Re: [BUG][bisected 270065e] linux-next fails to boot on powerpc

2017-08-17 Thread Michael Ellerman
Bart Van Assche writes: > On Wed, 2017-08-16 at 22:30 +0530, Abdul Haleem wrote: >> As of next-20170809, linux-next on powerpc boot hung with below trace >> message. >> [ ... ] >> System booted fine when the below commit is reverted: > > Hello Abdul, > > Can you check whether applying the follow

Re: [RFC Part1 PATCH v3 02/17] x86/CPU/AMD: Add the Secure Encrypted Virtualization CPU feature

2017-08-17 Thread Borislav Petkov
On Wed, Aug 09, 2017 at 01:17:54PM -0500, Tom Lendacky wrote: > Ok, finally got around to running a 32-bit kernel and it reports > x86_phys_bits as 48. So it doesn't really matter on 32-bit. I guess you could add a comment saying why we don't care. Thanks. -- Regards/Gruss, Boris. SUSE Lin

[PATCH 00/12] ALSA: make snd_pcm_hardware const

2017-08-17 Thread Bhumika Goyal
Make these const. Bhumika Goyal (12): ALSA: arm: make snd_pcm_hardware const ALSA: atmel: make snd_pcm_hardware const ALSA: drivers: make snd_pcm_hardware const ALSA: isa: make snd_pcm_hardware const ALSA: mips: make snd_pcm_hardware const ALSA: pci: make snd_pcm_hardware const ALSA:

[PATCH 01/12] ALSA: arm: make snd_pcm_hardware const

2017-08-17 Thread Bhumika Goyal
Make this const as it is only used in a copy operation. Done using Coccinelle. Signed-off-by: Bhumika Goyal --- sound/arm/aaci.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/sound/arm/aaci.c b/sound/arm/aaci.c index 4140b1b..74cf452 100644 --- a/sound/arm/aaci.c +++ b/soun

[PATCH 02/12] ALSA: atmel: make snd_pcm_hardware const

2017-08-17 Thread Bhumika Goyal
Make this const as it is only used in a copy operation. Done using Coccinelle. Signed-off-by: Bhumika Goyal --- sound/atmel/ac97c.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/sound/atmel/ac97c.c b/sound/atmel/ac97c.c index 52b0522..f3f582e 100644 --- a/sound/atmel/ac97c.

[PATCH 03/12] ALSA: drivers: make snd_pcm_hardware const

2017-08-17 Thread Bhumika Goyal
Make these const as they are only used in a copy operation. Done using Coccinelle. Signed-off-by: Bhumika Goyal --- sound/drivers/aloop.c | 2 +- sound/drivers/dummy.c | 2 +- sound/drivers/ml403-ac97cr.c | 4 ++-- sound/drivers/pcsp/pcsp_lib.c | 2 +- sound/drivers/vx/vx_pcm.c

[PATCH 04/12] ALSA: isa: make snd_pcm_hardware const

2017-08-17 Thread Bhumika Goyal
Make these const as they are only used in a copy operation. Done using Coccinelle. Signed-off-by: Bhumika Goyal --- sound/isa/ad1816a/ad1816a_lib.c | 4 ++-- sound/isa/es1688/es1688_lib.c | 4 ++-- sound/isa/es18xx.c | 4 ++-- sound/isa/gus/gus_pcm.c | 4 ++-- sound/isa/ms

[PATCH 05/12] ALSA: mips: make snd_pcm_hardware const

2017-08-17 Thread Bhumika Goyal
Make these const as they are only used in a copy operation. Done using Coccinelle Signed-off-by: Bhumika Goyal --- sound/mips/hal2.c | 2 +- sound/mips/sgio2audio.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/sound/mips/hal2.c b/sound/mips/hal2.c index 3318c15..3

[PATCH 06/12] ALSA: pci: make snd_pcm_hardware const

2017-08-17 Thread Bhumika Goyal
Make these const as they are only used in a copy operation. Done using Coccinelle. Signed-off-by: Bhumika Goyal --- sound/pci/au88x0/au88x0_pcm.c | 8 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/sound/pci/au88x0/au88x0_pcm.c b/sound/pci/au88x0/au88x0_pcm.c index 848eb3

[PATCH 07/12] ALSA: pcmcia: make snd_pcm_hardware const

2017-08-17 Thread Bhumika Goyal
Make this const as it is only used in a copy operation. Done using Coccinelle. Signed-off-by: Bhumika Goyal --- sound/pcmcia/pdaudiocf/pdaudiocf_pcm.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/sound/pcmcia/pdaudiocf/pdaudiocf_pcm.c b/sound/pcmcia/pdaudiocf/pdaudiocf_pc

[PATCH 08/12] ALSA: ppc: make snd_pcm_hardware const

2017-08-17 Thread Bhumika Goyal
Make these const as they are only used in a copy operation. Done using Coccinelle. Signed-off-by: Bhumika Goyal --- sound/ppc/pmac.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/sound/ppc/pmac.c b/sound/ppc/pmac.c index a5843fc..45f0295 100644 --- a/sound/ppc/pmac.c ++

[PATCH 09/12] ALSA: sh: make snd_pcm_hardware const

2017-08-17 Thread Bhumika Goyal
Make these const as they are only used in a copy operation. Done using Coccinelle. Signed-off-by: Bhumika Goyal --- sound/sh/aica.c | 2 +- sound/sh/sh_dac_audio.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/sound/sh/aica.c b/sound/sh/aica.c index ab4802d..8226

[PATCH 10/12] ALSA: sparc: make snd_pcm_hardware const

2017-08-17 Thread Bhumika Goyal
Make these const as they are only used in a copy operation. Done using Coccinelle. Signed-off-by: Bhumika Goyal --- sound/sparc/amd7930.c | 2 +- sound/sparc/cs4231.c | 4 ++-- sound/sparc/dbri.c| 2 +- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/sound/sparc/amd7930.c b/s

[PATCH 11/12] ALSA: usb: make snd_pcm_hardware const

2017-08-17 Thread Bhumika Goyal
Make this const as it is only used in a copy operation. Done using Coccinelle. Signed-off-by: Bhumika Goyal --- sound/usb/pcm.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/sound/usb/pcm.c b/sound/usb/pcm.c index 9aa5b18..a4f3390 100644 --- a/sound/usb/pcm.c +++ b/sound/us

[PATCH 12/12] ALSA: parisc: make snd_pcm_hardware const

2017-08-17 Thread Bhumika Goyal
Make these const as they are only used in a copy operation. Done using Coccinelle Signed-off-by: Bhumika Goyal --- sound/parisc/harmony.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/sound/parisc/harmony.c b/sound/parisc/harmony.c index 5911eb3..cb2bc54 100644 --- a/so

Re: [PATCH 07/11] ASoC: qcom: make snd_soc_platform_driver const

2017-08-17 Thread Banajit Goswami
On Mon, Aug 14, 2017 at 04:38:46AM -0700, Bhumika Goyal wrote: > Make this const as it is only passed as the 2nd argument to the > function devm_snd_soc_register_platform, which is of type const. > Done using Coccinelle. > > Signed-off-by: Bhumika Goyal Acked-by: Banajit Goswami > --- > sound

Re: [FIX PATCH v0] powerpc: Fix memory unplug failure on radix guest

2017-08-17 Thread Bharata B Rao
On Fri, Aug 11, 2017 at 02:12:04PM +0530, Aneesh Kumar K.V wrote: > Bharata B Rao writes: > > > For a PowerKVM guest, it is possible to specify a DIMM device in > > addition to the system RAM at boot time. When such a cold plugged DIMM > > device is removed from a radix guest, we hit the followin

[PATCH 0/6] ASoC: make snd_pcm_hardware const

2017-08-17 Thread Bhumika Goyal
Make these const. Done using Coccinelle Bhumika Goyal (6): ASoC: fsl: make snd_pcm_hardware const ASoC: Intel: Atom: make snd_pcm_hardware const ASoC: Intel: Skylake: make snd_pcm_hardware const ASoC: kirkwood: make snd_pcm_hardware const ASoC: sh: make snd_pcm_hardware const ASoC: qco

[PATCH 1/6] ASoC: fsl: make snd_pcm_hardware const

2017-08-17 Thread Bhumika Goyal
Make these const as they are only passed as the 2nd argument to the function snd_soc_set_runtime_hwparams, which is const. Done using Coccinelle. Signed-off-by: Bhumika Goyal --- sound/soc/fsl/fsl_asrc_dma.c | 2 +- sound/soc/fsl/imx-pcm-fiq.c | 2 +- 2 files changed, 2 insertions(+), 2 deletio

[PATCH 2/6] ASoC: Intel: Atom: make snd_pcm_hardware const

2017-08-17 Thread Bhumika Goyal
Make this const as it is only used in a copy operation. Done using Coccinelle. Signed-off-by: Bhumika Goyal --- sound/soc/intel/atom/sst-mfld-platform-pcm.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/sound/soc/intel/atom/sst-mfld-platform-pcm.c b/sound/soc/intel/atom/ss

[PATCH 3/6] ASoC: Intel: Skylake: make snd_pcm_hardware const

2017-08-17 Thread Bhumika Goyal
Make this const as it is only passed as the 2nd argument to the function snd_soc_set_runtime_hwparams, which is const. Done using Coccinelle. Signed-off-by: Bhumika Goyal --- sound/soc/intel/skylake/skl-pcm.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/sound/soc/intel/sky

[PATCH 4/6] ASoC: kirkwood: make snd_pcm_hardware const

2017-08-17 Thread Bhumika Goyal
Make this const as it is either passed as the 2nd argument to the function snd_soc_set_runtime_hwparams, which is const or used in a copy operation. Done using Coccinelle. Signed-off-by: Bhumika Goyal --- sound/soc/kirkwood/kirkwood-dma.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) di

[PATCH 5/6] ASoC: sh: make snd_pcm_hardware const

2017-08-17 Thread Bhumika Goyal
Make these const as they are only passed as the 2nd argument to the function snd_soc_set_runtime_hwparams, which is const. Done using Coccinelle. Signed-off-by: Bhumika Goyal --- sound/soc/sh/dma-sh7760.c | 2 +- sound/soc/sh/fsi.c| 2 +- sound/soc/sh/rcar/core.c | 2 +- sound/soc/sh/si

[PATCH 6/6] ASoC: qcom: make snd_pcm_hardware const

2017-08-17 Thread Bhumika Goyal
Make this const as it is either passed as the 2nd argument to the function snd_soc_set_runtime_hwparams, which is const or used in a copy operation. Done using Coccinelle. Signed-off-by: Bhumika Goyal --- sound/soc/qcom/lpass-platform.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff

Re: [PATCH 00/12] ALSA: make snd_pcm_hardware const

2017-08-17 Thread Takashi Iwai
On Thu, 17 Aug 2017 11:15:48 +0200, Bhumika Goyal wrote: > > Make these const. > > Bhumika Goyal (12): > ALSA: arm: make snd_pcm_hardware const > ALSA: atmel: make snd_pcm_hardware const > ALSA: drivers: make snd_pcm_hardware const > ALSA: isa: make snd_pcm_hardware const > ALSA: mips:

RE: [RFC PATCH v5 0/5] vfio-pci: Add support for mmapping MSI-X table

2017-08-17 Thread David Laight
From: Alex Williamson > Sent: 16 August 2017 17:56 ... > Firmware pissing match... Processors running with 8k or less page size > fall within the recommendations of the PCI spec for register alignment > of MMIO regions of the device and this whole problem becomes less of an > issue. Actually if q

[PATCH v2 0/1] Split VGA default nomination out from VGA arbiter

2017-08-17 Thread Daniel Axtens
This is approach 3, version 2, of my patch series to sort out Xorg autoconfiguration for the Hibmc card beind a Hisilicon bridge on arm64. Approach 1 was a simple quirk for the card+bridge to mark it as default. This higlighted the fact that the default card was picked by the arbiter, which assume

[PATCH v2 1/1] Split VGA default device handler out of VGA arbiter

2017-08-17 Thread Daniel Axtens
A system without PCI legacy resources (e.g. ARM64) may find that no default/boot VGA device has been marked, because the VGA arbiter checks for legacy resource decoding before marking a card as default. Split the small bit of code that does default VGA handling out from the arbiter. Add a Kconfig

Re: [PATCH] powerpc: powernv: Fix build error on const discarding

2017-08-17 Thread Michael Ellerman
Corentin Labbe writes: > When building a random powerpc kernel I hit this build error: > CC arch/powerpc/platforms/powernv/opal-imc.o > arch/powerpc/platforms/powernv/opal-imc.c: In function «  > disable_nest_pmu_counters »: > arch/powerpc/platforms/powernv/opal-imc.c:130:13: error : assig

Re: [PATCH] powerpc/xmon: Exclude all of xmon/ from ftrace

2017-08-17 Thread Michael Ellerman
"Naveen N. Rao" writes: > Hi Michael, > Sorry -- was off since last week. No worries. cheers

Re: [PATCH 3/6] powerpc/mm: Ensure cpumask update is ordered

2017-08-17 Thread Michael Ellerman
Nicholas Piggin writes: > On Mon, 24 Jul 2017 21:20:07 +1000 > Nicholas Piggin wrote: > >> On Mon, 24 Jul 2017 14:28:00 +1000 >> Benjamin Herrenschmidt wrote: >> >> > There is no guarantee that the various isync's involved with >> > the context switch will order the update of the CPU mask with

Re: [1/5] powerpc: Test MSR_FP and MSR_VEC when enabling/flushing VSX

2017-08-17 Thread Michael Ellerman
On Wed, 2017-08-16 at 06:01:14 UTC, Benjamin Herrenschmidt wrote: > VSX uses a combination of the old vector registers, the old FP registers > and new "second halves" of the FP registers. > > Thus when we need to see the VSX state in the thread struct > (flush_vsx_to_thread) or when we'll use the

[PATCH] crypto: nx: constify vio_device_id

2017-08-17 Thread Arvind Yadav
vio_device_id are not supposed to change at runtime. All functions working with vio_device_id provided by work with const vio_device_id. So mark the non-const structs as const. Signed-off-by: Arvind Yadav --- drivers/crypto/nx/nx.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --g

[PATCH] crypto: nx: 842: constify vio_device_id

2017-08-17 Thread Arvind Yadav
vio_device_id are not supposed to change at runtime. All functions working with vio_device_id provided by work with const vio_device_id. So mark the non-const structs as const. Signed-off-by: Arvind Yadav --- drivers/crypto/nx/nx-842-pseries.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(

[PATCH] net: ibm: ibmveth: constify vio_device_id

2017-08-17 Thread Arvind Yadav
vio_device_id are not supposed to change at runtime. All functions working with vio_device_id provided by work with const vio_device_id. So mark the non-const structs as const. Signed-off-by: Arvind Yadav --- drivers/net/ethernet/ibm/ibmveth.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(

[PATCH] net: ibm: ibmvnic: constify vio_device_id

2017-08-17 Thread Arvind Yadav
vio_device_id are not supposed to change at runtime. All functions working with vio_device_id provided by work with const vio_device_id. So mark the non-const structs as const. Signed-off-by: Arvind Yadav --- drivers/net/ethernet/ibm/ibmvnic.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(

[PATCH] tty: hvc_vio: constify vio_device_id

2017-08-17 Thread Arvind Yadav
vio_device_id are not supposed to change at runtime. All functions working with vio_device_id provided by work with const vio_device_id. So mark the non-const structs as const. Signed-off-by: Arvind Yadav --- drivers/tty/hvc/hvc_vio.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff

[PATCH] tty: hvcs: constify vio_device_id

2017-08-17 Thread Arvind Yadav
vio_device_id are not supposed to change at runtime. All functions working with vio_device_id provided by work with const vio_device_id. So mark the non-const structs as const. Signed-off-by: Arvind Yadav --- drivers/tty/hvc/hvcs.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --g

[PATCH 1/3] scsi: ibmvfc: constify vio_device_id

2017-08-17 Thread Arvind Yadav
vio_device_id are not supposed to change at runtime. All functions working with vio_device_id provided by work with const vio_device_id. So mark the non-const structs as const. Signed-off-by: Arvind Yadav --- drivers/scsi/ibmvscsi/ibmvfc.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)

[PATCH 2/3] scsi: ibmvscsi: constify vio_device_id

2017-08-17 Thread Arvind Yadav
vio_device_id are not supposed to change at runtime. All functions working with vio_device_id provided by work with const vio_device_id. So mark the non-const structs as const. Signed-off-by: Arvind Yadav --- drivers/scsi/ibmvscsi/ibmvscsi.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)

[PATCH 3/3] scsi: ibmvscsi_tgt: constify vio_device_id

2017-08-17 Thread Arvind Yadav
vio_device_id are not supposed to change at runtime. All functions working with vio_device_id provided by work with const vio_device_id. So mark the non-const structs as const. Signed-off-by: Arvind Yadav --- drivers/scsi/ibmvscsi_tgt/ibmvscsi_tgt.c | 2 +- 1 file changed, 1 insertion(+), 1 del

[PATCH 0/3] constify scsi vio_device_id

2017-08-17 Thread Arvind Yadav
vio_device_id are not supposed to change at runtime. All functions working with vio_device_id provided by work with const vio_device_id. So mark the non-const structs as const. Arvind Yadav (3): [PATCH 1/3] scsi: ibmvfc: constify vio_device_id [PATCH 2/3] scsi: ibmvscsi: constify vio_device_i

Re: RCU lockup issues when CONFIG_SOFTLOCKUP_DETECTOR=n - any one else seeing this?

2017-08-17 Thread Michael Ellerman
"Paul E. McKenney" writes: > On Wed, Aug 16, 2017 at 05:56:17AM -0700, Paul E. McKenney wrote: >> On Wed, Aug 16, 2017 at 10:43:52PM +1000, Michael Ellerman wrote: >> > "Paul E. McKenney" writes: >> > ... >> > > >> > > commit 33103e7b1f89ef432dfe3337d2a6932cdf5c1312 >> > > Author: Paul E. McKenn

Re: [PATCH] powerpc: powernv: Fix build error on const discarding

2017-08-17 Thread Madhavan Srinivasan
On Wednesday 16 August 2017 06:04 PM, Corentin Labbe wrote: When building a random powerpc kernel I hit this build error: CC arch/powerpc/platforms/powernv/opal-imc.o arch/powerpc/platforms/powernv/opal-imc.c: In function « disable_nest_pmu_counters »: arch/powerpc/platforms/powernv/op

Re: [PATCH v4 7/7] ima: Support module-style appended signatures for appraisal

2017-08-17 Thread Mimi Zohar
On Fri, 2017-08-04 at 19:03 -0300, Thiago Jung Bauermann wrote: > This patch introduces the modsig keyword to the IMA policy syntax to > specify that a given hook should expect the file to have the IMA signature > appended to it. Here is how it can be used in a rule: > > appraise func=KEXEC_KERNEL

Re: [v6 05/15] mm: don't accessed uninitialized struct pages

2017-08-17 Thread Pasha Tatashin
Hi Michal, I've been looking through this code again, and I think your suggestion will work. I did not realize this iterator already exist: for_each_free_mem_range() basically iterates through (memory && !reserved) This is exactly what we need here. So, I will update this patch to use this i

Re: WARNING: CPU: 15 PID: 0 at block/blk-mq.c:1111 __blk_mq_run_hw_queue+0x1d8/0x1f0

2017-08-17 Thread Bart Van Assche
On Wed, 2017-08-16 at 15:10 -0500, Brian King wrote: > On 08/16/2017 01:15 PM, Bart Van Assche wrote: > > On Wed, 2017-08-16 at 23:37 +0530, Abdul Haleem wrote: > > > Linux-next booted with the below warnings on powerpc > > > > > > [ ... ] > > > > > > boot warnings: > > > -- > > > kvm

Re: [v6 01/15] x86/mm: reserve only exiting low pages

2017-08-17 Thread Pasha Tatashin
Hi Michal, While working on a bug that was reported to me by "kernel test robot". unable to handle kernel NULL pointer dereference at (null) The issue was that page_to_pfn() on that configuration was looking for a section inside flags fields in "struct page". So, reserved but unava

Re: [v6 05/15] mm: don't accessed uninitialized struct pages

2017-08-17 Thread Michal Hocko
On Thu 17-08-17 11:28:23, Pasha Tatashin wrote: > Hi Michal, > > I've been looking through this code again, and I think your suggestion will > work. I did not realize this iterator already exist: > > for_each_free_mem_range() basically iterates through (memory && !reserved) > > This is exactly w

Re: [PATCH v4 7/7] ima: Support module-style appended signatures for appraisal

2017-08-17 Thread Mimi Zohar
> diff --git a/security/integrity/ima/ima_appraise.c > b/security/integrity/ima/ima_appraise.c > index 87d2b601cf8e..5a244ebc61d9 100644 > --- a/security/integrity/ima/ima_appraise.c > +++ b/security/integrity/ima/ima_appraise.c > @@ -190,6 +190,64 @@ int ima_read_xattr(struct dentry *dentry, >

Re: [RFC v7 02/25] powerpc: track allocation status of all pkeys

2017-08-17 Thread Ram Pai
On Thu, Aug 10, 2017 at 05:25:39PM -0300, Thiago Jung Bauermann wrote: > > Ram Pai writes: > > static inline void pkey_initialize(void) > > { > > + int os_reserved, i; > > + > > /* disable the pkey system till everything > > * is in place. A patch further down the > > * line wil

Re: [BUG][bisected 270065e] linux-next fails to boot on powerpc

2017-08-17 Thread Bart Van Assche
On Wed, 2017-08-16 at 18:18 -0500, Brian King wrote: > On 08/16/2017 12:21 PM, Bart Van Assche wrote: > > On Wed, 2017-08-16 at 22:30 +0530, Abdul Haleem wrote: > > > As of next-20170809, linux-next on powerpc boot hung with below trace > > > message. > > > > > > [ ... ] > > > > > > A bisection r

Re: [RFC v7 02/25] powerpc: track allocation status of all pkeys

2017-08-17 Thread Ram Pai
On Fri, Aug 11, 2017 at 03:39:14PM +1000, Michael Ellerman wrote: > Thiago Jung Bauermann writes: > > > Ram Pai writes: > >> static inline void pkey_initialize(void) > >> { > >> + int os_reserved, i; > >> + > >>/* disable the pkey system till everything > >> * is in place. A patch fur

Re: [RFC v7 09/25] powerpc: store and restore the pkey state across context switches

2017-08-17 Thread Ram Pai
On Fri, Aug 11, 2017 at 04:34:19PM +1000, Michael Ellerman wrote: > Thiago Jung Bauermann writes: > > > Ram Pai writes: > >> --- a/arch/powerpc/kernel/process.c > >> +++ b/arch/powerpc/kernel/process.c > >> @@ -42,6 +42,7 @@ > >> #include > >> #include > >> #include > >> +#include > >> >

Re: [RFC v7 24/25] powerpc: Deliver SEGV signal on pkey violation

2017-08-17 Thread Ram Pai
On Fri, Aug 11, 2017 at 08:26:30PM +1000, Michael Ellerman wrote: > Thiago Jung Bauermann writes: > > > Ram Pai writes: > > > >> The value of the AMR register at the time of exception > >> is made available in gp_regs[PT_AMR] of the siginfo. > >> > >> The value of the pkey, whose protection got

Re: [PATCH] net: ibm: ibmveth: constify vio_device_id

2017-08-17 Thread David Miller
From: Arvind Yadav Date: Thu, 17 Aug 2017 18:52:53 +0530 > vio_device_id are not supposed to change at runtime. All functions > working with vio_device_id provided by work with > const vio_device_id. So mark the non-const structs as const. > > Signed-off-by: Arvind Yadav Applied.

Re: [PATCH] net: ibm: ibmvnic: constify vio_device_id

2017-08-17 Thread David Miller
From: Arvind Yadav Date: Thu, 17 Aug 2017 18:52:54 +0530 > vio_device_id are not supposed to change at runtime. All functions > working with vio_device_id provided by work with > const vio_device_id. So mark the non-const structs as const. > > Signed-off-by: Arvind Yadav Applied.

[PATCH] tpm: vtpm: constify vio_device_id

2017-08-17 Thread Arvind Yadav
vio_device_id are not supposed to change at runtime. All functions working with vio_device_id provided by work with const vio_device_id. So mark the non-const structs as const. Signed-off-by: Arvind Yadav --- drivers/char/tpm/tpm_ibmvtpm.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)

[PATCH] hwrng: pseries: constify vio_device_id

2017-08-17 Thread Arvind Yadav
vio_device_id are not supposed to change at runtime. All functions working with vio_device_id provided by work with const vio_device_id. So mark the non-const structs as const. Signed-off-by: Arvind Yadav --- drivers/char/hw_random/pseries-rng.c | 2 +- 1 file changed, 1 insertion(+), 1 deletio

Re: [RFC v7 25/25] powerpc: Enable pkey subsystem

2017-08-17 Thread Ram Pai
On Thu, Aug 10, 2017 at 06:27:34PM -0300, Thiago Jung Bauermann wrote: > > Ram Pai writes: > > --- a/arch/powerpc/include/asm/cputable.h > > +++ b/arch/powerpc/include/asm/cputable.h > > @@ -214,6 +214,7 @@ enum { > > #define CPU_FTR_DAWR > > LONG_ASM_CONST(0x04000

Applied "ASoC: fsl: make snd_pcm_hardware const" to the asoc tree

2017-08-17 Thread Mark Brown
The patch ASoC: fsl: make snd_pcm_hardware const has been applied to the asoc tree at git://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound.git All being well this means that it will be integrated into the linux-next tree (usually sometime in the next 24 hours) and sent to Linus du

Applied "ASoC: kirkwood: make snd_pcm_hardware const" to the asoc tree

2017-08-17 Thread Mark Brown
The patch ASoC: kirkwood: make snd_pcm_hardware const has been applied to the asoc tree at git://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound.git All being well this means that it will be integrated into the linux-next tree (usually sometime in the next 24 hours) and sent to Lin

Applied "ASoC: Intel: Atom: make snd_pcm_hardware const" to the asoc tree

2017-08-17 Thread Mark Brown
The patch ASoC: Intel: Atom: make snd_pcm_hardware const has been applied to the asoc tree at git://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound.git All being well this means that it will be integrated into the linux-next tree (usually sometime in the next 24 hours) and sent to

Applied "ASoC: Intel: Skylake: make snd_pcm_hardware const" to the asoc tree

2017-08-17 Thread Mark Brown
The patch ASoC: Intel: Skylake: make snd_pcm_hardware const has been applied to the asoc tree at git://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound.git All being well this means that it will be integrated into the linux-next tree (usually sometime in the next 24 hours) and sent

Applied "ASoC: sh: make snd_pcm_hardware const" to the asoc tree

2017-08-17 Thread Mark Brown
The patch ASoC: sh: make snd_pcm_hardware const has been applied to the asoc tree at git://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound.git All being well this means that it will be integrated into the linux-next tree (usually sometime in the next 24 hours) and sent to Linus dur

Applied "ASoC: qcom: make snd_pcm_hardware const" to the asoc tree

2017-08-17 Thread Mark Brown
The patch ASoC: qcom: make snd_pcm_hardware const has been applied to the asoc tree at git://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound.git All being well this means that it will be integrated into the linux-next tree (usually sometime in the next 24 hours) and sent to Linus d

Re: [RFC Part1 PATCH v3 06/17] x86/mm: Use encrypted access of boot related data with SEV

2017-08-17 Thread Tom Lendacky
On 7/27/2017 8:31 AM, Borislav Petkov wrote: On Mon, Jul 24, 2017 at 02:07:46PM -0500, Brijesh Singh wrote: From: Tom Lendacky When Secure Encrypted Virtualization (SEV) is active, boot data (such as EFI related data, setup data) is encrypted and needs to be accessed as such when mapped. Updat

Re: [RFC Part1 PATCH v3 07/17] x86/mm: Include SEV for encryption memory attribute changes

2017-08-17 Thread Tom Lendacky
On 7/27/2017 9:58 AM, Borislav Petkov wrote: On Mon, Jul 24, 2017 at 02:07:47PM -0500, Brijesh Singh wrote: From: Tom Lendacky The current code checks only for sme_active() when determining whether to perform the encryption attribute change. Include sev_active() in this check so that memory a

Re: [PATCH v6 1/2] powerpc/fadump: reduce memory consumption for capture kernel

2017-08-17 Thread Hari Bathini
Hello Michal, Thanks for the review.. On Tuesday 15 August 2017 04:26 PM, Michal Suchánek wrote: Hello, sorry about the late reply. Looks like I had too much faith in the parse_args sanity. Looking closely the parsing happens in next_arg and only outermost quotes are removed. So presumabl

Re: [RFC Part1 PATCH v3 07/17] x86/mm: Include SEV for encryption memory attribute changes

2017-08-17 Thread Tom Lendacky
On 7/28/2017 3:47 AM, David Laight wrote: From: Borislav Petkov Sent: 27 July 2017 15:59 On Mon, Jul 24, 2017 at 02:07:47PM -0500, Brijesh Singh wrote: From: Tom Lendacky The current code checks only for sme_active() when determining whether to perform the encryption attribute change. Includ

Re: [RFC Part1 PATCH v3 08/17] x86/efi: Access EFI data as encrypted when SEV is active

2017-08-17 Thread Tom Lendacky
On 7/28/2017 5:31 AM, Borislav Petkov wrote: On Mon, Jul 24, 2017 at 02:07:48PM -0500, Brijesh Singh wrote: From: Tom Lendacky EFI data is encrypted when the kernel is run under SEV. Update the page table references to be sure the EFI memory areas are accessed encrypted. Signed-off-by: Tom Le

Re: [RFC Part1 PATCH v3 09/17] resource: Consolidate resource walking code

2017-08-17 Thread Tom Lendacky
On 7/28/2017 10:23 AM, Borislav Petkov wrote: On Mon, Jul 24, 2017 at 02:07:49PM -0500, Brijesh Singh wrote: From: Tom Lendacky The walk_iomem_res_desc(), walk_system_ram_res() and walk_system_ram_range() functions each have much of the same code. Create a new function that consolidates the c

Re: [RFC Part1 PATCH v3 09/17] resource: Consolidate resource walking code

2017-08-17 Thread Tom Lendacky
On 8/17/2017 1:55 PM, Tom Lendacky wrote: On 7/28/2017 10:23 AM, Borislav Petkov wrote: On Mon, Jul 24, 2017 at 02:07:49PM -0500, Brijesh Singh wrote: From: Tom Lendacky The walk_iomem_res_desc(), walk_system_ram_res() and walk_system_ram_range() functions each have much of the same code.

Re: WARNING: CPU: 15 PID: 0 at block/blk-mq.c:1111 __blk_mq_run_hw_queue+0x1d8/0x1f0

2017-08-17 Thread Brian King
On 08/17/2017 10:32 AM, Bart Van Assche wrote: > On Wed, 2017-08-16 at 15:10 -0500, Brian King wrote: >> On 08/16/2017 01:15 PM, Bart Van Assche wrote: >>> On Wed, 2017-08-16 at 23:37 +0530, Abdul Haleem wrote: Linux-next booted with the below warnings on powerpc [ ... ] bo

Re: [RFC Part1 PATCH v3 11/17] x86/mm, resource: Use PAGE_KERNEL protection for ioremap of memory pages

2017-08-17 Thread Tom Lendacky
On 8/1/2017 11:02 PM, Borislav Petkov wrote: On Mon, Jul 24, 2017 at 02:07:51PM -0500, Brijesh Singh wrote: From: Tom Lendacky In order for memory pages to be properly mapped when SEV is active, we need to use the PAGE_KERNEL protection attribute as the base protection. This will insure that m

Re: [RFC PATCH v5 0/5] vfio-pci: Add support for mmapping MSI-X table

2017-08-17 Thread Alex Williamson
On Thu, 17 Aug 2017 10:56:35 + David Laight wrote: > From: Alex Williamson > > Sent: 16 August 2017 17:56 > ... > > Firmware pissing match... Processors running with 8k or less page size > > fall within the recommendations of the PCI spec for register alignment > > of MMIO regions of the d

Re: [RFC Part1 PATCH v3 12/17] x86/mm: DMA support for SEV memory encryption

2017-08-17 Thread Tom Lendacky
On 8/6/2017 10:48 PM, Borislav Petkov wrote: On Mon, Jul 24, 2017 at 02:07:52PM -0500, Brijesh Singh wrote: From: Tom Lendacky DMA access to memory mapped as encrypted while SEV is active can not be encrypted during device write or decrypted during device read. Yeah, definitely rewrite tha

Re: [PATCH] tpm: vtpm: constify vio_device_id

2017-08-17 Thread Jason Gunthorpe
On Thu, Aug 17, 2017 at 11:04:21PM +0530, Arvind Yadav wrote: > vio_device_id are not supposed to change at runtime. All functions > working with vio_device_id provided by work with > const vio_device_id. So mark the non-const structs as const. > > Signed-off-by: Arvind Yadav Reviewed-by: Jason

[PATCH v7 1/4] powerpc/fadump: reduce memory consumption for capture kernel

2017-08-17 Thread Michal Suchanek
From: Hari Bathini With fadump (dump capture) kernel booting like a regular kernel, it needs almost the same amount of memory to boot as the production kernel, which is unwarranted for a dump capture kernel. But with no option to disable some of the unnecessary subsystems in fadump kernel, that m

[PATCH v7 2/4] powerpc/fadump: update documentation about 'fadump_extra_args=' parameter

2017-08-17 Thread Michal Suchanek
From: Hari Bathini With the introduction of 'fadump_extra_args=' parameter to pass additional parameters to fadump (capture) kernel, update documentation about it. Signed-off-by: Hari Bathini Signed-off-by: Michal Suchanek --- Documentation/powerpc/firmware-assisted-dump.txt | 20

[PATCH v7 3/4] lib/cmdline.c Remove quotes symmetrically.

2017-08-17 Thread Michal Suchanek
Remove quotes from argument value only if there is qoute on both sides. Signed-off-by: Michal Suchanek --- arch/powerpc/kernel/fadump.c | 6 ++ lib/cmdline.c| 7 ++- 2 files changed, 4 insertions(+), 9 deletions(-) diff --git a/arch/powerpc/kernel/fadump.c b/arch/powerpc

[PATCH v7 4/4] boot/param: add pointer to next argument to unknown parameter callback

2017-08-17 Thread Michal Suchanek
The fadump parameter processing re-does the logic of next_arg quote stripping to determine where the argument ends. Pass pointer to the next argument instead to make this more robust. Signed-off-by: Michal Suchanek --- arch/powerpc/kernel/fadump.c | 13 + arch/powerpc/mm/hugetlbpage

Re: [RFC v7 25/25] powerpc: Enable pkey subsystem

2017-08-17 Thread Thiago Jung Bauermann
Ram Pai writes: > On Thu, Aug 10, 2017 at 06:27:34PM -0300, Thiago Jung Bauermann wrote: >> >> Ram Pai writes: >> > --- a/arch/powerpc/include/asm/cputable.h >> > +++ b/arch/powerpc/include/asm/cputable.h >> > @@ -214,6 +214,7 @@ enum { >> > #define CPU_FTR_DAWR >> > LON

Re: [RFC v7 02/25] powerpc: track allocation status of all pkeys

2017-08-17 Thread Thiago Jung Bauermann
Ram Pai writes: > On Thu, Aug 10, 2017 at 05:25:39PM -0300, Thiago Jung Bauermann wrote: >> >> Ram Pai writes: >> > static inline void pkey_initialize(void) >> > { >> > + int os_reserved, i; >> > + >> >/* disable the pkey system till everything >> > * is in place. A patch further do

Re: [PATCH v7 3/4] lib/cmdline.c Remove quotes symmetrically.

2017-08-17 Thread msuchanek
On Thu, 17 Aug 2017 22:14:30 +0200 Michal Suchanek wrote: > Remove quotes from argument value only if there is qoute on both > sides. > > Signed-off-by: Michal Suchanek > --- > arch/powerpc/kernel/fadump.c | 6 ++ > lib/cmdline.c| 7 ++- > 2 files changed, 4 insertions(

[PATCH v2 00/20] Speculative page faults

2017-08-17 Thread Laurent Dufour
This is a port on kernel 4.13 of the work done by Peter Zijlstra to handle page fault without holding the mm semaphore [1]. The idea is to try to handle user space page faults without holding the mmap_sem. This should allow better concurrency for massively threaded process since the page fault han

[PATCH v2 01/20] mm: Dont assume page-table invariance during faults

2017-08-17 Thread Laurent Dufour
From: Peter Zijlstra One of the side effects of speculating on faults (without holding mmap_sem) is that we can race with free_pgtables() and therefore we cannot assume the page-tables will stick around. Remove the reliance on the pte pointer. Signed-off-by: Peter Zijlstra (Intel) --- mm/memo

[PATCH v2 02/20] mm: Prepare for FAULT_FLAG_SPECULATIVE

2017-08-17 Thread Laurent Dufour
From: Peter Zijlstra When speculating faults (without holding mmap_sem) we need to validate that the vma against which we loaded pages is still valid when we're ready to install the new PTE. Therefore, replace the pte_offset_map_lock() calls that (re)take the PTL with pte_map_lock() which can fa

[PATCH v2 03/20] mm: Introduce pte_spinlock for FAULT_FLAG_SPECULATIVE

2017-08-17 Thread Laurent Dufour
When handling page fault without holding the mmap_sem the fetch of the pte lock pointer and the locking will have to be done while ensuring that the VMA is not touched in our back. So move the fetch and locking operations in a dedicated function. Signed-off-by: Laurent Dufour --- mm/memory.c |

[PATCH v2 04/20] mm: VMA sequence count

2017-08-17 Thread Laurent Dufour
From: Peter Zijlstra Wrap the VMA modifications (vma_adjust/unmap_page_range) with sequence counts such that we can easily test if a VMA is changed. The unmap_page_range() one allows us to make assumptions about page-tables; when we find the seqcount hasn't changed we can assume page-tables are

[PATCH v2 05/20] mm: Protect VMA modifications using VMA sequence count

2017-08-17 Thread Laurent Dufour
The VMA sequence count has been introduced to allow fast detection of VMA modification when running a page fault handler without holding the mmap_sem. This patch provides protection against the VMA modification done in : - madvise() - mremap() - mpol_rebind_policy()

Re: [PATCH kernel] PCI: Disable IOV before pcibios_sriov_disable()

2017-08-17 Thread Alexey Kardashevskiy
On 11/08/17 18:19, Alexey Kardashevskiy wrote: > From: Gavin Shan > > The PowerNV platform is the only user of pcibios_sriov_disable(). > The IOV BAR could be shifted by pci_iov_update_resource(). The > warning message in the function is printed if the IOV capability > is in enabled (PCI_SRIOV_CT

[PATCH v2 06/20] mm: RCU free VMAs

2017-08-17 Thread Laurent Dufour
From: Peter Zijlstra Manage the VMAs with SRCU such that we can do a lockless VMA lookup. We put the fput(vma->vm_file) in the SRCU callback, this keeps files valid during speculative faults, this is possible due to the delayed fput work by Al Viro -- do we need srcu_barrier() in unmount somepla

[PATCH v2 07/20] mm: Cache some VMA fields in the vm_fault structure

2017-08-17 Thread Laurent Dufour
When handling speculative page fault, the vma->vm_flags and vma->vm_page_prot fields are read once the page table lock is released. So there is no more guarantee that these fields would not change in our back. They will be saved in the vm_fault structure before the VMA is checked for changes. This

[PATCH v2 08/20] mm: Protect SPF handler against anon_vma changes

2017-08-17 Thread Laurent Dufour
The speculative page fault handler must be protected against anon_vma changes. This is because page_add_new_anon_rmap() is called during the speculative path. In addition, don't try speculative page fault if the VMA don't have an anon_vma structure allocated because its allocation should be protec

[PATCH v2 09/20] mm/migrate: Pass vm_fault pointer to migrate_misplaced_page()

2017-08-17 Thread Laurent Dufour
migrate_misplaced_page() is only called during the page fault handling so it's better to pass the pointer to the struct vm_fault instead of the vma. This way during the speculative page fault path the saved vma->vm_flags could be used. Signed-off-by: Laurent Dufour --- include/linux/migrate.h |

[PATCH v2 10/20] mm: Introduce __lru_cache_add_active_or_unevictable

2017-08-17 Thread Laurent Dufour
The speculative page fault handler which is run without holding the mmap_sem is calling lru_cache_add_active_or_unevictable() but the vm_flags is not guaranteed to remain constant. Introducing __lru_cache_add_active_or_unevictable() which has the vma flags value parameter instead of the vma pointer

[PATCH v2 11/20] mm: Introduce __maybe_mkwrite()

2017-08-17 Thread Laurent Dufour
The current maybe_mkwrite() is getting passed the pointer to the vma structure to fetch the vm_flags field. When dealing with the speculative page fault handler, it will be better to rely on the cached vm_flags value stored in the vm_fault structure. This patch introduce a __maybe_mkwrite() servi

[PATCH v2 12/20] mm: Introduce __vm_normal_page()

2017-08-17 Thread Laurent Dufour
When dealing with the speculative fault path we should use the VMA's field cached value stored in the vm_fault structure. Currently vm_normal_page() is using the pointer to the VMA to fetch the vm_flags value. This patch provides a new __vm_normal_page() which is receiving the vm_flags flags value

[PATCH v2 13/20] mm: Introduce __page_add_new_anon_rmap()

2017-08-17 Thread Laurent Dufour
When dealing with speculative page fault handler, we may race with VMA being split or merged. In this case the vma->vm_start and vm->vm_end fields may not match the address the page fault is occurring. This can only happens when the VMA is split but in that case, the anon_vma pointer of the new VM

  1   2   >