Re: [RFC PATCH 07/21] ubifs: Migrate to acomp compression API

2023-07-21 Thread Simon Horman
On Tue, Jul 18, 2023 at 02:58:33PM +0200, Ard Biesheuvel wrote: > UBIFS is one of the remaining users of the obsolete 'comp' compression > API exposed by the crypto subsystem. Given that it operates strictly on > contiguous buffers that are either entirely in lowmem or covered by a > single page,

Re: [RFC PATCH 20/21] crypto: deflate - implement acomp API directly

2023-07-21 Thread Simon Horman
On Tue, Jul 18, 2023 at 02:58:46PM +0200, Ard Biesheuvel wrote: ... > -static int deflate_comp_init(struct deflate_ctx *ctx) > +static int deflate_process(struct acomp_req *req, struct z_stream_s *stream, > +int (*process)(struct z_stream_s *, int)) > { > - int ret =

Re: [RFC PATCH v11 06/29] KVM: Introduce KVM_SET_USER_MEMORY_REGION2

2023-07-21 Thread Paolo Bonzini
On 7/19/23 01:44, Sean Christopherson wrote: Cc: Jarkko Sakkinen Signed-off-by: Sean Christopherson --- arch/x86/kvm/x86.c | 2 +- include/linux/kvm_host.h | 4 ++-- include/uapi/linux/kvm.h | 13 + virt/kvm/kvm_main.c | 38 ++

Re: [RFC PATCH 01/21] crypto: scomp - Revert "add support for deflate rfc1950 (zlib)"

2023-07-21 Thread Simon Horman
On Tue, Jul 18, 2023 at 02:58:27PM +0200, Ard Biesheuvel wrote: > This reverts commit a368f43d6e3a001e684e9191a27df384fbff12f5. > > "zlib-deflate" was introduced 6 years ago, but it does not have any > users. So let's remove the generic implementation and the test vectors, > but retain the

[PATCH] mm/hotplug: Enable runtime update of memmap_on_memory parameter

2023-07-21 Thread Aneesh Kumar K.V
Signed-off-by: Aneesh Kumar K.V --- This is dependent on patches posted at https://lore.kernel.org/linux-mm/20230718024409.95742-1-aneesh.ku...@linux.ibm.com/ mm/memory_hotplug.c | 27 +++ 1 file changed, 15 insertions(+), 12 deletions(-) diff --git

Re: [RFC PATCH v11 01/29] KVM: Wrap kvm_gfn_range.pte in a per-action union

2023-07-21 Thread Xu Yilun
On 2023-07-21 at 14:26:11 +0800, Yan Zhao wrote: > On Tue, Jul 18, 2023 at 04:44:44PM -0700, Sean Christopherson wrote: > > May I know why KVM now needs to register to callback .change_pte()? I can see the original purpose is to "setting a pte in the shadow page table directly, instead of

Re: [PATCH v3 04/13] powerpc: assert_pte_locked() use pte_offset_map_nolock()

2023-07-21 Thread Jay Patel
On Jul 19 2023, Aneesh Kumar K V wrote: > On 7/19/23 10:34 AM, Hugh Dickins wrote: > > On Tue, 18 Jul 2023, Aneesh Kumar K.V wrote: > >> Hugh Dickins writes: > >> > >>> Instead of pte_lockptr(), use the recently added pte_offset_map_nolock() > >>> in assert_pte_locked(). BUG if

Re: [RFC PATCH v11 09/29] KVM: x86: Disallow hugepages when memory attributes are mixed

2023-07-21 Thread Paolo Bonzini
On 7/19/23 01:44, Sean Christopherson wrote: +static bool range_has_attrs(struct kvm *kvm, gfn_t start, gfn_t end, + unsigned long attrs) +{ + XA_STATE(xas, >mem_attr_array, start); + unsigned long index; + bool has_attrs; + void *entry; + +

Re: [RFC PATCH v11 01/29] KVM: Wrap kvm_gfn_range.pte in a per-action union

2023-07-21 Thread Yan Zhao
On Tue, Jul 18, 2023 at 04:44:44PM -0700, Sean Christopherson wrote: May I know why KVM now needs to register to callback .change_pte()? As also commented in kvm_mmu_notifier_change_pte(), .change_pte() must be surrounded by .invalidate_range_{start,end}(). While

Re: [PATCH v2 1/9] vgacon: rework Kconfig dependencies

2023-07-21 Thread Arnd Bergmann
On Fri, Jul 21, 2023, at 06:59, Michael Ellerman wrote: > Arnd Bergmann writes: >> From: Arnd Bergmann >> >> The list of dependencies here is phrased as an opt-out, but this is missing >> a lot of architectures that don't actually support VGA consoles, and some >> of the entries are stale: >> >>

Re: [RFC PATCH 20/21] crypto: deflate - implement acomp API directly

2023-07-21 Thread Ard Biesheuvel
On Fri, 21 Jul 2023 at 13:12, Simon Horman wrote: > > On Tue, Jul 18, 2023 at 02:58:46PM +0200, Ard Biesheuvel wrote: > > ... > > > -static int deflate_comp_init(struct deflate_ctx *ctx) > > +static int deflate_process(struct acomp_req *req, struct z_stream_s > > *stream, > > +

Re: [PATCH 1/1] sound:soc: fix return value check in imx_audmux_suspend

2023-07-21 Thread Shengjiu Wang
On Mon, Jul 17, 2023 at 10:51 PM Yuanjun Gong wrote: > check the return value of clk_prepare_enable, and if > clk_prepare_enable got an unexpected return value, > imx_audmux_suspend should return the error value. > > Signed-off-by: Yuanjun Gong > --- > sound/soc/fsl/imx-audmux.c | 5 - > 1

Re: [PATCH 1/1] sound:soc: fix return value check in imx_audmux_resume

2023-07-21 Thread Shengjiu Wang
On Mon, Jul 17, 2023 at 10:51 PM Yuanjun Gong wrote: > check the return value of clk_prepare_enable, and if > clk_prepare_enable got an unexpected return value, > imx_audmux_resume should return the error value. > > Signed-off-by: Yuanjun Gong > --- > sound/soc/fsl/imx-audmux.c | 5 - > 1

Re: [RFC PATCH 04/21] net: ipcomp: Migrate to acomp API from deprecated comp API

2023-07-21 Thread Simon Horman
On Tue, Jul 18, 2023 at 02:58:30PM +0200, Ard Biesheuvel wrote: > Migrate the IPcomp network compression code to the acomp API, in order > to drop the dependency on the obsolete 'comp' API which is going away. > > For the time being, this is a rather mechanical conversion replacing > each comp

Re: [RFC PATCH 08/21] zram: Migrate to acomp compression API

2023-07-21 Thread Simon Horman
On Tue, Jul 18, 2023 at 02:58:34PM +0200, Ard Biesheuvel wrote: ... > @@ -1618,9 +1614,7 @@ static int zram_recompress(struct zram *zram, u32 > index, struct page *page, > > num_recomps++; > zstrm = zcomp_stream_get(zram->comps[prio]); > - src =

Re: [RFC PATCH v11 08/29] KVM: Introduce per-page memory attributes

2023-07-21 Thread Paolo Bonzini
On 7/19/23 01:44, Sean Christopherson wrote: From: Chao Peng In confidential computing usages, whether a page is private or shared is necessary information for KVM to perform operations like page fault handling, page zapping etc. There are other potential use cases for per-page memory

Re: [RFC PATCH 19/21] crypto: remove obsolete 'comp' compression API

2023-07-21 Thread Simon Horman
On Tue, Jul 18, 2023 at 02:58:45PM +0200, Ard Biesheuvel wrote: ... > diff --git a/crypto/crypto_user_stat.c b/crypto/crypto_user_stat.c > index d4f3d39b51376973..d3133eda2f528d17 100644 > --- a/crypto/crypto_user_stat.c > +++ b/crypto/crypto_user_stat.c > @@ -86,10 +86,6 @@ static int

Re: [RFC PATCH v11 13/29] KVM: Add transparent hugepage support for dedicated guest memory

2023-07-21 Thread Paolo Bonzini
On 7/19/23 01:44, Sean Christopherson wrote: @@ -413,6 +454,9 @@ int kvm_gmem_create(struct kvm *kvm, struct kvm_create_guest_memfd *args) u64 flags = args->flags; u64 valid_flags = 0; + if (IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE)) + valid_flags |=

Re: [RFC PATCH v11 15/29] KVM: Drop superfluous __KVM_VCPU_MULTIPLE_ADDRESS_SPACE macro

2023-07-21 Thread Paolo Bonzini
On 7/19/23 01:44, Sean Christopherson wrote: Signed-off-by: Sean Christopherson --- arch/x86/include/asm/kvm_host.h | 1 - include/linux/kvm_host.h| 2 +- 2 files changed, 1 insertion(+), 2 deletions(-) diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h

Re: [PATCH] tracing: Have all levels of checks prevent recursion

2023-07-21 Thread Steven Rostedt
On Fri, 21 Jul 2023 17:34:41 +0200 Alexander Lobakin wrote: > From: Steven Rostedt > Date: Fri, 15 Oct 2021 14:25:41 -0400 > > Sorry for such a necroposting :z > Just wanted to know if this is a bug, so that I could send a fix, or > intended behaviour. > > > On Fri, 15 Oct 2021 14:20:33 -0400

Re: [RFC PATCH v11 12/29] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory

2023-07-21 Thread Sean Christopherson
On Fri, Jul 21, 2023, Xiaoyao Li wrote: > On 7/21/2023 11:05 PM, Xiaoyao Li wrote: > > On 7/19/2023 7:44 AM, Sean Christopherson wrote: > > > @@ -6255,12 +6298,17 @@ int kvm_init(unsigned vcpu_size, unsigned > > > vcpu_align, struct module *module) > > >   if (r) > > >   goto

Re: [RFC PATCH v11 09/29] KVM: x86: Disallow hugepages when memory attributes are mixed

2023-07-21 Thread Sean Christopherson
On Fri, Jul 21, 2023, Paolo Bonzini wrote: > On 7/19/23 01:44, Sean Christopherson wrote: > > +static bool range_has_attrs(struct kvm *kvm, gfn_t start, gfn_t end, > > + unsigned long attrs) > > +{ > > + XA_STATE(xas, >mem_attr_array, start); > > + unsigned long index; >

Re: [PATCH v11 4/4] arm64: support batched/deferred tlb shootdown during page reclamation/migration

2023-07-21 Thread Catalin Marinas
On Mon, Jul 17, 2023 at 09:10:04PM +0800, Yicong Yang wrote: > +static inline void arch_tlbbatch_add_pending(struct > arch_tlbflush_unmap_batch *batch, > + struct mm_struct *mm, > + unsigned long uaddr) > +{ > +

Re: [PATCH v11 2/4] mm/tlbbatch: Rename and extend some functions

2023-07-21 Thread Catalin Marinas
On Mon, Jul 17, 2023 at 09:10:02PM +0800, Yicong Yang wrote: > From: Barry Song > > This patch does some preparation works to extend batched TLB flush to > arm64. Including: > - Extend set_tlb_ubc_flush_pending() and arch_tlbbatch_add_mm() > to accept an additional argument for address,

Re: [PATCH v11 3/4] mm/tlbbatch: Introduce arch_flush_tlb_batched_pending()

2023-07-21 Thread Catalin Marinas
On Mon, Jul 17, 2023 at 09:10:03PM +0800, Yicong Yang wrote: > From: Yicong Yang > > Currently we'll flush the mm in flush_tlb_batched_pending() to > avoid race between reclaim unmaps pages by batched TLB flush > and mprotect/munmap/etc. Other architectures like arm64 may > only need a

Re: [PATCH v3 4/5] mmu_notifiers: Don't invalidate secondary TLBs as part of mmu_notifier_invalidate_range_end()

2023-07-21 Thread Jason Gunthorpe
On Thu, Jul 20, 2023 at 06:39:26PM +1000, Alistair Popple wrote: > Secondary TLBs are now invalidated from the architecture specific TLB > invalidation functions. Therefore there is no need to explicitly > notify or invalidate as part of the range end functions. This means we > can remove

Re: [RFC PATCH v11 18/29] KVM: selftests: Drop unused kvm_userspace_memory_region_find() helper

2023-07-21 Thread Paolo Bonzini
On 7/19/23 01:45, Sean Christopherson wrote: Drop kvm_userspace_memory_region_find(), it's unused and a terrible API (probably why it's unused). If anything outside of kvm_util.c needs to get at the memslot, userspace_mem_region_find() can be exposed to give others full access to all memory

Re: [RFC PATCH v11 12/29] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory

2023-07-21 Thread Xiaoyao Li
On 7/21/2023 11:05 PM, Xiaoyao Li wrote: On 7/19/2023 7:44 AM, Sean Christopherson wrote: @@ -6255,12 +6298,17 @@ int kvm_init(unsigned vcpu_size, unsigned vcpu_align, struct module *module)   if (r)   goto err_async_pf; +    r = kvm_gmem_init(); +    if (r) +    goto err_gmem;

Re: [PATCH v3 1/5] arm64/smmu: Use TLBI ASID when invalidating entire range

2023-07-21 Thread Jason Gunthorpe
On Thu, Jul 20, 2023 at 06:39:23PM +1000, Alistair Popple wrote: > The ARM SMMU has a specific command for invalidating the TLB for an > entire ASID. Currently this is used for the IO_PGTABLE API but not for > ATS when called from the MMU notifier. > > The current implementation of notifiers does

Re: [RFC PATCH v11 14/29] KVM: x86/mmu: Handle page fault for private memory

2023-07-21 Thread Paolo Bonzini
On 7/19/23 01:44, Sean Christopherson wrote: From: Chao Peng A KVM_MEM_PRIVATE memslot can include both fd-based private memory and hva-based shared memory. Architecture code (like TDX code) can tell whether the on-going fault is private or not. This patch adds a 'is_private' field to

Re: [RFC PATCH v11 08/29] KVM: Introduce per-page memory attributes

2023-07-21 Thread Xiaoyao Li
On 7/19/2023 7:44 AM, Sean Christopherson wrote: +4.140 KVM_SET_MEMORY_ATTRIBUTES +- + +:Capability: KVM_CAP_MEMORY_ATTRIBUTES +:Architectures: x86 +:Type: vm ioctl +:Parameters: struct kvm_memory_attributes(in/out) +:Returns: 0 on success, <0 on error +

Re: [RFC PATCH v11 12/29] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory

2023-07-21 Thread Paolo Bonzini
On 7/19/23 01:44, Sean Christopherson wrote: + inode = alloc_anon_inode(mnt->mnt_sb); + if (IS_ERR(inode)) + return PTR_ERR(inode); + + err = security_inode_init_security_anon(inode, , NULL); + if (err) + goto err_inode; + I don't understand

Re: [PATCH] ASoC: fsl_spdif: Silence output on stop

2023-07-21 Thread Mark Brown
On Wed, 19 Jul 2023 18:47:29 +0200, Matus Gajdos wrote: > Clear TX registers on stop to prevent the SPDIF interface from sending > last written word over and over again. > > Applied to https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound.git for-next Thanks! [1/1] ASoC:

Re: [PATCH v3 5/5] mmu_notifiers: Rename invalidate_range notifier

2023-07-21 Thread Catalin Marinas
On Thu, Jul 20, 2023 at 06:39:27PM +1000, Alistair Popple wrote: > diff --git a/arch/arm64/include/asm/tlbflush.h > b/arch/arm64/include/asm/tlbflush.h > index a99349d..84a05a0 100644 > --- a/arch/arm64/include/asm/tlbflush.h > +++ b/arch/arm64/include/asm/tlbflush.h > @@ -253,7 +253,7 @@ static

Re: [PATCH v3 3/5] mmu_notifiers: Call invalidate_range() when invalidating TLBs

2023-07-21 Thread Catalin Marinas
On Thu, Jul 20, 2023 at 06:39:25PM +1000, Alistair Popple wrote: > diff --git a/arch/arm64/include/asm/tlbflush.h > b/arch/arm64/include/asm/tlbflush.h > index 3456866..a99349d 100644 > --- a/arch/arm64/include/asm/tlbflush.h > +++ b/arch/arm64/include/asm/tlbflush.h > @@ -13,6 +13,7 @@ >

Re: [PATCH v3 5/5] mmu_notifiers: Rename invalidate_range notifier

2023-07-21 Thread Jason Gunthorpe
On Thu, Jul 20, 2023 at 06:39:27PM +1000, Alistair Popple wrote: > There are two main use cases for mmu notifiers. One is by KVM which > uses mmu_notifier_invalidate_range_start()/end() to manage a software > TLB. > > The other is to manage hardware TLBs which need to use the > invalidate_range()

Re: [RFC PATCH v11 16/29] KVM: Allow arch code to track number of memslot address spaces per VM

2023-07-21 Thread Paolo Bonzini
On 7/19/23 01:44, Sean Christopherson wrote: @@ -4725,9 +4725,9 @@ static int kvm_vm_ioctl_check_extension_generic(struct kvm *kvm, long arg) case KVM_CAP_IRQ_ROUTING: return KVM_MAX_IRQ_ROUTES; #endif -#if KVM_ADDRESS_SPACE_NUM > 1 +#if KVM_MAX_NR_ADDRESS_SPACES > 1

Re: [RFC PATCH v11 13/29] KVM: Add transparent hugepage support for dedicated guest memory

2023-07-21 Thread Sean Christopherson
On Fri, Jul 21, 2023, Paolo Bonzini wrote: > On 7/19/23 01:44, Sean Christopherson wrote: > > @@ -413,6 +454,9 @@ int kvm_gmem_create(struct kvm *kvm, struct > > kvm_create_guest_memfd *args) > > u64 flags = args->flags; > > u64 valid_flags = 0; > > + if

[PATCH 5.15 149/532] soc/fsl/qe: fix usb.c build errors

2023-07-21 Thread Greg Kroah-Hartman
From: Randy Dunlap [ Upstream commit 7b1a78babd0d2cd27aa07255dee0c2d7ac0f31e3 ] Fix build errors in soc/fsl/qe/usb.c when QUICC_ENGINE is not set. This happens when PPC_EP88XC is set, which selects CPM1 & CPM. When CPM is set, USB_FSL_QE can be set without QUICC_ENGINE being set. When

Re: [RFC PATCH v11 12/29] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory

2023-07-21 Thread Xiaoyao Li
On 7/19/2023 7:44 AM, Sean Christopherson wrote: @@ -6255,12 +6298,17 @@ int kvm_init(unsigned vcpu_size, unsigned vcpu_align, struct module *module) if (r) goto err_async_pf; + r = kvm_gmem_init(); + if (r) + goto err_gmem; +

Re: [PATCH] tracing: Have all levels of checks prevent recursion

2023-07-21 Thread Steven Rostedt
On Fri, 21 Jul 2023 18:06:07 +0200 Alexander Lobakin wrote: > > Just because you disable interrupts does not mean you are in interrupt > > context. > > Ah okay, thanks! IOW, if we want to check in some code that we're > certainly have interrupts enabled and are not in the interrupt context, >

Re: [PATCH v11 1/4] mm/tlbbatch: Introduce arch_tlbbatch_should_defer()

2023-07-21 Thread Catalin Marinas
On Mon, Jul 17, 2023 at 09:10:01PM +0800, Yicong Yang wrote: > From: Anshuman Khandual > > The entire scheme of deferred TLB flush in reclaim path rests on the > fact that the cost to refill TLB entries is less than flushing out > individual entries by sending IPI to remote CPUs. But

Re: [RFC PATCH v11 12/29] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory

2023-07-21 Thread Sean Christopherson
On Fri, Jul 21, 2023, Paolo Bonzini wrote: > On 7/19/23 01:44, Sean Christopherson wrote: > > + inode = alloc_anon_inode(mnt->mnt_sb); > > + if (IS_ERR(inode)) > > + return PTR_ERR(inode); > > + > > + err = security_inode_init_security_anon(inode, , NULL); > > + if (err) > > +

[PATCH 5.15 225/532] crypto: nx - fix build warnings when DEBUG_FS is not enabled

2023-07-21 Thread Greg Kroah-Hartman
From: Randy Dunlap [ Upstream commit b04b076fb56560b39d695ac3744db457e12278fd ] Fix build warnings when DEBUG_FS is not enabled by using an empty do-while loop instead of a value: In file included from ../drivers/crypto/nx/nx.c:27: ../drivers/crypto/nx/nx.c: In function 'nx_register_algs':

Re: [PATCH v3 3/5] mmu_notifiers: Call invalidate_range() when invalidating TLBs

2023-07-21 Thread Jason Gunthorpe
On Thu, Jul 20, 2023 at 06:39:25PM +1000, Alistair Popple wrote: > The invalidate_range() is going to become an architecture specific mmu > notifier used to keep the TLB of secondary MMUs such as an IOMMU in > sync with the CPU page tables. Currently it is called from separate > code paths to the

Re: [PATCH v3 2/5] mmu_notifiers: Fixup comment in mmu_interval_read_begin()

2023-07-21 Thread Jason Gunthorpe
On Thu, Jul 20, 2023 at 06:39:24PM +1000, Alistair Popple wrote: > The comment in mmu_interval_read_begin() refers to a function that > doesn't exist and uses the wrong call-back name. The op for mmu > interval notifiers is mmu_interval_notifier_ops->invalidate() so fix > the comment up to reflect

Re: [PATCH] tracing: Have all levels of checks prevent recursion

2023-07-21 Thread Alexander Lobakin
From: Steven Rostedt Date: Fri, 21 Jul 2023 12:00:40 -0400 > On Fri, 21 Jul 2023 17:34:41 +0200 > Alexander Lobakin wrote: [...] >>> + level += !!(pc & (NMI_MASK)); >>> + level += !!(pc & (NMI_MASK | HARDIRQ_MASK)); >>> + level += !!(pc & (NMI_MASK | HARDIRQ_MASK | SOFTIRQ_OFFSET));

[PATCH v7 2/3 RESEND] block: sed-opal: keystore access for SED Opal keys

2023-07-21 Thread gjoyce
From: Greg Joyce Allow for permanent SED authentication keys by reading/writing to the SED Opal non-volatile keystore. Signed-off-by: Greg Joyce Reviewed-by: Jonathan Derrick --- block/sed-opal.c | 18 -- 1 file changed, 16 insertions(+), 2 deletions(-) diff --git

[PATCH v7 0/3 RESEND] generic and PowerPC SED Opal keystore

2023-07-21 Thread gjoyce
From: Greg Joyce This patchset has gone through numerous rounds of review and all comments/suggetions have been addressed. The reviews have covered all relevant areas including reviews by block and keyring developers as well as the SED Opal maintainer. The last patchset submission has not

[PATCH v5 1/3 RESEND] block: sed-opal: Implement IOC_OPAL_DISCOVERY

2023-07-21 Thread gjoyce
From: Greg Joyce Add IOC_OPAL_DISCOVERY ioctl to return raw discovery data to a SED Opal application. This allows the application to display drive capabilities and state. Signed-off-by: Greg Joyce Reviewed-by: Christoph Hellwig Reviewed-by: Jonathan Derrick --- block/sed-opal.c

Re: [PATCH] tracing: Have all levels of checks prevent recursion

2023-07-21 Thread Alexander Lobakin
From: Steven Rostedt Date: Fri, 15 Oct 2021 14:25:41 -0400 Sorry for such a necroposting :z Just wanted to know if this is a bug, so that I could send a fix, or intended behaviour. > On Fri, 15 Oct 2021 14:20:33 -0400 > Steven Rostedt wrote: > >>> I think having one copy of that in a header

[PATCH v5 0/3 RESEND] sed-opal: keyrings, discovery, revert, key store

2023-07-21 Thread gjoyce
From: Greg Joyce This patchset has gone through numerous rounds of review and all comments/suggetions have been addressed. The reviews have covered all relevant areas including reviews by block and keyring developers as well as the SED Opal maintainer. The last patchset submission has not

[PATCH v7 3/3 RESEND] powerpc/pseries: PLPKS SED Opal keystore support

2023-07-21 Thread gjoyce
From: Greg Joyce Define operations for SED Opal to read/write keys from POWER LPAR Platform KeyStore(PLPKS). This allows non-volatile storage of SED Opal keys. Signed-off-by: Greg Joyce Reviewed-by: Jonathan Derrick --- arch/powerpc/platforms/pseries/Kconfig| 6 +

Re: [RFC PATCH v11 12/29] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory

2023-07-21 Thread Isaku Yamahata
On Fri, Jul 21, 2023 at 02:13:14PM +0800, Yuan Yao wrote: > On Tue, Jul 18, 2023 at 04:44:55PM -0700, Sean Christopherson wrote: > > TODO > > > > Cc: Fuad Tabba > > Cc: Vishal Annapurve > > Cc: Ackerley Tng > > Cc: Jarkko Sakkinen > > Cc: Maciej Szmigiero > > Cc: Vlastimil Babka > > Cc:

[PATCH v7 1/3 RESEND] block:sed-opal: SED Opal keystore

2023-07-21 Thread gjoyce
From: Greg Joyce Add read and write functions that allow SED Opal keys to stored in a permanent keystore. Signed-off-by: Greg Joyce Reviewed-by: Jonathan Derrick --- block/Makefile | 2 +- block/sed-opal-key.c | 24 include/linux/sed-opal-key.h

Re: [RFC PATCH v11 12/29] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory

2023-07-21 Thread Sean Christopherson
On Fri, Jul 21, 2023, Isaku Yamahata wrote: > On Fri, Jul 21, 2023 at 02:13:14PM +0800, > Yuan Yao wrote: > > > +static int kvm_gmem_error_page(struct address_space *mapping, struct > > > page *page) > > > +{ > > > + struct list_head *gmem_list = >private_list; > > > + struct kvm_memory_slot

[PATCH v5 3/3 RESEND] block: sed-opal: keyring support for SED keys

2023-07-21 Thread gjoyce
From: Greg Joyce Extend the SED block driver so it can alternatively obtain a key from a sed-opal kernel keyring. The SED ioctls will indicate the source of the key, either directly in the ioctl data or from the keyring. This allows the use of SED commands in scripts such as udev scripts so

[PATCH v5 2/3 RESEND] block: sed-opal: Implement IOC_OPAL_REVERT_LSP

2023-07-21 Thread gjoyce
From: Greg Joyce This is used in conjunction with IOC_OPAL_REVERT_TPR to return a drive to Original Factory State without erasing the data. If IOC_OPAL_REVERT_LSP is called with opal_revert_lsp.options bit OPAL_PRESERVE set prior to calling IOC_OPAL_REVERT_TPR, the drive global locking range

Re: [PATCH] tracing: Have all levels of checks prevent recursion

2023-07-21 Thread Jakub Kicinski
On Fri, 21 Jul 2023 12:26:32 -0400 Steven Rostedt wrote: > > if (!(in_hardirq() || irqs_disabled())) > > > > Yeah, probably. > > > , nothing more elegant / already existing / ...? > > It's not a common check. What would you call that? Looks like Olek started the weekend already so let me

Re: [RFC PATCH v11 12/29] KVM: Add KVM_CREATE_GUEST_MEMFD ioctl() for guest-specific backing memory

2023-07-21 Thread Yuan Yao
On Tue, Jul 18, 2023 at 04:44:55PM -0700, Sean Christopherson wrote: > TODO > > Cc: Fuad Tabba > Cc: Vishal Annapurve > Cc: Ackerley Tng > Cc: Jarkko Sakkinen > Cc: Maciej Szmigiero > Cc: Vlastimil Babka > Cc: David Hildenbrand > Cc: Quentin Perret > Cc: Michael Roth > Cc: Wang > Cc: