[RFC PATCH 24/39] mm: hugetlb: Add functions to add/move/remove from hugetlb lists

2024-09-10 Thread Ackerley Tng
These functions are introduced in hugetlb.c so the private hugetlb_lock can be accessed. hugetlb_lock is reused for this PoC, but a separate lock should be used in a future revision to avoid interference due to hash collisions with HugeTLB's usage of this lock. Co-developed-by: Ackerley Tng Sign

[PATCH v9 2/5] soc: qcom: pdr: fix parsing of domains lists

2024-06-21 Thread Dmitry Baryshkov
While parsing the domains list, start offsets from 0 rather than from domains_read. The domains_read is equal to the total count of the domains we have seen, while the domains list in the message starts from offset 0. Fixes: fbe639b44a82 ("soc: qcom: Introduce Protection Domain Restart helpers") T

Re: [PATCH v8 2/5] soc: qcom: pdr: fix parsing of domains lists

2024-06-05 Thread Chris Lew
On 5/11/2024 2:56 PM, Dmitry Baryshkov wrote: While parsing the domains list, start offsets from 0 rather than from domains_read. The domains_read is equal to the total count of the domains we have seen, while the domains list in the message starts from offset 0. Fixes: fbe639b44a82 ("soc: qc

[PATCH v8 2/5] soc: qcom: pdr: fix parsing of domains lists

2024-05-11 Thread Dmitry Baryshkov
While parsing the domains list, start offsets from 0 rather than from domains_read. The domains_read is equal to the total count of the domains we have seen, while the domains list in the message starts from offset 0. Fixes: fbe639b44a82 ("soc: qcom: Introduce Protection Domain Restart helpers") T

[PATCH v7 2/6] soc: qcom: pdr: fix parsing of domains lists

2024-04-24 Thread Dmitry Baryshkov
While parsing the domains list, start offsets from 0 rather than from domains_read. The domains_read is equal to the total count of the domains we have seen, while the domains list in the message starts from offset 0. Fixes: fbe639b44a82 ("soc: qcom: Introduce Protection Domain Restart helpers") S

Re: [PATCH RFC 06/37] mm: page_alloc: Allocate from movable pcp lists only if ALLOC_FROM_METADATA

2023-10-17 Thread Catalin Marinas
On Mon, Oct 16, 2023 at 01:41:15PM +0100, Alexandru Elisei wrote: > On Thu, Oct 12, 2023 at 10:25:11AM +0900, Hyesoo Yu wrote: > > I don't think it would be effcient when the majority of movable pages > > do not use GFP_TAGGED. > > > > Metadata pages have a low probability of being in the pcp list

Re: [PATCH RFC 06/37] mm: page_alloc: Allocate from movable pcp lists only if ALLOC_FROM_METADATA

2023-10-16 Thread Alexandru Elisei
Hi, On Thu, Oct 12, 2023 at 10:25:11AM +0900, Hyesoo Yu wrote: > On Wed, Aug 23, 2023 at 02:13:19PM +0100, Alexandru Elisei wrote: > > pcp lists keep MIGRATE_METADATA pages on the MIGRATE_MOVABLE list. Make > > sure pages from the movable list are allocated only when the > >

Re: [PATCH RFC 06/37] mm: page_alloc: Allocate from movable pcp lists only if ALLOC_FROM_METADATA

2023-10-11 Thread Hyesoo Yu
On Wed, Aug 23, 2023 at 02:13:19PM +0100, Alexandru Elisei wrote: > pcp lists keep MIGRATE_METADATA pages on the MIGRATE_MOVABLE list. Make > sure pages from the movable list are allocated only when the > ALLOC_FROM_METADATA alloc flag is set, as otherwise the page allocator >

Re: [PATCH v5 11/18] x86/sgx: store unreclaimable pages in LRU lists

2023-10-03 Thread Huang, Kai
c_page); > > > encl->secs.epc_page = NULL; > > > } > > > > The "record" of SECS/VA pages should be done together with this. I see > > no > > reason why the "record" and "drop" are separated into different p

Re: [PATCH v5 11/18] x86/sgx: store unreclaimable pages in LRU lists

2023-10-02 Thread Haitao Huang
On Wed, 27 Sep 2023 06:57:18 -0500, Huang, Kai wrote: On Fri, 2023-09-22 at 20:06 -0700, Haitao Huang wrote: From: Sean Christopherson When an OOM event occurs, all pages associated with an enclave will need to be freed, including pages that are not currently tracked by the cgroup LRU lists

Re: [PATCH v5 11/18] x86/sgx: store unreclaimable pages in LRU lists

2023-10-02 Thread Haitao Huang
e "record" and "drop" are separated into different patches. "record" of SECS/VA pages are done in this patch. Before nothing done in "record" for them because no tracking LRU lists for them. Now they are tracked. Thanks Haitao

Re: [PATCH v5 11/18] x86/sgx: store unreclaimable pages in LRU lists

2023-09-28 Thread Huang, Kai
> --- a/arch/x86/kernel/cpu/sgx/encl.c > +++ b/arch/x86/kernel/cpu/sgx/encl.c > @@ -746,6 +746,7 @@ void sgx_encl_release(struct kref *ref) > xa_destroy(&encl->page_array); > > if (!encl->secs_child_cnt && encl->secs.epc_page) { > + sgx_drop_epc_page(encl->secs.epc_page);

Re: [PATCH v5 11/18] x86/sgx: store unreclaimable pages in LRU lists

2023-09-27 Thread Huang, Kai
On Fri, 2023-09-22 at 20:06 -0700, Haitao Huang wrote: > From: Sean Christopherson > > When an OOM event occurs, all pages associated with an enclave will need > to be freed, including pages that are not currently tracked by the > cgroup LRU lists. What are "cgroup LRU lis

[PATCH v5 11/18] x86/sgx: store unreclaimable pages in LRU lists

2023-09-22 Thread Haitao Huang
From: Sean Christopherson When an OOM event occurs, all pages associated with an enclave will need to be freed, including pages that are not currently tracked by the cgroup LRU lists. Add a new "unreclaimable" list to the sgx_epc_lru_lists struct and update the "sgx_record

[PATCH v5 03/18] x86/sgx: Add sgx_epc_lru_lists to encapsulate LRU lists

2023-09-22 Thread Haitao Huang
nts for the spinlock and the non-reclaimables. (Kai, Jarkko) - Revised the commit to add introduction comments for unreclaimables and multiple LRU lists.(Kai) - Reordered the patches: delay all changes for unreclaimables to later, and this one becomes the first change in the SGX subsystem. V3:

Re: [PATCH v4 03/18] x86/sgx: Add sgx_epc_lru_lists to encapsulate LRU lists

2023-09-15 Thread Haitao Huang
On Thu, 14 Sep 2023 05:31:30 -0500, Huang, Kai wrote: Some non-technical staff: On Tue, 2023-09-12 at 21:06 -0700, Haitao Huang wrote: From: Kristen Carlson Accardi The patch was from Kristen, but ... Introduce a data structure to wrap the existing reclaimable list and its spinlock. Eac

Re: [PATCH v4 03/18] x86/sgx: Add sgx_epc_lru_lists to encapsulate LRU lists

2023-09-14 Thread Huang, Kai
On Thu, 2023-09-14 at 09:13 -0700, Dave Hansen wrote: > On 9/14/23 03:31, Huang, Kai wrote: > > > Signed-off-by: Haitao Huang > > > Cc: Sean Christopherson > > You don't need 'Cc:' Sean if the patch has Sean's SoB. > > It is a SoB for Sean's @intel address and cc's his @google address. > > It i

Re: [PATCH v4 03/18] x86/sgx: Add sgx_epc_lru_lists to encapsulate LRU lists

2023-09-14 Thread Dave Hansen
On 9/14/23 03:31, Huang, Kai wrote: >> Signed-off-by: Haitao Huang >> Cc: Sean Christopherson > You don't need 'Cc:' Sean if the patch has Sean's SoB. It is a SoB for Sean's @intel address and cc's his @google address. It is fine.

Re: [PATCH v4 03/18] x86/sgx: Add sgx_epc_lru_lists to encapsulate LRU lists

2023-09-14 Thread Huang, Kai
Some non-technical staff: On Tue, 2023-09-12 at 21:06 -0700, Haitao Huang wrote: > From: Kristen Carlson Accardi The patch was from Kristen, but ... > > Introduce a data structure to wrap the existing reclaimable list and its > spinlock. Each cgroup later will have one instance of this structu

Re: [PATCH v4 11/18] x86/sgx: store unreclaimable pages in LRU lists

2023-09-13 Thread Jarkko Sakkinen
On Wed Sep 13, 2023 at 7:06 AM EEST, Haitao Huang wrote: > From: Kristen Carlson Accardi > > When an OOM event occurs, all pages associated with an enclave will need > to be freed, including pages that are not currently tracked by the > cgroup LRU lists. > > Add a new "

Re: [PATCH v4 03/18] x86/sgx: Add sgx_epc_lru_lists to encapsulate LRU lists

2023-09-13 Thread Jarkko Sakkinen
rlson Accardi > Signed-off-by: Haitao Huang > Cc: Sean Christopherson > --- > V4: > - Removed unneeded comments for the spinlock and the non-reclaimables. > (Kai, Jarkko) > - Revised the commit to add introduction comments for unreclaimables and > multiple LRU lists.(Kai) > - Re

[PATCH v4 11/18] x86/sgx: store unreclaimable pages in LRU lists

2023-09-12 Thread Haitao Huang
From: Kristen Carlson Accardi When an OOM event occurs, all pages associated with an enclave will need to be freed, including pages that are not currently tracked by the cgroup LRU lists. Add a new "unreclaimable" list to the sgx_epc_lru_lists struct and update the "sgx_record

[PATCH v4 03/18] x86/sgx: Add sgx_epc_lru_lists to encapsulate LRU lists

2023-09-12 Thread Haitao Huang
ed the commit to add introduction comments for unreclaimables and multiple LRU lists.(Kai) - Reordered the patches: delay all changes for unreclaimables to later, and this one becomes the first change in the SGX subsystem. V3: - Removed the helper functions and revised commit messages. --- arc

[PATCH 01/10] mm/page_alloc: Split per cpu page lists and zone stats

2021-04-19 Thread Mel Gorman
The per-cpu page allocator lists and the per-cpu vmstat deltas are stored in the same struct per_cpu_pages even though vmstats have no direct impact on the per-cpu page lists. This is inconsistent because the vmstats for a node are stored on a dedicated structure. The bigger issue is that the

[PATCH 01/11] mm/page_alloc: Split per cpu page lists and zone stats

2021-04-14 Thread Mel Gorman
The per-cpu page allocator lists and the per-cpu vmstat deltas are stored in the same struct per_cpu_pages even though vmstats have no direct impact on the per-cpu page lists. This is inconsistent because the vmstats for a node are stored on a dedicated structure. The bigger issue is that the

Re: [PATCH 01/11] mm/page_alloc: Split per cpu page lists and zone stats

2021-04-13 Thread Mel Gorman
On Mon, Apr 12, 2021 at 07:43:18PM +0200, Vlastimil Babka wrote: > On 4/7/21 10:24 PM, Mel Gorman wrote: > > @@ -6691,7 +6697,7 @@ static __meminit void zone_pcp_init(struct zone *zone) > > * relies on the ability of the linker to provide the > > * offset of a (static) per cpu variable in

Re: [PATCH 01/11] mm/page_alloc: Split per cpu page lists and zone stats

2021-04-12 Thread Vlastimil Babka
On 4/7/21 10:24 PM, Mel Gorman wrote: > @@ -6691,7 +6697,7 @@ static __meminit void zone_pcp_init(struct zone *zone) >* relies on the ability of the linker to provide the >* offset of a (static) per cpu variable into the per cpu area. >*/ > - zone->pageset = &boot_pagese

[PATCH v13 07/18] arm64: kexec: flush image and lists during kexec load time

2021-04-07 Thread Pavel Tatashin
kimage *kimage) } } +int machine_kexec_post_load(struct kimage *kimage) +{ + void *reloc_code = page_to_virt(kimage->control_code_page); + + /* If in place flush new kernel image, else flush lists and buffers */ + if (kimage->head & IND_DONE) + kex

[PATCH 01/11] mm/page_alloc: Split per cpu page lists and zone stats

2021-04-07 Thread Mel Gorman
The per-cpu page allocator lists and the per-cpu vmstat deltas are stored in the same struct per_cpu_pages even though vmstats have no direct impact on the per-cpu page lists. This is inconsistent because the vmstats for a node are stored on a dedicated structure. The bigger issue is that the

[PATCH 1/6] mm/page_alloc: Split per cpu page lists and zone stats

2021-03-29 Thread Mel Gorman
The per-cpu page allocator lists and the per-cpu vmstat deltas are stored in the same struct per_cpu_pages even though vmstats have no direct impact on the per-cpu page lists. This is inconsistent because the vmstats for a node are stored on a dedicated structure. The bigger issue is that the

Trojan horses on various lists was Re: EDAC list as Trojan Horse distribution ??

2021-03-20 Thread Pavel Machek
Hi! > > I assume this is just to install a trojan horse when opening the > > attached zip (also I assume most of you will work on linux and it > > might not be a Problem for you anyhow   ;-) . > > > >  Virus total reports a Trojan horse, but only for with 2 out of 61 > > virus scan engines (and I

[PATCH v5 5/5] KVM: x86: dump_vmcs should include the autoload/autostore MSR lists

2021-03-18 Thread David Edmondson
When dumping the current VMCS state, include the MSRs that are being automatically loaded/stored during VM entry/exit. Suggested-by: Paolo Bonzini Signed-off-by: David Edmondson --- arch/x86/kvm/vmx/vmx.c | 16 1 file changed, 16 insertions(+) diff --git a/arch/x86/kvm/vmx/vmx

Re: [PATCH v4 2/3] x86/sgx: Replace section local dirty page lists with a global list

2021-03-15 Thread Dave Hansen
>>> reserved for active enclaves before the operation. >>> >>> The section local lists are redundant, as sgx_free_epc_page() figures >>> out the correction by using epc_page->section. >> >> During normal runtime, the "ksgxd" daemon behaves

Re: [PATCH v4 2/3] x86/sgx: Replace section local dirty page lists with a global list

2021-03-15 Thread Jarkko Sakkinen
st round can fail, if all child pages have not yet been removed. > > The driver puts all pages on startup first to sgx_dirty_page_list, as the > > initialization could be triggered by kexec(), meaning that pages have been > > reserved for active enclaves before the operation. > &g

Re: [PATCH v4 2/3] x86/sgx: Replace section local dirty page lists with a global list

2021-03-15 Thread Dave Hansen
ts all pages on startup first to sgx_dirty_page_list, as the > initialization could be triggered by kexec(), meaning that pages have been > reserved for active enclaves before the operation. > > The section local lists are redundant, as sgx_free_epc_page() figures > out the correction

[PATCH v4 2/3] x86/sgx: Replace section local dirty page lists with a global list

2021-03-13 Thread Jarkko Sakkinen
initialization could be triggered by kexec(), meaning that pages have been reserved for active enclaves before the operation. The section local lists are redundant, as sgx_free_epc_page() figures out the correction by using epc_page->section. Signed-off-by: Jarkko Sakkinen --- v4: * Open co

[PATCH v12 07/17] arm64: kexec: flush image and lists during kexec load time

2021-03-03 Thread Pavel Tatashin
kimage *kimage) } } +int machine_kexec_post_load(struct kimage *kimage) +{ + void *reloc_code = page_to_virt(kimage->control_code_page); + + /* If in place flush new kernel image, else flush lists and buffers */ + if (kimage->head & IND_DONE) + kex

[PATCH v4 5/5] KVM: x86: dump_vmcs should include the autoload/autostore MSR lists

2021-02-24 Thread David Edmondson
When dumping the current VMCS state, include the MSRs that are being automatically loaded/stored during VM entry/exit. Signed-off-by: David Edmondson --- arch/x86/kvm/vmx/vmx.c | 16 1 file changed, 16 insertions(+) diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c i

[PATCH v3 5/5] KVM: x86: dump_vmcs should include the autoload/autostore MSR lists

2021-02-24 Thread David Edmondson
When dumping the current VMCS state, include the MSRs that are being automatically loaded/stored during VM entry/exit. Signed-off-by: David Edmondson --- arch/x86/kvm/vmx/vmx.c | 25 + arch/x86/kvm/vmx/vmx.h | 2 +- 2 files changed, 22 insertions(+), 5 deletions(-) diff

[PATCH v2 3/3] KVM: x86: dump_vmcs should include the autoload/autostore MSR lists

2021-02-19 Thread David Edmondson
When dumping the current VMCS state, include the MSRs that are being automatically loaded/stored during VM entry/exit. Signed-off-by: David Edmondson --- arch/x86/kvm/vmx/vmx.c | 25 + arch/x86/kvm/vmx/vmx.h | 2 +- 2 files changed, 22 insertions(+), 5 deletions(-) diff

Re: [PATCH v2 2/2] kbuild: handle excessively long argument lists

2021-01-19 Thread mkalikot
On 2021-01-15 13:53, Masahiro Yamada wrote: On Sat, Jan 16, 2021 at 5:15 AM wrote: On 2021-01-14 17:12, Masahiro Yamada wrote: > On Fri, Jan 15, 2021 at 6:50 AM Jeff Johnson > wrote: >> >> From: Mahesh Kumar Kalikot Veetil >> >> Modules with a large number of compilation units may be >> exce

Re: [PATCH v2 2/2] kbuild: handle excessively long argument lists

2021-01-15 Thread Masahiro Yamada
On Sat, Jan 16, 2021 at 5:15 AM wrote: > > On 2021-01-14 17:12, Masahiro Yamada wrote: > > On Fri, Jan 15, 2021 at 6:50 AM Jeff Johnson > > wrote: > >> > >> From: Mahesh Kumar Kalikot Veetil > >> > >> Modules with a large number of compilation units may be > >> exceeding AR and LD command argume

Re: [PATCH v2 2/2] kbuild: handle excessively long argument lists

2021-01-15 Thread jjohnson
On 2021-01-14 17:12, Masahiro Yamada wrote: On Fri, Jan 15, 2021 at 6:50 AM Jeff Johnson wrote: From: Mahesh Kumar Kalikot Veetil Modules with a large number of compilation units may be exceeding AR and LD command argument list. Handle this gracefully by writing the long argument list in a f

Re: [PATCH v2 2/2] kbuild: handle excessively long argument lists

2021-01-14 Thread Masahiro Yamada
On Fri, Jan 15, 2021 at 10:01 AM Nick Desaulniers wrote: > > On Thu, Jan 14, 2021 at 1:50 PM Jeff Johnson wrote: > > > > From: Mahesh Kumar Kalikot Veetil > > > > Modules with a large number of compilation units may be > > exceeding AR and LD command argument list. Handle this gracefully by > >

Re: [PATCH v2 2/2] kbuild: handle excessively long argument lists

2021-01-14 Thread Masahiro Yamada
On Fri, Jan 15, 2021 at 6:50 AM Jeff Johnson wrote: > > From: Mahesh Kumar Kalikot Veetil > > Modules with a large number of compilation units may be > exceeding AR and LD command argument list. Handle this gracefully by > writing the long argument list in a file. The command line options > read

Re: [PATCH v2 2/2] kbuild: handle excessively long argument lists

2021-01-14 Thread Nick Desaulniers
On Thu, Jan 14, 2021 at 1:50 PM Jeff Johnson wrote: > > From: Mahesh Kumar Kalikot Veetil > > Modules with a large number of compilation units may be > exceeding AR and LD command argument list. Handle this gracefully by > writing the long argument list in a file. The command line options > read

[PATCH v2 2/2] kbuild: handle excessively long argument lists

2021-01-14 Thread Jeff Johnson
From: Mahesh Kumar Kalikot Veetil Modules with a large number of compilation units may be exceeding AR and LD command argument list. Handle this gracefully by writing the long argument list in a file. The command line options read from file are inserted in place of the original @file option. The

Re: [PATCH 2/2] kbuild: handle excessively long argument lists

2021-01-14 Thread jjohnson
On 2021-01-14 13:07, Nick Desaulniers wrote: From: Mahesh Kumar Kalikot Veetil Modules with a large number of compilation units may be exceeding AR and LD command argument list. Handle this gracefully by writing the long argument list in a file. The command line options read from file are inser

Re: [PATCH 2/2] kbuild: handle excessively long argument lists

2021-01-14 Thread Nick Desaulniers
> From: Mahesh Kumar Kalikot Veetil > > Modules with a large number of compilation units may be > exceeding AR and LD command argument list. Handle this gracefully by > writing the long argument list in a file. The command line options > read from file are inserted in place of the original @file

[PATCH 2/2] kbuild: handle excessively long argument lists

2021-01-12 Thread Jeff Johnson
From: Mahesh Kumar Kalikot Veetil Modules with a large number of compilation units may be exceeding AR and LD command argument list. Handle this gracefully by writing the long argument list in a file. The command line options read from file are inserted in place of the original @file option. The

[RFT][PATCH v1 2/3] ACPI: scan: Defer enumeration of devices with _DEP lists

2020-12-14 Thread Rafael J. Wysocki
umerate devices in the given scope of the ACPI namespace in two passes, where the first pass covers the devices without "significant" lists of dependencies coming from _DEP only and the second pass covers all of the devices that were not enumerated in the first pass. Take _DEP into accoun

[tip: core/rcu] list.h: Update comment to explicitly note circular lists

2020-12-13 Thread tip-bot2 for Asif Rasheed
: Paul E. McKenney CommitterDate: Thu, 19 Nov 2020 19:37:16 -08:00 list.h: Update comment to explicitly note circular lists The students in the Operating System Lecture Section at the American University of Sharjah were confused by the header comment in include/linux/list.h, which says "S

Re: [PATCH] Documentation/features: Update feature lists for 5.10

2020-11-30 Thread Jonathan Corbet
On Thu, 19 Nov 2020 10:27:09 +0800 Wei Li wrote: > The feature lists don't match reality as of v5.10-rc4, update them > accordingly (by features-refresh.sh). > > Fixes: aa65ff6b18e0 ("powerpc/64s: Implement queued spinlocks and rwlocks") > Fixes: e95a4f8cb

[PATCH] Documentation/features: Update feature lists for 5.10

2020-11-18 Thread Wei Li
The feature lists don't match reality as of v5.10-rc4, update them accordingly (by features-refresh.sh). Fixes: aa65ff6b18e0 ("powerpc/64s: Implement queued spinlocks and rwlocks") Fixes: e95a4f8cb985 ("csky: Add SECCOMP_FILTER supported") Fixes: 0bb605c2c7f2 ("

[PATCH tip/core/rcu 04/16] list.h: Update comment to explicitly note circular lists

2020-11-05 Thread paulmck
* * Some of the internal functions ("__xxx") are useful when * manipulating whole lists rather than single entries, as -- 2.9.5

Re: [PATCH 4/8] cppc_cpufreq: replace per-cpu structures with lists

2020-11-05 Thread Ionela Voinescu
Hi Jeremy, On Thursday 05 Nov 2020 at 09:50:30 (-0600), Jeremy Linton wrote: > Hi, > > On 11/5/20 6:55 AM, Ionela Voinescu wrote: > > The cppc_cpudata per-cpu storage was inefficient (1) additional to causing > > functional issues (2) when CPUs are hotplugged out, due to per-cpu data > > being im

Re: [PATCH 4/8] cppc_cpufreq: replace per-cpu structures with lists

2020-11-05 Thread Jeremy Linton
Hi, On 11/5/20 6:55 AM, Ionela Voinescu wrote: The cppc_cpudata per-cpu storage was inefficient (1) additional to causing functional issues (2) when CPUs are hotplugged out, due to per-cpu data being improperly initialised. (1) The amount of information needed for CPPC performance control in it

[PATCH 4/8] cppc_cpufreq: replace per-cpu structures with lists

2020-11-05 Thread Ionela Voinescu
The cppc_cpudata per-cpu storage was inefficient (1) additional to causing functional issues (2) when CPUs are hotplugged out, due to per-cpu data being improperly initialised. (1) The amount of information needed for CPPC performance control in its cpufreq driver depends on the domain (PSD) c

[PATCH v4 13/23] drm/msm: Add priv->mm_lock to protect active/inactive lists

2020-10-23 Thread Rob Clark
From: Rob Clark Rather than relying on the big dev->struct_mutex hammer, introduce a more specific lock for protecting the bo lists. Signed-off-by: Rob Clark Reviewed-by: Jordan Crouse Reviewed-by: Kristian H. Kristensen --- drivers/gpu/drm/msm/msm_debugfs.c | 7 +++ drivers/

[PATCH v3 13/23] drm/msm: Add priv->mm_lock to protect active/inactive lists

2020-10-19 Thread Rob Clark
From: Rob Clark Rather than relying on the big dev->struct_mutex hammer, introduce a more specific lock for protecting the bo lists. Signed-off-by: Rob Clark Reviewed-by: Jordan Crouse --- drivers/gpu/drm/msm/msm_debugfs.c | 7 +++ drivers/gpu/drm/msm/msm_drv.c |

[PATCH v2 12/22] drm/msm: Add priv->mm_lock to protect active/inactive lists

2020-10-11 Thread Rob Clark
From: Rob Clark Rather than relying on the big dev->struct_mutex hammer, introduce a more specific lock for protecting the bo lists. Signed-off-by: Rob Clark Reviewed-by: Jordan Crouse --- drivers/gpu/drm/msm/msm_debugfs.c | 7 +++ drivers/gpu/drm/msm/msm_drv.c |

Re: [Freedreno] [PATCH 04/14] drm/msm: Add priv->mm_lock to protect active/inactive lists

2020-10-05 Thread Jordan Crouse
On Sun, Oct 04, 2020 at 12:21:36PM -0700, Rob Clark wrote: > From: Rob Clark > > Rather than relying on the big dev->struct_mutex hammer, introduce a > more specific lock for protecting the bo lists. Most excellent. Reviewed-by: Jordan Crouse > Signed-off-by: Rob Clark &g

Re: [PATCH 04/14] drm/msm: Add priv->mm_lock to protect active/inactive lists

2020-10-04 Thread Rob Clark
On Sun, Oct 4, 2020 at 3:15 PM Daniel Vetter wrote: > > On Sun, Oct 4, 2020 at 9:21 PM Rob Clark wrote: > > > > From: Rob Clark > > > > Rather than relying on the big dev->struct_mutex hammer, introduce a > > more specific lock for protecting the bo

Re: [PATCH 04/14] drm/msm: Add priv->mm_lock to protect active/inactive lists

2020-10-04 Thread Daniel Vetter
On Sun, Oct 4, 2020 at 9:21 PM Rob Clark wrote: > > From: Rob Clark > > Rather than relying on the big dev->struct_mutex hammer, introduce a > more specific lock for protecting the bo lists. > > Signed-off-by: Rob Clark > --- > drivers/gpu/drm/msm/msm_debugfs.c

[PATCH 04/14] drm/msm: Add priv->mm_lock to protect active/inactive lists

2020-10-04 Thread Rob Clark
From: Rob Clark Rather than relying on the big dev->struct_mutex hammer, introduce a more specific lock for protecting the bo lists. Signed-off-by: Rob Clark --- drivers/gpu/drm/msm/msm_debugfs.c | 7 +++ drivers/gpu/drm/msm/msm_drv.c | 1 + drivers/gpu/drm/msm/msm_dr

[PATCH 4.4 42/46] Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists

2020-09-21 Thread Greg Kroah-Hartman
From: Hans de Goede commit c4440b8a457779adeec42c5e181cb4016f19ce0f upstream. The keyboard drops keypresses early during boot unless both the nomux and reset quirks are set. Add DMI table entries for this. BugLink: https://bugzilla.redhat.com/show_bug.cgi?id=1806085 Signed-off-by: Hans de Goede

[PATCH 4.14 90/94] Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists

2020-09-21 Thread Greg Kroah-Hartman
From: Hans de Goede commit c4440b8a457779adeec42c5e181cb4016f19ce0f upstream. The keyboard drops keypresses early during boot unless both the nomux and reset quirks are set. Add DMI table entries for this. BugLink: https://bugzilla.redhat.com/show_bug.cgi?id=1806085 Signed-off-by: Hans de Goede

[PATCH 5.8 097/118] Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists

2020-09-21 Thread Greg Kroah-Hartman
From: Hans de Goede commit c4440b8a457779adeec42c5e181cb4016f19ce0f upstream. The keyboard drops keypresses early during boot unless both the nomux and reset quirks are set. Add DMI table entries for this. BugLink: https://bugzilla.redhat.com/show_bug.cgi?id=1806085 Signed-off-by: Hans de Goede

[PATCH 5.4 62/72] Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists

2020-09-21 Thread Greg Kroah-Hartman
From: Hans de Goede commit c4440b8a457779adeec42c5e181cb4016f19ce0f upstream. The keyboard drops keypresses early during boot unless both the nomux and reset quirks are set. Add DMI table entries for this. BugLink: https://bugzilla.redhat.com/show_bug.cgi?id=1806085 Signed-off-by: Hans de Goede

[PATCH 4.19 44/49] Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists

2020-09-21 Thread Greg Kroah-Hartman
From: Hans de Goede commit c4440b8a457779adeec42c5e181cb4016f19ce0f upstream. The keyboard drops keypresses early during boot unless both the nomux and reset quirks are set. Add DMI table entries for this. BugLink: https://bugzilla.redhat.com/show_bug.cgi?id=1806085 Signed-off-by: Hans de Goede

[PATCH 4.9 66/70] Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists

2020-09-21 Thread Greg Kroah-Hartman
From: Hans de Goede commit c4440b8a457779adeec42c5e181cb4016f19ce0f upstream. The keyboard drops keypresses early during boot unless both the nomux and reset quirks are set. Add DMI table entries for this. BugLink: https://bugzilla.redhat.com/show_bug.cgi?id=1806085 Signed-off-by: Hans de Goede

Re: [PATCH 4.19 142/206] gfs2: fix use-after-free on transaction ail lists

2020-09-17 Thread Greg Kroah-Hartman
am commit 83d060ca8d90fa1e3feac227f995c013100862d3 ] > > > > > > > > > > > > > > > > Before this patch, transactions could be merged into the system > > > > > > > > transaction by function gfs2_merge_trans(), but the transactio

[PATCH net-next RFC v2 1/3] devlink: Wrap trap related lists a trap_lists struct

2020-09-17 Thread Aya Levin
Bundle the trap related lists: trap_list, trap_group_list and trap_policer_list in a dedicated struct. This will be handy in the coming patches in the set introducing traps in devlink port context. With trap_lists, code reuse is much simpler. Signed-off-by: Aya Levin --- Changelog: v1->v2: Pa

Re: [PATCH 4.19 142/206] gfs2: fix use-after-free on transaction ail lists

2020-09-15 Thread Bob Peterson
gt; > > > From: Bob Peterson > > > > > > > > > > > > > > [ Upstream commit 83d060ca8d90fa1e3feac227f995c013100862d3 ] > > > > > > > > > > > > > > Before this patch, transactions could be merged into the system > > > > > &

Re: [PATCH 4.19 142/206] gfs2: fix use-after-free on transaction ail lists

2020-09-11 Thread Salvatore Bonaccorso
mmit 83d060ca8d90fa1e3feac227f995c013100862d3 ] > > > > > > > > > > > > Before this patch, transactions could be merged into the system > > > > > > transaction by function gfs2_merge_trans(), but the transaction ail > > > > > > li

Re: MAINTAINERS: Marking internal distribution lists

2020-09-11 Thread Martin K. Petersen
Christoph, > On Fri, Sep 11, 2020 at 08:37:54AM +0200, Lukas Bulwahn wrote: >> - ocfs2-devel.oss.oracle.com >> - rds-devel.oss.oracle.com Both of these are public development lists and should be fully functional, have archives available, etc. Let me know if that

Re: [PATCH 4.19 142/206] gfs2: fix use-after-free on transaction ail lists

2020-09-11 Thread Bob Peterson
23, 2020 at 09:57:50PM +0200, Greg Kroah-Hartman wrote: > > > > > From: Bob Peterson > > > > > > > > > > [ Upstream commit 83d060ca8d90fa1e3feac227f995c013100862d3 ] > > > > > > > > > > Before this patch, transactions c

Re: [PATCH 4.19 142/206] gfs2: fix use-after-free on transaction ail lists

2020-09-11 Thread Salvatore Bonaccorso
d060ca8d90fa1e3feac227f995c013100862d3 ] > > > > > > > > > > > > Before this patch, transactions could be merged into the system > > > > > > transaction by function gfs2_merge_trans(), but the transaction ail > > > > > > lists were n

Re: [PATCH 4.19 142/206] gfs2: fix use-after-free on transaction ail lists

2020-09-11 Thread Greg Kroah-Hartman
an wrote: > > > > From: Bob Peterson > > > > > > > > [ Upstream commit 83d060ca8d90fa1e3feac227f995c013100862d3 ] > > > > > > > > Before this patch, transactions could be merged into the system > > > > transaction by function gfs2_merge_

Re: [PATCH 4.19 142/206] gfs2: fix use-after-free on transaction ail lists

2020-09-11 Thread Andreas Gruenbacher
On Fri, Sep 11, 2020 at 2:09 PM Salvatore Bonaccorso wrote: > On Fri, Sep 11, 2020 at 01:58:16PM +0200, Greg Kroah-Hartman wrote: > > Can you report this to the gfs2 developers? > > Sure! Bob Peterson and Andreas Gruenbacher were already on the > recipient list but I forgot cluster-de...@redhat.co

Re: [PATCH 4.19 142/206] gfs2: fix use-after-free on transaction ail lists

2020-09-11 Thread Salvatore Bonaccorso
; > > From: Bob Peterson > > > > > > [ Upstream commit 83d060ca8d90fa1e3feac227f995c013100862d3 ] > > > > > > Before this patch, transactions could be merged into the system > > > transaction by function gfs2_merge_trans(), but the transaction ai

Re: [PATCH 4.19 142/206] gfs2: fix use-after-free on transaction ail lists

2020-09-11 Thread Bob Peterson
commit 83d060ca8d90fa1e3feac227f995c013100862d3 ] > > > > > > Before this patch, transactions could be merged into the system > > > transaction by function gfs2_merge_trans(), but the transaction ail > > > lists were never merged. Because the ail flushing mechanism can run

Re: [PATCH 4.19 142/206] gfs2: fix use-after-free on transaction ail lists

2020-09-11 Thread Greg Kroah-Hartman
efore this patch, transactions could be merged into the system > > transaction by function gfs2_merge_trans(), but the transaction ail > > lists were never merged. Because the ail flushing mechanism can run > > separately, bd elements can be attached to the transaction's buffer >

Re: MAINTAINERS: Marking internal distribution lists

2020-09-11 Thread Lukas Bulwahn
On Fri, 11 Sep 2020, Joe Perches wrote: > On Fri, 2020-09-11 at 08:37 +0200, Lukas Bulwahn wrote: > > Hi Joe, > > > > in my continued effort to clean up MAINTAINERS, I came across various > > email "lists" that are actually just some kind of internal

Re: MAINTAINERS: Marking internal distribution lists

2020-09-11 Thread Joe Perches
On Fri, 2020-09-11 at 08:37 +0200, Lukas Bulwahn wrote: > Hi Joe, > > in my continued effort to clean up MAINTAINERS, I came across various > email "lists" that are actually just some kind of internal distribution > lists, but we cannot subscribe to them (no archives a

Re: MAINTAINERS: Marking internal distribution lists

2020-09-11 Thread Lukas Bulwahn
com seems > pretty much unmaintained. > > > - rds-devel.oss.oracle.com > > The same probably applies here. > Thanks, Christoph; it seems that I miscategorized those two email addresses in my first attempt going through the data. I found the URLs how to subscribe to those

Re: MAINTAINERS: Marking internal distribution lists

2020-09-11 Thread Christoph Hellwig
On Fri, Sep 11, 2020 at 08:37:54AM +0200, Lukas Bulwahn wrote: > - ocfs2-devel.oss.oracle.com This is a normal mailing list, and I subscribed to it normally. It might howerever be brken in various ways as oss.oracle.com seems pretty much unmaintained. > - rds-devel.oss.oracle.com The same p

MAINTAINERS: Marking internal distribution lists

2020-09-10 Thread Lukas Bulwahn
Hi Joe, in my continued effort to clean up MAINTAINERS, I came across various email "lists" that are actually just some kind of internal distribution lists, but we cannot subscribe to them (no archives available) and they are not affiliated to a specific person. Some examples are

Re: [PATCH 4.19 142/206] gfs2: fix use-after-free on transaction ail lists

2020-09-10 Thread Salvatore Bonaccorso
ut the transaction ail > lists were never merged. Because the ail flushing mechanism can run > separately, bd elements can be attached to the transaction's buffer > list during the transaction (trans_add_meta, etc) but quickly moved > to its ail lists. Later, in function gfs2_trans_

Re: [PATCH net-next RFC v1 1/4] devlink: Wrap trap related lists and ops in trap_mngr

2020-09-08 Thread Jiri Pirko
Wed, Sep 02, 2020 at 05:32:11PM CEST, a...@mellanox.com wrote: >Bundle the trap related lists: trap_list, trap_group_list and >trap_policer_list and trap ops like: trap_init, trap_fini, >trap_action_set... together in trap_mngr. This will be handy in the >coming patches in the set

[PATCH net-next RFC v1 1/4] devlink: Wrap trap related lists and ops in trap_mngr

2020-09-02 Thread Aya Levin
Bundle the trap related lists: trap_list, trap_group_list and trap_policer_list and trap ops like: trap_init, trap_fini, trap_action_set... together in trap_mngr. This will be handy in the coming patches in the set introducing traps in devlink port context. With trap_mngr, code reuse is much

[PATCH v4 01/19] media: uapi: h264: Update reference lists

2020-08-24 Thread Ezequiel Garcia
From: Jernej Skrabec When dealing with interlaced frames, reference lists must tell if each particular reference is meant for top or bottom field. This info is currently not provided at all in the H264 related controls. Change reference lists to hold a structure, which specifies an index into

[PATCH v4 02/19] media: uapi: h264: Further clarify scaling lists order

2020-08-24 Thread Ezequiel Garcia
Commit 0b0393d59eb4a ("media: uapi: h264: clarify expected scaling_list_4x4/8x8 order") improved the documentation on H264 scaling lists order. This commit improves the documentation by clarifying that the lists themselves are expected in raster scan order. Signed-off-by: Ezequiel Garc

Re: [PATCH v3 01/19] media: uapi: h264: Update reference lists

2020-08-20 Thread Hans Verkuil
On 14/08/2020 15:36, Ezequiel Garcia wrote: > From: Jernej Skrabec > > When dealing with with interlaced frames, reference lists must tell if > each particular reference is meant for top or bottom field. This info > is currently not provided at all in the H264 related cont

[PATCH v3 01/19] media: uapi: h264: Update reference lists

2020-08-14 Thread Ezequiel Garcia
From: Jernej Skrabec When dealing with with interlaced frames, reference lists must tell if each particular reference is meant for top or bottom field. This info is currently not provided at all in the H264 related controls. Make reference lists hold a structure which will also hold an

[PATCH v3 02/19] media: uapi: h264: Further clarify scaling lists order

2020-08-14 Thread Ezequiel Garcia
Commit 0b0393d59eb4a ("media: uapi: h264: clarify expected scaling_list_4x4/8x8 order") improved the documentation on H264 scaling lists order. This commit improves the documentation by clarifying that the lists themselves are expected in raster scan order. Signed-off-by: Ezequiel Garc

Re: [PATCH v2 01/14] media: uapi: h264: Update reference lists

2020-08-08 Thread Ezequiel Garcia
On Thu, 6 Aug 2020 at 14:38, Ezequiel Garcia wrote: > > From: Jernej Skrabec > > When dealing with with interlaced frames, reference lists must tell if > each particular reference is meant for top or bottom field. This info > is currently not provided at all in the H26

Re: [PATCH v2 01/14] media: uapi: h264: Update reference lists

2020-08-07 Thread Ezequiel Garcia
On Thu, 2020-08-06 at 17:47 +0200, Paul Kocialkowski wrote: > Hi, > > On Thu 06 Aug 20, 12:12, Ezequiel Garcia wrote: > > From: Jernej Skrabec > > > > When dealing with with interlaced frames, reference lists must tell if > > each particular reference is meant f

[PATCH v2 02/14] media: uapi: h264: Further clarify scaling lists order

2020-08-06 Thread Ezequiel Garcia
Commit 0b0393d59eb4a ("media: uapi: h264: clarify expected scaling_list_4x4/8x8 order") improved the documentation on H264 scaling lists order. This commit improves the documentation by clarifying that the lists themselves are expected in raster scan order. Signed-off-by: Ezequiel Garc

Re: [PATCH v2 01/14] media: uapi: h264: Update reference lists

2020-08-06 Thread Jernej Škrabec
Hi! Dne četrtek, 06. avgust 2020 ob 17:47:07 CEST je Paul Kocialkowski napisal(a): > Hi, > > On Thu 06 Aug 20, 12:12, Ezequiel Garcia wrote: > > From: Jernej Skrabec > > > > When dealing with with interlaced frames, reference lists must tell if > > each particu

  1   2   3   4   5   6   7   8   9   10   >