remove alloc_vm_area v2

2020-09-24 Thread Christoph Hellwig
Hi Andrew, this series removes alloc_vm_area, which was left over from the big vmalloc interface rework. It is a rather arkane interface, basicaly the equivalent of get_vm_area + actually faulting in all PTEs in the allocated area. It was originally addeds for Xen (which isn't modular to start w

[PATCH 07/11] drm/i915: stop using kmap in i915_gem_object_map

2020-09-24 Thread Christoph Hellwig
kmap for !PageHighmem is just a convoluted way to say page_address, and kunmap is a no-op in that case. Signed-off-by: Christoph Hellwig --- drivers/gpu/drm/i915/gem/i915_gem_pages.c | 7 ++- 1 file changed, 2 insertions(+), 5 deletions(-) diff --git a/drivers/gpu/drm/i915/gem/i915_gem_page

[PATCH 10/11] x86/xen: open code alloc_vm_area in arch_gnttab_valloc

2020-09-24 Thread Christoph Hellwig
Replace the last call to alloc_vm_area with an open coded version using an iterator in struct gnttab_vm_area instead of the triple indirection magic in alloc_vm_area. Signed-off-by: Christoph Hellwig --- arch/x86/xen/grant-table.c | 27 --- 1 file changed, 20 insertions(+

Re: [PATCH v1 0/6] seccomp: Implement constant action bitmaps

2020-09-24 Thread YiFei Zhu
On Thu, Sep 24, 2020 at 8:46 AM Rasmus Villemoes wrote: > But one thing I'm wondering about and I haven't seen addressed anywhere: > Why build the bitmap on the kernel side (with all the complexity of > having to emulate the filter for all syscalls)? Why can't userspace just > hand the kernel "her

Re: [PATCH] MIPS: Loongson2ef: Disable Loongson MMI instructions

2020-09-24 Thread Thomas Bogendoerfer
On Wed, Sep 23, 2020 at 06:33:12PM +0800, Jiaxun Yang wrote: > It was missed when I was forking Loongson2ef from Loongson64 but > should be applied to Loongson2ef as march=loongson2f > will also enable Loongson MMI in GCC-9+. > > Signed-off-by: Jiaxun Yang > Fixes: 71e2f4dd5a65 ("MIPS: Fork loong

[PATCH 04/11] mm: allow a NULL fn callback in apply_to_page_range

2020-09-24 Thread Christoph Hellwig
Besides calling the callback on each page, apply_to_page_range also has the effect of pre-faulting all PTEs for the range. To support callers that only need the pre-faulting, make the callback optional. Based on a patch from Minchan Kim . Signed-off-by: Christoph Hellwig --- mm/memory.c | 16 +

[PATCH 03/11] mm: add a vmap_pfn function

2020-09-24 Thread Christoph Hellwig
Add a proper helper to remap PFNs into kernel virtual space so that drivers don't have to abuse alloc_vm_area and open coded PTE manipulation for it. Signed-off-by: Christoph Hellwig --- include/linux/vmalloc.h | 1 + mm/Kconfig | 3 +++ mm/vmalloc.c| 45 ++

[PATCH 05/11] zsmalloc: switch from alloc_vm_area to get_vm_area

2020-09-24 Thread Christoph Hellwig
Just manually pre-fault the PTEs using apply_to_page_range. Co-developed-by: Minchan Kim Signed-off-by: Christoph Hellwig --- mm/zsmalloc.c | 10 -- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/mm/zsmalloc.c b/mm/zsmalloc.c index c36fdff9a37131..918c7b019b3d78 100644 --

[PATCH 02/11] mm: add a VM_MAP_PUT_PAGES flag for vmap

2020-09-24 Thread Christoph Hellwig
Add a flag so that vmap takes ownership of the passed in page array. When vfree is called on such an allocation it will put one reference on each page, and free the page array itself. Signed-off-by: Christoph Hellwig --- include/linux/vmalloc.h | 1 + mm/vmalloc.c| 9 +++-- 2 fil

Re: [PATCH] MIPS: Add the missing 'CPU_1074K' into __get_cpu_type()

2020-09-24 Thread Thomas Bogendoerfer
On Wed, Sep 23, 2020 at 02:53:12PM +0800, Wei Li wrote: > Commit 442e14a2c55e ("MIPS: Add 1074K CPU support explicitly.") split > 1074K from the 74K as an unique CPU type, while it missed to add the > 'CPU_1074K' in __get_cpu_type(). So let's add it back. > > Fixes: 442e14a2c55e ("MIPS: Add 1074K

Re: [PATCH] MIPS: BCM47XX: Remove the needless check with the 1074K

2020-09-24 Thread Thomas Bogendoerfer
On Wed, Sep 23, 2020 at 02:53:26PM +0800, Wei Li wrote: > As there is no known soc powered by mips 1074K in bcm47xx series, > the check with 1074K is needless. So just remove it. > > Link: https://wireless.wiki.kernel.org/en/users/Drivers/b43/soc > Fixes: 442e14a2c55e ("MIPS: Add 1074K CPU support

[PATCH 08/11] drm/i915: use vmap in i915_gem_object_map

2020-09-24 Thread Christoph Hellwig
i915_gem_object_map implements fairly low-level vmap functionality in a driver. Split it into two helpers, one for remapping kernel memory which can use vmap, and one for I/O memory that uses vmap_pfn. The only practical difference is that alloc_vm_area prefeaults the vmalloc area PTEs, which doe

[PATCH 09/11] xen/xenbus: use apply_to_page_range directly in xenbus_map_ring_pv

2020-09-24 Thread Christoph Hellwig
Replacing alloc_vm_area with get_vm_area_caller + apply_page_range allows to fill put the phys_addr values directly instead of doing another loop over all addresses. Signed-off-by: Christoph Hellwig --- drivers/xen/xenbus/xenbus_client.c | 30 -- 1 file changed, 16 in

[PATCH 11/11] mm: remove alloc_vm_area

2020-09-24 Thread Christoph Hellwig
All users are gone now. Signed-off-by: Christoph Hellwig --- include/linux/vmalloc.h | 5 + mm/nommu.c | 7 -- mm/vmalloc.c| 48 - 3 files changed, 1 insertion(+), 59 deletions(-) diff --git a/include/linux/vmalloc.h b/i

[PATCH 06/11] drm/i915: use vmap in shmem_pin_map

2020-09-24 Thread Christoph Hellwig
shmem_pin_map somewhat awkwardly reimplements vmap using alloc_vm_area and manual pte setup. The only practical difference is that alloc_vm_area prefeaults the vmalloc area PTEs, which doesn't seem to be required here (and could be added to vmap using a flag if actually required). Switch to use v

Re: [PATCH 4.19 66/81] MIPS: Disable Loongson MMI instructions for kernel build

2020-09-24 Thread Thomas Bogendoerfer
On Mon, Sep 07, 2020 at 05:35:26AM +0200, Philippe Mathieu-Daudé wrote: > On Thu, Sep 3, 2020 at 11:28 AM Greg Kroah-Hartman > wrote: > > > > On Wed, Aug 26, 2020 at 02:06:28PM -0700, Guenter Roeck wrote: > > > Hi, > > > > > > On Wed, Oct 16, 2019 at 02:51:17PM -0700, Greg Kroah-Hartman wrote: > >

Re: [PATCH RFC 0/4] mm: place pages to the freelist tail when onling and undoing isolation

2020-09-24 Thread Vlastimil Babka
On 9/23/20 5:26 PM, David Hildenbrand wrote: > On 23.09.20 16:31, Vlastimil Babka wrote: >> On 9/16/20 9:31 PM, David Hildenbrand wrote: >> > > Hi Vlastimil, > >> I see the point, but I don't think the head/tail mechanism is great for >> this. It >> might sort of work, but with other interferin

Re: [patch RFC 00/15] mm/highmem: Provide a preemptible variant of kmap_atomic & friends

2020-09-24 Thread Peter Zijlstra
On Thu, Sep 24, 2020 at 09:51:38AM -0400, Steven Rostedt wrote: > > It turns out, that getting selected for pull-balance is exactly that > > condition, and clearly a migrate_disable() task cannot be pulled, but we > > can use that signal to try and pull away the running task that's in the > > way.

[PATCH 01/11] mm: update the documentation for vfree

2020-09-24 Thread Christoph Hellwig
From: "Matthew Wilcox (Oracle)" * Document that you can call vfree() on an address returned from vmap() * Remove the note about the minimum size -- the minimum size of a vmalloc allocation is one page * Add a Context: section * Fix capitalisation * Reword the prohibition on calling from N

Re: [PATCH v8 1/3] rseq/membarrier: add MEMBARRIER_CMD_PRIVATE_EXPEDITED_RSEQ

2020-09-24 Thread Peter Zijlstra
On Thu, Sep 24, 2020 at 09:51:43AM -0400, Mathieu Desnoyers wrote: > > > - On Sep 23, 2020, at 7:36 PM, Peter Oskolkov p...@google.com wrote: > > > This patchset is based on Google-internal RSEQ > > work done by Paul Turner and Andrew Hunter. > > > > When working with per-CPU RSEQ-based mem

Re: [PATCH v2 1/4] dt-bindings: reserved-memory: Document "active" property

2020-09-24 Thread Thierry Reding
On Thu, Sep 24, 2020 at 04:23:59PM +0300, Dmitry Osipenko wrote: > 04.09.2020 15:59, Thierry Reding пишет: > > From: Thierry Reding > > > > Reserved memory regions can be marked as "active" if hardware is > > expected to access the regions during boot and before the operating > > system can take

Re: [PATCH 1/5] mm: Introduce mm_struct.has_pinned

2020-09-24 Thread Jason Gunthorpe
On Thu, Sep 24, 2020 at 09:44:09AM +0200, Jan Kara wrote: > > After the page is pinned it is prevented from being freed and > > recycled. After GUP has the pin it must check that the PTE still > > points at the same page, otherwise it might have pinned a page that is > > alreay free'd - and that wo

Re: [PATCH v1 0/6] seccomp: Implement constant action bitmaps

2020-09-24 Thread Jann Horn
On Thu, Sep 24, 2020 at 3:40 PM Rasmus Villemoes wrote: > On 24/09/2020 01.29, Kees Cook wrote: > > rfc: > > https://lore.kernel.org/lkml/20200616074934.1600036-1-keesc...@chromium.org/ > > alternative: > > https://lore.kernel.org/containers/cover.1600661418.git.yifei...@illinois.edu/ > > v1: >

Re: [PATCH] KVM: SVM: Add a dedicated INVD intercept routine

2020-09-24 Thread Paolo Bonzini
On 24/09/20 15:58, Vitaly Kuznetsov wrote: > does it sill make sense to intercept INVD when we just skip it? Would it > rather make sense to disable INVD intercept for SEV guests completely? If we don't intercept the processor would really invalidate the cache, that is certainly not what we want.

[PATCH v3] net: dsa: mt7530: Add some return-value checks

2020-09-24 Thread Alex Dewar
In mt7531_cpu_port_config(), if the variable port is neither 5 nor 6, then variable interface will be used uninitialised. Change the function to return -EINVAL in this case. As the return value of mt7531_cpu_port_config() is never checked (even though it returns an int) add a check in the correct

Re: [PATCH v5 1/5] x86/asm: Carve out a generic movdir64b() helper for general usage

2020-09-24 Thread Michael Matz
Hello, even though we hashed it out downthread, let me make some additional remarks: On Thu, 24 Sep 2020, Borislav Petkov wrote: > > /* MOVDIR64B [rdx], rax */ This comment is confusing as it uses Intel syntax for the operand forms, but AT&T order (dest last). > volatile struct { c

Re: commit 37bd22420f85 ("af_key: pfkey_dump needs parameter validation") to stable

2020-09-24 Thread Greg KH
On Thu, Sep 24, 2020 at 06:58:24AM -0700, Mark Salyzyn wrote: > Please consider > > commit 37bd22420f856fcd976989f1d4f1f7ad28e1fcac ("af_key: pfkey_dump needs > parameter validation") > > for merge into all the maintained stable trees. > > Cc: net...@vger.kernel.org > Cc: linux-kernel@vger.kerne

Re: [PATCH 0/3] Prevent out-of-bounds access for built-in font data buffers

2020-09-24 Thread Greg Kroah-Hartman
On Thu, Sep 24, 2020 at 09:38:22AM -0400, Peilin Ye wrote: > Hi all, > > syzbot has reported [1] a global out-of-bounds read issue in > fbcon_get_font(). A malicious user may resize `vc_font.height` to a large > value in vt_ioctl(), causing fbcon_get_font() to overflow our built-in > font data buf

Re: linux-next: manual merge of the nvdimm tree with the vfs tree

2020-09-24 Thread Dan Williams
On Wed, Sep 23, 2020 at 11:45 PM Stephen Rothwell wrote: > > Hi all, > > Today's linux-next merge of the nvdimm tree got a conflict in: > > lib/iov_iter.c > > between commit: > > e33ea6e5ba6a ("x86/uaccess: Use pointer masking to limit uaccess > speculation") > > from the vfs tree and commit:

[PATCH -next] usb: typec: Remove set but not used variable

2020-09-24 Thread Li Heng
Fixes gcc '-Wunused-but-set-variable' warning: drivers/usb/typec/tcpm/tcpm.c:1620:39: warning: ‘tcpm_altmode_ops’ defined but not used [-Wunused-const-variable=] Reported-by: Hulk Robot Signed-off-by: Li Heng --- drivers/usb/typec/tcpm/tcpm.c | 6 -- 1 file changed, 6 deletions(-) diff --

Re: [PATCH] btrfs: Fix potential null pointer deref

2020-09-24 Thread David Sterba
On Mon, Sep 21, 2020 at 08:12:44PM +0100, Alex Dewar wrote: > In btrfs_destroy_inode(), the variable root may be NULL, but the check > for this takes place after its value has already been dereferenced to > access its fs_info member. Move the dereference operation to later in > the function. > > F

[PATCH v2 2/2] locktorture: call percpu_free_rwsem() to do percpu-rwsem cleanup

2020-09-24 Thread Hou Tao
When do percpu-rwsem writer lock torture, the RCU callback rcu_sync_func() may still be pending after locktorture module is removed, and it will lead to the following Oops: BUG: unable to handle page fault for address: c00eb920 #PF: supervisor read access in kernel mode #PF: error_co

Re: [PATCH 1/2] perf stat: Fix segfault when counting armv8_pmu events

2020-09-24 Thread liwei (GF)
Hi Andi, On 2020/9/23 3:50, Andi Kleen wrote: > On Tue, Sep 22, 2020 at 12:23:21PM -0700, Andi Kleen wrote: >>> After debugging, i found the root reason is that the xyarray fd is created >>> by evsel__open_per_thread() ignoring the cpu passed in >>> create_perf_stat_counter(), while the evsel' cpu

Re: Re: [PATCH] [PATCH] ARM64: Setup DMA32 zone size by bootargs

2020-09-24 Thread Phil Chang
Actually, In a embedded system with 3GB memory, the memory bus width is not the same among the 3GB. (The first 2GB is 48-bit wide, and the latter 1GB is 16-bit wide.) For memory throughput reason of hardware IPs, we need allocate memory from the first 2GB for the hardware IPs. And that is why we

Re: [PATCH v13 2/2] Add PWM fan controller driver for LGM SoC

2020-09-24 Thread Uwe Kleine-König
On Thu, Sep 24, 2020 at 04:23:34PM +0300, Andy Shevchenko wrote: > On Thu, Sep 24, 2020 at 08:55:34AM +0200, Uwe Kleine-König wrote: > > On Tue, Sep 15, 2020 at 04:23:37PM +0800, Rahul Tanwar wrote: > > ... > > > > + ret = lgm_clk_enable(dev, pc); > > > + if (ret) { > > > + dev_err(dev, "

Re: [PATCH v2 seccomp 2/6] asm/syscall.h: Add syscall_arches[] array

2020-09-24 Thread YiFei Zhu
On Thu, Sep 24, 2020 at 8:47 AM David Laight wrote: > I doubt the compiler will do what you want. > Looking at it, in most cases there are one or two entries. > I think only MIPS has three. It does ;) GCC 10.2.0: $ objdump -d kernel/seccomp.o | less [...] 1520 <__seccomp_filter>: [..

[PATCH -next] video: Remove set but not used variable

2020-09-24 Thread Li Heng
Fixes gcc '-Wunused-but-set-variable' warning: drivers/video/fbdev/sis/300vtbl.h:1064:28: warning: ‘SiS300_CHTVVCLKSONTSC’ defined but not used [-Wunused-const-variable=] Reported-by: Hulk Robot Signed-off-by: Li Heng --- drivers/video/fbdev/sis/300vtbl.h | 2 -- 1 file changed, 2 deletions(-)

Re: [PATCH v3 16/16] ARM: Remove custom IRQ stat accounting

2020-09-24 Thread Guillaume Tucker
e other platforms in the KernelCI labs appears to be >> affected. > > Actually imx53-qsb is also affected: > https://storage.kernelci.org/next/master/next-20200924/arm/imx_v6_v7_defconfig/gcc-8/lab-pengutronix/baseline-imx53-qsrb.html > > kernelci marks it Boot result: PASS t

[PATCH v2] scripts/gdb: fix list_for_each

2020-09-24 Thread George Prekas
If the list is uninitialized (next pointer is NULL), list_for_each gets stuck in an infinite loop. Print a message and treat list as empty. Signed-off-by: George Prekas ---  scripts/gdb/linux/lists.py | 5 +  1 file changed, 5 insertions(+) diff --git a/scripts/gdb/linux/lists.py b/scripts/g

Re: [PATCH v3 6/6] clk: axi-clkgen: Add support for FPGA info

2020-09-24 Thread Moritz Fischer
On Thu, Sep 24, 2020 at 09:50:12AM +0300, Alexandru Ardelean wrote: > From: Mircea Caprioru > > This patch adds support for vco maximum and minimum ranges in accordance > with fpga speed grade, voltage, device package, technology and family. This > new information is extracted from two new regist

RE: [PATCH v2 seccomp 2/6] asm/syscall.h: Add syscall_arches[] array

2020-09-24 Thread David Laight
From: YiFei Zhu > Sent: 24 September 2020 15:17 > > On Thu, Sep 24, 2020 at 8:47 AM David Laight wrote: > > I doubt the compiler will do what you want. > > Looking at it, in most cases there are one or two entries. > > I think only MIPS has three. > > It does ;) GCC 10.2.0: > > $ objdump -d ker

Re: [PATCH 7/7] perf inject: Remove stale build-id processing

2020-09-24 Thread Namhyung Kim
On Thu, Sep 24, 2020 at 10:34 PM Jiri Olsa wrote: > > On Wed, Sep 23, 2020 at 05:05:37PM +0900, Namhyung Kim wrote: > > I think we don't need to call build_id__mark_dso_hit() in the > > perf_event__repipe_sample() as it's not used by -b option. In case of > > the -b option is used, it uses perf_e

KINDLY REPLY....

2020-09-24 Thread patriciagarrido
I am very happy to contact you for this business transaction.Please kindly get back to me via this email: mrchenhk...@gmail.com for us to achieve success and secure a good future for our families.

Re: [PATCH 2/3] dm: add support for passing through inline crypto support

2020-09-24 Thread Mike Snitzer
On Thu, Sep 24 2020 at 3:38am -0400, Satya Tangirala wrote: > On Wed, Sep 23, 2020 at 09:21:03PM -0400, Mike Snitzer wrote: > > On Wed, Sep 09 2020 at 7:44pm -0400, > > Satya Tangirala wrote: > > > > > From: Eric Biggers > > > > > > Update the device-mapper core to support exposing the inli

Re: [PATCH 0/3] Prevent out-of-bounds access for built-in font data buffers

2020-09-24 Thread Peilin Ye
On Thu, Sep 24, 2020 at 04:09:37PM +0200, Greg Kroah-Hartman wrote: > On Thu, Sep 24, 2020 at 09:38:22AM -0400, Peilin Ye wrote: > > Peilin Ye (3): > > fbdev, newport_con: Move FONT_EXTRA_WORDS macros into linux/font.h > > Fonts: Support FONT_EXTRA_WORDS macros for built-in fonts > > fbcon: F

[PATCH] dt-bindings: tas2770: Mark ti,asi-format to deprecated

2020-09-24 Thread Dan Murphy
Mark the property ti,asi-format to deprecated as it is no longer supported. Signed-off-by: Dan Murphy --- Documentation/devicetree/bindings/sound/tas2770.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/Documentation/devicetree/bindings/sound/tas2770.yaml b/Documentation/devicetree/bind

Re: BUG: Bad page state in process dirtyc0w_child

2020-09-24 Thread Alex Shi
在 2020/9/24 上午10:06, Qian Cai 写道: > On Wed, 2020-09-23 at 15:39 +0200, Gerald Schaefer wrote: >> OK, I can now reproduce this, and unfortunately also with the gup_fast >> fix, so it is something different. Bisecting is a bit hard, as it will >> not always show immediately, sometimes takes up to

Re: sched: rq->nr_iowait transiently going negative after the recent p->on_cpu optimization

2020-09-24 Thread Tejun Heo
Hello, On Thu, Sep 24, 2020 at 01:50:42PM +0200, Peter Zijlstra wrote: > Hurmph.. I suppose you're right :/ And this is an actual problem? Yeah, this got exposed to userspace as a full 64bit number which overflowed u32 conversion in the rust procfs library which aborted a program I was working on

Re: [PATCH v9 07/20] gpiolib: cdev: support GPIO_V2_GET_LINE_IOCTL and GPIO_V2_LINE_GET_VALUES_IOCTL

2020-09-24 Thread Bartosz Golaszewski
On Wed, Sep 23, 2020 at 1:12 PM Andy Shevchenko wrote: > [snip!] > > > + /* Bias requires explicit direction. */ > > + if ((flags & GPIO_V2_LINE_BIAS_FLAGS) && > > + !(flags & GPIO_V2_LINE_DIRECTION_FLAGS)) > > + return -EINVAL; > > Okay, since this is strict

Re: [PATCH RFC 0/4] mm: place pages to the freelist tail when onling and undoing isolation

2020-09-24 Thread David Hildenbrand
>> If that would ever change, the optimization here would be lost and we >> would have to think of something else. Nothing would actually break - >> and it's all kept directly in page_alloc.c > > Sure, but then it can become a pointless code churn. Indeed, and if there are valid concerns that thi

From Mr. Fabian yaw.

2020-09-24 Thread Mr. Fabian Yaw.
Greetings. I am Mr. Fabian yaw. I got your contact while looking for a reliable and trustworthy partner there in your country to work with, that is why I contacted you.I have a business proposal from our Company which I will like to discuss In more details with you. only if you are Interested and

Re: linux-next: manual merge of the nvdimm tree with the vfs tree

2020-09-24 Thread Dan Williams
[ add Ingo ] On Thu, Sep 24, 2020 at 7:10 AM Dan Williams wrote: > > On Wed, Sep 23, 2020 at 11:45 PM Stephen Rothwell > wrote: > > > > Hi all, > > > > Today's linux-next merge of the nvdimm tree got a conflict in: > > > > lib/iov_iter.c > > > > between commit: > > > > e33ea6e5ba6a ("x86/ua

Re: [Cocci] [PATCH] coccinelle: iterators: Add for_each_child.cocci script

2020-09-24 Thread Julia Lawall
On Thu, 24 Sep 2020, Markus Elfring wrote: > > +@ruletwo depends on patch && !context && !org && !report@ > > How do you think about to combine code from two SmPL rules > by using another SmPL disjunction like the following? What is the goal of doing this? It seems substantially harder to und

Re: [PATCH] PCI: dwc: Move allocate and map page for msi out of dw_pcie_msi_init()

2020-09-24 Thread Ard Biesheuvel
On Thu, 24 Sep 2020 at 15:45, Ard Biesheuvel wrote: > > On Thu, 24 Sep 2020 at 15:28, Rob Herring wrote: > > > > On Thu, Sep 24, 2020 at 5:00 AM Ard Biesheuvel wrote: > > > > > > On Wed, 23 Sep 2020 at 08:28, Jisheng Zhang > > > wrote: > > > > > > > > Currently, dw_pcie_msi_init() allocates an

[PATCH V1 vhost-next] vdpa/mlx5: Make vdpa core driver a distinct module

2020-09-24 Thread Eli Cohen
Change core vdpa functionality into a loadbale module such that upcoming block implementation will be able to use it. Signed-off-by: Eli Cohen --- V0 --> V1: Removed "default n" for configu options as 'n' is the default drivers/vdpa/Kconfig | 8 +++- drivers/vdpa/Makefile

Re: selftests: pidfd: pidfd_wait hangs on linux next kernel on all devices

2020-09-24 Thread Christian Brauner
On Wed, Sep 23, 2020 at 07:52:05PM +0530, Naresh Kamboju wrote: > selftests: pidfd: pidfd_wait hangs on linux next kernel on x86_64, > i386 and arm64 Juno-r2 > These devices are using NFS mounted rootfs. > I have tested pidfd testcases independently and all test PASS. > > The Hang or exit from tes

Re: REGRESSION: 37f4a24c2469: blk-mq: centralise related handling into blk_mq_get_driver_tag

2020-09-24 Thread Theodore Y. Ts'o
On Thu, Sep 24, 2020 at 08:59:01AM +0800, Ming Lei wrote: > > The list corruption issue can be reproduced on kvm/qumu guest too when > running xfstests(ext4) generic/038. > > However, the issue may become not reproduced when adding or removing memory > debug options, such as adding KASAN. Can yo

Re: [PATCH v2] ovl: introduce new "index=nouuid" option for inodes index feature

2020-09-24 Thread Amir Goldstein
On Thu, Sep 24, 2020 at 4:18 PM Vivek Goyal wrote: > > On Thu, Sep 24, 2020 at 05:44:22AM +0300, Amir Goldstein wrote: > > On Wed, Sep 23, 2020 at 10:47 PM Vivek Goyal wrote: > > > > > > On Wed, Sep 23, 2020 at 06:23:08PM +0300, Pavel Tikhomirov wrote: > > > > This relaxes uuid checks for overlay

Re: [PATCH -next] usb: typec: Remove set but not used variable

2020-09-24 Thread Guenter Roeck
On 9/24/20 7:12 AM, Li Heng wrote: > Fixes gcc '-Wunused-but-set-variable' warning: > > drivers/usb/typec/tcpm/tcpm.c:1620:39: warning: > ‘tcpm_altmode_ops’ defined but not used [-Wunused-const-variable=] > > Reported-by: Hulk Robot > Signed-off-by: Li Heng I thought there was a patch series u

Re: [PATCH 1/5] mm: Introduce mm_struct.has_pinned

2020-09-24 Thread Peter Xu
On Wed, Sep 23, 2020 at 02:07:59PM -0300, Jason Gunthorpe wrote: > On Tue, Sep 22, 2020 at 08:27:35PM -0400, Peter Xu wrote: > > On Tue, Sep 22, 2020 at 04:11:16PM -0300, Jason Gunthorpe wrote: > > > On Tue, Sep 22, 2020 at 01:54:15PM -0400, Peter Xu wrote: > > > > diff --git a/mm/memory.c b/mm/mem

[PATCH -next] xen: Fix a previous prototype warning in xen.c

2020-09-24 Thread Li Heng
Fix the warning: arch/x86/pci/xen.c:423:13: warning: no previous prototype for ‘xen_msi_init’ [-Wmissing-prototypes] Reported-by: Hulk Robot Signed-off-by: Li Heng --- arch/x86/pci/xen.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/pci/xen.c b/arch/x86/pci/xen.c

Re: [PATCH 1/2] perf stat: Fix segfault when counting armv8_pmu events

2020-09-24 Thread Namhyung Kim
On Wed, Sep 23, 2020 at 10:19:00PM +0200, Jiri Olsa wrote: > On Wed, Sep 23, 2020 at 11:15:06PM +0900, Namhyung Kim wrote: > > I think the problem is that armv8_pmu has a cpumask, > > and the user requested per-task events. > > > > The code tried to open the event with a dummy cpu map > > since it

Re: [PATCH v2 seccomp 2/6] asm/syscall.h: Add syscall_arches[] array

2020-09-24 Thread YiFei Zhu
On Thu, Sep 24, 2020 at 9:20 AM David Laight wrote: > > Granted, I have CC_OPTIMIZE_FOR_PERFORMANCE rather than > > CC_OPTIMIZE_FOR_SIZE, but this patch itself is trying to sacrifice > > some of the memory for speed. > > Don't both CC_OPTIMIZE_FOR_PERFORMANCE (-??) and CC_OPTIMIZE_FOR_SIZE (-s) >

i386: allmodconfig build failed on linux next

2020-09-24 Thread Naresh Kamboju
i386 allmodconfig build failed on linux next due to below errors. Since we recently started building allmodconfig. we do not have when this problem started. We are building with gcc-8, gcc-9 and gcc-10. Build log: make -sk KBUILD_BUILD_USER=TuxBuild -C/linux ARCH=i386 HOSTCC=gcc CC="

Re: [PATCH] KVM: x86/mmu: Stash 'kvm' in a local variable in kvm_mmu_free_roots()

2020-09-24 Thread Sean Christopherson
On Thu, Sep 24, 2020 at 02:42:19PM +0200, Vitaly Kuznetsov wrote: > What about kvm_mmu_get_page(), make_mmu_pages_available(), > mmu_alloc_root(), kvm_mmu_sync_roots(), direct_page_fault(), > kvm_mmu_pte_write() which seem to be using the same ugly pattern? :-) Heh, good question. I guess only kv

RE: [PATCH 0/3] Prevent out-of-bounds access for built-in font data buffers

2020-09-24 Thread David Laight
> On Thu, Sep 24, 2020 at 09:38:22AM -0400, Peilin Ye wrote: > > Hi all, > > > > syzbot has reported [1] a global out-of-bounds read issue in > > fbcon_get_font(). A malicious user may resize `vc_font.height` to a large > > value in vt_ioctl(), causing fbcon_get_font() to overflow our built-in > >

Re: [PATCH 1/5] mm: Introduce mm_struct.has_pinned

2020-09-24 Thread Jan Kara
On Thu 24-09-20 11:02:37, Jason Gunthorpe wrote: > On Thu, Sep 24, 2020 at 09:44:09AM +0200, Jan Kara wrote: > > > After the page is pinned it is prevented from being freed and > > > recycled. After GUP has the pin it must check that the PTE still > > > points at the same page, otherwise it might h

Re: [PATCH 4/7] perf inject: Do not load map/dso when injecting build-id

2020-09-24 Thread Namhyung Kim
On Thu, Sep 24, 2020 at 03:44:44PM +0200, Jiri Olsa wrote: > On Thu, Sep 24, 2020 at 10:20:51PM +0900, Namhyung Kim wrote: > > On Thu, Sep 24, 2020 at 10:09 PM Jiri Olsa wrote: > > > > > > On Wed, Sep 23, 2020 at 05:05:34PM +0900, Namhyung Kim wrote: > > > > > > SNIP > > > > > > > -static inline i

Re: [PATCH 1/3] hwmon: (adm9240) Use loops to avoid duplicated code

2020-09-24 Thread Guenter Roeck
Hi Chris, On Thu, Sep 24, 2020 at 08:51:00PM +1200, Chris Packham wrote: > Use loops for reading temp_max and initialising FAN_MIN/TEMP_MAX rather > than duplicating code. > > Signed-off-by: Chris Packham Series applied (and module tested). Thanks a lot for the clean submission. Guenter > --

mips: allmodconfig build failed on linux next

2020-09-24 Thread Naresh Kamboju
mips allmodconfig build failed on linux next due to below errors. Since we recently started building allmodconfig, we do not have information on when this problem started. We are building with gcc-8, gcc-9 and gcc-10. metadata: -- git_repo: https://gitlab.com/Linaro/lkft/mirrors/n

Re: [PATCH v38 10/24] mm: Add vm_ops->mprotect()

2020-09-24 Thread Dave Hansen
On 9/23/20 7:33 AM, Jarkko Sakkinen wrote: > The consequence is that enclaves are best created with an ioctl API and the > access control can be based only to the origin of the source file for the > enclave data, i.e. on VMA file pointer and page permissions. For example, > this could be done with

Re: [PATCH] ext4: Implement swap_activate aops using iomap

2020-09-24 Thread Theodore Y. Ts'o
On Fri, Sep 04, 2020 at 02:46:53PM +0530, Ritesh Harjani wrote: > After moving ext4's bmap to iomap interface, swapon functionality > on files created using fallocate (which creates unwritten extents) are > failing. This is since iomap_bmap interface returns 0 for unwritten > extents and thus gener

Re: sched: rq->nr_iowait transiently going negative after the recent p->on_cpu optimization

2020-09-24 Thread Peter Zijlstra
On Thu, Sep 24, 2020 at 10:27:51AM -0400, Tejun Heo wrote: > Hello, > > On Thu, Sep 24, 2020 at 01:50:42PM +0200, Peter Zijlstra wrote: > > Hurmph.. I suppose you're right :/ And this is an actual problem? > > Yeah, this got exposed to userspace as a full 64bit number which overflowed > u32 conve

RE: [PATCH v6 04/11] PCI: designware-ep: Modify MSI and MSIX CAP way of finding

2020-09-24 Thread Z.q. Hou
Hi Bjorn, Thanks a lot for your comments! > -Original Message- > From: Bjorn Helgaas > Sent: 2020年9月24日 4:16 > To: Xiaowei Bao > Cc: Z.q. Hou ; M.h. Lian > ; Mingkai Hu ; > bhelg...@google.com; robh...@kernel.org; shawn...@kernel.org; Leo Li > ; kis...@ti.com; lorenzo.pieral...@arm.com;

Re: [PATCH 2/3] HID: rmi - rename f30_data to gpio_data

2020-09-24 Thread Jiri Kosina
On Thu, 24 Sep 2020, Vincent Huang wrote: > f30_data in rmi_device_platform_data could be also referenced by RMI > function 3A, so rename it and the structure name to avoid confusion. > > Signed-off-by: Vincent Huang > --- > drivers/hid/hid-rmi.c | 2 +- > 1 file changed, 1 insertion(+), 1 dele

Re: [PATCH 07/13] block: lift setting the readahead size into the block layer

2020-09-24 Thread Jan Kara
On Thu 24-09-20 08:51:34, Christoph Hellwig wrote: > Drivers shouldn't really mess with the readahead size, as that is a VM > concept. Instead set it based on the optimal I/O size by lifting the > algorithm from the md driver when registering the disk. Also set > bdi->io_pages there as well by ap

Re: [PATCH v3 6/6] clk: axi-clkgen: Add support for FPGA info

2020-09-24 Thread Alexandru Ardelean
On Thu, Sep 24, 2020 at 5:21 PM Moritz Fischer wrote: > > On Thu, Sep 24, 2020 at 09:50:12AM +0300, Alexandru Ardelean wrote: > > From: Mircea Caprioru > > > > This patch adds support for vco maximum and minimum ranges in accordance > > with fpga speed grade, voltage, device package, technology a

Re: [PATCH] man2: new page describing memfd_secret() system call

2020-09-24 Thread Alejandro Colomar
* Mike Rapoport: > +.PP > +.IR Note : > +There is no glibc wrapper for this system call; see NOTES. You added a reference to NOTES, but then in notes there is nothing about it. I guess you wanted to add the following to NOTES (taken from membarrier.2): .PP Glibc does not provide a wrapper fo

[PATCH v2 2/7] KVM: x86: hyper-v: disallow configuring SynIC timers with no SynIC

2020-09-24 Thread Vitaly Kuznetsov
Hyper-V Synthetic timers require SynIC but we don't seem to check that upon HV_X64_MSR_STIMER[X]_CONFIG/HV_X64_MSR_STIMER0_COUNT writes. Make the behavior match synic_set_msr(). Signed-off-by: Vitaly Kuznetsov --- arch/x86/kvm/hyperv.c | 11 +++ 1 file changed, 11 insertions(+) diff --g

[PATCH v2 5/7] KVM: x86: hyper-v: drop now unneeded vcpu parameter from kvm_vcpu_ioctl_get_hv_cpuid()

2020-09-24 Thread Vitaly Kuznetsov
kvm_vcpu_ioctl_get_hv_cpuid() doesn't use its vcpu parameter anymore, drop it. Also, the function is now untied from vcpu, rename it accordingly. No functional change intended. Signed-off-by: Vitaly Kuznetsov --- arch/x86/kvm/hyperv.c | 3 +-- arch/x86/kvm/hyperv.h | 3 +-- arch/x86/kvm/x86.c

[PATCH v2 3/7] KVM: x86: hyper-v: make KVM_GET_SUPPORTED_HV_CPUID output independent of eVMCS enablement

2020-09-24 Thread Vitaly Kuznetsov
It is really inconvenient when KVM_GET_SUPPORTED_HV_CPUID output depends on whether some other capabilities are enabled as VMM needs to be aware of the correct sequence (which becomes an API). Enlightened VMCS is not the only feature which requires explicit enablement. In particular, SynIC has to

[PATCH v2 7/7] KVM: selftests: test KVM_GET_SUPPORTED_HV_CPUID as a system ioctl

2020-09-24 Thread Vitaly Kuznetsov
KVM_GET_SUPPORTED_HV_CPUID is now supported as both vCPU and VM ioctl, test that. Signed-off-by: Vitaly Kuznetsov --- .../testing/selftests/kvm/include/kvm_util.h | 2 + tools/testing/selftests/kvm/lib/kvm_util.c| 26 +++ .../selftests/kvm/x86_64/hyperv_cpuid.c | 46 +

Re: sched: rq->nr_iowait transiently going negative after the recent p->on_cpu optimization

2020-09-24 Thread Tejun Heo
On Thu, Sep 24, 2020 at 04:50:41PM +0200, Peter Zijlstra wrote: > > Rik suggested that it'd be sufficient to return 0 on underflow especially > > given that 0 is actually the right number to describe the state. So, maybe > > that can be a nicer code-wise? > > I worry about things where one CPU has

[PATCH v2 1/7] KVM: x86: hyper-v: Mention SynDBG CPUID leaves in api.rst

2020-09-24 Thread Vitaly Kuznetsov
We forgot to update KVM_GET_SUPPORTED_HV_CPUID's documentation in api.rst when SynDBG leaves were added. While on it, fix 'KVM_GET_SUPPORTED_CPUID' copy-paste error. Fixes: f97f5a56f597 ("x86/kvm/hyper-v: Add support for synthetic debugger interface") Signed-off-by: Vitaly Kuznetsov --- Docume

Re: [PATCH 0/2] measure latency of cpu hotplug path

2020-09-24 Thread Steven Rostedt
On Thu, 24 Sep 2020 10:34:14 +0200 pet...@infradead.org wrote: > On Wed, Sep 23, 2020 at 04:37:44PM -0700, Prasad Sodagudi wrote: > > There are all changes related to cpu hotplug path and would like to seek > > upstream review. These are all patches in Qualcomm downstream kernel > > for a quite lo

[PATCH 10/13] x86: Secure Launch adding event log securityfs

2020-09-24 Thread Ross Philipson
From: "Daniel P. Smith" The late init functionality registers securityfs nodes to allow access to TXT register fields on Intel along with the fetching of and writing events to the late launch TPM log. Signed-off-by: Daniel P. Smith Signed-off-by: Ross Philipson Signed-off-by: garnetgrimm ---

[PATCH 12/13] reboot: Secure Launch SEXIT support on reboot paths

2020-09-24 Thread Ross Philipson
If the MLE kernel is being powered off, rebooted or halted, then SEXIT must be called. Note that the SEXIT GETSEC leaf can only be called after a machine_shutdown() has been done on these paths. The machine_shutdown() is not called on a few paths like when poweroff action does not have a poweroff c

[PATCH 03/13] x86: Add early SHA support for Secure Launch early measurements

2020-09-24 Thread Ross Philipson
The SHA algorithms are necessary to measure configuration information into the TPM as early as possible before using the values. This implementation uses the established approach of #including the SHA libraries directly in the code since the compressed kernel is not uncompressed at this point. The

[PATCH 06/13] x86: Add early general TPM interface support for Secure Launch

2020-09-24 Thread Ross Philipson
From: "Daniel P. Smith" This commit exposes a minimal general interface for the compressed kernel to request the required TPM operations to send measurements to a TPM. Signed-off-by: Daniel P. Smith Signed-off-by: Ross Philipson --- arch/x86/boot/compressed/Makefile | 2 +- arch/x86/boot/c

Re: [PATCH v2] fs: Kill DCACHE_DONTCACHE dentry even if DCACHE_REFERENCED is set

2020-09-24 Thread Jan Kara
On Thu 24-09-20 13:59:58, Hao Li wrote: > If DCACHE_REFERENCED is set, fast_dput() will return true, and then > retain_dentry() have no chance to check DCACHE_DONTCACHE. As a result, > the dentry won't be killed and the corresponding inode can't be evicted. > In the following example, the DAX polic

[PATCH 11/13] kexec: Secure Launch kexec SEXIT support

2020-09-24 Thread Ross Philipson
Prior to running the next kernel via kexec, the Secure Launch code closes down private SMX resources and does an SEXIT. This allows the next kernel to start normally without any issues starting the APs etc. Signed-off-by: Ross Philipson --- arch/x86/kernel/slaunch.c | 70

[PATCH 09/13] x86: Secure Launch SMP bringup support

2020-09-24 Thread Ross Philipson
On Intel, the APs are left in a well documented state after TXT performs the late launch. Specifically they cannot have #INIT asserted on them so a standard startup via INIT/SIPI/SIPI cannot be performed. Instead the early SL stub code parked the APs in a pause/jmp loop waiting for an NMI. The modi

[PATCH 07/13] x86: Secure Launch kernel early boot stub

2020-09-24 Thread Ross Philipson
The Secure Launch (SL) stub provides the entry point for Intel TXT (and later AMD SKINIT) to vector to during the late launch. The symbol sl_stub_entry is that entry point and its offset into the kernel is conveyed to the launching code using the MLE (Measured Launch Environment) header in the stru

[PATCH 13/13] tpm: Allow locality 2 to be set when initializing the TPM for Secure Launch

2020-09-24 Thread Ross Philipson
The Secure Launch MLE environment uses PCRs that are only accessible from the DRTM locality 2. By default the TPM drivers always initialize the locality to 0. When a Secure Launch is in progress, initialize the locality to 2. Signed-off-by: Ross Philipson --- drivers/char/tpm/tpm-chip.c | 13 +++

[PATCH 05/13] x86: Add early TPM1.2/TPM2.0 interface support for Secure Launch

2020-09-24 Thread Ross Philipson
From: "Daniel P. Smith" This commit introduces an abstraction for TPM1.2 and TPM2.0 devices above the TPM hardware interface. Signed-off-by: Daniel P. Smith Signed-off-by: Ross Philipson --- arch/x86/boot/compressed/Makefile | 3 +- arch/x86/boot/compressed/tpm/tpm1.h

[PATCH 04/13] x86: Add early TPM TIS/CRB interface support for Secure Launch

2020-09-24 Thread Ross Philipson
From: "Daniel P. Smith" The Secure Launch capability that is part of the compressed kernel requires the ability to send measurements it takes to the TPM. This commit introduces the necessary code to communicate with the hardware interface of TPM devices. Signed-off-by: Daniel P. Smith Signed-of

[PATCH v2 4/7] KVM: x86: hyper-v: always advertise HV_STIMER_DIRECT_MODE_AVAILABLE

2020-09-24 Thread Vitaly Kuznetsov
HV_STIMER_DIRECT_MODE_AVAILABLE is the last conditionally set feature bit in KVM_GET_SUPPORTED_HV_CPUID but it doesn't have to be conditional: first, this bit is only an indication to userspace VMM that direct mode stimers are supported, it still requires manual enablement (enabling SynIC) to work

[PATCH v2 6/7] KVM: x86: hyper-v: allow KVM_GET_SUPPORTED_HV_CPUID as a system ioctl

2020-09-24 Thread Vitaly Kuznetsov
KVM_GET_SUPPORTED_HV_CPUID is a vCPU ioctl but its output is now independent from vCPU and in some cases VMMs may want to use it as a system ioctl instead. In particular, QEMU doesn CPU feature expansion before any vCPU gets created so KVM_GET_SUPPORTED_HV_CPUID can't be used. Convert KVM_GET_SUPP

[PATCH v2 0/7] KVM: x86: hyper-v: make KVM_GET_SUPPORTED_HV_CPUID more useful

2020-09-24 Thread Vitaly Kuznetsov
Changes since v1: - Rebased to kvm/queue [KVM_CAP_SYS_HYPERV_CPUID -> 188] QEMU series using the feature: https://lists.gnu.org/archive/html/qemu-devel/2020-09/msg02017.html Original description: KVM_GET_SUPPORTED_HV_CPUID was initially implemented as a vCPU ioctl but this is not very useful whe

[PATCH 01/13] x86: Secure Launch Kconfig

2020-09-24 Thread Ross Philipson
Initial bits to bring in Secure Launch functionality. Add Kconfig options for compiling in/out the Secure Launch code. Signed-off-by: Ross Philipson --- arch/x86/Kconfig | 36 1 file changed, 36 insertions(+) diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig

<    2   3   4   5   6   7   8   9   10   11   >