Re: [PATCH V2 3/3] PCI: Add helpers to enable/disable CXL.mem and CXL.cache

2020-05-20 Thread Christoph Hellwig
On Mon, May 18, 2020 at 09:35:23AM -0700, Sean V Kelley wrote: > With these helpers, a device driver can enable/disable access to > CXL.mem and CXL.cache. Note that the device driver is responsible for > managing the memory area. Who is going to call these? Please don't submit new APIs without

Re: [PATCH 3/8] srcu: Use local_lock() for per-CPU struct srcu_data access

2020-05-20 Thread Joel Fernandes
Hi Sebastian, On Wed, May 20, 2020 at 02:06:08PM +0200, Sebastian Andrzej Siewior wrote: > On 2020-05-20 12:24:07 [+0200], Peter Zijlstra wrote: > > On Tue, May 19, 2020 at 10:19:07PM +0200, Sebastian Andrzej Siewior wrote: > > > > > diff --git a/kernel/rcu/srcutree.c b/kernel/rcu/srcutree.c > >

Re: [PATCH 09/15] device core: Add ability to handle multiple dma offsets

2020-05-20 Thread Christoph Hellwig
If you don't Cc me on the whole series I have absolutely no way to review it. Don't ever do these stupid partial Ccs as they cause nothing but pain.

Re: arm64: Register modification during syscall entry/exit stop

2020-05-20 Thread Will Deacon
Hi Keno, On Tue, May 19, 2020 at 04:37:34AM -0400, Keno Fischer wrote: > > Yes, we inherited this from ARM and I think strace relies on it. In > > hindsight, it is a little odd, although x7 is a parameter register in the > > PCS and so it won't be live on entry to a system call. > > I'm not

Re: [PATCH] arm64/cpufeature: Move BUG_ON() inside get_arm64_ftr_reg()

2020-05-20 Thread Will Deacon
On Wed, May 20, 2020 at 04:47:11PM +0100, Catalin Marinas wrote: > On Wed, May 20, 2020 at 01:20:13PM +0100, Will Deacon wrote: > > On Wed, May 20, 2020 at 06:52:54AM +0530, Anshuman Khandual wrote: > > > There is no way to proceed when requested register could not be searched > > > in > > >

Re: [PATCH 2/2] kvm/x86: don't expose MSR_IA32_UMWAIT_CONTROL unconditionally

2020-05-20 Thread Maxim Levitsky
On Wed, 2020-05-20 at 19:15 +0200, Vitaly Kuznetsov wrote: > Maxim Levitsky writes: > > > On Wed, 2020-05-20 at 18:33 +0200, Vitaly Kuznetsov wrote: > > > Maxim Levitsky writes: > > > > > > > This msr is only available when the host supports WAITPKG feature. > > > > > > > > This breaks a

Re: [PATCH net-next v3 1/2] ethtool: provide UAPI for PHY Signal Quality Index (SQI)

2020-05-20 Thread Oleksij Rempel
On Wed, May 20, 2020 at 05:30:01PM +0200, Andrew Lunn wrote: > > > I'm not sure if it's a good idea to define two separate callbacks. It > > > means adding two pointers instead of one (for every instance of the > > > structure, not only those implementing them), doing two calls, running > > > the

Re: [patch V6 12/37] x86/entry: Provide idtentry_entry/exit_cond_rcu()

2020-05-20 Thread Paul E. McKenney
On Wed, May 20, 2020 at 08:36:06AM -0700, Andy Lutomirski wrote: > On Tue, May 19, 2020 at 7:23 PM Paul E. McKenney wrote: > > On Tue, May 19, 2020 at 05:26:58PM -0700, Andy Lutomirski wrote: > > > On Tue, May 19, 2020 at 2:20 PM Thomas Gleixner > > > wrote: > > > > Andy Lutomirski writes: > >

Re: [PATCH] KVM: PPC: Book3S HV: relax check on H_SVM_INIT_ABORT

2020-05-20 Thread Laurent Dufour
Le 20/05/2020 à 19:32, Greg Kurz a écrit : On Wed, 20 May 2020 18:51:10 +0200 Laurent Dufour wrote: The commit 8c47b6ff29e3 ("KVM: PPC: Book3S HV: Check caller of H_SVM_* Hcalls") added checks of secure bit of SRR1 to filter out the Hcall reserved to the Ultravisor. However, the Hcall

Re: [PATCH v4 06/11] net: ethernet: mtk-eth-mac: new driver

2020-05-20 Thread Bartosz Golaszewski
śr., 20 maj 2020 o 16:37 Arnd Bergmann napisał(a): > > On Wed, May 20, 2020 at 1:25 PM Bartosz Golaszewski wrote: > > > > From: Bartosz Golaszewski > > > > This adds the driver for the MediaTek Ethernet MAC used on the MT8* SoC > > family. For now we only support full-duplex. > > > >

Re: [PATCH V6 0/4] x86/resctrl: Enable user to view and select thread throttling mode

2020-05-20 Thread Reinette Chatre
Hi Borislav, On 5/20/2020 12:11 AM, Borislav Petkov wrote: > On Tue, May 19, 2020 at 03:13:59PM -0700, Reinette Chatre wrote: >> I am very sorry. I was hoping that this series could be considered for >> inclusion into v5.8 and submitted it seven weeks ago because of that. >> The recent feedback

Re: [PATCHv3 2/5] Input: EXC3000: switch to i2c's probe_new API

2020-05-20 Thread Dmitry Torokhov
On Wed, May 20, 2020 at 05:39:33PM +0200, Sebastian Reichel wrote: > Switch to the "new" I2C probe API. > > Signed-off-by: Sebastian Reichel Applied, thank you. -- Dmitry

Re: [PATCH v10 1/5] usb: xhci: Change the XHCI link order in the Makefile

2020-05-20 Thread Alan Cooper
Greg, Alan, The other 4 related patches were accepted into usb-next and I just realized that this one didn't make it. This patch will not fix the "insmod out of order" issue, but will help our controllers work with some poorly behaved USB devices when the drivers are builtin. Thanks Al On Wed,

Re: kernel BUG at mm/hugetlb.c:LINE!

2020-05-20 Thread Mike Kravetz
On 5/20/20 4:20 AM, Miklos Szeredi wrote: > On Tue, May 19, 2020 at 2:35 AM Mike Kravetz wrote: >> >> On 5/18/20 4:41 PM, Colin Walters wrote: >>> >>> On Tue, May 12, 2020, at 11:04 AM, Miklos Szeredi wrote: >>> > However, in this syzbot test case the 'file' is in an overlayfs filesystem

Re: [PATCH net-next] ipv6/route: inherit max_sizes from current netns

2020-05-20 Thread Christian Brauner
On Wed, May 20, 2020 at 07:24:18PM +0200, Christian Brauner wrote: > On Wed, May 20, 2020 at 10:54:21AM -0600, David Ahern wrote: > > On 5/20/20 8:58 AM, Christian Brauner wrote: > > > During NorthSec (cf. [1]) a very large number of unprivileged > > > containers and nested containers are run

Re: [PATCH v5] ACPI/IORT: Fix PMCG node single ID mapping handling

2020-05-20 Thread Lorenzo Pieralisi
On Wed, May 20, 2020 at 10:13:07AM -0700, Tuan Phan wrote: > An IORT PMCG node can have no ID mapping if its overflow interrupt is > wire based therefore the code that parses the PMCG node can not assume > the node will always have a single mapping present at index 0. > > Fix

Re: [PATCH net-next] ipv6/route: inherit max_sizes from current netns

2020-05-20 Thread David Ahern
On 5/20/20 11:24 AM, Christian Brauner wrote: > On Wed, May 20, 2020 at 10:54:21AM -0600, David Ahern wrote: >> On 5/20/20 8:58 AM, Christian Brauner wrote: >>> During NorthSec (cf. [1]) a very large number of unprivileged >>> containers and nested containers are run during the competition to >>>

Re: [PATCH 2/7] x86/percpu: Clean up percpu_to_op()

2020-05-20 Thread Nick Desaulniers
On Mon, May 18, 2020 at 8:38 PM Brian Gerst wrote: > > On Mon, May 18, 2020 at 5:15 PM Nick Desaulniers > wrote: > > > > On Sun, May 17, 2020 at 8:29 AM Brian Gerst wrote: > > > > > > The core percpu macros already have a switch on the data size, so the > > > switch > > > in the x86 code is

Re: [PATCH net-next] ipv6/route: inherit max_sizes from current netns

2020-05-20 Thread Christian Brauner
On Wed, May 20, 2020 at 10:54:21AM -0600, David Ahern wrote: > On 5/20/20 8:58 AM, Christian Brauner wrote: > > During NorthSec (cf. [1]) a very large number of unprivileged > > containers and nested containers are run during the competition to > > provide a safe environment for the various teams

[PATCH 00/24] KVM: nSVM: event fixes and migration support

2020-05-20 Thread Paolo Bonzini
Large parts of this series were posted before (patches 1, 3-4-5 and 6-7-8-12-13-14). This is basically what I'd like to get into 5.8 as far as nested SVM is concerned; the fix for exception vmexits is related to migration support, because it gets rid of the exit_required flag and therefore

[PATCH 14/24] KVM: nSVM: remove HF_VINTR_MASK

2020-05-20 Thread Paolo Bonzini
Now that the int_ctl field is stored in svm->nested.ctl.int_ctl, we can use it instead of vcpu->arch.hflags to check whether L2 is running in V_INTR_MASKING mode. Signed-off-by: Paolo Bonzini --- arch/x86/include/asm/kvm_host.h | 1 - arch/x86/kvm/svm/nested.c | 10 +++---

[PATCH 07/24] KVM: nSVM: extract load_nested_vmcb_control

2020-05-20 Thread Paolo Bonzini
When restoring SVM nested state, the control state cache in svm->nested will have to be filled, but the save state will not have to be moved into svm->vmcb. Therefore, pull the code that handles the control area into a separate function. Signed-off-by: Paolo Bonzini ---

[PATCH 02/24] KVM: nSVM: leave ASID aside in copy_vmcb_control_area

2020-05-20 Thread Paolo Bonzini
Restoring the ASID from the hsave area on VMEXIT is wrong, because its value depends on the handling of TLB flushes. Just skipping the field in copy_vmcb_control_area will do. Cc: sta...@vger.kernel.org Signed-off-by: Paolo Bonzini --- arch/x86/kvm/svm/nested.c | 2 +- 1 file changed, 1

[PATCH 08/24] KVM: nSVM: extract preparation of VMCB for nested run

2020-05-20 Thread Paolo Bonzini
Split out filling svm->vmcb.save and svm->vmcb.control before VMRUN. Only the latter will be useful when restoring nested SVM state. Signed-off-by: Paolo Bonzini --- arch/x86/kvm/svm/nested.c | 52 ++- 1 file changed, 30 insertions(+), 22 deletions(-) diff

[PATCH 06/24] KVM: nSVM: move map argument out of enter_svm_guest_mode

2020-05-20 Thread Paolo Bonzini
Unmapping the nested VMCB in enter_svm_guest_mode is a bit of a wart, since the map is not used elsewhere in the function. There are just two calls, so move it there. Signed-off-by: Paolo Bonzini --- arch/x86/kvm/svm/nested.c | 14 ++ arch/x86/kvm/svm/svm.c| 3 ++-

[PATCH 19/24] KVM: nSVM: extract svm_set_gif

2020-05-20 Thread Paolo Bonzini
Extract the code that is needed to implement CLGI and STGI, so that we can run it from VMRUN and vmexit (and in the future, KVM_SET_NESTED_STATE). Skip the request for KVM_REQ_EVENT unless needed, subsuming the evaluate_pending_interrupts optimization that is found in enter_svm_guest_mode.

Re: [patch V6 10/37] x86/entry: Switch XEN/PV hypercall entry to IDTENTRY

2020-05-20 Thread Andy Lutomirski
On Wed, May 20, 2020 at 8:16 AM Andy Lutomirski wrote: > > On Wed, May 20, 2020 at 7:13 AM Thomas Gleixner wrote: > > > > Andy Lutomirski writes: > > > On Tue, May 19, 2020 at 11:58 AM Thomas Gleixner > > > wrote: > > >> Which brings you into the situation that you call schedule() from the >

[PATCH 10/24] KVM: nSVM: pass vmcb_control_area to copy_vmcb_control_area

2020-05-20 Thread Paolo Bonzini
This will come in handy when we put a struct vmcb_control_area in svm->nested. Signed-off-by: Paolo Bonzini --- arch/x86/kvm/svm/nested.c | 10 -- 1 file changed, 4 insertions(+), 6 deletions(-) diff --git a/arch/x86/kvm/svm/nested.c b/arch/x86/kvm/svm/nested.c index

[PATCH 23/24] selftests: kvm: add a SVM version of state-test

2020-05-20 Thread Paolo Bonzini
The test is similar to the existing one for VMX, but simpler because we don't have to test shadow VMCS or vmptrld/vmptrst/vmclear. Signed-off-by: Paolo Bonzini --- .../testing/selftests/kvm/x86_64/state_test.c | 69 +++ 1 file changed, 57 insertions(+), 12 deletions(-) diff

[PATCH 16/24] KVM: nSVM: split nested_vmcb_check_controls

2020-05-20 Thread Paolo Bonzini
The authoritative state does not come from the VMCB once in guest mode, but KVM_SET_NESTED_STATE can still perform checks on L1's provided SVM controls because we get them from userspace. Therefore, split out a function to do them. Signed-off-by: Paolo Bonzini --- arch/x86/kvm/svm/nested.c |

[PATCH 13/24] KVM: nSVM: do not reload pause filter fields from VMCB

2020-05-20 Thread Paolo Bonzini
These fields do not change from VMRUN to VMEXIT; there is no need to reload them on nested VMEXIT. Signed-off-by: Paolo Bonzini --- arch/x86/kvm/svm/nested.c | 5 - 1 file changed, 5 deletions(-) diff --git a/arch/x86/kvm/svm/nested.c b/arch/x86/kvm/svm/nested.c index

[PATCH 21/24] KVM: x86: always update CR3 in VMCB

2020-05-20 Thread Paolo Bonzini
vmx_load_mmu_pgd is delaying the write of GUEST_CR3 to prepare_vmcs02 as an optimization, but this is only correct before the nested vmentry. If userspace is modifying CR3 with KVM_SET_SREGS after the VM has already been put in guest mode, the value of CR3 will not be updated. Remove the

[PATCH 17/24] KVM: nSVM: do all MMU switch work in init/uninit functions

2020-05-20 Thread Paolo Bonzini
Move the kvm_mmu_reset_context calls to nested_svm_init_mmu_context and nested_svm_uninit_mmu_context, so that the state of the MMU is consistent with the vcpu->arch.mmu and vcpu->arch.walk_mmu state. Remove an unnecessary kvm_mmu_load, which can wait until the first vcpu_run. Signed-off-by:

[PATCH 12/24] KVM: nSVM: save all control fields in svm->nested

2020-05-20 Thread Paolo Bonzini
In preparation for nested SVM save/restore, store all data that matters from the VMCB control area into svm->nested. It will then become part of the nested SVM state that is saved by KVM_SET_NESTED_STATE and restored by KVM_GET_NESTED_STATE, just like the cached vmcs12 for nVMX. Signed-off-by:

[PATCH 20/24] KVM: MMU: pass arbitrary CR0/CR4/EFER to kvm_init_shadow_mmu

2020-05-20 Thread Paolo Bonzini
This allows fetching the registers from the hsave area when setting up the NPT shadow MMU, and is needed for KVM_SET_NESTED_STATE (which runs long after the CR0, CR4 and EFER values in vcpu have been switched to hold L2 guest state). Signed-off-by: Paolo Bonzini --- arch/x86/kvm/mmu.h|

[PATCH 18/24] KVM: nSVM: leave guest mode when clearing EFER.SVME

2020-05-20 Thread Paolo Bonzini
According to the AMD manual, the effect of turning off EFER.SVME while a guest is running is undefined. We make it leave guest mode immediately, similar to the effect of clearing the VMX bit in MSR_IA32_FEAT_CTL. Signed-off-by: Paolo Bonzini --- arch/x86/kvm/svm/nested.c | 16

[PATCH 22/24] uaccess: add memzero_user

2020-05-20 Thread Paolo Bonzini
This will be used from KVM. Add it to lib/ so that everyone can use it. Signed-off-by: Paolo Bonzini --- include/linux/uaccess.h | 1 + lib/usercopy.c | 63 + 2 files changed, 64 insertions(+) diff --git a/include/linux/uaccess.h

[PATCH 05/24] KVM: nSVM: correctly inject INIT vmexits

2020-05-20 Thread Paolo Bonzini
The usual drill at this point, except there is no code to remove because this case was not handled at all. Signed-off-by: Paolo Bonzini --- arch/x86/kvm/svm/nested.c | 27 +++ 1 file changed, 27 insertions(+) diff --git a/arch/x86/kvm/svm/nested.c

[PATCH 24/24] KVM: nSVM: implement KVM_GET_NESTED_STATE and KVM_SET_NESTED_STATE

2020-05-20 Thread Paolo Bonzini
Similar to VMX, the state that is captured through the currently available IOCTLs is a mix of L1 and L2 state, dependent on whether the L2 guest was running at the moment when the process was interrupted to save its state. In particular, the SVM-specific state for nested virtualization includes

[PATCH 09/24] KVM: nSVM: clean up tsc_offset update

2020-05-20 Thread Paolo Bonzini
Use l1_tsc_offset to compute svm->vcpu.arch.tsc_offset and svm->vmcb->control.tsc_offset, instead of relying on hsave. Signed-off-by: Paolo Bonzini --- arch/x86/kvm/svm/nested.c | 9 + 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/arch/x86/kvm/svm/nested.c

[PATCH 15/24] KVM: nSVM: remove HF_HIF_MASK

2020-05-20 Thread Paolo Bonzini
The L1 flags can be found in the save area of svm->nested.hsave, fish it from there so that there is one fewer thing to migrate. Signed-off-by: Paolo Bonzini --- arch/x86/include/asm/kvm_host.h | 1 - arch/x86/kvm/svm/nested.c | 5 - arch/x86/kvm/svm/svm.c | 2 +- 3 files

[PATCH 11/24] KVM: nSVM: remove trailing padding for struct vmcb_control_area

2020-05-20 Thread Paolo Bonzini
Allow placing the VMCB structs on the stack or in other structs without wasting too much space. Add BUILD_BUG_ON as a quick safeguard against typos. Signed-off-by: Paolo Bonzini --- arch/x86/include/asm/svm.h | 9 - 1 file changed, 8 insertions(+), 1 deletion(-) diff --git

[PATCH 04/24] KVM: nSVM: remove exit_required

2020-05-20 Thread Paolo Bonzini
All events now inject vmexits before vmentry rather than after vmexit. Therefore, exit_required is not set anymore and we can remove it. Signed-off-by: Paolo Bonzini --- arch/x86/kvm/svm/nested.c | 3 +-- arch/x86/kvm/svm/svm.c| 14 -- arch/x86/kvm/svm/svm.h| 3 --- 3

[PATCH 03/24] KVM: nSVM: inject exceptions via svm_check_nested_events

2020-05-20 Thread Paolo Bonzini
This allows exceptions injected by the emulator to be properly delivered as vmexits. The code also becomes simpler, because we can just let all L0-intercepted exceptions go through the usual path. In particular, our emulation of the VMX #DB exit qualification is very much simplified, because the

[PATCH 01/24] KVM: nSVM: fix condition for filtering async PF

2020-05-20 Thread Paolo Bonzini
Async page faults have to be trapped in the host (L1 in this case), since the APF reason was passed from L0 to L1 and stored in the L1 APF data page. This was completely reversed: the page faults were passed to the guest, a L2 hypervisor. Cc: sta...@vger.kernel.org Reviewed-by: Sean

Re: [PATCH net-next v2 3/4] dt-bindings: net: Add RGMII internal delay for DP83869

2020-05-20 Thread Dan Murphy
Andrew/Florian On 5/20/20 11:43 AM, Andrew Lunn wrote: I am interested in knowing where that is documented.  I want to RTM I grepped for a few different words but came up empty Hi Dan It probably is not well documented, but one example would be

Re: [tip:x86/mm 1/23] arch/x86/mm/init.c:75:6: warning: no previous prototype for function 'x86_has_pat_wp'

2020-05-20 Thread Borislav Petkov
On Tue, May 19, 2020 at 06:07:14PM -0700, Nick Desaulniers wrote: > It may be time to consider "promoting" some warnings from W=1 to be on > by default. That's the end goal with -Wmissing-prototypes for arch/x86/ at least. We'll turn that on once all current warnings are fixed and won't allow any

Re: [PATCH] x86/uv/time: Replace one-element array and save heap space

2020-05-20 Thread Kees Cook
On Mon, May 18, 2020 at 12:09:16PM -0700, Joe Perches wrote: > On Mon, 2020-05-18 at 14:01 -0500, Gustavo A. R. Silva wrote: > > The current codebase makes use of one-element arrays in the following > > form: > > > > struct something { > > int length; > > u8 data[1]; > > }; > [] > > This

Re: [PATCH] Input: omap-keypad - fix runtime pm imbalance on error

2020-05-20 Thread Rafael J. Wysocki
On Wed, May 20, 2020 at 7:02 PM Dmitry Torokhov wrote: > > Hi Dinghao, > > On Wed, May 20, 2020 at 6:35 AM Dinghao Liu wrote: > > > > pm_runtime_get_sync() increments the runtime PM usage counter even > > the call returns an error code. Thus a pairing decrement is needed > > on the error

Re: [PATCH] ASoC: mmp-sspa: Fix the error handling in probe()

2020-05-20 Thread Mark Brown
On Wed, 20 May 2020 10:35:16 +0200, Lubomir Rintel wrote: > If we fail after pm_runtime_enable(), we fail to undo it. Same with > clk_prepare_enable(). Let's order them after all things that can fail. Applied to https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound.git for-next

Re: [PATCH 0/2] MAINTAINER entries for few ROHM power devices

2020-05-20 Thread Mark Brown
On Wed, 20 May 2020 09:10:22 +0300, Matti Vaittinen wrote: > Add maintainer entries to a few ROHM devices and Linear Ranges > > Linear Ranges helpers were refactored out of regulator core to lib so > that other drivers could utilize them too. (I guess power/supply drivers > and possibly clk

Re: [RESEND PATCH v7 3/5] powerpc/papr_scm: Fetch nvdimm health information from PHYP

2020-05-20 Thread Vaibhav Jain
Thanks for reviewing this this patch Ira. My responses below: Ira Weiny writes: > On Wed, May 20, 2020 at 12:30:56AM +0530, Vaibhav Jain wrote: >> Implement support for fetching nvdimm health information via >> H_SCM_HEALTH hcall as documented in Ref[1]. The hcall returns a pair >> of 64-bit

Re: [PATCH] input: i8042: Remove special PowerPC handling

2020-05-20 Thread Dmitry Torokhov
Hi Michael, On Wed, May 20, 2020 at 04:07:00PM +1000, Michael Ellerman wrote: > [ + Dmitry & linux-input ] > > Nathan Chancellor writes: > > This causes a build error with CONFIG_WALNUT because kb_cs and kb_data > > were removed in commit 917f0af9e5a9 ("powerpc: Remove arch/ppc and > >

Re: [PATCH 2/2] kvm/x86: don't expose MSR_IA32_UMWAIT_CONTROL unconditionally

2020-05-20 Thread Vitaly Kuznetsov
Maxim Levitsky writes: > On Wed, 2020-05-20 at 18:33 +0200, Vitaly Kuznetsov wrote: >> Maxim Levitsky writes: >> >> > This msr is only available when the host supports WAITPKG feature. >> > >> > This breaks a nested guest, if the L1 hypervisor is set to ignore >> > unknown msrs, because the

Re: [PATCH liburing v2 0/5] liburing: add helpers to enable/disable eventfd notifications

2020-05-20 Thread Jens Axboe
On 5/20/20 11:07 AM, Stefano Garzarella wrote: > This series is based on top of a new IORING_CQ_EVENTFD_DISABLED > flag available in the CQ ring flags. > > I added io_uring_cq_eventfd_enabled() to get the status of eventfd > notifications, and io_uring_cq_eventfd_toggle() to disable/enabled >

Re: [PATCH] dt-bindings: input: touchscreen: edt-ft5x06: change reg property

2020-05-20 Thread Dmitry Torokhov
Hi Johan, On Wed, May 20, 2020 at 09:33:27AM +0200, Johan Jonker wrote: > A test with the command below gives this error: > > arch/arm/boot/dts/rk3188-bqedison2qc.dt.yaml: > touchscreen@3e: reg:0:0: 56 was expected > > The touchscreen chip on 'rk3188-bqedison2qc' and other BQ models > was

Re: [PATCH] Bluetooth: hci_qca: Fix uninitialized access to hdev

2020-05-20 Thread Marcel Holtmann
Hi Abhishek, > hdev is always allocated and not only when power control is required. > > Reported-by: Dan Carpenter > Signed-off-by: Abhishek Pandit-Subedi > --- > > drivers/bluetooth/hci_qca.c | 3 ++- > 1 file changed, 2 insertions(+), 1 deletion(-) patch has been applied to bluetooth-next

[PATCH v5] ACPI/IORT: Fix PMCG node single ID mapping handling

2020-05-20 Thread Tuan Phan
An IORT PMCG node can have no ID mapping if its overflow interrupt is wire based therefore the code that parses the PMCG node can not assume the node will always have a single mapping present at index 0. Fix iort_get_id_mapping_index() by checking for an overflow interrupt and mapping count.

Re: [patch V6 36/37] x86/entry: Move paranoid irq tracing out of ASM code

2020-05-20 Thread Andy Lutomirski
On Wed, May 20, 2020 at 8:17 AM Thomas Gleixner wrote: > > Andy Lutomirski writes: > > > On Fri, May 15, 2020 at 5:11 PM Thomas Gleixner wrote: > > > > I think something's missing here. With this patch applied, don't we > > get to exc_debug_kernel() -> handle_debug() without doing > >

Hello Dear

2020-05-20 Thread Lisa Tofan
Hello Dear, This is Miss Lisa Tofan, How are you today hope all is well with you, please I will need your urgent attention regarding this important discussion kindly contact me back here my Email: lisatofan...@gmail.com: for more details, Thanks, Miss Lisa Tofan

[PATCH] media: cedrus: Add support for additional output formats

2020-05-20 Thread Jernej Skrabec
If VPU supports untiled output, it actually supports several different YUV 4:2:0 layouts, namely NV12, NV21, YUV420 and YVU420. Add support for all of them. Signed-off-by: Jernej Skrabec --- drivers/staging/media/sunxi/cedrus/cedrus_hw.c | 18 +-

[PATCH] lan743x: Added fixed link support

2020-05-20 Thread Roelof Berg
Microchip lan7431 is frequently connected to a phy. However, it can also be directly connected to a MII remote peer without any phy in between. For supporting such a phyless hardware setup in Linux we added the capability to the driver to understand the fixed-link and the phy-connection-type

Re: clock_gettime64 vdso bug on 32-bit arm, rpi-4

2020-05-20 Thread Rich Felker
On Wed, May 20, 2020 at 12:08:10PM -0400, Rich Felker wrote: > On Wed, May 20, 2020 at 04:41:29PM +0100, Szabolcs Nagy wrote: > > The 05/19/2020 22:31, Arnd Bergmann wrote: > > > On Tue, May 19, 2020 at 10:24 PM Adhemerval Zanella > > > wrote: > > > > On 19/05/2020 16:54, Arnd Bergmann wrote: > >

Re: [PATCH v5 1/4] rcu/kasan: record and print call_rcu() call stack

2020-05-20 Thread Andrey Konovalov
On Wed, May 20, 2020 at 2:34 PM Walter Wu wrote: > > This feature will record the last two call_rcu() call stacks and > prints up to 2 call_rcu() call stacks in KASAN report. > > When call_rcu() is called, we store the call_rcu() call stack into > slub alloc meta-data, so that the KASAN report

[PATCH liburing v2 2/5] man/io_uring_setup.2: add 'flags' field in the struct io_cqring_offsets

2020-05-20 Thread Stefano Garzarella
Signed-off-by: Stefano Garzarella --- man/io_uring_setup.2 | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/man/io_uring_setup.2 b/man/io_uring_setup.2 index d48bb32..c929cb7 100644 --- a/man/io_uring_setup.2 +++ b/man/io_uring_setup.2 @@ -325,7 +325,8 @@ struct

Re: [RFC PATCH v3 2/2] arm64: tlb: Use the TLBI RANGE feature in arm64

2020-05-20 Thread Catalin Marinas
On Mon, May 18, 2020 at 08:21:02PM +0800, Zhenyu Ye wrote: > On 2020/5/14 23:28, Catalin Marinas wrote: > > On Tue, Apr 14, 2020 at 07:28:35PM +0800, Zhenyu Ye wrote: > >> + } > >> + scale++; > >> + range_size >>= TLB_RANGE_MASK_SHIFT; > >> + } > > > > So, you start

[PATCH liburing v2 1/5] Add CQ ring 'flags' field

2020-05-20 Thread Stefano Garzarella
io_uring provides the new CQ ring 'flags' field if 'cq_off.flags' is not zero. In this case we set the 'cq->kflags' pointer, otherwise it will be NULL. Signed-off-by: Stefano Garzarella --- src/include/liburing.h | 1 + src/include/liburing/io_uring.h | 4 +++- src/setup.c

Re: [PATCH v4] ACPI/IORT: Fix PMCG node single ID mapping handling.

2020-05-20 Thread Tuan Phan
> On May 20, 2020, at 5:58 AM, Lorenzo Pieralisi > wrote: > > On Fri, May 15, 2020 at 12:24:46PM -0700, Tuan Phan wrote: >> An IORT PMCG node can have no ID mapping if its overflow interrupt is >> wire based therefore the code that parses the PMCG node can not assume >> the node will always

[PATCH liburing v2 0/5] liburing: add helpers to enable/disable eventfd notifications

2020-05-20 Thread Stefano Garzarella
This series is based on top of a new IORING_CQ_EVENTFD_DISABLED flag available in the CQ ring flags. I added io_uring_cq_eventfd_enabled() to get the status of eventfd notifications, and io_uring_cq_eventfd_toggle() to disable/enabled eventfd notifications. I updated man pages and I added a

[PATCH liburing v2 4/5] man/io_uring_register.2: add IORING_CQ_EVENTFD_DISABLED description

2020-05-20 Thread Stefano Garzarella
Signed-off-by: Stefano Garzarella --- man/io_uring_register.2 | 8 1 file changed, 8 insertions(+) diff --git a/man/io_uring_register.2 b/man/io_uring_register.2 index e64f688..5022c03 100644 --- a/man/io_uring_register.2 +++ b/man/io_uring_register.2 @@ -168,6 +168,14 @@ must contain

[PATCH liburing v2 5/5] Add test/eventfd-disable.c test case

2020-05-20 Thread Stefano Garzarella
This new test checks if the mechanism to enable/disable notifications through eventfd when a request is completed works correctly. Signed-off-by: Stefano Garzarella --- v1 -> v2: - renamed io_uring_cq_eventfd_toggle() --- .gitignore | 1 + test/Makefile | 6 +-

[PATCH liburing v2 3/5] Add helpers to set and get eventfd notification status

2020-05-20 Thread Stefano Garzarella
This patch adds the new IORING_CQ_EVENTFD_DISABLED flag. It can be used to disable/enable notifications from the kernel when a request is completed and queued to the CQ ring. We also add two helpers function to check if the notifications are enabled and to toggle them. If the kernel doesn't

Re: [PATCH v1 1/1] PCI/ERR: Handle fatal error recovery for non-hotplug capable devices

2020-05-20 Thread Kuppuswamy, Sathyanarayanan
On 5/20/20 1:28 AM, Yicong Yang wrote: On 2020/5/7 11:32, sathyanarayanan.kuppusw...@linux.intel.com wrote: From: Kuppuswamy Sathyanarayanan If there are non-hotplug capable devices connected to a given port, then during the fatal error recovery(triggered by DPC or AER), after calling

Linux 5.6.14

2020-05-20 Thread Greg Kroah-Hartman
I'm announcing the release of the 5.6.14 kernel. All users of the 5.6 kernel series must upgrade. The updated 5.6.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.6.y and can be browsed at the normal kernel.org git web browser:

Re: [PATCH] mm, memcg: reclaim more aggressively before high allocator throttling

2020-05-20 Thread Michal Hocko
On Wed 20-05-20 12:51:31, Johannes Weiner wrote: > On Wed, May 20, 2020 at 06:07:56PM +0200, Michal Hocko wrote: > > On Wed 20-05-20 15:37:12, Chris Down wrote: > > > In Facebook production, we've seen cases where cgroups have been put > > > into allocator throttling even when they appear to have

Linux 5.4.42

2020-05-20 Thread Greg Kroah-Hartman
I'm announcing the release of the 5.4.42 kernel. All users of the 5.4 kernel series must upgrade. The updated 5.4.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.4.y and can be browsed at the normal kernel.org git web browser:

Re: Linux 4.19.124

2020-05-20 Thread Greg Kroah-Hartman
diff --git a/Makefile b/Makefile index 68fa15edd662..292c92c8369d 100644 --- a/Makefile +++ b/Makefile @@ -1,7 +1,7 @@ # SPDX-License-Identifier: GPL-2.0 VERSION = 4 PATCHLEVEL = 19 -SUBLEVEL = 123 +SUBLEVEL = 124 EXTRAVERSION = NAME = "People's Front" @@ -657,20 +657,14 @@ KBUILD_CFLAGS

Linux 4.19.124

2020-05-20 Thread Greg Kroah-Hartman
I'm announcing the release of the 4.19.124 kernel. All users of the 4.19 kernel series must upgrade. The updated 4.19.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.19.y and can be browsed at the normal kernel.org git web

Re: Linux 4.9.224

2020-05-20 Thread Greg Kroah-Hartman
diff --git a/Makefile b/Makefile index 2a923301987e..3e58c142f92f 100644 --- a/Makefile +++ b/Makefile @@ -1,6 +1,6 @@ VERSION = 4 PATCHLEVEL = 9 -SUBLEVEL = 223 +SUBLEVEL = 224 EXTRAVERSION = NAME = Roaring Lionus @@ -658,20 +658,14 @@ KBUILD_CFLAGS += $(call cc-option,-fdata-sections,)

Re: Linux 4.4.224

2020-05-20 Thread Greg Kroah-Hartman
diff --git a/Makefile b/Makefile index 6b88acb0b9b1..f381af71fa32 100644 --- a/Makefile +++ b/Makefile @@ -1,6 +1,6 @@ VERSION = 4 PATCHLEVEL = 4 -SUBLEVEL = 223 +SUBLEVEL = 224 EXTRAVERSION = NAME = Blurry Fish Butt @@ -631,7 +631,6 @@ ARCH_CFLAGS := include arch/$(SRCARCH)/Makefile

Linux 4.9.224

2020-05-20 Thread Greg Kroah-Hartman
I'm announcing the release of the 4.9.224 kernel. All users of the 4.9 kernel series must upgrade. The updated 4.9.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.9.y and can be browsed at the normal kernel.org git web browser:

Re: Linux 4.14.181

2020-05-20 Thread Greg Kroah-Hartman
diff --git a/Makefile b/Makefile index 525565f44b17..12bf05880d2d 100644 --- a/Makefile +++ b/Makefile @@ -1,7 +1,7 @@ # SPDX-License-Identifier: GPL-2.0 VERSION = 4 PATCHLEVEL = 14 -SUBLEVEL = 180 +SUBLEVEL = 181 EXTRAVERSION = NAME = Petit Gorille @@ -656,20 +656,14 @@ KBUILD_CFLAGS

Linux 4.14.181

2020-05-20 Thread Greg Kroah-Hartman
I'm announcing the release of the 4.14.181 kernel. All users of the 4.14 kernel series must upgrade. The updated 4.14.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.14.y and can be browsed at the normal kernel.org git web

Re: [PATCH v5 04/18] sparc32: mm: Reduce allocation size for PMD and PTE tables

2020-05-20 Thread Mike Rapoport
On Mon, May 18, 2020 at 09:37:15AM +0100, Will Deacon wrote: > On Sat, May 16, 2020 at 05:07:50PM -0700, Guenter Roeck wrote: > > On Sat, May 16, 2020 at 05:00:50PM -0700, Guenter Roeck wrote: > > > On Mon, May 11, 2020 at 09:41:36PM +0100, Will Deacon wrote: > > > > Now that the page table

Linux 4.4.224

2020-05-20 Thread Greg Kroah-Hartman
I'm announcing the release of the 4.4.224 kernel. All users of the 4.4 kernel series must upgrade. The updated 4.4.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.4.y and can be browsed at the normal kernel.org git web browser:

Re: [RESEND PATCH v7 2/5] seq_buf: Export seq_buf_printf() to external modules

2020-05-20 Thread Christoph Hellwig
s/seq_buf: Export seq_buf_printf() to external modules/ seq_buf: export seq_buf_printf/

Re: [PATCH] Input: omap-keypad - fix runtime pm imbalance on error

2020-05-20 Thread Dmitry Torokhov
Hi Dinghao, On Wed, May 20, 2020 at 6:35 AM Dinghao Liu wrote: > > pm_runtime_get_sync() increments the runtime PM usage counter even > the call returns an error code. Thus a pairing decrement is needed > on the error handling path to keep the counter balanced. This is a very surprising

Re: [RFC PATCH] tick/sched: update full_nohz status after SCHED dep is cleared

2020-05-20 Thread Frederic Weisbecker
On Wed, May 20, 2020 at 06:49:25PM +0200, Juri Lelli wrote: > On 20/05/20 18:24, Frederic Weisbecker wrote: > > Hummm, so I enabled 'timer:*', anything else you think I should be > looking at? Are you sure you also enabled timer_expire_entry? Because: > > ... > ksoftirqd/13-117 [013]

Re: [PATCH 1/3] selftests: kvm: add a SVM version of state-test

2020-05-20 Thread Paolo Bonzini
On 20/05/20 18:50, Vitaly Kuznetsov wrote: > Reviewed-by: Vitaly Kuznetsov > This was sent by mistake, but thanks for the review anyway! Paolo

Re: [PATCH] mm, memcg: unify reclaim retry limits with page allocator

2020-05-20 Thread Michal Hocko
On Wed 20-05-20 17:31:42, Chris Down wrote: > Reclaim retries have been set to 5 since the beginning of time in > 66e1707bc346 ("Memory controller: add per cgroup LRU and reclaim"). > However, we now have a generally agreed-upon standard for page reclaim: > MAX_RECLAIM_RETRIES (currently 16),

Re: [PATCH 2/2] kvm/x86: don't expose MSR_IA32_UMWAIT_CONTROL unconditionally

2020-05-20 Thread Maxim Levitsky
On Wed, 2020-05-20 at 18:33 +0200, Vitaly Kuznetsov wrote: > Maxim Levitsky writes: > > > This msr is only available when the host supports WAITPKG feature. > > > > This breaks a nested guest, if the L1 hypervisor is set to ignore > > unknown msrs, because the only other safety check that the >

Re: [PATCH v3 2/2] scsi: ufs-qcom: enter and exit hibern8 during clock scaling

2020-05-20 Thread Asutosh Das (asd)
Hi Pedro, On 11/11/2019 7:54 AM, Pedro Sousa wrote: Hi Asutosh, Please check comments. Sorry for missing out on this and thanks for your review. -Original Message- From: Asutosh Das Sent: Wednesday, October 23, 2019 5:49 PM To: c...@codeaurora.org; rna...@codeaurora.org;

Re: [PATCH ghak25 v6] audit: add subj creds to NETFILTER_CFG record to cover async unregister

2020-05-20 Thread Richard Guy Briggs
On 2020-05-20 12:51, Richard Guy Briggs wrote: > Some table unregister actions seem to be initiated by the kernel to > garbage collect unused tables that are not initiated by any userspace > actions. It was found to be necessary to add the subject credentials to > cover this case to reveal the

Re: [PATCH v3 2/7] bus: mhi: core: Introduce independent voting mechanism

2020-05-20 Thread Jeffrey Hugo
On 5/18/2020 2:03 PM, Bhaumik Bhatt wrote: Allow independent votes from clients such that they can choose to vote for either the device or the bus or both. This helps in cases where the device supports autonomous low power mode wherein it can move to M2 state without the need to notify the host.

Re: [PATCHv3 5/5] Input: EXC3000: Add reset gpio support

2020-05-20 Thread Enric Balletbo i Serra
Hi Sebastian, On 20/5/20 17:39, Sebastian Reichel wrote: > Add basic support for an optional reset gpio. > > Signed-off-by: Sebastian Reichel Thanks to address the comments I did in second version. so, Reviewed-by: Enric Balletbo i Serra > --- > .../input/touchscreen/eeti,exc3000.yaml

Re: [PATCH net-next] ipv6/route: inherit max_sizes from current netns

2020-05-20 Thread David Ahern
On 5/20/20 8:58 AM, Christian Brauner wrote: > During NorthSec (cf. [1]) a very large number of unprivileged > containers and nested containers are run during the competition to > provide a safe environment for the various teams during the event. Every > year a range of feature requests or bug

Re: [PATCHv3 4/5] Input: EXC3000: Add support to query model and fw_version

2020-05-20 Thread Enric Balletbo i Serra
Hi Sebastian, On 20/5/20 17:39, Sebastian Reichel wrote: > Expose model and fw_version via sysfs. Also query the model > in probe to make sure, that the I2C communication with the > device works before successfully probing the driver. > > This is a bit complicated, since EETI devices do not have

[PATCH ghak25 v6] audit: add subj creds to NETFILTER_CFG record to cover async unregister

2020-05-20 Thread Richard Guy Briggs
Some table unregister actions seem to be initiated by the kernel to garbage collect unused tables that are not initiated by any userspace actions. It was found to be necessary to add the subject credentials to cover this case to reveal the source of these actions. A sample record: The uid,

Re: [PATCH] mm, memcg: reclaim more aggressively before high allocator throttling

2020-05-20 Thread Johannes Weiner
On Wed, May 20, 2020 at 06:07:56PM +0200, Michal Hocko wrote: > On Wed 20-05-20 15:37:12, Chris Down wrote: > > In Facebook production, we've seen cases where cgroups have been put > > into allocator throttling even when they appear to have a lot of slack > > file caches which should be trivially

[PATCH] KVM: PPC: Book3S HV: relax check on H_SVM_INIT_ABORT

2020-05-20 Thread Laurent Dufour
The commit 8c47b6ff29e3 ("KVM: PPC: Book3S HV: Check caller of H_SVM_* Hcalls") added checks of secure bit of SRR1 to filter out the Hcall reserved to the Ultravisor. However, the Hcall H_SVM_INIT_ABORT is made by the Ultravisor passing the context of the VM calling UV_ESM. This allows the

<    2   3   4   5   6   7   8   9   10   11   >