Re: Upcoming Fedora kernel workflow changes

2020-03-12 Thread Laura Abbott



On 3/12/20 10:57 AM, Bastien Nocera wrote:



- Original Message -


The git tags are still signed by Linus. Does that cover your concerns?


Not really, no. I think that multiplying the intermediaries between kernel.org
and the Fedora repos by adding gitlab.com in the middle might not be the
best of ideas.

If the Fedora security team is fine with it, I'm fine with it, and even if I
understand the practical concerns (pagure not being up to par to deal with
repos that size, and without a mail gateway support), I find it slightly
concerning.



I think this boils down to how much do you trust the kernel maintainers.
Keep in mind that the existing model requires the kernel maintainers
to manually pull down a tree and extract the tarball and then upload.
You can probably trust them to not do anything malicious but mistakes
can happen (source: I screwed up many times). It's good to be concerned
about provenance as a threat model but I consider maintainers screwing
up manual tasks to be a bigger threat model to Fedora kernel security
so anything that moves towards automation is a benefit in my eyes.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: Have the 5.6 kernels dropped support for user input of entropy to the kernel?

2020-02-24 Thread Laura Abbott



On 2/24/20 1:24 PM, stan wrote:

On Mon, 24 Feb 2020 17:29:07 +0100
Florian Weimer  wrote:


* stan:


I built my first 5.6 custom kernel from the src.rpm yesterday in
F31. And my patch to enable the use of a daemon I run to gather
entropy from an rtl2832 (atmospheric) and put it into the kernel to
keep the entropy pool full failed.  This has happened in the past,
that's why I have to patch, but the interface was never removed
before.  If it has been removed, can you point me to the discussion
that led to that decision.


I haven't done a complete analysis yet, the changes are pretty
extensive.  But the marker that the callback used to trigger the daemon
has been removed.

-   .procname   = "read_wakeup_threshold",
-   .data   = _read_wakeup_bits,
-   .maxlen = sizeof(int),
-   .mode   = 0644,
-   .proc_handler   = proc_dointvec_minmax,
-   .extra1 = _read_thresh,
-   .extra2 = _read_thresh,
-   },

This seems to have been replaced with hard-coded functions that read
from specific sources (mouse, key strokes, hard drives, etc.) to gather
system entropy.

I wanted to see the rationale for the changes before I invested the
time to see how it is all working together now, and how to insert my
code without disrupting everything. This is a pretty critical part of
the kernel (I would say vital), so I like to be sure that everything is
making sense, and that it was vetted properly.

I'm not an expert in this, so I could be reading it all wrong, but I
want to investigate before I decide.  The developer description of the
changes and the reasoning behind them would be the place to start.
Maybe the decision was that no one was using this interface, so it
didn't make sense to keep it around (more code to rot, and threaten
security).


https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/drivers/char/random.c?id=c95ea0c69ffda19381c116db2be23c7e654dac98

And the thread if you'd like to read
https://lore.kernel.org/linux-api/cover.1577088521.git.l...@kernel.org/
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


stepping down as fedora kernel maintainer

2020-01-14 Thread Laura Abbott

After quite a bit of soul searching, I've decided to step down from
being a full-time Fedora kernel maintainer and move on to other things.
Having come in as a relative outsider to the Fedora community almost
5 years ago, I deeply appreciate you all welcoming me with open arms.
I still expect to be around to some degree but probably not as
directly involved on a day-to-day basis. I would also like to thank
jcline, jforbes and jwboyer for being amazing supportive teammates
during my tenure. Thank you everyone for being patient as I attempted
to fix more bugs than I introduced in the kernel.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: NO_HZ_IDLE on x86_64?

2019-12-13 Thread Laura Abbott

On 12/12/19 9:10 AM, Justin Forbes wrote:

On Thu, Dec 12, 2019 at 3:48 AM Peter Robinson  wrote:


Hey All.

In digging through some pieces around CPU_IDLE I noticed that
NO_HZ_IDLE is explicitly disabled on x86_64 but not on all other
architectures.

Doing a "git log --follow
configs/fedora/generic/x86/x86_64/CONFIG_NO_HZ_IDLE" it goes all the
way back to 2016 when we changed the way the configs were handled.

The upstream kernel's opinion [1] on it is "Most of the time you want
to say Y here." so I'm wondering if there's a reason why we're
difference on x86_64 or is it just lost in the winds of time?

Peter

PS was digging around CPU_IDLE_GOV_TEO for those curious.

[1] https://cateee.net/lkddb/web-lkddb/NO_HZ_IDLE.html



commit 3836faf6e68495fc70316229a3540506f7ce4c98
Author: Kyle McMartin 
Date:   Wed Sep 17 13:10:12 2014 -0500

 re-enable RCU_FAST_NO_HZ, enable NO_HZ_FULL on x86_64

 - I also like to live dangerously. (Re-enable RCU_FAST_NO_HZ which
has been off
   since April 2012. Also enable NO_HZ_FULL on x86_64.)


Yeah I wouldn't quite say it's been "lost" but the real question
is if it still makes sense. I don't have a strong opinion without
data. Prarit, any opinion here?
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: bringing back tools/perf into the kernel.spec file

2019-12-03 Thread Laura Abbott

On 11/8/19 11:32 AM, Laura Abbott wrote:

Hi,

Continuing on the theme of bringing things into Fedora, one other
task I'm currently looking at is bringing the tools building back
into the kernel.spec file for testing purposes only.

Fedora split the kernel-tools and userspace packages out into
a separate repository at least two years ago. From my perspective,
this has been a success since we've been able to avoid issues with
tools breaking kernel builds and let the userspace tools build in
a more standard way since we don't need to do all the weird hacks
to build the kernel.

This change has encountered some resistance downstream since their
workflow involves more process and splitting out into a separate
repository could potentially have more impact. I'm still working
to resolve this but as an intermediate step I'd like to bring
back the build commands into the kernel.spec file. We'd still
keep building the tools in a separate repository but this would
at least let us work towards the goal of having a common tree.
If we decide to go with the split downstream, we will remove it
again. If we decide to not go with the split downstream, I
expect Fedora will want to follow and we'll need to bring the
code back in anyway.

I don't know exactly when I'll be getting to this but this is
just a heads up that this work will be coming.

Thanks,
Laura


I ended up pushing this work today. As always, let me know
if you see any issues.
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: cleaning out some scripts from the kernel dist-git

2019-12-03 Thread Laura Abbott

On 11/22/19 4:27 PM, Laura Abbott wrote:

The kernel dist-git has a number of scripts in the script directory.
Some are used for regular work (stable-update.sh, rawhide-rc.sh,
rawhide-snapshot.sh) but some of them haven't been used in a
long time. I'd like to delete the following:

- check-patchlist.sh
- check-TODO.sh
- combine.sh
- grab-logs.sh
- newpatch.sh

Does anyone have an issue with removing these scripts?

Thanks,
Laura


I ended up removing this along with a few more files that were floating
around. As always, let me know if I removed something I shouldn't have.
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: [PATCH] Upstream fix for Raven Ridge

2019-11-25 Thread Laura Abbott

On 11/24/19 12:38 AM, Luya Tshimbalanga wrote:

Hello team,

Upstream provided several bug fix related to AMD APU Raven Ridge which hangs 
when using some applications like radeontop to read its interface [1]. Test 
model was 2018 HP Envy x360 Ryzen 2500U (device id 15dd):

drm/amdgpu: disable gfxoff when using register read interface
--

https://cgit.freedesktop.org/~agd5f/linux/commit/?h=drm-fixes-5.4=c57040d333c6729ce99c2cb95061045ff84c89ea

Original Raven Ridge (15d8) becomes unstable when using gfxoff. The test model  
Ryzen 2500U with id 15dd and above is unaffected

drm/amdgpu: disable gfxoff on original raven
-

https://cgit.freedesktop.org/~agd5f/linux/commit/?h=drm-fixes-5.4=941a0a7945c39f36a16634bc65c2649a1b94eee1


Revert "drm/amd/display: enable S/G for RAVEN chip"



https://cgit.freedesktop.org/~agd5f/linux/commit/?h=drm-fixes-5.4=a0184d71163aab258d73141a8839675d6cbdcf40


It will be nice to backport for the current kernel 5.3. Thanks in advance.



Do the fixes apply cleanly to 5.3? I saw they are tagged for stable
so it may just be easier to wait until they show up there. Given the
time frame, it may end up about the same as waiting for 5.4 anyway.
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: Building custom kernel using rpmbuild method fails with config conflicts between kernel-local and x86_64.config

2019-11-25 Thread Laura Abbott

On 11/25/19 11:02 AM, stan wrote:

On Mon, 25 Nov 2019 08:15:46 -0500
Laura Abbott  wrote:
  

The process_configs.sh checks are designed to catch values changing
unexpecedtly the message

override: PSTORE_LZ4HC_COMPRESS_DEFAULT changes choice state

This indicates that some value set are now changed. This looks like
process_configs doing its job and not an actual error. It's also a
little hard to tell without seeing the full build log and what
changes you are actually making. I see two options:


Then this makes the kernel-local obsolete, because the point of having
a kernel-local file is to change config options from the default state.

I'm making extensive changes to the config file to customize it for my
system exclusively.  File systems I don't use are gone.  Graphics
devices I don't use are gone.  Ditto audio devices.  Ditto network
cards.  etc.

When I use the custom config file with make oldconfig, there are no
complaints.

I notice that this is a warning rather than an actual error, even
though the configcheck is treating it as an error.  Could configcheck
be changed to allow warnings to pass?  Is there already a switch I can
pass to configcheck that does so?



Your changes to kernel-local should still be going through when
you build, if not that is absolutely a bug that needs to get fixed.
The message "override" is coming from the kernel tree not the
Fedora kernel tree

What process_configs.sh is doing is checking to make sure all of
the settings you have given will not get changed. Kconfig will silently
switch the settings of options if you set things incorrectly, (switching
from =y to =m or just turning options off completely) which can
be confusing. The goal of these checks is to be pedantic and make
sure all the values are set to what you expect. We actually want
to treat all warnings as errors because even if Kconfig thinks this
is a warning, the actual issue is that CONFIG_PSTORE_LZ4HC_COMPRESS_DEFAULT
may not be what you expect.



1) Update the set of options you are setting to set all appropriate
dependencies


I tried this by setting various values in both kernel-local and in the
rpmbuild/SOURCES/kernel*.config file.  No dice.  Next kernel I build,
I'll do it in make menuconfig to see if it makes a difference.


2) Turn off the checking by building --without configchecks


It looks like this is what I'll have to do, though I don't like
bypassing consistency checks.  Heh, my kernels have been building and
running fine for years without this, so maybe it's OK.  :-)



If the options you've been using are working, it's probably fine
to turn the checks.
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: Building custom kernel using rpmbuild method fails with config conflicts between kernel-local and x86_64.config

2019-11-25 Thread Laura Abbott

On 11/24/19 1:00 PM, stan wrote:

I use the src.rpm from rawhide kernels to build a kernel custom
configured for my hardware in F31, and with a local patch, using the
old rpmbuild method. For rc5 this worked, when I tried rc7 it didn't.
And rc8 is failing with the same error.  The error message is this:
scripts/gen_compile_commands.py: updating
Processing 
/home/stan/rpmbuild/BUILD/kernel-5.3.fc31/linux-5.4.0-0.rc8.git1.2.20191124.fc31.x86_64/configs/kernel-5.4.0-aarch64.config
 ... done
Processing 
/home/stan/rpmbuild/BUILD/kernel-5.3.fc31/linux-5.4.0-0.rc8.git1.2.20191124.fc31.x86_64/configs/kernel-5.4.0-armv7hl-lpae.config
 ... done
Processing 
/home/stan/rpmbuild/BUILD/kernel-5.3.fc31/linux-5.4.0-0.rc8.git1.2.20191124.fc31.x86_64/configs/kernel-5.4.0-armv7hl.config
 ... done
Processing 
/home/stan/rpmbuild/BUILD/kernel-5.3.fc31/linux-5.4.0-0.rc8.git1.2.20191124.fc31.x86_64/configs/kernel-5.4.0-i686.config
 ... done
Processing 
/home/stan/rpmbuild/BUILD/kernel-5.3.fc31/linux-5.4.0-0.rc8.git1.2.20191124.fc31.x86_64/configs/kernel-5.4.0-ppc64le.config
 ... done
Processing 
/home/stan/rpmbuild/BUILD/kernel-5.3.fc31/linux-5.4.0-0.rc8.git1.2.20191124.fc31.x86_64/configs/kernel-5.4.0-s390x.config
 ... done
Processing 
/home/stan/rpmbuild/BUILD/kernel-5.3.fc31/linux-5.4.0-0.rc8.git1.2.20191124.fc31.x86_64/configs/kernel-5.4.0-x86_64.config
 ... Found misconfigured config items, please set them to an appropriate value
/home/stan/rpmbuild/BUILD/kernel-5.3.fc31/linux-5.4.0-0.rc8.git1.2.20191124.fc31.x86_64/configs/kernel-5.4.0-x86_64.config.orig:4359:warning:
 override: PSTORE_LZ4HC_COMPRESS_DEFAULT changes choice state

So, kernel-local is not overriding the default kernel configuration.  I
think it should; so whatever is checking the configuration consistency
has a bug, I think.



The process_configs.sh checks are designed to catch values changing
unexpecedtly the message

override: PSTORE_LZ4HC_COMPRESS_DEFAULT changes choice state

This indicates that some value set are now changed. This looks like 
process_configs
doing its job and not an actual error. It's also a little hard to tell without
seeing the full build log and what changes you are actually making.
I see two options:

1) Update the set of options you are setting to set all appropriate
dependencies
2) Turn off the checking by building --without configchecks
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: Even though I have nobuild set for architectures, rpmbuild is processing their configs. Is this correct?

2019-11-25 Thread Laura Abbott

On 11/24/19 1:10 PM, stan wrote:

I build a custom local kernel using the rawhide kernel src.rpm here on
F31.  I change the spec file to build only for my arch, x86_64, and not
to build cross headers. But I notice that the config files for all the
nobuild archs are still processed.  This seems like an error to me.  Is
it?



What you are suggesting is an optimization. There's no technical issue
with running the checks on nobuild arches. If you have a patch to
not run the checks we can see about incorporating it.


In the kernel.spec file.

%define nobuildarches i386 i686 ppc64 s390x %{arm} %{power64} aarch64 ppc64le

Output from rpmbuild -bb kernel.spec.

Processing 
/home/stan/rpmbuild/BUILD/kernel-5.3.fc31/linux-5.4.0-0.rc8.git1.2.20191124.fc31.x86_64/configs/kernel-5.4.0-aarch64.config
 ... done
Processing 
/home/stan/rpmbuild/BUILD/kernel-5.3.fc31/linux-5.4.0-0.rc8.git1.2.20191124.fc31.x86_64/configs/kernel-5.4.0-armv7hl-lpae.config
 ... done
Processing 
/home/stan/rpmbuild/BUILD/kernel-5.3.fc31/linux-5.4.0-0.rc8.git1.2.20191124.fc31.x86_64/configs/kernel-5.4.0-armv7hl.config
 ... done
Processing 
/home/stan/rpmbuild/BUILD/kernel-5.3.fc31/linux-5.4.0-0.rc8.git1.2.20191124.fc31.x86_64/configs/kernel-5.4.0-i686.config
 ... done
Processing 
/home/stan/rpmbuild/BUILD/kernel-5.3.fc31/linux-5.4.0-0.rc8.git1.2.20191124.fc31.x86_64/configs/kernel-5.4.0-ppc64le.config
 ... done
Processing 
/home/stan/rpmbuild/BUILD/kernel-5.3.fc31/linux-5.4.0-0.rc8.git1.2.20191124.fc31.x86_64/configs/kernel-5.4.0-s390x.config
 ... done
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


cleaning out some scripts from the kernel dist-git

2019-11-22 Thread Laura Abbott

The kernel dist-git has a number of scripts in the script directory.
Some are used for regular work (stable-update.sh, rawhide-rc.sh,
rawhide-snapshot.sh) but some of them haven't been used in a
long time. I'd like to delete the following:

- check-patchlist.sh
- check-TODO.sh
- combine.sh
- grab-logs.sh
- newpatch.sh

Does anyone have an issue with removing these scripts?

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: Some more upcoming Fedora kernel changes

2019-11-11 Thread Laura Abbott

On 11/9/19 12:51 PM, Jóhann B. Guðmundsson wrote:

Hi

On 11/8/19 4:19 PM, Laura Abbott wrote:

Hi,

I'm looking to bring in another piece of downstream work into Fedora
sometime next week. The short summary is that Fedora will be bringing
in some files to build against a RHEL buildroot but Fedora will still
be the same. 



If you change a board in a boat is it still the same boat?, If you change 10 
boards in the boat is it still the same boat? 100 boards, thousands and in the 
when you have replaced it all?

This looks like some backward move should not downstream be adopting Fedora not 
the other way around?

What's the end game here in general and for the other components in the 
distribution. How long before we be entirely colonized by RHEL?



I can't speak for other components but at least for the kernel this work
is attempting to bridge the gap between RHEL and Fedora that's been
around for too long and keeps growing. The goal is to help both RHEL
and Fedora take fixes and feedback from each other.

In an ideal world, yes downstream would be adopting Fedora and
they do to a degree. The bigger issue is that changes happen in
downstream and then don't get back into Fedora or only get added
back as an afterthought. Some things we don't care about but some
are actual bug fixes or fixes we might want. A good example is
some downstream work for optimizing module compression in the
spec file. This would help Fedora as well but it never got submitted.

Even when RHEL does take what Fedora has done upstream,
there have been issues with integration. A good example here is
the split into kernel-core and kernel-modules. This worked fine
technically but when RHEL picked it up there were some unexpected
issues (documentation updates and I think a few scripts)

To try and bridge this gap, we're working to get a src-git tree
that works for both Fedora and RHEL. Even without the RHEL
component, using a src-git tree for most of our daily work
in Fedora would be a good thing. dist-git tends to trip up
people who want to build their own kernels, especially if they
are trying to build something non-trivial (e.g. an entire
graphics branch). src-git is what most work is done in anyway.
The RHEL kernel tree has been src-git based for a while so
aligning on that makes sense.

I realize my wording about "Fedora will still be the same"
was vague. None of this work should meaningfully impact the
kernel binaries generated by the Fedora build process. Kernel
configuration options are still the same, external modules should
still build. Parts of the build process may change and some
extra files will be packaged. So yes some things _will_ change
but it should be changes that are transparent to users or
have minimal impact. If these changes cause regressions or
are not acceptable for other reasons, I'm more than willing to
fix or revert. One of the changes I brought in (weak-updates)
caused a regression due to missing a fix in kmod. I reverted
it for now and will be bringing it back when things are built.

Part of "Fedora will still be the same" means that our current
policies are still in place. Fedora still has the freedom to make
changes how it wants. We can still turn on configuration options
and make build changes as we need. We're not getting RHEL process
(cheering from the background). What we'd like to change is to
be more thoughtful about what will happen for RHEL down the road.
This means that when Fedora sets configuration options and build
changes, we'll be reviewing what we want to happen for RHEL as
well. This doesn't mean RHEL gets to come in an dictate what
happens but like other community members, RHEL can say "I see
you are making change X. This impacts me in way Y. Can we
consider change Z instead to lessen my impact?". Sometimes the
answer is no, we're doing X and then RHEL gets to figure out how
to workaround this. We already see this happening with things like
configuration options (e.g. CONFIG_LIBNVDIMM
https://bugzilla.redhat.com/show_bug.cgi?id=1696481)
This freedom to make changes makes it easier for downstream as
well since we can say "well Fedora has had CONFIG_BLAH on for
months now and there have been no complaints".

Fedora has an incredibly valuable community and the goal here
is not to subvert it but make sure we can bring the benefits of
that community back to downstream in the kernel. I also look forward
to bringing more downstream kernel developers into Fedora so they can
continue making changes and fixes directly in Fedora.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


bringing back tools/perf into the kernel.spec file

2019-11-08 Thread Laura Abbott

Hi,

Continuing on the theme of bringing things into Fedora, one other
task I'm currently looking at is bringing the tools building back
into the kernel.spec file for testing purposes only.

Fedora split the kernel-tools and userspace packages out into
a separate repository at least two years ago. From my perspective,
this has been a success since we've been able to avoid issues with
tools breaking kernel builds and let the userspace tools build in
a more standard way since we don't need to do all the weird hacks
to build the kernel.

This change has encountered some resistance downstream since their
workflow involves more process and splitting out into a separate
repository could potentially have more impact. I'm still working
to resolve this but as an intermediate step I'd like to bring
back the build commands into the kernel.spec file. We'd still
keep building the tools in a separate repository but this would
at least let us work towards the goal of having a common tree.
If we decide to go with the split downstream, we will remove it
again. If we decide to not go with the split downstream, I
expect Fedora will want to follow and we'll need to bring the
code back in anyway.

I don't know exactly when I'll be getting to this but this is
just a heads up that this work will be coming.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Some more upcoming Fedora kernel changes

2019-11-08 Thread Laura Abbott

Hi,

I'm looking to bring in another piece of downstream work into Fedora
sometime next week. The short summary is that Fedora will be bringing
in some files to build against a RHEL buildroot but Fedora will still
be the same.

The longer answer:
The goal with this work is bring Fedora and RHEL closer together and
reduce work between the kernels. What we'd like to happen is that
if we build against a Fedora buildroot we bring in the Fedora kernel
configuration options and if we're building against a RHEL buildroot
we bring in the RHEL kernel configuration. What this will do is let
us test and verify configuration options easily in both RHEL and
Fedora configuration without having to do redundant work.

As a step towards this goal, I'll be bringing in some changes to
the build scripts and moving some files around. You'll see a number
of empty files brought in for the RHEL side just as a place holder.
Part of this work also involves bringing in a few certificates for
RHEL secureboot signing on powerpc and s390x.

A big part of this goal is to let Fedora do most of its work
from a src-git tree. The reason I'm working to bring parts of these
commits in now is so when it comes time to start using the src-git
tree the diff doesn't look so scary. Small changes help make sure
things aren't getting broken (I've already found a few things that
need to be fixed during the course of this work)

My goal is to still keep Fedora stable and let Fedora be Fedora.
I expect to keep tweaking the scripts to make the process easier.
If you have feedback, feel free to let me know.

You can see the tree with some other changes at
https://pagure.io/fedora-kernel-labbott/tree/ark_sync_nov8

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: [PATCH] Enable CONFIG_DEBUG_INFO_BTF option

2019-11-01 Thread Laura Abbott

On 10/31/19 1:04 PM, Jiri Olsa wrote:

hi,
please consider attached patch for fedora kernel.spec.
It enables CONFIG_DEBUG_INFO_BTF options to export BTF
info in /sys/kernel/btf/vmlinux file.

I tested on x86_64/s390x/aarach64/ppc servers and the
file /sys/kernel/btf/vmlinux shows correctly.

I checked the armv7hl arch build.log and it containes
the pahole execution, so I assume it's generated properly.

brew: https://koji.fedoraproject.org/koji/taskinfo?taskID=38681853

thanks,
jirka



I applied to rawhide. Thanks!



---
Plus adding dwarves build dependency which is needed
for BTF debuginfo to be generated and attached to kernel.

Signed-off-by: Jiri Olsa 
---
  configs/fedora/generic/CONFIG_DEBUG_INFO_BTF | 2 +-
  kernel-aarch64-debug.config  | 2 +-
  kernel-aarch64.config| 2 +-
  kernel-armv7hl-debug.config  | 2 +-
  kernel-armv7hl-lpae-debug.config | 2 +-
  kernel-armv7hl-lpae.config   | 2 +-
  kernel-armv7hl.config| 2 +-
  kernel-i686-debug.config | 2 +-
  kernel-i686.config   | 2 +-
  kernel-ppc64le-debug.config  | 2 +-
  kernel-ppc64le.config| 2 +-
  kernel-s390x-debug.config| 2 +-
  kernel-s390x.config  | 2 +-
  kernel-x86_64-debug.config   | 2 +-
  kernel-x86_64.config | 2 +-
  kernel.spec  | 3 ++-
  16 files changed, 17 insertions(+), 16 deletions(-)

diff --git a/configs/fedora/generic/CONFIG_DEBUG_INFO_BTF 
b/configs/fedora/generic/CONFIG_DEBUG_INFO_BTF
index 3b5ac748f282..39227b4511af 100644
--- a/configs/fedora/generic/CONFIG_DEBUG_INFO_BTF
+++ b/configs/fedora/generic/CONFIG_DEBUG_INFO_BTF
@@ -1 +1 @@
-# CONFIG_DEBUG_INFO_BTF is not set
+CONFIG_DEBUG_INFO_BTF=y
diff --git a/kernel-aarch64-debug.config b/kernel-aarch64-debug.config
index 25917ed7c0a2..f40220d5c179 100644
--- a/kernel-aarch64-debug.config
+++ b/kernel-aarch64-debug.config
@@ -1289,7 +1289,7 @@ CONFIG_DEBUG_FS=y
  # CONFIG_DEBUG_GPIO is not set
  CONFIG_DEBUG_HIGHMEM=y
  # CONFIG_DEBUG_HOTPLUG_CPU0 is not set
-# CONFIG_DEBUG_INFO_BTF is not set
+CONFIG_DEBUG_INFO_BTF=y
  # CONFIG_DEBUG_INFO_DWARF4 is not set
  # CONFIG_DEBUG_INFO_REDUCED is not set
  # CONFIG_DEBUG_INFO_SPLIT is not set
diff --git a/kernel-aarch64.config b/kernel-aarch64.config
index aaa967b286df..55f21773af73 100644
--- a/kernel-aarch64.config
+++ b/kernel-aarch64.config
@@ -1289,7 +1289,7 @@ CONFIG_DEBUG_FS=y
  # CONFIG_DEBUG_GPIO is not set
  CONFIG_DEBUG_HIGHMEM=y
  # CONFIG_DEBUG_HOTPLUG_CPU0 is not set
-# CONFIG_DEBUG_INFO_BTF is not set
+CONFIG_DEBUG_INFO_BTF=y
  # CONFIG_DEBUG_INFO_DWARF4 is not set
  # CONFIG_DEBUG_INFO_REDUCED is not set
  # CONFIG_DEBUG_INFO_SPLIT is not set
diff --git a/kernel-armv7hl-debug.config b/kernel-armv7hl-debug.config
index d7d7a9f0a485..d54ce8ceb0e9 100644
--- a/kernel-armv7hl-debug.config
+++ b/kernel-armv7hl-debug.config
@@ -1279,7 +1279,7 @@ CONFIG_DEBUG_FS=y
  # CONFIG_DEBUG_GPIO is not set
  CONFIG_DEBUG_HIGHMEM=y
  # CONFIG_DEBUG_HOTPLUG_CPU0 is not set
-# CONFIG_DEBUG_INFO_BTF is not set
+CONFIG_DEBUG_INFO_BTF=y
  # CONFIG_DEBUG_INFO_DWARF4 is not set
  # CONFIG_DEBUG_INFO_REDUCED is not set
  # CONFIG_DEBUG_INFO_SPLIT is not set
diff --git a/kernel-armv7hl-lpae-debug.config b/kernel-armv7hl-lpae-debug.config
index adda1dc48d4e..e049ebdddacf 100644
--- a/kernel-armv7hl-lpae-debug.config
+++ b/kernel-armv7hl-lpae-debug.config
@@ -1239,7 +1239,7 @@ CONFIG_DEBUG_FS=y
  # CONFIG_DEBUG_GPIO is not set
  CONFIG_DEBUG_HIGHMEM=y
  # CONFIG_DEBUG_HOTPLUG_CPU0 is not set
-# CONFIG_DEBUG_INFO_BTF is not set
+CONFIG_DEBUG_INFO_BTF=y
  # CONFIG_DEBUG_INFO_DWARF4 is not set
  # CONFIG_DEBUG_INFO_REDUCED is not set
  # CONFIG_DEBUG_INFO_SPLIT is not set
diff --git a/kernel-armv7hl-lpae.config b/kernel-armv7hl-lpae.config
index b3788525651d..e572f653140f 100644
--- a/kernel-armv7hl-lpae.config
+++ b/kernel-armv7hl-lpae.config
@@ -1239,7 +1239,7 @@ CONFIG_DEBUG_FS=y
  # CONFIG_DEBUG_GPIO is not set
  CONFIG_DEBUG_HIGHMEM=y
  # CONFIG_DEBUG_HOTPLUG_CPU0 is not set
-# CONFIG_DEBUG_INFO_BTF is not set
+CONFIG_DEBUG_INFO_BTF=y
  # CONFIG_DEBUG_INFO_DWARF4 is not set
  # CONFIG_DEBUG_INFO_REDUCED is not set
  # CONFIG_DEBUG_INFO_SPLIT is not set
diff --git a/kernel-armv7hl.config b/kernel-armv7hl.config
index 6e8ea6ec9783..e840ac68c870 100644
--- a/kernel-armv7hl.config
+++ b/kernel-armv7hl.config
@@ -1279,7 +1279,7 @@ CONFIG_DEBUG_FS=y
  # CONFIG_DEBUG_GPIO is not set
  CONFIG_DEBUG_HIGHMEM=y
  # CONFIG_DEBUG_HOTPLUG_CPU0 is not set
-# CONFIG_DEBUG_INFO_BTF is not set
+CONFIG_DEBUG_INFO_BTF=y
  # CONFIG_DEBUG_INFO_DWARF4 is not set
  # CONFIG_DEBUG_INFO_REDUCED is not set
  # CONFIG_DEBUG_INFO_SPLIT is not set
diff --git a/kernel-i686-debug.config b/kernel-i686-debug.config
index 7ef076f3646f..bd6a05f5004f 100644
--- 

New subpackages for Fedora

2019-10-25 Thread Laura Abbott

Some of the downstream work I'm looking to bring back into Fedora is
some new subpackages. Here's a brief explanation of what I'd like to
bring in:

- several packages with 'kabi' in the name. These are related to downstream
ABI guarantees. All of the packages would be turned off for Fedora. No
Fedora isn't getting any ABI guarantee.

- ipaclones: this is related to kpatch support. This package will be turned
off in Fedora. There are no plans to get kpatch support for Fedora at
this time but like any feature if it makes sense to support it in the
future we would consider it.

- selftests: These are some bpf related selftests. This package will be
turned off in Fedora.

- modules-internal: Downstream wanted to designate a set of modules
that get turned on but are not officially shipped. The existing
design ends up building this package unconditionally so I was planning
on bringing this in for Fedora. There are currently 4 modules that
are designated for this package at the moment:

mac80211_hwsim
netdevsim
pktgen
rocker

None of these seem like things that would be used in a regular Fedora
system so I think it would be safe to move them around.

I don't expect any of these changes to be particularly controversial
but please let me know if you see any issue with this.

I have a tree at https://pagure.io/fedora-kernel-labbott/tree/align_fedora_oct25
with everything I'd like to bring in. I've been testing and everything seems
to work fine. If there are no objections, I plan to bring this in sometime
next week.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Talk from Flock up and a note on some upcoming work

2019-10-21 Thread Laura Abbott

If you didn't get a chance to see it, the talk I gave at Flock is up
https://www.youtube.com/watch?v=kb2VS2_P6Ts . I'm linking this not
for self-promotion but to give a heads up that some of the work
related to this talk may start to land in Fedora. Some of the boring
cleanup work will just go in but for some of the bigger pieces
I'll post here to see if anyone has any objections.

The goal is to eventually get a src-git that we can use as the daily
driver for most of the Fedora work. When that switch over will actually
happen depends on when we get a tree that meets Fedora needs. I don't
want to regress Fedora or violate any packaging guidelines or make
anything harder.

If you have any questions, feel free to reach out to me.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: Kernel 5.3 rebase plans

2019-10-08 Thread Laura Abbott

On 10/8/19 6:51 AM, Thorsten Leemhuis wrote:

Laura Abbott schrieb am 16.09.19 um 16:24:


Kernel 5.3 was released upstream yesterday Sept 16. Fedora will be
following the same rebase schedule as with past kernels. This means
F30 will be rebased to 5.3 first followed by F29 shortly thereafter.
We typically wait until the 2nd or 3rd stable release to push a
rebase. Based on past timings, I'd expect this to happen around
mid-October.


Would it be wise to tighten the "same rebase schedule as with past
kernels" a little bit in the future (maybe by one week)?

Just wondering, as it seems the fast few transitions from one version
line to the next iirc all finished some time after a line went EOL. This
time it looks worse: 5.2 is EOL as of today and 5.3 hasn't even hit
updates-testing for the current Fedora release yet afics. And the
stabilization copr wasn't much in action this time either.

But whatever, I assume there are reasons why things are a little bit
more bumpy this time, that not why I'm writing this mail. I was just
wondering if a slightly faster schedule for the rebases might be a good
idea in general.

CU, knurd



The timing is kind of tricky because once we push a rebase we are stuck
with it. That means if key CVEs come in we have to work to get them
on the next kernel. It's also usually good to wait for the next merge
window to close so any really obvious fixes have a chance to make
it to a .1 or .2 stable kernels. We also wanted to wait for the
kernel test week to complete, which happened last week. Based on all
that's, that's how we got to the date today. We might be able to
push a few of these things next time but it's also very hard to
tell since sometimes the early releases are mostly unusable.

As for the stabilization copr, part of that was my fault for not
being diligent there since I was traveling the last two weeks. I did
the initial test build to make sure my f30 rebase was okay (didn't
miss any pieces) and then mostly left it alone since I figured
it would be just as easy to run the f31 kernel which was already on
5.3.

I do appreciate the feedback.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: Support buildid in kernel-headers

2019-09-30 Thread Laura Abbott

On 9/26/19 11:44 AM, Paul Moore wrote:

On Wed, Aug 21, 2019 at 3:30 PM Paul Moore  wrote:

On Wed, 2019-08-21 at 14:48 -0400, Josh Boyer wrote:

On Wed, Aug 21, 2019 at 2:47 PM Paul Moore 
wrote:

Hello,

Last year there was a change to how the kernel-headers package is
built, and unfortunately that change made it so that changes to the
kernel's buildid variable do not carryover to the the kernel-
header's
build.  While I recognize that this is problem that only affects a
small number of people, it would be nice to see this fixed.

I'm attaching a small patch which fixes this for my use case, and


The list strips attachments.  Can you send it inline?


Sorry about that, a little birdie warned me against sending patches inline to 
this list (something about whitespace
mangling), but the patch is pasted below.  Also, in the case there are issues, 
I put a copy of the patch here:


Any thoughts on fixing this problem?



Thanks for the reminder this completely slipped my mind. I put this into
rawhide and we can test it for a few releases of that. If it works, we can
also bring it into the stable releases.


--- scripts/create_headers_tarball.sh.orig  2019-05-06 17:50:49.533846042 
-0400
+++ scripts/create_headers_tarball.sh   2019-05-06 17:57:54.259359305 -0400
@@ -26,13 +26,14 @@ BASE=`grep "%define base_sublevel" kerne
  STABLE=`grep "%define stable_update" kernel.spec| cut -d ' ' -f 3`
  RC=`grep "%global rcrev" kernel.spec| cut -d ' ' -f 3`
  GITREV=`grep "%define gitrev" kernel.spec| cut -d ' ' -f 3`
+BUILDID=`grep "^%define buildid" kernel.spec| cut -d ' ' -f 3`
  if [ $RELEASED -eq 0 ]; then
 cd kernel-$MAJORVER.$BASE.fc??
 NEWBASE=$(($BASE+1))
-   KVER=$MAJORVER.$NEWBASE.0-0.rc$RC.git$GITREV.$BASERELEASE
-   cd linux-$MAJORVER.$NEWBASE.0-0.rc$RC.git$GITREV.$BASERELEASE.fc*/
+   KVER=$MAJORVER.$NEWBASE.0-0.rc$RC.git$GITREV.$BASERELEASE$BUILDID
+   cd 
linux-$MAJORVER.$NEWBASE.0-0.rc$RC.git$GITREV.$BASERELEASE$BUILDID.fc*/
  else
-   cd 
kernel-$MAJORVER.$BASE.fc??/linux-$MAJORVER.$BASE.$STABLE-$BASERELEASE.fc*/
+   cd 
kernel-$MAJORVER.$BASE.fc??/linux-$MAJORVER.$BASE.$STABLE-$BASERELEASE$BUILDID.fc*/
 KVER=$MAJORVER.$BASE.$STABLE-$BASERELEASE
  fi

@@ -64,6 +65,7 @@ BASERELEASE=$(($BASERELEASE-1))
  BASERELEASE=$BASERELEASE perl -p -i -e 's|%global baserelease.*|%global 
baserelease $ENV{'BASERELEASE'}|' kernel-headers.spec

  if [ $RELEASED -eq 0 ]; then
+   [ -n $BUILDID ] && sed -i -e 's/^# define buildid .local/%define 
buildid '$BUILDID'/' kernel-headers.spec
 RC=$RC perl -p -i -e 's|%global rcrev.*|%global rcrev $ENV{'RC'}|' 
kernel-headers.spec
 GITREV=$GITREV perl -p -i -e 's|%define gitrev.*|%define gitrev 
$ENV{'GITREV'}|' kernel-headers.spec
 rpmdev-bumpspec -c "Linux v$MAJORVER.$NEWBASE-rc$RC.git$GITREV" 
kernel-headers.spec



___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: Kernel 5.3 rebase plans

2019-09-18 Thread Laura Abbott

On 9/17/19 6:40 AM, Sérgio Basto wrote:

Hi,

Shouldn't we have kernel updates for F31 in updates-testing ?



Yes, I completely forgot to file them for the -rc updates. I
did file for the final 5.3.0 and I'll be requesting that for
stable (although I expect it won't go through until freeze
is over)


On Mon, 2019-09-16 at 10:24 -0400, Laura Abbott wrote:

Hi,

Kernel 5.3 was released upstream yesterday Sept 16. Fedora will be
following the
same rebase schedule as with past kernels. This means F30 will be
rebased to 5.3
first followed by F29 shortly thereafter. We typically wait until the
2nd or 3rd
stable release to push a rebase. Based on past timings, I'd expect
this to happen
around mid-October. You can find test builds in the kernel-
stabilization COPR.
Note that F31 will be shipping with 5.3 so you can always test those
kernels too.

Please also keep an eye out for the 5.3 test day which will happen
before the
rebase as well.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines:
https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives:
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org

___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: [PATCH 0/9] Clean up some old patches post F31

2019-09-16 Thread Laura Abbott

On 8/15/19 8:57 PM, Laura Abbott wrote:

I'd like to drop a bunch of patches Fedora has been carrying since
forever. Most of these are fairly minor tweaks most people forgot
we had and nobody cares about. My motivation is both in the spirit
of cleaning up and also to better align Fedora + RHEL (I had a talk
about this at Flock, video should be up soon).

If someone wants to make an effort at upstreaming any of these, feel
free to do so but I really think most of these are cruft.

Thanks,
Laura

Laura Abbott (9):
   Drop namespaces config tweak
   Drop cpumask auto select patch
   Drop scsi warning patch
   Remove ancient ath9k workaround
   Drop old lis3 patch
   Remove some old modalias adjustments
   Remove old keyboard logging patch
   Remove patch for GCC VTA
   Remove crash driver

  Kbuild-Add-an-option-to-enable-GCC-VTA.patch  |  94 ---
  ath9k-rx-dma-stop-check.patch |  38 -
  .../fedora/generic/x86/x86_64/CONFIG_NR_CPUS  |   2 +-
  crash-driver.patch| 722 --
  die-floppy-die.patch  |  29 -
  input-kill-stupid-messages.patch  |  30 -
  kernel.spec   |  20 -
  ...-CPUMASK_OFFSTACK-usable-without-deb.patch |  34 -
  lis3-improve-handling-of-null-rate.patch  |  75 --
  namespaces-no-expert.patch|  27 -
  no-pcspkr-modalias.patch  |  22 -
  ...validate_disk-prevent-NULL-ptr-deref.patch |  39 -
  12 files changed, 1 insertion(+), 1131 deletions(-)
  delete mode 100644 Kbuild-Add-an-option-to-enable-GCC-VTA.patch
  delete mode 100644 ath9k-rx-dma-stop-check.patch
  delete mode 100644 crash-driver.patch
  delete mode 100644 die-floppy-die.patch
  delete mode 100644 input-kill-stupid-messages.patch
  delete mode 100644 lib-cpumask-Make-CPUMASK_OFFSTACK-usable-without-deb.patch
  delete mode 100644 lis3-improve-handling-of-null-rate.patch
  delete mode 100644 namespaces-no-expert.patch
  delete mode 100644 no-pcspkr-modalias.patch
  delete mode 100644 scsi-sd_revalidate_disk-prevent-NULL-ptr-deref.patch



Given there were no major objections I cleaned up the few comments
and pushed the patches to rawhide.
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Kernel 5.3 rebase plans

2019-09-16 Thread Laura Abbott

Hi,

Kernel 5.3 was released upstream yesterday Sept 16. Fedora will be following the
same rebase schedule as with past kernels. This means F30 will be rebased to 5.3
first followed by F29 shortly thereafter. We typically wait until the 2nd or 3rd
stable release to push a rebase. Based on past timings, I'd expect this to 
happen
around mid-October. You can find test builds in the kernel-stabilization COPR.
Note that F31 will be shipping with 5.3 so you can always test those kernels 
too.

Please also keep an eye out for the 5.3 test day which will happen before the
rebase as well.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: kernel 5.3.0-0.rc7.git1.1 src.rpm fails at the patching stage, on the first patch.

2019-09-10 Thread Laura Abbott

On 9/8/19 5:49 PM, stan wrote:

Hi,

I build a custom kernel with rpmbuild.  The latest kernel,
5.3.0-0.rc7.git1.1, fails when it patches.  I noticed that the last
successful spec file had the lines shown below, while the latest
doesn't. However, adding them back does not enable patches, the build
still fails immediately when it tries to patch, on the first patch.

"""
Applying: lib/cpumask: Make CPUMASK_OFFSTACK usable without debug
dependency Patch failed at 0001 lib/cpumask: Make CPUMASK_OFFSTACK
usable without debug dependency When you have resolved this problem,
run "git am --continue". If you prefer to skip this patch, run "git am
--skip" instead. To restore the original branch and stop patching, run
"git am --abort".

error: lib/Kconfig: does not exist in index
hint: Use 'git am --show-current-patch' to see the failed patch
"""



This looks more like the patch is being applied in the wrong directory
if it can't find lib/Kconfig. Were there errors further up in the build
log?

https://kojipkgs.fedoraproject.org//packages/kernel/5.3.0/0.rc7.git1.1.fc32/data/logs/x86_64/build.log
this is the official build log


If I comment out the first patch, the second patch fails with the same
messages, except the directory missing from the index is the directory
where the second patch applies.  What has changed in the kernel build
process, and how do I fix the spec file so it works?

Gone from latest spec:

"""
< patch_command='patch -p1 -F1 -s'
< ApplyPatch()
< {
<   local patch=$1
<   shift
<   if [ ! -f $RPM_SOURCE_DIR/$patch ]; then
< exit 1
<   fi
<   if ! grep -E "^Patch[0-9]+: $patch\$"
%{_specdir}/${RPM_PACKAGE_NAME%{?variant}}.spec ; then < if
[ "${patch:0:8}" != "patch-5." ] ; then <   echo "ERROR: Patch
$patch  not listed as a source patch in specfile" <   exit 1
< fi
<   fi 2>/dev/null
<   case "$patch" in
<   *.bz2) bunzip2 < "$RPM_SOURCE_DIR/$patch" | $patch_command
${1+"$@"} ;; <   *.gz)  gunzip  < "$RPM_SOURCE_DIR/$patch" |
$patch_command ${1+"$@"} ;; <   *.xz)  unxz<
"$RPM_SOURCE_DIR/$patch" | $patch_command ${1+"$@"} ;; <   *)
$patch_command ${1+"$@"} < "$RPM_SOURCE_DIR/$patch" ;; <   esac
< }
<
< # don't apply patch if it's empty
< ApplyOptionalPatch()
< {
<   local patch=$1
<   shift
<   if [ ! -f $RPM_SOURCE_DIR/$patch ]; then
< exit 1
<   fi
<   local C=$(wc -l $RPM_SOURCE_DIR/$patch | awk '{print $1}')
<   if [ "$C" -gt 9 ]; then
< ApplyPatch $patch ${1+"$@"}
<   fi
< }
<
"""
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: [PATCH] enable driver for accessing HMC CD/DVD drive

2019-09-04 Thread Laura Abbott

On 9/4/19 3:54 PM, Dan Horák wrote:

---
  configs/fedora/generic/s390x/CONFIG_HMC_DRV | 1 +
  kernel-s390x-debug.config   | 2 +-
  kernel-s390x.config | 2 +-
  3 files changed, 3 insertions(+), 2 deletions(-)
  create mode 100644 configs/fedora/generic/s390x/CONFIG_HMC_DRV

diff --git a/configs/fedora/generic/s390x/CONFIG_HMC_DRV 
b/configs/fedora/generic/s390x/CONFIG_HMC_DRV
new file mode 100644
index 0..fc68dc34b
--- /dev/null
+++ b/configs/fedora/generic/s390x/CONFIG_HMC_DRV
@@ -0,0 +1 @@
+CONFIG_HMC_DRV=m
diff --git a/kernel-s390x-debug.config b/kernel-s390x-debug.config
index 61d06297a..eb0cd3526 100644
--- a/kernel-s390x-debug.config
+++ b/kernel-s390x-debug.config
@@ -1758,7 +1758,7 @@ CONFIG_HIGH_RES_TIMERS=y
  # CONFIG_HIPPI is not set
  CONFIG_HIST_TRIGGERS=y
  # CONFIG_HMC6352 is not set
-# CONFIG_HMC_DRV is not set
+CONFIG_HMC_DRV=m
  CONFIG_HOLTEK_FF=y
  # CONFIG_HOSTAP is not set
  CONFIG_HOTPLUG_CPU=y
diff --git a/kernel-s390x.config b/kernel-s390x.config
index 696652ba9..0d3be1ed5 100644
--- a/kernel-s390x.config
+++ b/kernel-s390x.config
@@ -1741,7 +1741,7 @@ CONFIG_HIGH_RES_TIMERS=y
  # CONFIG_HIPPI is not set
  CONFIG_HIST_TRIGGERS=y
  # CONFIG_HMC6352 is not set
-# CONFIG_HMC_DRV is not set
+CONFIG_HMC_DRV=m
  CONFIG_HOLTEK_FF=y
  # CONFIG_HOSTAP is not set
  CONFIG_HOTPLUG_CPU=y



Thanks, applied to rawhide.
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: Discussion: what would not blocking on btrfs look like?

2019-08-28 Thread Laura Abbott

On 8/28/19 1:58 PM, Josef Bacik wrote:

On Tue, Aug 27, 2019 at 07:53:20AM -0400, Laura Abbott wrote:

On 8/26/19 11:39 PM, Neal Gompa wrote:

On Mon, Aug 26, 2019 at 11:16 AM Laura Abbott  wrote:


On 8/23/19 9:00 PM, Chris Murphy wrote:

On Fri, Aug 23, 2019 at 1:17 PM Adam Williamson
 wrote:


So, there was recently a Thing where btrfs installs were broken, and
this got accepted as a release blocker:

https://bugzilla.redhat.com/show_bug.cgi?id=1733388


Summary: This bug was introduced and discovered in linux-next, it
started to affect Fedora 5.3.0-rc0 kernels in openqa tests, patch
appeared during rc1, and the patch was merged into 5.3.0-rc2. The bug
resulted in a somewhat transient deadlock which caused installs to
hang, but no corruption. The fix, 2 files changed, 12 insertions, 8
deletions (1/2 the insertions are comments).

How remarkable or interesting is this bug? And in particular, exactly
how much faster should it have been fixed in order to avoid worrying
about it being a blocker bug?

7/25 14:27 utc bug patch was submitted to linux-btrfs@
7/25 22:33 utc bug was first reported in Fedora bugzilla
7/26 19:20 utc I confirmed upstream's patch related to this bug with
upstream and updated the Fedora bug
7/26 22:50 utc I confirmed it was merged into rc2, and updated the Fedora bug

So in the context of status quo, where Btrfs is presented as an option
in the installer and if there are bugs they Beta blocking, how could
or should this have been fixed sooner? What about the handling should
have been different?



That's a fair question. This bug actually represents how this _should_
work. The concern is that in the past we haven't seen a lot engagement
in the past. Maybe today that has changed as demonstrated by this thread.
I'm still concerned about having this be a blocker vs. just keeping it
as an option, simply because a blocker stops the entire release and it
can be a last minute scramble to get things fixed. This was the ideal
case for a blocker bugs and I'm skeptical about all bugs going this well.
If we had a few more people who were willing to be on the btrfs alias and
do the work for blocker bugs it would be a much stronger case.



Out of curiosity, how many such issues have we had in the past 2
years? I personally can't recall any monumental occasions where people
were scrambling over *Btrfs* in Fedora. If anything, we continue to
inherit the work that SUSE and Facebook are doing upstream as part of
us continually updating our kernels, which I'm grateful for.

And in the instances where we've had such issues, has anyone reached
out to btrfs folks in Fedora? Chris and myself are the current ones,
but there have been others in the past. Both of us are subscribed to
the linux-btrfs mailing list, and Chris has a decent rapport with most
of the btrfs developers.

What more do you want? Actual btrfs developers in Fedora? We don't
have any for the majority of filesystems Fedora supports, only XFS. Is
there some kind of problem with communicating with the upstream kernel
developers about Fedora bugs that I'm not aware of?



Again, it's about length of overall development. ext and XFS have
a much longer history in general which is something that's important
for file system stability in general. It's also a bit of a catch-22
where the rate of btrfs use in Fedora is so low we don't actually
see issues.


I note here that ext2 and ext3 are offered as file systems in
Custom/Advanced partitioning and in this sense have parity with Btrfs.
If this same bug occurred in ext2 or ext3 would or should that cause
discussion to drop them from the installer, even if the bug were fixed
within 24 hours of discovery and patch? What about vfat? That's
literally the only truly required filesystem that must work, for the
most commonly supported hardware so it can't be dropped, we'd just be
stuck until it got fixed. That work would have to be done upstream,
yes?



I don't think that's really a fair comparison. Just because options
are presented doesn't mean all of them are equal. ext2/ext3 and vfat
have been in development for much longer than btrfs and length of development
is something that's particularly important for file system stability
from talking with file system developers. It's not impossible for there
to be bugs in ext4 for example (we've certainly seen them before) but
btrfs is only now gaining overall stability and we're still more likely to see
bugs, especially with custom setups where people are likely to find
edge cases.



Nope. We can totally use this because LVM has not existed as long (we
use LVM + filesystem by default, not plain partitions), and we still
encounter quirks with things like thinp LVM combined with these
filesystems. OverlayFS is mostly hot garbage (kernel people know it,
container people know it, filesystem people know it, etc.), and yet we
continue to try to use it in more places. Stratis is in an odd state
of limbo now, since its main developer and advocate left Red Hat

Re: Simple Firmware Interface being deprecated

2019-08-27 Thread Laura Abbott

On 8/27/19 8:46 AM, Hans de Goede wrote:

Hi,

On 27-08-19 09:14, Peter Robinson wrote:

On Mon, Aug 26, 2019 at 9:27 PM Laura Abbott  wrote:


https://lore.kernel.org/lkml/20190826181956.6918-1-lukas.bulw...@gmail.com/

menuconfig SFI
  bool "SFI (Simple Firmware Interface) Support"
  ---help---
  The Simple Firmware Interface (SFI) provides a lightweight method
  for platform firmware to pass information to the operating system
  via static tables in memory.  Kernel SFI support is required to
  boot on SFI-only platforms.  Currently, all SFI-only platforms are
  based on the 2nd generation Intel Atom processor platform,
  code-named Moorestown.

  For more information, see http://simplefirmware.org

  Say 'Y' here to enable the kernel to boot on SFI-only platforms.

I have no idea how common this is but Fedora does enable this option.
If you are interested in salvaging this, please speak up!


Grepping config and the kernel it seems Moorestown is the Intel MID
platform and we explicitly disable X86_INTEL_MID so I'm not sure it's
a problem.


Yeah I'm pretty sure this is just for the Intel X86 "phone" SoCs which
never went anywhere. As you know I've spend a lot of (spare) time on
improving support for Intel Atom based hw (mainly Bay Trail and Cherry
Trail tablets) and even I don't care for the phone chips, for one exactly
because of SFI, instead of coming with EFI these phones come with some
frankenstein firmware AFAIK, I never even bothered getting one to try
and make it boot mainline ...

TL;DR: I do not think this will missed, actually I think it should be
fine to disable it in the Fedora kernels right away. I've just disabled
it for the builds which I do from my personal kernel tree. It does not
seem to affect any other Kconfig options.

Regards,

Hans



Ah the x86 phone. Such dreams. Thanks for the confirmation Peter and Hans.
I'm planning on dropping a bunch of stuff after 5.3 releases so I'll turn it
off in rawhide there.

Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Simple Firmware Interface being deprecated

2019-08-26 Thread Laura Abbott

https://lore.kernel.org/lkml/20190826181956.6918-1-lukas.bulw...@gmail.com/

menuconfig SFI
bool "SFI (Simple Firmware Interface) Support"
---help---
The Simple Firmware Interface (SFI) provides a lightweight method
for platform firmware to pass information to the operating system
via static tables in memory.  Kernel SFI support is required to
boot on SFI-only platforms.  Currently, all SFI-only platforms are
based on the 2nd generation Intel Atom processor platform,
code-named Moorestown.

For more information, see http://simplefirmware.org

Say 'Y' here to enable the kernel to boot on SFI-only platforms.

I have no idea how common this is but Fedora does enable this option.
If you are interested in salvaging this, please speak up!

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: Discussion: what would not blocking on btrfs look like?

2019-08-26 Thread Laura Abbott

On 8/23/19 9:00 PM, Chris Murphy wrote:

On Fri, Aug 23, 2019 at 1:17 PM Adam Williamson
 wrote:


So, there was recently a Thing where btrfs installs were broken, and
this got accepted as a release blocker:

https://bugzilla.redhat.com/show_bug.cgi?id=1733388


Summary: This bug was introduced and discovered in linux-next, it
started to affect Fedora 5.3.0-rc0 kernels in openqa tests, patch
appeared during rc1, and the patch was merged into 5.3.0-rc2. The bug
resulted in a somewhat transient deadlock which caused installs to
hang, but no corruption. The fix, 2 files changed, 12 insertions, 8
deletions (1/2 the insertions are comments).

How remarkable or interesting is this bug? And in particular, exactly
how much faster should it have been fixed in order to avoid worrying
about it being a blocker bug?

7/25 14:27 utc bug patch was submitted to linux-btrfs@
7/25 22:33 utc bug was first reported in Fedora bugzilla
7/26 19:20 utc I confirmed upstream's patch related to this bug with
upstream and updated the Fedora bug
7/26 22:50 utc I confirmed it was merged into rc2, and updated the Fedora bug

So in the context of status quo, where Btrfs is presented as an option
in the installer and if there are bugs they Beta blocking, how could
or should this have been fixed sooner? What about the handling should
have been different?



That's a fair question. This bug actually represents how this _should_
work. The concern is that in the past we haven't seen a lot engagement
in the past. Maybe today that has changed as demonstrated by this thread.
I'm still concerned about having this be a blocker vs. just keeping it
as an option, simply because a blocker stops the entire release and it
can be a last minute scramble to get things fixed. This was the ideal
case for a blocker bugs and I'm skeptical about all bugs going this well.
If we had a few more people who were willing to be on the btrfs alias and
do the work for blocker bugs it would be a much stronger case.


I note here that ext2 and ext3 are offered as file systems in
Custom/Advanced partitioning and in this sense have parity with Btrfs.
If this same bug occurred in ext2 or ext3 would or should that cause
discussion to drop them from the installer, even if the bug were fixed
within 24 hours of discovery and patch? What about vfat? That's
literally the only truly required filesystem that must work, for the
most commonly supported hardware so it can't be dropped, we'd just be
stuck until it got fixed. That work would have to be done upstream,
yes?



I don't think that's really a fair comparison. Just because options
are presented doesn't mean all of them are equal. ext2/ext3 and vfat
have been in development for much longer than btrfs and length of development
is something that's particularly important for file system stability
from talking with file system developers. It's not impossible for there
to be bugs in ext4 for example (we've certainly seen them before) but
btrfs is only now gaining overall stability and we're still more likely to see
bugs, especially with custom setups where people are likely to find
edge cases.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: Discussion: what would not blocking on btrfs look like?

2019-08-23 Thread Laura Abbott

On 8/23/19 1:10 PM, Neal Gompa wrote:

On Fri, Aug 23, 2019 at 3:48 PM Justin Forbes  wrote:


On Fri, Aug 23, 2019 at 2:17 PM Adam Williamson
 wrote:


Hey folks!

So, there was recently a Thing where btrfs installs were broken, and
this got accepted as a release blocker:

https://bugzilla.redhat.com/show_bug.cgi?id=1733388

The bug was fixed, so that's fine, but along the way, Laura said this:

"I'm strongly against anything with btrfs being a blocker. If that's in
the criteria I think we should see about removing btrfs simply because
we don't have the resources to actually deal with btrfs besides
reporting bugs upstream."

and Justin followed up with:

"Agreed, btrfs has been a gamble pretty much always. See previous
discussion around proposals to make btrfs default. Ext4 and xfs should
be the only release blocking."

So, that's the whole kernel team 'strongly against' blocking on btrfs.
Which means we should talk about not doing that any more!

This is a bit complicated, though, because of how the Final criteria
are phrased. Basic does not include btrfs at all, and Beta includes a
laundry list we can just remove btrfs from:

"When using both the installer-native and the blivet-gui-based custom
partitioning flow, the installer must be able to:

* Correctly interpret, and modify as described below, any disk with a
valid ms-dos or gpt disk label and partition table containing ext4
partitions, LVM and/or btrfs volumes, and/or software RAID arrays at
RAID levels 0, 1 and 5 containing ext4 partitions
* Create mount points backed by ext4 partitions, LVM volumes or btrfs
volumes, or software RAID arrays at RAID levels 0, 1 and 5 containing
ext4 partitions
..."

so those two are easy. However, the Final criterion is not laundry
list-style. The relevant Final criterion is this:

"The installer must be able to create and install to any workable
partition layout using any file system and/or container format
combination offered in a default installer configuration."

with a somewhat apologetic explanatory footnote:

"Wait, what?
Yeah, we know. This is a huge catch-all criterion and it's subject to a
lot of on-the-fly interpretation. Broadly what it's 'meant to mean' is
that you should be able to do anything sane that the Installation
Destination spoke attempts to let you do, without the installer
exploding or failing. We are trying to write more specific criteria
covering this area, but it's not easy. Patches welcome, as the kids
say..."

so as the footnote says, the rule is basically "if the installer lets
you do it, it ought to work". It seems a bit awkward to craft an
exception for btrfs from that. I mean, technically it's easy:

"The installer must be able to create and install to any workable
partition layout using any file system and/or container format
combination offered in a default installer configuration, except
btrfs."

but that's odd. Why is btrfs, alone, an exception? It kinda goes
against the fundamental idea of the criterion: that we stand behind
everything the UI offers.


All of this, the criteria, and the UI support for btrfs are from the
many years old proposal to make btrfs the default filesystem.  In the
beginning, it was not ready, but did show promise. This proposal came
up for several releases in a row, and at the end of it, even the
upstream developers recommended against it.  At this point, it is safe
to say that btrfs will not be the default.  Since that time, things
have not gotten better.   Yes, there is active btrfs development
upstream.  It is fairly narrowly focused, and not something we can
rely upon for a supported default among the Fedora use cases.


Getting btrfs in Fedora to be in a state where it *could* be the
default is something I am working towards. However, it is *very* hard
when people keep shutting down discussions that I try to have about
enablement related to it. The situation with btrfs today is many
orders of magnitude better than before, and yet I've mostly been
improving Btrfs support in Fedora in tiny ways because the bigger
things to do (improving kickstart, Anaconda, etc.) are impossible due
to how difficult it is to contribute to those projects.

The *only* remaining "major" issue in Btrfs itself is the RAID 5/6
feature, which does not provide write hole protection without
additional work (similar to mdraid). There was some work last year by
David Sterba to rework the the RAID code for the SUSE Hackweek 17, but
it has not been completed yet. Some work was done again to try to land
this for the 5.3 cycle, but some last minute issues got that
postponed. It's definitely on the radar to fix, though.

I've been watching and using Btrfs since May of 2015, and the
development has drastically improved. I know for a fact no one has
asked the upstream developers in at least the last two years, because
I've gotten "cautionary" recommendations that it'd be okay to do so
since early last year, and last week I've gotten much more
enthusiastic responses when I met some of 

Re: [PATCH 2/9] Drop cpumask auto select patch

2019-08-22 Thread Laura Abbott

On 8/22/19 8:58 AM, Prarit Bhargava wrote:

On 8/19/19 9:15 AM, Laura Abbott wrote:

On 8/16/19 2:57 PM, Paul Bolle wrote:

Florian Weimer schreef op vr 16-08-2019 om 14:04 [+0200]:

RHEL has a larger NR_CPU value, though.  For example, it's 8192 on
x86-64, while Fedora 31 has 1024.


On the Fedora x86-64 debug builds it's 8192 again. Why's that?


Paul Bolle



That's the option for max cpus. We don't want to turn it on in all
Fedora builds since it would use up more resources we probably don't
actually need. Turning on for debugging in Fedora is okay though.
RHEL is focused on larger footprints and makes the trade off to
have it enabled all the time.



I think I measured the impact of 8192 vs 512 (or 256?) a long time ago and we
are talking about _k_ of memory.  We should stick with what upstream has at
8192.  It's easier to debug when we have the same value as the default IMO.

Having said that, it has been a long time since I had to debug a NR_CPUS/nr_cpus
issue in the kernel.  We're just not seeing bugs around the value anymore.



I was going to ask about the actual impact of a larger number of CPUs. If it's
actually only k of memory it's probably better to just set MAXCPUS all the time.
Even the lowest end machines probably see more change when frameworks change.

And yes, I also think that we've come a long way so NR_CPUS is less of an 
important
option to optimize these days. I think I'll just submit another patch to just do
the max cpus.

Thanks,
Laura


P.


Thanks,
Laura




___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: test patch for zswap bug

2019-08-19 Thread Laura Abbott

On 8/19/19 3:29 PM, Chris Murphy wrote:

Hi,

Is it possible to get the following test patch in a Rawhide kernel as
a one off for testing? Or is that a PITA? Ordinarily I'd just build a
kernel myself locally, but that build machine is in a very confused
Rawhide<-->Branched state and so I can't.

But that led me to wonder about the general case of whether it's
ordinary to request test patches for testing in Rawhide kernels, or if
such things considered out of scope until they get merged?

https://bugzilla.kernel.org/attachment.cgi?id=284507=diff



We generally prefer not to bring in patches for testing in rawhide.
It's easy to bring a patch in but much harder to drop one.

https://koji.fedoraproject.org/koji/taskinfo?taskID=37168533
Here's a scratch build that should have the patch.
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: [PATCH 2/9] Drop cpumask auto select patch

2019-08-19 Thread Laura Abbott

On 8/16/19 2:55 PM, Paul Bolle wrote:

Hi Laura,

Laura Abbott schreef op do 15-08-2019 om 15:57 [-0400]:

  .../fedora/generic/x86/x86_64/CONFIG_NR_CPUS  |  2 +-
  kernel.spec   |  2 --
  ...-CPUMASK_OFFSTACK-usable-without-deb.patch | 34 ---
  3 files changed, 1 insertion(+), 37 deletions(-)
  delete mode 100644 lib-cpumask-Make-CPUMASK_OFFSTACK-usable-without-deb.patch

diff --git a/configs/fedora/generic/x86/x86_64/CONFIG_NR_CPUS 
b/configs/fedora/generic/x86/x86_64/CONFIG_NR_CPUS
index 27d187f4d..9ce2b2de6 100644
--- a/configs/fedora/generic/x86/x86_64/CONFIG_NR_CPUS
+++ b/configs/fedora/generic/x86/x86_64/CONFIG_NR_CPUS
@@ -1 +1 @@
-CONFIG_NR_CPUS=1024
+CONFIG_NR_CPUS=512


This patch needs an included regeneration of the kernel-*.config files to be
complete.

Thanks,


Paul Bolle



Thanks for the reminder
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: [PATCH 2/9] Drop cpumask auto select patch

2019-08-19 Thread Laura Abbott

On 8/16/19 2:57 PM, Paul Bolle wrote:

Florian Weimer schreef op vr 16-08-2019 om 14:04 [+0200]:

RHEL has a larger NR_CPU value, though.  For example, it's 8192 on
x86-64, while Fedora 31 has 1024.


On the Fedora x86-64 debug builds it's 8192 again. Why's that?


Paul Bolle



That's the option for max cpus. We don't want to turn it on in all
Fedora builds since it would use up more resources we probably don't
actually need. Turning on for debugging in Fedora is okay though.
RHEL is focused on larger footprints and makes the trade off to
have it enabled all the time.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: [PATCH 2/9] Drop cpumask auto select patch

2019-08-16 Thread Laura Abbott

On 8/16/19 6:58 AM, Josh Boyer wrote:

On Thu, Aug 15, 2019 at 3:57 PM Laura Abbott  wrote:


We've been carrying a patch to make CPUMASK_OFFSTACK selectable
without debugging for a long time now. The comment said this was
going to be replaced with something else but that never seemed
to happen. We're carrying it to have a higher number of CPUs but
at this point I don't think it's worth it since the upper bound is
now 512. This should be enough for most Fedora use cases so just
drop the patch.


I likely agree, but copying Prarit because this was something he and I
poked at forever ago.



Given that RHEL no longer bothers with this I hope he would be
okay with it :)


josh


Signed-off-by: Laura Abbott 
---
  .../fedora/generic/x86/x86_64/CONFIG_NR_CPUS  |  2 +-
  kernel.spec   |  2 --
  ...-CPUMASK_OFFSTACK-usable-without-deb.patch | 34 ---
  3 files changed, 1 insertion(+), 37 deletions(-)
  delete mode 100644 lib-cpumask-Make-CPUMASK_OFFSTACK-usable-without-deb.patch

diff --git a/configs/fedora/generic/x86/x86_64/CONFIG_NR_CPUS 
b/configs/fedora/generic/x86/x86_64/CONFIG_NR_CPUS
index 27d187f4d..9ce2b2de6 100644
--- a/configs/fedora/generic/x86/x86_64/CONFIG_NR_CPUS
+++ b/configs/fedora/generic/x86/x86_64/CONFIG_NR_CPUS
@@ -1 +1 @@
-CONFIG_NR_CPUS=1024
+CONFIG_NR_CPUS=512
diff --git a/kernel.spec b/kernel.spec
index a662ee004..4253ff035 100644
--- a/kernel.spec
+++ b/kernel.spec
@@ -495,8 +495,6 @@ Source5000: patch-5.%{base_sublevel}-git%{gitrev}.xz
  # Standalone patches
  # 100 - Generic long running patches

-Patch110: lib-cpumask-Make-CPUMASK_OFFSTACK-usable-without-deb.patch
-
  Patch111: input-kill-stupid-messages.patch

  Patch112: die-floppy-die.patch
diff --git a/lib-cpumask-Make-CPUMASK_OFFSTACK-usable-without-deb.patch 
b/lib-cpumask-Make-CPUMASK_OFFSTACK-usable-without-deb.patch
deleted file mode 100644
index 5e6d6611e..0
--- a/lib-cpumask-Make-CPUMASK_OFFSTACK-usable-without-deb.patch
+++ /dev/null
@@ -1,34 +0,0 @@
-From: Josh Boyer 
-Date: Mon, 11 Nov 2013 08:39:16 -0500
-Subject: [PATCH] lib/cpumask: Make CPUMASK_OFFSTACK usable without debug
- dependency
-
-When CPUMASK_OFFSTACK was added in 2008, it was dependent upon
-DEBUG_PER_CPU_MAPS being enabled, or an architecture could select it.
-The debug dependency adds additional overhead that isn't required for
-operation of the feature, and we need CPUMASK_OFFSTACK to increase the
-NR_CPUS value beyond 512 on x86.  We drop the current dependency and make
-sure SMP is set.
-
-Bugzilla: N/A
-Upstream-status: Nak'd, supposedly replacement coming to auto-select
-
-Signed-off-by: Josh Boyer 

- lib/Kconfig | 3 ++-
- 1 file changed, 2 insertions(+), 1 deletion(-)
-
-diff --git a/lib/Kconfig b/lib/Kconfig
-index 3a2ef67db6c7..4af1e7e5a611 100644
 a/lib/Kconfig
-+++ b/lib/Kconfig
-@@ -396,7 +396,8 @@ config CHECK_SIGNATURE
-   bool
-
- config CPUMASK_OFFSTACK
--  bool "Force CPU masks off stack" if DEBUG_PER_CPU_MAPS
-+  bool "Force CPU masks off stack"
-+  depends on SMP
-   help
- Use dynamic allocation for cpumask_var_t, instead of putting
- them on the stack.  This is a bit more expensive, but avoids
--
2.21.0


___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: [PATCH 6/9] Remove some old modalias adjustments

2019-08-16 Thread Laura Abbott

On 8/16/19 7:00 AM, Josh Boyer wrote:

On Thu, Aug 15, 2019 at 3:58 PM Laura Abbott  wrote:


We've come a long way. Let's just leave these drivers alone.


Can we not build them at all instead?  Or put them in modules-extra if
we're too chicken to disable them entirely.



I like the suggestion of putting them in mod-extra.


josh


Signed-off-by: Laura Abbott 
---
  die-floppy-die.patch | 29 -
  kernel.spec  |  4 
  no-pcspkr-modalias.patch | 22 --
  3 files changed, 55 deletions(-)
  delete mode 100644 die-floppy-die.patch
  delete mode 100644 no-pcspkr-modalias.patch

diff --git a/die-floppy-die.patch b/die-floppy-die.patch
deleted file mode 100644
index caaa2dde5..0
--- a/die-floppy-die.patch
+++ /dev/null
@@ -1,29 +0,0 @@
-From: Kyle McMartin 
-Date: Tue, 30 Mar 2010 00:04:29 -0400
-Subject: [PATCH] die-floppy-die
-
-Kill the floppy.ko pnp modalias. We were surviving just fine without
-autoloading floppy drivers, tyvm.
-
-Please feel free to register all complaints in the wastepaper bin.
-
-Bugzilla: N/A
-Upstream-status: Fedora mustard

- drivers/block/floppy.c | 3 +--
- 1 file changed, 1 insertion(+), 2 deletions(-)
-
-diff --git a/drivers/block/floppy.c b/drivers/block/floppy.c
-index a08cda955285..e320e1e679cf 100644
 a/drivers/block/floppy.c
-+++ b/drivers/block/floppy.c
-@@ -4633,8 +4633,7 @@ static const struct pnp_device_id floppy_pnpids[] = {
-   {"PNP0700", 0},
-   {}
- };
--
--MODULE_DEVICE_TABLE(pnp, floppy_pnpids);
-+/* MODULE_DEVICE_TABLE(pnp, floppy_pnpids); */
-
- #else
-
diff --git a/kernel.spec b/kernel.spec
index 1a7af5cd4..0e9ba6be4 100644
--- a/kernel.spec
+++ b/kernel.spec
@@ -497,10 +497,6 @@ Source5000: patch-5.%{base_sublevel}-git%{gitrev}.xz

  Patch111: input-kill-stupid-messages.patch

-Patch112: die-floppy-die.patch
-
-Patch113: no-pcspkr-modalias.patch
-
  Patch115: Kbuild-Add-an-option-to-enable-GCC-VTA.patch

  Patch116: crash-driver.patch
diff --git a/no-pcspkr-modalias.patch b/no-pcspkr-modalias.patch
deleted file mode 100644
index 2ccd87202..0
--- a/no-pcspkr-modalias.patch
+++ /dev/null
@@ -1,22 +0,0 @@
-From: "kernel-t...@fedoraproject.org" 
-Date: Thu, 29 Jul 2010 16:46:31 -0700
-Subject: [PATCH] no pcspkr modalias
-
-Bugzilla: N/A
-Upstream-status: Fedora mustard

- drivers/input/misc/pcspkr.c | 1 -
- 1 file changed, 1 deletion(-)
-
-diff --git a/drivers/input/misc/pcspkr.c b/drivers/input/misc/pcspkr.c
-index 56ddba21de84..23534f420e68 100644
 a/drivers/input/misc/pcspkr.c
-+++ b/drivers/input/misc/pcspkr.c
-@@ -23,7 +23,6 @@
- MODULE_AUTHOR("Vojtech Pavlik ");
- MODULE_DESCRIPTION("PC Speaker beeper driver");
- MODULE_LICENSE("GPL");
--MODULE_ALIAS("platform:pcspkr");
-
- static int pcspkr_event(struct input_dev *dev, unsigned int type,
-   unsigned int code, int value)
--
2.21.0
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org

___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: [PATCH 9/9] Remove crash driver

2019-08-16 Thread Laura Abbott

On 8/16/19 6:56 AM, Josh Boyer wrote:

On Thu, Aug 15, 2019 at 4:02 PM Laura Abbott  wrote:


This has since been replaced by other in kernel pieces. We
can finally drop it.


Which pieces?



/proc/kcore now does most of the work of the crash driver. I've helped
fix up misc pieces in the past (c.f. 3955333df9a5 ("proc/kcore: don't bounds
check against address 0")



josh



Signed-off-by: Laura Abbott 
---
  crash-driver.patch | 722 -
  kernel.spec|   2 -
  2 files changed, 724 deletions(-)
  delete mode 100644 crash-driver.patch

diff --git a/crash-driver.patch b/crash-driver.patch
deleted file mode 100644
index 164dc90f5..0
--- a/crash-driver.patch
+++ /dev/null
@@ -1,722 +0,0 @@
-From 973e23bf27b0b2e5021321357fc570cccea3104c Mon Sep 17 00:00:00 2001
-From: Dave Anderson 
-Date: Tue, 26 Nov 2013 12:42:46 -0500
-Subject: [PATCH] crash-driver
-
-Bugzilla: N/A
-Upstream-status: Fedora mustard

- arch/arm/include/asm/crash-driver.h |   6 ++
- arch/arm64/include/asm/crash-driver.h   |   6 ++
- arch/ia64/include/asm/crash-driver.h|  90 ++
- arch/ia64/kernel/ia64_ksyms.c   |   3 +
- arch/powerpc/include/asm/crash-driver.h |   6 ++
- arch/s390/include/asm/crash-driver.h|  60 +++
- arch/s390/mm/maccess.c  |   2 +
- arch/x86/include/asm/crash-driver.h |   6 ++
- drivers/char/Kconfig|   3 +
- drivers/char/Makefile   |   2 +
- drivers/char/crash.c| 128 
- include/asm-generic/crash-driver.h  |  72 ++
- 12 files changed, 384 insertions(+)
- create mode 100644 arch/arm/include/asm/crash-driver.h
- create mode 100644 arch/arm64/include/asm/crash-driver.h
- create mode 100644 arch/ia64/include/asm/crash-driver.h
- create mode 100644 arch/powerpc/include/asm/crash-driver.h
- create mode 100644 arch/s390/include/asm/crash-driver.h
- create mode 100644 arch/x86/include/asm/crash-driver.h
- create mode 100644 drivers/char/crash.c
- create mode 100644 include/asm-generic/crash-driver.h
-
-diff --git a/arch/arm/include/asm/crash-driver.h 
b/arch/arm/include/asm/crash-driver.h
-new file mode 100644
-index 000..06e7ae9
 /dev/null
-+++ b/arch/arm/include/asm/crash-driver.h
-@@ -0,0 +1,6 @@
-+#ifndef _ARM_CRASH_H
-+#define _ARM_CRASH_H
-+
-+#include 
-+
-+#endif /* _ARM_CRASH_H */
-diff --git a/arch/arm64/include/asm/crash-driver.h 
b/arch/arm64/include/asm/crash-driver.h
-new file mode 100644
-index 000..43b26da
 /dev/null
-+++ b/arch/arm64/include/asm/crash-driver.h
-@@ -0,0 +1,6 @@
-+#ifndef _ARM64_CRASH_H
-+#define _ARM64_CRASH_H
-+
-+#include 
-+
-+#endif /* _ARM64_CRASH_H */
-diff --git a/arch/ia64/include/asm/crash-driver.h 
b/arch/ia64/include/asm/crash-driver.h
-new file mode 100644
-index 000..404bcb9
 /dev/null
-+++ b/arch/ia64/include/asm/crash-driver.h
-@@ -0,0 +1,90 @@
-+#ifndef _ASM_IA64_CRASH_H
-+#define _ASM_IA64_CRASH_H
-+
-+/*
-+ * linux/include/asm-ia64/crash-driver.h
-+ *
-+ * Copyright (c) 2004 Red Hat, Inc. All rights reserved.
-+ *
-+ * This program is free software; you can redistribute it and/or modify
-+ * it under the terms of the GNU General Public License as published by
-+ * the Free Software Foundation; either version 2, or (at your option)
-+ * any later version.
-+ *
-+ * This program is distributed in the hope that it will be useful,
-+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
-+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
-+ * GNU General Public License for more details.
-+ *
-+ * You should have received a copy of the GNU General Public License
-+ * along with this program; if not, write to the Free Software
-+ * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
-+ *
-+ */
-+
-+#ifdef __KERNEL__
-+
-+#include 
-+#include 
-+#include 
-+
-+static inline void *
-+map_virtual(u64 offset, struct page **pp)
-+{
-+  struct page *page;
-+  unsigned long pfn;
-+  u32 type;
-+
-+  if (REGION_NUMBER(offset) == 5) {
-+  char byte;
-+
-+  if (__get_user(byte, (char *)offset) == 0)
-+  return (void *)offset;
-+  else
-+  return NULL;
-+  }
-+
-+  switch (type = efi_mem_type(offset))
-+  {
-+  case EFI_LOADER_CODE:
-+  case EFI_LOADER_DATA:
-+  case EFI_BOOT_SERVICES_CODE:
-+  case EFI_BOOT_SERVICES_DATA:
-+  case EFI_CONVENTIONAL_MEMORY:
-+  break;
-+
-+  default:
-+  printk(KERN_INFO
-+  "crash memory driver: invalid memory type for %lx: %d\n",
-+  offset, type);
-+  return NULL;
-+  }
-+
-+  pfn = offset >> PAGE_SHIFT;
-+
-+  if (!pfn_valid(pfn)) {
-+  printk(KERN_INFO
-+  "crash memory driver: invalid pfn: %lx )\n

[PATCH 9/9] Remove crash driver

2019-08-15 Thread Laura Abbott
This has since been replaced by other in kernel pieces. We
can finally drop it.

Signed-off-by: Laura Abbott 
---
 crash-driver.patch | 722 -
 kernel.spec|   2 -
 2 files changed, 724 deletions(-)
 delete mode 100644 crash-driver.patch

diff --git a/crash-driver.patch b/crash-driver.patch
deleted file mode 100644
index 164dc90f5..0
--- a/crash-driver.patch
+++ /dev/null
@@ -1,722 +0,0 @@
-From 973e23bf27b0b2e5021321357fc570cccea3104c Mon Sep 17 00:00:00 2001
-From: Dave Anderson 
-Date: Tue, 26 Nov 2013 12:42:46 -0500
-Subject: [PATCH] crash-driver
-
-Bugzilla: N/A
-Upstream-status: Fedora mustard

- arch/arm/include/asm/crash-driver.h |   6 ++
- arch/arm64/include/asm/crash-driver.h   |   6 ++
- arch/ia64/include/asm/crash-driver.h|  90 ++
- arch/ia64/kernel/ia64_ksyms.c   |   3 +
- arch/powerpc/include/asm/crash-driver.h |   6 ++
- arch/s390/include/asm/crash-driver.h|  60 +++
- arch/s390/mm/maccess.c  |   2 +
- arch/x86/include/asm/crash-driver.h |   6 ++
- drivers/char/Kconfig|   3 +
- drivers/char/Makefile   |   2 +
- drivers/char/crash.c| 128 
- include/asm-generic/crash-driver.h  |  72 ++
- 12 files changed, 384 insertions(+)
- create mode 100644 arch/arm/include/asm/crash-driver.h
- create mode 100644 arch/arm64/include/asm/crash-driver.h
- create mode 100644 arch/ia64/include/asm/crash-driver.h
- create mode 100644 arch/powerpc/include/asm/crash-driver.h
- create mode 100644 arch/s390/include/asm/crash-driver.h
- create mode 100644 arch/x86/include/asm/crash-driver.h
- create mode 100644 drivers/char/crash.c
- create mode 100644 include/asm-generic/crash-driver.h
-
-diff --git a/arch/arm/include/asm/crash-driver.h 
b/arch/arm/include/asm/crash-driver.h
-new file mode 100644
-index 000..06e7ae9
 /dev/null
-+++ b/arch/arm/include/asm/crash-driver.h
-@@ -0,0 +1,6 @@
-+#ifndef _ARM_CRASH_H
-+#define _ARM_CRASH_H
-+
-+#include 
-+
-+#endif /* _ARM_CRASH_H */
-diff --git a/arch/arm64/include/asm/crash-driver.h 
b/arch/arm64/include/asm/crash-driver.h
-new file mode 100644
-index 000..43b26da
 /dev/null
-+++ b/arch/arm64/include/asm/crash-driver.h
-@@ -0,0 +1,6 @@
-+#ifndef _ARM64_CRASH_H
-+#define _ARM64_CRASH_H
-+
-+#include 
-+
-+#endif /* _ARM64_CRASH_H */
-diff --git a/arch/ia64/include/asm/crash-driver.h 
b/arch/ia64/include/asm/crash-driver.h
-new file mode 100644
-index 000..404bcb9
 /dev/null
-+++ b/arch/ia64/include/asm/crash-driver.h
-@@ -0,0 +1,90 @@
-+#ifndef _ASM_IA64_CRASH_H
-+#define _ASM_IA64_CRASH_H
-+
-+/*
-+ * linux/include/asm-ia64/crash-driver.h
-+ *
-+ * Copyright (c) 2004 Red Hat, Inc. All rights reserved.
-+ *
-+ * This program is free software; you can redistribute it and/or modify
-+ * it under the terms of the GNU General Public License as published by
-+ * the Free Software Foundation; either version 2, or (at your option)
-+ * any later version.
-+ *
-+ * This program is distributed in the hope that it will be useful,
-+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
-+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
-+ * GNU General Public License for more details.
-+ *
-+ * You should have received a copy of the GNU General Public License
-+ * along with this program; if not, write to the Free Software
-+ * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
-+ *
-+ */
-+
-+#ifdef __KERNEL__
-+
-+#include 
-+#include 
-+#include 
-+
-+static inline void *
-+map_virtual(u64 offset, struct page **pp)
-+{
-+  struct page *page;
-+  unsigned long pfn;
-+  u32 type;
-+
-+  if (REGION_NUMBER(offset) == 5) {
-+  char byte;
-+
-+  if (__get_user(byte, (char *)offset) == 0)
-+  return (void *)offset;
-+  else
-+  return NULL;
-+  }
-+
-+  switch (type = efi_mem_type(offset))
-+  {
-+  case EFI_LOADER_CODE:
-+  case EFI_LOADER_DATA:
-+  case EFI_BOOT_SERVICES_CODE:
-+  case EFI_BOOT_SERVICES_DATA:
-+  case EFI_CONVENTIONAL_MEMORY:
-+  break;
-+
-+  default:
-+  printk(KERN_INFO
-+  "crash memory driver: invalid memory type for %lx: %d\n",
-+  offset, type);
-+  return NULL;
-+  }
-+
-+  pfn = offset >> PAGE_SHIFT;
-+
-+  if (!pfn_valid(pfn)) {
-+  printk(KERN_INFO
-+  "crash memory driver: invalid pfn: %lx )\n", pfn);
-+  return NULL;
-+  }
-+
-+  page = pfn_to_page(pfn);
-+
-+  if (!page->virtual) {
-+  printk(KERN_INFO
-+  "crash memory driver: offset: %lx page: %lx page->virtual: 
NULL\n",
-+  offset, (unsign

[PATCH 8/9] Remove patch for GCC VTA

2019-08-15 Thread Laura Abbott
It's been years and gcc has changed a lot.

Signed-off-by: Laura Abbott 
---
 Kbuild-Add-an-option-to-enable-GCC-VTA.patch | 94 
 kernel.spec  |  2 -
 2 files changed, 96 deletions(-)
 delete mode 100644 Kbuild-Add-an-option-to-enable-GCC-VTA.patch

diff --git a/Kbuild-Add-an-option-to-enable-GCC-VTA.patch 
b/Kbuild-Add-an-option-to-enable-GCC-VTA.patch
deleted file mode 100644
index 6bbb0efdf..0
--- a/Kbuild-Add-an-option-to-enable-GCC-VTA.patch
+++ /dev/null
@@ -1,94 +0,0 @@
-From a446d2f94ce540689c7a46bf457d92409e9c4d7e Mon Sep 17 00:00:00 2001
-From: Josh Stone 
-Date: Fri, 21 Nov 2014 10:40:00 -0800
-Subject: [PATCH] Kbuild: Add an option to enable GCC VTA
-MIME-Version: 1.0
-Content-Type: text/plain; charset=UTF-8
-Content-Transfer-Encoding: 8bit
-
-Due to recent codegen issues, gcc -fvar-tracking-assignments was
-unconditionally disabled in commit 2062afb4f804a ("Fix gcc-4.9.0
-miscompilation of load_balance() in scheduler").  However, this reduces
-the debuginfo coverage for variable locations, especially in inline
-functions.  VTA is certainly not perfect either in those cases, but it
-is much better than without.  With compiler versions that have fixed the
-codegen bugs, we would prefer to have the better details for SystemTap,
-and surely other debuginfo consumers like perf will benefit as well.
-
-This patch simply makes CONFIG_DEBUG_INFO_VTA an option.  I considered
-Frank and Linus's discussion of a cc-option-like -fcompare-debug test,
-but I'm convinced that a narrow test of an arch-specific codegen issue
-is not really useful.  GCC has their own regression tests for this, so
-I'd suggest GCC_COMPARE_DEBUG=-fvar-tracking-assignments-toggle is more
-useful for kernel developers to test confidence.
-
-In fact, I ran into a couple more issues when testing for this patch[1],
-although neither of those had any codegen impact.
- [1] https://bugzilla.redhat.com/show_bug.cgi?id=1140872
-
-With gcc-4.9.2-1.fc22, I can now build v3.18-rc5 with Fedora's i686 and
-x86_64 configs, and this is completely clean with GCC_COMPARE_DEBUG.
-
-Cc: Frank Ch. Eigler 
-Cc: Jakub Jelinek 
-Cc: Josh Boyer 
-Cc: Greg Kroah-Hartman 
-Cc: Linus Torvalds 
-Cc: Andrew Morton 
-Cc: Markus Trippelsdorf 
-Cc: Michel Dänzer 
-Signed-off-by: Josh Stone 
-Signed-off-by: Jeremy Cline 

- Makefile  |  4 
- lib/Kconfig.debug | 18 +-
- 2 files changed, 21 insertions(+), 1 deletion(-)
-
-diff --git a/Makefile b/Makefile
-index 9ef547fc7ffe..5777d902f8f3 100644
 a/Makefile
-+++ b/Makefile
-@@ -735,7 +735,11 @@ KBUILD_CFLAGS += -fomit-frame-pointer
- KBUILD_CFLAGS += -ftrivial-auto-var-init=pattern
- endif
- 
-+ifdef CONFIG_DEBUG_INFO_VTA
-+DEBUG_CFLAGS  += $(call cc-option, -fvar-tracking-assignments)
-+else
- DEBUG_CFLAGS  := $(call cc-option, -fno-var-tracking-assignments)
-+endif
- 
- ifdef CONFIG_DEBUG_INFO
- ifdef CONFIG_DEBUG_INFO_SPLIT
-diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug
-index 0d9e81779e37..424206212931 100644
 a/lib/Kconfig.debug
-+++ b/lib/Kconfig.debug
-@@ -217,7 +217,23 @@ config DEBUG_INFO_DWARF4
- Generate dwarf4 debug info. This requires recent versions
- of gcc and gdb. It makes the debug information larger.
- But it significantly improves the success of resolving
--variables in gdb on optimized code.
-+variables in gdb on optimized code.  The gcc docs also
-+recommend enabling -fvar-tracking-assignments for maximum
-+benefit. (see DEBUG_INFO_VTA)
-+
-+config DEBUG_INFO_VTA
-+  bool "Enable var-tracking-assignments for debuginfo"
-+  depends on DEBUG_INFO
-+  help
-+Enable gcc -fvar-tracking-assignments for improved debug
-+information on variable locations in optimized code.  Per
-+gcc, DEBUG_INFO_DWARF4 is recommended for best use of VTA.
-+
-+VTA has been implicated in codegen bugs (gcc PR61801,
-+PR61904), so this may deserve some caution.  One can set
-+GCC_COMPARE_DEBUG=-fvar-tracking-assignments-toggle in the
-+environment to automatically compile everything both ways,
-+generating an error if anything differs.
- 
- config DEBUG_INFO_BTF
-   bool "Generate BTF typeinfo"
--- 
-2.20.1
-
diff --git a/kernel.spec b/kernel.spec
index e7e73d104..c91483f3d 100644
--- a/kernel.spec
+++ b/kernel.spec
@@ -495,8 +495,6 @@ Source5000: patch-5.%{base_sublevel}-git%{gitrev}.xz
 # Standalone patches
 # 100 - Generic long running patches
 
-Patch115: Kbuild-Add-an-option-to-enable-GCC-VTA.patch
-
 Patch116: crash-driver.patch
 
 Patch122: Input-synaptics-pin-3-touches-when-the-firmware-repo.patch
-- 
2.21.0
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US

[PATCH 7/9] Remove old keyboard logging patch

2019-08-15 Thread Laura Abbott
Let's see if this results in flooding.

Signed-off-by: Laura Abbott 
---
 input-kill-stupid-messages.patch | 30 --
 kernel.spec  |  2 --
 2 files changed, 32 deletions(-)
 delete mode 100644 input-kill-stupid-messages.patch

diff --git a/input-kill-stupid-messages.patch b/input-kill-stupid-messages.patch
deleted file mode 100644
index 04205f857..0
--- a/input-kill-stupid-messages.patch
+++ /dev/null
@@ -1,30 +0,0 @@
-From: "kernel-t...@fedoraproject.org" 
-Date: Thu, 29 Jul 2010 16:46:31 -0700
-Subject: [PATCH] input: kill stupid messages
-
-Bugzilla: N/A
-Upstream-status: Fedora mustard

- drivers/input/keyboard/atkbd.c | 4 
- 1 file changed, 4 insertions(+)
-
-diff --git a/drivers/input/keyboard/atkbd.c b/drivers/input/keyboard/atkbd.c
-index ec876b5b1382..9d5216e23a09 100644
 a/drivers/input/keyboard/atkbd.c
-+++ b/drivers/input/keyboard/atkbd.c
-@@ -436,11 +436,15 @@ static irqreturn_t atkbd_interrupt(struct serio *serio, 
unsigned char data,
-   goto out;
-   case ATKBD_RET_ACK:
-   case ATKBD_RET_NAK:
-+# if 0
-+  /* Quite a few key switchers and other tools trigger this
-+   * and it confuses people who can do nothing about it */
-   if (printk_ratelimit())
-   dev_warn(>dev,
-"Spurious %s on %s. "
-"Some program might be trying to access 
hardware directly.\n",
-data == ATKBD_RET_ACK ? "ACK" : "NAK", 
serio->phys);
-+#endif
-   goto out;
-   case ATKBD_RET_ERR:
-   atkbd->err_count++;
diff --git a/kernel.spec b/kernel.spec
index 0e9ba6be4..e7e73d104 100644
--- a/kernel.spec
+++ b/kernel.spec
@@ -495,8 +495,6 @@ Source5000: patch-5.%{base_sublevel}-git%{gitrev}.xz
 # Standalone patches
 # 100 - Generic long running patches
 
-Patch111: input-kill-stupid-messages.patch
-
 Patch115: Kbuild-Add-an-option-to-enable-GCC-VTA.patch
 
 Patch116: crash-driver.patch
-- 
2.21.0
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


[PATCH 6/9] Remove some old modalias adjustments

2019-08-15 Thread Laura Abbott
We've come a long way. Let's just leave these drivers alone.

Signed-off-by: Laura Abbott 
---
 die-floppy-die.patch | 29 -
 kernel.spec  |  4 
 no-pcspkr-modalias.patch | 22 --
 3 files changed, 55 deletions(-)
 delete mode 100644 die-floppy-die.patch
 delete mode 100644 no-pcspkr-modalias.patch

diff --git a/die-floppy-die.patch b/die-floppy-die.patch
deleted file mode 100644
index caaa2dde5..0
--- a/die-floppy-die.patch
+++ /dev/null
@@ -1,29 +0,0 @@
-From: Kyle McMartin 
-Date: Tue, 30 Mar 2010 00:04:29 -0400
-Subject: [PATCH] die-floppy-die
-
-Kill the floppy.ko pnp modalias. We were surviving just fine without
-autoloading floppy drivers, tyvm.
-
-Please feel free to register all complaints in the wastepaper bin.
-
-Bugzilla: N/A
-Upstream-status: Fedora mustard

- drivers/block/floppy.c | 3 +--
- 1 file changed, 1 insertion(+), 2 deletions(-)
-
-diff --git a/drivers/block/floppy.c b/drivers/block/floppy.c
-index a08cda955285..e320e1e679cf 100644
 a/drivers/block/floppy.c
-+++ b/drivers/block/floppy.c
-@@ -4633,8 +4633,7 @@ static const struct pnp_device_id floppy_pnpids[] = {
-   {"PNP0700", 0},
-   {}
- };
--
--MODULE_DEVICE_TABLE(pnp, floppy_pnpids);
-+/* MODULE_DEVICE_TABLE(pnp, floppy_pnpids); */
- 
- #else
- 
diff --git a/kernel.spec b/kernel.spec
index 1a7af5cd4..0e9ba6be4 100644
--- a/kernel.spec
+++ b/kernel.spec
@@ -497,10 +497,6 @@ Source5000: patch-5.%{base_sublevel}-git%{gitrev}.xz
 
 Patch111: input-kill-stupid-messages.patch
 
-Patch112: die-floppy-die.patch
-
-Patch113: no-pcspkr-modalias.patch
-
 Patch115: Kbuild-Add-an-option-to-enable-GCC-VTA.patch
 
 Patch116: crash-driver.patch
diff --git a/no-pcspkr-modalias.patch b/no-pcspkr-modalias.patch
deleted file mode 100644
index 2ccd87202..0
--- a/no-pcspkr-modalias.patch
+++ /dev/null
@@ -1,22 +0,0 @@
-From: "kernel-t...@fedoraproject.org" 
-Date: Thu, 29 Jul 2010 16:46:31 -0700
-Subject: [PATCH] no pcspkr modalias
-
-Bugzilla: N/A
-Upstream-status: Fedora mustard

- drivers/input/misc/pcspkr.c | 1 -
- 1 file changed, 1 deletion(-)
-
-diff --git a/drivers/input/misc/pcspkr.c b/drivers/input/misc/pcspkr.c
-index 56ddba21de84..23534f420e68 100644
 a/drivers/input/misc/pcspkr.c
-+++ b/drivers/input/misc/pcspkr.c
-@@ -23,7 +23,6 @@
- MODULE_AUTHOR("Vojtech Pavlik ");
- MODULE_DESCRIPTION("PC Speaker beeper driver");
- MODULE_LICENSE("GPL");
--MODULE_ALIAS("platform:pcspkr");
-
- static int pcspkr_event(struct input_dev *dev, unsigned int type,
-   unsigned int code, int value)
-- 
2.21.0
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


[PATCH 4/9] Remove ancient ath9k workaround

2019-08-15 Thread Laura Abbott
It's been years. Let's see if we actually still need this.

Signed-off-by: Laura Abbott 
---
 ath9k-rx-dma-stop-check.patch | 38 ---
 kernel.spec   |  2 --
 2 files changed, 40 deletions(-)
 delete mode 100644 ath9k-rx-dma-stop-check.patch

diff --git a/ath9k-rx-dma-stop-check.patch b/ath9k-rx-dma-stop-check.patch
deleted file mode 100644
index 40cbafc7b..0
--- a/ath9k-rx-dma-stop-check.patch
+++ /dev/null
@@ -1,38 +0,0 @@
-From: "kernel-t...@fedoraproject.org" 
-Date: Wed, 6 Feb 2013 09:57:47 -0500
-Subject: [PATCH] ath9k: rx dma stop check
-

- drivers/net/wireless/ath/ath9k/mac.c | 12 +++-
- 1 file changed, 11 insertions(+), 1 deletion(-)
-
-diff --git a/drivers/net/wireless/ath/ath9k/mac.c 
b/drivers/net/wireless/ath/ath9k/mac.c
-index bba85d1a6cd1..ebbee8f17130 100644
 a/drivers/net/wireless/ath/ath9k/mac.c
-+++ b/drivers/net/wireless/ath/ath9k/mac.c
-@@ -693,7 +693,7 @@ bool ath9k_hw_stopdmarecv(struct ath_hw *ah, bool *reset)
- {
- #define AH_RX_STOP_DMA_TIMEOUT 1   /* usec */
-   struct ath_common *common = ath9k_hw_common(ah);
--  u32 mac_status, last_mac_status = 0;
-+  u32 mac_status = 0, last_mac_status = 0;
-   int i;
- 
-   /* Enable access to the DMA observation bus */
-@@ -723,6 +723,16 @@ bool ath9k_hw_stopdmarecv(struct ath_hw *ah, bool *reset)
-   }
- 
-   if (i == 0) {
-+  if (!AR_SREV_9300_20_OR_LATER(ah) &&
-+  (mac_status & 0x700) == 0) {
-+  /*
-+   * DMA is idle but the MAC is still stuck
-+   * processing events
-+   */
-+  *reset = true;
-+  return true;
-+  }
-+
-   ath_err(common,
-   "DMA failed to stop in %d ms AR_CR=0x%08x 
AR_DIAG_SW=0x%08x DMADBG_7=0x%08x\n",
-   AH_RX_STOP_DMA_TIMEOUT / 1000,
diff --git a/kernel.spec b/kernel.spec
index 260976479..79aabba51 100644
--- a/kernel.spec
+++ b/kernel.spec
@@ -507,8 +507,6 @@ Patch116: crash-driver.patch
 
 Patch117: lis3-improve-handling-of-null-rate.patch
 
-Patch120: ath9k-rx-dma-stop-check.patch
-
 Patch122: Input-synaptics-pin-3-touches-when-the-firmware-repo.patch
 
 # This no longer applies, let's see if it needs to be updated
-- 
2.21.0
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


[PATCH 2/9] Drop cpumask auto select patch

2019-08-15 Thread Laura Abbott
We've been carrying a patch to make CPUMASK_OFFSTACK selectable
without debugging for a long time now. The comment said this was
going to be replaced with something else but that never seemed
to happen. We're carrying it to have a higher number of CPUs but
at this point I don't think it's worth it since the upper bound is
now 512. This should be enough for most Fedora use cases so just
drop the patch.

Signed-off-by: Laura Abbott 
---
 .../fedora/generic/x86/x86_64/CONFIG_NR_CPUS  |  2 +-
 kernel.spec   |  2 --
 ...-CPUMASK_OFFSTACK-usable-without-deb.patch | 34 ---
 3 files changed, 1 insertion(+), 37 deletions(-)
 delete mode 100644 lib-cpumask-Make-CPUMASK_OFFSTACK-usable-without-deb.patch

diff --git a/configs/fedora/generic/x86/x86_64/CONFIG_NR_CPUS 
b/configs/fedora/generic/x86/x86_64/CONFIG_NR_CPUS
index 27d187f4d..9ce2b2de6 100644
--- a/configs/fedora/generic/x86/x86_64/CONFIG_NR_CPUS
+++ b/configs/fedora/generic/x86/x86_64/CONFIG_NR_CPUS
@@ -1 +1 @@
-CONFIG_NR_CPUS=1024
+CONFIG_NR_CPUS=512
diff --git a/kernel.spec b/kernel.spec
index a662ee004..4253ff035 100644
--- a/kernel.spec
+++ b/kernel.spec
@@ -495,8 +495,6 @@ Source5000: patch-5.%{base_sublevel}-git%{gitrev}.xz
 # Standalone patches
 # 100 - Generic long running patches
 
-Patch110: lib-cpumask-Make-CPUMASK_OFFSTACK-usable-without-deb.patch
-
 Patch111: input-kill-stupid-messages.patch
 
 Patch112: die-floppy-die.patch
diff --git a/lib-cpumask-Make-CPUMASK_OFFSTACK-usable-without-deb.patch 
b/lib-cpumask-Make-CPUMASK_OFFSTACK-usable-without-deb.patch
deleted file mode 100644
index 5e6d6611e..0
--- a/lib-cpumask-Make-CPUMASK_OFFSTACK-usable-without-deb.patch
+++ /dev/null
@@ -1,34 +0,0 @@
-From: Josh Boyer 
-Date: Mon, 11 Nov 2013 08:39:16 -0500
-Subject: [PATCH] lib/cpumask: Make CPUMASK_OFFSTACK usable without debug
- dependency
-
-When CPUMASK_OFFSTACK was added in 2008, it was dependent upon
-DEBUG_PER_CPU_MAPS being enabled, or an architecture could select it.
-The debug dependency adds additional overhead that isn't required for
-operation of the feature, and we need CPUMASK_OFFSTACK to increase the
-NR_CPUS value beyond 512 on x86.  We drop the current dependency and make
-sure SMP is set.
-
-Bugzilla: N/A
-Upstream-status: Nak'd, supposedly replacement coming to auto-select
-
-Signed-off-by: Josh Boyer 

- lib/Kconfig | 3 ++-
- 1 file changed, 2 insertions(+), 1 deletion(-)
-
-diff --git a/lib/Kconfig b/lib/Kconfig
-index 3a2ef67db6c7..4af1e7e5a611 100644
 a/lib/Kconfig
-+++ b/lib/Kconfig
-@@ -396,7 +396,8 @@ config CHECK_SIGNATURE
-   bool
- 
- config CPUMASK_OFFSTACK
--  bool "Force CPU masks off stack" if DEBUG_PER_CPU_MAPS
-+  bool "Force CPU masks off stack"
-+  depends on SMP
-   help
- Use dynamic allocation for cpumask_var_t, instead of putting
- them on the stack.  This is a bit more expensive, but avoids
-- 
2.21.0
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


[PATCH 3/9] Drop scsi warning patch

2019-08-15 Thread Laura Abbott
It's been years since we've seen this warning. Just drop it.

Signed-off-by: Laura Abbott 
---
 kernel.spec   |  2 -
 ...validate_disk-prevent-NULL-ptr-deref.patch | 39 ---
 2 files changed, 41 deletions(-)
 delete mode 100644 scsi-sd_revalidate_disk-prevent-NULL-ptr-deref.patch

diff --git a/kernel.spec b/kernel.spec
index 4253ff035..260976479 100644
--- a/kernel.spec
+++ b/kernel.spec
@@ -507,8 +507,6 @@ Patch116: crash-driver.patch
 
 Patch117: lis3-improve-handling-of-null-rate.patch
 
-Patch118: scsi-sd_revalidate_disk-prevent-NULL-ptr-deref.patch
-
 Patch120: ath9k-rx-dma-stop-check.patch
 
 Patch122: Input-synaptics-pin-3-touches-when-the-firmware-repo.patch
diff --git a/scsi-sd_revalidate_disk-prevent-NULL-ptr-deref.patch 
b/scsi-sd_revalidate_disk-prevent-NULL-ptr-deref.patch
deleted file mode 100644
index a19267cc1..0
--- a/scsi-sd_revalidate_disk-prevent-NULL-ptr-deref.patch
+++ /dev/null
@@ -1,39 +0,0 @@
-From 7afe9a8d7dca86a8f35250f21f5f0a62ea2fedf7 Mon Sep 17 00:00:00 2001
-From: "kernel-t...@fedoraproject.org" 
-Date: Fri, 10 Feb 2012 14:56:13 -0500
-Subject: [PATCH] scsi: sd_revalidate_disk prevent NULL ptr deref
-
-Bugzilla: 754518
-Upstream-status: Fedora mustard (might be worth dropping...)

- drivers/scsi/sd.c | 7 ++-
- 1 file changed, 6 insertions(+), 1 deletion(-)
-
-diff --git a/drivers/scsi/sd.c b/drivers/scsi/sd.c
-index 3d22fc3..07aec76 100644
 a/drivers/scsi/sd.c
-+++ b/drivers/scsi/sd.c
-@@ -2825,7 +2825,7 @@ static inline u32 logical_to_sectors(struct scsi_device 
*sdev, u32 blocks)
- static int sd_revalidate_disk(struct gendisk *disk)
- {
-   struct scsi_disk *sdkp = scsi_disk(disk);
--  struct scsi_device *sdp = sdkp->device;
-+  struct scsi_device *sdp;
-   struct request_queue *q = sdkp->disk->queue;
-   sector_t old_capacity = sdkp->capacity;
-   unsigned char *buffer;
-@@ -2833,6 +2833,11 @@ static int sd_revalidate_disk(struct gendisk *disk)
-   SCSI_LOG_HLQUEUE(3, sd_printk(KERN_INFO, sdkp,
- "sd_revalidate_disk\n"));
- 
-+  if (WARN_ONCE((!sdkp), "Invalid scsi_disk from %p\n", disk))
-+  goto out;
-+
-+  sdp = sdkp->device;
-+
-   /*
-* If the device is offline, don't try and read capacity or any
-* of the other niceties.
--- 
-2.5.0
-
-- 
2.21.0
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


[PATCH 1/9] Drop namespaces config tweak

2019-08-15 Thread Laura Abbott
We've come a long way for namespaces since 2013 and
all arches now enable namespaces. Drop the patch where
we can turn it off and on.

Signed-off-by: Laura Abbott 
---
 kernel.spec|  2 --
 namespaces-no-expert.patch | 27 ---
 2 files changed, 29 deletions(-)
 delete mode 100644 namespaces-no-expert.patch

diff --git a/kernel.spec b/kernel.spec
index 734ffaed1..a662ee004 100644
--- a/kernel.spec
+++ b/kernel.spec
@@ -511,8 +511,6 @@ Patch117: lis3-improve-handling-of-null-rate.patch
 
 Patch118: scsi-sd_revalidate_disk-prevent-NULL-ptr-deref.patch
 
-Patch119: namespaces-no-expert.patch
-
 Patch120: ath9k-rx-dma-stop-check.patch
 
 Patch122: Input-synaptics-pin-3-touches-when-the-firmware-repo.patch
diff --git a/namespaces-no-expert.patch b/namespaces-no-expert.patch
deleted file mode 100644
index d732f9d0a..0
--- a/namespaces-no-expert.patch
+++ /dev/null
@@ -1,27 +0,0 @@
-From 235b02d70a6a9837896c2ff4ca9d03f172cc4281 Mon Sep 17 00:00:00 2001
-From: "kernel-t...@fedoraproject.org" 
-Date: Wed, 30 Jan 2013 10:55:31 -0500
-Subject: [PATCH] namespaces: no expert
-
-Bugzilla: N/A
-Upstream-status: Fedora mustard

- init/Kconfig | 4 ++--
- 1 file changed, 2 insertions(+), 2 deletions(-)
-
-diff --git a/init/Kconfig b/init/Kconfig
-index 2934249fba46..19d9ee8c120b 100644
 a/init/Kconfig
-+++ b/init/Kconfig
-@@ -871,7 +871,7 @@ config SOCK_CGROUP_DATA
- endif # CGROUPS
- 
- menuconfig NAMESPACES
--  bool "Namespaces support" if EXPERT
-+  bool "Namespaces support"
-   depends on MULTIUSER
-   default !EXPERT
-   help
--- 
-2.14.3
-
-- 
2.21.0
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


[PATCH 5/9] Drop old lis3 patch

2019-08-15 Thread Laura Abbott
We've been carrying this patch for years. If someone wants to
do the work to get it upstream, they are welcome to do so.

Signed-off-by: Laura Abbott 
---
 kernel.spec  |  2 -
 lis3-improve-handling-of-null-rate.patch | 75 
 2 files changed, 77 deletions(-)
 delete mode 100644 lis3-improve-handling-of-null-rate.patch

diff --git a/kernel.spec b/kernel.spec
index 79aabba51..1a7af5cd4 100644
--- a/kernel.spec
+++ b/kernel.spec
@@ -505,8 +505,6 @@ Patch115: Kbuild-Add-an-option-to-enable-GCC-VTA.patch
 
 Patch116: crash-driver.patch
 
-Patch117: lis3-improve-handling-of-null-rate.patch
-
 Patch122: Input-synaptics-pin-3-touches-when-the-firmware-repo.patch
 
 # This no longer applies, let's see if it needs to be updated
diff --git a/lis3-improve-handling-of-null-rate.patch 
b/lis3-improve-handling-of-null-rate.patch
deleted file mode 100644
index 1dd00b645..0
--- a/lis3-improve-handling-of-null-rate.patch
+++ /dev/null
@@ -1,75 +0,0 @@
-From: =?UTF-8?q?=C3=89ric=20Piel?= 
-Date: Thu, 3 Nov 2011 16:22:40 +0100
-Subject: [PATCH] lis3: improve handling of null rate
-
-When obtaining a rate of 0, we would disable the device supposely
-because it seems to behave incorectly. It actually only comes from the
-fact that the device is off and on lis3dc it's reflected in the rate.
-So handle this nicely by just waiting a safe time, and then using the
-device as normally.
-
-Bugzilla: 785814
-Upstream-status: ??
-
-Signed-off-by: ??ric Piel 

- drivers/misc/lis3lv02d/lis3lv02d.c | 16 
- 1 file changed, 8 insertions(+), 8 deletions(-)
-
-diff --git a/drivers/misc/lis3lv02d/lis3lv02d.c 
b/drivers/misc/lis3lv02d/lis3lv02d.c
-index fb8705fc3aca..50c2b93c1273 100644
 a/drivers/misc/lis3lv02d/lis3lv02d.c
-+++ b/drivers/misc/lis3lv02d/lis3lv02d.c
-@@ -216,7 +216,8 @@ static void lis3lv02d_get_xyz(struct lis3lv02d *lis3, int 
*x, int *y, int *z)
- /* conversion btw sampling rate and the register values */
- static int lis3_12_rates[4] = {40, 160, 640, 2560};
- static int lis3_8_rates[2] = {100, 400};
--static int lis3_3dc_rates[16] = {0, 1, 10, 25, 50, 100, 200, 400, 1600, 5000};
-+/* LIS3DC: 0 = power off, above 9 = undefined */
-+static int lis3_3dc_rates[16] = {0, 1, 10, 25, 50, 100, 200, 400, 1600, 5000, 
-1, -1, -1, -1, -1, -1};
- static int lis3_3dlh_rates[4] = {50, 100, 400, 1000};
- 
- /* ODR is Output Data Rate */
-@@ -231,12 +232,11 @@ static int lis3lv02d_get_odr(struct lis3lv02d *lis3)
-   return lis3->odrs[(ctrl >> shift)];
- }
- 
--static int lis3lv02d_get_pwron_wait(struct lis3lv02d *lis3)
-+static int lis3lv02d_wait_pwron(struct lis3lv02d *lis3)
- {
-   int div = lis3lv02d_get_odr(lis3);
--
--  if (WARN_ONCE(div == 0, "device returned spurious data"))
--  return -ENXIO;
-+  if (div <= 0)
-+  div = 1; /* maximum delay */
- 
-   /* LIS3 power on delay is quite long */
-   msleep(lis3->pwron_delay / div);
-@@ -303,7 +303,7 @@ static int lis3lv02d_selftest(struct lis3lv02d *lis3, s16 
results[3])
- 
-   lis3->read(lis3, ctlreg, );
-   lis3->write(lis3, ctlreg, (reg | selftest));
--  ret = lis3lv02d_get_pwron_wait(lis3);
-+  ret = lis3lv02d_wait_pwron(lis3);
-   if (ret)
-   goto fail;
- 
-@@ -314,7 +314,7 @@ static int lis3lv02d_selftest(struct lis3lv02d *lis3, s16 
results[3])
- 
-   /* back to normal settings */
-   lis3->write(lis3, ctlreg, reg);
--  ret = lis3lv02d_get_pwron_wait(lis3);
-+  ret = lis3lv02d_wait_pwron(lis3);
-   if (ret)
-   goto fail;
- 
-@@ -434,7 +434,7 @@ int lis3lv02d_poweron(struct lis3lv02d *lis3)
-   }
-   }
- 
--  err = lis3lv02d_get_pwron_wait(lis3);
-+  err = lis3lv02d_wait_pwron(lis3);
-   if (err)
-   return err;
- 
-- 
2.21.0
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


[PATCH 0/9] Clean up some old patches post F31

2019-08-15 Thread Laura Abbott
I'd like to drop a bunch of patches Fedora has been carrying since
forever. Most of these are fairly minor tweaks most people forgot
we had and nobody cares about. My motivation is both in the spirit
of cleaning up and also to better align Fedora + RHEL (I had a talk
about this at Flock, video should be up soon).

If someone wants to make an effort at upstreaming any of these, feel
free to do so but I really think most of these are cruft.

Thanks,
Laura

Laura Abbott (9):
  Drop namespaces config tweak
  Drop cpumask auto select patch
  Drop scsi warning patch
  Remove ancient ath9k workaround
  Drop old lis3 patch
  Remove some old modalias adjustments
  Remove old keyboard logging patch
  Remove patch for GCC VTA
  Remove crash driver

 Kbuild-Add-an-option-to-enable-GCC-VTA.patch  |  94 ---
 ath9k-rx-dma-stop-check.patch |  38 -
 .../fedora/generic/x86/x86_64/CONFIG_NR_CPUS  |   2 +-
 crash-driver.patch| 722 --
 die-floppy-die.patch  |  29 -
 input-kill-stupid-messages.patch  |  30 -
 kernel.spec   |  20 -
 ...-CPUMASK_OFFSTACK-usable-without-deb.patch |  34 -
 lis3-improve-handling-of-null-rate.patch  |  75 --
 namespaces-no-expert.patch|  27 -
 no-pcspkr-modalias.patch  |  22 -
 ...validate_disk-prevent-NULL-ptr-deref.patch |  39 -
 12 files changed, 1 insertion(+), 1131 deletions(-)
 delete mode 100644 Kbuild-Add-an-option-to-enable-GCC-VTA.patch
 delete mode 100644 ath9k-rx-dma-stop-check.patch
 delete mode 100644 crash-driver.patch
 delete mode 100644 die-floppy-die.patch
 delete mode 100644 input-kill-stupid-messages.patch
 delete mode 100644 lib-cpumask-Make-CPUMASK_OFFSTACK-usable-without-deb.patch
 delete mode 100644 lis3-improve-handling-of-null-rate.patch
 delete mode 100644 namespaces-no-expert.patch
 delete mode 100644 no-pcspkr-modalias.patch
 delete mode 100644 scsi-sd_revalidate_disk-prevent-NULL-ptr-deref.patch

-- 
2.21.0
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: Certificate used to sign Fedora kernels for UEFI Secure Boot?

2019-08-14 Thread Laura Abbott

On 8/14/19 8:35 AM, Paul Moore wrote:

On Tue, Aug 13, 2019 at 2:03 PM Kevin Fenzi  wrote:

On 8/12/19 8:35 AM, Josh Boyer wrote:

On Mon, Aug 12, 2019 at 11:23 AM Paul Moore  wrote:

On Fri, Aug 9, 2019 at 8:31 AM Paul Moore  wrote:


Hello all,

I'm not sure if this is the place for this, but if not perhaps you
could point me in the right direction?

I'm looking for the certificate associated with the key used to sign
the Fedora kernels for UEFI Secure Boot.  What little information I've
found indicates that it should be part of the "shim" package sources,


Well, you likely want to look at the pesign package for the signing
information, but the cert isn't in there either. It's in smart cards
attached to kernel builder machines. When the kernel builds on those the
spec sees that and uses pesign to sign them, otherwise it uses a 'test'
cert to sign things.

May I ask why you want the cert?


I'm working on extensions to tboot to support kernel signatures
instead of hashes.  Not wanting to reinvent the wheel I figured I
would reuse the signed PECOFF format used by UEFI Secure Boot; the
Fedora kernels are one of the kernels I've been using for testing.

While it is still a work in progress, I will be presenting on this
topic next week at LSS-NA.


but it isn't there, and looking back and random points in it's history
I can't seem to find it.  I've found the CA used to sign this mystery
certificate, but not the kernel's signing certificate.  Any help you
can provide would be appreciated.

For reference, this is the certificate I'm looking for:

 Signer #0:
Subject: /CN=Fedora Secure Boot Signer
Issuer : /CN=Fedora Secure Boot CA
Serial : 9976F70F

... and no, I'm obviously not asking for the private key, just an
authoritative source for the public key certificate :)


We don't have one currently, because I guess we didn't think this would
be of use to anyone. If there is some use case for it to be published,
we can do so...


It seems like one would want to publish the certificates used to sign
their kernel images, at the very least publish the CA if not the
entire chain.  Outside the kernel image itself, the only place I could
find the "CN=Fedora Secure Boot CA" was in the signing request for the
UEFI shim; I couldn't find the "CN=Fedora Secure Boot Signer" anywhere
but the kernel image.

Since I'm just doing dev/test at the moment I extracted the signing
cert from the kernel image and I'm using that, but that isn't a
good/general solution for a number of reasons.

FWIW, once I have something that is working properly and suitable for
upstreaming (it is still a prototype) I plan to work on getting it
merged into the tboot upstream.  However, regardless of my work on
tboot, I think it would be nice to be able to verify a kernel
signature without relying on the certificate chain stored within the
kernel.



I'm going to be at LSS-NA next week as well. I'll take notes on your
presentation :)
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: [PATCH] enable NVRAM driver on ppc

2019-07-26 Thread Laura Abbott

On 7/26/19 5:07 AM, Dan Horák wrote:

NVRAM is enabled by default in the mainline kernel on all ppc machines.

Related: #1732612
---
  configs/fedora/generic/powerpc/CONFIG_NVRAM | 1 +
  kernel-ppc64le-debug.config | 2 +-
  kernel-ppc64le.config   | 2 +-
  3 files changed, 3 insertions(+), 2 deletions(-)
  create mode 100644 configs/fedora/generic/powerpc/CONFIG_NVRAM

diff --git a/configs/fedora/generic/powerpc/CONFIG_NVRAM 
b/configs/fedora/generic/powerpc/CONFIG_NVRAM
new file mode 100644
index 0..a296f9134
--- /dev/null
+++ b/configs/fedora/generic/powerpc/CONFIG_NVRAM
@@ -0,0 +1 @@
+CONFIG_NVRAM=y
diff --git a/kernel-ppc64le-debug.config b/kernel-ppc64le-debug.config
index 6d5a7c928..b2537db5d 100644
--- a/kernel-ppc64le-debug.config
+++ b/kernel-ppc64le-debug.config
@@ -3629,7 +3629,7 @@ CONFIG_NVME_TARGET_RDMA=m
  CONFIG_NVME_TARGET_TCP=m
  CONFIG_NVME_TCP=m
  # CONFIG_NVM is not set
-# CONFIG_NVRAM is not set
+CONFIG_NVRAM=y
  # CONFIG_NXP_TJA11XX_PHY is not set
  # CONFIG_OCFS2_DEBUG_FS is not set
  # CONFIG_OCFS2_DEBUG_MASKLOG is not set
diff --git a/kernel-ppc64le.config b/kernel-ppc64le.config
index a06cc62d2..7a96e9b5f 100644
--- a/kernel-ppc64le.config
+++ b/kernel-ppc64le.config
@@ -3608,7 +3608,7 @@ CONFIG_NVME_TARGET_RDMA=m
  CONFIG_NVME_TARGET_TCP=m
  CONFIG_NVME_TCP=m
  # CONFIG_NVM is not set
-# CONFIG_NVRAM is not set
+CONFIG_NVRAM=y
  # CONFIG_NXP_TJA11XX_PHY is not set
  # CONFIG_OCFS2_DEBUG_FS is not set
  # CONFIG_OCFS2_DEBUG_MASKLOG is not set



I folded this into today's rawhide build. You should see this in
kernel-5.3.0-0.rc1.git4.1.fc31

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: [fedora-arm] Re: [Fedocal] Reminder meeting : Fedora ARM & AArch64 status meeting

2019-07-23 Thread Laura Abbott

On 7/23/19 4:19 AM, Jon Masters wrote:

On 7/19/19 1:09 PM, Jon Masters wrote:

On 7/4/19 6:12 PM, Jon Masters wrote:


I think we have identified the root cause of the 32-bit builder issue.
Many thanks to Paul and Peter for assistance in debugging. Here's my
write-up, and we'll work with the vendor on a suitable mitigation to
workaround any errata:

https://medium.com/@jonmasters_84473/debugging-a-32-bit-fedora-arm-builder-issue-73295d7d673d


The hardware vendor have reproduced what I believe to be an errata.
Meanwhile, I've made a test kernel that forces CONFIG_HIGHPTE to off:

https://koji.fedoraproject.org/koji/taskinfo?taskID=36328838

With this kernel, you still get LPAE but leaf level PTEs are not
allocated from high memory any longer. This is because I believe the
errata to be caused by stage 1 page table walks in the guest trapping to
stage 2 (hypervisor) for e.g. Access bit updates on the host. When those
occur, I believe there is a truncation of the guest IPA (guest memory)
address to 32-bits, but only for page table entry walks. Normal
translation faults I think are unaffected by this (TBC).

Normally, we don't allocate PGDs (high level page table pieces) from
high memory (we allocate those from kernel memory caches) but we DO
allocate PTEs specifically from what might be high memory. Except when
we force CONFIG_HIGHPTE to off. The patch I'm using is attached.

It's currently being tested. If it works, I'm curious for input on
temporarily carrying this in Fedora. In theory it means an LPAE system
could starve for PTEs if it has many many processes running, but in
practice I'm willing to bet LPAE is mostly used by Fedora for the 32-bit
builders and that few people would actually complain if we did this.


This stayed up for 3+ days. Eventually, there were a couple of faults
that I thought were a problem but it turns out that they weren't and
just generated noise on the host kernel log. So it looks good to go with
the hack that I proposed and that's going to be in Fedora's 5.2 kernel.

Detail:

The host saw a couple of exits due to speculative page walks in the
guest. It hit my previous logic due to S1 PTW but this time the HPFAR
was correct vs what we would expect due to the 32-bit range limit.

[359524.820107] JCM: WARNING: Mismatched FIPA and PA translation detected!
[359524.899630] JCM: Hyper faulting far: 0x40163000
[359524.955044] JCM: Guest faulting far: 0xb6dbbf48 (gfn: 0x4016)
[359525.025047] JCM: Guest TTBCR: 0xb5023500, TTBR0: 0x4c99ca80
[359525.092963] JCM: Guest PGD address: 0x4c99ca90
[359525.147312] JCM: Guest PGD: 0x58bf7003
[359525.193319] JCM: Guest PMD address: 0x58bf7db0
[359525.247671] JCM: Guest PMD: 0x40163003
[359525.293678] JCM: Guest PTE address: 0x40163dd8
[359525.348030] JCM: Guest PTE: 0x42367508fdf
[359525.401338] JCM: Manually translated as: 0xb6dbbf48->0x367508000
[359525.474465] JCM: Faulting IPA page: 0x40163000
[359525.528814] JCM: Faulting PTE page: 0x40163000
[359525.583166] JCM: *** debugging data ***
[359525.630215] JCM: FAR_EL2: 0xb6dbbf48
[359525.674133] JCM: HPFAR_EL2: 0x401630
[359525.718052] JCM: ESR_EL2: 0x828b
[359525.761972] JCM: FAR_EL1: 0x4f2e50005b89b4
[359525.812149] JCM: ESR_EL1: 0x20b
[359525.850852] JCM: *** debugging data ***
[359525.897899] JCM: Fault occurred while performing S1 PTW -fixing
[359525.969985] JCM: corrected fault_ipa: 0x40163000
[359526.026423] JCM: Corrected gfn: 0x4016
[359526.072427] JCM: handle access fault
[359526.116347] JCM: ret: 0x1

You can see the FAR reported pfn 4016 and that's what we expected, so
the above was just noise in my test kernel on the host monitoring a bit
too carefully and not needing to actually fix anything this time.

Jon.



Peter applied the workaround on rawhide

https://src.fedoraproject.org/rpms/kernel/c/d7341fee1c2697ae60db6fe23edc60ab55a59668?branch=master

I can see about bringing it into F29/F30/stabilization if Peter doesn't
get to it first.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: 5.3.0-rc kernel-headers in rawhide and mass rebuild

2019-07-19 Thread Laura Abbott

On 7/18/19 3:37 PM, Florian Weimer wrote:

Do you plan to leave in the -rc kernel headers for the mass rebuild?

We see some rather odd issues with it when building glibc, and have
trouble getting glibc ready for the mass rebuild.

Thanks,
Florian


Yes, I screwed those up. 
https://koji.fedoraproject.org/koji/taskinfo?taskID=36328729
should be corrected, if not let me know.

If you're still having problems, I can have file a request to have all
the bad kernel-headers untagged from the buildroot.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: [PATCH] configs: remove CONFIG_ASIX_PHY

2019-07-11 Thread Laura Abbott

On 7/10/19 2:49 PM, Paul Bolle wrote:

The Kconfig symbol ASIX_PHY was renamed to AX88796B_PHY in v5.2-rc6, see
upstream commit a9520543b123 ("net: phy: rename Asix Electronics PHY
driver"). CONFIG_AX88796B_PHY is already used in the configuration generation
system, so we can safely remove CONFIG_ASIX_PHY from that system.



Thanks, applied!


Signed-off-by: Paul Bolle 
---
Bravely untested!

  configs/fedora/generic/CONFIG_ASIX_PHY | 1 -
  kernel-aarch64-debug.config| 1 -
  kernel-aarch64.config  | 1 -
  kernel-armv7hl-debug.config| 1 -
  kernel-armv7hl-lpae-debug.config   | 1 -
  kernel-armv7hl-lpae.config | 1 -
  kernel-armv7hl.config  | 1 -
  kernel-i686-debug.config   | 1 -
  kernel-i686.config | 1 -
  kernel-ppc64le-debug.config| 1 -
  kernel-ppc64le.config  | 1 -
  kernel-s390x-debug.config  | 1 -
  kernel-s390x.config| 1 -
  kernel-x86_64-debug.config | 1 -
  kernel-x86_64.config   | 1 -
  15 files changed, 15 deletions(-)
  delete mode 100644 configs/fedora/generic/CONFIG_ASIX_PHY

diff --git a/configs/fedora/generic/CONFIG_ASIX_PHY 
b/configs/fedora/generic/CONFIG_ASIX_PHY
deleted file mode 100644
index 37bb545c7379..
--- a/configs/fedora/generic/CONFIG_ASIX_PHY
+++ /dev/null
@@ -1 +0,0 @@
-# CONFIG_ASIX_PHY is not set
diff --git a/kernel-aarch64-debug.config b/kernel-aarch64-debug.config
index 09b0dc7b4848..3d34488611bc 100644
--- a/kernel-aarch64-debug.config
+++ b/kernel-aarch64-debug.config
@@ -380,7 +380,6 @@ CONFIG_ARM_TEGRA_DEVFREQ=m
  CONFIG_ARM_TIMER_SP804=y
  CONFIG_ARMV8_DEPRECATED=y
  # CONFIG_AS3935 is not set
-# CONFIG_ASIX_PHY is not set
  CONFIG_ASYMMETRIC_KEY_TYPE=y
  CONFIG_ASYMMETRIC_TPM_KEY_SUBTYPE=m
  CONFIG_ASYNC_RAID6_TEST=m
diff --git a/kernel-aarch64.config b/kernel-aarch64.config
index 25398e15cccf..a7a56d219249 100644
--- a/kernel-aarch64.config
+++ b/kernel-aarch64.config
@@ -380,7 +380,6 @@ CONFIG_ARM_TEGRA_DEVFREQ=m
  CONFIG_ARM_TIMER_SP804=y
  CONFIG_ARMV8_DEPRECATED=y
  # CONFIG_AS3935 is not set
-# CONFIG_ASIX_PHY is not set
  CONFIG_ASYMMETRIC_KEY_TYPE=y
  CONFIG_ASYMMETRIC_TPM_KEY_SUBTYPE=m
  CONFIG_ASYNC_RAID6_TEST=m
diff --git a/kernel-armv7hl-debug.config b/kernel-armv7hl-debug.config
index ba671f3c3ac6..2af4b888be95 100644
--- a/kernel-armv7hl-debug.config
+++ b/kernel-armv7hl-debug.config
@@ -374,7 +374,6 @@ CONFIG_ARM_VIRT_EXT=y
  CONFIG_ARM=y
  CONFIG_ARM_ZYNQ_CPUIDLE=y
  # CONFIG_AS3935 is not set
-# CONFIG_ASIX_PHY is not set
  CONFIG_ASYMMETRIC_KEY_TYPE=y
  CONFIG_ASYMMETRIC_TPM_KEY_SUBTYPE=m
  CONFIG_ASYNC_RAID6_TEST=m
diff --git a/kernel-armv7hl-lpae-debug.config b/kernel-armv7hl-lpae-debug.config
index 06b928317038..6acc262c514a 100644
--- a/kernel-armv7hl-lpae-debug.config
+++ b/kernel-armv7hl-lpae-debug.config
@@ -361,7 +361,6 @@ CONFIG_ARM_VEXPRESS_SPC_CPUFREQ=m
  CONFIG_ARM_VIRT_EXT=y
  CONFIG_ARM=y
  # CONFIG_AS3935 is not set
-# CONFIG_ASIX_PHY is not set
  CONFIG_ASYMMETRIC_KEY_TYPE=y
  CONFIG_ASYMMETRIC_TPM_KEY_SUBTYPE=m
  CONFIG_ASYNC_RAID6_TEST=m
diff --git a/kernel-armv7hl-lpae.config b/kernel-armv7hl-lpae.config
index b9c5c1d4d64c..3e4f2009ea57 100644
--- a/kernel-armv7hl-lpae.config
+++ b/kernel-armv7hl-lpae.config
@@ -361,7 +361,6 @@ CONFIG_ARM_VEXPRESS_SPC_CPUFREQ=m
  CONFIG_ARM_VIRT_EXT=y
  CONFIG_ARM=y
  # CONFIG_AS3935 is not set
-# CONFIG_ASIX_PHY is not set
  CONFIG_ASYMMETRIC_KEY_TYPE=y
  CONFIG_ASYMMETRIC_TPM_KEY_SUBTYPE=m
  CONFIG_ASYNC_RAID6_TEST=m
diff --git a/kernel-armv7hl.config b/kernel-armv7hl.config
index 10da3c33de83..cf36f416d78d 100644
--- a/kernel-armv7hl.config
+++ b/kernel-armv7hl.config
@@ -374,7 +374,6 @@ CONFIG_ARM_VIRT_EXT=y
  CONFIG_ARM=y
  CONFIG_ARM_ZYNQ_CPUIDLE=y
  # CONFIG_AS3935 is not set
-# CONFIG_ASIX_PHY is not set
  CONFIG_ASYMMETRIC_KEY_TYPE=y
  CONFIG_ASYMMETRIC_TPM_KEY_SUBTYPE=m
  CONFIG_ASYNC_RAID6_TEST=m
diff --git a/kernel-i686-debug.config b/kernel-i686-debug.config
index 5a2cf9ca31f0..78f81dca88ef 100644
--- a/kernel-i686-debug.config
+++ b/kernel-i686-debug.config
@@ -253,7 +253,6 @@ CONFIG_ARCH_MULTIPLATFORM=y
  CONFIG_ARM64_ERRATUM_858921=y
  CONFIG_ARM_PTDUMP_DEBUGFS=y
  # CONFIG_AS3935 is not set
-# CONFIG_ASIX_PHY is not set
  CONFIG_ASUS_LAPTOP=m
  CONFIG_ASUS_NB_WMI=m
  CONFIG_ASUS_WIRELESS=m
diff --git a/kernel-i686.config b/kernel-i686.config
index 20bb2ce2bdb2..f73340f85459 100644
--- a/kernel-i686.config
+++ b/kernel-i686.config
@@ -252,7 +252,6 @@ CONFIG_ARCH_MULTIPLATFORM=y
  # CONFIG_ARCNET is not set
  CONFIG_ARM64_ERRATUM_858921=y
  # CONFIG_AS3935 is not set
-# CONFIG_ASIX_PHY is not set
  CONFIG_ASUS_LAPTOP=m
  CONFIG_ASUS_NB_WMI=m
  CONFIG_ASUS_WIRELESS=m
diff --git a/kernel-ppc64le-debug.config b/kernel-ppc64le-debug.config
index 16409acf7e02..2cdc0886ef5b 100644
--- a/kernel-ppc64le-debug.config
+++ b/kernel-ppc64le-debug.config
@@ -197,7 +197,6 @@ 

Re: Enable CONFIG_RC_XBOX_DVD ?

2019-07-09 Thread Laura Abbott

On 7/8/19 9:20 AM, Bastien Nocera wrote:

Hey,

Would it be possible to enable the CONFIG_RC_XBOX_DVD kernel
config, as a module, so that they can be used with Fedora?

While the device itself might look like it isn't compatible
with anything but an original XBox:
https://retro.poromagia.com/media/images/products/2018/06/Xbox-DVD-Movie-Playback-Kit-1-175047.JPG

It can be plugged into any machine with USB easily, with a
very cheap adapter:
https://www.ebay.com/itm/273293737952

Cheers

(I have 5 of those on my desk as we speak)
___


I enabled this on rawhide. (I think this was going into stabilization
as well?)

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: Can Fedora enable CONFIG_DETECT_HUNG_TASK ?

2019-05-20 Thread Laura Abbott

On 5/18/19 11:48 AM, Alan Jenkins wrote:

Hi

I was surprised to realize that Fedora kernels do not enable 
CONFIG_DETECT_HUNG_TASK.  Is there any reason why it should not enable it?

Fedora kernels appear to be an outlier here, v.s. RHEL, Debian, Ubuntu and SUSE.

I'm not taking a postion on whether ABRT needs to report hung tasks.  If ABRT 
needs explicit support to report them, that could be added later. We only need 
to be confident that ABRT isn't going to something we don't want it to.

When the kernel detects all of userspace is hung, this could provide useful 
console logs on Fedora Server, other non-GUI installs, or expert users who 
resort to serial or network console logging.  When the hang is more specific, 
seeing the hung task in the kernel log is a nice and quick pointer towards the 
problem.

I recently wrote some advice which mentioned the hung task detector.  I 
observer that it is one of a set of handy crash/hang messages in the kernel.[1]

[1] 
https://unix.stackexchange.com/questions/518554/debian-stretch-vm-becomes-quasi-unresponsive-every-few-days/

It seems undesirable for Fedora to disable this type of message. Especially 
considering Fedora's quick turnover of kernels, and exposure to exciting new 
bugs :-).  I haven't checked if it is enabled in Rawhide, but I feel like it 
should be enabled for all Fedora kernels.

Thanks for the kernels :-)
Alan


 > Say Y here to enable the kernel to detect "hung tasks", which are bugs that cause the 
task to be stuck in uninterruptible "D" state indefinitely.
 >
 > When a hung task is detected, the kernel will print the current stack trace 
(which you should report), but the task will stay in uninterruptible state. If 
lockdep is enabled then all held locks will also be reported. This feature has 
negligible overhead.

(This option is not a sophisticated lock cycle detector.  It is just a simple 
timeout.  The upstream default timeout is 2 minutes.  Once a (default) 10 hung 
task messages have been logged, the kernel stops logging them).


We do have this on in the debug version of the kernel but not the regular
version. I think this is something we set a while ago but never really
thought about again. My one hesitation about enabling this would be
that certain devices might be particularly prone to hanging and this
could create a lot of noise for us to sort through. That said, I
think this could be a good candidate for turning on in rawhide so it
gets enabled in F31.

If nobody raises any serious objections, I'll see about turning it
on in rawhide.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: [PATCH] kernel-tools.spec: Adding libbpf package

2019-05-16 Thread Laura Abbott

On 5/16/19 2:42 PM, Jiri Olsa wrote:

On Wed, Apr 03, 2019 at 06:38:38PM +, Jeremy Cline wrote:

Hi Jiri,

On 4/2/19 6:35 AM, Jiri Olsa wrote:

hi,
please consider attached change that adds libbpf sub
package to be generated within kernel-tools spec.

We need libbpf in a separate package, starting with basic
files, some more might come later if there's a need.

thanks,
jirka


---


I've applied this and rebuilt kernel-tools for Rawhide as
kernel-tools-5.1.0-0.rc3.git0.2.fc31.


hi,
it'd be great to have libbpf for Fedora 30 as well,
I have scratch build in here:
   https://koji.fedoraproject.org/koji/taskinfo?taskID=34883714

but I had to add 2 patches on top of v5.0

I assume Fedora 30 will stay on v5.0 .. is there some
policy on adding this to Fedora 30?



Fedora 30 will get rebased to 5.1 which should be happening sometime
next week. We're pretty flexible with what we let into releases so
I think it's fine to go in, unless Jeremy sees some issue.

Thanks,
Laura


thanks,
jirka


___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


please remember to test F28 kernels

2019-04-04 Thread Laura Abbott

F28 is seeing a pretty big fall off in karma for new kernels.
This is somewhat expected as we move towards F30 release.
If you happen to have an F28 system around, please remember
to test and give karma.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Rebase plans for kernel 5.0

2019-03-04 Thread Laura Abbott

Hi,

As you probably have seen, kernel 5.0 was released last night. This
has been built in rawhide. We'll be following the usual rebase
procedure for f29 and f28: Around the time when 5.0.2 or 5.0.3
is released, that kernel will go into f29. f28 will be rebased
shortly afterwards. We don't have any control over when upstream
will release a stable kernel but best guess would be that f29
will get 5.0 by early to mid April.

f30 is building 5.0 right now and will be getting the usual
stable updates as they come out. I'll also be doing a rebase
on the stabilization branch and will be doing builds in the
kernel-stabilization copr. If you want early access to 5.0,
I recommend just using the f30 builds (if you find bugs,
please report them so we can get them fixed)

Thanks,
Laura

P.S. If you are using F28, please make sure to keep giving
those kernels karma in bodhi. We're seeing a fall off in
testing.
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: kernel bug triage cc list

2019-02-25 Thread Laura Abbott

On 2/25/19 1:42 PM, Chris Murphy wrote:

Hi,

Reading this
https://fedoraproject.org/wiki/KernelBugTriage#Triage_Quickstart

Is it possible to get bugzi...@colorremedies.com added to distribution
whenever a bug is set to CC fedora-kernel-bt...@fedoraproject.org ?

Thanks,



No objections here. It's managed by an ansible playbook so someone
who has access to the playbook (jcline) can make the change and
it will get automatically updated.
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: toolchain requirements for external kernel modules

2019-02-19 Thread Laura Abbott

On 2/19/19 10:47 AM, Dulaney wrote:

On Gearr 18, 2019 aig 12:26:04f -0800, sgrìobh Laura Abbott:


Yes, that was the case I was concerned about with gcc being updated.
I guess the case would be where the kernel gets built with a different
gcc that isn't yet on a local system. Doing a batched bodhi update
could fix this for stable releases but we don't have that on rawhide.
Requiring the sync also seems like a pain to deal with.

Laura


So, just out of curiosity, why can't these be in their own rpm(s) that get
updated every time gcc does?  If I'm reading you correctly, the gcc modules
are dependent on gcc, not the kernel features on specific versions of the
gcc modules.



No, these plugins are tied to the kernel itself and can be updated with
each kernel version. They need to exist in the kernel spec file at
kernel build time. They aren't dependent on the gcc version per se but
they need to get rebuilt each time there is a new gcc.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Help remove scriptlets from the kernel?

2019-02-18 Thread Laura Abbott

At DevConf a few weeks ago, Stephen Gallagher and Will Woods gave a talk about
removing rpm scriptlets. The recording hasn't been uploaded yet but the slides
are available 
https://schd.ws/hosted_files/devconfcz2019/bc/scriptlet-reform-school-3.pdf
The kernel uses a few scriptlets at the moment which will need to be cleaned
up, most likely replaced with file triggers. We'll certainly be looking at this
but if anyone is super excited about cleaning up packaging, this could be
a good project (and much appreciated!)

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: toolchain requirements for external kernel modules

2019-02-18 Thread Laura Abbott

On 2/15/19 3:47 AM, Florian Weimer wrote:

* Laura Abbott:


I've been experimenting with enabling CONFIG_GCC_PLUGINS in the kernel
since I've heard some people express interest in stackleak (I'm interested
as well). a gcc plugin gets built as an .so file for use during
compilation. This means we need to package this .so file as part
of kernel-devel for building external modules. This is easy to
do but it also now introduces a tighter restriction on the toolchain
used for building modules since gcc will refuse to load a plugin and
fail to build the module if the versions don't match. Arguably, there's
always been a requirement to use the same toolchain version but there may
have been some flexibility for forcing it.

Can anyone see major problems with requiring the same toolchain
version for building external modules as the kernel?


If those kernel modules happen to build userspace components as well
(and use the right build flags), then they have such a toolchain
dependency already, indirectly through the annobin plugin.

The main caveat I see is that it is tricky to handle the version
constraints correctly (both in the plugin and at the RPM level).  For a
long time, the annobin constraints were too tight.


Most modules are probably not going to be compiling userspace
components so I'm not too concerned there.

Thanks for the pointer to annobin though, I hadn't thought about
how to actually specify the requirement in the rpm file. I'm
not sure if this example convinces me I should do gcc plugins
or it's not worth the hassle.

Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: toolchain requirements for external kernel modules

2019-02-18 Thread Laura Abbott

On 2/14/19 4:19 PM, stan wrote:

On Thu, 14 Feb 2019 15:09:04 -0800
Laura Abbott  wrote:


Can anyone see major problems with requiring the same toolchain
version for building external modules as the kernel?


If gcc is updated between Fedora kernel versions and someone wants to
build a module, it would build but be unuseable?  If that is true, then
gcc updates should just be released at the same time as a kernel built
with them to finesse the issue.

I suspect that this would be a rare issue in practice.  Oops, I forgot
about rpmfusion, where they do build modules, and akmod which builds
modules automatically when a new kernel is released.  That would make
it more likely to occur, I think.


Yes, that was the case I was concerned about with gcc being updated.
I guess the case would be where the kernel gets built with a different
gcc that isn't yet on a local system. Doing a batched bodhi update
could fix this for stable releases but we don't have that on rawhide.
Requiring the sync also seems like a pain to deal with.

Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


toolchain requirements for external kernel modules

2019-02-14 Thread Laura Abbott

I've been experimenting with enabling CONFIG_GCC_PLUGINS in the kernel
since I've heard some people express interest in stackleak (I'm interested
as well). a gcc plugin gets built as an .so file for use during
compilation. This means we need to package this .so file as part
of kernel-devel for building external modules. This is easy to
do but it also now introduces a tighter restriction on the toolchain
used for building modules since gcc will refuse to load a plugin and
fail to build the module if the versions don't match. Arguably, there's
always been a requirement to use the same toolchain version but there may
have been some flexibility for forcing it.

Can anyone see major problems with requiring the same toolchain
version for building external modules as the kernel?

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: re-enable CONFIG_JUMP_LABEL on s390x

2019-02-11 Thread Laura Abbott

On 2/11/19 1:57 PM, Dan Horák wrote:

Hi,

the root cause of https://marc.info/?t=15482482101=1=2 was
fixed in gcc trunk (only) and it's now available in gcc-9.0.1-0.4.fc30.

Something like the patch bellow is needed, but things get complicated,
because the new constraint won't be available in gcc < 9 (afaik). A
scratch build succeeded - 
https://koji.fedoraproject.org/koji/taskinfo?taskID=32736584

What I changed
- updated 0001-s390-jump_label-Correct-asm-contraint.patch and added as Patch5xx
- reverted the *config* part of 1b48caa (Disable CONFIG_JUMP_LABEL on s390x)


diff --git a/arch/s390/include/asm/jump_label.h 
b/arch/s390/include/asm/jump_label.h
index e2d3e6c43395..41dabfd8518d 100644
--- a/arch/s390/include/asm/jump_label.h
+++ b/arch/s390/include/asm/jump_label.h
@@ -22,7 +22,7 @@ static inline bool arch_static_branch(struct static_key *key, 
bool branch)
   ".long0b-.,%l[label]-.\n"
   ".quad%0-.\n"
   ".popsection\n"
- : : "X" (&((char *)key)[branch]) : : label);
+ : : "jdd" (&((char *)key)[branch]) : : label);
 return false;
  label:
 return true;
@@ -36,7 +36,7 @@ static inline bool arch_static_branch_jump(struct static_key 
*key, bool branch)
   ".long0b-.,%l[label]-.\n"
   ".quad%0-.\n"
   ".popsection\n"
- : : "X" (&((char *)key)[branch]) : : label);
+ : : "jdd" (&((char *)key)[branch]) : : label);
 return false;
  label:
 return true;



With regards,

Dan


Thanks for following up. I committed the proposal from
https://marc.info/?l=linux-kernel=154937077018072=2 and reenabled
CONIFG_JUMP_LABEL on today's -rc6 build. I'm guessing that patch
will get committed so I suggest we watch that and continue to follow
up upstream.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: Backporting some patches to use i915.fastboot=1 by default

2019-01-27 Thread Laura Abbott

On 1/25/19 12:43 AM, Hans de Goede wrote:

Hi,

To complete flickerfree boot support and remove the last modeset
on systems using an Intel iGPU, I've been working with i915 upstream
to make i915.fastboot=1 the default, this is part of:
https://fedoraproject.org/wiki/Changes/FlickerFreeBoot

I've just gotten agreement on a patch for this and a Reviewed-by
for that patch. That patch enables 915.fastboot=1 by default on
Skylake (gen9) and newer Intel graphics.

I would like to cherry-pick this patch and some small related
i915 bugfixes into the Fedora 5.0.0 kernel. This is only intended
for rawhide / F30, I will add a note to rebase-notes that the
patch flipping the default for gen9+ should be dropped for
f29 and older (the bug fixes can stay).

I would like to add these patches to the current rawhide kernel
soon, so that this get as much testing as possible. Is that
ok with you (the Fedora kernel team) ?

Regards,

Hans


No objections from me.
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


s390x kernel disabled on Fedora rawhide

2019-01-24 Thread Laura Abbott

gcc9 exposed an underlying issue with some inline asm on s390x. I've emailed
upstream about the issue but it's still not fixed. In the interest of
continuing to test kernels, I've disabled this arch in rawhide kernels
for now. I'll be keeping an eye on this and plan to turn this arch back
on as soon as I can.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: [PATCH 2/2] Don't require python3 for a string replace

2019-01-15 Thread Laura Abbott

On 1/15/19 1:44 AM, pa...@fliagreco.com.ar wrote:

From: Pablo Greco 

---
  kernel.spec | 2 +-
  1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/kernel.spec b/kernel.spec
index 280..25ad968 100644
--- a/kernel.spec
+++ b/kernel.spec
@@ -1228,7 +1228,7 @@ BuildKernel() {
  
  # make sure EXTRAVERSION says what we want it to say

  # Trim the release if this is a CI build, since KERNELVERSION is limited 
to 64 characters
-ShortRel=$(python3 -c "import re; print(re.sub(r'\.pr\.[0-9A-Fa-f]{32}', '', 
'%{release}'))")
+ShortRel=$(perl -e "print \"%{release}\" =~ s/\.pr\.[0-9A-Fa-f]{32}//r")
  perl -p -i -e "s/^EXTRAVERSION.*/EXTRAVERSION = 
-${ShortRel}.%{_target_cpu}${Flav}/" Makefile
  
  # if pre-rc1 devel kernel, must fix up PATCHLEVEL for our versioning scheme




So I was seeing this cause a build failure when I tried a scratch build

https://koji.fedoraproject.org/koji/taskinfo?taskID=32051959

I've been having problems sometimes with line endings so it might have been
a problem with how I applied the patch but did this work for you?
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: [PATCH] configs: add arm file for CONFIG_PCI_MESON

2019-01-14 Thread Laura Abbott

On 1/12/19 3:13 AM, Paul Bolle wrote:

Commit c9c254b74995 ("minor Arm config tweaks") set CONFIG_PCI_MESON to
'y' for all shipped arm and aarch64 .config files. It didn't add the
corrresponding change to the configuration generation directory. Do so
now.

Signed-off-by: Paul Bolle 
---
  configs/fedora/generic/arm/CONFIG_PCI_MESON | 1 +
  1 file changed, 1 insertion(+)
  create mode 100644 configs/fedora/generic/arm/CONFIG_PCI_MESON

diff --git a/configs/fedora/generic/arm/CONFIG_PCI_MESON 
b/configs/fedora/generic/arm/CONFIG_PCI_MESON
new file mode 100644
index ..2c5ba5ddf5f8
--- /dev/null
+++ b/configs/fedora/generic/arm/CONFIG_PCI_MESON
@@ -0,0 +1 @@
+CONFIG_PCI_MESON=y



Peter corrected this already.
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: [PATCH] configs: Correct four non-standard filenames

2019-01-14 Thread Laura Abbott

On 1/12/19 9:37 AM, Paul Bolle wrote:

These non-standard filenames have no effect on the build, but should
still be fixed since they could be confusing (to people and scripts).

Signed-off-by: Paul Bolle 
---
  ...FIG_ALTERA_PR_IP_CORE_PLAT=n => CONFIG_ALTERA_PR_IP_CORE_PLAT} | 0
  configs/fedora/generic/{CONFIG_B53_SERDES=n => CONFIG_B53_SERDES} | 0
  .../{CONFIG_FPGA_MGR_ZYNQ_FPGA=n => CONFIG_FPGA_MGR_ZYNQ_FPGA}| 0
  .../x86/{CONFIG_SENSORS_APPLESMC=m => CONFIG_SENSORS_APPLESMC}| 0
  4 files changed, 0 insertions(+), 0 deletions(-)
  rename configs/fedora/generic/{CONFIG_ALTERA_PR_IP_CORE_PLAT=n => 
CONFIG_ALTERA_PR_IP_CORE_PLAT} (100%)
  rename configs/fedora/generic/{CONFIG_B53_SERDES=n => CONFIG_B53_SERDES} 
(100%)
  rename configs/fedora/generic/{CONFIG_FPGA_MGR_ZYNQ_FPGA=n => 
CONFIG_FPGA_MGR_ZYNQ_FPGA} (100%)
  rename configs/fedora/generic/x86/{CONFIG_SENSORS_APPLESMC=m => 
CONFIG_SENSORS_APPLESMC} (100%)

diff --git a/configs/fedora/generic/CONFIG_ALTERA_PR_IP_CORE_PLAT=n 
b/configs/fedora/generic/CONFIG_ALTERA_PR_IP_CORE_PLAT
similarity index 100%
rename from configs/fedora/generic/CONFIG_ALTERA_PR_IP_CORE_PLAT=n
rename to configs/fedora/generic/CONFIG_ALTERA_PR_IP_CORE_PLAT
diff --git a/configs/fedora/generic/CONFIG_B53_SERDES=n 
b/configs/fedora/generic/CONFIG_B53_SERDES
similarity index 100%
rename from configs/fedora/generic/CONFIG_B53_SERDES=n
rename to configs/fedora/generic/CONFIG_B53_SERDES
diff --git a/configs/fedora/generic/CONFIG_FPGA_MGR_ZYNQ_FPGA=n 
b/configs/fedora/generic/CONFIG_FPGA_MGR_ZYNQ_FPGA
similarity index 100%
rename from configs/fedora/generic/CONFIG_FPGA_MGR_ZYNQ_FPGA=n
rename to configs/fedora/generic/CONFIG_FPGA_MGR_ZYNQ_FPGA
diff --git a/configs/fedora/generic/x86/CONFIG_SENSORS_APPLESMC=m 
b/configs/fedora/generic/x86/CONFIG_SENSORS_APPLESMC
similarity index 100%
rename from configs/fedora/generic/x86/CONFIG_SENSORS_APPLESMC=m
rename to configs/fedora/generic/x86/CONFIG_SENSORS_APPLESMC



Applied. Thanks again for the cleanup!
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: [PATCH 0/3] Kconfig symbol cleanup for v5.0-rc1

2019-01-14 Thread Laura Abbott

On 1/11/19 6:55 AM, Paul Bolle wrote:

This short series cleans up all references to Kconfig symbols that have
no effect on the build.

This series is way too boring to review. But it can be tested by
comparing the generated .config files (in the BUILD directory) before
and after this series. These generated .config files should not change.
Unless I made a mistake, that is.

Anyhow, review and/or comments are, as always, appreciated. A build
run on Fedora's build farm would be nice too. (I don't have access to
that system.) But if I'm right that build should show no differences
whatsoever.



Nothing changed after running ./build_configs.sh so I went ahead
and applied these to rawhide. It should show up in tomorrow's build.
Thanks for taking the time to clean this up.

Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: [PATCH 0/3] Kconfig symbol cleanup for v5.0-rc1

2019-01-11 Thread Laura Abbott

On 1/11/19 7:16 AM, Paul Bolle wrote:

Peter Robinson schreef op vr 11-01-2019 om 15:04 [+]:

On Fri, Jan 11, 2019 at 2:56 PM Paul Bolle  wrote:

  configs/fedora/generic/CONFIG_RTC |   1 -


I'm pretty sure RTC is still a very valid option.


Upstream says:
 depends on ALPHA



Yes, that looks like the ancient RTC driver which is
different from drivers/rtc/


  .../fedora/generic/CONFIG_TCG_TIS_ST33ZP24|   1 -


And that looks relevant.


Well, Fedora's .configs only have
 # CONFIG_TCG_TIS_ST33ZP24_I2C is not set

and/or
# CONFIG_TCG_TIS_ST33ZP24_SPI is not set

so it seems nothing in the 14 builds cares about CONFIG_TCG_TIS_ST33ZP24.



Yes, CONFIG_TCG_TIS_ST33ZP24  is a symbol that only gets selected,
it's not actually one we can configure.
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: [PATCH 1/2] Enable CONFIG_NET_SCH_ETF

2018-12-28 Thread Laura Abbott

On 12/28/18 1:34 AM, Artem Bityutskiy wrote:

Hello folks,

is there anything I can do for this patch-set to get maintainers'
attention? Thanks!



In the future, please wait a longer time before asking about
the status, especially given this was over a holiday break.

I applied the patch to rawhide so you should see it in the
next few days.


On Thu, 2018-12-20 at 11:47 +0200, Artem Bityutskiy wrote:

From: Artem Bityutskiy 

Enable the ETF queuing discipline (qdisc) as a module, similar to many other
qdiscs that we have enabled as modules.

ETF stands for Earliest TxTime first and it enables applications to schedule
network packets to be sent in the future.

Signed-off-by: Artem Bityutskiy 


.. snip ...
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: Which I/O scheduler is Fedora switching to in 4.21? mq-deadline or BFQ?

2018-12-13 Thread Laura Abbott

On 12/11/18 3:48 AM, Alan Jenkins wrote:

Hi

mattdm suggested the upcoming scheduler change should be discussed here.[1]  I 
might not have enough time to talk details at the moment, but I noticed this is 
coming up relatively soon. This is what I understand so far about the decision.

Thanks for all the software,
Alan


[1] 
https://unix.stackexchange.com/questions/483881/what-does-fedora-workstation-29-use-as-the-default-i-o-scheduler


## CFQ is scheduled for removal

Jens Axboe is planning to remove the CFQ I/O scheduler in 4.21. That is, CFQ is part of 
the "legacy" single-queue block layer, which is going to be removed for ease of 
maintenance.[2]

Axboes last comment on this timing was made *after* the fix for data corruption 
on MQ.  I.e. the data corruption covered by the recent thread on this list.

*Obligatory disclaimer*.  Read the paragraph above, and consider waiting for 
the next stable kernel update, before you test MQ (including BFQ) on your own 
machine :-).


[2] "It's definitely still going" - Jens Abxoe. 
https://bugzilla.kernel.org/show_bug.cgi?id=201685#c279


## The kernel wants us to choose our new default

For devices which have only one hardware queue, the new upstream default is 
mq-deadline.  Going from CFQ to mq-deadline is a significant change.  For 
example, the deadline scheduler does not support ionice.

The alternative to the MQ deadline scheduler will be BFQ.[3][4] Upstream 
discussed this, and the powers that be (mostly Axboe :-) are explicitly 
expecting us (downstreams) to make this decision.[5]


[3] BFQ: http://algo.ing.unimo.it/people/paolo/disk_sched/description.php

[4] 
https://unix.stackexchange.com/questions/375600/how-to-enable-and-use-the-bfq-scheduler

[5] "I'd prefer if the distros would lead the way on this, as theyare the ones that 
will most likely see the most bug reports" - Jens Axboe, 
https://www.spinics.net/lists/linux-block/msg31062.html


## Arguments for (or against) BFQ?

Paolo Valente kindly wrote an informative response, which I will copy in to a 
separate message.  The following is my very limited first impression.

Personally I lean towards BFQ by default.  It appears nominated as the 
successor to CFQ, I think it's worthy as such, and it makes distinct 
improvements of it's own.  I would recommend it with more confidence if I 
understood how the improvements work :-).

The deadline scheduler probably isn't a *complete* disaster. Ubuntu ran with 
the deadline scheduler for a while.[6]  I haven't checked whether they changed 
the tuning knobs though!

RHEL7 defaults to CFQ for SATA drives.  This is notable given that it 
recommends avoiding (or tuning) CFQ on basically any other server hardware (and 
specifically to avoid it on hardware RAID).[7]

I've tried BFQ on my laptops hard drive (not SSD).  It has some associated tests for 
responsiveness (the "S" tests).  I don't have a real-world feel for it, but I 
agree the test numbers are an impressive improvement over CFQ.

I don't have results for the S tests on the deadline scheduler. I did note the eponymous 
"deadline" for sync reads has a default of 500 ms.

The other test I have, is that "deadline" doesn't match CFQ's level of fairness for reads 
v.s. writes, even with the recent addition of WBT.  Neither approached what I would actually call 
fairness.  BFQ did.[8]  This is due to BFQ's "compensations" for device writeback caching 
and NCQ.  And allegedly for Linux writeback.  These extra compensations are the part I don't 
understand, so far.[9]


[6] 
https://askubuntu.com/questions/784442/why-does-ubuntu-16-04-set-all-drive-io-schedulers-to-deadline

[7] RHEL7 IO schedulers:

https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/performance_tuning_guide/chap-red_hat_enterprise_linux-performance_tuning_guide-storage_and_file_systems#sect-Red_Hat_Enterprise_Linux-Performance_Tuning_Guide-Considerations-IO_Schedulers

[8] I tried to closely match the test from the cover letters from the WBT patch 
series.  I don't have detailed statistics, but I believe deadline+WBT was less 
fair than CFQ.  It was definitely not more fair.

https://unix.stackexchange.com/questions/483269/determine-the-specific-benefit-of-writeback-throttling-config-wbt

[9] https://groups.google.com/forum/#!topic/bfq-iosched/yjZDn_HnLIc



Thanks for starting this discussion. Based on this thread and
other discussions, I'm going to see about enabling BFQ for
4.21. Once 4.21-rc1 comes out (i.e. almost all configs should
be in) we can review the settings and see if anything needs
to be adjusted. If I get some time before then (i.e. before
I leave for holiday) I'll see if I can change the defaults.

Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: 

Re: ext4 file system corruption -> https://bugzilla.kernel.org/show_bug.cgi?id=201685

2018-12-04 Thread Laura Abbott

On 12/3/18 8:46 AM, Reindl Harald wrote:


Am 03.12.18 um 17:42 schrieb Laura Abbott:

On 12/2/18 6:20 AM, Reindl Harald wrote:

how does Fedora think to handle
https://bugzilla.kernel.org/show_bug.cgi?id=201685

4.18.20 is the last 4.18.x and happily at least 4.18.20 from F27 runs
fine on F28 systems but given that bug upgrade to 4.19.x seems to be
just a lottery with your data - on some or even many systems all seems
to be fine BUT when you are affected and nobody until now knows the root
cause

honestly the rebase to 4.19 was too fast to start with!
WHY did that rebase happen at all?

kernel-4.19.2-200.fc28 jcline 2018-11-15 01:34:18
bug reported: 2018-11-13 19:42:20 UTC

and yes i had that bugreport in my inbox just because i have subscribed
to filesystem / raid related mailing lists and the word "crazy" appeared
in my mind when i saw the rebase two days later because i expect that
downstream maintainers at least have the same lists subscribed ordinary
users have


We're working with the upstream maintainers to narrow down the problem.
At least on Fedora we haven't seen any reports of corruption reported
on our bugzilla which is a useful data point for the upstream maintainers.
We'll keep you updated if we find anything.


here you have the first Fedora user upstream
https://bugzilla.kernel.org/show_bug.cgi?id=201685#c198


There's now a fix proposed upstream
https://bugzilla.kernel.org/show_bug.cgi?id=201685#c255

___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: ext4 file system corruption -> https://bugzilla.kernel.org/show_bug.cgi?id=201685

2018-12-03 Thread Laura Abbott

On 12/2/18 6:20 AM, Reindl Harald wrote:

how does Fedora think to handle
https://bugzilla.kernel.org/show_bug.cgi?id=201685

4.18.20 is the last 4.18.x and happily at least 4.18.20 from F27 runs
fine on F28 systems but given that bug upgrade to 4.19.x seems to be
just a lottery with your data - on some or even many systems all seems
to be fine BUT when you are affected and nobody until now knows the root
cause

honestly the rebase to 4.19 was too fast to start with!
WHY did that rebase happen at all?

kernel-4.19.2-200.fc28  jcline  2018-11-15 01:34:18
bug reported: 2018-11-13 19:42:20 UTC

and yes i had that bugreport in my inbox just because i have subscribed
to filesystem / raid related mailing lists and the word "crazy" appeared
in my mind when i saw the rebase two days later because i expect that
downstream maintainers at least have the same lists subscribed ordinary
users have


We're working with the upstream maintainers to narrow down the problem.
At least on Fedora we haven't seen any reports of corruption reported
on our bugzilla which is a useful data point for the upstream maintainers.
We'll keep you updated if we find anything.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: [PATCH 0/3] Fix all Kconfig "override" warnings

2018-11-15 Thread Laura Abbott

On 11/13/18 8:57 AM, Paul Bolle wrote:

For some time now the build generates a number of override warnings,
like this one:
 [...]:warning: override: VIRT_CPU_ACCOUNTING_NATIVE changes choice state

These warnings are triggered when the build uses a .config that has
more than one option set in a Kconfig "choice". But the kernel build
system will only allow one option per "choice".

This small series fixes all current warnings. It doesn't change the
final .configs that the kernel build system will use. (That was my goal
for this series.) So this series should only result in a quieter build.

I'd really appreciate any testing to uncover whether I missed something.



I'm behind due to conference travel but I'm very happy to see this
getting fixed. I'll make sure to take a look at this if someone
else doesn't get to it first.

Thanks,
Laura


Paul Bolle (3):
   configs: correct cpu accounting configuration
   configs: correct memory configuration
   configs: use CONFIG_UNWINDER_ORC only in x86/x86_64

  configs/fedora/generic/CONFIG_FLATMEM_MANUAL | 1 -
  configs/fedora/generic/CONFIG_VIRT_CPU_ACCOUNTING_NATIVE | 2 +-
  .../fedora/generic/powerpc/CONFIG_VIRT_CPU_ACCOUNTING_NATIVE | 1 +
  configs/fedora/generic/s390x/CONFIG_TICK_CPU_ACCOUNTING  | 1 +
  .../fedora/generic/s390x/CONFIG_VIRT_CPU_ACCOUNTING_NATIVE   | 1 +
  configs/fedora/generic/x86/x86_64/CONFIG_TICK_CPU_ACCOUNTING | 1 +
  configs/fedora/generic/{ => x86/x86_64}/CONFIG_UNWINDER_ORC  | 0
  kernel-aarch64-debug.config  | 4 +---
  kernel-aarch64.config| 4 +---
  kernel-armv7hl-debug.config  | 4 +---
  kernel-armv7hl-lpae-debug.config | 4 +---
  kernel-armv7hl-lpae.config   | 4 +---
  kernel-armv7hl.config| 4 +---
  kernel-i686-debug.config | 3 +--
  kernel-i686.config   | 3 +--
  kernel-ppc64le-debug.config  | 2 --
  kernel-ppc64le.config| 2 --
  kernel-s390x-debug.config| 4 +---
  kernel-s390x.config  | 4 +---
  kernel-x86_64-debug.config   | 5 ++---
  kernel-x86_64.config | 5 ++---
  21 files changed, 19 insertions(+), 40 deletions(-)
  delete mode 100644 configs/fedora/generic/CONFIG_FLATMEM_MANUAL
  create mode 100644 
configs/fedora/generic/powerpc/CONFIG_VIRT_CPU_ACCOUNTING_NATIVE
  create mode 100644 configs/fedora/generic/s390x/CONFIG_TICK_CPU_ACCOUNTING
  create mode 100644 
configs/fedora/generic/s390x/CONFIG_VIRT_CPU_ACCOUNTING_NATIVE
  create mode 100644 
configs/fedora/generic/x86/x86_64/CONFIG_TICK_CPU_ACCOUNTING
  rename configs/fedora/generic/{ => x86/x86_64}/CONFIG_UNWINDER_ORC (100%)


___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: [PATCH 1/2] Disable kernel-headers only in Fedora

2018-10-11 Thread Laura Abbott

On 10/11/2018 05:58 AM, pa...@fliagreco.com.ar wrote:

From: Pablo Greco 

---
  kernel.spec | 2 ++
  1 file changed, 2 insertions(+)

diff --git a/kernel.spec b/kernel.spec
index 311ef4c..e90a714 100644
--- a/kernel.spec
+++ b/kernel.spec
@@ -125,8 +125,10 @@ Summary: The Linux kernel
  %define debugbuildsenabled 0
  
  # Kernel headers are being split out into a separate package

+%if 0%{?fedora}
  %define with_headers 0
  %define with_cross_headers 0
+%endif
  
  %if %{with_verbose}

  %define make_opts V=1



Thanks, I applied both of the patches to rawhide.
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: Disabling kernel's hibernate support by default, allow re-enabling it with a kernel cmdline option

2018-10-02 Thread Laura Abbott

On 10/02/2018 08:18 AM, Lennart Poettering wrote:

On Di, 02.10.18 14:34, Hans de Goede (hdego...@redhat.com) wrote:


Ok fair enough. Keeping it easy for users to try out hibernate is
a valid argument.


This is just weird. Why would GNOME expose a button to regular user
that reads "hey, press me, please use this feature, but it's not going
to work, and nobody is going to help you with it or fix bugs,
kthxbye". That's just awful UI.

Quite frankly, this is quite ridiculous. GNOME is not the only user of
this, we shouldn't expose crap that doesn't work in the UI, regardless
what the UI looks like. GNOME has every right to assume that what the
underlying layers advertise works. And when it doesn't then the
underlying layers should stop advertising this.

If the kernel folks apprently are not willing to clean this up, nor
stop advertising its availability, then I guess we can mask this out
in the systemd RPM, but what a mess, now systemd.rpm suddenly becomes
the dumping ground for policy decisions when kernel code is good
enough and when it isn't, and when the kernel maintainers want to
support something or not.




I think we're stuck between two competing goals of Fedora: give users
as many features as possible vs. having those features be stable.
In the kernel we've tended to err on the side of allowing as many
options as possible and just not giving support.

The big hammer of disabling hibernation doesn't differentiate between
cases where hibernate is fundamentally broken and may never work
(hardware or firmware issues) vs. might just need some quirks.
Is there more information the kernel could expose to allow a
more informed decision about whether we should allow hibernate as
an option to the user?

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: Disabling kernel's hibernate support by default, allow re-enabling it with a kernel cmdline option

2018-10-02 Thread Laura Abbott

On 10/02/2018 09:16 AM, Bastien Nocera wrote:



- Original Message -

On Di, 02.10.18 10:16, Bastien Nocera (bnoc...@redhat.com) wrote:


Until the kernel can use a dedicated partition for hibernation, which
would fix the majority of problems users can encounter, we're just
offering more sharp edges with which to cut themselves.


As I understand the problems have more to do with hardware
combinations, and driver code not getting things right, the actual
serialization of stuff is fine and unproblematic...


There's problems with:
- not having enough swap space available at a particular instant
- swap being encrypted and not allowing restore because the keys aren't
   there anymore
- swap not being encrypted, which could leak information down the line
- resume= not being there in the default parameters, so dracut needing
   to rewrite the initrd before hibernation is considered done (?)

If the drivers being broken were the only problem, then reporting bugs upstream
for those drivers would help, just in the same way it helped for suspend
10 years ago.

In my experience, the problem isn't so much with specific drivers, and
more with the whole infrastructure, whether in the kernel, user-space,
or a combination of both.


This is the real objection I have: hibernation ultimately has many
different parts and just disabling at the kernel level misses some
important pieces. It's not clear to me if just allowing users to
enable kernel support on the command line will be enough to have
a good end user experience.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: Disabling kernel's hibernate support by default, allow re-enabling it with a kernel cmdline option

2018-10-02 Thread Laura Abbott

On 10/02/2018 08:12 AM, Lennart Poettering wrote:

Can you give examples of other kernel subsystems that are also
advertised as available by the Fedora kernel, and part of the core
kernel RPM but are of this "tech preview" kind?


Another example would be kexec. The Fedora kernel nominally supports
this feature but it requires some setup and tends to be finicky to
set up. We'd certainly take patches to fix it and we've started
to get more engaged with the kexec team to make sure it works but
ultimately it's best effort.

We also have the various wireless drivers which get a good amount
of support from various developers but ultimately if some
particular hardware configuration doesn't work quite right
there's not a lot we can do.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: Headsup: Adding "efi/x86: Call efi_parse_options() from efi_main()" to F29+ kernels

2018-09-13 Thread Laura Abbott

On 09/13/2018 06:25 AM, Hans de Goede wrote:

Hi,

I've been getting some reports that the kernel is not fully quiet /
the boot is not fully smooth / flickerfree when using secure boot.

This is fixed by this patch:

https://git.kernel.org/pub/scm/linux/kernel/git/efi/efi.git/commit/?id=ecb77f61f10b36476133e31cdc001892b5463b90

I believe that this patch is safe, so I plan to add it as
downstream patch to the F29+ kernels for now.

But this is early boot code so you never know. Hence the heads-up,
if there are mysterious boot failures this might be the culprit
(it would be weird if it is, but you never know).

Regards,

Hans


Thanks for the heads up Hans.
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: 4.18 Rebase plans

2018-09-06 Thread Laura Abbott

On 08/14/2018 09:14 AM, Laura Abbott wrote:

Hi,

As you probably saw, 4.18 was released on Sunday. The 4.18 kernel was
built for rawhide yesterday. We will be following roughly the same
rebase schedule as in the past. F28 will get the rebase first,
typically around 4.18.2 or 4.18.3 followed by F27 shortly thereafter.
My best guess for when this would happen would be middle of September.
As always, we'll keep you updated on any new developments.

Thanks,
Laura

P.S. As a general reminder, if you like F27 please remember to
give karma to kernels.


The kernel is now in testing for F28. Please test and give karma as I
would like to push very soon.
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: 4.18 Rebase plans

2018-08-29 Thread Laura Abbott

On 08/29/2018 01:05 PM, Jason L Tibbitts III wrote:

"LA" == Laura Abbott  writes:


LA> My current plan is to push the F28 rebase early next week.  If you
LA> get a chance, please test the F29 kernel or the package in the
LA> kernel-stabilization COPR.

I thought we weren't doing kernel-stabilization this time around because
the F29 kernels were sufficient, but looking now I see it's there
(though the 4.18.5 build failed).



I didn't end up pushing anything to the kernel-stabilization branch
but I did use the stabilization repo to test the actual rebased
versions since the work looks slightly different between a straight
F29 branch and a rebase (dropping some patches and config options)


I've been running F29 kernels (on my F28 desktop) since 4.18.0 showed up
there and everything has been well.  Currently running
kernel-4.18.5-300.fc29 from
https://koji.fedoraproject.org/koji/buildinfo?buildID=1139115 with no
issues at all.  I just had to do this:



Oh I missed that. It looks like it was an infra problem. I'll
keep an eye out when I do the final rebase.


mkdir kernel; cd kernel
koji download-build -a x86_64 kernel-4.18.5-300.fc29
dnf update *rpm

and reboot into the new kernel.


Excellent, thanks for your report and support as always
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: 4.18 Rebase plans

2018-08-29 Thread Laura Abbott

On 08/17/2018 06:57 AM, Laura Abbott wrote:

On 08/14/2018 09:14 AM, Laura Abbott wrote:

Hi,

As you probably saw, 4.18 was released on Sunday. The 4.18 kernel was
built for rawhide yesterday. We will be following roughly the same
rebase schedule as in the past. F28 will get the rebase first,
typically around 4.18.2 or 4.18.3 followed by F27 shortly thereafter.
My best guess for when this would happen would be middle of September.
As always, we'll keep you updated on any new developments.

Thanks,
Laura

P.S. As a general reminder, if you like F27 please remember to
give karma to kernels.


4.18.2 is nominally expected to be released this weekend but
stable updates have been accelerated due to needing to get
L1TF fixes out. At the very least we need to wait until the
merge window closes and the test day happens before pushing the
rebase. F29 will be up to date for anyone who wants to test
that kernel.


My current plan is to push the F28 rebase early next week.
If you get a chance, please test the F29 kernel or the
package in the kernel-stabilization COPR.

Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org


Re: 4.18 Rebase plans

2018-08-17 Thread Laura Abbott

On 08/14/2018 09:14 AM, Laura Abbott wrote:

Hi,

As you probably saw, 4.18 was released on Sunday. The 4.18 kernel was
built for rawhide yesterday. We will be following roughly the same
rebase schedule as in the past. F28 will get the rebase first,
typically around 4.18.2 or 4.18.3 followed by F27 shortly thereafter.
My best guess for when this would happen would be middle of September.
As always, we'll keep you updated on any new developments.

Thanks,
Laura

P.S. As a general reminder, if you like F27 please remember to
give karma to kernels.


4.18.2 is nominally expected to be released this weekend but
stable updates have been accelerated due to needing to get
L1TF fixes out. At the very least we need to wait until the
merge window closes and the test day happens before pushing the
rebase. F29 will be up to date for anyone who wants to test
that kernel.
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org/message/23Y4OVEAIGER7K344XWGMHU5LN2WYZVY/


Re: 4.18 Rebase plans

2018-08-16 Thread Laura Abbott

On 08/16/2018 05:27 AM, Hans de Goede wrote:

Hi,

On 14-08-18 18:14, Laura Abbott wrote:

Hi,

As you probably saw, 4.18 was released on Sunday. The 4.18 kernel was
built for rawhide yesterday. We will be following roughly the same
rebase schedule as in the past. F28 will get the rebase first,
typically around 4.18.2 or 4.18.3 followed by F27 shortly thereafter.
My best guess for when this would happen would be middle of September.
As always, we'll keep you updated on any new developments.


FYI, there seems to be a problem with 4.18 as a virtualbox guest,
sometimes when the user resizes the vm-window the contents of the vm
Windows stop updating (when running a GUI) until the next resize.

This is probably an issue in the vboxvideo driver, triggered by
changes in 4.18 elsewhere. I've looking into this on my to do list.



Thanks for the report. I'll check back before doing the push if
I don't hear anything before that.
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org/message/NJD37WF2LOAJ5XGNOXDCKFXOU6FAEFEV/


Re: Kernel lockdown patch & IPAddressAllow/IPAddressDeny systemd feature with Secure Boot

2018-08-16 Thread Laura Abbott

On 08/15/2018 07:10 PM, Alexei Starovoitov wrote:

On Tue, Aug 14, 2018 at 07:14:00AM -0700, Andrew Lutomirski wrote:

[Removed Fedora devel list because it's subscriber-only]


On Aug 8, 2018, at 12:29 AM, Peter Robinson  wrote:

Probably a good idea to cc: this to the kernel list :-)

I suspect it's intentional but with the planned changes for iptables
etc to be backed by bpf in the upstream kernel sometime in the future
it's likely going to need to be reviewed.



I thought this got covered in review. I think this part of lockdown
needs to get reverted or fixed ASAP.


I don't see lockdown in Linus's tree. Is this fedora only issue?



The entire lockdown/secure boot series is out of tree at the moment.
We're working to get it included.  If you search LWN, you
can find some articles explaining the long saga of the patch series.


(I definitely brought up multiple issues with the bpf lockdown stuff.
It's clearly extremely broken right now in the "new kernel breaks
*current* Linux distro" sense.)


+1



Yes, we need to review what exactly is in Fedora. It's the merge
window so this is a good time to do that anyway. We're still
playing catch up after Flock in Dresden last week. Can you file
a bugzilla for tracking so we don't forget?

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org/message/TDNMHIVEAKJHCYD4ZTDLRA6LW42CATGQ/


Re: something is wrong with the Fedora "l1tf" patches

2018-08-15 Thread Laura Abbott

On 08/15/2018 01:21 PM, Reindl Harald wrote:

* Di Aug 14 2018 Justin M. Forbes  - 4.17.14-101
- Fix "Foreshadow" CVE-2018-3620 CVE-2018-3646 (rhbz 1585005 1615998)

-

CentOS 6: 2.6.32-754.3.5.el6.x86_64
[root@honeypot:~]$ grep . /sys/devices/system/cpu/vulnerabilities/*
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation:
Speculative Store Bypass disabled via prctl
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: Load fences
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable: Retpoline
with unsafe module(s), IBPB

-

CentOS 7: 3.10.0-862.11.6.el7.x86_64

[root@hosting:~]$ grep . /sys/devices/system/cpu/vulnerabilities/*
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation:
Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: Load
fences, __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full
retpoline

-

Fedora 27/28: 4.17.14-(1|2)01.fc2(7|8).x86_64

[root@master:~]$ grep . /sys/devices/system/cpu/vulnerabilities/*
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation:
Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user
pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full
generic retpoline, IBPB, IBRS_FW


There were .202 and .102 versions, please check those
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org/message/K72FLGX5DC2U76KEKOX2W3DJO7MUB3IA/


4.18 Rebase plans

2018-08-14 Thread Laura Abbott

Hi,

As you probably saw, 4.18 was released on Sunday. The 4.18 kernel was
built for rawhide yesterday. We will be following roughly the same
rebase schedule as in the past. F28 will get the rebase first,
typically around 4.18.2 or 4.18.3 followed by F27 shortly thereafter.
My best guess for when this would happen would be middle of September.
As always, we'll keep you updated on any new developments.

Thanks,
Laura

P.S. As a general reminder, if you like F27 please remember to
give karma to kernels.
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org/message/MZWKW26B2BJODY6GWZZSHA4EQK6E4UEH/


Re: Adding deferred fbcon console takeover to the Fedora kernels

2018-07-30 Thread Laura Abbott

On 07/30/2018 08:18 AM, Hans de Goede wrote:

Hi,

On 02-07-18 13:55, Hans de Goede wrote:

Hi All,

On 28-06-18 16:19, Hans de Goede wrote:

Hi All,

Good news on the patch to make the loglevel for quiet configurable,
this has been accepted into -next now. I plan to add this to the
Fedora kernels soonish and set the quiet loglevel to 3 as
discussed earlier.

Today another related patch-set got merged, see the last 3
commits here:
https://github.com/bzolnier/linux/commits/ib-fbdev-drm-v4.19-deferred-console-takeover

I would also like to add these 3 patches to the Fedora 4.18
kernel (for F29+).

The end goal here is a boot where the firmware shows its boot graphics
and these stay in place for a couple of seconds until the GUI loads and
the GUI then smoothly takes over the framebuffer without any disruptions.

See here for an example of what this looks like on my main workstation:

https://fedorapeople.org/~jwrdegoede/flickerfree-videos/workstation-normal.webm

Shim has already been modified to leave the framebuffer as setup by
the firmware intact and patches for grub have been merged, but not
yet build for F29+.

Combined with the hidden grub menu feature for F29:

https://fedoraproject.org/wiki/Changes/HiddenGrubMenu

This means that the framebuffer is still showing the boot graphics
(e.g. vendor logo) when the kernel loads.

Without the "deferred fbcon console takeover" patches the fbcon
will takeover from dummycon as the console driver as soon as
the efifb registers itself as a fbdev, clearing the screen to
black. breaking the desired boot experience.

The deferred console takeover patches make the fbcon code delay
taking over as the console until the first character is output
on the console.

I've tested this code with the following scenarios:

1) Remove quiet from the kernel commandline -> fbcon binds right away
because messages are logged to the dummycon before efifb loads

2) Mess up the root= kernel argument -> As soon as dracut prints
its timeout message for finding the rootfs, fbcon binds and shows
the timeout message

3) Detailed view in plymouth mode (press ESC to show boot msg) ->
plymouth retains drm master rights on /dev/dri/card? while it
tries to show the details. The blocks fbcon accessing the fbdev
device registered by the kms driver, so nothing will be shown
until plymouth exits (and releases the drm-master rights).

This really is a plymouth bug, I've submitted plymouth patches
fixing this here:
https://bugs.freedesktop.org/show_bug.cgi?id=107047


I got an ack from Ray for these patches and for adding these
patches to the Fedora plymouth package as downstream patches
(until the next upstream release). A new plymouth package
fixing this is building now:

https://koji.fedoraproject.org/koji/buildinfo?buildID=1102343


I discussed adding these patches to the 4.18 / rawhide kernel
with Laura off-list and she said this was ok. So I've just
pushed the patches and the matching Kconfig changes.

Regards,

Hans


s390 didn't seem to work:
https://koji.fedoraproject.org/koji/taskinfo?taskID=28719549

In function 'strncat',
inlined from 'iscsit_ta_authentication' at 
drivers/target/iscsi/iscsi_target_tpg.c:639:3:
./include/linux/string.h:313:10: warning: '__builtin_strncat' specified bound 1 
equals source length [-Wstringop-overflow=]
   return __builtin_strncat(p, q, count);
  ^~
In function 'strncat',
inlined from 'iscsit_ta_authentication' at 
drivers/target/iscsi/iscsi_target_tpg.c:640:3:
./include/linux/string.h:313:10: warning: '__builtin_strncat' specified bound 4 
equals source length [-Wstringop-overflow=]
   return __builtin_strncat(p, q, count);
  ^~
ERROR: "dummycon_unregister_output_notifier" [drivers/video/fbdev/core/fb.ko] 
undefined!
ERROR: "dummycon_register_output_notifier" [drivers/video/fbdev/core/fb.ko] 
undefined!
make[1]: *** [scripts/Makefile.modpost:92: __modpost] Error 1

Looks like they might be missing EXPORT_SYMBOLS?

I'm going to disable this on s390 for now.

Thanks,
Laura

___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org/message/4QQWHS56PQ45BXIVJB7E7S7IPCV6MH7L/


Re: src.rpm for latest kernel in koji fails to build with weird errors about config mismatches

2018-07-30 Thread Laura Abbott

On 07/30/2018 09:02 AM, stan wrote:

I downloaded the src.rpm from koji, and then used rpm -ivh to install
it into the ~/rpmbuild tree.  Expanded the src with
rpmbuild -bp kernel.spec
I used the last build config file to run
make oldconfig
with no errors or additions.  Then I copied that config to the local
config file so it would become the actual config during build.

Then just a build with
rpmbuild -bb kernel.spec

I don't see where any config files that weren't in the src.rpm could
come from, as the BUILD directory is recreated every time the -bb
command is run.  I have some other kernel-4.xx files in there from
earlier builds, but that has never been a problem before.  What is the
difference between where 'fedpkg prep' gets its *.config files and the
*.config files in the src.rpm?


I'm pretty sure it's that last 'make oldconfig' step which is screwing
things up and shouldn't be necessary. The checks that are failing are
designed to catch differences between what fedora has set in the
kernel- fragments and what gets generated after a "make oldconfig".
I don't know why copying back again wouldn't work but the script is
not perfect and I generally tell people to turn off the checks if
they are building with local changes anyway.

Is there a reason you need to do the last "make oldconfig" and
copy step? You are duplicating what the kernel build process
will do with the configs anyway.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org/message/O3DMKAW26C2OGQO7UNSOAXD2MFGC3AWY/


Re: src.rpm for latest kernel in koji fails to build with weird errors about config mismatches

2018-07-30 Thread Laura Abbott

On 07/29/2018 10:43 AM, stan wrote:

On Sun, 29 Jul 2018 10:12:04 -0700
stan  wrote:


Hi,

I build the kernel every few weeks from the koji rawhide src.rpm for
the latest kernel version.  This has been working fine for the 4.18
kernels until the latest version.  Since I'm only building locally for
x86_64, I change the nobuildarches to

%define nobuildarches i386 ppc64 s390x %{arm} %{power64} aarch64
ppc64le

That has worked previously, but no longer seems to be effective. I
can't see any reason it shouldn't work.  There's been the major change
of no longer creating header files in the kernel package, but that
doesn't seem to impact this.  Anyway, I see


[snip]

In case it has any bearing, I built, and installed, the kernel-headers
package successfully by pruning the arches to x86 only, and renaming
the tar.xz source to have the same name as the kernel I built.  I did
it after rebooting into the new kernel, in case there were any
dependences for the headers.  I'm not sure if that matters or not, but
it worked this way.


I'm not seeing this on my machine locally with a quick 'fedpkg prep'.
This is the change I made

diff --git a/kernel.spec b/kernel.spec
index 85bb6fa1..c105d3b2 100644
--- a/kernel.spec
+++ b/kernel.spec
@@ -327,7 +327,8 @@ Summary: The Linux kernel
 # Which is a BadThing(tm).
 
 # We only build kernel-headers on the following...

-%define nobuildarches i386
+# %define nobuildarches i386
+%define nobuildarches i386 ppc64 s390x %{arm} %{power64} aarch64 ppc64le
 
 %ifarch %nobuildarches

 %define with_up 0


It seems like something picked up an old kernel configuration settings.
Can you be more explicit about what steps you did to get the failing
setup?  
___

kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org/message/B6GOOGF6UJEJPSGEPAWEIVE5QBGK7GN6/


Re: [help] where is git tree of upstream source of the kernel ?

2018-07-23 Thread Laura Abbott

On 07/23/2018 11:15 AM, Josh Boyer wrote:

On Mon, Jul 23, 2018 at 12:06 PM Laura Abbott  wrote


On 07/22/2018 12:12 PM, stan wrote:

On Sun, 22 Jul 2018 18:49:36 +0100
Sérgio Basto  wrote:


Hello , I need bisect kernel between kernel 4.15-git1 and 4.15.0-git2

where I find a git tree with these commits (patch-4.14-git1.xz to
patch-4.14-git2.xz) ?

this request is related with my nvidia that starts to fail since
kernels 4.15.0 [1]

[1]
https://bugs.freedesktop.org/show_bug.cgi?id=105319#c21


I think this is the definitive git repository for the linux kernel.
Can't advise you on how to find what you are looking for, though.

https://github.com/torvalds/linux



That's going to be a mirror, the official official repository is
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/

To your actual question, if you look at the commits in
the fedora src git where those files were added, you'll see
a commit hash in the commit message, so in this case it's
1a5d24760948 ("Linux v4.14-104-g1e19bded7f5d") and
2ef4e8028f50 ("Linux v4.14-2229-g894025f24bd0") . The
part after the g is the hash in the kernel.org tree

$ git log --oneline 1e19bded7f5d..894025f24bd0 | wc -l
2125

It's kind of a pain to figure out. I'd welcome suggestions
about how to make this easier.


Could use the exploded tree and just do: git checkout kernel-, as
each build has a corresponding tag.

josh



That's a good suggestion (exploded tree is at
https://git.kernel.org/pub/scm/linux/kernel/git/jwboyer/fedora.git/)
although that still leaves the question of figuring out the base
to pass to git bisect. Maybe git is smart enough to do the right
thing with the patches on top?
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org/message/5TNWXSI5Q2DRU7CSTCSPUX374ZVX2WMQ/


Re: [help] where is git tree of upstream source of the kernel ?

2018-07-23 Thread Laura Abbott

On 07/22/2018 12:12 PM, stan wrote:

On Sun, 22 Jul 2018 18:49:36 +0100
Sérgio Basto  wrote:


Hello , I need bisect kernel between kernel 4.15-git1 and 4.15.0-git2

where I find a git tree with these commits (patch-4.14-git1.xz to
patch-4.14-git2.xz) ?
 
this request is related with my nvidia that starts to fail since

kernels 4.15.0 [1]

[1]
https://bugs.freedesktop.org/show_bug.cgi?id=105319#c21


I think this is the definitive git repository for the linux kernel.
Can't advise you on how to find what you are looking for, though.

https://github.com/torvalds/linux



That's going to be a mirror, the official official repository is
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/

To your actual question, if you look at the commits in
the fedora src git where those files were added, you'll see
a commit hash in the commit message, so in this case it's
1a5d24760948 ("Linux v4.14-104-g1e19bded7f5d") and
2ef4e8028f50 ("Linux v4.14-2229-g894025f24bd0") . The
part after the g is the hash in the kernel.org tree

$ git log --oneline 1e19bded7f5d..894025f24bd0 | wc -l
2125

It's kind of a pain to figure out. I'd welcome suggestions
about how to make this easier.

Thanks,
Laura


___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org/message/6A35L4IHBLO6LK32P7UL4ZCB6XMGIY67/


parallel debuginfo for kernel (plus hardening flags)

2018-07-12 Thread Laura Abbott

Hi,

The kbuild kernel maintainer has accepted the last changes needed for
unique build ids upstream so I went ahead and applied the series to
rawhide. This means that parallel debuginfo should actually
work for future kernel builds. As part of this change, I also enabled
the hardening flags for the few userspace binaries that get shipped
with kernel-devel. I don't expect either of these changes to break
anything but as always if you find any issues, please file a bug.


Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org/message/BKROOJAT5KGIR27ISQZJDS5VVF57LYY5/


Requests for kernel related quick-docs?

2018-06-19 Thread Laura Abbott

Hi,

If you haven't seen it, Fedora has a new documentation project
called quick-docs to move information off the wiki,
https://docs.fedoraproject.org/quick-docs/en-US/index.html
We've started moving some of the kernel information there.
Any requests for kernel related items you'd like documented?
You're welcome to write docs yourself as well.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org/message/E7X32J67XOUEFXZ66JXLFGZLMM3H7XXL/


Re: Duplicate touchpads on XPS 13

2018-05-31 Thread Laura Abbott

On 05/24/2018 04:13 PM, Timur Kristóf wrote:

Hi,

On the XPS 13 9360 and 9370 xinput sees two touchpads instead of one:
⎡ Virtual core pointerid=2[master pointer  (3)]
⎜   ↳ Virtual core XTEST pointer  id=4[slave  pointer  (2)]
⎜   ↳ DELL07E6:00 06CB:76AF Touchpad  id=12[slave  pointer  (2)]
⎜   ↳ SynPS/2 Synaptics TouchPad  id=17[slave  pointer  (2)]

dmesg also gives me the following:

[1.429811] psmouse serio1: synaptics: Your touchpad (PNP: DLL07e6
PNP0f13) says it can support a different bus. If i2c-hid and hid-rmi
are not used, you might want to try setting
psmouse.synaptics_intertouch to 1 and report this to
linux-in...@vger.kernel.org.

The Dell one is the real touchpad, the other one is an artifact of the
psmouse driver. Weird touchpad freezes and jittering issues can be
observed when both of these devices are there. The general advice on
the web is to blacklist the psmouse driver. (This is also published by
Dell as a .deb package which contains a config file doing just this.)

However, on Fedora I cannot blacklist the psmouse driver because it is
compiled built-in instead of as a module. Could you guys change the
Fedora kernel config to compile it as a module instead?

Thanks & best regards,
Timur


So assuming nobody else has objections, I think it's okay to at
least try this on rawhide and see if it uncovers any other problems.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org/message/K2UQC5W6SWXYZDMCIYMYVPCPOW7CNWH5/


Re: Bluetooth keyboard makes the cursor disappear

2018-05-31 Thread Laura Abbott

On 05/28/2018 06:17 AM, Michael Hill wrote:

Using Rawhide, with kernel
Version : 4.17.0
Release : 0.rc6.git3.1.fc29 (also 0.rc6.git2.1.fc29)
Architecture: x86_64

and libinput
Version : 1.10.901
Release : 1.fc29

my ThinkPad Bluetooth keyboard causes the cursor to disappear or become
unresponsive.

On Wayland, after activating the shell overview, the cursor vanishes. I can
get it back by disabling Bluetooth from the system menu and (seemingly)
switching to a console and back.

On X, the keyboard works until I touch the trackpoint. The cursor flies to
the shell hot corner, lights up Activities without opening the overview,
and stays. My laptop trackpoint or a USB mouse can then be used to move the
cursor.

Here's what dmesg says:
[91490.366114] usb 2-7: new full-speed USB device number 7 using xhci_hcd
[91490.493583] usb 2-7: New USB device found, idVendor=8087,
idProduct=0a2a, bcdDevice= 0.01
[91490.493589] usb 2-7: New USB device strings: Mfr=0, Product=0,
SerialNumber=0
[91490.510181] Bluetooth: hci0: read Intel version: 370810011003110e00
[91490.510625] Bluetooth: hci0: Intel Bluetooth firmware file:
intel/ibt-hw-37.8.10-fw-1.10.3.11.e.bseq
[91490.807247] Bluetooth: hci0: Intel firmware patch completed and activated
[91491.018110] Bluetooth: hci0: last event is not cmd complete (0x0f)
[91508.126555] lenovo 0005:17EF:6048.0008: unknown main item tag 0x0
[91508.127308] input: ThinkPad Compact Bluetooth Keyboard with TrackPoint
as
/devices/pci:00/:00:14.0/usb2/2-7/2-7:1.0/bluetooth/hci0/hci0:256/0005:17EF:6048.0008/input/input26
[91508.129208] lenovo 0005:17EF:6048.0008: input,hidraw2: BLUETOOTH HID
v3.09 Keyboard [ThinkPad Compact Bluetooth Keyboard with TrackPoint] on
a4:02:b9:6d:5e:bf
[91589.456678] usb 2-7: USB disconnect, device number 7

Does this sound like a kernel bug?

Mike


Possibly. The best thing to do is file a bugzilla for tracking if you
haven't already.
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/kernel@lists.fedoraproject.org/message/LOHEVYQI5UBF4RZBULAAFQRMLURZVP7Q/


Re: Feature request: improved build-id generation

2018-03-19 Thread Laura Abbott

ArOn 03/16/2018 11:37 AM, Cary Coutant wrote:

Then I'm stating my case poorly.  I want a way to inject additional
data into the has computation.


At one point, we proposed doing this via a linker- or assembler-oriented
extra "salt" parameter, which would be hashed into the buildid.  This
would most naturally be a n-v-r-a string, so the build is reproducible.
Such a salt could be naturally injected via an environment variable set
by rpmbuild.

https://bugzilla.redhat.com/show_bug.cgi?id=1002341 (salt!)
https://bugzilla.redhat.com/show_bug.cgi?id=1550152 (life without salt)


I don't have a problem with adding a --build-id-salt="some arbitrary
string" option, and I think "salt" is exactly the right term for this.
I'd much prefer providing that than having you use a linker script.
(I'm somewhat puzzled that you find the linker script option less
objectionable than an object file with a note section.)

As Nick said earlier, it's not that we don't care about your feature
request. I simply wanted to explore the options, and I gave you a
couple of options that require no new features at all.

My other comments have been about the unnecessary conflating of a new
option like --build-id-salt with the choice of hashing algorithm.



At least in the kernel we already have the infrastructure for
customizations to linker scripts so it's fairly easy to expand on that.
I have a prototype which should work, I just need to clean it up
for review to see if it's feasible to merge vs. adding a --build-id-salt
option.

Thanks,
Laura



-cary



___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org


Re: Feature request: improved build-id generation

2018-03-16 Thread Laura Abbott

On 03/15/2018 06:32 AM, Nick Clifton wrote:

Hi Mark,


That might be an interesting alternative. Could you use this for e.g.
inserting a .comment section fragment with an unique (version) string?
That would be stripped away, but should still count for the build-id
hash calculation.


If you know the value you want to store ahead of time, then it is easy:

   % cat comment.t
SECTIONS
{
.comment (INFO) :
{
BYTE (0x12);
BYTE (0x34);
BYTE (0x56);
BYTE (0x78);
}
}

   % gcc hello.c -Wl,comment.t
   % readelf -x.comment a.out

Hex dump of section '.comment':
   0x 4743433a 2028474e 55292037 2e332e31 GCC: (GNU) 7.3.1
   0x0010 20323031 38303133 30202852 65642048  20180130 (Red H
   0x0020 61742037 2e332e31 2d322900 4743433a at 7.3.1-2).GCC:
   0x0030 2028474e 55292037 2e322e31 20323031  (GNU) 7.2.1 201
   0x0040 37303931 35202852 65642048 61742037 70915 (Red Hat 7
   0x0050 2e322e31 2d322900 12345678  .2.1-2)..4Vx

   (Note how the value has been appended to the .comment section).

   Unfortunately the linker does not have a STRING() operator to insert
   ascii codes into a section, so you have to construct the bytes by
   hand.  Eg:

   % cat comment.t
SECTIONS
{
.comment (INFO) :
{
BYTE (0x41);
BYTE (0x42);
BYTE (0x43);
BYTE (0x00);
}
}

   % gcc hello.c -Wl,comment.t
   % readelf -p.comment a.out

String dump of section '.comment':
   [ 0]  GCC: (GNU) 7.3.1 20180130 (Red Hat 7.3.1-2)
   [2c]  GCC: (GNU) 7.2.1 20170915 (Red Hat 7.2.1-2)
   [58]  ABC

   A simple perl or python script could be used to create the comment.t
   linker script fragment.

Cheers
   Nick



I think this approach looks promising. I'm going to see about prototyping
this approach.

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org


proper debuginfo for embedded vDSO

2018-03-14 Thread Laura Abbott

Hi,

The kernel still doesn't have 100% parallel debuginfo because we can't update
the vDSO binary embedded in the the image. I'd like to see about updating
debugedit to be smart enough to do the recalculation of the buildid for both
the vmlinux and the embedded vDSO.

I'd like to avoid too tight a coupling between the kernel and debugedit
so if we want/need to change how the vDSO is generated it won't break too
many things. My idea is to stick the location of the vDSO in an ELF note
so debugedit knows where to look. As long as the kernel can generate this
section correctly, debugedit can find the embedded build-id and update
accordingly.

Obviously this would need approval from a wider audience but I'm looking
to get some early feedback before I spend too much time prototyping
something that has no chance of going anywhere.

Thoughts?

Thanks,
Laura
___
kernel mailing list -- kernel@lists.fedoraproject.org
To unsubscribe send an email to kernel-le...@lists.fedoraproject.org


  1   2   3   >