Re: [PATCH] drm/amdgpu_gem: fix error handling path in amdgpu_gem_va_update_vm

2018-02-15 Thread Gustavo A. R. Silva
On 02/15/2018 06:32 AM, Christian König wrote: Am 15.02.2018 um 06:20 schrieb Gustavo A. R. Silva: Currently, if amdgpu_vm_bo_update() fails, the returned error is being ignored. Fix this by properly checking _r_ after calling amdgpu_vm_bo_update. Also, remove redundant code just before label

[PATCH 4.15 126/202] media: v4l2-compat-ioctl32.c: make ctrl_is_pointer work for subdevs

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Hans Verkuil commit 273caa260035c03d89ad63d72d8cd3d9e5c5e3f1 upstream. If the device is of type VFL_TYPE_SUBDEV then vdev->ioctl_ops is NULL so the 'if (!ops->vidioc_query_ext_ctrl)' check wou

Re: [PATCH v3 4/8] i2c: ov9650: use 64-bit arithmetic instead of 32-bit

2018-02-15 Thread Gustavo A. R. Silva
On 02/15/2018 07:52 AM, Hans Verkuil wrote: On 08/02/18 17:39, Gustavo A. R. Silva wrote: Hi Sakari, On 02/07/2018 03:59 PM, Sakari Ailus wrote: Hi Gustavo, On Tue, Feb 06, 2018 at 10:47:50AM -0600, Gustavo A. R. Silva wrote: Add suffix ULL to constants 1 and 100 in order to give t

[PATCH 4.15 142/202] afs: Add missing afs_put_cell()

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: David Howells commit e44150157f42219fa5c074588efdb31ccfb197fc upstream. afs_alloc_volume() needs to release the cell ref it obtained in the case of an error. Fix this by adding an afs_put_cel

Re: [PATCH] drm/amdkfd: Use ARRAY_SIZE macro in kfd_build_sysfs_node_entry

2018-02-15 Thread Gustavo A. R. Silva
Hi Oded, On 02/15/2018 04:08 AM, Oded Gabbay wrote: Hi Gustavo, The patch is queued for the merge window of kernel 4.17 (opens in about 7 weeks from now). Awesome. Thanks for the info. -- Gustavo Oded On Wed, Feb 14, 2018 at 11:30 PM, Gustavo A. R. Silva wrote: Hi all, I was just wonde

[PATCH 4.15 141/202] watchdog: imx2_wdt: restore previous timeout after suspend+resume

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Martin Kaiser commit 0be267255cef64e1c58475baa7b25568355a3816 upstream. When the watchdog device is suspended, its timeout is set to the maximum value. During resume, the previously set timeou

[PATCH 4.15 138/202] ASoC: rockchip: i2s: fix playback after runtime resume

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: John Keeping commit c66234cfedfc3e6e3b62563a5f2c1562be09a35d upstream. When restoring registers during runtime resume, we must not write to I2S_TXDR which is the transmit FIFO as this queues u

[PATCH 4.15 139/202] ASoC: skl: Fix kernel warning due to zero NHTL entry

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Takashi Iwai commit 20a1eae7cbf96e9bf8579362e971491e6aea upstream. I got the following kernel warning when loading snd-soc-skl module on Dell Latitude 7270 laptop: memremap attempted on m

Re: [RFC PATCH 2/4] softirq: Per vector deferment to workqueue

2018-02-15 Thread Frederic Weisbecker
On Thu, Feb 08, 2018 at 06:44:52PM +0100, Sebastian Andrzej Siewior wrote: > On 2018-01-19 16:46:12 [+0100], Frederic Weisbecker wrote: > > diff --git a/kernel/softirq.c b/kernel/softirq.c > > index c8c6841..becb1d9 100644 > > --- a/kernel/softirq.c > > +++ b/kernel/softirq.c > > @@ -62,6 +62,19 @@

Re: [PATCH 2/4] arm64: dts: renesas: r8a77995: add FCPVD nodes

2018-02-15 Thread Simon Horman
On Tue, Feb 13, 2018 at 02:32:22PM +0200, Laurent Pinchart wrote: > Hi Kieran, > > Thank you for the patch. > > On Tuesday, 13 February 2018 00:25:27 EET Kieran Bingham wrote: > > From: Kieran Bingham > > > > The FCPVD handles the interface between the VSPD and memory. > > > > Signed-off-by: K

[PATCH 4.15 136/202] KVM: PPC: Book3S PR: Fix broken select due to misspelling

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Ulf Magnusson commit 57ea5f161a7de5b1913c212d04f57a175b159fdf upstream. Commit 76d837a4c0f9 ("KVM: PPC: Book3S PR: Don't include SPAPR TCE code on non-pseries platforms") added a reference to

[PATCH 4.15 125/202] media: v4l2-compat-ioctl32.c: refactor compat ioctl32 logic

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Daniel Mentz commit a1dfb4c48cc1e64eeb7800a27c66a6f7e88d075a upstream. The 32-bit compat v4l2 ioctl handling is implemented based on its 64-bit equivalent. It converts 32-bit data structures i

[PATCH 4.15 084/202] [Variant 2/Spectre-v2] arm/arm64: smccc: Make function identifiers an unsigned quantity

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier Commit ded4c39e93f3 upstream. Function identifiers are a 32bit, unsigned quantity. But we never tell so to the compiler, resulting in the following: 4ac: b26187e0mov

[PATCH 4.15 092/202] ubi: Fix race condition between ubi volume creation and udev

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Clay McClure commit a51a0c8d213594bc094cb8e54aad0cb6d7f7b9a6 upstream. Similar to commit 714fb87e8bc0 ("ubi: Fix race condition between ubi device creation and udev"), we should make the volum

Re: [PATCH 0/2] power: supply: Fix AXP288 fallback when not needed

2018-02-15 Thread Hans de Goede
Hi Carlo, On 14-02-18 20:41, Carlo Caione wrote: From: Carlo Caione With commits af3ec837 and dccfae6d a blacklist was introduced to avoid using the ACPI drivers for AC and battery when a native PMIC driver was already present. While this is in general a good idea (because of broken DSDT or pr

[PATCH 4.15 093/202] ubi: fastmap: Erase outdated anchor PEBs during attach

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Sascha Hauer commit f78e5623f45bab2b726eec29dc5cefbbab2d0b1c upstream. The fastmap update code might erase the current fastmap anchor PEB in case it doesn't find any new free PEB. When a power

[PATCH 4.15 091/202] mtd: nand: sunxi: Fix ECC strength choice

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Miquel Raynal commit f4c6cd1a7f2275d5bc0e494b21fff26f8dde80f0 upstream. When the requested ECC strength does not exactly match the strengths supported by the ECC engine, the driver is selectin

[PATCH 4.15 123/202] media: v4l2-compat-ioctl32.c: drop pr_info for unknown buffer type

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Hans Verkuil commit 169f24ca68bf0f247d111aef07af00dd3a02ae88 upstream. There is nothing wrong with using an unknown buffer type. So stop spamming the kernel log whenever this happens. The kern

[PATCH 4.15 089/202] mtd: nand: brcmnand: Disable prefetch by default

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Kamal Dasu commit f953f0f89663c39f08f4baaa8a4a881401b65654 upstream. Brcm nand controller prefetch feature needs to be disabled by default. Enabling affects performance on random reads as well

[PATCH 4.15 121/202] media: v4l2-compat-ioctl32.c: fix ctrl_is_pointer

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Hans Verkuil commit b8c601e8af2d08f733d74defa8465303391bb930 upstream. ctrl_is_pointer just hardcoded two known string controls, but that caused problems when using e.g. custom controls that u

[PATCH 4.15 119/202] media: v4l2-compat-ioctl32.c: avoid sizeof(type)

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Hans Verkuil commit 333b1e9f96ce05f7498b581509bb30cde03018bf upstream. Instead of doing sizeof(struct foo) use sizeof(*up). There even were cases where 4 * sizeof(__u32) was used instead of si

[PATCH 4.15 116/202] media: v4l2-compat-ioctl32.c: add missing VIDIOC_PREPARE_BUF

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Hans Verkuil commit 3ee6d040719ae09110e5cdf24d5386abe5d1b776 upstream. The result of the VIDIOC_PREPARE_BUF ioctl was never copied back to userspace since it was missing in the switch. Signed

[PATCH 4.15 113/202] crypto: hash - prevent using keyed hashes without setting key

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Eric Biggers commit 9fa68f620041be04720d0cbfb1bd3ddfc6310b24 upstream. Currently, almost none of the keyed hash algorithms check whether a key has been set before proceeding. Some algorithms

[PATCH 4.15 114/202] media: v4l2-ioctl.c: use check_fmt for enum/g/s/try_fmt

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Hans Verkuil commit b2469c814fbc8f1f19676dd4912717b798df511e upstream. Don't duplicate the buffer type checks in enum/g/s/try_fmt. The check_fmt function does that already. It is hard to keep

[PATCH 4.15 111/202] crypto: poly1305 - remove ->setkey() method

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Eric Biggers commit a16e772e664b9a261424107784804cffc8894977 upstream. Since Poly1305 requires a nonce per invocation, the Linux kernel implementations of Poly1305 don't use the crypto API's k

[PATCH 4.15 112/202] crypto: hash - annotate algorithms taking optional key

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Eric Biggers commit a208fa8f33031b9e0aba44c7d1b7e68eb0cbd29e upstream. We need to consistently enforce that keyed hashes cannot be used without setting the key. To do this we need a reliable

[PATCH 4.15 109/202] crypto: cryptd - pass through absence of ->setkey()

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Eric Biggers commit 841a3ff329713f796a63356fef6e2f72e4a3f6a3 upstream. When the cryptd template is used to wrap an unkeyed hash algorithm, don't install a ->setkey() method to the cryptd insta

[PATCH 4.15 110/202] crypto: mcryptd - pass through absence of ->setkey()

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Eric Biggers commit fa59b92d299f2787e6bae1ff078ee0982e80211f upstream. When the mcryptd template is used to wrap an unkeyed hash algorithm, don't install a ->setkey() method to the mcryptd ins

[PATCH 4.15 108/202] crypto: hash - introduce crypto_hash_alg_has_setkey()

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Eric Biggers commit cd6ed77ad5d223dc6299fb58f62e0f5267f7e2ba upstream. Templates that use an shash spawn can use crypto_shash_alg_has_setkey() to determine whether the underlying algorithm req

Re: [PATCH 2/4] arm64: dts: renesas: r8a77995: add FCPVD nodes

2018-02-15 Thread Kieran Bingham
Hi Simon, On 15/02/18 16:14, Simon Horman wrote: > On Tue, Feb 13, 2018 at 02:32:22PM +0200, Laurent Pinchart wrote: >> Hi Kieran, >> >> Thank you for the patch. >> >> On Tuesday, 13 February 2018 00:25:27 EET Kieran Bingham wrote: >>> From: Kieran Bingham >>> >>> The FCPVD handles the interface

[PATCH 4.15 107/202] ahci: Add Intel Cannon Lake PCH-H PCI ID

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Mika Westerberg commit f919dde0772a894c693a1eeabc77df69d6a9b937 upstream. Add Intel Cannon Lake PCH-H PCI ID to the list of supported controllers. Signed-off-by: Mika Westerberg Signed-off-b

Re: Handling active DMA during a VFIO application crash

2018-02-15 Thread Alex Williamson
On Thu, 15 Feb 2018 16:34:06 +0530 Linu Cherian wrote: > Hi, > > Was exploring the implications of an application crash while DMA > is active from a vfio PCI device; the DMA being configured and > started by the application using vfio APIs. > > The expectation is that, DMA is s

[PATCH 0/7] sched/fair: Migrate 'misfit' tasks on asymmetric capacity systems

2018-02-15 Thread Morten Rasmussen
On asymmetric cpu capacity systems (e.g. Arm big.LITTLE) it is crucial for performance that cpu intensive tasks are aggressively migrated to high capacity cpus as soon as those become available. The capacity awareness tweaks already in the wake-up path can't handle this as such tasks might run or b

[PATCH 5/7] sched/fair: Kick nohz balance if rq->misfit_task

2018-02-15 Thread Morten Rasmussen
From: Valentin Schneider There already are a few conditions in nohz_kick_needed() to ensure a nohz kick is triggered, but they are not enough for some misfit task scenarios. Excluding asym packing, those are: * rq->nr_running >=2: Not relevant here because we are running a misfit task, it needs

[PATCH 2/7] sched/fair: Add group_misfit_task load-balance type

2018-02-15 Thread Morten Rasmussen
To maximize throughput in systems with asymmetric cpu capacities (e.g. ARM big.LITTLE) load-balancing has to consider task and cpu utilization as well as per-cpu compute capacity when load-balancing in addition to the current average load based load-balancing policy. Tasks with high utilization tha

[PATCH 4/7] sched/fair: Avoid unnecessary balancing of asymmetric capacity groups

2018-02-15 Thread Morten Rasmussen
On systems with asymmetric cpu capacities, a skewed load distribution might yield better throughput than balancing load per group capacity. For example, preferring high capacity cpus for compute intensive tasks leaving low capacity cpus idle rather than balancing the number of idle cpus across diff

[PATCH 6/7] sched: Rename root_domain->overload to should_idle_balance

2018-02-15 Thread Morten Rasmussen
From: Valentin Schneider The name "overload" is not very explicit, especially since it doesn't use any concept of "load" coming from load-tracking signals. For now it simply tracks if any of the CPUs in root_domain has more than one runnable task, and is then used to decide whether idle balance s

[PATCH V2] posix-timers: Protect posix clock array access against speculation

2018-02-15 Thread Thomas Gleixner
The clockid argument of clockid_to_kclock() comes straight from user space via various syscalls and is used as index into the posix_clocks array. Protect it against spectre v1 array out of bounds speculation. Remove the redundant check for !posix_clock[id] as this is another source for speculation

[PATCH 7/7] sched/fair: Set sd->should_idle_balance when misfit

2018-02-15 Thread Morten Rasmussen
From: Valentin Schneider Idle balance is a great opportunity to pull a misfit task. However, there are scenarios where misfit tasks are present but idle balance is prevented by the should_idle_balance flag. A good example of this is a workload of n identical tasks. Let's suppose we have a 2+2 Ar

Re: [PATCH 2/2] mm: Add kvmalloc_ab_c and kvzalloc_struct

2018-02-15 Thread Matthew Wilcox
On Thu, Feb 15, 2018 at 09:55:11AM -0600, Christopher Lameter wrote: > On Wed, 14 Feb 2018, Matthew Wilcox wrote: > > > > Uppercase like the similar KMEM_CACHE related macros in > > > include/linux/slab.h?> > > > > Do you think that would look better in the users? Compare: > > Does looking matte

[PATCH 3/7] sched/fair: Consider misfit tasks when load-balancing

2018-02-15 Thread Morten Rasmussen
On asymmetric cpu capacity systems load intensive tasks can end up on cpus that don't suit their compute demand. In this scenarios 'misfit' tasks should be migrated to cpus with higher compute capacity to ensure better throughput. group_misfit_task indicates this scenario, but tweaks to the load-b

[PATCH 1/7] sched: Add static_key for asymmetric cpu capacity optimizations

2018-02-15 Thread Morten Rasmussen
The existing asymmetric cpu capacity code should cause minimal overhead for others. Putting it behind a static_key, it has been done for SMT optimizations, would make it easier to extend and improve without causing harm to others moving forward. cc: Ingo Molnar cc: Peter Zijlstra Signed-off-by:

[PATCH 4.15 105/202] ahci: Annotate PCI ids for mobile Intel chipsets as such

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Hans de Goede commit ca1b4974bd237f2373b0e980b11957aac3499b56 upstream. Intel uses different SATA PCI ids for the Desktop and Mobile SKUs of their chipsets. For older models the comment descri

[PATCH 4.15 106/202] ahci: Add PCI ids for Intel Bay Trail, Cherry Trail and Apollo Lake AHCI

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Hans de Goede commit 998008b779e424bd7513c434d0ab9c1268459009 upstream. Add PCI ids for Intel Bay Trail, Cherry Trail and Apollo Lake AHCI SATA controllers. This commit is a preparation patch

Re: [PATCH] crypto: rsa-pkcs1pad: Replace GFP_ATOMIC with GFP_KERNEL in pkcs1pad_encrypt_sign_complete

2018-02-15 Thread Herbert Xu
On Thu, Jan 25, 2018 at 05:57:54PM +0800, Jia-Ju Bai wrote: > After checking all possible call chains to kzalloc here, > my tool finds that this kzalloc is never called in atomic context. > Thus GFP_ATOMIC is not necessary, and it can be replaced with GFP_KERNEL. > > This is found by a static anal

Re: [PATCH] crypto: crypto_user: Replace GFP_ATOMIC with GFP_KERNEL in crypto_report

2018-02-15 Thread Herbert Xu
On Thu, Jan 25, 2018 at 06:06:02PM +0800, Jia-Ju Bai wrote: > After checking all possible call chains to crypto_report here, > my tool finds that crypto_report is never called in atomic context. > And crypto_report calls crypto_alg_match which calls down_read, > thus it proves again that crypto_re

[PATCH 4.15 086/202] [Variant 2/Spectre-v2] arm64: Add ARM_SMCCC_ARCH_WORKAROUND_1 BP hardening support

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier Commit b092201e0020 upstream. Add the detection and runtime code for ARM_SMCCC_ARCH_WORKAROUND_1. It is lovely. Really. Tested-by: Ard Biesheuvel Signed-off-by: Marc Zyngier S

[PATCH 4.15 104/202] kernfs: fix regression in kernfs_fop_write caused by wrong type

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Ivan Vecera commit ba87977a49913129962af8ac35b0e13e0fa4382d upstream. Commit b7ce40cff0b9 ("kernfs: cache atomic_write_len in kernfs_open_file") changes type of local variable 'len' from ssize

[PATCH 4.15 102/202] NFS: Fix a race between mmap() and O_DIRECT

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Trond Myklebust commit e231c6879cfd44e4fffd384bb6dd7d313249a523 upstream. When locking the file in order to do O_DIRECT on it, we must unmap any mmapped ranges on the pagecache so that we can

Re: [PATCH] Drivers/mfd: Remove Non-standard Case Statements

2018-02-15 Thread Richard Fitzgerald
On 15/02/18 16:04, Progyan Bhattacharya wrote: Remove Range Expressions from Case Statements and replace them with equivalent If-Else ladder. Comments are kept as is for understanding. Why? Your commit message should at least say why you are making this change. (It also should be wrapped to

[PATCH 4.15 099/202] NFS: Fix nfsstat breakage due to LOOKUPP

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Trond Myklebust commit 8634ef5e05311f32d7f2aee06f6b27a8834a3bd6 upstream. The LOOKUPP operation was inserted into the nfs4_procedures array rather than being appended, which put /proc/net/rpc/

[PATCH 4.15 100/202] NFS: commit direct writes even if they fail partially

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: J. Bruce Fields commit 1b8d97b0a837beaf48a8449955b52c650a7114b4 upstream. If some of the WRITE calls making up an O_DIRECT write syscall fail, we neglect to commit, even if some of the WRITEs

[PATCH 4.15 096/202] nfs/pnfs: fix nfs_direct_req ref leak when i/o falls back to the mds

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Scott Mayhew commit ba4a76f703ab7eb72941fdaac848502073d6e9ee upstream. Currently when falling back to doing I/O through the MDS (via pnfs_{read|write}_through_mds), the client frees the nfs_pg

[PATCH 4.15 095/202] ubifs: free the encrypted symlink target

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Eric Biggers commit 6b46d444146eb8d0b99562795cea8086639d7282 upstream. ubifs_symlink() forgot to free the kmalloc()'ed buffer holding the encrypted symlink target, creating a memory leak. Fix

Re: [PATCH v3 0/5] crypto: ahash.c: Require export/import in ahash

2018-02-15 Thread Marek Vasut
On 02/15/2018 04:41 PM, Herbert Xu wrote: > On Thu, Jan 18, 2018 at 07:33:59PM +0100, Kamil Konieczny wrote: >> First four patches add empty hash export and import functions to each driver, >> with the same behaviour as in crypto framework. The last one drops them from >> crypto framework. Last one

Your long awaited part payment of $2.5.000.00Usd

2018-02-15 Thread UNITED NATIONS
Attention: Beneficiary, Your long awaited part payment of $2.5.000.00Usd (TWO MILLION FIVE Hundred Thousand United State Dollars) is ready for immediate release to you, and it was electronically credited into an ATM Visa Card for easy delivery. Your new Payment Reference No.- 6363836, Password N

[PATCH 4.15 085/202] [Variant 2/Spectre-v2] arm/arm64: smccc: Implement SMCCC v1.1 inline primitive

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier Commit f2d3b2e8759a upstream. One of the major improvement of SMCCC v1.1 is that it only clobbers the first 4 registers, both on 32 and 64bit. This means that it becomes very eas

[PATCH 4.15 045/202] [Variant 3/Meltdown] arm64: Force KPTI to be disabled on Cavium ThunderX

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier Commit 6dc52b15c4a4 upstream. Cavium ThunderX's erratum 27456 results in a corruption of icache entries that are loaded from memory that is mapped as non-global (i.e. ASID-tagged

[PATCH 4.15 053/202] [Variant 1/Spectre-v1] arm64: entry: Ensure branch through syscall table is bounded under speculation

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Will Deacon Commit 6314d90e6493 upstream. In a similar manner to array_index_mask_nospec, this patch introduces an assembly macro (mask_nospec64) which can be used to bound a value under spec

[PATCH 4.15 054/202] [Variant 1/Spectre-v1] arm64: uaccess: Prevent speculative use of the current addr_limit

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Will Deacon Commit c2f0ad4fc089 upstream. A mispredicted conditional call to set_fs could result in the wrong addr_limit being forwarded under speculation to a subsequent access_ok check, pot

[PATCH 4.15 052/202] [Variant 1/Spectre-v1] arm64: Use pointer masking to limit uaccess speculation

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Robin Murphy Commit 4d8efc2d5ee4 upstream. Similarly to x86, mitigate speculation past an access_ok() check by masking the pointer against the address limit before use. Even if we don't expe

Re: [PATCH v3 1/5] arm64: dts: renesas: r8a77995: add FCPV nodes

2018-02-15 Thread Simon Horman
On Wed, Feb 14, 2018 at 09:55:04AM +, Kieran Bingham wrote: > From: Kieran Bingham > > The FCPVB handles the interface between the VSPB and memory, while the > FCPVD handles the interface between the VSPD and memory. > > Signed-off-by: Kieran Bingham > Reviewed-by: Laurent Pinchart Thanks

[PATCH 4.15 050/202] [Variant 1/Spectre-v1] arm64: Implement array_index_mask_nospec()

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Robin Murphy Commit 022620eed3d0 upstream. Provide an optimised, assembly implementation of array_index_mask_nospec() for arm64 so that the compiler is not in a position to transform the code

[PATCH 4.15 049/202] [Variant 1/Spectre-v1] arm64: barrier: Add CSDB macros to control data-value prediction

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Will Deacon Commit 669474e772b9 upstream. For CPUs capable of data value prediction, CSDB waits for any outstanding predictions to architecturally resolve before allowing speculative executio

[PATCH 4.15 082/202] [Variant 2/Spectre-v2] firmware/psci: Expose PSCI conduit

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier Commit 09a8d6d48499 upstream. In order to call into the firmware to apply workarounds, it is useful to find out whether we're using HVC or SMC. Let's expose this through the psci

Re: [PATCH v3 0/5] crypto: ahash.c: Require export/import in ahash

2018-02-15 Thread Herbert Xu
On Thu, Jan 18, 2018 at 07:33:59PM +0100, Kamil Konieczny wrote: > First four patches add empty hash export and import functions to each driver, > with the same behaviour as in crypto framework. The last one drops them from > crypto framework. Last one for ahash.c depends on all previous. > > Chan

[PATCH 4.15 080/202] [Variant 2/Spectre-v2] arm64: KVM: Report SMCCC_ARCH_WORKAROUND_1 BP hardening support

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier Commit 6167ec5c9145 upstream. A new feature of SMCCC 1.1 is that it offers firmware-based CPU workarounds. In particular, SMCCC_ARCH_WORKAROUND_1 provides BP hardening for CVE-20

[PATCH 4.15 078/202] [Variant 2/Spectre-v2] arm64: KVM: Make PSCI_VERSION a fast path

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier Commit 90348689d500 upstream. For those CPUs that require PSCI to perform a BP invalidation, going all the way to the PSCI code for not much is a waste of precious cycles. Let's

Re: [PATCH v2 0/7] crypto: ccree: Introduce Arm TrustZone CryptoCell

2018-02-15 Thread Herbert Xu
On Mon, Jan 22, 2018 at 09:26:58AM +, Gilad Ben-Yossef wrote: > Arm TrustZone CryptoCell is a security hardware IP that > includes support for hardware based hash, digest, cipher > and AEAD operations. This driver provides support for > these as part of the Linux Crypto sub-system. > > The dri

[PATCH 4.15 075/202] [Variant 2/Spectre-v2] arm/arm64: KVM: Add smccc accessors to PSCI code

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier Commit 84684fecd7ea upstream. Instead of open coding the accesses to the various registers, let's add explicit SMCCC accessors. Reviewed-by: Christoffer Dall Tested-by: Ard Bie

[PATCH 4.15 077/202] [Variant 2/Spectre-v2] arm/arm64: KVM: Advertise SMCCC v1.1

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier Commit 09e6be12effd upstream. The new SMC Calling Convention (v1.1) allows for a reduced overhead when calling into the firmware, and provides a new feature discovery mechanism.

[PATCH 4.15 074/202] [Variant 2/Spectre-v2] arm/arm64: KVM: Add PSCI_VERSION helper

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier Commit d0a144f12a7c upstream. As we're about to trigger a PSCI version explosion, it doesn't hurt to introduce a PSCI_VERSION helper that is going to be used everywhere. Reviewe

Re: [PATCH v3 2/5] arm64: dts: renesas: r8a77995: add VSP instances

2018-02-15 Thread Simon Horman
On Wed, Feb 14, 2018 at 09:55:05AM +, Kieran Bingham wrote: > From: Kieran Bingham > > The r8a77995 has a VSPBS to support image processing such as blending of > two input images, and has two VSPDs to handle display pipelines with a > DU. > > Signed-off-by: Kieran Bingham > Reviewed-by: Lau

[PATCH 4.15 071/202] [Variant 2/Spectre-v2] arm64: Branch predictor hardening for Cavium ThunderX2

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Jayachandran C Commit f3d795d9b360 upstream. Use PSCI based mitigation for speculative execution attacks targeting the branch predictor. We use the same mechanism as the one used for Cortex-A

[PATCH 1/3] ipc/shm: introduce shmctl(SHM_STAT_ANY)

2018-02-15 Thread Davidlohr Bueso
There is a permission discrepancy when consulting shm ipc object metadata between /proc/sysvipc/shm (0444) and the SHM_STAT shmctl command. The later does permission checks for the object vs S_IRUGO. As such there can be cases where EACCESS is returned via syscall but the info is displayed anyways

[PATCH -next v2 0/3] sysvipc: introduce STAT_ANY commands

2018-02-15 Thread Davidlohr Bueso
Changes from v1 (https://lwn.net/Articles/747225/): - Renamed cmds to STAT_ANY, instead of STAT_ALL (per Eric). - Added Robert's reported-by tag. - Added changes for smack lsm. Hi, The following patches adds the discussed[1] new command for shm as well as for sems and msq as they are subject to t

[PATCH 3/3] ipc/msg: introduce msgctl(MSG_STAT_ANY)

2018-02-15 Thread Davidlohr Bueso
There is a permission discrepancy when consulting msq ipc object metadata between /proc/sysvipc/msg (0444) and the MSG_STAT shmctl command. The later does permission checks for the object vs S_IRUGO. As such there can be cases where EACCESS is returned via syscall but the info is displayed anyways

Re: [PATCH] drm/i915/selftests: fix inconsistent IS_ERR and PTR_ERR

2018-02-15 Thread Chris Wilson
Quoting Gustavo A. R. Silva (2018-02-15 16:09:09) > > > On 02/15/2018 03:13 AM, Jani Nikula wrote: > > On Wed, 14 Feb 2018, "Gustavo A. R. Silva" wrote: > >> Fix inconsistent IS_ERR and PTR_ERR in shrink_boom. > >> The proper pointer to use is _explode_ instead of _purge_. > >> > >> This issue w

[PATCH 2/3] ipc/sem: introduce semctl(SEM_STAT_ANY)

2018-02-15 Thread Davidlohr Bueso
There is a permission discrepancy when consulting shm ipc object metadata between /proc/sysvipc/sem (0444) and the SEM_STAT semctl command. The later does permission checks for the object vs S_IRUGO. As such there can be cases where EACCESS is returned via syscall but the info is displayed anyways

[PATCH 4.15 067/202] [Variant 2/Spectre-v2] arm64: entry: Apply BP hardening for suspicious interrupts from EL0

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Will Deacon Commit 30d88c0e3ace upstream. It is possible to take an IRQ from EL0 following a branch to a kernel address in such a way that the IRQ is prioritised over the instruction abort. W

[PATCH 4.15 066/202] [Variant 2/Spectre-v2] arm64: entry: Apply BP hardening for high-priority synchronous exceptions

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Will Deacon Commit 5dfc6ed27710 upstream. Software-step and PC alignment fault exceptions have higher priority than instruction abort exceptions, so apply the BP hardening hooks there too if

[PATCH RFC v2 0/6] x86: Disabling PTI in compatibility mode

2018-02-15 Thread Nadav Amit
Compatibility mode should be safe of Meltdown, since the pointers are only 32-bit long. This can allow us to disable PTI selectively as long as x86-32 processes are running and to enable global pages throughout this time. These patches may also be a basis for later disabling PTI selectively for "t

[PATCH 4.15 065/202] [Variant 2/Spectre-v2] arm64: KVM: Use per-CPU vector when BP hardening is enabled

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier Commit 6840bdd73d07 upstream. Now that we have per-CPU vectors, let's plug then in the KVM/arm64 code. Signed-off-by: Marc Zyngier Signed-off-by: Will Deacon Signed-off-by: Ca

Re: [RFC 1/2] sched: reduce migration cost between faster caches for idle_balance

2018-02-15 Thread Steven Sistare
On 2/10/2018 1:37 AM, Mike Galbraith wrote: > On Fri, 2018-02-09 at 11:08 -0500, Steven Sistare wrote: @@ -8804,7 +8803,8 @@ static int idle_balance(struct rq *this_rq, struct rq_flags *rf) if (!(sd->flags & SD_LOAD_BALANCE)) continue;

[PATCH RFC v2 1/6] x86: Skip PTI when disable indication is set

2018-02-15 Thread Nadav Amit
If PTI is disabled, we do not want to switch page-tables. On entry to the kernel, this is done based on CR3 value. On return, do it according to per core indication. To be on the safe side, avoid speculative skipping of page-tables switching when returning the userspace. This can be avoided if the

[PATCH RFC v2 5/6] x86: Use global pages when PTI is disabled

2018-02-15 Thread Nadav Amit
As long as PTI is disabled, it is possible to use global pages, as long as we remove them once PTI is enabled again. To do so, return the global bit to __supported_pte_mask and disable global pages using CR4. Signed-off-by: Nadav Amit --- arch/x86/include/asm/tlbflush.h | 6 ++ arch/x86/mm/

[PATCH RFC v2 6/6] selftest: x86: test using CS64 on compatibility-mode

2018-02-15 Thread Nadav Amit
As we mask the 64-bit code segment in compatibility-mode, and since applications, most notably CRIU, might still use it, add a test to ensure it does not break. Signed-off-by: Nadav Amit --- tools/testing/selftests/x86/ldt_gdt.c | 41 +++ 1 file changed, 41 insert

[PATCH RFC v2 3/6] x86: Switching page-table isolation

2018-02-15 Thread Nadav Amit
On context switch, switch the page-table isolation according to the new task. Accordingly, restore or remove CS64. The different types of disabling are kept as a bitmap in order to quickly check whether a certain type of disabling was switched, although it is assumed only a single type is set at a

[PATCH RFC v2 2/6] x86: Save pti_disable for each mm_context

2018-02-15 Thread Nadav Amit
Save for each mm->context whether page-table isolation should be disabled. In order not to make intrusive changes, the information is saved in the PGD page metadata. Signed-off-by: Nadav Amit --- arch/x86/include/asm/mmu.h | 3 +++ arch/x86/include/asm/pti.h | 9 + arch/x86/mm/pgtable.c

[PATCH RFC v2 4/6] x86: Disable PTI on compatibility mode

2018-02-15 Thread Nadav Amit
Based on the understanding that there should be no way for userspace to address the kernel-space from compatibility mode, disable it while running in compatibility mode as long as the 64-bit code segment of the user is not used. Reenabling PTI is performed by restoring NX-bits to the userspace map

Re: [PATCH v7 0/5] Add Intel IOMMU debugfs support

2018-02-15 Thread Jacob Pan
On Thu, 15 Feb 2018 10:53:38 +0100 Joerg Roedel wrote: > On Tue, Feb 13, 2018 at 02:53:32PM -0800, Jacob Pan wrote: > > We did start out with /dev/mem but run into CONFIG_STRICT_DEVMEM > > requirement which is turned on by default. > > libpci is only limited to PCI config space access, right? >

[PATCH 4.15 064/202] [Variant 2/Spectre-v2] arm64: Move BP hardening to check_and_switch_context

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier Commit a8e4c0a919ae upstream. We call arm64_apply_bp_hardening() from post_ttbr_update_workaround, which has the unexpected consequence of being triggered on every exception retu

Re: [PATCH 2/4] arm64: dts: renesas: r8a77995: add FCPVD nodes

2018-02-15 Thread Simon Horman
On Thu, Feb 15, 2018 at 04:20:42PM +, Kieran Bingham wrote: > Hi Simon, > > On 15/02/18 16:14, Simon Horman wrote: > > On Tue, Feb 13, 2018 at 02:32:22PM +0200, Laurent Pinchart wrote: > >> Hi Kieran, > >> > >> Thank you for the patch. > >> > >> On Tuesday, 13 February 2018 00:25:27 EET Kieran

[PATCH 4.15 062/202] [Variant 2/Spectre-v2] arm64: Move post_ttbr_update_workaround to C code

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Marc Zyngier Commit 95e3de3590e3 upstream. We will soon need to invoke a CPU-specific function pointer after changing page tables, so move post_ttbr_update_workaround out into C code to make

Re: [PATCH 1/3] percpu: match chunk allocator declarations with definitions

2018-02-15 Thread Christopher Lameter
On Thu, 15 Feb 2018, Dennis Zhou wrote: > At some point the function declaration parameters got out of sync with > the function definitions in percpu-vm.c and percpu-km.c. This patch > makes them match again. Acked-by: Christoph Lameter

[PATCH 4.15 047/202] [Variant 3/Meltdown] arm64: idmap: Use "awx" flags for .idmap.text .pushsection directives

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Will Deacon Commit 439e70e27a51 upstream. The identity map is mapped as both writeable and executable by the SWAPPER_MM_MMUFLAGS and this is relied upon by the kpti code to manage a synchroni

[PATCH v12 0/8] TDA1997x HDMI video reciver

2018-02-15 Thread Tim Harvey
This is a v4l2 subdev driver supporting the TDA1997x HDMI video receiver. I've tested this on a Gateworks GW54xx/GW551x with an IMX6Q/IMX6DL which uses the TDA19971 with 16bits connected to the IMX6 CSI and single-lane I2S audio providing 2-channel audio. For this configuration I've tested both 1

[PATCH 4.15 063/202] [Variant 2/Spectre-v2] arm64: Add skeleton to harden the branch predictor against aliasing attacks

2018-02-15 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Will Deacon Commit 0f15adbb2861 upstream. Aliasing attacks against CPU branch predictors can allow an attacker to redirect speculative control flow on some CPUs and potentially divulge inform

[PATCH v12 4/8] MAINTAINERS: add entry for NXP TDA1997x driver

2018-02-15 Thread Tim Harvey
Signed-off-by: Tim Harvey --- MAINTAINERS | 8 1 file changed, 8 insertions(+) diff --git a/MAINTAINERS b/MAINTAINERS index 845fc25..439b500 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -13262,6 +13262,14 @@ T: git git://linuxtv.org/mkrufky/tuners.git S: Maintained F: dri

[PATCH v12 3/8] media: add digital video decoder entity functions

2018-02-15 Thread Tim Harvey
Add a new media entity function definition for digital TV decoders: MEDIA_ENT_F_DTV_DECODER Signed-off-by: Tim Harvey --- Documentation/media/uapi/mediactl/media-types.rst | 11 +++ include/uapi/linux/media.h| 5 + 2 files changed, 16 insertions(+) diff --gi

<    2   3   4   5   6   7   8   9   10   11   >