On 2020-05-20 12:51, Richard Guy Briggs wrote:
> Some table unregister actions seem to be initiated by the kernel to
> garbage collect unused tables that are not initiated by any userspace
> actions. It was found to be necessary to add the subject credentials to
> cover this case to reveal the sou
Hi Pedro,
On 11/11/2019 7:54 AM, Pedro Sousa wrote:
Hi Asutosh,
Please check comments.
Sorry for missing out on this and thanks for your review.
-Original Message-
From: Asutosh Das
Sent: Wednesday, October 23, 2019 5:49 PM
To: c...@codeaurora.org; rna...@codeaurora.org; vinholika.
On Wed, 2020-05-20 at 18:33 +0200, Vitaly Kuznetsov wrote:
> Maxim Levitsky writes:
>
> > This msr is only available when the host supports WAITPKG feature.
> >
> > This breaks a nested guest, if the L1 hypervisor is set to ignore
> > unknown msrs, because the only other safety check that the
>
On Wed 20-05-20 17:31:42, Chris Down wrote:
> Reclaim retries have been set to 5 since the beginning of time in
> 66e1707bc346 ("Memory controller: add per cgroup LRU and reclaim").
> However, we now have a generally agreed-upon standard for page reclaim:
> MAX_RECLAIM_RETRIES (currently 16), added
On 20/05/20 18:50, Vitaly Kuznetsov wrote:
> Reviewed-by: Vitaly Kuznetsov
>
This was sent by mistake, but thanks for the review anyway!
Paolo
Hi Dinghao,
On Wed, May 20, 2020 at 6:35 AM Dinghao Liu wrote:
>
> pm_runtime_get_sync() increments the runtime PM usage counter even
> the call returns an error code. Thus a pairing decrement is needed
> on the error handling path to keep the counter balanced.
This is a very surprising behavior
On Wed, May 20, 2020 at 06:49:25PM +0200, Juri Lelli wrote:
> On 20/05/20 18:24, Frederic Weisbecker wrote:
>
> Hummm, so I enabled 'timer:*', anything else you think I should be
> looking at?
Are you sure you also enabled timer_expire_entry?
Because:
>
> ...
> ksoftirqd/13-117 [013] 148.26
s/seq_buf: Export seq_buf_printf() to external modules/
seq_buf: export seq_buf_printf/
I'm announcing the release of the 4.4.224 kernel.
All users of the 4.4 kernel series must upgrade.
The updated 4.4.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
linux-4.4.y
and can be browsed at the normal kernel.org git web browser:
I'm announcing the release of the 4.14.181 kernel.
All users of the 4.14 kernel series must upgrade.
The updated 4.14.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
linux-4.14.y
and can be browsed at the normal kernel.org git web browser
On Mon, May 18, 2020 at 09:37:15AM +0100, Will Deacon wrote:
> On Sat, May 16, 2020 at 05:07:50PM -0700, Guenter Roeck wrote:
> > On Sat, May 16, 2020 at 05:00:50PM -0700, Guenter Roeck wrote:
> > > On Mon, May 11, 2020 at 09:41:36PM +0100, Will Deacon wrote:
> > > > Now that the page table allocat
diff --git a/Makefile b/Makefile
index 525565f44b17..12bf05880d2d 100644
--- a/Makefile
+++ b/Makefile
@@ -1,7 +1,7 @@
# SPDX-License-Identifier: GPL-2.0
VERSION = 4
PATCHLEVEL = 14
-SUBLEVEL = 180
+SUBLEVEL = 181
EXTRAVERSION =
NAME = Petit Gorille
@@ -656,20 +656,14 @@ KBUILD_CFLAGS +=
diff --git a/Makefile b/Makefile
index 6b88acb0b9b1..f381af71fa32 100644
--- a/Makefile
+++ b/Makefile
@@ -1,6 +1,6 @@
VERSION = 4
PATCHLEVEL = 4
-SUBLEVEL = 223
+SUBLEVEL = 224
EXTRAVERSION =
NAME = Blurry Fish Butt
@@ -631,7 +631,6 @@ ARCH_CFLAGS :=
include arch/$(SRCARCH)/Makefile
KBUI
I'm announcing the release of the 4.9.224 kernel.
All users of the 4.9 kernel series must upgrade.
The updated 4.9.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
linux-4.9.y
and can be browsed at the normal kernel.org git web browser:
I'm announcing the release of the 4.19.124 kernel.
All users of the 4.19 kernel series must upgrade.
The updated 4.19.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
linux-4.19.y
and can be browsed at the normal kernel.org git web browser
diff --git a/Makefile b/Makefile
index 2a923301987e..3e58c142f92f 100644
--- a/Makefile
+++ b/Makefile
@@ -1,6 +1,6 @@
VERSION = 4
PATCHLEVEL = 9
-SUBLEVEL = 223
+SUBLEVEL = 224
EXTRAVERSION =
NAME = Roaring Lionus
@@ -658,20 +658,14 @@ KBUILD_CFLAGS += $(call cc-option,-fdata-sections,)
diff --git a/Makefile b/Makefile
index 68fa15edd662..292c92c8369d 100644
--- a/Makefile
+++ b/Makefile
@@ -1,7 +1,7 @@
# SPDX-License-Identifier: GPL-2.0
VERSION = 4
PATCHLEVEL = 19
-SUBLEVEL = 123
+SUBLEVEL = 124
EXTRAVERSION =
NAME = "People's Front"
@@ -657,20 +657,14 @@ KBUILD_CFLAGS
I'm announcing the release of the 5.4.42 kernel.
All users of the 5.4 kernel series must upgrade.
The updated 5.4.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
linux-5.4.y
and can be browsed at the normal kernel.org git web browser:
On Wed 20-05-20 12:51:31, Johannes Weiner wrote:
> On Wed, May 20, 2020 at 06:07:56PM +0200, Michal Hocko wrote:
> > On Wed 20-05-20 15:37:12, Chris Down wrote:
> > > In Facebook production, we've seen cases where cgroups have been put
> > > into allocator throttling even when they appear to have a
On 5/20/20 1:28 AM, Yicong Yang wrote:
On 2020/5/7 11:32, sathyanarayanan.kuppusw...@linux.intel.com wrote:
From: Kuppuswamy Sathyanarayanan
If there are non-hotplug capable devices connected to a given
port, then during the fatal error recovery(triggered by DPC or
AER), after calling reset
I'm announcing the release of the 5.6.14 kernel.
All users of the 5.6 kernel series must upgrade.
The updated 5.6.y git tree can be found at:
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
linux-5.6.y
and can be browsed at the normal kernel.org git web browser:
This patch adds the new IORING_CQ_EVENTFD_DISABLED flag. It can be
used to disable/enable notifications from the kernel when a
request is completed and queued to the CQ ring.
We also add two helpers function to check if the notifications are
enabled and to toggle them.
If the kernel doesn't provi
Signed-off-by: Stefano Garzarella
---
man/io_uring_register.2 | 8
1 file changed, 8 insertions(+)
diff --git a/man/io_uring_register.2 b/man/io_uring_register.2
index e64f688..5022c03 100644
--- a/man/io_uring_register.2
+++ b/man/io_uring_register.2
@@ -168,6 +168,14 @@ must contain a
This new test checks if the mechanism to enable/disable notifications
through eventfd when a request is completed works correctly.
Signed-off-by: Stefano Garzarella
---
v1 -> v2:
- renamed io_uring_cq_eventfd_toggle()
---
.gitignore | 1 +
test/Makefile | 6 +-
test/even
On Mon, May 18, 2020 at 08:21:02PM +0800, Zhenyu Ye wrote:
> On 2020/5/14 23:28, Catalin Marinas wrote:
> > On Tue, Apr 14, 2020 at 07:28:35PM +0800, Zhenyu Ye wrote:
> >> + }
> >> + scale++;
> >> + range_size >>= TLB_RANGE_MASK_SHIFT;
> >> + }
> >
> > So, you start fro
io_uring provides the new CQ ring 'flags' field if 'cq_off.flags'
is not zero. In this case we set the 'cq->kflags' pointer, otherwise
it will be NULL.
Signed-off-by: Stefano Garzarella
---
src/include/liburing.h | 1 +
src/include/liburing/io_uring.h | 4 +++-
src/setup.c
> On May 20, 2020, at 5:58 AM, Lorenzo Pieralisi
> wrote:
>
> On Fri, May 15, 2020 at 12:24:46PM -0700, Tuan Phan wrote:
>> An IORT PMCG node can have no ID mapping if its overflow interrupt is
>> wire based therefore the code that parses the PMCG node can not assume
>> the node will always h
This series is based on top of a new IORING_CQ_EVENTFD_DISABLED
flag available in the CQ ring flags.
I added io_uring_cq_eventfd_enabled() to get the status of eventfd
notifications, and io_uring_cq_eventfd_toggle() to disable/enabled
eventfd notifications.
I updated man pages and I added a event
Signed-off-by: Stefano Garzarella
---
man/io_uring_setup.2 | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/man/io_uring_setup.2 b/man/io_uring_setup.2
index d48bb32..c929cb7 100644
--- a/man/io_uring_setup.2
+++ b/man/io_uring_setup.2
@@ -325,7 +325,8 @@ struct io_cqring_off
On Wed, May 20, 2020 at 2:34 PM Walter Wu wrote:
>
> This feature will record the last two call_rcu() call stacks and
> prints up to 2 call_rcu() call stacks in KASAN report.
>
> When call_rcu() is called, we store the call_rcu() call stack into
> slub alloc meta-data, so that the KASAN report can
On Wed, May 20, 2020 at 12:08:10PM -0400, Rich Felker wrote:
> On Wed, May 20, 2020 at 04:41:29PM +0100, Szabolcs Nagy wrote:
> > The 05/19/2020 22:31, Arnd Bergmann wrote:
> > > On Tue, May 19, 2020 at 10:24 PM Adhemerval Zanella
> > > wrote:
> > > > On 19/05/2020 16:54, Arnd Bergmann wrote:
> >
Microchip lan7431 is frequently connected to a phy. However, it
can also be directly connected to a MII remote peer without
any phy in between. For supporting such a phyless hardware setup
in Linux we added the capability to the driver to understand
the fixed-link and the phy-connection-type entrie
Hello Dear,
This is Miss Lisa Tofan, How are you today hope all is well with you,
please I will need your urgent attention
regarding this important discussion kindly contact me back here my
Email: lisatofan...@gmail.com: for more details,
Thanks,
Miss Lisa Tofan
If VPU supports untiled output, it actually supports several different
YUV 4:2:0 layouts, namely NV12, NV21, YUV420 and YVU420.
Add support for all of them.
Signed-off-by: Jernej Skrabec
---
drivers/staging/media/sunxi/cedrus/cedrus_hw.c | 18 +-
.../staging/media/sunxi/cedrus/c
An IORT PMCG node can have no ID mapping if its overflow interrupt is
wire based therefore the code that parses the PMCG node can not assume
the node will always have a single mapping present at index 0.
Fix iort_get_id_mapping_index() by checking for an overflow interrupt
and mapping count.
Fixe
On Wed, May 20, 2020 at 8:17 AM Thomas Gleixner wrote:
>
> Andy Lutomirski writes:
>
> > On Fri, May 15, 2020 at 5:11 PM Thomas Gleixner wrote:
> >
> > I think something's missing here. With this patch applied, don't we
> > get to exc_debug_kernel() -> handle_debug() without doing
> > idtentry_
Hi Abhishek,
> hdev is always allocated and not only when power control is required.
>
> Reported-by: Dan Carpenter
> Signed-off-by: Abhishek Pandit-Subedi
> ---
>
> drivers/bluetooth/hci_qca.c | 3 ++-
> 1 file changed, 2 insertions(+), 1 deletion(-)
patch has been applied to bluetooth-next t
Hi Johan,
On Wed, May 20, 2020 at 09:33:27AM +0200, Johan Jonker wrote:
> A test with the command below gives this error:
>
> arch/arm/boot/dts/rk3188-bqedison2qc.dt.yaml:
> touchscreen@3e: reg:0:0: 56 was expected
>
> The touchscreen chip on 'rk3188-bqedison2qc' and other BQ models
> was shippe
On 5/20/20 11:07 AM, Stefano Garzarella wrote:
> This series is based on top of a new IORING_CQ_EVENTFD_DISABLED
> flag available in the CQ ring flags.
>
> I added io_uring_cq_eventfd_enabled() to get the status of eventfd
> notifications, and io_uring_cq_eventfd_toggle() to disable/enabled
> even
Maxim Levitsky writes:
> On Wed, 2020-05-20 at 18:33 +0200, Vitaly Kuznetsov wrote:
>> Maxim Levitsky writes:
>>
>> > This msr is only available when the host supports WAITPKG feature.
>> >
>> > This breaks a nested guest, if the L1 hypervisor is set to ignore
>> > unknown msrs, because the on
Hi Michael,
On Wed, May 20, 2020 at 04:07:00PM +1000, Michael Ellerman wrote:
> [ + Dmitry & linux-input ]
>
> Nathan Chancellor writes:
> > This causes a build error with CONFIG_WALNUT because kb_cs and kb_data
> > were removed in commit 917f0af9e5a9 ("powerpc: Remove arch/ppc and
> > include/a
Thanks for reviewing this this patch Ira. My responses below:
Ira Weiny writes:
> On Wed, May 20, 2020 at 12:30:56AM +0530, Vaibhav Jain wrote:
>> Implement support for fetching nvdimm health information via
>> H_SCM_HEALTH hcall as documented in Ref[1]. The hcall returns a pair
>> of 64-bit b
On Wed, 20 May 2020 09:10:22 +0300, Matti Vaittinen wrote:
> Add maintainer entries to a few ROHM devices and Linear Ranges
>
> Linear Ranges helpers were refactored out of regulator core to lib so
> that other drivers could utilize them too. (I guess power/supply drivers
> and possibly clk driver
On Wed, 20 May 2020 10:35:16 +0200, Lubomir Rintel wrote:
> If we fail after pm_runtime_enable(), we fail to undo it. Same with
> clk_prepare_enable(). Let's order them after all things that can fail.
Applied to
https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound.git for-next
Thanks
On Wed, May 20, 2020 at 7:02 PM Dmitry Torokhov
wrote:
>
> Hi Dinghao,
>
> On Wed, May 20, 2020 at 6:35 AM Dinghao Liu wrote:
> >
> > pm_runtime_get_sync() increments the runtime PM usage counter even
> > the call returns an error code. Thus a pairing decrement is needed
> > on the error handling
On Mon, May 18, 2020 at 12:09:16PM -0700, Joe Perches wrote:
> On Mon, 2020-05-18 at 14:01 -0500, Gustavo A. R. Silva wrote:
> > The current codebase makes use of one-element arrays in the following
> > form:
> >
> > struct something {
> > int length;
> > u8 data[1];
> > };
> []
> > This i
On Tue, May 19, 2020 at 06:07:14PM -0700, Nick Desaulniers wrote:
> It may be time to consider "promoting" some warnings from W=1 to be on
> by default.
That's the end goal with -Wmissing-prototypes for arch/x86/ at least.
We'll turn that on once all current warnings are fixed and won't allow
any
Andrew/Florian
On 5/20/20 11:43 AM, Andrew Lunn wrote:
I am interested in knowing where that is documented. I want to RTM I
grepped for a few different words but came up empty
Hi Dan
It probably is not well documented, but one example would be
Documentation/devicetree/bindings/net/ethernet-c
Async page faults have to be trapped in the host (L1 in this case),
since the APF reason was passed from L0 to L1 and stored in the L1 APF
data page. This was completely reversed: the page faults were passed
to the guest, a L2 hypervisor.
Cc: sta...@vger.kernel.org
Reviewed-by: Sean Christopherso
This allows exceptions injected by the emulator to be properly delivered
as vmexits. The code also becomes simpler, because we can just let all
L0-intercepted exceptions go through the usual path. In particular, our
emulation of the VMX #DB exit qualification is very much simplified,
because the
All events now inject vmexits before vmentry rather than after vmexit.
Therefore,
exit_required is not set anymore and we can remove it.
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/svm/nested.c | 3 +--
arch/x86/kvm/svm/svm.c| 14 --
arch/x86/kvm/svm/svm.h| 3 ---
3 fil
The L1 flags can be found in the save area of svm->nested.hsave, fish
it from there so that there is one fewer thing to migrate.
Signed-off-by: Paolo Bonzini
---
arch/x86/include/asm/kvm_host.h | 1 -
arch/x86/kvm/svm/nested.c | 5 -
arch/x86/kvm/svm/svm.c | 2 +-
3 files chan
Allow placing the VMCB structs on the stack or in other structs without
wasting too much space. Add BUILD_BUG_ON as a quick safeguard against typos.
Signed-off-by: Paolo Bonzini
---
arch/x86/include/asm/svm.h | 9 -
1 file changed, 8 insertions(+), 1 deletion(-)
diff --git a/arch/x86/i
Use l1_tsc_offset to compute svm->vcpu.arch.tsc_offset and
svm->vmcb->control.tsc_offset, instead of relying on hsave.
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/svm/nested.c | 9 +
1 file changed, 5 insertions(+), 4 deletions(-)
diff --git a/arch/x86/kvm/svm/nested.c b/arch/x86/kvm/
The usual drill at this point, except there is no code to remove because this
case was not handled at all.
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/svm/nested.c | 27 +++
1 file changed, 27 insertions(+)
diff --git a/arch/x86/kvm/svm/nested.c b/arch/x86/kvm/svm/nest
Similar to VMX, the state that is captured through the currently available
IOCTLs is a mix of L1 and L2 state, dependent on whether the L2 guest was
running at the moment when the process was interrupted to save its state.
In particular, the SVM-specific state for nested virtualization includes
th
This allows fetching the registers from the hsave area when setting
up the NPT shadow MMU, and is needed for KVM_SET_NESTED_STATE (which
runs long after the CR0, CR4 and EFER values in vcpu have been switched
to hold L2 guest state).
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/mmu.h|
According to the AMD manual, the effect of turning off EFER.SVME while a
guest is running is undefined. We make it leave guest mode immediately,
similar to the effect of clearing the VMX bit in MSR_IA32_FEAT_CTL.
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/svm/nested.c | 16
This will be used from KVM. Add it to lib/ so that everyone can use it.
Signed-off-by: Paolo Bonzini
---
include/linux/uaccess.h | 1 +
lib/usercopy.c | 63 +
2 files changed, 64 insertions(+)
diff --git a/include/linux/uaccess.h b/include/linu
In preparation for nested SVM save/restore, store all data that matters
from the VMCB control area into svm->nested. It will then become part
of the nested SVM state that is saved by KVM_SET_NESTED_STATE and
restored by KVM_GET_NESTED_STATE, just like the cached vmcs12 for nVMX.
Signed-off-by: Pa
The authoritative state does not come from the VMCB once in guest mode,
but KVM_SET_NESTED_STATE can still perform checks on L1's provided SVM
controls because we get them from userspace.
Therefore, split out a function to do them.
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/svm/nested.c | 23
These fields do not change from VMRUN to VMEXIT; there is no need
to reload them on nested VMEXIT.
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/svm/nested.c | 5 -
1 file changed, 5 deletions(-)
diff --git a/arch/x86/kvm/svm/nested.c b/arch/x86/kvm/svm/nested.c
index bce9adcf..b6a1e1ff
vmx_load_mmu_pgd is delaying the write of GUEST_CR3 to prepare_vmcs02 as
an optimization, but this is only correct before the nested vmentry.
If userspace is modifying CR3 with KVM_SET_SREGS after the VM has
already been put in guest mode, the value of CR3 will not be updated.
Remove the optimizati
Move the kvm_mmu_reset_context calls to nested_svm_init_mmu_context and
nested_svm_uninit_mmu_context, so that the state of the MMU is consistent
with the vcpu->arch.mmu and vcpu->arch.walk_mmu state. Remove an
unnecessary kvm_mmu_load, which can wait until the first vcpu_run.
Signed-off-by: Paol
This will come in handy when we put a struct vmcb_control_area in
svm->nested.
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/svm/nested.c | 10 --
1 file changed, 4 insertions(+), 6 deletions(-)
diff --git a/arch/x86/kvm/svm/nested.c b/arch/x86/kvm/svm/nested.c
index 2aaa539482ae..c7591
The test is similar to the existing one for VMX, but simpler because we
don't have to test shadow VMCS or vmptrld/vmptrst/vmclear.
Signed-off-by: Paolo Bonzini
---
.../testing/selftests/kvm/x86_64/state_test.c | 69 +++
1 file changed, 57 insertions(+), 12 deletions(-)
diff --gi
On Wed, May 20, 2020 at 8:16 AM Andy Lutomirski wrote:
>
> On Wed, May 20, 2020 at 7:13 AM Thomas Gleixner wrote:
> >
> > Andy Lutomirski writes:
> > > On Tue, May 19, 2020 at 11:58 AM Thomas Gleixner
> > > wrote:
> > >> Which brings you into the situation that you call schedule() from the
> >
Split out filling svm->vmcb.save and svm->vmcb.control before VMRUN.
Only the latter will be useful when restoring nested SVM state.
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/svm/nested.c | 52 ++-
1 file changed, 30 insertions(+), 22 deletions(-)
diff --
Unmapping the nested VMCB in enter_svm_guest_mode is a bit of a wart,
since the map is not used elsewhere in the function. There are
just two calls, so move it there.
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/svm/nested.c | 14 ++
arch/x86/kvm/svm/svm.c| 3 ++-
arch/x86/kvm
Extract the code that is needed to implement CLGI and STGI,
so that we can run it from VMRUN and vmexit (and in the future,
KVM_SET_NESTED_STATE). Skip the request for KVM_REQ_EVENT unless needed,
subsuming the evaluate_pending_interrupts optimization that is found
in enter_svm_guest_mode.
Signed
When restoring SVM nested state, the control state cache in svm->nested
will have to be filled, but the save state will not have to be moved
into svm->vmcb. Therefore, pull the code that handles the control area
into a separate function.
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/svm/nested.
Restoring the ASID from the hsave area on VMEXIT is wrong, because its
value depends on the handling of TLB flushes. Just skipping the field in
copy_vmcb_control_area will do.
Cc: sta...@vger.kernel.org
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/svm/nested.c | 2 +-
1 file changed, 1 inserti
Large parts of this series were posted before (patches 1, 3-4-5 and
6-7-8-12-13-14). This is basically what I'd like to get into 5.8 as
far as nested SVM is concerned; the fix for exception vmexits is related
to migration support, because it gets rid of the exit_required flag
and therefore consoli
Now that the int_ctl field is stored in svm->nested.ctl.int_ctl, we can
use it instead of vcpu->arch.hflags to check whether L2 is running
in V_INTR_MASKING mode.
Signed-off-by: Paolo Bonzini
---
arch/x86/include/asm/kvm_host.h | 1 -
arch/x86/kvm/svm/nested.c | 10 +++---
arch/x86/kv
On Wed, May 20, 2020 at 10:54:21AM -0600, David Ahern wrote:
> On 5/20/20 8:58 AM, Christian Brauner wrote:
> > During NorthSec (cf. [1]) a very large number of unprivileged
> > containers and nested containers are run during the competition to
> > provide a safe environment for the various teams d
On Mon, May 18, 2020 at 8:38 PM Brian Gerst wrote:
>
> On Mon, May 18, 2020 at 5:15 PM Nick Desaulniers
> wrote:
> >
> > On Sun, May 17, 2020 at 8:29 AM Brian Gerst wrote:
> > >
> > > The core percpu macros already have a switch on the data size, so the
> > > switch
> > > in the x86 code is red
On 5/20/20 11:24 AM, Christian Brauner wrote:
> On Wed, May 20, 2020 at 10:54:21AM -0600, David Ahern wrote:
>> On 5/20/20 8:58 AM, Christian Brauner wrote:
>>> During NorthSec (cf. [1]) a very large number of unprivileged
>>> containers and nested containers are run during the competition to
>>> p
On 5/20/20 4:20 AM, Miklos Szeredi wrote:
> On Tue, May 19, 2020 at 2:35 AM Mike Kravetz wrote:
>>
>> On 5/18/20 4:41 PM, Colin Walters wrote:
>>>
>>> On Tue, May 12, 2020, at 11:04 AM, Miklos Szeredi wrote:
>>>
> However, in this syzbot test case the 'file' is in an overlayfs filesystem
>
On Wed, May 20, 2020 at 07:24:18PM +0200, Christian Brauner wrote:
> On Wed, May 20, 2020 at 10:54:21AM -0600, David Ahern wrote:
> > On 5/20/20 8:58 AM, Christian Brauner wrote:
> > > During NorthSec (cf. [1]) a very large number of unprivileged
> > > containers and nested containers are run durin
On Wed, May 20, 2020 at 10:13:07AM -0700, Tuan Phan wrote:
> An IORT PMCG node can have no ID mapping if its overflow interrupt is
> wire based therefore the code that parses the PMCG node can not assume
> the node will always have a single mapping present at index 0.
>
> Fix iort_get_id_mapping_i
Greg, Alan,
The other 4 related patches were accepted into usb-next and I just
realized that this one didn't make it. This patch will not fix the
"insmod out of order" issue, but will help our controllers work with
some poorly behaved USB devices when the drivers are builtin.
Thanks
Al
On Wed, M
On Wed, May 20, 2020 at 05:39:33PM +0200, Sebastian Reichel wrote:
> Switch to the "new" I2C probe API.
>
> Signed-off-by: Sebastian Reichel
Applied, thank you.
--
Dmitry
Hi Borislav,
On 5/20/2020 12:11 AM, Borislav Petkov wrote:
> On Tue, May 19, 2020 at 03:13:59PM -0700, Reinette Chatre wrote:
>> I am very sorry. I was hoping that this series could be considered for
>> inclusion into v5.8 and submitted it seven weeks ago because of that.
>> The recent feedback ad
śr., 20 maj 2020 o 16:37 Arnd Bergmann napisał(a):
>
> On Wed, May 20, 2020 at 1:25 PM Bartosz Golaszewski wrote:
> >
> > From: Bartosz Golaszewski
> >
> > This adds the driver for the MediaTek Ethernet MAC used on the MT8* SoC
> > family. For now we only support full-duplex.
> >
> > Signed-off-
Le 20/05/2020 à 19:32, Greg Kurz a écrit :
On Wed, 20 May 2020 18:51:10 +0200
Laurent Dufour wrote:
The commit 8c47b6ff29e3 ("KVM: PPC: Book3S HV: Check caller of H_SVM_*
Hcalls") added checks of secure bit of SRR1 to filter out the Hcall
reserved to the Ultravisor.
However, the Hcall H_SVM_I
On Wed, May 20, 2020 at 08:36:06AM -0700, Andy Lutomirski wrote:
> On Tue, May 19, 2020 at 7:23 PM Paul E. McKenney wrote:
> > On Tue, May 19, 2020 at 05:26:58PM -0700, Andy Lutomirski wrote:
> > > On Tue, May 19, 2020 at 2:20 PM Thomas Gleixner
> > > wrote:
> > > > Andy Lutomirski writes:
> >
On Wed, May 20, 2020 at 05:30:01PM +0200, Andrew Lunn wrote:
> > > I'm not sure if it's a good idea to define two separate callbacks. It
> > > means adding two pointers instead of one (for every instance of the
> > > structure, not only those implementing them), doing two calls, running
> > > the s
On Wed, 2020-05-20 at 19:15 +0200, Vitaly Kuznetsov wrote:
> Maxim Levitsky writes:
>
> > On Wed, 2020-05-20 at 18:33 +0200, Vitaly Kuznetsov wrote:
> > > Maxim Levitsky writes:
> > >
> > > > This msr is only available when the host supports WAITPKG feature.
> > > >
> > > > This breaks a neste
On Wed, May 20, 2020 at 04:47:11PM +0100, Catalin Marinas wrote:
> On Wed, May 20, 2020 at 01:20:13PM +0100, Will Deacon wrote:
> > On Wed, May 20, 2020 at 06:52:54AM +0530, Anshuman Khandual wrote:
> > > There is no way to proceed when requested register could not be searched
> > > in
> > > arm64
Hi Keno,
On Tue, May 19, 2020 at 04:37:34AM -0400, Keno Fischer wrote:
> > Yes, we inherited this from ARM and I think strace relies on it. In
> > hindsight, it is a little odd, although x7 is a parameter register in the
> > PCS and so it won't be live on entry to a system call.
>
> I'm not famil
If you don't Cc me on the whole series I have absolutely no way to
review it. Don't ever do these stupid partial Ccs as they cause nothing
but pain.
Hi Sebastian,
On Wed, May 20, 2020 at 02:06:08PM +0200, Sebastian Andrzej Siewior wrote:
> On 2020-05-20 12:24:07 [+0200], Peter Zijlstra wrote:
> > On Tue, May 19, 2020 at 10:19:07PM +0200, Sebastian Andrzej Siewior wrote:
> >
> > > diff --git a/kernel/rcu/srcutree.c b/kernel/rcu/srcutree.c
> >
The commit 8c47b6ff29e3 ("KVM: PPC: Book3S HV: Check caller of H_SVM_*
Hcalls") added checks of secure bit of SRR1 to filter out the Hcall
reserved to the Ultravisor.
However, the Hcall H_SVM_INIT_ABORT is made by the Ultravisor passing the
context of the VM calling UV_ESM. This allows the Hypervi
On Wed, May 20, 2020 at 06:27:36PM +0100, Lorenzo Pieralisi wrote:
> On Wed, May 20, 2020 at 10:13:07AM -0700, Tuan Phan wrote:
> > An IORT PMCG node can have no ID mapping if its overflow interrupt is
> > wire based therefore the code that parses the PMCG node can not assume
> > the node will alwa
On Mon, May 18, 2020 at 09:35:23AM -0700, Sean V Kelley wrote:
> With these helpers, a device driver can enable/disable access to
> CXL.mem and CXL.cache. Note that the device driver is responsible for
> managing the memory area.
Who is going to call these? Please don't submit new APIs without us
Hi Sebastian,
On Wed, May 20, 2020 at 05:39:34PM +0200, Sebastian Reichel wrote:
>
> data->client = client;
> + data->info = device_get_match_data(&client->dev);
> + if (!data->info) {
> + enum eeti_dev_id eeti_dev_id =
> + i2c_match_id(exc3000_id, c
On 5/20/2020 10:20 AM, Dan Murphy wrote:
> Andrew/Florian
>
> On 5/20/20 11:43 AM, Andrew Lunn wrote:
>>> I am interested in knowing where that is documented. I want to RTM I
>>> grepped for a few different words but came up empty
>> Hi Dan
>>
>> It probably is not well documented, but one exa
On 20-May-20 4:47 PM, Thierry Reding wrote:
On Tue, May 19, 2020 at 10:08:54PM +, Gustavo Pimentel wrote:
On Tue, May 19, 2020 at 15:58:16, Lorenzo Pieralisi
wrote:
On Tue, May 19, 2020 at 07:25:02PM +0530, Vidya Sagar wrote:
On 18-May-20 9:24 PM, Lorenzo Pieralisi wrote:
External
On Wed, May 20, 2020 at 10:38 AM Paul E. McKenney wrote:
>
> On Wed, May 20, 2020 at 08:36:06AM -0700, Andy Lutomirski wrote:
> > On Tue, May 19, 2020 at 7:23 PM Paul E. McKenney wrote:
> > > On Tue, May 19, 2020 at 05:26:58PM -0700, Andy Lutomirski wrote:
> > > > On Tue, May 19, 2020 at 2:20 PM
Hi Sebastian,
On Wed, May 20, 2020 at 05:39:35PM +0200, Sebastian Reichel wrote:
> Expose model and fw_version via sysfs. Also query the model
> in probe to make sure, that the I2C communication with the
> device works before successfully probing the driver.
>
> This is a bit complicated, since E
901 - 1000 of 1630 matches
Mail list logo