[GIT PULL] Please pull powerpc/linux.git powerpc-5.3-3 tag

2019-08-04 Thread Michael Ellerman
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi Linus, Please pull some more powerpc fixes for 5.3: The following changes since commit 609488bc979f99f805f34e9a32c1e3b71179d10b: Linux 5.3-rc2 (2019-07-28 12:47:02 -0700) are available in the git repository at: https://git.kernel.org/pub/

Re: [GIT PULL] Please pull powerpc/linux.git powerpc-5.3-3 tag

2019-08-04 Thread Linus Torvalds
On Sun, Aug 4, 2019 at 4:49 AM Michael Ellerman wrote: > > Please pull some more powerpc fixes for 5.3: Hmm. This was caught by the gmail spam-filter for some reason. I don't see anything particularly different from your normal pull requests, so don't ask me why. The fact that you have no email

Re: [GIT PULL] Please pull powerpc/linux.git powerpc-5.3-3 tag

2019-08-04 Thread pr-tracker-bot
The pull request you sent on Sun, 04 Aug 2019 21:49:44 +1000: > https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git > tags/powerpc-5.3-3 has been merged into torvalds/linux.git: https://git.kernel.org/torvalds/c/4b6f23161b4e888e72671e377c32eabe9a8e62fc Thank you! -- Deet-doot-do

Re: [PATCH] powerpc: Remove inaccessible CMDLINE default

2019-08-04 Thread Chris Packham
On Fri, 2019-08-02 at 07:18 +0200, Christophe Leroy wrote: > > Le 02/08/2019 à 07:02, Chris Packham a écrit : > > > > Since commit cbe46bd4f510 ("powerpc: remove CONFIG_CMDLINE #ifdef > > mess") > > CONFIG_CMDLINE has always had a value regardless of > > CONNIG_CMDLINE_BOOL. > s/CONNIG/CONFIG/ >

[Bug 204479] KASAN hit at modprobe zram

2019-08-04 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=204479 Erhard F. (erhar...@mailbox.org) changed: What|Removed |Added CC||linuxppc-dev@lists.ozla

[Bug 204375] kernel 5.2.4 w. KASAN enabled fails to boot on a PowerMac G4 3,6 at very early stage

2019-08-04 Thread bugzilla-daemon
https://bugzilla.kernel.org/show_bug.cgi?id=204375 --- Comment #14 from Erhard F. (erhar...@mailbox.org) --- With radeon.ko module removed the G4 DP continues and finishes booting with KASAN. So this one seems fixed. Thanks! -- You are receiving this mail because: You are watching the assignee o

SMP lockup at boot on Freescale/NXP T2080 (powerpc 64)

2019-08-04 Thread Chris Packham
Hi All, I have a custom board that uses the Freescale/NXP T2080 SoC. The board boots fine using v4.19.60 but when I use v5.1.21 it locks up waiting for the other CPUs to come online (earlyprintk output below). If I set maxcpus=0 then the system boots all the way through to userland. The same thin

[PATCHv2 1/3] dt-bindings: pci: layerscape-pci: add compatible strings "fsl, ls1028a-pcie"

2019-08-04 Thread Xiaowei Bao
Add the PCIe compatible string for LS1028A Signed-off-by: Xiaowei Bao --- v2: - no change. Documentation/devicetree/bindings/pci/layerscape-pci.txt | 1 + 1 file changed, 1 insertion(+) diff --git a/Documentation/devicetree/bindings/pci/layerscape-pci.txt b/Documentation/devicetree/bindings/

[PATCHv2 3/3] PCI: layerscape: Add LS1028a support

2019-08-04 Thread Xiaowei Bao
Add support for the LS1028a PCIe controller. Signed-off-by: Xiaowei Bao --- v2: - no change. drivers/pci/controller/dwc/pci-layerscape.c | 9 + 1 file changed, 9 insertions(+) diff --git a/drivers/pci/controller/dwc/pci-layerscape.c b/drivers/pci/controller/dwc/pci-layerscape.c index

[PATCHv2 2/3] arm64: dts: ls1028a: Add PCIe controller DT nodes

2019-08-04 Thread Xiaowei Bao
LS1028a implements 2 PCIe 3.0 controllers. Signed-off-by: Xiaowei Bao --- v2: - Fix up the legacy INTx allocate failed issue. arch/arm64/boot/dts/freescale/fsl-ls1028a.dtsi | 52 ++ 1 file changed, 52 insertions(+) diff --git a/arch/arm64/boot/dts/freescale/fsl-ls1028a

[PATCH] powerpc: convert put_page() to put_user_page*()

2019-08-04 Thread john . hubbard
From: John Hubbard For pages that were retained via get_user_pages*(), release those pages via the new put_user_page*() routines, instead of via put_page() or release_pages(). This is part a tree-wide conversion, as described in commit fc1d8e7cca2d ("mm: introduce put_user_page*(), placeholder v

Re: [PATCH v3 06/10] powerpc/fsl_booke/32: implement KASLR infrastructure

2019-08-04 Thread Jason Yan
Hi Diana, On 2019/8/2 16:41, Diana Madalina Craciun wrote: diff --git a/arch/powerpc/kernel/fsl_booke_entry_mapping.S b/arch/powerpc/kernel/fsl_booke_entry_mapping.S index de0980945510..6d2967673ac7 100644 --- a/arch/powerpc/kernel/fsl_booke_entry_mapping.S +++ b/arch/powerpc/kernel/fsl_booke_e

[PATCH v7 0/7] powerpc: implement machine check safe memcpy

2019-08-04 Thread Santosh Sivaraj
During a memcpy from a pmem device, if a machine check exception is generated we end up in a panic. In case of fsdax read, this should only result in a -EIO. Avoid MCE by implementing memcpy_mcsafe. Before this patch series: ``` bash-4.4# mount -o dax /dev/pmem0 /mnt/pmem/ [ 7621.714094] Disablin

[PATCH v7 1/7] powerpc/mce: Schedule work from irq_work

2019-08-04 Thread Santosh Sivaraj
schedule_work() cannot be called from MCE exception context as MCE can interrupt even in interrupt disabled context. fixes: 733e4a4c ("powerpc/mce: hookup memory_failure for UE errors") Signed-off-by: Santosh Sivaraj --- arch/powerpc/kernel/mce.c | 8 +--- 1 file changed, 5 insertions(+), 3

[PATCH v7 2/7] powerpc/mce: Make machine_check_ue_event() static

2019-08-04 Thread Santosh Sivaraj
From: Reza Arbab The function doesn't get used outside this file, so make it static. Signed-off-by: Reza Arbab Signed-off-by: Santosh Sivaraj Reviewed-by: Nicholas Piggin --- arch/powerpc/kernel/mce.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/powerpc/kernel

[PATCH v7 3/7] powerpc/mce: Fix MCE handling for huge pages

2019-08-04 Thread Santosh Sivaraj
From: Balbir Singh The current code would fail on huge pages addresses, since the shift would be incorrect. Use the correct page shift value returned by __find_linux_pte() to get the correct physical address. The code is more generic and can handle both regular and compound pages. Fixes: ba41e1e

[PATCH v7 4/7] extable: Add function to search only kernel exception table

2019-08-04 Thread Santosh Sivaraj
Certain architecture specific operating modes (e.g., in powerpc machine check handler that is unable to access vmalloc memory), the search_exception_tables cannot be called because it also searches the module exception tables if entry is not found in the kernel exception table. Cc: Thomas Gleixner

[PATCH v7 5/7] powerpc/memcpy: Add memcpy_mcsafe for pmem

2019-08-04 Thread Santosh Sivaraj
From: Balbir Singh The pmem infrastructure uses memcpy_mcsafe in the pmem layer so as to convert machine check exceptions into a return value on failure in case a machine check exception is encountered during the memcpy. The return value is the number of bytes remaining to be copied. This patch

[PATCH v7 6/7] powerpc/mce: Handle UE event for memcpy_mcsafe

2019-08-04 Thread Santosh Sivaraj
If we take a UE on one of the instructions with a fixup entry, set nip to continue execution at the fixup entry. Stop processing the event further or print it. Based-on-patch-by: Reza Arbab Cc: Reza Arbab Cc: Mahesh Salgaonkar Signed-off-by: Santosh Sivaraj --- arch/powerpc/include/asm/mce.h

[PATCH v7 7/7] powerpc: add machine check safe copy_to_user

2019-08-04 Thread Santosh Sivaraj
Use memcpy_mcsafe() implementation to define copy_to_user_mcsafe() Signed-off-by: Santosh Sivaraj --- arch/powerpc/Kconfig | 1 + arch/powerpc/include/asm/uaccess.h | 14 ++ 2 files changed, 15 insertions(+) diff --git a/arch/powerpc/Kconfig b/arch/powerpc/Kconfig in

[PATCH v4 02/10] powerpc: move memstart_addr and kernstart_addr to init-common.c

2019-08-04 Thread Jason Yan
These two variables are both defined in init_32.c and init_64.c. Move them to init-common.c. Signed-off-by: Jason Yan Cc: Diana Craciun Cc: Michael Ellerman Cc: Christophe Leroy Cc: Benjamin Herrenschmidt Cc: Paul Mackerras Cc: Nicholas Piggin Cc: Kees Cook Reviewed-by: Christophe Leroy R

[PATCH v4 00/10] implement KASLR for powerpc/fsl_booke/32

2019-08-04 Thread Jason Yan
This series implements KASLR for powerpc/fsl_booke/32, as a security feature that deters exploit attempts relying on knowledge of the location of kernel internals. Since CONFIG_RELOCATABLE has already supported, what we need to do is map or copy kernel to a proper place and relocate. Freescale Boo

[PATCH v4 05/10] powerpc/fsl_booke/32: introduce reloc_kernel_entry() helper

2019-08-04 Thread Jason Yan
Add a new helper reloc_kernel_entry() to jump back to the start of the new kernel. After we put the new kernel in a randomized place we can use this new helper to enter the kernel and begin to relocate again. Signed-off-by: Jason Yan Cc: Diana Craciun Cc: Michael Ellerman Cc: Christophe Leroy

[PATCH v4 04/10] powerpc/fsl_booke/32: introduce create_tlb_entry() helper

2019-08-04 Thread Jason Yan
Add a new helper create_tlb_entry() to create a tlb entry by the virtual and physical address. This is a preparation to support boot kernel at a randomized address. Signed-off-by: Jason Yan Cc: Diana Craciun Cc: Michael Ellerman Cc: Christophe Leroy Cc: Benjamin Herrenschmidt Cc: Paul Mackerr

[PATCH v4 10/10] powerpc/fsl_booke/kaslr: dump out kernel offset information on panic

2019-08-04 Thread Jason Yan
When kaslr is enabled, the kernel offset is different for every boot. This brings some difficult to debug the kernel. Dump out the kernel offset when panic so that we can easily debug the kernel. Signed-off-by: Jason Yan Cc: Diana Craciun Cc: Michael Ellerman Cc: Christophe Leroy Cc: Benjamin

[PATCH v4 07/10] powerpc/fsl_booke/32: randomize the kernel image offset

2019-08-04 Thread Jason Yan
After we have the basic support of relocate the kernel in some appropriate place, we can start to randomize the offset now. Entropy is derived from the banner and timer, which will change every build and boot. This not so much safe so additionally the bootloader may pass entropy via the /chosen/ka

[PATCH v4 06/10] powerpc/fsl_booke/32: implement KASLR infrastructure

2019-08-04 Thread Jason Yan
This patch add support to boot kernel from places other than KERNELBASE. Since CONFIG_RELOCATABLE has already supported, what we need to do is map or copy kernel to a proper place and relocate. Freescale Book-E parts expect lowmem to be mapped by fixed TLB entries(TLB1). The TLB1 entries are not su

[PATCH v4 08/10] powerpc/fsl_booke/kaslr: clear the original kernel if randomized

2019-08-04 Thread Jason Yan
The original kernel still exists in the memory, clear it now. Signed-off-by: Jason Yan Cc: Diana Craciun Cc: Michael Ellerman Cc: Christophe Leroy Cc: Benjamin Herrenschmidt Cc: Paul Mackerras Cc: Nicholas Piggin Cc: Kees Cook Reviewed-by: Christophe Leroy Reviewed-by: Diana Craciun Test

[PATCH v4 03/10] powerpc: introduce kimage_vaddr to store the kernel base

2019-08-04 Thread Jason Yan
Now the kernel base is a fixed value - KERNELBASE. To support KASLR, we need a variable to store the kernel base. Signed-off-by: Jason Yan Cc: Diana Craciun Cc: Michael Ellerman Cc: Christophe Leroy Cc: Benjamin Herrenschmidt Cc: Paul Mackerras Cc: Nicholas Piggin Cc: Kees Cook Reviewed-by

[PATCH v4 01/10] powerpc: unify definition of M_IF_NEEDED

2019-08-04 Thread Jason Yan
M_IF_NEEDED is defined too many times. Move it to a common place. Signed-off-by: Jason Yan Cc: Diana Craciun Cc: Michael Ellerman Cc: Christophe Leroy Cc: Benjamin Herrenschmidt Cc: Paul Mackerras Cc: Nicholas Piggin Cc: Kees Cook Reviewed-by: Christophe Leroy Reviewed-by: Diana Craciun