Re: [PATCH v5 02/11] xfs, dax: introduce xfs_dax_aops

2018-03-11 Thread Dan Williams
On Sat, Mar 10, 2018 at 9:40 AM, Dan Williams wrote: > On Sat, Mar 10, 2018 at 1:46 AM, Christoph Hellwig wrote: >>> +int dax_set_page_dirty(struct page *page) >>> +{ >>> + /* >>> + * Unlike __set_page_dirty_no_writeback that handles dirty page >>>

Re: [PATCH 0/2] mtd: use put_device() if device_register fail

2018-03-11 Thread Richard Weinberger
Am Freitag, 9. März 2018, 11:50:47 CET schrieb Arvind Yadav: > if device_register() returned an error! Always use put_device() > to give up the reference initialized. > > Arvind Yadav (2): > [PATCH 1/2] mtd: use put_device() if device_register fail > [PATCH 2/2] mtd: ubi: use put_device() if

[PATCH v5 4/4] HID: steam: add battery device.

2018-03-11 Thread Rodrigo Rivas Costa
The wireless Steam Controller is battery operated, so add the battery device and power information. Signed-off-by: Rodrigo Rivas Costa --- drivers/hid/hid-steam.c | 141 +++- 1 file changed, 140 insertions(+), 1

[PATCH v5 1/4] HID: add driver for Valve Steam Controller

2018-03-11 Thread Rodrigo Rivas Costa
There are two ways to connect the Steam Controller: directly to the USB or with the USB wireless adapter. Both methods are similar, but the wireless adapter can connect up to 4 devices at the same time. The wired device will appear as 3 interfaces: a virtual mouse, a virtual keyboard and a

[PATCH v5 2/4] HID: steam: add serial number information.

2018-03-11 Thread Rodrigo Rivas Costa
This device has a feature report to send and receive commands. Use it to get the serial number and set the device's uniq value. Signed-off-by: Rodrigo Rivas Costa --- drivers/hid/hid-steam.c | 108 ++-- 1 file changed, 105

[PATCH v5 3/4] HID: steam: command to check wireless connection

2018-03-11 Thread Rodrigo Rivas Costa
The wireless adaptor does not tell if a device is already connected when steam_probe() is run. Use a command to request the connection status. Signed-off-by: Rodrigo Rivas Costa --- drivers/hid/hid-steam.c | 16 1 file changed, 16 insertions(+)

[PATCH v5 0/4] new driver for Valve Steam Controller

2018-03-11 Thread Rodrigo Rivas Costa
This patchset implements a driver for Valve Steam Controller, based on a reverse analysis by myself. Sorry, I've been out of town for a few weeks and couldn't keep up with this... @Pierre-Loup and @Clément, could you please have another look at this and check if it is worthy? Benjamin will not

Re: [PATCH v8 1/6] arch: enable relative relocations for arm64, power and x86

2018-03-11 Thread Linus Torvalds
On Sun, Mar 11, 2018 at 5:38 AM, Ard Biesheuvel wrote: > Before updating certain subsystems to use place relative 32-bit > relocations in special sections, to save space and reduce the > number of absolute relocations that need to be processed at runtime > by

Re: [PATCH] kbuild: check for pkg-config on make menu/n/g/xconfig

2018-03-11 Thread Bjørn Forsman
On 11 March 2018 at 21:12, Randy Dunlap wrote: > +pkgcfg=`which pkg-config >/dev/null 2>&1` Please use "command -v" instead of "which". command -v is in POSIX, so the shell will have it for sure (builtin). which is not a builtin, it is an external command that may or may

[PATCH] net: llc: drop VLA in llc_sap_mcast()

2018-03-11 Thread Salvatore Mesoraca
Avoid a VLA[1] by using a real constant expression instead of a variable. The compiler should be able to optimize the original code and avoid using an actual VLA. Anyway this change is useful because it will avoid a false positive with -Wvla, it might also help the compiler generating better code.

Re: [RFC] netfilter: cttimeout: remove VLA in ctnl_timeout_parse_policy

2018-03-11 Thread Pablo Neira Ayuso
On Sun, Mar 11, 2018 at 05:12:09PM -0500, Gustavo A. R. Silva wrote: > Hi Pablo, > > On 03/11/2018 05:04 PM, Pablo Neira Ayuso wrote: > > On Tue, Mar 06, 2018 at 12:47:55PM -0600, Gustavo A. R. Silva wrote: > > > In preparation to enabling -Wvla, remove VLA and replace it > > > with dynamic

DID YOU AUTHORIZE ANY ONE TO CLAIM YOUR FUND?.

2018-03-11 Thread EDU ILO
Dear Beneficiary, This is to inform you that your overdue inheritance/contract funds $15.5M has been approved, meanwhile,two men and an attorney came to my office few days ago with a letter,claiming to be from you,if you do reconfirm to this office your full name/address, your phone, fax and ID

Re: [PATCH v2] net: netfilter: Replace printk() with appropriate pr_*() macro

2018-03-11 Thread Pablo Neira Ayuso
On Mon, Mar 12, 2018 at 03:56:15AM +0530, Arushi Singhal wrote: > On Mon, Mar 12, 2018 at 2:17 AM, Pablo Neira Ayuso > wrote: > > > Hi Joe, > > > > On Sun, Mar 11, 2018 at 12:52:41PM -0700, Joe Perches wrote: > > > On Mon, 2018-03-12 at 01:11 +0530, Arushi Singhal wrote: > >

[patch] mm, page_alloc: wakeup kcompactd even if kswapd cannot free more memory

2018-03-11 Thread David Rientjes
Kswapd will not wakeup if per-zone watermarks are not failing or if too many previous attempts at background reclaim have failed. This can be true if there is a lot of free memory available. For high- order allocations, kswapd is responsible for waking up kcompactd for background compaction. If

Re: [PATCH v12 0/6] Address error and recovery for AER and DPC

2018-03-11 Thread Sinan Kaya
On 3/11/2018 6:03 PM, Bjorn Helgaas wrote: > On Wed, Feb 28, 2018 at 10:34:11PM +0530, Oza Pawandeep wrote: > That difference has been there since the beginning of DPC, so it has > nothing to do with *this* series EXCEPT for the fact that it really > complicates the logic you're adding to

[PATCH 3.16 10/76] sysfs/cpu: Add vulnerability folder

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit 87590ce6e373d1a5401f6539f0c59ef92dd924a9 upstream. As the meltdown/spectre problem affects several CPU architectures, it makes sense to have common

[PATCH 3.16 71/76] x86: reorganize SMAP handling in user space accesses

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Linus Torvalds commit 11f1a4b9755f5dbc3e822a96502ebe9b044b14d8 upstream. This reorganizes how we do the stac/clac instructions in the user access code. Instead

[PATCH 3.16 61/76] x86/paravirt: Remove 'noreplace-paravirt' cmdline option

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Josh Poimboeuf commit 12c69f1e94c89d40696e83804dd2f0965b5250cd upstream. The 'noreplace-paravirt' option disables paravirt patching, leaving the original pv indirect

[PATCH 3.16 68/76] nospec: Move array_index_nospec() parameter checking into separate macro

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Will Deacon commit 8fa80c503b484ddc1abbd10c7cb2ab81f3824a50 upstream. For architectures providing their own implementation of array_index_mask_nospec() in asm/barrier.h,

[PATCH 3.16 04/76] x86/cpufeatures: Make CPU bugs sticky

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit 6cbd2171e89b13377261d15e64384df60ecb530e upstream. There is currently no way to force CPU bug bits like CPU feature bits. That makes it impossible

[PATCH 3.16 76/76] x86: fix build warnign with 32-bit PAE

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Arnd Bergmann I ran into a 4.9 build warning in randconfig testing, starting with the KAISER patches: arch/x86/kernel/ldt.c: In function 'alloc_ldt_struct':

[PATCH 3.16 11/76] x86/cpu: Implement CPU vulnerabilites sysfs functions

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit 61dc0f555b5c761cdafb0ba5bd41ecf22d68a4c4 upstream. Implement the CPU vulnerabilty show functions for meltdown, spectre_v1 and spectre_v2.

[PATCH 3.2 101/104] x86: Introduce __uaccess_begin_nospec() and uaccess_try_nospec

2018-03-11 Thread Ben Hutchings
3.2.101-rc1 review patch. If anyone has any objections, please let me know. -- From: Dan Williams commit b3bbfb3fb5d25776b8e3f361d2eedaabb0b496cd upstream. For __get_user() paths, do not allow the kernel to speculate on the value of a user controlled

[PATCH 3.16 62/76] x86/kvm: Update spectre-v1 mitigation

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Dan Williams commit 085331dfc6bbe3501fb936e657331ca943827600 upstream. Commit 75f139aaf896 "KVM: x86: Add memory barrier on vmcs field lookup" added a raw

[PATCH 3.16 74/76] x86/usercopy: Replace open coded stac/clac with __uaccess_{begin, end}

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Dan Williams commit b5c4ae4f35325d520b230bab6eb3310613b72ac1 upstream. In preparation for converting some __uaccess_begin() instances to __uacess_begin_nospec(),

[PATCH 3.16 60/76] x86/spectre: Fix spelling mistake: "vunerable"-> "vulnerable"

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Colin Ian King commit e698dcdfcda41efd0984de539767b4cddd235f1e upstream. Trivial fix to spelling mistake in pr_err error message text. Signed-off-by: Colin Ian King

[PATCH 3.16 39/76] x86/retpoline: Optimize inline assembler for vmexit_fill_RSB

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Andi Kleen commit 3f7d875566d8e79c5e0b2c9a413e91b2c29e0854 upstream. The generated assembler for the C fill RSB inline asm operations has several issues: - The C code

[PATCH 3.16 23/76] x86/retpoline: Add initial retpoline support

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: David Woodhouse commit 76b043848fd22dbf7f8bf3a1452f8c70d557b860 upstream. Enable the use of -mindirect-branch=thunk-extern in newer GCC, and provide the corresponding

[PATCH 3.16 26/76] x86/retpoline/entry: Convert entry assembler indirect jumps

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: David Woodhouse commit 2641f08bb7fc63a636a2b18173221d7040a3512e upstream. Convert indirect jumps in core 32/64bit entry assembler code to use non-speculative sequences when

[PATCH 3.16 38/76] x86/pti: Document fix wrong index

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: "zhenwei.pi" commit 98f0fceec7f84d80bc053e49e596088573086421 upstream. In section <2. Runtime Cost>, fix wrong index. Signed-off-by: zhenwei.pi

[PATCH 3.16 55/76] x86/get_user: Use pointer masking to limit speculation

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Dan Williams commit c7f631cb07e7da06ac1d231ca178452339e32a94 upstream. Quoting Linus: I do think that it would be a good idea to very expressly document the

[PATCH 3.16 35/76] retpoline: Introduce start/end markers of indirect thunk

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Masami Hiramatsu commit 736e80a4213e9bbce40a7c050337047128b472ac upstream. Introduce start/end markers of __x86_indirect_thunk_* functions. To make it easy, consolidate

[PATCH 3.16 21/76] x86: Clean up current_stack_pointer

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Andy Lutomirski commit 83653c16da91112236292871b820cb8b367220e3 upstream. There's no good reason for it to be a macro, and x86_64 will want to use it, so it should be in

[PATCH] nvme-pci: disable APST for Samsung NVMe SSD 960 EVO + ASUS PRIME Z370-A

2018-03-11 Thread Jarosław Janik
Yet another "incompatible" Samsung NVMe SSD 960 EVO and Asus motherboard combination. 960 EVO device disappears from PCIe bus within few minutes after boot-up when APST is in use and never gets back. Forcing NVME_QUIRK_NO_APST is the only way to make this drive work with this particular

Re: [RFCv4,19/21] media: vim2m: add request support

2018-03-11 Thread Dmitry Osipenko
Hello, On 07.03.2018 19:37, Paul Kocialkowski wrote: > Hi, > > First off, I'd like to take the occasion to say thank-you for your work. > This is a major piece of plumbing that is required for me to add support > for the Allwinner CedarX VPU hardware in upstream Linux. Other drivers, > such as

Re: [PATCH v3 14/15] arm64: dts: mt7622: add High-Speed DMA device nodes

2018-03-11 Thread Matthias Brugger
On 02/17/2018 08:54 PM, sean.w...@mediatek.com wrote: > From: Sean Wang > > add High-Speed DMA (HSDMA) nodes > > Signed-off-by: Sean Wang NAK. AFAIK the driver is not yest upstream Regards, Matthias > --- >

[PATCH v2] net: netfilter: Replace printk() with appropriate pr_*() macro

2018-03-11 Thread Arushi Singhal
Using pr_() is more concise than printk(KERN_). Replace printks having a log level with the appropriate pr_*() macros. Signed-off-by: Arushi Singhal --- changes in v2 *in v1 printk() were replaced with netdev_*() net/netfilter/nf_conntrack_acct.c | 2 +-

Re: [RESEND PATCH v3] crypto: add zBeWalgo compression for zram

2018-03-11 Thread Eric Biggers
Hi Benjamin, On Wed, Mar 07, 2018 at 12:50:08PM +0100, Benjamin Warnke wrote: > Hi Eric, > > > On 06.03.2018 at 23:13, Eric Biggers wrote: > > > > Hi Benjamin, > > > > On Tue, Mar 06, 2018 at 09:23:08PM +0100, Benjamin Warnke wrote: > >> Currently ZRAM uses compression-algorithms from the

[PATCH] kbuild: check for pkg-config on make menu/n/g/xconfig

2018-03-11 Thread Randy Dunlap
From: Randy Dunlap Each of 'make {menu,n,g,x}config' uses (needs) pkg-config to make sure that other required files are present, but none of these check that pkg-config itself is present. Add a check for all 4 of these targets. Fixes kernel bugzilla #77511:

Re: [PATCH v8 1/6] arch: enable relative relocations for arm64, power and x86

2018-03-11 Thread Ard Biesheuvel
On 11 March 2018 at 20:20, Linus Torvalds wrote: > On Sun, Mar 11, 2018 at 5:38 AM, Ard Biesheuvel > wrote: >> Before updating certain subsystems to use place relative 32-bit >> relocations in special sections, to save space and reduce

Re: [PATCH v8 1/6] arch: enable relative relocations for arm64, power and x86

2018-03-11 Thread Linus Torvalds
On Sun, Mar 11, 2018 at 1:35 PM, Ard Biesheuvel wrote: > > I'm sure all of these architectures define some kind of 32-bit place > relative relocation in their ELF psABI, and I see how it would be > cleaner to change everything at once, but I anticipate a long tail of >

Re: KASAN: use-after-free Read in get_work_pool

2018-03-11 Thread Tom Herbert
On Sun, Mar 11, 2018 at 2:34 PM, Eric Biggers wrote: > On Wed, Feb 14, 2018 at 02:45:05PM +0100, 'Dmitry Vyukov' via syzkaller-bugs > wrote: >> On Wed, Dec 6, 2017 at 1:50 PM, Dmitry Vyukov wrote: >> > On Fri, Oct 27, 2017 at 11:18 PM, Cong Wang

Re: WARNING in tracepoint_probe_unregister

2018-03-11 Thread Eric Biggers
On Wed, Nov 08, 2017 at 09:06:40AM +0100, 'Dmitry Vyukov' via syzkaller-bugs wrote: > On Tue, Nov 7, 2017 at 7:08 PM, Jens Axboe wrote: > > On 11/07/2017 11:06 AM, Dmitry Vyukov wrote: > >> On Sun, Nov 5, 2017 at 4:47 PM, Jens Axboe wrote: > >>> On 11/05/2017

Re: [PATCH 1/4] ARM: dts: exynos5250: Add #sound-dai-cells property to hdmi device node

2018-03-11 Thread Inki Dae
Hi Sylwester, 2018년 03월 09일 20:52에 Sylwester Nawrocki 이(가) 쓴 글: > Hi Inki, > > On 03/09/2018 03:40 AM, Inki Dae wrote: >> 2018년 03월 08일 02:27에 Sylwester Nawrocki 이(가) 쓴 글: >>> This property is required for specifying link between the HDMI IP block >>> and the SoC's audio subsystem. >>> >>>

linux-next: Signed-off-by missing for commits in the clk tree

2018-03-11 Thread Stephen Rothwell
Hi all, there is a string of commits 3830681d354f ("dt-bindings: Document STM32MP1 Reset Clock Controller (RCC) bindings") to b91dacd1b912 ("clk: stm32mp1: add Debug clocks") and b96385a1947c ("clk: migrate the count of orphaned clocks at init") that are missing a Signed-off-by from

[PATCH 3.2 010/104] rtlwifi: initialize local array and set value.

2018-03-11 Thread Ben Hutchings
3.2.101-rc1 review patch. If anyone has any objections, please let me know. -- From: Yunlian Jiang commit ec71997eff2231098212a99934c0fb987a9e6b04 upstream. GCC 4.8 is spitting out uninitialized-variable warnings against

[PATCH 3.2 062/104] x86/retpoline/hyperv: Convert assembler indirect jumps

2018-03-11 Thread Ben Hutchings
3.2.101-rc1 review patch. If anyone has any objections, please let me know. -- From: David Woodhouse commit e70e5892b28c18f517f29ab6e83bd57705104b31 upstream. Convert all indirect jumps in hyperv inline asm code to use non-speculative sequences when

[PATCH 3.2 082/104] Documentation: Document array_index_nospec

2018-03-11 Thread Ben Hutchings
3.2.101-rc1 review patch. If anyone has any objections, please let me know. -- From: Mark Rutland commit f84a56f73dddaeac1dba8045b007f742f61cd2da upstream. Document the rationale and usage of the new array_index_nospec() helper. Signed-off-by: Mark

[PATCH 3.2 025/104] atp: remove set_rx_mode_8012()

2018-03-11 Thread Ben Hutchings
3.2.101-rc1 review patch. If anyone has any objections, please let me know. -- From: Paul Bolle commit bb263e18f481199a04f7aab9454c18cd3dbdb218 upstream. Building atp.o triggers this GCC warning: drivers/net/ethernet/realtek/atp.c: In function

[PATCH 3.2 073/104] x86/retpoline: Optimize inline assembler for vmexit_fill_RSB

2018-03-11 Thread Ben Hutchings
3.2.101-rc1 review patch. If anyone has any objections, please let me know. -- From: Andi Kleen commit 3f7d875566d8e79c5e0b2c9a413e91b2c29e0854 upstream. The generated assembler for the C fill RSB inline asm operations has several issues: - The C code

[PATCH 3.2 065/104] x86/retpoline/irq32: Convert assembler indirect jumps

2018-03-11 Thread Ben Hutchings
3.2.101-rc1 review patch. If anyone has any objections, please let me know. -- From: Andi Kleen commit 7614e913db1f40fff819b36216484dc3808995d4 upstream. Convert all indirect jumps in 32bit irq inline asm code to use non speculative sequences.

[PATCH 3.2 071/104] kprobes/x86: Disable optimizing on the function jumps to indirect thunk

2018-03-11 Thread Ben Hutchings
3.2.101-rc1 review patch. If anyone has any objections, please let me know. -- From: Masami Hiramatsu commit c86a32c09f8ced67971a2310e3b0dda4d1749007 upstream. Since indirect jump instructions will be replaced by jump to __x86_indirect_thunk_*, those jmp

[PATCH 3.2 007/104] rtlwifi: rtl8192c: Fix W=1 warning

2018-03-11 Thread Ben Hutchings
3.2.101-rc1 review patch. If anyone has any objections, please let me know. -- From: Larry Finger commit 8a8e31cc22739d1a5780591c008940292edcde87 upstream. When this driver is built with "make W=1", the following warning occurs:

[PATCH 3.2 078/104] x86/nospec: Fix header guards names

2018-03-11 Thread Ben Hutchings
3.2.101-rc1 review patch. If anyone has any objections, please let me know. -- From: Borislav Petkov commit 7a32fc51ca938e67974cbb9db31e1a43f98345a9 upstream. ... to adhere to the _ASM_X86_ naming scheme. No functional change. Signed-off-by: Borislav Petkov

[PATCH 3.16 27/76] x86/retpoline/ftrace: Convert ftrace assembler indirect jumps

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: David Woodhouse commit 9351803bd803cdbeb9b5a7850b7b6f464806e3db upstream. Convert all indirect jumps in ftrace assembler code to use non-speculative sequences when

[PATCH 3.16 56/76] x86/syscall: Sanitize syscall table de-references under speculation

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Ben Hutchings commit 2fbd7af5af8665d18bcefae3e9700be07e22b681 upstream. The upstream version of this, touching C code, was written by Dan Williams, with the following

[PATCH 3.16 17/76] x86/cpu/AMD: Make LFENCE a serializing instruction

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Tom Lendacky commit e4d0e84e490790798691aaa0f2e598637f1867ec upstream. To aid in speculation control, make LFENCE a serializing instruction since it has less overhead

[PATCH 3.2 100/104] nospec: Include dependency

2018-03-11 Thread Ben Hutchings
3.2.101-rc1 review patch. If anyone has any objections, please let me know. -- From: Dan Williams commit eb6174f6d1be16b19cfa43dac296bfed003ce1a6 upstream. The nospec.h header expects the per-architecture header file to optionally define

[PATCH 3.16 33/76] x86/retpoline: Remove compile time warning

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit b8b9ce4b5aec8de9e23cabb0a26b78641f9ab1d6 upstream. Remove the compile time warning when CONFIG_RETPOLINE=y and the compiler does not have retpoline

[PATCH 3.16 57/76] vfs, fdtable: Prevent bounds-check bypass via speculative execution

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Dan Williams commit 56c30ba7b348b90484969054d561f711ba196507 upstream. 'fd' is a user controlled value that is used as a data dependency to read from the 'fdt->fd'

[PATCH 3.16 32/76] x86/retpoline: Fill return stack buffer on vmexit

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: David Woodhouse commit 117cc7a908c83697b0b737d15ae1eb5943afe35b upstream. In accordance with the Intel and AMD documentation, we need to overwrite all entries in the RSB on

[PATCH 3.16 20/76] kconfig.h: use __is_defined() to check if MODULE is defined

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Masahiro Yamada commit 4f920843d248946545415c1bf6120942048708ed upstream. The macro MODULE is not a config option, it is a per-file build option. So,

Re: [PATCH v3 01/15] dt-bindings: clock: mediatek: add missing required #reset-cells

2018-03-11 Thread Matthias Brugger
On 02/17/2018 08:54 PM, sean.w...@mediatek.com wrote: > From: Sean Wang > > All ethsys, pciesys and ssusbsys internally include reset controller, so > explicitly add back these missing cell definitions to related bindings > and examples. > > Signed-off-by: Sean Wang

Re: ivtv: use arch_phys_wc_add() and require PAT disabled

2018-03-11 Thread Nick French
On Sat, Mar 10, 2018 at 10:20:23AM -0800, Andy Lutomirski wrote: >>> Perhaps the easy answer is to change the fatal is-pat-enabled check to just >>> a warning like "you have PAT enabled, so wc is disabled for the framebuffer. >>> if you want wc, use the nopat parameter"? >> >> I like this idea

Re: [PATCH 0/3] tracing: Rewrite the function filter code

2018-03-11 Thread Jiri Olsa
On Fri, Mar 09, 2018 at 09:34:42PM -0500, Steven Rostedt wrote: SNIP > Special thanks goes out to Al for his patience and his time that he spent in > educating us in a proper logical parser. > > Two patches were added to do some initial clean up. The last patch > implements Al's suggestions. I

Re: [PATCH 5/5] media: MAINTAINERS: Add entry for Aptina MT9T112

2018-03-11 Thread Sakari Ailus
Hi Jacopo, On Fri, Mar 02, 2018 at 05:35:41PM +0100, Jacopo Mondi wrote: > Add entry for Aptina/Micron MT9T112 camera sensor. The driver is > currently orphaned. > > Signed-off-by: Jacopo Mondi > --- > MAINTAINERS | 7 +++ > 1 file changed, 7 insertions(+) > >

[PATCH 3/3 v2] selftests: add devpts selftests

2018-03-11 Thread Christian Brauner
This adds a simple test to check whether /proc//fd/ symlinks are correctly pointing to /dev/pts/ devices when attached to a terminal. Signed-off-by: Christian Brauner --- ChangeLog v1->v2: * patch added ChangeLog v0->v1: * patch not present ---

[PATCH 0/3 v2] devpts: handle /dev/ptmx bind-mounts

2018-03-11 Thread Christian Brauner
Hey everyone, This is the second iteration of this patch. Please note, that I added a selftest for correct /proc//fd/{0,1,2} symlinks and added it to tools/testing/selftests/filesystem because the root cause of the problem is located in the devpts filesystem. But I'm not sure if this is the right

[PATCH 2/3 v2] devpts: resolve devpts bind-mounts

2018-03-11 Thread Christian Brauner
Most libcs will still look at /dev/ptmx when opening the master fd of a pty device. When /dev/ptmx is a bind-mount of /dev/pts/ptmx and the TIOCGPTPEER ioctl() is used to safely retrieve a file descriptor for the slave side of the pty based on the master fd, the /proc/self/fd/{0,1,2} symlinks will

[PATCH 1/3 v2] devpts: hoist out check for DEVPTS_SUPER_MAGIC

2018-03-11 Thread Christian Brauner
Hoist the check whether we have already found a suitable devpts filesystem out of devpts_ptmx_path() in preparation for the devpts bind-mount resolution patch. This is a non-functional change. Signed-off-by: Christian Brauner --- ChangeLog v1->v2: * patch added

Re: [PATCH net-next] modules: allow modprobe load regular elf binaries

2018-03-11 Thread Luis R. Rodriguez
Also, Alexei you never answered my questions out aliases with the umh modules. Long term this important to consider. Luis

[PATCH] scsi: eata: drop VLA in reorder()

2018-03-11 Thread Salvatore Mesoraca
n_ready will always be less than or equal to MAX_MAILBOXES. So we avoid a VLA[1] and use fixed-length arrays instead. [1] https://lkml.org/lkml/2018/3/7/621 Signed-off-by: Salvatore Mesoraca --- drivers/scsi/eata.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)

Re: [PATCH] proc: reject "." and ".." as filenames

2018-03-11 Thread Pavel Machek
On Mon 2018-03-12 00:35:34, Alexey Dobriyan wrote: > On Sun, Mar 11, 2018 at 10:30:58PM +0100, Pavel Machek wrote: > > On Sat 2018-03-10 03:12:23, Alexey Dobriyan wrote: > > > Various subsystems can create files and directories in /proc > > > with names directly controlled by userspace. > > > > >

RE: [RFC/RFT][PATCH v3 0/6] sched/cpuidle: Idle loop rework

2018-03-11 Thread Doug Smythies
On 2018.03.11 08:52 Doug Smythies wrote: > On 2018.03.11 03:22 Rafael J. Wysocki wrote: >> On Sunday, March 11, 2018 8:43:02 AM CET Doug Smythies wrote: >>> On 2018.03.10 15:55 Rafael J. Wysocki wrote: On Saturday, March 10, 2018 5:07:36 PM CET Doug Smythies wrote: > On 2018.03.10 01:00

Re: [PATCH 3/3] wlcore: Use common error handling code in wl1271_acx_sta_rate_policies()

2018-03-11 Thread Arend van Spriel
On 3/10/2018 10:33 PM, SF Markus Elfring wrote: From: Markus Elfring Date: Sat, 10 Mar 2018 22:18:45 +0100 Add a jump target so that a bit of exception handling can be better reused at the end of this function. This issue was detected by using the Coccinelle

Dear friend

2018-03-11 Thread 1078...@ono.com
Dear friend I am contacting you on a business deal of $17.5 Million US Dollars, ready for transfer into your account if we make this claim, we will share it 60%/40%. 100% risk free and it will be legally backed up with government approved If you are interested

Re: [PATCH] rcu: Use the proper lockdep annotation in dump_blkd_tasks()

2018-03-11 Thread Paul E. McKenney
On Fri, Mar 09, 2018 at 09:32:18AM +0800, Boqun Feng wrote: > Sparse reported this: > > | kernel/rcu/tree_plugin.h:814:9: warning: incorrect type in argument 1 > (different modifiers) > | kernel/rcu/tree_plugin.h:814:9:expected struct lockdep_map const *lock > |

Re: [RESEND PATCH] rsi: Remove stack VLA usage

2018-03-11 Thread Larry Finger
On 03/11/2018 08:43 PM, Tobin C. Harding wrote: The kernel would like to have all stack VLA usage removed[1]. rsi uses a VLA based on 'blksize'. Elsewhere in the SDIO code maximum block size is defined using a magic number. We can use a pre-processor defined constant and declare the array to

Possible memory leak in acpi_ut_create_internal_object_dbg() in 4.16-rcX

2018-03-11 Thread Larry Finger
Running kernel 4.16-rcX, kmemleak complains about a leak of one object. This is linux-ubqc:~ # echo scan > /sys/kernel/debug/kmemleak linux-ubqc:~ # cat /sys/kernel/debug/kmemleak unreferenced object 0x8802263b2630 (size 72): comm "swapper/0", pid 1, jiffies 4294892345 (age 8143.468s) hex

[PATCH 3.16 63/76] x86/retpoline: Avoid retpolines for built-in __init functions

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: David Woodhouse commit 66f793099a636862a71c59d4a6ba91387b155e0c upstream. There's no point in building init code with retpolines, since it runs before any potentially

[PATCH 3.16 51/76] Documentation: Document array_index_nospec

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Mark Rutland commit f84a56f73dddaeac1dba8045b007f742f61cd2da upstream. Document the rationale and usage of the new array_index_nospec() helper. Signed-off-by: Mark

[PATCH 3.16 72/76] x86: fix SMAP in 32-bit environments

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Linus Torvalds commit de9e478b9d49f3a0214310d921450cf5bb4a21e6 upstream. In commit 11f1a4b9755f ("x86: reorganize SMAP handling in user space accesses") I

[PATCH 3.16 42/76] x86/cpu: Change type of x86_cache_size variable to unsigned int

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: "Gustavo A. R. Silva" commit 24dbc6000f4b9b0ef5a9daecb161f1907733765a upstream. Currently, x86_cache_size is of type int, which makes no sense as we will never have a

[PATCH 3.16 49/76] x86/cpu/bugs: Make retpoline module warning conditional

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Thomas Gleixner commit e383095c7fe8d218e00ec0f83e4b95ed4e627b02 upstream. If sysfs is disabled and RETPOLINE not defined: arch/x86/kernel/cpu/bugs.c:97:13: warning:

[PATCH 3.16 48/76] x86/bugs: Drop one "mitigation" from dmesg

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Borislav Petkov commit 55fa19d3e51f33d9cd4056d25836d93abf9438db upstream. Make [0.031118] Spectre V2 mitigation: Mitigation: Full generic retpoline into [0.031118]

[PATCH 3.16 70/76] nospec: Include dependency

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Dan Williams commit eb6174f6d1be16b19cfa43dac296bfed003ce1a6 upstream. The nospec.h header expects the per-architecture header file to optionally define

[PATCH 3.16 52/76] array_index_nospec: Sanitize speculative array de-references

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Dan Williams commit f3804203306e098dae9ca51540fcd5eb700d7f40 upstream. array_index_nospec() is proposed as a generic mechanism to mitigate against Spectre-variant-1

[PATCH 3.16 75/76] x86/uaccess: Use __uaccess_begin_nospec() and uaccess_try_nospec

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Dan Williams commit 304ec1b050310548db33063e567123fae8fd0301 upstream. Quoting Linus: I do think that it would be a good idea to very expressly document the

[PATCH 3.16 43/76] x86/retpoline: Remove the esp/rsp thunk

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Waiman Long commit 1df37383a8aeabb9b418698f0bcdffea01f4b1b2 upstream. It doesn't make sense to have an indirect call thunk with esp/rsp as retpoline code won't work

[PATCH 3.16 25/76] x86/retpoline/crypto: Convert crypto assembler indirect jumps

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: David Woodhouse commit 9697fa39efd3fc3692f2949d4045f393ec58450b upstream. Convert all indirect jumps in crypto assembler code to use non-speculative sequences when

Re: [RFCv4,19/21] media: vim2m: add request support

2018-03-11 Thread Dmitry Osipenko
Hello, On 07.03.2018 19:37, Paul Kocialkowski wrote: > Hi, > > First off, I'd like to take the occasion to say thank-you for your work. > This is a major piece of plumbing that is required for me to add support > for the Allwinner CedarX VPU hardware in upstream Linux. Other drivers, > such as

Re: ivtv: use arch_phys_wc_add() and require PAT disabled

2018-03-11 Thread Andy Lutomirski
> On Mar 11, 2018, at 12:51 PM, Nick French wrote: > > On Sat, Mar 10, 2018 at 10:20:23AM -0800, Andy Lutomirski wrote: Perhaps the easy answer is to change the fatal is-pat-enabled check to just a warning like "you have PAT enabled, so wc is disabled for the

Re: [RFC v2 09/83] Add Kconfig and Makefile

2018-03-11 Thread Andiry Xu
On Sun, Mar 11, 2018 at 5:15 AM, Nikolay Borisov wrote: > > > On 10.03.2018 20:17, Andiry Xu wrote: >> From: Andiry Xu >> >> Signed-off-by: Andiry Xu >> --- >> fs/Kconfig | 2 ++ >> fs/Makefile | 1 + >>

Re: [RFC PATCH 1/5] ima: extend clone() with IMA namespace support

2018-03-11 Thread James Morris
On Fri, 9 Mar 2018, Stefan Berger wrote: > Yuqiong is publishing a paper in this area. I believe the conference is only > later this year. > > Our goals are to enable IMA measurements, appraisal, and auditing inside a > container using namespaces. This is excellent to have -- can you include

Re: [PATCH] arm64: dts: rockchip: assign clock rate for ACLK_VIO

2018-03-11 Thread Doug Anderson
Hi, On Sun, Mar 11, 2018 at 6:50 PM, Shunqian Zheng wrote: > The ACLK_VIO is a parent clock used by a several children, > its suggested clock rate is 400MHz. Right now it gets 400MHz > because it sources from CPLL(800M) and divides by 2 after reset. > It's good not to

[PATCH 3.2 087/104] x86/syscall: Sanitize syscall table de-references under speculation

2018-03-11 Thread Ben Hutchings
3.2.101-rc1 review patch. If anyone has any objections, please let me know. -- From: Ben Hutchings commit 2fbd7af5af8665d18bcefae3e9700be07e22b681 upstream. The upstream version of this, touching C code, was written by Dan Williams, with the following

[PATCH 3.16 66/76] x86/cpufeatures: Clean up Spectre v2 related CPUID flags

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: David Woodhouse commit 2961298efe1ea1b6fc0d7ee8b76018fa6c0bcef2 upstream. We want to expose the hardware features simply in /proc/cpuinfo as "ibrs", "ibpb" and "stibp".

[PATCH 3.16 44/76] KVM: x86: Make indirect calls in emulator speculation safe

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Peter Zijlstra commit 1a29b5b7f347a1a9230c1e0af5b37e3e571588ab upstream. Replace the indirect calls with CALL_NOSPEC. Signed-off-by: Peter Zijlstra (Intel)

[PATCH 3.16 46/76] module/retpoline: Warn about missing retpoline in module

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Andi Kleen commit caf7501a1b4ec964190f31f9c3f163de252273b8 upstream. There's a risk that a kernel which has full retpoline mitigations becomes vulnerable when a module

[PATCH 3.16 65/76] x86/speculation: Fix typo IBRS_ATT, which should be IBRS_ALL

2018-03-11 Thread Ben Hutchings
3.16.56-rc1 review patch. If anyone has any objections, please let me know. -- From: Darren Kenny commit af189c95a371b59f493dbe0f50c0a09724868881 upstream. Fixes: 117cc7a908c83 ("x86/retpoline: Fill return stack buffer on vmexit") Signed-off-by:

  1   2   3   4   5   >