[PATCH v5 05/34] KVM: SVM: Add support for the SEV-ES VMSA

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky Allocate a page during vCPU creation to be used as the encrypted VM save area (VMSA) for the SEV-ES guest. Provide a flag in the kvm_vcpu_arch structure that indicates whether the guest state is protected. When freeing a VMSA page that has been encrypted, the cache contents

[PATCH v5 02/34] KVM: SVM: Remove the call to sev_platform_status() during setup

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky When both KVM support and the CCP driver are built into the kernel instead of as modules, KVM initialization can happen before CCP initialization. As a result, sev_platform_status() will return a failure when it is called from sev_hardware_setup(), when this isn't really an

[PATCH v5 06/34] KVM: x86: Mark GPRs dirty when written

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky When performing VMGEXIT processing for an SEV-ES guest, register values will be synced between KVM and the GHCB. Prepare for detecting when a GPR has been updated (marked dirty) in order to determine whether to sync the register to the GHCB. Signed-off-by: Tom Lendacky ---

[PATCH v5 07/34] KVM: SVM: Add required changes to support intercepts under SEV-ES

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky When a guest is running under SEV-ES, the hypervisor cannot access the guest register state. There are numerous places in the KVM code where certain registers are accessed that are not allowed to be accessed (e.g. RIP, CR0, etc). Add checks to prevent register accesses and add

[PATCH v5 01/34] x86/cpu: Add VM page flush MSR availablility as a CPUID feature

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky On systems that do not have hardware enforced cache coherency between encrypted and unencrypted mappings of the same physical page, the hypervisor can use the VM page flush MSR (0xc001011e) to flush the cache contents of an SEV guest page. When a small number of pages are

Re: [Intel-gfx] [PATCH v3 2/4] drm/i915/pmu: Use kstat_irqs to get interrupt count

2020-12-10 Thread Tvrtko Ursulin
On 10/12/2020 16:35, Thomas Gleixner wrote: On Thu, Dec 10 2020 at 10:45, Tvrtko Ursulin wrote: On 10/12/2020 07:53, Joonas Lahtinen wrote: I think later in the thread there was a suggestion to replace this with simple counter increment in IRQ handler. It was indeed unsafe until recent

[PATCH v5 03/34] KVM: SVM: Add support for SEV-ES capability in KVM

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky Add support to KVM for determining if a system is capable of supporting SEV-ES as well as determining if a guest is an SEV-ES guest. Signed-off-by: Tom Lendacky --- arch/x86/kvm/Kconfig | 3 ++- arch/x86/kvm/svm/sev.c | 47 ++

[PATCH v5 00/34] SEV-ES hypervisor support

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky This patch series provides support for running SEV-ES guests under KVM. Secure Encrypted Virtualization - Encrypted State (SEV-ES) expands on the SEV support to protect the guest register state from the hypervisor. See "AMD64 Architecture Programmer's Manual Volume 2: System

[PATCH v5 09/34] KVM: SVM: Do not allow instruction emulation under SEV-ES

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky When a guest is running as an SEV-ES guest, it is not possible to emulate instructions. Add support to prevent instruction emulation. Signed-off-by: Tom Lendacky --- arch/x86/kvm/svm/svm.c | 6 ++ 1 file changed, 6 insertions(+) diff --git a/arch/x86/kvm/svm/svm.c

[PATCH v5 18/34] KVM: SVM: Support MMIO for an SEV-ES guest

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky For an SEV-ES guest, MMIO is performed to a shared (un-encrypted) page so that both the hypervisor and guest can read or write to it and each see the contents. The GHCB specification provides software-defined VMGEXIT exit codes to indicate a request for an MMIO read or an

Re: [f2fs-dev] [PATCH] fs: f2fs: fix potential shift-out-of-bounds error in sanity_check_raw_super()

2020-12-10 Thread Jaegeuk Kim
On 12/10, Chao Yu wrote: > Jaegeuk, > > Could you please help to add signed-off of Anant manually in > > f2fs: fix shift-out-of-bounds in sanity_check_raw_super() Done. Thank you guys. :) > > Thanks, > > On 2020/12/10 10:14, Anant Thazhemadam wrote: > > > > On 10/12/20 7:40 am, Chao Yu

[PATCH v5 23/34] KVM: SVM: Add support for CR8 write traps for an SEV-ES guest

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky For SEV-ES guests, the interception of control register write access is not recommended. Control register interception occurs prior to the control register being modified and the hypervisor is unable to modify the control register itself because the register is located in the

[PATCH v5 21/34] KVM: SVM: Add support for CR0 write traps for an SEV-ES guest

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky For SEV-ES guests, the interception of control register write access is not recommended. Control register interception occurs prior to the control register being modified and the hypervisor is unable to modify the control register itself because the register is located in the

[PATCH v5 28/34] KVM: SVM: Add NMI support for an SEV-ES guest

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky The GHCB specification defines how NMIs are to be handled for an SEV-ES guest. To detect the completion of an NMI the hypervisor must not intercept the IRET instruction (because a #VC while running the NMI will issue an IRET) and, instead, must receive an NMI Complete exit

Re: [PATCH 2/3] perf tools: Allow to enable/disable events via control file

2020-12-10 Thread Arnaldo Carvalho de Melo
Em Thu, Dec 10, 2020 at 05:24:30PM +0100, Jiri Olsa escreveu: > On Mon, Dec 07, 2020 at 08:02:20PM +0300, Alexei Budankov wrote: > > Hi, > > > > On 06.12.2020 20:05, Jiri Olsa wrote: > > > Adding new control events to enable/disable specific event. > > > The interface string for control file are:

[PATCH v5 33/34] KVM: SVM: Provide an updated VMRUN invocation for SEV-ES guests

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky The run sequence is different for an SEV-ES guest compared to a legacy or even an SEV guest. The guest vCPU register state of an SEV-ES guest will be restored on VMRUN and saved on VMEXIT. There is no need to restore the guest registers directly and through VMLOAD before VMRUN

[PATCH v5 34/34] KVM: SVM: Provide support to launch and run an SEV-ES guest

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky An SEV-ES guest is started by invoking a new SEV initialization ioctl, KVM_SEV_ES_INIT. This identifies the guest as an SEV-ES guest, which is used to drive the appropriate ASID allocation, VMSA encryption, etc. Before being able to run an SEV-ES vCPU, the vCPU VMSA must be

[PATCH v5 32/34] KVM: SVM: Provide support for SEV-ES vCPU loading

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky An SEV-ES vCPU requires additional VMCB vCPU load/put requirements. SEV-ES hardware will restore certain registers on VMEXIT, but not save them on VMRUN (see Table B-3 and Table B-4 of the AMD64 APM Volume 2), so make the following changes: General vCPU load changes: -

Re: [PATCH v2 3/3] ALSA: hda/ca0132 - Unmute surround when speaker output is selected.

2020-12-10 Thread Connor McAdams
Woops, sent previous email on the first version of this patch. This patch is a mistake. Not sure why I did this. On Tue, Dec 8, 2020 at 2:52 PM Connor McAdams wrote: > > Make sure GPIO pin for surround channel mute is set to 0 when speaker > output is selected. > > Fixes: def3f0a5c7007 ("ALSA:

Re: [RFC PATCH] drm/panel: Make backlight attachment lazy

2020-12-10 Thread Thierry Reding
On Thu, Dec 10, 2020 at 05:50:00PM +0100, Daniel Vetter wrote: > On Thu, Dec 10, 2020 at 5:44 PM Thierry Reding > wrote: > > > > On Thu, Dec 10, 2020 at 11:15:38AM +0100, Daniel Vetter wrote: > > > On Wed, Dec 09, 2020 at 02:28:18PM -0600, Bjorn Andersson wrote: > > > > On Tue 08 Dec 17:52 CST

Re: [PATCH 2/3] perf tools: Allow to enable/disable events via control file

2020-12-10 Thread Arnaldo Carvalho de Melo
Em Thu, Dec 10, 2020 at 02:15:03PM -0300, Arnaldo Carvalho de Melo escreveu: > Em Thu, Dec 10, 2020 at 05:24:30PM +0100, Jiri Olsa escreveu: > > On Mon, Dec 07, 2020 at 08:02:20PM +0300, Alexei Budankov wrote: > > > On 06.12.2020 20:05, Jiri Olsa wrote: > > > > @@ -1952,6 +1958,8 @@ int

[PATCH V3 1/2] mm/highmem: Remove deprecated kmap_atomic

2020-12-10 Thread ira . weiny
From: Ira Weiny kmap_atomic() is being deprecated in favor of kmap_local_page(). Replace the uses of kmap_atomic() within the highmem code. Signed-off-by: Ira Weiny --- include/linux/highmem.h | 28 ++-- 1 file changed, 14 insertions(+), 14 deletions(-) diff --git

[PATCH V3 2/2] mm/highmem: Lift memcpy_[to|from]_page to core

2020-12-10 Thread ira . weiny
From: Ira Weiny Working through a conversion to a call such as kmap_thread() revealed many places where the pattern kmap/memcpy/kunmap occurred. Eric Biggers, Matthew Wilcox, Christoph Hellwig, Dan Williams, and Al Viro all suggested putting this code into helper functions. Al Viro further

[PATCH v5 04/34] KVM: SVM: Add GHCB accessor functions for retrieving fields

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky Update the GHCB accessor functions to add functions for retrieve GHCB fields by name. Update existing code to use the new accessor functions. Signed-off-by: Tom Lendacky --- arch/x86/include/asm/svm.h | 10 ++ arch/x86/kernel/cpu/vmware.c | 12 ++-- 2

MIPS + clang-11 + allnoconfig / tinyconfig builds failed

2020-12-10 Thread Naresh Kamboju
Recently we have setup clang build and found that, MIPS + clang-11 + allnoconfig build failed MIPS + clang-11 + tinyconfig build failed MIPS + clang-10 + allnoconfig build failed MIPS + clang-10 + tinyconfig build failed We have noticed these build failures on - stable-4.19 - stable-5.4 -

[PATCH V3 0/3] Begin converting kmap calls to kmap_local_page()

2020-12-10 Thread ira . weiny
From: Ira Weiny Changes from V2[1]: Update this cover letter Update commit messages From Matthew Wilcox Put functions in highmem.h rather than pagemap.h Investigate 0-day build errors. AFAICT the patches were applied to the wrong

Re: [PATCH v5 00/34] SEV-ES hypervisor support

2020-12-10 Thread Tom Lendacky
On 12/10/20 11:06 AM, Tom Lendacky wrote: From: Tom Lendacky This patch series provides support for running SEV-ES guests under KVM. I cut the first send of this series short and resent it with a corrected email address for Sean (since he is copied on all the patches), so please look at

Re: [PATCH v2 3/3] ALSA: hda/ca0132 - Unmute surround when speaker output is selected.

2020-12-10 Thread Takashi Iwai
On Thu, 10 Dec 2020 18:16:00 +0100, Connor McAdams wrote: > > Woops, sent previous email on the first version of this patch. > > This patch is a mistake. Not sure why I did this. OK, then could you resubmit v3? Now I reverted the v2 patches. Takashi

[PATCH v5 31/34] KVM: SVM: Provide support for SEV-ES vCPU creation/loading

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky An SEV-ES vCPU requires additional VMCB initialization requirements for vCPU creation and vCPU load/put requirements. This includes: General VMCB initialization changes: - Set a VMCB control bit to enable SEV-ES support on the vCPU. - Set the VMCB encrypted VM save area

Re: [PATCH v2 3/3] remoteproc: Add ftrace events to trace lifecycle of remoteprocs

2020-12-10 Thread Bjorn Andersson
On Mon 16 Nov 15:44 CST 2020, Rishabh Bhatnagar wrote: > Add trace events to trace bootup/shutdown/recovery of remote > processors. These events are useful in analyzing the time > spent in each step in the life cycle and can be used for > performace analysis. Also these serve as standard

Re: [PATCH v4] pwm: bcm2835: Support apply function for atomic configuration

2020-12-10 Thread Thierry Reding
On Wed, Dec 09, 2020 at 09:48:25PM +0100, Lino Sanfilippo wrote: > Use the newer .apply function of pwm_ops instead of .config, .enable, > .disable and .set_polarity. This guarantees atomic changes of the pwm > controller configuration. It also reduces the size of the driver. > > Since now period

Re: [PATCH RFC] f2fs: compress: add compress_flag in struct f2fs_comp_option

2020-12-10 Thread Jaegeuk Kim
On 12/10, Chao Yu wrote: > Add a extra field compress_flag to get/set more compress option from/to > compressed inode. > > Signed-off-by: Chao Yu > --- > > Daeho, Jaegeuk, > > Could you please check whether we could add this new field to struct > f2fs_comp_option? so we can expand to allow

Re: [PATCH 1/2] mm: Allow architectures to request 'old' entries when prefaulting

2020-12-10 Thread Linus Torvalds
On Thu, Dec 10, 2020 at 7:08 AM Kirill A. Shutemov wrote: > > See lightly tested patch below. Is it something you had in mind? This is closer, in that at least it removes the ostensibly blocking allocation (that can't happen) from the prefault path. But the main issue remains: > > At that

Re: [PATCH 1/2] acpi: cppc: add cpufreq device

2020-12-10 Thread Ionela Voinescu
Hi Rafael, On Thursday 10 Dec 2020 at 17:55:56 (+0100), Rafael J. Wysocki wrote: > On Thursday, December 10, 2020 4:04:40 PM CET Mian Yousaf Kaukab wrote: > > On Thu, Dec 10, 2020 at 03:32:09PM +0100, Rafael J. Wysocki wrote: > > > On Thu, Dec 10, 2020 at 3:23 PM Mian Yousaf Kaukab > > > wrote:

Re: [PATCH v2 3/3] ALSA: hda/ca0132 - Unmute surround when speaker output is selected.

2020-12-10 Thread Connor McAdams
Will do. Sorry about that. On Thu, Dec 10, 2020 at 12:22 PM Takashi Iwai wrote: > > On Thu, 10 Dec 2020 18:16:00 +0100, > Connor McAdams wrote: > > > > Woops, sent previous email on the first version of this patch. > > > > This patch is a mistake. Not sure why I did this. > > OK, then could you

Re: [PATCH -next] thermal: broadcom: simplify the return expression of bcm2711_thermal_probe()

2020-12-10 Thread Florian Fainelli
On 12/10/2020 5:54 AM, Zheng Yongjun wrote: > Simplify the return expression. > > Signed-off-by: Zheng Yongjun Reviewed-by: Florian Fainelli -- Florian

[BUG] jevents problem when cross building Re: [PATCH 2/3] perf tools: Allow to enable/disable events via control file

2020-12-10 Thread Arnaldo Carvalho de Melo
Em Thu, Dec 10, 2020 at 02:19:03PM -0300, Arnaldo Carvalho de Melo escreveu: > Em Thu, Dec 10, 2020 at 02:15:03PM -0300, Arnaldo Carvalho de Melo escreveu: > > Em Thu, Dec 10, 2020 at 05:24:30PM +0100, Jiri Olsa escreveu: > > > On Mon, Dec 07, 2020 at 08:02:20PM +0300, Alexei Budankov wrote: > > >

[PATCH v5 26/34] KVM: SVM: Guest FPU state save/restore not needed for SEV-ES guest

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky The guest FPU state is automatically restored on VMRUN and saved on VMEXIT by the hardware, so there is no reason to do this in KVM. Eliminate the allocation of the guest_fpu save area and key off that to skip operations related to the guest FPU state. Signed-off-by: Tom

Re: [PATCH v2 1/3] soc: qcom: Add tracepoints to mdt loader

2020-12-10 Thread Bjorn Andersson
On Mon 16 Nov 15:44 CST 2020, Rishabh Bhatnagar wrote: > Add trace events to the mdt loader driver. These events > can help us trace the region where we are loading the > segments and the time it takes to initialize the image > and setup the memory region. > > Signed-off-by: Rishabh Bhatnagar >

[PATCH v5 24/34] KVM: x86: Update __get_sregs() / __set_sregs() to support SEV-ES

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky Since many of the registers used by the SEV-ES are encrypted and cannot be read or written, adjust the __get_sregs() / __set_sregs() to take into account whether the VMSA/guest state is encrypted. For __get_sregs(), return the actual value that is in use by the guest for all

[PATCH v5 22/34] KVM: SVM: Add support for CR4 write traps for an SEV-ES guest

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky For SEV-ES guests, the interception of control register write access is not recommended. Control register interception occurs prior to the control register being modified and the hypervisor is unable to modify the control register itself because the register is located in the

[PATCH v5 25/34] KVM: SVM: Do not report support for SMM for an SEV-ES guest

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky SEV-ES guests do not currently support SMM. Update the has_emulated_msr() kvm_x86_ops function to take a struct kvm parameter so that the capability can be reported at a VM level. Since this op is also called during KVM initialization and before a struct kvm instance is

[PATCH v5 30/34] KVM: SVM: Update ASID allocation to support SEV-ES guests

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky SEV and SEV-ES guests each have dedicated ASID ranges. Update the ASID allocation routine to return an ASID in the respective range. Signed-off-by: Tom Lendacky --- arch/x86/kvm/svm/sev.c | 25 ++--- 1 file changed, 14 insertions(+), 11 deletions(-)

Re: [PATCH] RDMA/mlx5: remove unneeded semicolon

2020-12-10 Thread Jason Gunthorpe
On Sat, Oct 31, 2020 at 06:46:38AM -0700, t...@redhat.com wrote: > From: Tom Rix > > A semicolon is not needed after a switch statement. > > Signed-off-by: Tom Rix > --- > drivers/infiniband/hw/mlx5/qp.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) Applied to for-next Jason

Re: [PATCH] iommu/amd: Add sanity check for interrupt remapping table length macros

2020-12-10 Thread Jerry Snitselaar
Suravee Suthikulpanit @ 2020-12-10 09:24 MST: > Currently, macros related to the interrupt remapping table length are > defined separately. This has resulted in an oversight in which one of > the macros were missed when changing the length. To prevent this, > redefine the macros to add built-in

Re: [PATCH] RDMA/restrack: update kernel documentation for ib_create_named_qp()

2020-12-10 Thread Jason Gunthorpe
On Mon, Dec 07, 2020 at 06:32:55PM +0100, Lukas Bulwahn wrote: > Commit 66f57b871efc ("RDMA/restrack: Support all QP types") extends > ib_create_qp() to a named ib_create_named_qp(), which takes the caller's > name as argument, but it did not add the new argument description to the > function's

Re: [PATCH RESEND net-next 1/2] dpaa2-eth: send a scatter-gather FD instead of realloc-ing

2020-12-10 Thread Daniel Thompson
Hi Ioana On Mon, Jun 29, 2020 at 06:47:11PM +, Ioana Ciornei wrote: > Instead of realloc-ing the skb on the Tx path when the provided headroom > is smaller than the HW requirements, create a Scatter/Gather frame > descriptor with only one entry. > > Remove the '[drv] tx realloc frames'

namei.c LOOKUP_NONBLOCK (was "Re: [GIT PULL] io_uring fixes for 5.10-rc")

2020-12-10 Thread Jens Axboe
On 11/21/20 3:58 PM, Jens Axboe wrote: > On 11/21/20 11:07 AM, Linus Torvalds wrote: >> On Fri, Nov 20, 2020 at 7:00 PM Jens Axboe wrote: >>> >>> Actually, I think we can do even better. How about just having >>> do_filp_open() exit after LOOKUP_RCU fails, if LOOKUP_RCU was already >>> set in the

Re: [PATCH 1/2] rcu-tasks: move RCU-tasks initialization out of core_initcall()

2020-12-10 Thread Paul E. McKenney
On Fri, Dec 11, 2020 at 12:39:21AM +1100, Daniel Axtens wrote: > Hi Vlad, > > >> Initialize the RCU-tasks earlier, before *_initcall() callbacks are > >> invoked. Do it after the workqueue subsytem is up and running. That > >> gives us a possibility to make use of synchronize_rcu_tasks*() wait >

Re: [PATCH v3] usb: musb: remove unused variable 'devctl'

2020-12-10 Thread Sergei Shtylyov
On 12/10/20 6:01 PM, Greg Kroah-Hartman wrote: [...] >>> From: Min Guo >>> >>> Remove unused 'devctl' variable to fix compile warnings: >>> >>> drivers/usb/musb/musbhsdma.c: In function 'dma_controller_irq': >>> drivers/usb/musb/musbhsdma.c:324:8: warning: variable 'devctl' set >>>

Re: [PATCH v3 1/2] epoll: add nsec timeout support with epoll_pwait2

2020-12-10 Thread Willem de Bruijn
On Sat, Nov 21, 2020 at 4:27 AM Arnd Bergmann wrote: > > On Fri, Nov 20, 2020 at 11:28 PM Willem de Bruijn > wrote: > > On Fri, Nov 20, 2020 at 2:23 PM Arnd Bergmann wrote: > > > On Fri, Nov 20, 2020 at 5:01 PM Willem de Bruijn > > > wrote: > > > > I think it'll be better to split the

Re: [PATCH 01/15] irqchip: Allow to compile bcmstb on other platforms

2020-12-10 Thread Florian Fainelli
On 12/10/2020 5:46 AM, Maxime Ripard wrote: > The BCM2711 uses a number of instances of the bcmstb-l2 controller in its > display engine. Let's allow the driver to be enabled through KConfig. > > Signed-off-by: Maxime Ripard Acked-by: Florian Fainelli -- Florian

Re: [PATCH 1/2] scsi: ufs: Protect some contexts from unexpected clock scaling

2020-12-10 Thread Bean Huo
Hi Can On Wed, 2020-12-09 at 05:35 -0800, Can Guo wrote: > > > @@ -1160,6 +1166,7 @@ static void > ufshcd_clock_scaling_unprepare(struct ufs_hba *hba) > { > up_write(>clk_scaling_lock); > ufshcd_scsi_unblock_requests(hba); > + ufshcd_release(hba); > } > > /** > @@ -1175,12

[PATCH v5 29/34] KVM: SVM: Set the encryption mask for the SVM host save area

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky The SVM host save area is used to restore some host state on VMEXIT of an SEV-ES guest. After allocating the save area, clear it and add the encryption mask to the SVM host save area physical address that is programmed into the VM_HSAVE_PA MSR. Signed-off-by: Tom Lendacky

[PATCH v2] pinctrl: remove empty lines in pinctrl subsystem

2020-12-10 Thread Zhaoyu Liu
Remove all empty lines at the end of functions in pinctrl subsystem, make the code neat. Target files: grep -nwR -B1 ^} drivers/pinctrl/* | grep '[0-9]-$' | less Reviewed-by: Linus Walleij Reviewed-by: Andy Shevchenko Signed-off-by: Zhaoyu Liu --- Changelog: v2: - Fixed the same problem in all

[PATCH v3 1/2] ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg.

2020-12-10 Thread Connor McAdams
The Windows driver sets the pincfg for the AE-5's rear-headphone to report as a microphone. This causes issues with Pulseaudio mistakenly believing there is no headphone plugged in. In Linux, we should instead set it to be a headphone. Fixes: a6b0961b39896 ("ALSA: hda/ca0132 - fix AE-5 pincfg")

Re: [PATCH] futex: Change 'utime' parameter to be 'const ... *'

2020-12-10 Thread Alejandro Colomar (man-pages)
Hi Thomas & Ingo, I tested the changes. Everything's OK. Cheers, Alex $ uname -a Linux debian 5.10.0-rc7+alx3+ #4 SMP Thu Dec 10 18:05:03 CET 2020 x86_64 GNU/Linux .../linux/tools/testing/selftests/futex$ sudo ./run.sh [sudo] password for user: TAP version 13 1..1 # futex_requeue_pi: Test

[PATCH v3 2/2] ALSA: hda/ca0132 - Change Input Source enum strings.

2020-12-10 Thread Connor McAdams
Change the Input Source enumerated control's strings to make it play nice with pulseaudio. Fixes: 7cb9d94c05de9 ("ALSA: hda/ca0132: add alt_select_in/out for R3Di + SBZ") Cc: Signed-off-by: Connor McAdams Link: https://lore.kernel.org/r/20201208195223.424753-2-conmanx...@gmail.com

[PATCH] drm/msm: Fix WARN_ON() splat in _free_object()

2020-12-10 Thread Rob Clark
From: Rob Clark [ 192.062000] [ cut here ] [ 192.062498] WARNING: CPU: 3 PID: 2039 at drivers/gpu/drm/msm/msm_gem.c:381 put_iova_vmas+0x94/0xa0 [msm] [ 192.062870] Modules linked in: snd_hrtimer snd_seq snd_seq_device rfcomm algif_hash algif_skcipher af_alg bnep

Re: [PATCH v2 2/3] usb: dwc3: meson-g12a: fix shared reset control use

2020-12-10 Thread Amjad Ouled-Ameur
Hi Martin On 05/12/2020 22:42, Martin Blumenstingl wrote: Hello Amjad, On Tue, Dec 1, 2020 at 8:01 PM Amjad Ouled-Ameur wrote: reset_control_(de)assert() calls are called on a shared reset line when reset_control_reset has been used. This is not allowed by the reset framework. Use

Re: [PATCH] spi: spi-geni-qcom: Fix NULL pointer access in geni_spi_isr

2020-12-10 Thread Doug Anderson
Hi, On Wed, Dec 9, 2020 at 7:17 PM Stephen Boyd wrote: > > Quoting Doug Anderson (2020-12-03 08:40:46) > > > I would guess that if "mas->cur_xfer" is NULL then > > geni_spi_handle_rx() should read all data in the FIFO and throw it > > away and geni_spi_handle_tx() should set

Re: KRETPROBES are broken since kernel 5.8

2020-12-10 Thread Adam Zabrocki
Hi, > > However, there might be another issue which I wanted to brought / discuss - > > problem with optimizer. Until kernel 5.9 KRETPROBE on e.g. > > 'ftrace_enable_sysctl' function was correctly optimized without any > > problems. > > Did you check it on other functions? Did you see it

[PATCH v5 27/34] KVM: SVM: Add support for booting APs for an SEV-ES guest

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky Typically under KVM, an AP is booted using the INIT-SIPI-SIPI sequence, where the guest vCPU register state is updated and then the vCPU is VMRUN to begin execution of the AP. For an SEV-ES guest, this won't work because the guest register state is encrypted. Following the

Re: [PATCH 14/15] ARM: dts: bcm2711: Add the BSC interrupt controller

2020-12-10 Thread Florian Fainelli
On 12/10/2020 5:46 AM, Maxime Ripard wrote: > The BSC controllers used for the HDMI DDC have an interrupt controller > shared between both instances. Let's add it to avoid polling. > > Signed-off-by: Maxime Ripard Reviewed-by: Florian Fainelli -- Florian

[PATCH v5 20/34] KVM: SVM: Add support for EFER write traps for an SEV-ES guest

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky For SEV-ES guests, the interception of EFER write access is not recommended. EFER interception occurs prior to EFER being modified and the hypervisor is unable to modify EFER itself because the register is located in the encrypted register state. SEV-ES support introduces a

Re: [PATCH v15 08/26] x86/mm: Introduce _PAGE_COW

2020-12-10 Thread Borislav Petkov
On Tue, Dec 08, 2020 at 11:24:16AM -0800, Yu, Yu-cheng wrote: > Case (a) is a normal writable data page that has gone through fork(). So it Writable? > has W=0, D=1. But here, the software chooses not to use the D bit, and But it has W=0. So not writable? > instead, W=0, COW=1. So the "new"

Re: [PATCH 1/5] USB: typec: tcpm: Prevent log overflow by removing old entries

2020-12-10 Thread Guenter Roeck
On Thu, Dec 10, 2020 at 05:05:17PM +0100, Greg Kroah-Hartman wrote: > From: Badhri Jagan Sridharan > > TCPM logs overflow once the logbuffer is full. Clear old entries and > allow logging the newer ones as the newer would be more relevant to the > issue being debugged. > > Also, do not reset

Re: [PATCH 15/15] ARM: dts: bcm2711: Add the CEC interrupt controller

2020-12-10 Thread Florian Fainelli
On 12/10/2020 5:46 AM, Maxime Ripard wrote: > The CEC and hotplug interrupts go through an interrupt controller shared > between the two HDMI controllers. > > Let's add that interrupt controller and the interrupts for both HDMI > controllers > > Signed-off-by: Maxime Ripard Reviewed-by:

Re: WARNING in sk_stream_kill_queues (5)

2020-12-10 Thread Eric Dumazet
On Thu, Dec 10, 2020 at 5:51 PM Marco Elver wrote: > > On Wed, Dec 09, 2020 at 01:47PM +0100, Marco Elver wrote: > > On Tue, Dec 08, 2020 at 08:06PM +0100, Marco Elver wrote: > > > On Thu, 3 Dec 2020 at 19:01, Eric Dumazet wrote: > > > > On 12/3/20 6:41 PM, Marco Elver wrote: > > > > > > > > >

Re: [PATCH 4/5] USB: typec: tcpm: Add a 30ms room for tPSSourceOn in PR_SWAP

2020-12-10 Thread Guenter Roeck
On Thu, Dec 10, 2020 at 05:05:20PM +0100, Greg Kroah-Hartman wrote: > From: Kyle Tso > > TCPM state machine needs 20-25ms to enter the ErrorRecovery state after > tPSSourceOn timer timeouts. Change the timer from max 480ms to 450ms to > ensure that the timer complies with the Spec. In order to

Re: [PATCH 2/5] USB: typec: tcpm: Hard Reset after not receiving a Request

2020-12-10 Thread Guenter Roeck
On Thu, Dec 10, 2020 at 05:05:18PM +0100, Greg Kroah-Hartman wrote: > From: pumahsu > > PD 3.0 spec 8.3.3.2.3, A Get_Source_Cap message is sent > to a UUT that is in the PE_SRC_Ready state. After sending > a Source_Capabilities message, the UUT should then expect > a Request message in response.

Re: [Intel-gfx] [PATCH v3 2/4] drm/i915/pmu: Use kstat_irqs to get interrupt count

2020-12-10 Thread Thomas Gleixner
On Thu, Dec 10 2020 at 17:09, Tvrtko Ursulin wrote: > On 10/12/2020 16:35, Thomas Gleixner wrote: >> I'll send out a series addressing irq_to_desc() (ab)use all over the >> place shortly. i915 is in there... > > Yep we don't need atomic, my bad. And we would care about the shared > interrupt

Re: [PATCH 3/5] USB: typec: tcpm: Fix PR_SWAP error handling

2020-12-10 Thread Guenter Roeck
On Thu, Dec 10, 2020 at 05:05:19PM +0100, Greg Kroah-Hartman wrote: > From: Kyle Tso > > PD rev3.0 8.3.3.16.3.6 PE_PRS_SRC_SNK_Wait_Source_on State > The Policy Enging Shall transition to the ErrorRecovery state when the > PSSourceOnTimer times out ... > > Cc: Guenter Roeck > Cc: Heikki

Re: [BUG] jevents problem when cross building Re: [PATCH 2/3] perf tools: Allow to enable/disable events via control file

2020-12-10 Thread John Garry
+ evsel_name = cmd_data + sizeof(EVLIST_CTL_CMD_ENABLE_EVSEL_TAG) - 1; It makes sense to check that evsel_name still points into cmd_data buffer after assigning to event name. right, will add that So, I'm finishing test builds, so probably I'll push

Re: [PATCH 5/5] USB: typec: tcpci: Add Bleed discharge to POWER_CONTROL definition

2020-12-10 Thread Guenter Roeck
On Thu, Dec 10, 2020 at 05:05:21PM +0100, Greg Kroah-Hartman wrote: > From: Badhri Jagan Sridharan > > "Table 4-19. POWER_CONTROL Register Definition" from tcpci spec > defines BIT(3) as the control bit for bleed discharge. > > Cc: Guenter Roeck > Cc: Heikki Krogerus > Cc: Kyle Tso >

Re: [PATCH v2 3/8] mm/gup: make __gup_longterm_locked common

2020-12-10 Thread Ira Weiny
On Thu, Dec 10, 2020 at 08:30:03AM -0500, Pavel Tatashin wrote: > On Wed, Dec 9, 2020 at 11:06 PM Ira Weiny wrote: > > > > On Wed, Dec 09, 2020 at 07:43:30PM -0500, Pavel Tatashin wrote: > > > __gup_longterm_locked() has CMA || FS_DAX version and a common stub > > > version. In the preparation of

Re: [PATCH] drm/bridge: ti-sn65dsi86: Implement the pwm_chip

2020-12-10 Thread Uwe Kleine-König
On Thu, Dec 10, 2020 at 10:40:36PM +0800, Shawn Guo wrote: > Hi Uwe, > > On Thu, Dec 10, 2020 at 9:05 PM Uwe Kleine-König > wrote: > > > > @@ -111,6 +118,8 @@ > > > > > > > > #define SN_LINK_TRAINING_TRIES 10 > > > > > > > > +#define SN_PWM_GPIO3 > > > > > >

[PATCH v5 17/34] KVM: SVM: Create trace events for VMGEXIT MSR protocol processing

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky Add trace events for entry to and exit from VMGEXIT MSR protocol processing. The vCPU will be common for the trace events. The MSR protocol processing is guided by the GHCB GPA in the VMCB, so the GHCB GPA will represent the input and output values for the entry and exit

[PATCH v5 19/34] KVM: SVM: Support string IO operations for an SEV-ES guest

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky For an SEV-ES guest, string-based port IO is performed to a shared (un-encrypted) page so that both the hypervisor and guest can read or write to it and each see the contents. For string-based port IO operations, invoke SEV-ES specific routines that can complete the operation

[PATCH v5 12/34] KVM: SVM: Add initial support for a VMGEXIT VMEXIT

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky SEV-ES adds a new VMEXIT reason code, VMGEXIT. Initial support for a VMGEXIT includes mapping the GHCB based on the guest GPA, which is obtained from a new VMCB field, and then validating the required inputs for the VMGEXIT exit reason. Since many of the VMGEXIT exit reasons

[PATCH v5 14/34] KVM: SVM: Add support for SEV-ES GHCB MSR protocol function 0x002

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky The GHCB specification defines a GHCB MSR protocol using the lower 12-bits of the GHCB MSR (in the hypervisor this corresponds to the GHCB GPA field in the VMCB). Function 0x002 is a request to set the GHCB MSR value to the SEV INFO as per the specification via the VMCB GHCB

[PATCH v5 11/34] KVM: SVM: Prepare for SEV-ES exit handling in the sev.c file

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky This is a pre-patch to consolidate some exit handling code into callable functions. Follow-on patches for SEV-ES exit handling will then be able to use them from the sev.c file. Signed-off-by: Tom Lendacky --- arch/x86/kvm/svm/svm.c | 64

[PATCH v5 10/34] KVM: SVM: Cannot re-initialize the VMCB after shutdown with SEV-ES

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky When a SHUTDOWN VMEXIT is encountered, normally the VMCB is re-initialized so that the guest can be re-launched. But when a guest is running as an SEV-ES guest, the VMSA cannot be re-initialized because it has been encrypted. For now, just return -EINVAL to prevent a possible

[PATCH v5 15/34] KVM: SVM: Add support for SEV-ES GHCB MSR protocol function 0x004

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky The GHCB specification defines a GHCB MSR protocol using the lower 12-bits of the GHCB MSR (in the hypervisor this corresponds to the GHCB GPA field in the VMCB). Function 0x004 is a request for CPUID information. Only a single CPUID result register can be sent per

[PATCH v5 16/34] KVM: SVM: Add support for SEV-ES GHCB MSR protocol function 0x100

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky The GHCB specification defines a GHCB MSR protocol using the lower 12-bits of the GHCB MSR (in the hypervisor this corresponds to the GHCB GPA field in the VMCB). Function 0x100 is a request for termination of the guest. The guest has encountered some situation for which it

Re: [PATCH v2 2/3] firmware: scm: Add tracepoints to scm driver for pas calls

2020-12-10 Thread Bjorn Andersson
On Mon 16 Nov 15:44 CST 2020, Rishabh Bhatnagar wrote: > Add trace events to the qcom_scm driver to trace pas calls. > These events can help us analyze the time impact for each scm > operation and can also serve as standard checkpoints in code. > > Signed-off-by: Rishabh Bhatnagar > --- >

Re: [PATCH v2 1/6] aarch64: Fix missing BTI protection from dependencies [BZ #26926]

2020-12-10 Thread Adhemerval Zanella
On 27/11/2020 10:19, Szabolcs Nagy via Libc-alpha wrote: > The _dl_open_check and _rtld_main_check hooks are not called on the > dependencies of a loaded module, so BTI protection was missed on > every module other than the main executable and directly dlopened > libraries. > > The fix just

[PATCH v5 06/34] KVM: x86: Mark GPRs dirty when written

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky When performing VMGEXIT processing for an SEV-ES guest, register values will be synced between KVM and the GHCB. Prepare for detecting when a GPR has been updated (marked dirty) in order to determine whether to sync the register to the GHCB. Signed-off-by: Tom Lendacky ---

[PATCH] KVM: SVM: use vmsave/vmload for saving/restoring additional host state

2020-12-10 Thread Michael Roth
Using a guest workload which simply issues 'hlt' in a tight loop to generate VMEXITs, it was observed (on a recent EPYC processor) that a significant amount of the VMEXIT overhead measured on the host was the result of MSR reads/writes in svm_vcpu_load/svm_vcpu_put according to perf:

[PATCH] checkpatch: Fix "Missing a blank line after declarations" test on patches

2020-12-10 Thread Christophe JAILLET
"Missing a blank line after declarations" is not triggered on patches. Tweak the regex to match such cases. Signed-off-by: Christophe JAILLET --- This patch is mostly a PoC. I don't know enough about checkpatch.pl to be sure that the fix is the right thing to do. At least, it works for me :)

[PATCH v5 08/34] KVM: SVM: Prevent debugging under SEV-ES

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky Since the guest register state of an SEV-ES guest is encrypted, debugging is not supported. Update the code to prevent guest debugging when the guest has protected state. Additionally, an SEV-ES guest must only and always intercept DR7 reads and writes. Update

[PATCH v5 13/34] KVM: SVM: Create trace events for VMGEXIT processing

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky Add trace events for entry to and exit from VMGEXIT processing. The vCPU id and the exit reason will be common for the trace events. The exit info fields will represent the input and output values for the entry and exit events, respectively. Signed-off-by: Tom Lendacky ---

Re: [PATCH] net/netconsole: Support VLAN for netconsole

2020-12-10 Thread Florian Fainelli
On 12/10/2020 2:07 AM, Libing Zhou wrote: > During kernel startup phase, current netconsole doesn’t support VLAN > since there is no VLAN interface setup already. > > This patch provides VLAN ID and PCP as optional boot/module parameters > to support VLAN environment, thus kernel startup log

Re: [Intel-gfx] [PATCH v3 2/4] drm/i915/pmu: Use kstat_irqs to get interrupt count

2020-12-10 Thread Tvrtko Ursulin
On 10/12/2020 17:44, Thomas Gleixner wrote: On Thu, Dec 10 2020 at 17:09, Tvrtko Ursulin wrote: On 10/12/2020 16:35, Thomas Gleixner wrote: I'll send out a series addressing irq_to_desc() (ab)use all over the place shortly. i915 is in there... Yep we don't need atomic, my bad. And we would

Re: [PATCH 01/15] irqchip: Allow to compile bcmstb on other platforms

2020-12-10 Thread Marc Zyngier
Hi Maxime, On 2020-12-10 13:46, Maxime Ripard wrote: The BCM2711 uses a number of instances of the bcmstb-l2 controller in its display engine. Let's allow the driver to be enabled through KConfig. Signed-off-by: Maxime Ripard --- drivers/irqchip/Kconfig | 2 +- 1 file changed, 1

Re: [PATCH v2 07/12] x86: add new features for paravirt patching

2020-12-10 Thread Borislav Petkov
On Wed, Dec 09, 2020 at 01:22:24PM +0100, Jürgen Groß wrote: > Lets take the spin_unlock() case. With patch 11 of the series this is > > PVOP_ALT_VCALLEE1(lock.queued_spin_unlock, lock, > "movb $0, (%%" _ASM_ARG1 ");", > X86_FEATURE_NO_PVUNLOCK); > > which

Re: [PATCH v2 1/3] KVM: x86: implement KVM_{GET|SET}_TSC_STATE

2020-12-10 Thread Oliver Upton
On Thu, Dec 10, 2020 at 9:16 AM Andy Lutomirski wrote: > > > > > On Dec 10, 2020, at 6:52 AM, Maxim Levitsky wrote: > > > > On Thu, 2020-12-10 at 12:48 +0100, Paolo Bonzini wrote: > >>> On 08/12/20 22:20, Thomas Gleixner wrote: > >>> So now life migration comes a long time after timekeeping had

[PATCH] mfd: ab8500: Drop bm disable parameter

2020-12-10 Thread Linus Walleij
Nobody is passing the module parameter to disable the battery management portions so just drop this parameter. Signed-off-by: Linus Walleij --- drivers/mfd/ab8500-core.c | 20 ++-- 1 file changed, 6 insertions(+), 14 deletions(-) diff --git a/drivers/mfd/ab8500-core.c

Re: [PATCH 2/7] Revert "ACPI / OSI: Add OEM _OSI string to enable NVidia HDMI audio"

2020-12-10 Thread Lyude Paul
Hi, bumping the discussion again here because we just ran into this again, as we just had a laptop OEM try to fix another issue by adding an OSI check for these strings instead of helping us fix the issue in nouveau. Note as well the issue I'm referring to is entirely independent of runtime D3,

[PATCH v5 05/34] KVM: SVM: Add support for the SEV-ES VMSA

2020-12-10 Thread Tom Lendacky
From: Tom Lendacky Allocate a page during vCPU creation to be used as the encrypted VM save area (VMSA) for the SEV-ES guest. Provide a flag in the kvm_vcpu_arch structure that indicates whether the guest state is protected. When freeing a VMSA page that has been encrypted, the cache contents

  1   2   3   4   5   6   7   8   9   10   >