Thank you for the review, I have added the changelog as requested.
Changelog:
- Added missing newline to the `ksft_print_msg` in `test_zswap_writeback`
function.
Signed-off-by: Mohammed Anees
---
tools/testing/selftests/cgroup/test_zswap.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion
alloc_calls and free_calls implementation in sysfs have two issues,
one is PAGE_SIZE limitiation of sysfs and other is it does not adhere
to "one value per file" rule.
To overcome this issues, move the alloc_calls and free_calls implemeation
to debugfs.
Signed-off-by: Faiya
Please ignore this patch!
Thanks and regards,
Mohammed Faiyaz.
On 4/6/2021 5:55 PM, Faiyaz Mohammed wrote:
> alloc_calls and free_calls implementation in sysfs have two issues,
> one is PAGE_SIZE limitiation of sysfs and other is it does not adhere
> to "one value per file&
alloc_calls and free_calls implementation in sysfs have two issues,
one is PAGE_SIZE limitiation of sysfs and other is it does not adhere
to "one value per file" rule.
To overcome this issues, move the alloc_calls and free_calls implemeation
to debugfs.
Signed-off-by: Faiyaz Mohamme
alloc_calls and free_calls implementation in sysfs have two issues,
one is PAGE_SIZE limitiation of sysfs and other is it does not adhere
to "one value per file" rule.
To overcome this issues, move the alloc_calls and free_calls implemeation
to debugfs.
Signed-off-by: Faiyaz Mohamme
Good Day,
Please accept my apologies for writing you a surprise letter.I am
Mr.Mohammed Mashab, account Manager with an investment bank here in
Burkina Faso.I have a very important business I want to discuss with
you.There is a draft account opened in my firm by a long-time client
of our bank.I ha
Greetings,
This is a personal email directed to you for your consideration alone.
I request that it remain and be treated as such only. My name is Mr.
Mohammed Saad . I have an interesting business proposal for you that
will be of immense benefit to both of us, although this may be hard
for you
+linux-mm, linux-kernel.
On 2/17/2021 12:01 PM, Faiyaz Mohammed wrote:
> Reading the sys slab alloc_calls, free_calls returns the available object
> owners, but the size of this file is limited to PAGE_SIZE
> because of the limitation of sysfs attributes, it is returning the
> partia
Hi Vlastimil,
On 1/13/2021 9:35 PM, Vlastimil Babka wrote:
> On 1/12/21 10:21 AM, Faiyaz Mohammed wrote:
>> Reading the sys slab alloc_calls, free_calls returns the available object
>> owners, but the size of this file is limited to PAGE_SIZE
>> because of the limitation of
Hi Matthew,
On 1/12/2021 5:52 PM, Matthew Wilcox wrote:
> On Tue, Jan 12, 2021 at 02:51:27PM +0530, Faiyaz Mohammed wrote:
>> @@ -5180,6 +5187,7 @@ static int any_slab_objects(struct kmem_cache *s)
>>
>> struct slab_attribute {
>> struct attribute attr;
&
--
Dearest Friend,
I have an important message for you just get back for details.
Regards
Mohammed Hossain
On 1/13/2021 9:35 PM, Vlastimil Babka wrote:
> On 1/12/21 10:21 AM, Faiyaz Mohammed wrote:
>> Reading the sys slab alloc_calls, free_calls returns the available object
>> owners, but the size of this file is limited to PAGE_SIZE
>> because of the limitation of sysfs attrib
--
I have an proposal for you get back for more details.
On Fri, 2021-01-15 at 16:08 -0800, Jim Mattson wrote:
> On Thu, Sep 3, 2020 at 7:12 AM Mohammed Gamal
> wrote:
> >
> > This patch exposes allow_smaller_maxphyaddr to the user as a module
> > parameter.
> >
> > Since smaller physical address spaces are only
name, and telephone number to reach you and most
importantly, a confirmation of acceptance from you.
Mr Mohammed Saad
On 1/12/2021 5:52 PM, Matthew Wilcox wrote:
> On Tue, Jan 12, 2021 at 02:51:27PM +0530, Faiyaz Mohammed wrote:
>> @@ -5180,6 +5187,7 @@ static int any_slab_objects(struct kmem_cache *s)
>>
>> struct slab_attribute {
>> struct attribute attr;
>> +
--
I have an important message for you get back for more details.
is not matching with /proc/slabinfo.
To remove the PAGE_SIZE limitation converted the sys slab
alloc_calls, free_calls to bin attribute.
Signed-off-by: Faiyaz Mohammed
---
mm/slub.c | 61 +++--
1 file changed, 47 insertions(+), 14
start_kernel+0xa4/0x568
[0.00] memblock_reserve: [0x00023f09a3c0-0x00023f09a991]
memblock_alloc_range_nid+0xc0/0x188
Signed-off-by: Faiyaz Mohammed
---
include/linux/memblock.h | 18 +-
1 file changed, 9 insertions(+), 9 deletions(-)
diff --git a/include/linux/memblock.h b
early_pgtable_alloc+0x24/0x178
[0.00] memblock_reserve: [0x00023fc6b000-0x00023fc6bfff]
memblock_alloc_range_nid+0xc0/0x188
Signed-off-by: Faiyaz Mohammed
---
mm/memblock.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/mm/memblock.c b/mm/memblock.c
index 049df41..f65af9f
On 11/11/2020 12:11 AM, Mike Rapoport wrote:
Hi,
On Tue, Nov 10, 2020 at 05:50:17PM +0530, Faiyaz Mohammed wrote:
Since memblock_alloc is not getting inlined, memblock_reserve owner info
is lost. Below information is not enough for memory accounting.
for example:
[0.00
On 11/10/2020 11:46 PM, Mike Rapoport wrote:
Hi,
On Tue, Nov 10, 2020 at 05:49:58PM +0530, Faiyaz Mohammed wrote:
Exact caller of memblock_phys_alloc_range is not available with
"memblock=debug". Below information is not enough for memory accounting.
for example:
[
ytes align=0x40 nid=-1
from=0x max_addr=0x start_kernel+0xa4/0x568
[0.00] memblock_reserve: [0x00023f09a3c0-0x00023f09a991]
memblock_alloc_range_nid+0xc0/0x188
Signed-off-by: Faiyaz Mohammed
---
include/linux/memblock.h | 2 +-
1 file changed, 1 inser
0.00] memblock_reserve: [0x00023fc6b000-0x00023fc6bfff]
memblock_alloc_range_nid+0xc0/0x188
Signed-off-by: Faiyaz Mohammed
---
mm/memblock.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/mm/memblock.c b/mm/memblock.c
index 049df41..f65af9f 100644
--- a/mm/memblock.c
+++ b/mm/
On Mon, 2020-10-05 at 13:47 +0200, Mohammed Gamal wrote:
> When selecting function_graph tracer with the command:
> # echo function_graph > /sys/kernel/debug/tracing/current_tracer
>
> The kernel crashes with the following stack trace:
>
> [69703.122389] BUG: stack
quot;)
Suggested-by: Vitaly Kuznetsov
Signed-off-by: Mohammed Gamal
---
drivers/clocksource/hyperv_timer.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/clocksource/hyperv_timer.c
b/drivers/clocksource/hyperv_timer.c
index 09aa44cb8a91d..ba04cb381cd3f 100644
--- a/
c_cs+0x10/0x10
[69703.123068] ? sched_clock+0x5/0x10
Setting the notrace attribute for read_hv_sched_clock_msr() and
read_hv_sched_clock_tsc() fixes it
Fixes: bd00cd52d5be ("clocksource/drivers/hyperv: Add Hyper-V specific
sched clock function")
Signed-off-by: Vitaly Kuznetsov
Sign
is enabled.
Also disable support by default, and let the user decide if they want to enable
it.
Signed-off-by: Mohammed Gamal
---
arch/x86/kvm/vmx/vmx.c | 15 ++-
arch/x86/kvm/vmx/vmx.h | 3 +++
arch/x86/kvm/x86.c | 2 +-
3 files changed, 10 insertions(+), 10 deletions(-)
diff
This patch to the os_intfs.c fixes the printing of function names using
the preferred '"%s...", __func__' and alignment issues as pointed out by
the checkpatch.pl tool.
Signed-off-by: Mohammed Rushad
---
drivers/staging/rtl8723bs/os_dep/os_intfs.c | 56 +++--
Hello My Dear,
Please do not feel disturbed for contacting you, based on the critical
condition I find mine self though, it's not financial problem, but my health
you might have know that cancer is not what to talk home about, I am married to
Mr.Umair Mohammed who worked with Tu
This is a patch to the sdio_intf.c file that fixes up an incorrectly
placed brace found by the checkpatch.pl tool
Signed-off-by: Mohammed Rushad
---
drivers/staging/rtl8723bs/os_dep/sdio_intf.c | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/drivers/staging/rtl8723bs
This is a patch to the xmit_linux.c file that fixes brace and missing
line warning found by checkpatch.pl tool
Signed-off-by: Mohammed Rushad
---
drivers/staging/rtl8723bs/os_dep/xmit_linux.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/staging/rtl8723bs
This is a patch to the rtllib_tx.c file that fixes fixes an improper
indent found by the checkpatch.pl tool
Signed-off-by: Mohammed Rushad
---
drivers/staging/rtl8192e/rtllib_tx.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/staging/rtl8192e/rtllib_tx.c
b/drivers
From: Paolo Bonzini
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/vmx/nested.c | 28 +---
arch/x86/kvm/vmx/vmx.c| 2 +-
arch/x86/kvm/vmx/vmx.h| 5 +
3 files changed, 23 insertions(+), 12 deletions(-)
diff --git a/arch/x86/kvm/vmx/nested.c b/arch/x86/kvm/vm
u can decide if it would ignore the -cpu ..,phys-bits=X)
CC: Tom Lendacky
CC: Babu Moger
Signed-off-by: Mohammed Gamal
---
arch/x86/include/asm/kvm_host.h | 2 +-
arch/x86/kvm/svm/svm.c | 15 +++
arch/x86/kvm/vmx/vmx.c | 7 +++
arch/x86/kvm/x86.c |
From: Paolo Bonzini
We would like to introduce a callback to update the #PF intercept
when CPUID changes. Just reuse update_bp_intercept since VMX is
already using update_exception_bitmap instead of a bespoke function.
While at it, remove an unnecessary assignment in the SVM version,
which is a
From: Paolo Bonzini
Ignore non-present page faults, since those cannot have reserved
bits set.
When running access.flat with "-cpu Haswell,phys-bits=36", the
number of trapped page faults goes down from 8872644 to 3978948.
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/vmx/vmx.c | 10 +
set. On a supervisor-mode access, the EPT violation path would trigger.
However, on a user-mode access, the processor will not notice the reserved
bit and not include PFERR_RSVD_MASK in the error code.
Co-developed-by: Mohammed Gamal
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/vmx/
's
maximum physical memory and if it's exceeded, we need to add
the PFERR_RSVD_MASK bits to the PF's error code.
Also make sure the error code isn't overwritten by the page table walker.
Signed-off-by: Mohammed Gamal
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/mmu/mmu.c | 6 ++
: Mohammed Gamal
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/mmu.h | 6 ++
arch/x86/kvm/x86.c | 21 +
arch/x86/kvm/x86.h | 1 +
3 files changed, 28 insertions(+)
diff --git a/arch/x86/kvm/mmu.h b/arch/x86/kvm/mmu.h
index 444bb9c54548..59930231d5d5 100644
--- a/arch
d add PFERR_RSVD_MASK
error code to the page fault if needed.
Changes from v2:
- Drop support for this feature on AMD processors after discussion with AMD
Mohammed Gamal (5):
KVM: x86: Add helper functions for illegal GPA checking and page fault
injection
KVM: x86: mmu: Move translate_gpa() to
From: Paolo Bonzini
Allow vendor code to observe changes to MAXPHYADDR and start/stop
intercepting page faults.
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/cpuid.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c
index 8a294f9747aa..ea5bbf2153
Also no point of it being inline since it's always called through
function pointers. So remove that.
Signed-off-by: Mohammed Gamal
Signed-off-by: Paolo Bonzini
---
arch/x86/include/asm/kvm_host.h | 6 --
arch/x86/kvm/mmu/mmu.c | 6 ++
2 files changed, 6 insertions(
COMPENSATION PAYMENT THROUGH ATM VISA CARD
Attn: Beneficiaries
This is to officially inform you that we have verified your
inheritance file fund presently on my desk, and I found out that you
have not received your payment due to your lack of co-operation and
not fulfilling the obligations givi
On Fri, 2020-06-19 at 16:52 -0500, Tom Lendacky wrote:
> On 6/19/20 10:39 AM, Mohammed Gamal wrote:
> > When EPT/NPT is enabled, KVM does not really look at guest physical
> > address size. Address bits above maximum physical memory size are
> > reserved.
> > Because
On Mon, 2020-06-22 at 12:44 +0800, Yuan Yao wrote:
> On Fri, Jun 19, 2020 at 05:39:15PM +0200, Mohammed Gamal wrote:
> > This patch adds two helper functions that will be used to support
> > virtualizing
> > MAXPHYADDR in both kvm-intel.ko and kvm.ko.
> >
> &
ails), and thus we are
proposing a workaround (see last patch) that adds a capability that
userspace can use to decide who to deal with hosts that might have
issues supprting guest MAXPHYADDR < host MAXPHYADDR.
Mohammed Gamal (7):
KVM: x86: Add helper functions for illegal GPA checking a
: Mohammed Gamal
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/mmu.h | 6 ++
arch/x86/kvm/x86.c | 21 +
arch/x86/kvm/x86.h | 1 +
3 files changed, 28 insertions(+)
diff --git a/arch/x86/kvm/mmu.h b/arch/x86/kvm/mmu.h
index 0ad06bfe2c2c..555237dfb91c 100644
--- a/arch
's
maximum physical memory and if it's exceeded, we need to add
the PFERR_RSVD_MASK bits to the PF's error code.
Also make sure the error code isn't overwritten by the page table walker.
Signed-off-by: Mohammed Gamal
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/mmu/mmu.c | 6 ++
From: Paolo Bonzini
We would like to introduce a callback to update the #PF intercept
when CPUID changes. Just reuse update_bp_intercept since VMX is
already using update_exception_bitmap instead of a bespoke function.
While at it, remove an unnecessary assignment in the SVM version,
which is a
Also no point of it being inline since it's always called through
function pointers. So remove that.
Signed-off-by: Mohammed Gamal
Signed-off-by: Paolo Bonzini
---
arch/x86/include/asm/kvm_host.h | 6 --
arch/x86/kvm/mmu/mmu.c | 6 ++
2 files changed, 6 insertions(
From: Paolo Bonzini
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/vmx/nested.c | 28 +---
arch/x86/kvm/vmx/vmx.c| 2 +-
arch/x86/kvm/vmx/vmx.h| 5 +
3 files changed, 23 insertions(+), 12 deletions(-)
diff --git a/arch/x86/kvm/vmx/nested.c b/arch/x86/kvm/vm
CC: Tom Lendacky
CC: Babu Moger
Signed-off-by: Mohammed Gamal
---
arch/x86/kvm/svm/svm.c | 8
arch/x86/kvm/svm/svm.h | 6 ++
2 files changed, 14 insertions(+)
diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c
index 94108e6cc6da..05412818027d 100644
--- a/arch/x86/kvm
u can decide if it would ignore the -cpu ..,phys-bits=X)
CC: Tom Lendacky
CC: Babu Moger
Signed-off-by: Mohammed Gamal
---
arch/x86/include/asm/kvm_host.h | 2 +-
arch/x86/kvm/svm/svm.c | 15 +++
arch/x86/kvm/vmx/vmx.c | 7 +++
arch/x86/kvm/x86.c |
page has a reserved
bit set. On a supervisor-mode access, the EPT violation path would trigger.
However, on a user-mode access, the processor will not notice the reserved
bit and not include PFERR_RSVD_MASK in the error code.
CC: Tom Lendacky
CC: Babu Moger
Signed-off-by: Mohammed Gamal
---
arch/x
set. On a supervisor-mode access, the EPT violation path would trigger.
However, on a user-mode access, the processor will not notice the reserved
bit and not include PFERR_RSVD_MASK in the error code.
Co-developed-by: Mohammed Gamal
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/vmx/
From: Paolo Bonzini
Allow vendor code to observe changes to MAXPHYADDR and start/stop
intercepting page faults.
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/cpuid.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c
index 8a294f9747aa..ea5bbf2153
From: Paolo Bonzini
Ignore non-present page faults, since those cannot have reserved
bits set.
When running access.flat with "-cpu Haswell,phys-bits=36", the
number of trapped page faults goes down from 8872644 to 3978948.
Signed-off-by: Paolo Bonzini
---
arch/x86/kvm/vmx/vmx.c | 10 +
Hi Linus,
On Mon, Jun 15, 2020 at 11:11:04AM +0200, Linus Walleij wrote:
> OK I would be very happy to look at it so I can learn a bit about the
> hands-on and general approach here. Just send it to this address
> directly and I will look!
Have sent it
> > For the next 3 weeks, right now, i can
Hi,
On Sun, Jun 14, 2020 at 06:51:43PM +0530, afzal mohammed wrote:
> It is MB/s for copying one file to another via user space buffer, i.e.
> the value coreutils 'dd' shows w/ status=progress (here it was busybox
> 'dd', so instead it was enabling a compile time
Hi,
On Sat, Jun 13, 2020 at 10:45:33PM +0200, Arnd Bergmann wrote:
> 4% boot time increase sounds like a lot, especially if that is only for
> copy_from_user/copy_to_user. In the end it really depends on how well
> get_user()/put_user() and small copies can be optimized in the end.
i mentioned t
Hi,
On Sat, Jun 13, 2020 at 02:15:52PM +0100, Russell King - ARM Linux admin wrote:
> On Sat, Jun 13, 2020 at 05:34:32PM +0530, afzal mohammed wrote:
> > i think C
> > library cuts any size read, write to page size (if it exceeds) &
> > invokes the system call.
> Yo
Hi,
On Sat, Jun 13, 2020 at 01:56:15PM +0100, Al Viro wrote:
> Incidentally, what about get_user()/put_user()? _That_ is where it's
> going to really hurt...
All other uaccess routines are also planned to be added, posting only
copy_{from,to}_user() was to get early feedback (mentioned in the
c
Hi,
On Sat, Jun 13, 2020 at 02:08:11PM +0300, Andy Shevchenko wrote:
> On Fri, Jun 12, 2020 at 1:20 PM afzal mohammed
> wrote:
> > +// Started from arch/um/kernel/skas/uaccess.c
>
> Does it mean you will deduplicate it there?
What i meant was, that file was taken as a templ
Hi,
On Fri, Jun 12, 2020 at 10:07:28PM +0200, Arnd Bergmann wrote:
> I think a lot
> of usercopy calls are only for a few bytes, though this is of course
> highly workload dependent and you might only care about the large
> ones.
Observation is that max. pages reaching copy_{from,to}_user() is 2
Hi,
On Fri, Jun 12, 2020 at 09:31:12PM +0530, afzal mohammed wrote:
> 512 1K 4K 16K 32K 64K 1M
>
> normal 30 46 89 95 90 85 65
>
> uaccess_w_memcpy 28.545 85 92 91 85 65
Hi,
On Fri, Jun 12, 2020 at 11:19:23AM -0400, Nicolas Pitre wrote:
> On Fri, 12 Jun 2020, afzal mohammed wrote:
> > Performance wise, results are not encouraging, 'dd' on tmpfs results,
> Could you compare with CONFIG_UACCESS_WITH_MEMCPY as well?
512
Hi,
On Fri, Jun 12, 2020 at 02:02:13PM +0200, Arnd Bergmann wrote:
> On Fri, Jun 12, 2020 at 12:18 PM afzal mohammed
> wrote:
> > Roughly a one-third drop in performance. Disabling highmem improves
> > performance only slightly.
> There are probably some things that can b
Hi,
On Wed, Jun 10, 2020 at 12:10:21PM +0200, Linus Walleij wrote:
> On Mon, Jun 8, 2020 at 1:09 PM afzal mohammed wrote:
> > Not yet. Yes, i will do the performance evaluation.
> >
> > i am also worried about the impact on performance as these
> > [ get_user_page
Select UACCESS_GUP_KMAP_MEMCPY initially.
Signed-off-by: afzal mohammed
---
arch/arm/Kconfig | 9 +
1 file changed, 9 insertions(+)
diff --git a/arch/arm/Kconfig b/arch/arm/Kconfig
index c77c93c485a08..ae2687679d7c8 100644
--- a/arch/arm/Kconfig
+++ b/arch/arm/Kconfig
@@ -1326,6
merged in
mainline.
[1]
https://lore.kernel.org/lkml/Pine.LNX.4.44.0307082332450.17252-10@localhost.localdomain/
Signed-off-by: afzal mohammed
---
lib/Kconfig | 4 +
lib/Makefile | 3 +
lib/uaccess_gup_kmap_memcpy.c | 162 ++
Turn off existing raw_copy_{from,to}_user() using
arm_copy_{from,to}_user() when CONFIG_UACCESS_GUP_KMAP_MEMCPY is
enabled.
Signed-off-by: afzal mohammed
---
arch/arm/include/asm/uaccess.h | 20
arch/arm/kernel/armksyms.c | 2 ++
arch/arm/lib/Makefile | 7
t for testing first patch.
Regards
afzal
afzal mohammed (3):
lib: copy_{from,to}_user using gup & kmap_atomic()
ARM: uaccess: let UACCESS_GUP_KMAP_MEMCPY enabling
ARM: provide CONFIG_VMSPLIT_4G_DEV for development
arch/arm/Kconfig | 9 ++
arch/arm/include/asm/uaccess.h
Hi,
On Mon, Jun 08, 2020 at 08:47:27PM +0530, afzal mohammed wrote:
> On Mon, Jun 08, 2020 at 04:43:57PM +0200, Arnd Bergmann wrote:
> > There is another difference: get_user_pages_fast() does not return
> > a vm_area_struct pointer, which is where you would check the access
>
Hi,
On Mon, Jun 08, 2020 at 04:43:57PM +0200, Arnd Bergmann wrote:
> There is another difference: get_user_pages_fast() does not return
> a vm_area_struct pointer, which is where you would check the access
> permissions. I suppose those pointers could not be returned to callers
> that don't alre
Hi,
On Sun, Jun 07, 2020 at 09:26:26PM +0200, Arnd Bergmann wrote:
> I think you have to use get_user_pages() though instead of
> get_user_pages_fast(),
> in order to be able to check the permission bits to prevent doing a
> copy_to_user()
> into read-only mappings.
i was not aware of this, is i
zal mohammed wrote:
> > get_user_pages_fast() followed by kmap_atomic() & then memcpy() seems
> > to work in principle for user copy.
>
> Have you done any performance evaluation of the changes yet? I think
> it would be a good idea to keep that in the picture. If there
Hi,
On Sat, May 16, 2020 at 09:35:57AM +0200, Arnd Bergmann wrote:
> On Sat, May 16, 2020 at 8:06 AM afzal mohammed
> wrote:
> > Okay, so the conclusion i take is,
> > 1. VMSPLIT 4G/4G have to live alongside highmem
> > 2. For user space copy, do pinning followed
Hi,
On Thu, May 14, 2020 at 05:32:41PM +0200, Arnd Bergmann wrote:
> Typical distros currently offer two kernels, with and without LPAE,
> and they probably don't want to add a third one for LPAE with
> either highmem or vmsplit-4g-4g. Having extra user address
> space and more lowmem is both goi
Hi,
On Thu, May 14, 2020 at 07:05:45PM +0530, afzal mohammed wrote:
> So if we make VMSPLIT_4G_4G, depends on !HIGH_MEMORY (w/ mention of
> caveat in Kconfig help that this is meant for platforms w/ <=4GB), then
> we can do copy_{from,to}_user the same way currently do, and no need
Hi,
On Thu, May 14, 2020 at 02:41:11PM +0200, Arnd Bergmann wrote:
> On Thu, May 14, 2020 at 1:18 PM afzal mohammed
> wrote:
> > 1. SoC w/ LPAE
> > 2. TTBR1 (top 256MB) for static kernel, modules, io mappings, vmalloc,
> > kmap, fixmap & vectors
> R
Hi,
On Tue, May 12, 2020 at 09:49:59PM +0200, Arnd Bergmann wrote:
> Any idea which bit you want to try next?
My plan has been to next post patches for the static kernel migration
to vmalloc space (currently the code is rigid, taking easy route
wherever possible & not of high quality) as that fe
Hi,
On Mon, May 11, 2020 at 05:29:29PM +0200, Arnd Bergmann wrote:
> What do you currently do with the module address space?
In the current setup, module address space was untouched, i.e. virtual
address difference b/n text & module space is far greater than 32MB, at
least > (2+768+16)MB and mod
Hi,
Kernel now boots to prompt w/ static kernel mapping moved to vmalloc
space.
Changes currently done have a couple of platform specific things, this
has to be modified to make it multiplatform friendly (also to be taken
care is ARM_PATCH_PHYS_VIRT case). Module address space has to be
taken car
place setup_irq() by request_irq()")
> Signed-off-by: Arnd Bergmann
Sorry for the mistake and thanks for the fix,
Acked-by: afzal mohammed
Regards
afzal
[ +linux-arm-kernel
Context: This is regarding VMSPLIT_4G_4G support for 32-bit ARM as a
possible replacement to highmem. For that, initially, it is being
attempted to move static kernel mapping from lowmem to vmalloc space.
in next reply, i will remove everyone/list !ARM related ]
Hi,
Hi Arnd,
> On Tue, Apr 14, 2020 at 09:29:46PM +0200, Arnd Bergmann wrote:
> > Another thing to try early is to move the vmlinux virtual address
> > from the linear mapping into vmalloc space. This does not require
> > LPAE either, but it only works on relatively modern platforms that
> > don't ha
Nations Democracy Fund grants,therefore, contact
her immediately with these informations as required above.
Congratulations once again.
Mrs.Amina Jane Mohammed
Deputy Secretary-General of the United Nations.
details that
you need for us to proceed.
Sincerely,
Salif Mohammed.
Senior Auditor
Dubai Islamic Bank,
Abu Dhabi, U.A.E
my email [ mohmm54...@gmail.com ]
Date: Mon, 1 Jul 2019 10:16:36 +
Subject: Hello
<>
On Tue, 2019-03-12 at 18:02 +, Haiyang Zhang wrote:
>
>
> > -Original Message-
> > From: Mohammed Gamal
> > Sent: Thursday, March 7, 2019 1:32 PM
> > To: Michael Kelley ; linux-hyp...@vger.kern
> el.org;
> > kimbrownkd
> > Cc: Sas
On Thu, 2019-03-07 at 17:33 +, Michael Kelley wrote:
> From: Mohammed Gamal Sent: Thursday, March 7,
> 2019 8:36 AM
> >
> > This patch adds a check for the presence of the ring buffer in
> > hv_get_bytes_to_read/write() to avoid possible NULL pointer
> > derefe
hv_get_bytes_to_read/write() could be vulnerable to the race condition
discussed in https://lkml.org/lkml/2018/10/18/779
This race is being addressed by the patch series by Kimberly Brown in
https://lkml.org/lkml/2019/2/21/1236 which is not final yet
Signed-off-by: Mohammed Gamal
---
include/linux/hyperv.h | 6
your reply I shall give
you the details and procedures of this transaction, waiting your
reply.
Regards,
Mohammed Rouhani
I need am Honest Person to support and your cooperation with me in business of
$26,700,000.00 thanks.
your reply I shall give
you the details and procedures of this transaction, waiting your
reply.
Regards,
Mohammed Rouhani
your reply I shall give
you the details and procedures of this transaction, waiting your
reply.
Regards,
Mohammed Rouhani
RE: Privileged and Confidential:
Here I brought a potential Business Proposal at your door step for
consideration.
I have a client that is interested to Invest in your Country and would like to
engage you and your company on this project. The Investment Amount is valued at
US$132 million.
If
-ENODEV.
Instead of returning the device instabce, we take the exit path where
we call netif_device_attach()
Fixes: 7b2ee50c0cd5 ("hv_netvsc: common detach logic")
Signed-off-by: Mohammed Gamal
---
drivers/net/hyperv/rndis_filter.c | 2 +-
1 file changed, 1 insertion(+), 1 deletio
On Tue, 2018-05-08 at 11:13 -0700, Stephen Hemminger wrote:
> On Tue, 8 May 2018 19:40:47 +0200
> Mohammed Gamal wrote:
>
> > On older windows hosts the net_device instance is returned to
> > the caller of rndis_filter_device_add() without having the presence
> > bit
1 - 100 of 508 matches
Mail list logo