Re: [PATCH v5 2/4] KVM: async_pf: Add L1 guest async_pf #PF vmexit handler

2017-06-27 Thread Paolo Bonzini
On 27/06/2017 03:46, Wanpeng Li wrote: > From: Wanpeng Li > > This patch adds the L1 guest async page fault #PF vmexit handler, such > #PF is converted into vmexit from L2 to L1 on #PF which is then handled > by L1 similar to ordinary async page fault. > > Cc: Paolo

Re: [PATCH v4] drm/sun4i: hdmi: Implement I2C adapter for A10s DDC bus

2017-06-27 Thread Jonathan Liu
Hi Maxime, On 27 June 2017 at 05:05, Maxime Ripard wrote: > On Sat, Jun 24, 2017 at 04:10:54PM +1000, Jonathan Liu wrote: >> The documentation for drm_do_get_edid in drivers/gpu/drm/drm_edid.c states: >> "As in the general case the DDC bus is accessible by the

Re: [PATCH 2/2] x86/idle: use dynamic halt poll

2017-06-27 Thread Paolo Bonzini
On 27/06/2017 15:40, Radim Krčmář wrote: >> ... which is not necessarily _wrong_. It's just a different heuristic. > Right, it's just harder to use than host's single_task_running() -- the > VCPU calling vcpu_is_preempted() is never preempted, so we have to look > at other VCPUs that are not

Re: [RFC PATCH] mm, oom: allow oom reaper to race with exit_mmap

2017-06-27 Thread Michal Hocko
On Tue 27-06-17 22:31:58, Tetsuo Handa wrote: > Michal Hocko wrote: > > On Tue 27-06-17 20:39:28, Tetsuo Handa wrote: > > > Michal Hocko wrote: > > > > > I wonder why you prefer timeout based approach. Your patch will after > > > > > all > > > > > set MMF_OOM_SKIP if operations between

Re: [Devel] [RESEND PATCH v9 3/3] iommu/arm-smmu-v3: Add workaround for Cavium ThunderX2 erratum #126

2017-06-27 Thread Robert Richter
On 23.06.17 19:04:36, Geetha sowjanya wrote: > From: Geetha Sowjanya > > Cavium ThunderX2 SMMU doesn't support MSI and also doesn't have unique irq > lines for gerror, eventq and cmdq-sync. > > New named irq "combined" is set as a errata workaround, which allows

Re: [PATCH] tracing/kprobes: allow to create probe with a module name starting with a digit

2017-06-27 Thread Steven Rostedt
On Tue, 27 Jun 2017 17:38:30 +0900 Masami Hiramatsu wrote: > On Thu, 22 Jun 2017 11:24:42 +0200 > Sabrina Dubroca wrote: > > > Always try to parse an address, since kstrtoul() will safely fail when > > given a symbol as input. If that fails (which

[PATCH 4.9 00/44] 4.9.35-stable review

2017-06-27 Thread Greg Kroah-Hartman
This is the start of the stable review cycle for the 4.9.35 release. There are 44 patches in this series, all will be posted as a response to this one. If anyone has any issues with these being applied, please let me know. Responses should be made by Thu Jun 29 14:10:54 UTC 2017. Anything

Re: [PATCH v5] trace: ras: add ARM processor error information trace event

2017-06-27 Thread Steven Rostedt
On Tue, 27 Jun 2017 10:41:34 +0800 Xie XiuQi wrote: > Hi Steve, > > Thanks for your comments. > > On 2017/6/26 21:36, Steven Rostedt wrote: > > On Sat, 24 Jun 2017 11:38:23 +0800 > > Xie XiuQi wrote: > > > >> diff --git a/include/linux/cper.h

[PATCH 4.11 53/58] usb: gadget: f_fs: avoid out of bounds access on comp_desc

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: William Wu commit b7f73850bb4fac1e2209a4dd5e636d39be92f42c upstream. Companion descriptor is only used for SuperSpeed endpoints, if the endpoints are HighSpeed or

[PATCH 4.11 45/58] drm/radeon: add a quirk for Toshiba Satellite L20-183

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: Alex Deucher commit acfd6ee4fa7ebeee75511825fe02be3f7ac1d668 upstream. Fixes resume from suspend. bug: https://bugzilla.kernel.org/show_bug.cgi?id=196121

[PATCH 4.11 19/58] KVM: s390: gaccess: fix real-space designation asce handling for gmap shadows

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: Heiko Carstens commit addb63c18a0d52a9ce2611d039f981f7b6148d2b upstream. For real-space designation asces the asce origin part is only a token. The asce token

Re: [PATCH 1/2] x86/CPU/AMD: Present package as die instead of socket

2017-06-27 Thread Thomas Gleixner
On Tue, 27 Jun 2017, Suravee Suthikulpanit wrote: > On 6/27/17 17:48, Borislav Petkov wrote: > > On Tue, Jun 27, 2017 at 01:40:52AM -0500, Suravee Suthikulpanit wrote: > > > However, this is not the case on AMD family17h multi-die processor > > > platforms, which can have up to 4 dies per socket

[PATCH 4.11 52/58] drm: Fix GETCONNECTOR regression

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: Daniel Vetter commit e94ac3510b6a0f696f2c442c4fc4051c8101ef12 upstream. In commit 91eefc05f0ac71902906b2058360e61bd25137fe Author: Daniel Vetter

[PATCH 4.11 31/58] signal: Only reschedule timers on signals timers have sent

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: Eric W. Biederman commit 57db7e4a2d92c2d3dfbca4ef8057849b2682436b upstream. Thomas Gleixner wrote: > The CRIU support added a 'feature' which allows a user space task

[PATCH 4.11 50/58] ACPI / scan: Fix enumeration for special SPI and I2C devices

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: Jarkko Nikula commit e4330d8bf669139a983255d1801733b64c2ae841 upstream. Commit f406270bf73d ("ACPI / scan: Set the visited flag for all enumerated devices")

[PATCH 4.11 35/58] brcmfmac: add parameter to pass error code in firmware callback

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: Arend Van Spriel commit 6d0507a777fbc533f7f1bf5664a81982dd50dece upstream. Extend the parameters in the firmware callback so it can be called upon success and

[PATCH 4.11 33/58] powerpc/64s: Handle data breakpoints in Radix mode

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: Naveen N. Rao commit d89ba5353f301971dd7d2f9fdf25c4432728f38e upstream. On Power9, trying to use data breakpoints throws the splat shown below. This is

[PATCH 4.11 41/58] target: Fix kref->refcount underflow in transport_cmd_finish_abort

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: Nicholas Bellinger commit 73d4e580ccc5c3e05cea002f18111f66c9c07034 upstream. This patch fixes a se_cmd->cmd_kref underflow during CMD_T_ABORTED when a fabric driver

[PATCH 4.11 40/58] arm64/vdso: Fix nsec handling for CLOCK_MONOTONIC_RAW

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: Will Deacon commit dbb236c1ceb697a559e0694ac4c9e7b9131d0b16 upstream. Recently vDSO support for CLOCK_MONOTONIC_RAW was added in 49eea433b326 ("arm64: Add support for

[PATCH 4.11 03/58] clk: sunxi-ng: sun5i: Fix ahb_bist_clk definition

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: Boris Brezillon commit 370d9192719e6c174167888cf9240df2542e3b4b upstream. AHB BIST gate is actually controlled with bit 7. This bug was detected while

[PATCH 4.11 12/58] autofs: sanity check status reported with AUTOFS_DEV_IOCTL_FAIL

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: NeilBrown commit 9fa4eb8e490a28de40964b1b0e583d8db4c7e57c upstream. If a positive status is passed with the AUTOFS_DEV_IOCTL_FAIL ioctl, autofs4_d_automount() will return

[PATCH v2 03/15] staging: fsl-mc: drop useless #includes

2017-06-27 Thread laurentiu.tudor
From: Laurentiu Tudor These couple of header files are not needed in the source so remove them. Signed-off-by: Laurentiu Tudor --- v2: - no changes drivers/staging/fsl-mc/bus/fsl-mc-allocator.c | 2 -- 1 file changed, 2 deletions(-) diff

[PATCH v2 00/15] staging: fsl-mc: clean up header files

2017-06-27 Thread laurentiu.tudor
From: Laurentiu Tudor This patch series contain mainly clean-ups of the mc-bus header files with the final goal of reorganizing them in just 2 files: a public and a private one, as per GregKH suggestion [1]. Here's a summary of the header reorganizing: - existing mc.h

[PATCH 4.9 18/44] powerpc/kprobes: Pause function_graph tracing during jprobes handling

2017-06-27 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Naveen N. Rao commit a9f8553e935f26cb5447f67e280946b0923cd2dc upstream. This fixes a crash when function_graph and jprobes are used together. This is

[PATCH v2 02/15] staging: fsl-mc: be consistent when checking strcmp() return

2017-06-27 Thread laurentiu.tudor
From: Laurentiu Tudor Stick to one way of checking the return code of strcmp(): use '!'. This was suggested in a review comment. Signed-off-by: Laurentiu Tudor --- v2: - new patch drivers/staging/fsl-mc/bus/fsl-mc-allocator.c | 6 +++--- 1

[PATCH v2 01/15] staging: fsl-mc: move comparison before strcmp() call

2017-06-27 Thread laurentiu.tudor
From: Laurentiu Tudor Move comparison before the strcmp() in this if statement, and slightly increase efficiency by not making the strcmp() each time the if gets evaluated but only when the comparison is true. This was suggested in a review comment. Signed-off-by:

Re: [PATCH] kref: Avoid null pointer dereference after WARN

2017-06-27 Thread Andi Kleen
On Tue, Jun 27, 2017 at 01:00:16PM +0200, Jason A. Donenfeld wrote: > On Tue, Jun 27, 2017 at 09:06:26AM +0200, Greg Kroah-Hartman wrote: > > I remember one complaint was that WARN_ON was "huge" and this bloated > > the kernel code a lot. But then that got fixed up. Is BUG_ON going to > > cause

Re: [PATCH] x86/ftrace: Exclude functions in head64.c from function-tracing

2017-06-27 Thread Steven Rostedt
On Tue, 27 Jun 2017 17:44:03 +0300 "Kirill A. Shutemov" wrote: > On Tue, Jun 27, 2017 at 09:38:25AM -0400, Steven Rostedt wrote: > > On Tue, 27 Jun 2017 14:59:48 +0300 > > "Kirill A. Shutemov" wrote: > > > > > We've moved most logic of

Re: [PATCH v2] binfmt_elf: Use ELF_ET_DYN_BASE only for PIE

2017-06-27 Thread Michal Hocko
On Wed 21-06-17 10:32:01, Kees Cook wrote: > The ELF_ET_DYN_BASE position was originally intended to keep loaders > away from ET_EXEC binaries. (For example, running "/lib/ld-linux.so.2 > /bin/cat" might cause the subsequent load of /bin/cat into where the > loader had been loaded.) With the

Re: [PATCH V2 2/2] rt: Increase/decrease the nr of migratory tasks when enabling/disabling migration

2017-06-27 Thread Henri Roosen
On 06/26/2017 05:07 PM, Daniel Bristot de Oliveira wrote: There is a problem in the migrate_disable()/enable() implementation regarding the number of migratory tasks in the rt/dl RQs. The problem is the following: When a task is attached to the rt runqueue, it is checked if it either can run in

[PATCH v8 01/38] x86: Document AMD Secure Memory Encryption (SME)

2017-06-27 Thread Tom Lendacky
Create a Documentation entry to describe the AMD Secure Memory Encryption (SME) feature and add documentation for the mem_encrypt= kernel parameter. Reviewed-by: Borislav Petkov Signed-off-by: Tom Lendacky ---

Re: [PATCH 4/4] sched,fair: remove effective_load

2017-06-27 Thread Rik van Riel
On Tue, 2017-06-27 at 07:39 +0200, Peter Zijlstra wrote: > On Mon, Jun 26, 2017 at 03:34:49PM -0400, Rik van Riel wrote: > > On Mon, 2017-06-26 at 18:12 +0200, Peter Zijlstra wrote: > > > On Mon, Jun 26, 2017 at 11:20:54AM -0400, Rik van Riel wrote: > > > > > > > Oh, indeed.  I guess in

Re: [PATCH] perf jit: fix typo: "incalid" -> "invalid"

2017-06-27 Thread Colin Ian King
On 27/06/17 15:54, Arnaldo Carvalho de Melo wrote: > Em Tue, Jun 27, 2017 at 01:49:17PM +0100, Colin King escreveu: >> From: Colin Ian King >> >> Trivial fix to typo in mlx4_dbg warnx warning message > > Was this coccinele'd or otherwise automated? Would be nice to have

[PATCH v8 10/38] x86/mm: Provide general kernel support for memory encryption

2017-06-27 Thread Tom Lendacky
Changes to the existing page table macros will allow the SME support to be enabled in a simple fashion with minimal changes to files that use these macros. Since the memory encryption mask will now be part of the regular pagetable macros, we introduce two new macros (_PAGE_TABLE_NOENC and

Re: [Devel] [RESEND PATCH v9 3/3] iommu/arm-smmu-v3: Add workaround for Cavium ThunderX2 erratum #126

2017-06-27 Thread Geetha Akula
On Tue, Jun 27, 2017 at 7:36 PM, Will Deacon wrote: > On Tue, Jun 27, 2017 at 03:56:10PM +0200, Robert Richter wrote: >> On 23.06.17 19:04:36, Geetha sowjanya wrote: >> > From: Geetha Sowjanya >> > >> > Cavium ThunderX2 SMMU doesn't support

[PATCH v8 11/38] x86/mm: Add SME support for read_cr3_pa()

2017-06-27 Thread Tom Lendacky
The cr3 register entry can contain the SME encryption mask that indicates the PGD is encrypted. The encryption mask should not be used when creating a virtual address from the cr3 register, so remove the SME encryption mask in the read_cr3_pa() function. During early boot SME will need to use a

Re: [PATCH 00/32] tracing: Inter-event (e.g. latency) support

2017-06-27 Thread Steven Rostedt
On Mon, 26 Jun 2017 17:49:00 -0500 Tom Zanussi wrote: > This patchset adds support for 'inter-event' quantities to the trace > event subsystem. The most important example of inter-event quantities > are latencies, or the time differences between two events. > Hi

[PATCH v8 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()

2017-06-27 Thread Tom Lendacky
Currently there is a check if the address being mapped is in the ISA range (is_ISA_range()), and if it is, then phys_to_virt() is used to perform the mapping. When SME is active, the default is to add pagetable mappings with the encryption bit set unless specifically overridden. The resulting

[PATCH v8 12/38] x86/mm: Extend early_memremap() support with additional attrs

2017-06-27 Thread Tom Lendacky
Add early_memremap() support to be able to specify encrypted and decrypted mappings with and without write-protection. The use of write-protection is necessary when encrypting data "in place". The write-protect attribute is considered cacheable for loads, but not stores. This implies that the

[PATCH v8 RESEND 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()

2017-06-27 Thread Tom Lendacky
Currently there is a check if the address being mapped is in the ISA range (is_ISA_range()), and if it is, then phys_to_virt() is used to perform the mapping. When SME is active, the default is to add pagetable mappings with the encryption bit set unless specifically overridden. The resulting

[PATCH v8 RESEND 00/38] x86: Secure Memory Encryption (AMD)

2017-06-27 Thread Tom Lendacky
RESENDING - Mail Server Issues This patch series provides support for AMD's new Secure Memory Encryption (SME) feature. SME can be used to mark individual pages of memory as encrypted through the page tables. A page of memory that is marked encrypted will be automatically decrypted when read

[PATCH v8 RESEND 10/38] x86/mm: Provide general kernel support for memory encryption

2017-06-27 Thread Tom Lendacky
Changes to the existing page table macros will allow the SME support to be enabled in a simple fashion with minimal changes to files that use these macros. Since the memory encryption mask will now be part of the regular pagetable macros, we introduce two new macros (_PAGE_TABLE_NOENC and

[PATCH v8 RESEND 05/38] x86/CPU/AMD: Handle SME reduction in physical address size

2017-06-27 Thread Tom Lendacky
When System Memory Encryption (SME) is enabled, the physical address space is reduced. Adjust the x86_phys_bits value to reflect this reduction. Reviewed-by: Borislav Petkov Signed-off-by: Tom Lendacky --- arch/x86/kernel/cpu/amd.c | 10 +++--- 1

[PATCH v8 RESEND 16/38] efi: Add an EFI table address match function

2017-06-27 Thread Tom Lendacky
Add a function that will determine if a supplied physical address matches the address of an EFI table. Reviewed-by: Matt Fleming Reviewed-by: Borislav Petkov Signed-off-by: Tom Lendacky --- drivers/firmware/efi/efi.c | 33

[PATCH v8 RESEND 11/38] x86/mm: Add SME support for read_cr3_pa()

2017-06-27 Thread Tom Lendacky
The cr3 register entry can contain the SME encryption mask that indicates the PGD is encrypted. The encryption mask should not be used when creating a virtual address from the cr3 register, so remove the SME encryption mask in the read_cr3_pa() function. During early boot SME will need to use a

Re: [PATCH NET V5 2/2] net: hns: Use phy_driver to setup Phy loopback

2017-06-27 Thread Andrew Lunn
> >> - phy_write(phy_dev, COPPER_CONTROL_REG, val); > >> + err = phy_resume(phy_dev); > > > > Maybe this was discussed with an earlier version of these patches. Why > > are using phy_resume() and phy_suspend()? > When self_test is invoked with ETH_TEST_FL_OFFLINE option, hns mac

Re: [PATCH 3.2 0/4] 3.2.90-rc1 review

2017-06-27 Thread Guenter Roeck
On 06/27/2017 04:09 AM, Ben Hutchings wrote: This is the start of the stable review cycle for the 3.2.90 release. There are 4 patches in this series, which will be posted as responses to this one. If anyone has any issues with these being applied, please let me know. Responses should be made

Re: [PATCH 2/2] x86/idle: use dynamic halt poll

2017-06-27 Thread Radim Krčmář
2017-06-27 14:28+0200, Paolo Bonzini: > On 27/06/2017 14:23, Wanpeng Li wrote: > I have considered single_task_running() before. But since there is no > such paravirtual interface currently and i am not sure whether it is a > information leak from host if introducing such interface, so

[PATCH net-next 3/3] net: ethernet: ti: netcp_ethss: use cpts to check if packet needs timestamping

2017-06-27 Thread Ivan Khoronzhuk
There is cpts function to check if packet can be timstamped with cpts. Seems that ptp_classify_raw cover all cases listed with "case". Signed-off-by: Ivan Khoronzhuk --- drivers/net/ethernet/ti/netcp_ethss.c | 18 +- 1 file changed, 1 insertion(+), 17

[PATCH net-next 0/3] fix sw timestamping for non PTP packets

2017-06-27 Thread Ivan Khoronzhuk
This series contains several corrections connected with timestamping for cpsw and netcp drivers based on same cpts module. Based on net/next Ivan Khoronzhuk (3): net: ethernet: ti: cpsw: move skb timestamp to packet_submit net: ethernet: ti: cpsw: fix sw timestamping for non PTP packets

[PATCH 4.11 01/58] clk: sunxi-ng: a31: Correct lcd1-ch1 clock register offset

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: Chen-Yu Tsai commit 38b8f823864707eb1cf331d2247608c419ed388c upstream. The register offset for the lcd1-ch1 clock was incorrectly pointing to the lcd0-ch1 clock. This resulted

[PATCH 4.11 11/58] powerpc/perf: Fix oops when kthread execs user process

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: Ravi Bangoria commit bf05fc25f268cd62f147f368fe65ad3e5b04fe9f upstream. When a kthread calls call_usermodehelper() the steps are: 1. allocate current->mm

[PATCH 4.9 41/44] spi: double time out tolerance

2017-06-27 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Hauke Mehrtens commit 833bfade96561216aa2129516a5926a0326860a2 upstream. The generic SPI code calculates how long the issued transfer would take and adds 100ms in addition to

[PATCH 4.9 43/44] jump label: fix passing kbuild_cflags when checking for asm goto support

2017-06-27 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Gleb Fotengauer-Malinovskiy commit 7292ae3d5a18fb922be496e6bb687647193569b4 upstream. The latest change of asm goto support check added passing of KBUILD_CFLAGS to

[PATCH 4.9 44/44] brcmfmac: fix uninitialized warning in brcmf_usb_probe_phase2()

2017-06-27 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Arend Van Spriel commit 35abcd4f9f303ac4f10f99b3f7e993e5f2e6fa37 upstream. This fixes the following warning:

[PATCH 4.11 39/58] time: Fix CLOCK_MONOTONIC_RAW sub-nanosecond accounting

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: John Stultz commit 3d88d56c5873f6eebe23e05c3da701960146b801 upstream. Due to how the MONOTONIC_RAW accumulation logic was handled, there is the potential for a 1ns

[PATCH 4.11 22/58] KVM: PPC: Book3S HV: Ignore timebase offset on POWER9 DD1

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: Paul Mackerras commit 3d3efb68c19e539f0535c93a5258c1299270215f upstream. POWER9 DD1 has an erratum where writing to the TBU40 register, which is used to apply an offset to

Re: [PATCH 4.9 031/108] jump label: pass kbuild_cflags when checking for asm goto support

2017-06-27 Thread Greg Kroah-Hartman
On Tue, Jun 27, 2017 at 01:44:06PM +, Levin, Alexander (Sasha Levin) wrote: > On Tue, Jun 27, 2017 at 01:33:42PM +0200, Greg Kroah-Hartman wrote: > >On Mon, Jun 19, 2017 at 06:29:18PM +0300, Gleb Fotengauer-Malinovskiy wrote: > >> On Thu, Jun 15, 2017 at 07:52:37PM +0200, Greg Kroah-Hartman

[PATCH 4.11 54/58] spi: double time out tolerance

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: Hauke Mehrtens commit 833bfade96561216aa2129516a5926a0326860a2 upstream. The generic SPI code calculates how long the issued transfer would take and adds 100ms in addition

[PATCH 4.11 57/58] netfilter: xtables: fix build failure from COMPAT_XT_ALIGN outside CONFIG_COMPAT

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: Willem de Bruijn commit 751a9c763849f5859cb69ea44b0430d00672f637 upstream. The patch in the Fixes references COMPAT_XT_ALIGN in the definition of XT_DATA_TO_USER, outside

[PATCH 4.11 14/58] lib/cmdline.c: fix get_options() overflow while parsing ranges

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: Ilya Matveychikov commit a91e0f680bcd9e10c253ae8b62462a38bd48f09f upstream. When using get_options() it's possible to specify a range of numbers, like 1-100500. The

[PATCH 4.11 38/58] time: Fix clock->read(clock) race around clocksource changes

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: John Stultz commit ceea5e3771ed2378668455fa21861bead7504df5 upstream. In tests, which excercise switching of clocksources, a NULL pointer dereference can be observed

[PATCH 4.11 06/58] ALSA: firewire-lib: Fix stall of process context at packet error

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: Takashi Sakamoto commit 4a9bfafc64f44ef83de4e00ca1b57352af6cd8c2 upstream. At Linux v3.5, packet processing can be done in process context of ALSA PCM application as

[PATCH 4.11 10/58] fs/exec.c: account for argv/envp pointers

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: Kees Cook commit 98da7d08850fb8bdeb395d6368ed15753304aa0c upstream. When limiting the argv/envp strings during exec to 1/4 of the stack limit, the storage of the

[PATCH 4.11 13/58] fs/dax.c: fix inefficiency in dax_writeback_mapping_range()

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: Jan Kara commit 1eb643d02b21412e603b42cdd96010a2ac31c05f upstream. dax_writeback_mapping_range() fails to update iteration index when searching radix tree for entries needing

[PATCH 4.11 05/58] xen-blkback: dont leak stack data via response ring

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: Jan Beulich commit 089bc0143f489bd3a4578bdff5f4ca68fb26f341 upstream. Rather than constructing a local structure instance on the stack, fill the fields directly on the

[PATCH 4.11 02/58] clk: sunxi-ng: v3s: Fix usb otg device reset bit

2017-06-27 Thread Greg Kroah-Hartman
4.11-stable review patch. If anyone has any objections, please let me know. -- From: Yong Deng commit 7ffc781ec46ef1e9aedb482f5f04425bd8bb2753 upstream. V3S's usb otg device reset bit should be 24, not 23. Signed-off-by: Yong Deng

[PATCH 4.9 29/44] iscsi-target: Reject immediate data underflow larger than SCSI transfer length

2017-06-27 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Nicholas Bellinger commit abb85a9b512e8ca7ad04a5a8a6db9664fe644974 upstream. When iscsi WRITE underflow occurs there are two different scenarios that can happen.

Re: [PATCH 05/11] net: stmmac: dwmac-rk: Add internal phy support

2017-06-27 Thread David.Wu
Hi Heiko, 在 2017/6/24 1:19, Heiko Stuebner 写道: Hi David, Am Freitag, 23. Juni 2017, 12:59:07 CEST schrieb David Wu: To make internal phy worked, need to configure the phy_clock, phy cru_reset and related registers. Change-Id: I6971c0a769754b824b1b908b56080cbaf7867d13 please remove all

[PATCH 4.9 26/44] arm64/vdso: Fix nsec handling for CLOCK_MONOTONIC_RAW

2017-06-27 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Will Deacon commit dbb236c1ceb697a559e0694ac4c9e7b9131d0b16 upstream. Recently vDSO support for CLOCK_MONOTONIC_RAW was added in 49eea433b326 ("arm64: Add support for

[PATCH 4.9 28/44] iscsi-target: Fix delayed logout processing greater than SECONDS_FOR_LOGOUT_COMP

2017-06-27 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Nicholas Bellinger commit 105fa2f44e504c830697b0c794822112d79808dc upstream. This patch fixes a BUG() in iscsit_close_session() that could be triggered when

[PATCH 4.9 30/44] drm/radeon: add a PX quirk for another K53TK variant

2017-06-27 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Alex Deucher commit 4eb59793cca00b0e629b6d55b5abb5acb82c5868 upstream. Disable PX on these systems. bug: https://bugs.freedesktop.org/show_bug.cgi?id=101491

[PATCH 4.9 09/44] lib/cmdline.c: fix get_options() overflow while parsing ranges

2017-06-27 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Ilya Matveychikov commit a91e0f680bcd9e10c253ae8b62462a38bd48f09f upstream. When using get_options() it's possible to specify a range of numbers, like 1-100500. The

[PATCH 4.9 35/44] of: Add check to of_scan_flat_dt() before accessing initial_boot_params

2017-06-27 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Tobias Wolf commit 3ec754410cb3e931a6c4920b1a150f21a94a2bf4 upstream. An empty __dtb_start to __dtb_end section might result in initial_boot_params being null for

[PATCH 4.9 06/44] fs/exec.c: account for argv/envp pointers

2017-06-27 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Kees Cook commit 98da7d08850fb8bdeb395d6368ed15753304aa0c upstream. When limiting the argv/envp strings during exec to 1/4 of the stack limit, the storage of the

[PATCH v2 07/15] staging: fsl-mc: turn several exported functions static

2017-06-27 Thread laurentiu.tudor
From: Laurentiu Tudor They are never used outside the source they are implemented in and very likely never will, so it's safe to make them static. Signed-off-by: Laurentiu Tudor --- v2: - no changes drivers/staging/fsl-mc/bus/dprc-driver.c |

[PATCH v2 04/15] staging: fsl-mc: decouple the mc-bus public headers from dprc.h

2017-06-27 Thread laurentiu.tudor
From: Laurentiu Tudor In its current form, the public headers of the mc-bus depend only on a structure "dprc_obj_desc" defined in dprc.h. Move it to the bus public header together with its associated defines and, in order to keep the naming prefixes consistent rename it

[PATCH v2 06/15] staging: fsl-mc: delete prototype of unimplemented function

2017-06-27 Thread laurentiu.tudor
From: Laurentiu Tudor The function fsl_mc_bus_exists() has a prototype but is never implemented so delete it from the header file. Signed-off-by: Laurentiu Tudor --- v2: - no changes drivers/staging/fsl-mc/include/mc-bus.h | 2 -- 1 file

[PATCH v2 08/15] staging: fsl-mc: move irq domain creation prototype to public header

2017-06-27 Thread laurentiu.tudor
From: Laurentiu Tudor fsl_mc_msi_create_irq_domain() will is used from the irqchip glue code so it needs to be in the public headers. Signed-off-by: Laurentiu Tudor --- v2: - no changes drivers/staging/fsl-mc/include/mc-bus.h | 7 ---

[PATCH v2 05/15] staging: fsl-mc: delete duplicated function prototypes

2017-06-27 Thread laurentiu.tudor
From: Laurentiu Tudor These functions already have their prototypes in fsl-mc-private.h header file so delete them from mc-bus.h. Signed-off-by: Laurentiu Tudor --- v2: - no changes drivers/staging/fsl-mc/include/mc-bus.h | 8 1

[PATCH v2 13/15] staging: fsl-mc: move mc-sys.h contents in the public header

2017-06-27 Thread laurentiu.tudor
From: Laurentiu Tudor mc-sys.h contains the API to send commands to the MC and is used by drivers. Move it to the public headers and get rid of the mc-sys.h header. Signed-off-by: Laurentiu Tudor --- v2: - no changes

[PATCH v2 11/15] staging: fsl-mc: remove dpmng API files

2017-06-27 Thread laurentiu.tudor
From: Laurentiu Tudor dpmng.h & dpmng.c files expose an API of just one function which is only used by the bus driver. Move that single API in the bus source as static and remove the two files. Signed-off-by: Laurentiu Tudor --- v2: - fix

[PATCH v2 10/15] staging: fsl-mc: move rest of mc-bus.h to private header

2017-06-27 Thread laurentiu.tudor
From: Laurentiu Tudor All the mc-bus.h contents is only used privately in the bus driver so move everything to the private header and get rid of the mc-bus.h header file. Signed-off-by: Laurentiu Tudor --- v2: - no changes

[PATCH v2 12/15] staging: fsl-mc: fix a few implicit includes

2017-06-27 Thread laurentiu.tudor
From: Laurentiu Tudor Few files using byte order macros but did not explicitly included the required kernel header, so add it. Signed-off-by: Laurentiu Tudor --- v2: - no changes drivers/staging/fsl-mc/bus/dpbp.c | 1 +

Re: [RFC][PATCHv3 5/5] printk: register PM notifier

2017-06-27 Thread Petr Mladek
On Wed 2017-05-31 15:42:24, Sergey Senozhatsky wrote: > On (05/30/17 11:55), Petr Mladek wrote: > > BTW: Do you know about some locations that would need to be > > patched explicitly, for example, kexec? > > a tricky question and I need to think more. I'm a bit overloaded > with some other stuff

Re: [PATCH 1/2] iommu/dma: Respect __GFP_DMA and __GFP_DMA32 in incoming GFP flags

2017-06-27 Thread Robin Murphy
On 27/06/17 13:44, Tomasz Figa wrote: > On Tue, Jun 27, 2017 at 9:26 PM, Robin Murphy wrote: >> On 27/06/17 12:17, Tomasz Figa wrote: >>> On Tue, Jun 27, 2017 at 8:01 PM, Robin Murphy wrote: On 27/06/17 08:28, Tomasz Figa wrote: > Current

Re: [PATCH 2/3] mtd: spi-nor: core code for the Altera Quadspi Flash Controller v2

2017-06-27 Thread matthew . gerlach
On Tue, 27 Jun 2017, Marek Vasut wrote: Hi Marek, Thanks again for the valuable feedback. See my comments below. Matthew Gerlach On 06/26/2017 06:13 PM, matthew.gerl...@linux.intel.com wrote: From: Matthew Gerlach Signed-off-by: Matthew Gerlach

[PATCH v8 06/38] x86/mm: Add Secure Memory Encryption (SME) support

2017-06-27 Thread Tom Lendacky
Add support for Secure Memory Encryption (SME). This initial support provides a Kconfig entry to build the SME support into the kernel and defines the memory encryption mask that will be used in subsequent patches to mark pages as encrypted. Reviewed-by: Borislav Petkov

Re: [PATCH] x86/insn: perf tools: Add new ptwrite instruction

2017-06-27 Thread Arnaldo Carvalho de Melo
Em Thu, Jun 22, 2017 at 09:37:37AM +0300, Adrian Hunter escreveu: > On 19/05/17 17:28, Masami Hiramatsu wrote: > > On Fri, 19 May 2017 10:50:30 +0300 > > Adrian Hunter wrote: > > > >> Add ptwrite to the op code map and the perf tools new instructions test. > >> To run

[PATCH v8 09/38] x86/mm: Simplify p[g4um]d_page() macros

2017-06-27 Thread Tom Lendacky
Create a pgd_pfn() macro similar to the p[4um]d_pfn() macros and then use the p[g4um]d_pfn() macros in the p[g4um]d_page() macros instead of duplicating the code. Reviewed-by: Borislav Petkov Signed-off-by: Tom Lendacky --- arch/x86/include/asm/pgtable.h

[PATCH v6 0/3] ADV748x HDMI/Analog video receiver

2017-06-27 Thread Kieran Bingham
From: Kieran Bingham This is a driver for the Analog Devices ADV748x device, and follows on from a previous posting by Niklas Söderlund [0] of an earlier incarnation of this driver, and earlier versions posted by myself. ADV748x === The ADV7481 and

[PATCH v6 1/3] media: adv748x: Add adv7181, adv7182 bindings

2017-06-27 Thread Kieran Bingham
From: Kieran Bingham Create device tree bindings documentation for the ADV748x. The ADV748x supports both the ADV7481 and ADV7482 chips which provide analogue decoding and HDMI receiving capabilities Signed-off-by: Kieran Bingham

[PATCH 2/3] [media] venus: don't abuse dma_alloc for non-DMA allocations

2017-06-27 Thread Arnd Bergmann
In venus_boot(), we pass a pointer to a phys_addr_t into dmam_alloc_coherent, which the compiler warns about: platform/qcom/venus/firmware.c: In function 'venus_boot': platform/qcom/venus/firmware.c:63:49: error: passing argument 3 of 'dmam_alloc_coherent' from incompatible pointer type

[PATCH v8 RESEND 01/38] x86: Document AMD Secure Memory Encryption (SME)

2017-06-27 Thread Tom Lendacky
Create a Documentation entry to describe the AMD Secure Memory Encryption (SME) feature and add documentation for the mem_encrypt= kernel parameter. Reviewed-by: Borislav Petkov Signed-off-by: Tom Lendacky ---

Re: [PATCH 01/11] net: phy: Add rockchip phy driver support

2017-06-27 Thread David.Wu
Hi Andrew, 在 2017/6/27 22:46, Andrew Lunn 写道: it has been licensed from somebody. And does that somebody already have a driver for it? There is no point adding a driver, if all you need to do is add the ID to another driver. I didn't find it. Maybe use the same, but the configuration is

[PATCH v8 RESEND 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature

2017-06-27 Thread Tom Lendacky
Update the CPU features to include identifying and reporting on the Secure Memory Encryption (SME) feature. SME is identified by CPUID 0x801f, but requires BIOS support to enable it (set bit 23 of MSR_K8_SYSCFG). Only show the SME feature as available if reported by CPUID and enabled by

[PATCH] x86: fix fortified memcpy

2017-06-27 Thread Arnd Bergmann
__memcpy3d is not available when CONFIG_FORTIFY_SOURCE is enabled, leading to a link error on 32-bit kernels: arch/x86/lib/memcpy_32.c: In function 'memcpy': arch/x86/lib/memcpy_32.c:10:9: error: implicit declaration of function '__memcpy3d'; did you mean '__memcpy'?

Re: [PATCH] KVM: Replaces 'unsigned' with 'unsigned int' in the codebase

2017-06-27 Thread Roman Storozhenko
On Tue, Jun 27, 2017 at 05:21:30AM -0700, Joe Perches wrote: > On Tue, 2017-06-27 at 15:06 +0300, Roman Storozhenko wrote: > > On Tue, Jun 27, 2017 at 12:01:25PM +0200, Paolo Bonzini wrote: > > > On 27/06/2017 11:54, Roman Storozhenko wrote: > > > > Signed-off-by: Roman Storozhenko

Re: [RFC PATCH] mm, oom: allow oom reaper to race with exit_mmap

2017-06-27 Thread Tetsuo Handa
Michal Hocko wrote: > On Tue 27-06-17 20:39:28, Tetsuo Handa wrote: > > Michal Hocko wrote: > > > > I wonder why you prefer timeout based approach. Your patch will after > > > > all > > > > set MMF_OOM_SKIP if operations between down_write() and up_write() took > > > > more than one second. > > >

Re: [PATCH] drm/i915: Fix an error checking test

2017-06-27 Thread Chris Wilson
Quoting Christophe JAILLET (2017-06-27 06:38:54) > 'dma_buf_vmap' returns NULL on error, not an error pointer. > > Fixes: 6cca22ede8a4 ("drm/i915: Add some mock tests for dmabuf interop") > Signed-off-by: Christophe JAILLET Thanks for the fix, reviewed and pushed.

  1   2   3   4   5   6   7   8   9   10   >