Re: [PATCH v2] net: ipv6: fix use-after-free Read in __xfrm6_tunnel_spi_lookup

2020-07-28 Thread David Miller
From: B K Karthik Date: Sun, 26 Jul 2020 08:38:55 +0530 > @@ -103,10 +103,10 @@ static int __xfrm6_tunnel_spi_check(struct net *net, > u32 spi) > { > struct xfrm6_tunnel_net *xfrm6_tn = xfrm6_tunnel_pernet(net); > struct xfrm6_tunnel_spi *x6spi; > - int index = xfrm6_tunnel_spi_

Re: [PATCH] staging/speakup: Move out of staging

2020-07-28 Thread Samuel Thibault
Joe Perches, le mar. 28 juil. 2020 17:24:47 -0700, a ecrit: > On Tue, 2020-07-28 at 23:12 +0200, Samuel Thibault wrote: > > diff --git a/MAINTAINERS b/MAINTAINERS > [] > > @@ -16077,6 +16077,15 @@ Q: > > https://patchwork.kernel.org/project/linux-sparse/list/ > > B: https://bugzilla.kernel.org/en

Re: Random shadow stack pointer corruption

2020-07-28 Thread H.J. Lu
On Sat, Jul 18, 2020 at 4:35 PM Yu-cheng Yu wrote: > > On Sat, 2020-07-18 at 15:41 -0700, Dave Hansen wrote: > > On 7/18/20 11:24 AM, Yu-cheng Yu wrote: > > > On Sat, 2020-07-18 at 11:00 -0700, Andy Lutomirski wrote: > > > > On Sat, Jul 18, 2020 at 10:58 AM Yu-cheng Yu > > > > wrote: > > > > > H

[PATCHv2] staging/speakup: Move out of staging

2020-07-28 Thread Samuel Thibault
The nasty TODO items are done. Signed-off-by: Samuel Thibault --- v2: keep S: line in MAINTAINERS .../ABI/stable}/sysfs-driver-speakup | 0 .../admin-guide}/spkguide.txt | 0 MAINTAINERS | 20 +-- drivers/accessibility

[PATCH] Staging : iio : Fixed a punctuation and a spelling mistake.

2020-07-28 Thread Ankit Baluni
Added a missing comma and changed 'it it useful' to 'it is useful'. Signed-off-by: Ankit Baluni --- drivers/staging/iio/Documentation/overview.txt | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/staging/iio/Documentation/overview.txt b/drivers/staging/iio/Documen

Re: [PATCH] net: ipv6: fix slab-out-of-bounds Read in __xfrm6_tunnel_spi_check

2020-07-28 Thread David Miller
From: B K Karthik Date: Sat, 25 Jul 2020 19:00:31 +0530 > use spi_byaddr instead of spi_byspi ... > diff --git a/net/ipv6/xfrm6_tunnel.c b/net/ipv6/xfrm6_tunnel.c > index 25b7ebda2fab..cab7693ccfe3 100644 > --- a/net/ipv6/xfrm6_tunnel.c > +++ b/net/ipv6/xfrm6_tunnel.c > @@ -103,10 +103,10 @@ sta

Re: [PATCH -next] drm: xlnx: Fix typo in parameter description

2020-07-28 Thread Hyun Kwon
Hello, On Tue, Jul 28, 2020 at 03:35:43PM -0700, Laurent Pinchart wrote: > On Wed, Jul 29, 2020 at 12:02:05AM +0200, dan...@ffwll.ch wrote: > > Hi Hyun Kwon, > > > > Are you all sorted with drm-misc commit rights so you can push the 3 > > (maybe there's more) xlnx fixup patches to drm-misc-next-fi

Re: [PATCH] net: ipv6: fix slab-out-of-bounda Read in xfrm6_tunnel_alloc_spi

2020-07-28 Thread David Miller
From: B K Karthik Date: Sat, 25 Jul 2020 18:15:53 +0530 > fix slab-out-of-bounds Read in xfrm6_tunnel_alloc_spi > by checking for existance of head for the list spi_byspi spi_byspi is an array, therefore as long as xfrm6_tn is not NULL then spi_byspi will also not be NULL.

Re: [PATCH 0/2] Small cleanups to ingenic-drm driver

2020-07-28 Thread Paul Cercueil
Le mer. 29 juil. 2020 à 0:00, dan...@ffwll.ch a écrit : On Tue, Jul 28, 2020 at 10:17:36PM +0200, Sam Ravnborg wrote: Hi Paul. On Tue, Jul 28, 2020 at 05:16:39PM +0200, Paul Cercueil wrote: > Here are a few cleanups to the ingenic-drm driver. > - some error paths were missing and have be

Re: [PATCH][next] greybus: Use fallthrough pseudo-keyword

2020-07-28 Thread Joe Perches
On Tue, 2020-07-28 at 17:37 -0500, Alex Elder wrote: > On 7/27/20 1:32 PM, Gustavo A. R. Silva wrote: > > Replace the existing /* fall through */ comments and its variants with > > the new pseudo-keyword macro fallthrough[1]. > > > > [1] > > https://www.kernel.org/doc/html/v5.7/process/deprecated

Re: [PATCH] staging/speakup: Move out of staging

2020-07-28 Thread Joe Perches
On Tue, 2020-07-28 at 23:12 +0200, Samuel Thibault wrote: > The nasty TODO items are done. Nice. > diff --git a/MAINTAINERS b/MAINTAINERS [] > @@ -16077,6 +16077,15 @@ Q: > https://patchwork.kernel.org/project/linux-sparse/list/ > B: https://bugzilla.kernel.org/enter_bug.cgi?component=Spars

Re: [PATCH] ipv6: Fix nexthop refcnt leak when creating ipv6 route info

2020-07-28 Thread David Miller
From: Xiyu Yang Date: Sat, 25 Jul 2020 16:02:18 +0800 > ip6_route_info_create() invokes nexthop_get(), which increases the > refcount of the "nh". > > When ip6_route_info_create() returns, local variable "nh" becomes > invalid, so the refcount should be decreased to keep refcount balanced. > >

Re: [PATCH net-next v5 0/2] hinic: add some error messages for debug

2020-07-28 Thread David Miller
From: Luo bin Date: Sat, 25 Jul 2020 15:11:17 +0800 > patch #1: support to handle hw abnormal event > patch #2: improve the error messages when functions return failure and > dump relevant registers in some exception handling processes Series applied, thanks.

Re: [PATCH v4 3/5] counter: Add character device interface

2020-07-28 Thread David Lechner
On 7/21/20 2:35 PM, William Breathitt Gray wrote: This patch introduces a character device interface for the Counter subsystem. Device data is exposed through standard character device read operations. Device data is gathered when a Counter event is pushed by the respective Counter device driver.

[tip:locking/nmi] BUILD SUCCESS ed00495333ccc80fc8fb86fb43773c3c2a499466

2020-07-28 Thread kernel test robot
i386 randconfig-a003-20200728 i386 randconfig-a004-20200728 i386 randconfig-a005-20200728 i386 randconfig-a002-20200728 i386 randconfig-a006-20200728 i386 randconfig-a001-20200728 x86_64

[PATCH v2 1/5] Add a per-cpu view of SMT state

2020-07-28 Thread Balbir Singh
A new field smt_active in cpuinfo_x86 identifies if the current core/cpu is in SMT mode or not. This can be very helpful if the system has some of its cores with threads offlined and can be used for cases where action is taken based on the state of SMT. The follow up patches use this feature. Sugg

[PATCH v2 0/5] Implement optional L1D flushing for

2020-07-28 Thread Balbir Singh
Implement a mechanism that allows tasks to conditionally flush their L1D cache (mitigation mechanism suggested in 2). The previous posts of these patches were sent for inclusion (see 3) and were not included due to the concern for the need for additional checks, those checks were: 1. Implement thi

[PATCH v2 4/5] prctl: Hook L1D flushing in via prctl

2020-07-28 Thread Balbir Singh
Use the existing PR_GET/SET_SPECULATION_CTRL API to expose the L1D flush capability. For L1D flushing PR_SPEC_FORCE_DISABLE and PR_SPEC_DISABLE_NOEXEC are not supported. There is also no seccomp integration for the feature. Signed-off-by: Balbir Singh --- arch/x86/kernel/cpu/bugs.c | 54 +++

[PATCH v2 5/5] Documentation: Add L1D flushing Documentation

2020-07-28 Thread Balbir Singh
Add documentation of l1d flushing, explain the need for the feature and how it can be used. Signed-off-by: Balbir Singh --- Documentation/admin-guide/hw-vuln/index.rst | 1 + .../admin-guide/hw-vuln/l1d_flush.rst | 70 +++ .../admin-guide/kernel-parameters.txt

[PATCH v2 2/5] x86/mm: Refactor cond_ibpb() to support other use cases

2020-07-28 Thread Balbir Singh
cond_ibpb() has the necessary bits required to track the previous mm in switch_mm_irqs_off(). This can be reused for other use cases like L1D flushing on context switch. [ tglx: Moved comment, added a separate define for state (re)initialization ] Suggested-by: Thomas Gleixner Signed-off-by: Bal

[PATCH v2 3/5] x86/mm: Optionally flush L1D on context switch

2020-07-28 Thread Balbir Singh
Implement a mechanism to selectively flush the L1D cache. The goal is to allow tasks that want to save sensitive information, found by the recent snoop assisted data sampling vulnerabilites, to flush their L1D on being switched out. This protects their data from being snooped or leaked via side ch

Re: [PATCH v3 00/11] SVM cleanup and INVPCID support for the AMD guests

2020-07-28 Thread Jim Mattson
On Tue, Jul 28, 2020 at 4:37 PM Babu Moger wrote: > > The following series adds the support for PCID/INVPCID on AMD guests. > While doing it re-structured the vmcb_control_area data structure to > combine all the intercept vectors into one 32 bit array. Makes it easy > for future additions. > > IN

Re: [PATCH] net: ethernet: mtk_eth_soc: Always call mtk_gmac0_rgmii_adjust() for mt7623

2020-07-28 Thread David Miller
From: David Woodhouse Date: Thu, 23 Jul 2020 20:07:10 +0100 > From: René van Dorst > > Modify mtk_gmac0_rgmii_adjust() so it can always be called. > mtk_gmac0_rgmii_adjust() sets-up the TRGMII clocks. > > Signed-off-by: René van Dorst > Signed-off-By: David Woodhouse > Tested-by: Frank Wunde

Re: [PATCH] habanalabs: fix up absolute include instructions

2020-07-28 Thread kernel test robot
Hi Greg, I love your patch! Perhaps something to improve: [auto build test WARNING on char-misc/char-misc-testing] [cannot apply to linux/master linus/master v5.8-rc7 next-20200728] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to

Re: [PATCH] proc/sysctl: make protected_* world readable

2020-07-28 Thread Luis Chamberlain
On Thu, Jul 09, 2020 at 09:31:37PM -0700, Kees Cook wrote: > On Thu, Jul 09, 2020 at 04:51:15PM -0700, Julius Hemanth Pitti wrote: > > protected_* files have 600 permissions which prevents > > non-superuser from reading them. > > > > Container like "AWS greengrass" refuse to launch unless > > prot

[RFC PATCH] habanalabs: goya_ctx_init() can be static

2020-07-28 Thread kernel test robot
Signed-off-by: kernel test robot --- gaudi/gaudi.c |2 +- goya/goya.c |2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/misc/habanalabs/gaudi/gaudi.c b/drivers/misc/habanalabs/gaudi/gaudi.c index d4b3b995f69d8..00a0a7238d814 100644 --- a/drivers/misc/haban

Re: [PATCH v3 07/11] KVM: nSVM: Cleanup nested_state data structure

2020-07-28 Thread Jim Mattson
On Tue, Jul 28, 2020 at 4:38 PM Babu Moger wrote: > > host_intercept_exceptions is not used anywhere. Clean it up. > > Signed-off-by: Babu Moger Reviewed-by: Jim Mattson

Re: [PATCH v3 08/11] KVM: SVM: Remove set_cr_intercept, clr_cr_intercept and is_cr_intercept

2020-07-28 Thread Jim Mattson
On Tue, Jul 28, 2020 at 4:38 PM Babu Moger wrote: > > Remove set_cr_intercept, clr_cr_intercept and is_cr_intercept. Instead > call generic set_intercept, clr_intercept and is_intercept for all > cr intercepts. > > Signed-off-by: Babu Moger Reviewed-by: Jim Mattson

Re: Add and use a generic version of devmem_is_allowed()

2020-07-28 Thread Luis Chamberlain
On Thu, Jul 09, 2020 at 02:19:20PM -0700, Palmer Dabbelt wrote: > As part of adding STRICT_DEVMEM support to the RISC-V port, Zong provided an > implementation of devmem_is_allowed() that's exactly the same as the version > in > a handful of other ports. Rather than duplicate code, I've put a gen

Re: [PATCH v3 03/11] KVM: SVM: Change intercept_dr to generic intercepts

2020-07-28 Thread Jim Mattson
On Tue, Jul 28, 2020 at 4:38 PM Babu Moger wrote: > > Modify intercept_dr to generic intercepts in vmcb_control_area. > Use generic __set_intercept, __clr_intercept and __is_intercept > to set/clear/test the intercept_dr bits. > > Signed-off-by: Babu Moger > --- > arch/x86/include/asm/svm.h |

Re: [PATCH v3 02/11] KVM: SVM: Change intercept_cr to generic intercepts

2020-07-28 Thread Jim Mattson
On Tue, Jul 28, 2020 at 4:38 PM Babu Moger wrote: > > Change intercept_cr to generic intercepts in vmcb_control_area. > Use the new __set_intercept, __clr_intercept and __is_intercept > where applicable. > > Signed-off-by: Babu Moger > --- > arch/x86/include/asm/svm.h | 42

Re: [RFC PATCH v5 05/11] fs: add security blob and hooks for block_device

2020-07-28 Thread Deven Bowers
On 7/28/2020 3:40 PM, Al Viro wrote: On Tue, Jul 28, 2020 at 03:22:59PM -0700, Casey Schaufler wrote: + hlist_for_each_entry(p, &security_hook_heads.bdev_setsecurity, list) { + rc = p->hook.bdev_setsecurity(bdev, name, value, size); + + if (rc == -ENOSYS) +

Re: [RFC PATCH v5 06/11] dm-verity: move signature check after tree validation

2020-07-28 Thread Deven Bowers
On 7/28/2020 2:50 PM, Eric Biggers wrote: On Tue, Jul 28, 2020 at 02:36:06PM -0700, Deven Bowers wrote: The CONFIG_DM_VERITY_VERIFY_ROOTHASH_SIG introduced by Jaskaran was intended to be used to allow an LSM to enforce verifications for all dm-verity volumes. However, with it's current imple

Re: [PATCH 01/24] asm-generic: add generic versions of mmu context functions

2020-07-28 Thread kernel test robot
Hi Nicholas, I love your patch! Yet something to improve: [auto build test ERROR on openrisc/for-next] [also build test ERROR on sparc-next/master sparc/master linus/master asm-generic/master xtensa/for_next v5.8-rc7 next-20200728] [cannot apply to nios2/for-linus] [If your patch is applied to

Re: [PATCH] habanalabs: fix up absolute include instructions

2020-07-28 Thread kernel test robot
Hi Greg, I love your patch! Perhaps something to improve: [auto build test WARNING on char-misc/char-misc-testing] [cannot apply to linux/master linus/master v5.8-rc7 next-20200728] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to

Re: [PATCH v3 01/11] KVM: SVM: Introduce __set_intercept, __clr_intercept and __is_intercept

2020-07-28 Thread Jim Mattson
On Tue, Jul 28, 2020 at 4:37 PM Babu Moger wrote: > > This is in preparation for the future intercept vector additions. > > Add new functions __set_intercept, __clr_intercept and __is_intercept > using kernel APIs __set_bit, __clear_bit and test_bit espectively. > > Signed-off-by: Babu Moger Sean

Re: [V9fs-developer] [PATCH kernel] 9p/trans_fd: Check file mode at opening

2020-07-28 Thread Alexey Kardashevskiy
On 29/07/2020 03:42, Greg Kurz wrote: > Hi Alexey, > > Working on 9p now ?!? ;-) No, I am running syzkaller and seeing things :) > Cc'ing Dominique Martinet who appears to be the person who takes care of 9p > these days. > > On Tue, 28 Jul 2020 22:41:29 +1000 > Alexey Kardashevskiy wrote:

Re: [PATCH v3 2/6] dt-bindings: net: can: binding for CTU CAN FD open-source IP core.

2020-07-28 Thread Pavel Pisa
Hello Rob, On Saturday 04 of January 2020 00:53:59 Rob Herring wrote: > On Sat, Dec 21, 2019 at 03:07:31PM +0100, p...@cmp.felk.cvut.cz wrote: > > From: Pavel Pisa > > > > Signed-off-by: Pavel Pisa > > --- > > .../devicetree/bindings/net/can/ctu,ctucanfd.txt | 61 > > ++ 1

[PATCH v3 06/11] KVM: SVM: Add new intercept vector in vmcb_control_area

2020-07-28 Thread Babu Moger
The new intercept bits have been added in vmcb control area to support few more interceptions. Here are the some of them. - INTERCEPT_INVLPGB, - INTERCEPT_INVLPGB_ILLEGAL, - INTERCEPT_INVPCID, - INTERCEPT_MCOMMIT, - INTERCEPT_TLBSYNC, Add new intercept vector in vmcb_control_area to support t

[PATCH v3 11/11] KVM:SVM: Enable INVPCID feature on AMD

2020-07-28 Thread Babu Moger
The following intercept bit has been added to support VMEXIT for INVPCID instruction: CodeNameCause A2h VMEXIT_INVPCID INVPCID instruction The following bit has been added to the VMCB layout control area to control intercept of INVPCID: Byte Offset Bit(s)Function 14h

[PATCH v3 08/11] KVM: SVM: Remove set_cr_intercept, clr_cr_intercept and is_cr_intercept

2020-07-28 Thread Babu Moger
Remove set_cr_intercept, clr_cr_intercept and is_cr_intercept. Instead call generic set_intercept, clr_intercept and is_intercept for all cr intercepts. Signed-off-by: Babu Moger --- arch/x86/kvm/svm/svm.c | 34 +- arch/x86/kvm/svm/svm.h | 25 -

[PATCH v3 07/11] KVM: nSVM: Cleanup nested_state data structure

2020-07-28 Thread Babu Moger
host_intercept_exceptions is not used anywhere. Clean it up. Signed-off-by: Babu Moger --- arch/x86/kvm/svm/nested.c |2 -- arch/x86/kvm/svm/svm.h|1 - 2 files changed, 3 deletions(-) diff --git a/arch/x86/kvm/svm/nested.c b/arch/x86/kvm/svm/nested.c index b0e47f474bb6..1318cf1cd0fe

[PATCH v3 05/11] KVM: SVM: Modify 64 bit intercept field to two 32 bit vectors

2020-07-28 Thread Babu Moger
Convert all the intercepts to one array of 32 bit vectors in vmcb_control_area. This makes it easy for future intercept vector additions. Also update trace functions. Signed-off-by: Babu Moger --- arch/x86/include/asm/svm.h | 14 +++--- arch/x86/kvm/svm/nested.c | 25 ++

[PATCH v3 03/11] KVM: SVM: Change intercept_dr to generic intercepts

2020-07-28 Thread Babu Moger
Modify intercept_dr to generic intercepts in vmcb_control_area. Use generic __set_intercept, __clr_intercept and __is_intercept to set/clear/test the intercept_dr bits. Signed-off-by: Babu Moger --- arch/x86/include/asm/svm.h | 36 ++-- arch/x86/kvm/svm/nested.c

[PATCH v3 10/11] KVM: X86: Move handling of INVPCID types to x86

2020-07-28 Thread Babu Moger
INVPCID instruction handling is mostly same across both VMX and SVM. So, move the code to common x86.c. Signed-off-by: Babu Moger --- arch/x86/kvm/vmx/vmx.c | 62 +-- arch/x86/kvm/x86.c | 69 arch/x8

[PATCH v3 04/11] KVM: SVM: Modify intercept_exceptions to generic intercepts

2020-07-28 Thread Babu Moger
Modify intercept_exceptions to generic intercepts in vmcb_control_area. Use the generic __set_intercept, __clr_intercept and __is_intercept to set the intercept_exceptions bits. Signed-off-by: Babu Moger --- arch/x86/include/asm/svm.h | 22 +- arch/x86/kvm/svm/nested.c |

[PATCH v3 09/11] KVM: SVM: Remove set_exception_intercept and clr_exception_intercept

2020-07-28 Thread Babu Moger
Remove set_exception_intercept and clr_exception_intercept. Replace with generic set_intercept and clr_intercept for these calls. Signed-off-by: Babu Moger --- arch/x86/kvm/svm/svm.c | 20 ++-- arch/x86/kvm/svm/svm.h | 18 -- 2 files changed, 10 insertions(+),

[PATCH v3 00/11] SVM cleanup and INVPCID support for the AMD guests

2020-07-28 Thread Babu Moger
The following series adds the support for PCID/INVPCID on AMD guests. While doing it re-structured the vmcb_control_area data structure to combine all the intercept vectors into one 32 bit array. Makes it easy for future additions. INVPCID interceptions are added only when the guest is running wit

[PATCH v3 01/11] KVM: SVM: Introduce __set_intercept, __clr_intercept and __is_intercept

2020-07-28 Thread Babu Moger
This is in preparation for the future intercept vector additions. Add new functions __set_intercept, __clr_intercept and __is_intercept using kernel APIs __set_bit, __clear_bit and test_bit espectively. Signed-off-by: Babu Moger --- arch/x86/kvm/svm/svm.h | 15 +++ 1 file changed,

[PATCH v3 02/11] KVM: SVM: Change intercept_cr to generic intercepts

2020-07-28 Thread Babu Moger
Change intercept_cr to generic intercepts in vmcb_control_area. Use the new __set_intercept, __clr_intercept and __is_intercept where applicable. Signed-off-by: Babu Moger --- arch/x86/include/asm/svm.h | 42 -- arch/x86/kvm/svm/nested.c | 26

RE: [PATCH 1/2] watchdog: imx7ulp: Strictly follow the sequence for wdog operations

2020-07-28 Thread Anson Huang
Hi, Guenter > Subject: Re: [PATCH 1/2] watchdog: imx7ulp: Strictly follow the sequence for > wdog operations > > On 7/27/20 11:42 PM, Anson Huang wrote: > > According to reference manual, the i.MX7ULP WDOG's operations should > > follow below sequence: > > > > 1. disable global interrupts; > > 2

Re: [char-misc-next] Revert "mei: hdcp: Replace one-element array with flexible-array member"

2020-07-28 Thread Gustavo A. R. Silva
On 7/28/20 18:04, Gustavo A. R. Silva wrote: > Tomas, > > Please, see some comments below... > > On 7/28/20 17:29, Winkler, Tomas wrote: >> >> Hi Tomas, >> >> On 7/28/20 16:41, Tomas Winkler wrote: >>> Greg please revert, this commit it changes size of struct >>> wired_

[PATCH net] rxrpc: Fix race between recvmsg and sendmsg on immediate call failure

2020-07-28 Thread David Howells
There's a race between rxrpc_sendmsg setting up a call, but then failing to send anything on it due to an error, and recvmsg() seeing the call completion occur and trying to return the state to the user. An assertion fails in rxrpc_recvmsg() because the call has already been released from the sock

RE: [char-misc-next] Revert "mei: hdcp: Replace one-element array with flexible-array member"

2020-07-28 Thread Winkler, Tomas
> On Tue, 2020-07-28 at 22:14 +, Winkler, Tomas wrote: > > > -Original Message- > > > From: Gustavo A. R. Silva > [] > > > I'm using this command: > > > > > > $ scripts/get_maintainer.pl --nokeywords --nogit --nogit-fallback > > > > > > and this is the output for both files: > > > > >

[PATCH 2/2] remoteproc: Move recovery debugfs entry to sysfs

2020-07-28 Thread Rishabh Bhatnagar
Expose recovery mechanism through sysfs rather than exposing through debugfs. Some operating systems may limit access to debugfs through access policies. This restricts user access to recovery mechanism, hence move it to sysfs. Signed-off-by: Rishabh Bhatnagar --- Documentation/ABI/testing/sysfs

[PATCH 1/2] remoteproc: Move coredump entry from debugfs to sysfs.

2020-07-28 Thread Rishabh Bhatnagar
Expose coredump configuration from sysfs instead of debugfs. In some operating systems access to debugfs might be limited. This restricts user from selecting the coredump configuration at all, hence move this interface to sysfs. Signed-off-by: Rishabh Bhatnagar --- Documentation/ABI/testing/sysf

[PATCH 0/2] Move recovery and coredump interface to sysfs

2020-07-28 Thread Rishabh Bhatnagar
>From Android R onwards Google has restricted access to debugfs in user and user-debug builds. This restricts access to most of the features exposed through debugfs. 'Coredump' and 'Recovery' are critical interfaces that are required for remoteproc to work on Qualcomm Chipsets. Coredump configurati

RE: [char-misc-next] Revert "mei: hdcp: Replace one-element array with flexible-array member"

2020-07-28 Thread Winkler, Tomas
> > Tomas, > > Please, see some comments below... > > On 7/28/20 17:29, Winkler, Tomas wrote: > > > > Hi Tomas, > > > > On 7/28/20 16:41, Tomas Winkler wrote: > >> Greg please revert, this commit it changes size of struct > >> wired_cmd_repeater_auth_stream_req_in, this

[PATCH v2 05/14] iio: sx9310: Change from .probe to .probe_new

2020-07-28 Thread Daniel Campello
Uses .probe_new in place of .probe. Also uses device_get_match_data() for whoami matching. Signed-off-by: Daniel Campello Reviewed-by: Andy Shevchenko Reviewed-by: Stephen Boyd --- Changes in v2: - Added '\n' to dev_err() drivers/iio/proximity/sx9310.c | 39 -

[PATCH v2 06/14] iio: sx9310: Fixes various memory handling

2020-07-28 Thread Daniel Campello
Makes use __aligned(8) to ensure that the timestamp is correctly aligned when we call io_push_to_buffers_with_timestamp(). Also makes use of sizeof() for regmap_bulk_read instead of static value. Signed-off-by: Daniel Campello --- Changes in v2: - Fixed commit message from "iio: sx9310: Align m

[PATCH v2 07/14] iio: sx9310: Use long instead of int for channel bitmaps

2020-07-28 Thread Daniel Campello
Uses for_each_set_bit() macro to loop over channel bitmaps. Signed-off-by: Daniel Campello Reviewed-by: Andy Shevchenko --- Changes in v2: - Changed prox_stat to chan_prox_stat bitmap. drivers/iio/proximity/sx9310.c | 38 ++ 1 file changed, 20 insertions(+), 1

[PATCH v2 03/14] iio: sx9310: Fix irq handling

2020-07-28 Thread Daniel Campello
Fixes enable/disable irq handling at various points. The driver needs to only enable/disable irqs if there is an actual irq handler installed. Signed-off-by: Daniel Campello --- Changes in v2: - Reordered error handling on sx9310_resume() drivers/iio/proximity/sx9310.c | 26 --

[PATCH v2 08/14] iio: sx9310: Use regmap_read_poll_timeout() for compensation

2020-07-28 Thread Daniel Campello
Simplify compensation stage by using regmap_read_poll_timeout(). Signed-off-by: Daniel Campello Reviewed-by: Andy Shevchenko --- Changes in v2: - Fixed dev_err() message drivers/iio/proximity/sx9310.c | 25 ++--- 1 file changed, 10 insertions(+), 15 deletions(-) diff --g

[PATCH v2 02/14] iio: sx9310: Update macros declarations

2020-07-28 Thread Daniel Campello
Follows spec sheet for macro declarations. Signed-off-by: Daniel Campello Reviewed-by: Stephen Boyd --- Changes in v2: None drivers/iio/proximity/sx9310.c | 143 +++-- 1 file changed, 67 insertions(+), 76 deletions(-) diff --git a/drivers/iio/proximity/sx9310.c b/

Re: [char-misc-next] Revert "mei: hdcp: Replace one-element array with flexible-array member"

2020-07-28 Thread Joe Perches
On Tue, 2020-07-28 at 22:14 +, Winkler, Tomas wrote: > > -Original Message- > > From: Gustavo A. R. Silva [] > > I'm using this command: > > > > $ scripts/get_maintainer.pl --nokeywords --nogit --nogit-fallback > > > > and this is the output for both files: > > > > $ scripts/get_mai

[PATCH v2 01/14] dt-bindings: iio: Add bindings for sx9310 sensor

2020-07-28 Thread Daniel Campello
Adds device tree bandings for sx9310 sensor. Signed-off-by: Daniel Campello Cc: Hartmut Knaack Cc: Lars-Peter Clausen Cc: Peter Meerwald-Stadler Cc: Rob Herring Reviewed-by: Douglas Anderson [swb...@chromium.org: Add both regulators and make them optional] Signed-off-by: Stephen Boyd --- C

[PATCH v2 13/14] iio: sx9310: Drop channel_users[]

2020-07-28 Thread Daniel Campello
From: Stephen Boyd This struct member isn't used. Drop it. Fixes: 72ad02b15d63 ("iio: Add SEMTECH SX9310/9311 sensor driver") Signed-off-by: Stephen Boyd Reviewed-by: Douglas Anderson Reviewed-by: Daniel Campello Signed-off-by: Daniel Campello Reviewed-by: Andy Shevchenko --- Changes in v2

linux-kernel@vger.kernel.org

2020-07-28 Thread Daniel Campello
Improves readability by storing &client->dev in a local variable. Signed-off-by: Daniel Campello Reviewed-by: Andy Shevchenko Reviewed-by: Stephen Boyd --- Changes in v2: - Added '\n' to dev_err() drivers/iio/proximity/sx9310.c | 30 +++--- 1 file changed, 15 inserti

Re: rtsx_pci not restoring ASPM state after suspend/resume

2020-07-28 Thread Bjorn Helgaas
On Tue, Jul 28, 2020 at 09:57:55PM +0100, James Ettle wrote: > On Mon, 2020-07-27 at 16:47 -0500, Bjorn Helgaas wrote: > > > > I don't see anything in rtsx that enables L0s. Can you collect > > the dmesg log when booting with "pci=earlydump"? That will show > > whether the BIOS left it this way.

[PATCH v2 09/14] iio: sx9310: Update copyright

2020-07-28 Thread Daniel Campello
Fixes wrong copyright year. Signed-off-by: Daniel Campello --- Changes in v2: None drivers/iio/proximity/sx9310.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/drivers/iio/proximity/sx9310.c b/drivers/iio/proximity/sx9310.c index f7f44fd9198499..964fae90fefc25 10064

[PATCH v2 14/14] iio: sx9310: Enable vdd and svdd regulators at probe

2020-07-28 Thread Daniel Campello
From: Stephen Boyd Enable the main power supply (vdd) and digital IO power supply (svdd) during probe so that the i2c communication and device works properly on boards that aggressively power gate these supplies. Signed-off-by: Stephen Boyd Reviewed-by: Douglas Anderson Signed-off-by: Daniel C

[PATCH v2 00/14] sx9310 iio driver updates

2020-07-28 Thread Daniel Campello
The first patch resends the DT binding for the driver that was merged in v5.8-rc1 with a small change to update for proper regulators. The second through the eleventh patch fixes several issues dropped from v8 to v9 when the initial patch was merged. The twelveth patch fixes a few printks that are

[PATCH v2 12/14] iio: sx9310: Miscellaneous format fixes

2020-07-28 Thread Daniel Campello
Miscellaneous format fixes throughout the whole file. Signed-off-by: Daniel Campello Reviewed-by: Andy Shevchenko Reviewed-by: Stephen Boyd --- Changes in v2: None drivers/iio/proximity/sx9310.c | 28 ++-- 1 file changed, 10 insertions(+), 18 deletions(-) diff --git

[PATCH v2 04/14] iio: sx9310: Remove acpi and of table macros

2020-07-28 Thread Daniel Campello
Avoids unused warnings due to acpi/of table macros. Reported-by: kbuild test robot Signed-off-by: Daniel Campello --- Changes in v2: - Added #include drivers/iio/proximity/sx9310.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/drivers/iio/proximity/sx9310.c b/dri

[PATCH v2 10/14] iio: sx9310: Simplify error return handling

2020-07-28 Thread Daniel Campello
Checks for non-zero return values to signal error conditions. Signed-off-by: Daniel Campello Reviewed-by: Andy Shevchenko --- Changes in v2: None drivers/iio/proximity/sx9310.c | 52 +- 1 file changed, 26 insertions(+), 26 deletions(-) diff --git a/drivers/iio

[PATCH v2] Staging : media : atomisp : fixed a brace coding sytle issue

2020-07-28 Thread Ankit
From: Ankit Baluni Removed braces for a 'if' condition as it contain only single line & there is no need for braces for such case according to coding style rules. Signed-off-by: Ankit Baluni --- Changes in v2: -Added more description about the patch. -Added space before the sy

[PATCH v3 02/21] x86/kaslr: Remove bogus warning and unnecessary goto

2020-07-28 Thread Arvind Sankar
Drop the warning on seeing "--" in handle_mem_options. This will trigger whenever one of the memory options is present in the command line together with "--", but there's no problem if that is the case. Replace goto with break. Signed-off-by: Arvind Sankar --- arch/x86/boot/compressed/kaslr.c |

[PATCH v3 16/21] x86/kaslr: Drop unnecessary alignment in find_random_virt_addr

2020-07-28 Thread Arvind Sankar
Drop unnecessary alignment of image_size to CONFIG_PHYSICAL_ALIGN in find_random_virt_addr, it cannot change the result: the largest valid slot is the largest n that satisfies minimum + n * CONFIG_PHYSICAL_ALIGN + image_size <= KERNEL_IMAGE_SIZE (since minimum is already aligned) and so n is eq

[PATCH v3 13/21] x86/kaslr: Drop test for command-line parameters before parsing

2020-07-28 Thread Arvind Sankar
This check doesn't save anything. In the case when none of the parameters are present, each strstr will scan args twice (once to find the length and then for searching), six scans in total. Just going ahead and parsing the arguments only requires three scans: strlen, memcpy, and parsing. This will

[PATCH v3 15/21] x86/kaslr: Drop redundant check in store_slot_info

2020-07-28 Thread Arvind Sankar
Drop unnecessary check that number of slots is not zero in store_slot_info, it's guaranteed to be at least 1 by the calculation. Signed-off-by: Arvind Sankar --- arch/x86/boot/compressed/kaslr.c | 9 +++-- 1 file changed, 3 insertions(+), 6 deletions(-) diff --git a/arch/x86/boot/compressed

[PATCH v3 18/21] x86/kaslr: Make minimum/image_size unsigned long

2020-07-28 Thread Arvind Sankar
Change type of minimum/image_size arguments in process_mem_region to unsigned long. These actually can never be above 4G (even on x86_64), and they're unsigned long in every other function except this one. Signed-off-by: Arvind Sankar --- arch/x86/boot/compressed/kaslr.c | 4 ++-- 1 file changed

[PATCH v3 04/21] x86/kaslr: Initialize mem_limit to the real maximum address

2020-07-28 Thread Arvind Sankar
On 64-bit, the kernel must be placed below MAXMEM (64TiB with 4-level paging or 4PiB with 5-level paging). This is currently not enforced by KASLR, which thus implicitly relies on physical memory being limited to less than 64TiB. On 32-bit, the limit is KERNEL_IMAGE_SIZE (512MiB). This is enforced

Re: [char-misc-next] Revert "mei: hdcp: Replace one-element array with flexible-array member"

2020-07-28 Thread Gustavo A. R. Silva
Tomas, Please, see some comments below... On 7/28/20 17:29, Winkler, Tomas wrote: > > Hi Tomas, > > On 7/28/20 16:41, Tomas Winkler wrote: >> Greg please revert, this commit it changes size of struct >> wired_cmd_repeater_auth_stream_req_in, this is not what firmware >

[PATCH v3 05/21] x86/kaslr: Fix off-by-one error in __process_mem_region

2020-07-28 Thread Arvind Sankar
In case of an overlap, the beginning of the region should be used even if it is exactly image_size, not just strictly larger. Signed-off-by: Arvind Sankar --- arch/x86/boot/compressed/kaslr.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/boot/compressed/kaslr.c b/a

[PATCH v3 10/21] x86/kaslr: Fix off-by-one error in process_gb_huge_pages

2020-07-28 Thread Arvind Sankar
If the remaining size of the region is exactly 1Gb, there is still one hugepage that can be reserved. Signed-off-by: Arvind Sankar --- arch/x86/boot/compressed/kaslr.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/boot/compressed/kaslr.c b/arch/x86/boot/compressed/

[PATCH v3 00/21] x86/kaslr: Cleanup and small bugfixes

2020-07-28 Thread Arvind Sankar
v2->v3: - Fix the first patch: command line size should be strlen + 1 to account for terminating NUL. Avoid calling add_identity_map if cmdline was NULL, though it should do nothing in that case anyway. - Add a patch to drop the check to see if there are arguments we care about before parsing

[PATCH v3 03/21] x86/kaslr: Fix process_efi_entries comment

2020-07-28 Thread Arvind Sankar
Since commit 0982adc74673 ("x86/boot/KASLR: Work around firmware bugs by excluding EFI_BOOT_SERVICES_* and EFI_LOADER_* from KASLR's choice") process_efi_entries will return true if we have an EFI memmap, not just if it contained EFI_MEMORY_MORE_RELIABLE regions. Signed-off-by: Arvind Sankar -

[PATCH v3 11/21] x86/kaslr: Short-circuit gb_huge_pages on x86-32

2020-07-28 Thread Arvind Sankar
32-bit does not have GB pages, so don't bother checking for them. Using the IS_ENABLED allows the compiler to completely remove the gb_huge_pages code. Signed-off-by: Arvind Sankar --- arch/x86/boot/compressed/kaslr.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/x

[PATCH v3 17/21] x86/kaslr: Small cleanup of find_random_phys_addr

2020-07-28 Thread Arvind Sankar
Just a trivial rearrangement to do all the processing together, and only have one call to slots_fetch_random in the source. Signed-off-by: Arvind Sankar --- arch/x86/boot/compressed/kaslr.c | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/arch/x86/boot/compressed/kaslr.c

[PATCH v3 21/21] x86/kaslr: Add a check that the random address is in range

2020-07-28 Thread Arvind Sankar
Check in find_random_phys_addr that the chosen address is inside the range that was required. Signed-off-by: Arvind Sankar --- arch/x86/boot/compressed/kaslr.c | 12 +++- 1 file changed, 11 insertions(+), 1 deletion(-) diff --git a/arch/x86/boot/compressed/kaslr.c b/arch/x86/boot/compre

[PATCH v3 12/21] x86/kaslr: Simplify process_gb_huge_pages

2020-07-28 Thread Arvind Sankar
Replace the loop to determine the number of 1Gb pages with arithmetic. Signed-off-by: Arvind Sankar --- arch/x86/boot/compressed/kaslr.c | 46 ++-- 1 file changed, 20 insertions(+), 26 deletions(-) diff --git a/arch/x86/boot/compressed/kaslr.c b/arch/x86/boot/compres

[PATCH v3 14/21] x86/kaslr: Make the type of number of slots/slot areas consistent

2020-07-28 Thread Arvind Sankar
The number of slots can be unsigned int, since on 64-bit, the maximum amount of memory is 2^52, the minimum alignment is 2^21, so the slot number cannot be greater than 2^31. But in case future processors have more than 52 physical address bits, make it unsigned long. The slot areas are limited by

[PATCH v3 19/21] x86/kaslr: Replace unsigned long long with u64

2020-07-28 Thread Arvind Sankar
No functional change. Signed-off-by: Arvind Sankar --- arch/x86/boot/compressed/kaslr.c | 13 ++--- arch/x86/boot/compressed/misc.h | 4 ++-- 2 files changed, 8 insertions(+), 9 deletions(-) diff --git a/arch/x86/boot/compressed/kaslr.c b/arch/x86/boot/compressed/kaslr.c index b6ef77b

[PATCH v3 20/21] x86/kaslr: Make local variables 64-bit

2020-07-28 Thread Arvind Sankar
Change the type of local variables/fields that store mem_vector addresses to u64 to make it less likely that 32-bit overflow will cause issues on 32-bit. Signed-off-by: Arvind Sankar --- arch/x86/boot/compressed/kaslr.c | 13 +++-- 1 file changed, 7 insertions(+), 6 deletions(-) diff --

[PATCH v3 09/21] x86/kaslr: Drop some redundant checks from __process_mem_region

2020-07-28 Thread Arvind Sankar
Clip the start and end of the region to minimum and mem_limit prior to the loop. region.start can only increase during the loop, so raising it to minimum before the loop is enough. A region that becomes empty due to this will get checked in the first iteration of the loop. Drop the check for over

[PATCH v3 08/21] x86/kaslr: Drop redundant variable in __process_mem_region

2020-07-28 Thread Arvind Sankar
region.size can be trimmed to store the portion of the region before the overlap, instead of a separate mem_vector variable. Signed-off-by: Arvind Sankar --- arch/x86/boot/compressed/kaslr.c | 7 ++- 1 file changed, 2 insertions(+), 5 deletions(-) diff --git a/arch/x86/boot/compressed/kaslr

[PATCH v3 01/21] x86/kaslr: Make command line handling safer

2020-07-28 Thread Arvind Sankar
Handle the possibility that the command line is NULL. Replace open-coded strlen with a function call. Signed-off-by: Arvind Sankar --- arch/x86/boot/compressed/kaslr.c | 26 ++ 1 file changed, 14 insertions(+), 12 deletions(-) diff --git a/arch/x86/boot/compressed/kaslr

[PATCH v3 06/21] x86/kaslr: Drop redundant cur_entry from __process_mem_region

2020-07-28 Thread Arvind Sankar
cur_entry is only used as cur_entry.start + cur_entry.size, which is always equal to end. Signed-off-by: Arvind Sankar --- arch/x86/boot/compressed/kaslr.c | 9 +++-- 1 file changed, 3 insertions(+), 6 deletions(-) diff --git a/arch/x86/boot/compressed/kaslr.c b/arch/x86/boot/compressed/kas

[PATCH v3 07/21] x86/kaslr: Eliminate start_orig from __process_mem_region

2020-07-28 Thread Arvind Sankar
Set the region.size within the loop, which removes the need for start_orig. Signed-off-by: Arvind Sankar --- arch/x86/boot/compressed/kaslr.c | 8 ++-- 1 file changed, 2 insertions(+), 6 deletions(-) diff --git a/arch/x86/boot/compressed/kaslr.c b/arch/x86/boot/compressed/kaslr.c index f245

[PATCH] hv_netvsc: Add validation for untrusted Hyper-V values

2020-07-28 Thread Andres Beltran
For additional robustness in the face of Hyper-V errors or malicious behavior, validate all values that originate from packets that Hyper-V has sent to the guest in the host-to-guest ring buffer. Ensure that invalid values cannot cause indexing off the end of an array, or subvert an existing valida

<    1   2   3   4   5   6   7   8   9   10   >