48 +0100 Committer: Ingo Molnar CommitDate: Fri, 24 Nov 2017 08:39:12 +0100 sched/debug: Fix task s

Re: [PATCH] x86/xen: support early interrupts in xen pv guests

2017-11-24 Thread Juergen Gross
Sorry, Andy, forgot to Cc: you... On 24/11/17 09:42, Juergen Gross wrote: > Add early interrupt handlers activated by idt_setup_early_handler() to > the handlers supported by Xen pv guests. This will allow for early > WARN() calls not crashing the guest. > > Suggested-by: Andy Lutomirski > Signe

Re: [RFC PATCH 0/2] mm: introduce MAP_FIXED_SAFE

2017-11-24 Thread Michal Hocko
Are there any more concerns? So far the biggest one was the name. The other which suggests a flag as a modifier has been sorted out hopefully. Is there anymore more before we can consider this for merging? Well except for man page update which I will prepare of course. Can we target this to 4.16?

Re: [PATCH] r8152: disable rx checksum offload on Dell TB dock

2017-11-24 Thread Kai Heng Feng
> On 24 Nov 2017, at 4:28 PM, Greg KH wrote: > > The bcdDevice is different between the dock device and the "real" > device, why not use that? Yea, I’ll poke around and see if bcdDevice alone can be a good predicate. > Then there is still a bug. Who as ASMedia is working on this, have they >

[PATCH] atm: nicstar: use the setup_timer helper

2017-11-24 Thread Colin King
From: Colin Ian King Replace init_timer and two explicit assignments with the setup_timer helper. Signed-off-by: Colin Ian King --- drivers/atm/nicstar.c | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/drivers/atm/nicstar.c b/drivers/atm/nicstar.c index a9702836cbae..335

Re: [PATCH] r8152: disable rx checksum offload on Dell TB dock

2017-11-24 Thread Kai Heng Feng
> Also the MAC address is different, can you just trigger off of Dell's > MAC address space instead of the address space of the dongle device? A really good idea, never thought of this. Thanks for the hint :) Still, I need to ask Dell folks to get all the answers. Kai-Heng

Re: [PATCH 1/3] scsi: arcmsr: Add driver module parameter msi_enable

2017-11-24 Thread Ching Huang
On Fri, 2017-11-24 at 04:45 +0800, Ching Huang wrote: > Hello Dan, > > On Thu, 2017-11-23 at 13:44 +0300, Dan Carpenter wrote: > > On Thu, Nov 23, 2017 at 09:27:19AM +0800, Ching Huang wrote: > > > From: Ching Huang > > > > > > Add module parameter msi_enable to has a chance to disable msi inter

Re: Creating cyclecounter and lock member in timecounter structure [ Was Re: [RFC 1/4] drm/i915/perf: Add support to correlate GPU timestamp with system time]

2017-11-24 Thread Sagar Arun Kamble
On 11/24/2017 12:29 AM, Thomas Gleixner wrote: On Thu, 23 Nov 2017, Sagar Arun Kamble wrote: We needed inputs on possible optimization that can be done to timecounter/cyclecounter structures/usage. This mail is in response to review of patch https://patchwork.freedesktop.org/patch/188448/. As

Re: [PATCH v2 2/2] s390/virtio: add BSD license to virtio-ccw

2017-11-24 Thread Cornelia Huck
On Fri, 24 Nov 2017 07:21:09 +0200 "Michael S. Tsirkin" wrote: > The original intent of the virtio header relicensing > from 2008 was to make sure anyone can implement compatible > devices/drivers. The virtio-ccw was omitted by mistake. > > We have an ack from the only contributor as well as the

[PATCH 04/43] x86/gdt: Put per-cpu GDT remaps in ascending order

2017-11-24 Thread Ingo Molnar
From: Andy Lutomirski We currently have CPU 0's GDT at the top of the GDT range and higher-numbered CPUs at lower addresses. This happens because the fixmap is upside down (index 0 is the top of the fixmap). Flip it so that GDTs are in ascending order by virtual address. This will simplify a fu

[PATCH 12/43] x86/espfix/64: Stop assuming that pt_regs is on the entry stack

2017-11-24 Thread Ingo Molnar
From: Andy Lutomirski When we start using an entry trampoline, a #GP from userspace will be delivered on the entry stack, not on the task stack. Fix the espfix64 #DF fixup to set up #GP according to TSS.SP0, rather than assuming that pt_regs + 1 == SP0. This won't change anything without an ent

[PATCH 21/43] x86/mm/kaiser: Disable global pages by default with KAISER

2017-11-24 Thread Ingo Molnar
From: Dave Hansen Global pages stay in the TLB across context switches. Since all contexts share the same kernel mapping, these mappings are marked as global pages so kernel entries in the TLB are not flushed out on a context switch. But, even having these entries in the TLB opens up something

[PATCH 00/43] x86 entry-stack and Kaiser series, 2017/11/24 version

2017-11-24 Thread Ingo Molnar
This is a linear series of patches of the latest entry-stack plus Kaiser bits from Andy Lutomirski (v3 series from today) and Dave Hansen (kaiser-414-tipwip-20171123 version), on top of latest tip:x86/urgent (12a78d43de76), plus fixes - for easier review. The code should be the latest posted by A

[PATCH 29/43] x86/mm/kaiser: Map dynamically-allocated LDTs

2017-11-24 Thread Ingo Molnar
From: Dave Hansen Normally, a process has a NULL mm->context.ldt. But, there is a syscall for a process to set a new one. If a process does that, the LDT be mapped into the user page tables, just like the default copy. The original KAISER patch missed this case. Signed-off-by: Dave Hansen Cc

[PATCH 30/43] x86/mm/kaiser: Map espfix structures

2017-11-24 Thread Ingo Molnar
From: Dave Hansen There is some rather arcane code to help when an IRET returns to 16-bit segments. It is referred to as the "espfix" code. This consists of a few per-cpu variables: espfix_stack: tells us where the stack is allocated (the bottom) espfix_wad

[PATCH 43/43] x86/mm/kaiser: Add Kconfig

2017-11-24 Thread Ingo Molnar
From: Dave Hansen PARAVIRT generally requires that the kernel not manage its own page tables. It also means that the hypervisor and kernel must agree wholeheartedly about what format the page tables are in and what they contain. KAISER, unfortunately, changes the rules and they can not be used

[PATCH 31/43] x86/mm/kaiser: Map entry stack variable

2017-11-24 Thread Ingo Molnar
From: Dave Hansen There are times where the kernel is entered but there is no safe stack, like at SYSCALL entry. To obtain a safe stack, we have to clobber %rsp and store the clobbered value in 'rsp_scratch'. Map this to userspace to allow us to do this stack switch before the CR3 switch. Sign

[PATCH 40/43] x86/mm/kaiser: Add a function to check for KAISER being enabled

2017-11-24 Thread Ingo Molnar
From: Dave Hansen Currently, all of the checks for KAISER are compile-time checks. Runtime checks are needed for turning it on/off at runtime. Add a function to do that. Signed-off-by: Dave Hansen Cc: Andy Lutomirski Cc: Borislav Petkov Cc: Brian Gerst Cc: Daniel Gruss Cc: Denys Vlasenko

[PATCH 41/43] x86/mm/kaiser: Un-poison PGDs at runtime

2017-11-24 Thread Ingo Molnar
From: Dave Hansen With KAISER Kernel PGDs that map userspace are "poisoned" with the NX bit. This ensures that if a kernel->user CR3 switch is missed, userspace crashes instead of running in an unhardened state. This code will be needed in a moment when KAISER is turned on and off at runtime.

[PATCH 33/43] x86/mm: Move CR3 construction functions

2017-11-24 Thread Ingo Molnar
From: Dave Hansen For flushing the TLB, the ASID which has been programmed into the hardware must be known. That differs from what is in 'cpu_tlbstate'. Add functions to transform the 'cpu_tlbstate' values into to the one programmed into the hardware (CR3). It's not easy to include mmu_context

[PATCH 32/43] x86/mm/kaiser: Map virtually-addressed performance monitoring buffers

2017-11-24 Thread Ingo Molnar
From: Hugh Dickins The BTS and PEBS buffers both have their virtual addresses programmed into the hardware. This means that any access to them is performed via the page tables. The times that the hardware accesses these are entirely dependent on how the performance monitoring hardware events ar

[PATCH 34/43] x86/mm: Remove hard-coded ASID limit checks

2017-11-24 Thread Ingo Molnar
From: Dave Hansen First, it's nice to remove the magic numbers. Second, KAISER is going to consume half of the available ASID space. The space is currently unused, but add a comment to spell out this new restriction. Signed-off-by: Dave Hansen Cc: Andy Lutomirski Cc: Borislav Petkov Cc: Bri

[PATCH 35/43] x86/mm: Put mmu-to-h/w ASID translation in one place

2017-11-24 Thread Ingo Molnar
From: Dave Hansen There are effectively two ASID types: 1. The one stored in the mmu_context that goes from 0->5 2. The one programmed into the hardware that goes from 1->6 This consolidates the locations where converting beween the two (by doing +1) to a single place which gives us a nice place

[PATCH 36/43] x86/mm: Allow flushing for future ASID switches

2017-11-24 Thread Ingo Molnar
From: Dave Hansen If changing the page tables in such a way that an invalidation of all contexts (aka. PCIDs / ASIDs) is required, they can be actively invalidated by: 1. INVPCID for each PCID (works for single pages too). 2. Load CR3 with each PCID without the NOFLUSH bit set 3. Load CR3 wit

[PATCH 38/43] x86/mm/kaiser: Disable native VSYSCALL

2017-11-24 Thread Ingo Molnar
From: Dave Hansen The KAISER code attempts to "poison" the user portion of the kernel page tables. It detects entries that it wants that it wants to poison in two ways: * Looking for addresses >= PAGE_OFFSET * Looking for entries without _PAGE_USER set But, to allow the _PAGE_USER check to wo

[PATCH 37/43] x86/mm/kaiser: Use PCID feature to make user and kernel switches faster

2017-11-24 Thread Ingo Molnar
From: Dave Hansen Short summary: Use x86 PCID feature to avoid flushing the TLB at all interrupts and syscalls. Speed them up. Makes context switches and TLB flushing slower. Background: KAISER keeps two copies of the page tables. Switches between the copies are performed by writing to the C

[PATCH 39/43] x86/mm/kaiser: Add debugfs file to turn KAISER on/off at runtime

2017-11-24 Thread Ingo Molnar
From: Dave Hansen This will be used in a few patches. Right now, it's not wired up to do anything useful. Signed-off-by: Dave Hansen Cc: Andy Lutomirski Cc: Borislav Petkov Cc: Brian Gerst Cc: Daniel Gruss Cc: Denys Vlasenko Cc: H. Peter Anvin Cc: Hugh Dickins Cc: Josh Poimboeuf Cc: Ke

[PATCH 42/43] x86/mm/kaiser: Allow KAISER to be enabled/disabled at runtime

2017-11-24 Thread Ingo Molnar
From: Dave Hansen The KAISER CR3 switches are expensive for many reasons. Not all systems benefit from the protection provided by KAISER. Some of them can not pay the high performance cost. This patch adds a debugfs file. To disable KAISER, you do: echo 0 > /sys/kernel/debug/x86/kais

[PATCH 22/43] x86/mm/kaiser: Prepare assembly for entry/exit CR3 switching

2017-11-24 Thread Ingo Molnar
From: Dave Hansen This is largely code from Andy Lutomirski. I fixed a few bugs in it, and added a few SWITCH_TO_* spots. KAISER needs to switch to a different CR3 value when it enters the kernel and switch back when it exits. This essentially needs to be done before leaving assembly code. Th

[PATCH 23/43] x86/mm/kaiser: Introduce user-mapped per-cpu areas

2017-11-24 Thread Ingo Molnar
From: Dave Hansen These patches are based on work from a team at Graz University of Technology posted here: https://github.com/IAIK/KAISER The KAISER approach keeps two copies of the page tables: one for running in the kernel and one for running userspace. But, there are a few structures that a

[PATCH 24/43] x86/mm/kaiser: Mark per-cpu data structures required for entry/exit

2017-11-24 Thread Ingo Molnar
From: Dave Hansen These patches are based on work from a team at Graz University of Technology posted here: https://github.com/IAIK/KAISER The KAISER approach keeps two copies of the page tables: one for running in the kernel and one for running userspace. But, there are a few structures that a

[PATCH 25/43] x86/mm/kaiser: Unmap kernel from userspace page tables (core patch)

2017-11-24 Thread Ingo Molnar
From: Dave Hansen These patches are based on work from a team at Graz University of Technology: https://github.com/IAIK/KAISER . This work would not have been possible without their work as a starting point. KAISER is a countermeasure against side channel attacks against kernel virtual memory.

[PATCH 27/43] x86/mm/kaiser: Make sure static PGDs are 8k in size

2017-11-24 Thread Ingo Molnar
From: Dave Hansen A few PGDs come out of the kernel binary instead of being allocated dynamically. Before this patch, they are all 8k-aligned, but they must also be 8k in *size*. The original KAISER patch did not do this. It probably just lucked out that it did not trample over data after the

[PATCH 26/43] x86/mm/kaiser: Allow NX poison to be set in p4d/pgd

2017-11-24 Thread Ingo Molnar
From: Dave Hansen The user portion of the kernel page tables use the NX bit to poison them for userspace. But, that trips the p4d/pgd_bad() checks. Make sure it does not do that. Signed-off-by: Dave Hansen Cc: Andy Lutomirski Cc: Borislav Petkov Cc: Brian Gerst Cc: Daniel Gruss Cc: Denys

[PATCH 28/43] x86/mm/kaiser: Map CPU entry area

2017-11-24 Thread Ingo Molnar
From: Dave Hansen There is now a special 'struct cpu_entry' area that contains all of the data needed to enter the kernel. It's mapped in the fixmap area and contains: * The GDT (hardware segment descriptor) * The TSS (thread information structure that points the hardware to the various st

[PATCH 20/43] x86/entry: Clean up SYSENTER_stack code

2017-11-24 Thread Ingo Molnar
From: Andy Lutomirski The existing code was a mess, mainly because C arrays are nasty. Turn SYSENTER_stack into a struct, add a helper to find it, and do all the obvious cleanups this enables. Signed-off-by: Andy Lutomirski Cc: Borislav Petkov Cc: Borislav Petkov Cc: Brian Gerst Cc: Dave Han

[PATCH 13/43] x86/entry/64: Use a percpu trampoline stack for IDT entries

2017-11-24 Thread Ingo Molnar
From: Andy Lutomirski Historically, IDT entries from usermode have always gone directly to the running task's kernel stack. Rearrange it so that we enter on a percpu trampoline stack and then manually switch to the task's stack. This touches a couple of extra cachelines, but it gives us a chance

[PATCH 14/43] x86/entry/64: Return to userspace from the trampoline stack

2017-11-24 Thread Ingo Molnar
From: Andy Lutomirski By itself, this is useless. It gives us the ability to run some final code before exit that cannnot run on the kernel stack. This could include a CR3 switch a la KAISER or some kernel stack erasing, for example. (Or even weird things like *changing* which kernel stack get

[PATCH 15/43] x86/entry/64: Create a percpu SYSCALL entry trampoline

2017-11-24 Thread Ingo Molnar
From: Andy Lutomirski Handling SYSCALL is tricky: the SYSCALL handler is entered with every single register (except FLAGS), including RSP, live. It somehow needs to set RSP to point to a valid stack, which means it needs to save the user RSP somewhere and find its own stack pointer. The canonic

[PATCH 19/43] x86/entry/64: Remove the SYSENTER stack canary

2017-11-24 Thread Ingo Molnar
From: Andy Lutomirski Now that the SYSENTER stack has a guard page, there's no need for a canary to detect overflow after the fact. Signed-off-by: Andy Lutomirski Cc: Borislav Petkov Cc: Borislav Petkov Cc: Brian Gerst Cc: Dave Hansen Cc: Denys Vlasenko Cc: H. Peter Anvin Cc: Josh Poimboe

[PATCH 17/43] x86/irq/64: Print the offending IP in the stack overflow warning

2017-11-24 Thread Ingo Molnar
From: Andy Lutomirski In case something goes wrong with unwind (not unlikely in case of overflow), print the offending IP where we detected the overflow. Signed-off-by: Andy Lutomirski Cc: Borislav Petkov Cc: Borislav Petkov Cc: Brian Gerst Cc: Dave Hansen Cc: Denys Vlasenko Cc: H. Peter A

[PATCH 16/43] x86/irq: Remove an old outdated comment about context tracking races

2017-11-24 Thread Ingo Molnar
From: Andy Lutomirski That race has been fixed and code cleaned up for a while now. Signed-off-by: Andy Lutomirski Cc: Borislav Petkov Cc: Borislav Petkov Cc: Brian Gerst Cc: Dave Hansen Cc: Denys Vlasenko Cc: H. Peter Anvin Cc: Josh Poimboeuf Cc: Linus Torvalds Cc: Peter Zijlstra Cc:

[PATCH 11/43] x86/entry/64: Separate cpu_current_top_of_stack from TSS.sp0

2017-11-24 Thread Ingo Molnar
From: Andy Lutomirski On 64-bit kernels, we used to assume that TSS.sp0 was the current top of stack. With the addition of an entry trampoline, this will no longer be the case. Store the current top of stack in TSS.sp1, which is otherwise unused but shares the same cacheline. Signed-off-by: An

[PATCH 18/43] x86/entry/64: Move the IST stacks into cpu_entry_area

2017-11-24 Thread Ingo Molnar
From: Andy Lutomirski The IST stacks are needed when an IST exception occurs and are accessed before any kernel code at all runs. Move them into cpu_entry_area. Signed-off-by: Andy Lutomirski Cc: Borislav Petkov Cc: Borislav Petkov Cc: Brian Gerst Cc: Dave Hansen Cc: Denys Vlasenko Cc: H.

[PATCH 05/43] x86/fixmap: Generalize the GDT fixmap mechanism

2017-11-24 Thread Ingo Molnar
From: Andy Lutomirski Currently, the GDT is an ad-hoc array of pages, one per CPU, in the fixmap. Generalize it to be an array of a new struct cpu_entry_area so that we can cleanly add new things to it. Signed-off-by: Andy Lutomirski Reviewed-by: Thomas Gleixner Cc: Borislav Petkov Cc: Boris

[PATCH 07/43] x86/entry: Fix assumptions that the HW TSS is at the beginning of cpu_tss

2017-11-24 Thread Ingo Molnar
From: Andy Lutomirski A future patch will move SYSENTER_stack to the beginning of cpu_tss to help detect overflow. Before this can happen, fix several code paths that hardcode assumptions about the old layout Signed-off-by: Andy Lutomirski Reviewed-by: Borislav Petkov Reviewed-by: Thomas Glei

[PATCH 06/43] x86/kasan/64: Teach KASAN about the cpu_entry_area

2017-11-24 Thread Ingo Molnar
From: Andy Lutomirski The cpu_entry_area will contain stacks. Make sure that KASAN has appropriate shadow mappings for them. Signed-off-by: Andy Lutomirski Cc: Alexander Potapenko Cc: Andrey Ryabinin Cc: Borislav Petkov Cc: Borislav Petkov Cc: Brian Gerst Cc: Dave Hansen Cc: Denys Vlasen

[PATCH 08/43] x86/dumpstack: Handle stack overflow on all stacks

2017-11-24 Thread Ingo Molnar
From: Andy Lutomirski We currently special-case stack overflow on the task stack. We're going to start putting special stacks in the fixmap with a custom layout, so they'll have guard pages, too. Teach the unwinder to be able to unwind an overflow of any of the stacks. Signed-off-by: Andy Luto

[PATCH 09/43] x86/entry: Move SYSENTER_stack to the beginning of struct tss_struct

2017-11-24 Thread Ingo Molnar
From: Andy Lutomirski SYSENTER_stack should have reliable overflow detection, which means that it needs to be at the bottom of a page, not the top. Move it to the beginning of struct tss_struct and page-align it. Also add an assertion to make sure that the fixed hardware TSS doesn't cross a page

[PATCH 10/43] x86/entry: Remap the TSS into the cpu entry area

2017-11-24 Thread Ingo Molnar
From: Andy Lutomirski This has a secondary purpose: it puts the entry stack into a region with a well-controlled layout. A subsequent patch will take advantage of this to streamline the SYSCALL entry code to be able to find it more easily. Signed-off-by: Andy Lutomirski Reviewed-by: Thomas Gle

[PATCH 02/43] x86/entry/64: Allocate and enable the SYSENTER stack

2017-11-24 Thread Ingo Molnar
From: Andy Lutomirski This will simplify future changes that want scratch variables early in the SYSENTER handler -- they'll be able to spill registers to the stack. It also lets us get rid of a SWAPGS_UNSAFE_STACK user. This does not depend on CONFIG_IA32_EMULATION because we'll want the stack

[PATCH 01/43] x86/decoder: Add new TEST instruction pattern

2017-11-24 Thread Ingo Molnar
From: Masami Hiramatsu The kbuild test robot reported this build warning: Warning: arch/x86/tools/test_get_len found difference at :8103dd2c Warning: 8103dd82: f6 09 d8 testb $0xd8,(%rcx) Warning: objdump says 3 bytes, but insn_get_length() says 2 Warning: decoded and c

[PATCH 03/43] x86/dumpstack: Add get_stack_info() support for the SYSENTER stack

2017-11-24 Thread Ingo Molnar
From: Andy Lutomirski get_stack_info() doesn't currently know about the SYSENTER stack, so unwinding will fail if we entered the kernel on the SYSENTER stack and haven't fully switched off. Teach get_stack_info() about the SYSENTER stack. With future patches applied that run part of the entry c

Re: [GIT PULL] Second batch of KVM changes for Linux 4.15

2017-11-24 Thread Paolo Bonzini
On 24/11/2017 04:50, Linus Torvalds wrote: > On Mon, Nov 20, 2017 at 2:06 PM, Paolo Bonzini wrote: >> >> I am not including the host side of AMD SEV, because it wouldn't have gotten >> enough time in linux-next even with a "regular-length" merge window. It >> will be in 4.16. > > So I pulled it,

Re: [PATCH 1/3] lockdep: Apply crossrelease to PG_locked locks

2017-11-24 Thread Jan Kara
On Fri 24-11-17 09:11:49, Michal Hocko wrote: > On Fri 24-11-17 12:02:36, Byungchul Park wrote: > > On Thu, Nov 16, 2017 at 02:07:46PM +0100, Michal Hocko wrote: > > > On Thu 16-11-17 21:48:05, Byungchul Park wrote: > > > > On 11/16/2017 9:02 PM, Michal Hocko wrote: > > > > > for each struct page.

BUG: unable to handle kernel NULL pointer dereference at 0000000000000018

2017-11-24 Thread Jesús Rodríguez Acosta
Hi all: I got a kernel panic after execute "systemctl reboot". Nov 24 09:02:06 desktop systemd[713]: Stopped target Timers. Nov 24 09:02:06 desktop systemd[713]: Reached target Shutdown. Nov 24 09:02:06 desktop systemd[713]: Starting Exit the Session... Nov 24 09:02:06 desktop kernel: ---

Re: [PATCH v2 1/5] mm: memory_hotplug: Memory hotplug (add) support for arm64

2017-11-24 Thread Andrea Reale
Hi Arun, On Fri 24 Nov 2017, 11:25, Arun KS wrote: > On Thu, Nov 23, 2017 at 4:43 PM, Maciej Bielski > wrote: >> [ ...] > > Introduces memory hotplug functionality (hot-add) for arm64. > > @@ -615,6 +616,44 @@ void __init paging_init(void) > > SWAPPER_DIR_SIZE - PAGE_SIZE);

Re: [PATCH 1/1] stackdepot: interface to check entries and size of stackdepot.

2017-11-24 Thread Maninder Singh
Hi Michal, > On Wed 22-11-17 16:17:41, Maninder Singh wrote: > > This patch provides interface to check all the stack enteries > > saved in stackdepot so far as well as memory consumed by stackdepot. > > > > 1) Take current depot_index and offset to calculate end address for one > > ite

[PATCH] perf test: Fix test 21 for s390x

2017-11-24 Thread Thomas Richter
Test case 21 (Number of exit events of a simple workload) fails on s390x. The reason is the invalid sample frequency supplied for this test. On s390x the minimum sample frequency is much higher (see output of /proc/service_levels: [root@s35lp76 linux-devel]# cat /proc/service_levels CPU-MF: Count

Re: Fwd: Why qemu with kvm enabled can boot kernel even if identity page map is not set correctly?

2017-11-24 Thread Paolo Bonzini
On 22/11/2017 03:58, 丁飞 wrote: > -- Forwarded message -- > From: 丁飞 > Date: Wed, Nov 22, 2017 at 12:58 AM > Subject: Why qemu with kvm enabled can boot kernel even if identity > page map is not set correctly? > To: k...@vger.kernel.org > > > Hi, KVM developers. Firstly, sorry if

Re: powerpc/vas, export chip_to_vas_id()

2017-11-24 Thread Michael Ellerman
On Mon, 2017-11-20 at 19:12:48 UTC, Sukadev Bhattiprolu wrote: > >From 958f8db089f4b89407fc4b89bccd3eaef585aa96 Mon Sep 17 00:00:00 2001 > From: Sukadev Bhattiprolu > Date: Mon, 20 Nov 2017 12:53:15 -0600 > Subject: [PATCH 1/1] powerpc/vas, export chip_to_vas_id() > > Export the symbol chip_to_va

[PATCH] perf annotate: Fix unnecessary memory allocation for s390x

2017-11-24 Thread Thomas Richter
This patch fixes a bug introduced with commit d9f8dfa9baf9 ("perf annotate s390: Implement jump types for perf annotate"). Perf annotate displays annotated assembler output by reading output of command objdump and parsing the disassembled lines. For each shown mnemonic this function sequence is ex

Re: [GIT PULL] UBI/UBIFS updates for 4.15-rc1

2017-11-24 Thread Richard Weinberger
Linus, Am Freitag, 24. November 2017, 04:41:37 CET schrieb Linus Torvalds: > On Thu, Nov 23, 2017 at 4:37 AM, Richard Weinberger wrote: > > git://git.infradead.org/linux-ubifs.git tags/upstream-4.15-rc1 > > Similarly to the arch/um case, none of this seems to have been in > linux-next, and is

Re: [v2] powerpc: fix boot on BOOK3S_32 with CONFIG_STRICT_KERNEL_RWX

2017-11-24 Thread Michael Ellerman
On Tue, 2017-11-21 at 14:28:20 UTC, Christophe Leroy wrote: > On powerpc32, patch_instruction() is called by apply_feature_fixups() > which is called from early_init() > > There is the following note in front of early_init(): > * Note that the kernel may be running at an address which is differen

Re: [PATCH v7 3/5] bpf: add a bpf_override_function helper

2017-11-24 Thread Daniel Borkmann
On 11/22/2017 10:23 PM, Josef Bacik wrote: > From: Josef Bacik > > Error injection is sloppy and very ad-hoc. BPF could fill this niche > perfectly with it's kprobe functionality. We could make sure errors are > only triggered in specific call chains that we care about with very > specific situ

  1   2   3   4   5   6   >