[PATCH v3 31/57] KVM: x86: Swap incoming guest CPUID into vCPU before massaging in KVM_SET_CPUID2

2024-11-27 Thread Sean Christopherson
kvm_x86_call(vcpu_after_set_cpuid)(vcpu); @@ -450,6 +450,15 @@ static int kvm_set_cpuid(struct kvm_vcpu *vcpu, struct kvm_cpuid_entry2 *e2, { int r; + /* +* Swap the existing (old) entries with the incoming (new) entries in +* order to massage the new entries, e

Re: [PATCH 3/3] scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback()

2021-03-30 Thread Andrea Parri
Hi Olaf, On Mon, Mar 29, 2021 at 06:37:21PM +0200, Olaf Hering wrote: > On Thu, Dec 17, Andrea Parri (Microsoft) wrote: > > > Check that the packet is of the expected size at least, don't copy data > > past the packet. > > > + if (hv_pkt_datalen(desc) < sizeof(struct vstor_packet) - >

Re: [PATCH 3/3] scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback()

2021-03-29 Thread Olaf Hering
On Thu, Dec 17, Andrea Parri (Microsoft) wrote: > Check that the packet is of the expected size at least, don't copy data > past the packet. > + if (hv_pkt_datalen(desc) < sizeof(struct vstor_packet) - > + stor_device->vmscsi_size_delta) { > +

Re: #pragma once (was Re: incoming)

2021-03-01 Thread Al Viro
On Sat, Feb 27, 2021 at 02:02:21AM +0300, Alexey Dobriyan wrote: > There are rules and schemes about how to create guard macro. > > Should it be prefixed by underscore? > Should it be prefixed by two underscores? > Should it be full path uppercased or just last path component? > Should the guard

RE: #pragma once (was Re: incoming)

2021-03-01 Thread David Laight
From: Alexey Dobriyan > Sent: 26 February 2021 23:02 > > On Fri, Feb 26, 2021 at 01:53:48PM -0800, Linus Torvalds wrote: > > On Fri, Feb 26, 2021 at 12:17 PM Alexey Dobriyan > > wrote: > > > > > > I want to sent treewide "#pragma once" conversion: > > > > Are there *any* advantages to it? > > >

Re: #pragma once (was Re: incoming)

2021-02-26 Thread Alexey Dobriyan
On Fri, Feb 26, 2021 at 01:53:48PM -0800, Linus Torvalds wrote: > On Fri, Feb 26, 2021 at 12:17 PM Alexey Dobriyan wrote: > > > > I want to sent treewide "#pragma once" conversion: > > Are there *any* advantages to it? > > It's non-standard, It is effectively standard: https://en.wikipedia.org/

Re: #pragma once (was Re: incoming)

2021-02-26 Thread Linus Torvalds
On Fri, Feb 26, 2021 at 12:17 PM Alexey Dobriyan wrote: > > I want to sent treewide "#pragma once" conversion: Are there *any* advantages to it? It's non-standard, and the historical argument for it ("it can reduce compile times because the preprocessor doesn't open the file twice" is pure and u

#pragma once (was Re: incoming)

2021-02-26 Thread Alexey Dobriyan
Linus wrote: > I'm hoping to just do -rc1 this weekend after all - despite my late > start due to loss of power for several days. > > I'll allow late stragglers with good reason through, but the fewer of > those there are, the better, of course. I want to sent treewide "#pragma once" conversion:

Re: [PATCH 0/3] scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback() -- Take 2

2021-01-12 Thread Martin K. Petersen
On Thu, 17 Dec 2020 21:33:18 +0100, Andrea Parri (Microsoft) wrote: > This series is to address the problems mentioned in: > > 4da3a54f5a0258 ("Revert "scsi: storvsc: Validate length of incoming packet > in storvsc_on_channel_callback()"") > > (cf

Re: [PATCH 0/3] scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback() -- Take 2

2021-01-07 Thread Martin K. Petersen
Andrea, > This series is to address the problems mentioned in: > > 4da3a54f5a0258 ("Revert "scsi: storvsc: Validate length of incoming packet > in storvsc_on_channel_callback()"") > > (cf., in particular, patch 2/3) and to re-introduce the validatio

RE: [PATCH 3/3] scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback()

2020-12-18 Thread Michael Kelley
From: Andrea Parri (Microsoft) Sent: Thursday, December 17, 2020 12:33 PM > > Check that the packet is of the expected size at least, don't copy data > past the packet. > > Reported-by: Saruhan Karademir > Signed-off-by: Andrea Parri (Microsoft) > Cc: "James E.J. Bottomley" > Cc: "Martin K.

RE: [PATCH 3/3] scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback()

2020-12-17 Thread Dexuan Cui
> From: Andrea Parri (Microsoft) > Sent: Thursday, December 17, 2020 12:33 PM > > Check that the packet is of the expected size at least, don't copy data > past the packet. > > Reported-by: Saruhan Karademir > Signed-off-by: Andrea Parri (Microsoft) > Cc: "James E.J. Bottomley" > Cc: "Martin

[PATCH 3/3] scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback()

2020-12-17 Thread Andrea Parri (Microsoft)
Check that the packet is of the expected size at least, don't copy data past the packet. Reported-by: Saruhan Karademir Signed-off-by: Andrea Parri (Microsoft) Cc: "James E.J. Bottomley" Cc: "Martin K. Petersen" Cc: linux-s...@vger.kernel.org --- drivers/scsi/storvsc_drv.c | 6 ++ 1 file

[PATCH 0/3] scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback() -- Take 2

2020-12-17 Thread Andrea Parri (Microsoft)
Hi all, This series is to address the problems mentioned in: 4da3a54f5a0258 ("Revert "scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback()"") (cf., in particular, patch 2/3) and to re-introduce the validation in question (patch 3/3); pa

Re: [PATCH AUTOSEL 5.9 15/23] scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback()

2020-12-14 Thread Sasha Levin
On Mon, Dec 14, 2020 at 08:06:25AM -0500, Konstantin Ryabitsev wrote: On Mon, Dec 14, 2020 at 02:07:11PM +0300, Dan Carpenter wrote: On Sat, Dec 12, 2020 at 07:09:01PM +0100, Andrea Parri wrote: > Hi Sasha, > > On Sat, Dec 12, 2020 at 11:07:56AM -0500, Sasha Levin wrote: > > From: "Andrea Parri

Re: [PATCH AUTOSEL 5.9 15/23] scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback()

2020-12-14 Thread Konstantin Ryabitsev
On Mon, Dec 14, 2020 at 02:07:11PM +0300, Dan Carpenter wrote: > On Sat, Dec 12, 2020 at 07:09:01PM +0100, Andrea Parri wrote: > > Hi Sasha, > > > > On Sat, Dec 12, 2020 at 11:07:56AM -0500, Sasha Levin wrote: > > > From: "Andrea Parri (Microsoft)" > > > > > > [ Upstream commit 3b8c72d076c42bf27

Re: [PATCH AUTOSEL 5.9 15/23] scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback()

2020-12-14 Thread Dan Carpenter
On Sat, Dec 12, 2020 at 07:09:01PM +0100, Andrea Parri wrote: > Hi Sasha, > > On Sat, Dec 12, 2020 at 11:07:56AM -0500, Sasha Levin wrote: > > From: "Andrea Parri (Microsoft)" > > > > [ Upstream commit 3b8c72d076c42bf27284cda7b2b2b522810686f8 ] > > FYI, we found that this commit introduced a re

Re: [PATCH AUTOSEL 5.9 15/23] scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback()

2020-12-13 Thread Sasha Levin
On Sat, Dec 12, 2020 at 07:09:01PM +0100, Andrea Parri wrote: Hi Sasha, On Sat, Dec 12, 2020 at 11:07:56AM -0500, Sasha Levin wrote: From: "Andrea Parri (Microsoft)" [ Upstream commit 3b8c72d076c42bf27284cda7b2b2b522810686f8 ] FYI, we found that this commit introduced a regression and poste

Re: [PATCH AUTOSEL 5.9 15/23] scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback()

2020-12-12 Thread Andrea Parri
Hi Sasha, On Sat, Dec 12, 2020 at 11:07:56AM -0500, Sasha Levin wrote: > From: "Andrea Parri (Microsoft)" > > [ Upstream commit 3b8c72d076c42bf27284cda7b2b2b522810686f8 ] FYI, we found that this commit introduced a regression and posted a revert: https://lkml.kernel.org/r/20201211131404.2135

[PATCH AUTOSEL 5.4 08/14] scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback()

2020-12-12 Thread Sasha Levin
From: "Andrea Parri (Microsoft)" [ Upstream commit 3b8c72d076c42bf27284cda7b2b2b522810686f8 ] Check that the packet is of the expected size at least, don't copy data past the packet. Link: https://lore.kernel.org/r/20201118145348.109879-1-parri.and...@gmail.com Cc: "James E.J. Bottomley" Cc: "

[PATCH AUTOSEL 4.14 6/8] scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback()

2020-12-12 Thread Sasha Levin
From: "Andrea Parri (Microsoft)" [ Upstream commit 3b8c72d076c42bf27284cda7b2b2b522810686f8 ] Check that the packet is of the expected size at least, don't copy data past the packet. Link: https://lore.kernel.org/r/20201118145348.109879-1-parri.and...@gmail.com Cc: "James E.J. Bottomley" Cc: "

[PATCH AUTOSEL 5.9 15/23] scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback()

2020-12-12 Thread Sasha Levin
From: "Andrea Parri (Microsoft)" [ Upstream commit 3b8c72d076c42bf27284cda7b2b2b522810686f8 ] Check that the packet is of the expected size at least, don't copy data past the packet. Link: https://lore.kernel.org/r/20201118145348.109879-1-parri.and...@gmail.com Cc: "James E.J. Bottomley" Cc: "

[PATCH AUTOSEL 4.19 7/9] scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback()

2020-12-12 Thread Sasha Levin
From: "Andrea Parri (Microsoft)" [ Upstream commit 3b8c72d076c42bf27284cda7b2b2b522810686f8 ] Check that the packet is of the expected size at least, don't copy data past the packet. Link: https://lore.kernel.org/r/20201118145348.109879-1-parri.and...@gmail.com Cc: "James E.J. Bottomley" Cc: "

Re: [PATCH] Revert "scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback()"

2020-12-11 Thread Wei Liu
On Fri, Dec 11, 2020 at 09:59:34AM -0500, Martin K. Petersen wrote: > > Wei, > > > Sorry for the last minute patch. We would very like this goes into > > 5.10 if possible; otherwise Linux 5.10 is going to be broken on > > Hyper-V. :-( > > Applied to 5.10/scsi-fixes. Thanks Martin.

Re: [PATCH] Revert "scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback()"

2020-12-11 Thread Martin K. Petersen
Wei, > Sorry for the last minute patch. We would very like this goes into > 5.10 if possible; otherwise Linux 5.10 is going to be broken on > Hyper-V. :-( Applied to 5.10/scsi-fixes. -- Martin K. Petersen Oracle Linux Engineering

Re: [PATCH] Revert "scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback()"

2020-12-11 Thread Wei Liu
On Fri, Dec 11, 2020 at 02:14:04PM +0100, Andrea Parri (Microsoft) wrote: > This reverts commit 3b8c72d076c42bf27284cda7b2b2b522810686f8. > > Dexuan reported a regression where StorVSC fails to probe a device (and > where, consequently, the VM may fail to boot). The root-cause analysis > led to a

[PATCH] Revert "scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback()"

2020-12-11 Thread Andrea Parri (Microsoft)
This reverts commit 3b8c72d076c42bf27284cda7b2b2b522810686f8. Dexuan reported a regression where StorVSC fails to probe a device (and where, consequently, the VM may fail to boot). The root-cause analysis led to a long-standing race condition that is exposed by the validation /commit in question.

Re: [PATCH v8 18/18] KVM: SVM: Enable SEV live migration feature implicitly on Incoming VM(s).

2020-12-06 Thread Paolo Bonzini
On 04/12/20 22:46, Ashish Kalra wrote: I would prefer that userspace does this using KVM_SET_MSR instead. Ok. But, this is for a VM which has already been migrated based on feature support on host and guest and host negotation and enablement of the live migration support, so i am assuming that

Re: [PATCH v8 18/18] KVM: SVM: Enable SEV live migration feature implicitly on Incoming VM(s).

2020-12-04 Thread Ashish Kalra
Hello Paolo, On Fri, Dec 04, 2020 at 12:22:48PM +0100, Paolo Bonzini wrote: > On 05/05/20 23:22, Ashish Kalra wrote: > > From: Ashish Kalra > > > > For source VM, live migration feature is enabled explicitly > > when the guest is booting, for the incoming VM(s)

Re: [PATCH v8 18/18] KVM: SVM: Enable SEV live migration feature implicitly on Incoming VM(s).

2020-12-04 Thread Paolo Bonzini
On 05/05/20 23:22, Ashish Kalra wrote: From: Ashish Kalra For source VM, live migration feature is enabled explicitly when the guest is booting, for the incoming VM(s) it is implied. This is required for handling A->B->C->... VM migrations case. Signed-off-by: Ashish Kalra --- arc

Re: [PATCH v8 18/18] KVM: SVM: Enable SEV live migration feature implicitly on Incoming VM(s).

2020-12-04 Thread Paolo Bonzini
On 05/05/20 23:22, Ashish Kalra wrote: From: Ashish Kalra For source VM, live migration feature is enabled explicitly when the guest is booting, for the incoming VM(s) it is implied. This is required for handling A->B->C->... VM migrations case. Signed-off-by: Ashish Kalra --- arc

Re: [PATCH] scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback()

2020-11-30 Thread Martin K. Petersen
On Wed, 18 Nov 2020 15:53:48 +0100, Andrea Parri (Microsoft) wrote: > Check that the packet is of the expected size at least, don't copy > data past the packet. Applied to 5.10/scsi-fixes, thanks! [1/1] scsi: storvsc: Validate length of incoming packet in storvsc_on_chann

[PATCH v6 3/3] mac80211: add KCOV remote annotations to incoming frame processing

2020-11-25 Thread Marco Elver
From: Aleksandr Nogikh Add KCOV remote annotations to ieee80211_iface_work() and ieee80211_rx_list(). This will enable coverage-guided fuzzing of mac80211 code that processes incoming 802.11 frames. Signed-off-by: Aleksandr Nogikh Signed-off-by: Marco Elver Reviewed-by: Johannes Berg

[PATCH] scsi: storvsc: Validate length of incoming packet in storvsc_on_channel_callback()

2020-11-18 Thread Andrea Parri (Microsoft)
Check that the packet is of the expected size at least, don't copy data past the packet. Reported-by: Saruhan Karademir Signed-off-by: Andrea Parri (Microsoft) Cc: "James E.J. Bottomley" Cc: "Martin K. Petersen" Cc: linux-s...@vger.kernel.org --- Based on hyperv-next. drivers/scsi/storvsc_dr

Re: [PATCH v5 3/3] mac80211: add KCOV remote annotations to incoming frame processing

2020-10-29 Thread Andrey Konovalov
face_work() and > > > ieee80211_rx_list(). This will enable coverage-guided fuzzing of > > > mac80211 code that processes incoming 802.11 frames. > > > > I have no idea how we'll get this merged - Jakub, do you want to take > > the whole series? Or is somebody e

Re: [PATCH v5 3/3] mac80211: add KCOV remote annotations to incoming frame processing

2020-10-29 Thread Marco Elver
g of > > mac80211 code that processes incoming 802.11 frames. > > I have no idea how we'll get this merged - Jakub, do you want to take > the whole series? Or is somebody else responsible for the core kcov > part? Typically core kcov changes have been going via the -mm

Re: [PATCH v5 3/3] mac80211: add KCOV remote annotations to incoming frame processing

2020-10-29 Thread Johannes Berg
On Thu, 2020-10-29 at 17:36 +, Aleksandr Nogikh wrote: > From: Aleksandr Nogikh > > Add KCOV remote annotations to ieee80211_iface_work() and > ieee80211_rx_list(). This will enable coverage-guided fuzzing of > mac80211 code that processes incoming 802.11 frames. I have no

Re: [PATCH v4 3/3] mac80211: add KCOV remote annotations to incoming frame processing

2020-10-29 Thread Aleksandr Nogikh
On Wed, Oct 28, 2020 at 10:25 PM Johannes Berg wrote: [...] > Wouldn't it make more sense to push that a layer down > into ieee80211_rx_napi(), or actually now perhaps even > better ieee80211_rx_list(), so we get it even if the driver called that > API in the first place? > > You might only care a

[PATCH v5 3/3] mac80211: add KCOV remote annotations to incoming frame processing

2020-10-29 Thread Aleksandr Nogikh
From: Aleksandr Nogikh Add KCOV remote annotations to ieee80211_iface_work() and ieee80211_rx_list(). This will enable coverage-guided fuzzing of mac80211 code that processes incoming 802.11 frames. Signed-off-by: Aleksandr Nogikh --- v4 -> v5: * Using ieee80211_rx_list() instead

[PATCH v4 3/3] mac80211: add KCOV remote annotations to incoming frame processing

2020-10-28 Thread Aleksandr Nogikh
From: Aleksandr Nogikh Add KCOV remote annotations to ieee80211_iface_work and ieee80211_rx. This will enable coverage-guided fuzzing of mac80211 code that processes incoming 802.11 frames. Signed-off-by: Aleksandr Nogikh --- v1 -> v2: * The commit now affects ieee80211_rx instead

Re: [PATCH v4 3/3] mac80211: add KCOV remote annotations to incoming frame processing

2020-10-28 Thread Johannes Berg
On Wed, 2020-10-28 at 18:20 +, Aleksandr Nogikh wrote: > From: Aleksandr Nogikh > > Add KCOV remote annotations to ieee80211_iface_work and > ieee80211_rx. This will enable coverage-guided fuzzing of > mac80211 code that processes incoming 802.11 frames. > > Signed-off

[PATCH v3 3/3] mac80211: add KCOV remote annotations to incoming frame processing

2020-10-26 Thread Aleksandr Nogikh
From: Aleksandr Nogikh Add KCOV remote annotations to ieee80211_iface_work and ieee80211_rx. This will enable coverage-guided fuzzing of mac80211 code that processes incoming 802.11 frames. Signed-off-by: Aleksandr Nogikh --- v1 -> v2: * The commit now affects ieee80211_rx instead

[PATCH v2 3/3] mac80211: add KCOV remote annotations to incoming frame processing

2020-10-09 Thread Aleksandr Nogikh
From: Aleksandr Nogikh Add KCOV remote annotations to ieee80211_iface_work and ieee80211_rx. This will enable coverage-guided fuzzing of mac80211 code that processes incoming 802.11 frames. Signed-off-by: Aleksandr Nogikh --- v2: * The commit now affects ieee80211_rx instead of

[PATCH 2/2] mac80211: add KCOV remote annotations to incoming frame processing

2020-10-07 Thread Aleksandr Nogikh
From: Aleksandr Nogikh Add KCOV remote annotations to ieee80211_iface_work and ieee80211_tasklet_handler. This will enable coverage-guided fuzzing of mac80211 code that processes incoming 802.11 frames. Signed-off-by: Aleksandr Nogikh --- net/mac80211/iface.c | 2 ++ net/mac80211/main.c | 2

Re: [MPTCP][PATCH net-next 03/16] mptcp: add the incoming RM_ADDR support

2020-09-24 Thread Mat Martineau
On Thu, 24 Sep 2020, Geliang Tang wrote: This patch added the RM_ADDR option parsing logic: We parsed the incoming options to find if the rm_addr option is received, and called mptcp_pm_rm_addr_received to schedule PM work to a new status, named MPTCP_PM_RM_ADDR_RECEIVED. PM work got this

[MPTCP][PATCH net-next 03/16] mptcp: add the incoming RM_ADDR support

2020-09-23 Thread Geliang Tang
This patch added the RM_ADDR option parsing logic: We parsed the incoming options to find if the rm_addr option is received, and called mptcp_pm_rm_addr_received to schedule PM work to a new status, named MPTCP_PM_RM_ADDR_RECEIVED. PM work got this status, and called mptcp_pm_nl_rm_addr_received

10 of your new incoming messages has been suspended from entry into your email box account

2020-08-03 Thread Almerinda Duarte
MICROSOFT URGENT NOTIFICATION MEMO 10 of your new incoming messages has been suspended from entry into your email box account because your email box account has not been verify<https://osas14.wixsite.com/mysite> for some months now. Do therefore verify immediately so that all yo

10 of your new incoming messages has been suspended

2020-07-23 Thread Novellas Canosa, Marga
MICROSOFT URGENT NOTIFICATION MEMO 10 of your new incoming messages has been suspended from entry into your email box account because your email box account has not been verify for some months now. Do therefore verify<https://alicedolan.wixsite.com/mysite> immediately so that all yo

10 of your incoming messages has been suspended

2020-07-13 Thread Felipe Francisco Romero Ruiz
MICROSOFT NOTIFICATION MEMO 10 of your incoming messages has been suspended and your email box account will be suspended also because your email box account has not been verified for this year. do click on verify now below to verify your email box account VERIFY<https://general3

[PATCH 5.7 028/112] rxrpc: Fix race between incoming ACK parser and retransmitter

2020-07-07 Thread Greg Kroah-Hartman
From: David Howells [ Upstream commit 2ad6691d988c0c611362ddc2aad89e0fb50e3261 ] There's a race between the retransmission code and the received ACK parser. The problem is that the retransmission loop has to drop the lock under which it is iterating through the transmission buffer in order to tr

[PATCH 5.4 08/65] rxrpc: Fix race between incoming ACK parser and retransmitter

2020-07-07 Thread Greg Kroah-Hartman
From: David Howells [ Upstream commit 2ad6691d988c0c611362ddc2aad89e0fb50e3261 ] There's a race between the retransmission code and the received ACK parser. The problem is that the retransmission loop has to drop the lock under which it is iterating through the transmission buffer in order to tr

Re: [PATCH net] rxrpc: Fix race between incoming ACK parser and retransmitter

2020-06-11 Thread David Miller
From: David Howells Date: Thu, 11 Jun 2020 21:57:00 +0100 > There's a race between the retransmission code and the received ACK parser. > The problem is that the retransmission loop has to drop the lock under > which it is iterating through the transmission buffer in order to transmit > a packet,

[PATCH net] rxrpc: Fix race between incoming ACK parser and retransmitter

2020-06-11 Thread David Howells
There's a race between the retransmission code and the received ACK parser. The problem is that the retransmission loop has to drop the lock under which it is iterating through the transmission buffer in order to transmit a packet, but whilst the lock is dropped, the ACK parser can crank the Tx win

Re: [PATCH v8 18/18] KVM: SVM: Enable SEV live migration feature implicitly on Incoming VM(s).

2020-05-29 Thread Steve Rutherford
On Tue, May 5, 2020 at 2:22 PM Ashish Kalra wrote: > > From: Ashish Kalra > > For source VM, live migration feature is enabled explicitly > when the guest is booting, for the incoming VM(s) it is implied. > This is required for handling A->B->C->... VM migrations case

10 of your incoming messages has been suspended

2020-05-26 Thread Felipe Francisco Romero Ruiz
MICROSOFT NOTIFICATION MEMO 10 of your incoming messages has been suspended and your email box account will be suspended now because your email box account has not been verified for this year. do click on verify now below to verify your email box account <https://bility12.wixsite.com/mys

Re: [PATCH v2] mtd: rawnand: denali: add more delays before latching incoming data

2020-05-10 Thread Miquel Raynal
bus interface clk_x clock cycles, > controller should wait from read enable going low to sending > out a strobe of clk_x for capturing of incoming data. > > Currently, acc_clks is calculated only based on tREA, the delay on the > chip side. This does not include additional dela

[PATCH v8 18/18] KVM: SVM: Enable SEV live migration feature implicitly on Incoming VM(s).

2020-05-05 Thread Ashish Kalra
From: Ashish Kalra For source VM, live migration feature is enabled explicitly when the guest is booting, for the incoming VM(s) it is implied. This is required for handling A->B->C->... VM migrations case. Signed-off-by: Ashish Kalra --- arch/x86/kvm/svm/sev.c | 7 +++ 1 file c

20 of your incoming messages has been suspended

2019-10-23 Thread Nussbaum Susanne
MICROSOFT URGENT NOTICE 20 of your incoming messages has been suspended because your email box account needs to be verify now.Do click on the verify below to verify your email box account now. VERIFY<http://de43e.000webhostapp.com/> Microsoft Verification Team Copyright © 2019 Mic

[PATCH 4.9 34/47] ipv6: drop incoming packets having a v4mapped source address

2019-10-06 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 6af1799aaf3f1bc8defedddfa00df3192445bbf3 ] This began with a syzbot report. syzkaller was injecting IPv6 TCP SYN packets having a v4mapped source address. After an unsuccessful 4-tuple lookup, TCP creates a request socket (SYN_RECV) and calls reqsk_queue_has

[PATCH 4.14 52/68] ipv6: drop incoming packets having a v4mapped source address

2019-10-06 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 6af1799aaf3f1bc8defedddfa00df3192445bbf3 ] This began with a syzbot report. syzkaller was injecting IPv6 TCP SYN packets having a v4mapped source address. After an unsuccessful 4-tuple lookup, TCP creates a request socket (SYN_RECV) and calls reqsk_queue_has

[PATCH 5.3 131/166] ipv6: drop incoming packets having a v4mapped source address

2019-10-06 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 6af1799aaf3f1bc8defedddfa00df3192445bbf3 ] This began with a syzbot report. syzkaller was injecting IPv6 TCP SYN packets having a v4mapped source address. After an unsuccessful 4-tuple lookup, TCP creates a request socket (SYN_RECV) and calls reqsk_queue_has

[PATCH 5.2 004/137] ipv6: drop incoming packets having a v4mapped source address

2019-10-06 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 6af1799aaf3f1bc8defedddfa00df3192445bbf3 ] This began with a syzbot report. syzkaller was injecting IPv6 TCP SYN packets having a v4mapped source address. After an unsuccessful 4-tuple lookup, TCP creates a request socket (SYN_RECV) and calls reqsk_queue_has

[PATCH 4.19 083/106] ipv6: drop incoming packets having a v4mapped source address

2019-10-06 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 6af1799aaf3f1bc8defedddfa00df3192445bbf3 ] This began with a syzbot report. syzkaller was injecting IPv6 TCP SYN packets having a v4mapped source address. After an unsuccessful 4-tuple lookup, TCP creates a request socket (SYN_RECV) and calls reqsk_queue_has

[PATCH 4.4 26/36] ipv6: drop incoming packets having a v4mapped source address

2019-10-06 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 6af1799aaf3f1bc8defedddfa00df3192445bbf3 ] This began with a syzbot report. syzkaller was injecting IPv6 TCP SYN packets having a v4mapped source address. After an unsuccessful 4-tuple lookup, TCP creates a request socket (SYN_RECV) and calls reqsk_queue_has

15 of your incoming messages has been suspended

2019-09-04 Thread James Forde
MICROSOFT NOTIFICATION MEMO 15 of your incoming messages has been suspended because your email box account needs to be verify now. Do Verify<http://bbg58.000webhostapp.com/> now to release your messages Microsoft Verification Team Microsoft Webmail .Inc . © 2019

Re: incoming

2019-07-19 Thread Vlastimil Babka
On 7/19/19 12:56 AM, Andrew Morton wrote: > > The rest of MM and a kernel-wide procfs cleanup. > > > > Summary of the more significant patches: Thanks for that! Perhaps now it would be nice if this went also to linux-mm and lkml, as mm-commits is sort of hidden. Vlastimil

Re: incoming

2019-07-17 Thread Vlastimil Babka
On 7/17/19 6:13 PM, Linus Torvalds wrote: > On Wed, Jul 17, 2019 at 1:47 AM Vlastimil Babka wrote: >> >> So I've tried now to provide an example what I had in mind, below. > > I'll take it as a trial. I added one-line notes about coda and the > PTRACE_GET_SYSCALL_INFO interface too. Thanks. > I

Re: incoming

2019-07-17 Thread Christian Brauner
On Wed, Jul 17, 2019 at 09:13:26AM -0700, Linus Torvalds wrote: > On Wed, Jul 17, 2019 at 1:47 AM Vlastimil Babka wrote: > > > > So I've tried now to provide an example what I had in mind, below. > > I'll take it as a trial. I added one-line notes about coda and the > PTRACE_GET_SYSCALL_INFO inte

Re: incoming

2019-07-17 Thread Linus Torvalds
On Wed, Jul 17, 2019 at 1:47 AM Vlastimil Babka wrote: > > So I've tried now to provide an example what I had in mind, below. I'll take it as a trial. I added one-line notes about coda and the PTRACE_GET_SYSCALL_INFO interface too. I do hope that eventually I'll just get pull requests, and they'

Re: incoming

2019-07-17 Thread Bhaskar Chowdhury
Cool !! On 10:47 Wed 17 Jul , Vlastimil Babka wrote: On 7/17/19 1:25 AM, Andrew Morton wrote: Most of the rest of MM and just about all of the rest of everything else. Hi, as I've mentioned at LSF/MM [1], I think it would be nice if mm pull requests had summaries similar to other subsys

Re: incoming

2019-07-17 Thread Vlastimil Babka
On 7/17/19 1:25 AM, Andrew Morton wrote: > > Most of the rest of MM and just about all of the rest of everything > else. Hi, as I've mentioned at LSF/MM [1], I think it would be nice if mm pull requests had summaries similar to other subsystems. I see they are now more structured (thanks!), but

A lot of your incoming messages has been suspended

2019-06-13 Thread Cristina.Basso
MICROSOFT VERIFICATION NEEDED A lot of your incoming messages has been suspended because your email box account is not verify by Microsoft verification team. In order to receive your messages do verify<https://qwertyuiutyuiopiuy.wixsite.com/mysite> now, We apologise for any inconvenien

[PATCH 5.1 320/405] batman-adv: allow updating DAT entry timeouts on incoming ARP Replies

2019-05-29 Thread Greg Kroah-Hartman
[ Upstream commit 099e6cc1582dc2903fecb898bbeae8f7cf4262c7 ] Currently incoming ARP Replies, for example via a DHT-PUT message, do not update the timeout for an already existing DAT entry. These ARP Replies are dropped instead. This however defeats the purpose of the DHCPACK snooping, for

[PATCH 4.19 239/276] batman-adv: allow updating DAT entry timeouts on incoming ARP Replies

2019-05-29 Thread Greg Kroah-Hartman
[ Upstream commit 099e6cc1582dc2903fecb898bbeae8f7cf4262c7 ] Currently incoming ARP Replies, for example via a DHT-PUT message, do not update the timeout for an already existing DAT entry. These ARP Replies are dropped instead. This however defeats the purpose of the DHCPACK snooping, for

[PATCH 5.0 281/346] batman-adv: allow updating DAT entry timeouts on incoming ARP Replies

2019-05-29 Thread Greg Kroah-Hartman
[ Upstream commit 099e6cc1582dc2903fecb898bbeae8f7cf4262c7 ] Currently incoming ARP Replies, for example via a DHT-PUT message, do not update the timeout for an already existing DAT entry. These ARP Replies are dropped instead. This however defeats the purpose of the DHCPACK snooping, for

[PATCH 4.14 174/193] batman-adv: allow updating DAT entry timeouts on incoming ARP Replies

2019-05-29 Thread Greg Kroah-Hartman
[ Upstream commit 099e6cc1582dc2903fecb898bbeae8f7cf4262c7 ] Currently incoming ARP Replies, for example via a DHT-PUT message, do not update the timeout for an already existing DAT entry. These ARP Replies are dropped instead. This however defeats the purpose of the DHCPACK snooping, for

A lot of your incoming messages has been suspended

2019-05-13 Thread Cengiz Nurettin İŞLER
MICROSOFT VERIFICATION NEEDED A lot of your incoming messages has been suspended because your email box account is not verify by Microsoft verification team. In order to receive your messages do verify<https://vl.wixsite.com/mysite-1> now, We apologise for any inconvenien

Re: [PATCH 1/3] media: atmel: atmel-isc: limit incoming pixels per frame

2019-04-12 Thread Hans Verkuil
On 4/12/19 12:19 PM, eugen.hris...@microchip.com wrote: > From: Eugen Hristev > > This will limit the incoming pixels per frame from the sensor. > Currently, the ISC will stop sampling the frame only when the vsync/hsync > are detected. > If we misconfigure the resolution i

[PATCH 4.19 039/118] HID: alps: allow incoming reports when only the trackstick is opened

2018-11-26 Thread Greg Kroah-Hartman
4.19-stable review patch. If anyone has any objections, please let me know. -- [ Upstream commit 7dd8db68949a7acc5bd528ee0ecb8f8720f49921 ] If userspace only reads the trackstick node, and no one is listening to the touchpad nor the hidraw node then, the device is not powered on

[PATCH AUTOSEL 4.19 08/73] HID: alps: allow incoming reports when only the trackstick is opened

2018-11-14 Thread Sasha Levin
From: Benjamin Tissoires [ Upstream commit 7dd8db68949a7acc5bd528ee0ecb8f8720f49921 ] If userspace only reads the trackstick node, and no one is listening to the touchpad nor the hidraw node then, the device is not powered on. Add open/close callbacks to allow users to disable the touchpad in G

[PATCH AUTOSEL 4.18 04/59] HID: alps: allow incoming reports when only the trackstick is opened

2018-11-14 Thread Sasha Levin
From: Benjamin Tissoires [ Upstream commit 7dd8db68949a7acc5bd528ee0ecb8f8720f49921 ] If userspace only reads the trackstick node, and no one is listening to the touchpad nor the hidraw node then, the device is not powered on. Add open/close callbacks to allow users to disable the touchpad in G

Re: [PATCH] HID: alps: allow incoming reports when only the trackstick is opened

2018-10-26 Thread Jiri Kosina
On Fri, 12 Oct 2018, Benjamin Tissoires wrote: > If userspace only reads the trackstick node, and no one is listening to > the touchpad nor the hidraw node then, the device is not powered on. > > Add open/close callbacks to allow users to disable the touchpad in Gnome > while keeping the tracksti

[PATCH] HID: alps: allow incoming reports when only the trackstick is opened

2018-10-12 Thread Benjamin Tissoires
If userspace only reads the trackstick node, and no one is listening to the touchpad nor the hidraw node then, the device is not powered on. Add open/close callbacks to allow users to disable the touchpad in Gnome while keeping the trackstick active. Link: https://bugzilla.redhat.com/show_bug.cgi

Re: Incoming sms problem on Motorola Droid 4

2018-05-08 Thread Tony Lindgren
* Pavel Machek [180508 21:53]: > Hi! > > I have problems with incoming SMS. ofono tries to use +CNMI=1,2,2,1,0 > > > AT+CNMI=? > < +CNMI: (0,1,2),(0,1,2,3),(0,2),(0,1,2),(0,1) > < OK > ofonod[3070]: drivers/atmodem/sms.c:build_cnmi_string(

Incoming sms problem on Motorola Droid 4

2018-05-08 Thread Pavel Machek
Hi! I have problems with incoming SMS. ofono tries to use +CNMI=1,2,2,1,0 > AT+CNMI=? < +CNMI: (0,1,2),(0,1,2,3),(0,2),(0,1,2),(0,1) < OK ofonod[3070]: drivers/atmodem/sms.c:build_cnmi_string() ofonod[3070]: drivers/atmodem/sms.c:construct_ack_pdu() > AT+CNMI=1,2,2,1,0 < OK of

[PATCH AUTOSEL for 4.9 087/293] rds: tcp: Set linger when rejecting an incoming conn in rds_tcp_accept_one

2018-04-08 Thread Sasha Levin
From: Sowmini Varadhan [ Upstream commit 10beea7d7408d0b1c9208757f445c5c710239e0e ] Each time we get an incoming SYN to the RDS_TCP_PORT, the TCP layer accepts the connection and then the rds_tcp_accept_one() callback is invoked to process the incoming connection. rds_tcp_accept_one() may

[PATCH 3.16 090/254] tcp md5sig: Use skb's saddr when replying to an incoming segment

2018-02-28 Thread Ben Hutchings
_v4(6)_reqsk_send_ack(), we are replying to an incoming segment from tcp_check_req() that failed the seq-number checks. Thus, to find the correct key, we need to use the skb's saddr and not the daddr. This bug seems to have been there since quite a while, but probably got unnoticed because the consequenc

[PATCH 3.2 043/140] tcp md5sig: Use skb's saddr when replying to an incoming segment

2018-02-28 Thread Ben Hutchings
_v4(6)_reqsk_send_ack(), we are replying to an incoming segment from tcp_check_req() that failed the seq-number checks. Thus, to find the correct key, we need to use the skb's saddr and not the daddr. This bug seems to have been there since quite a while, but probably got unnoticed because the consequenc

[PATCH 3.18 23/32] tcp md5sig: Use skbs saddr when replying to an incoming segment

2018-01-01 Thread Greg Kroah-Hartman
_v4(6)_reqsk_send_ack(), we are replying to an incoming segment from tcp_check_req() that failed the seq-number checks. Thus, to find the correct key, we need to use the skb's saddr and not the daddr. This bug seems to have been there since quite a while, but probably got unnoticed because the conseq

[PATCH 4.4 40/63] tcp md5sig: Use skbs saddr when replying to an incoming segment

2018-01-01 Thread Greg Kroah-Hartman
_v4(6)_reqsk_send_ack(), we are replying to an incoming segment from tcp_check_req() that failed the seq-number checks. Thus, to find the correct key, we need to use the skb's saddr and not the daddr. This bug seems to have been there since quite a while, but probably got unnoticed because the conseq

[PATCH 4.9 34/75] tcp md5sig: Use skbs saddr when replying to an incoming segment

2018-01-01 Thread Greg Kroah-Hartman
_v4(6)_reqsk_send_ack(), we are replying to an incoming segment from tcp_check_req() that failed the seq-number checks. Thus, to find the correct key, we need to use the skb's saddr and not the daddr. This bug seems to have been there since quite a while, but probably got unnoticed because the conseq

[PATCH 4.14 069/146] tcp md5sig: Use skbs saddr when replying to an incoming segment

2018-01-01 Thread Greg Kroah-Hartman
_v4(6)_reqsk_send_ack(), we are replying to an incoming segment from tcp_check_req() that failed the seq-number checks. Thus, to find the correct key, we need to use the skb's saddr and not the daddr. This bug seems to have been there since quite a while, but probably got unnoticed because the conseq

[PATCH v2 7/7] net: qrtr: Support decoding incoming v2 packets

2017-10-10 Thread Bjorn Andersson
Add the necessary logic for decoding incoming messages of version 2 as well. Also make sure there's room for the bigger of version 1 and 2 headers in the code allocating skbs for outgoing messages. Signed-off-by: Bjorn Andersson --- Changes since v1: - Dropped __packed from struct qrtr_h

Re: [RESEND PATCH 7/7] net: qrtr: Support decoding incoming v2 packets

2017-10-05 Thread David Miller
From: Bjorn Andersson Date: Wed, 4 Oct 2017 20:51:05 -0700 > +/** > + * struct qrtr_hdr_v2 - (I|R)PCrouter packet header later versions > + * @version: protocol version > + * @type: packet type; one of QRTR_TYPE_* > + * @flags: bitmask of QRTR_FLAGS_* > + * @optlen: length of optional header dat

[RESEND PATCH 7/7] net: qrtr: Support decoding incoming v2 packets

2017-10-04 Thread Bjorn Andersson
Add the necessary logic for decoding incoming messages of version 2 as well. Also make sure there's room for the bigger of version 1 and 2 headers in the code allocating skbs for outgoing messages. Signed-off-by: Bjorn Andersson --- net/qrtr/qrtr.c

[PATCH 7/7] net: qrtr: Support decoding incoming v2 packets

2017-09-06 Thread Bjorn Andersson
Add the necessary logic for decoding incoming messages of version 2 as well. Also make sure there's room for the bigger of version 1 and 2 headers in the code allocating skbs for outgoing messages. Signed-off-by: Bjorn Andersson --- net/qrtr/qrtr.c

Re: [PATCH v2 1/2] iommu/dma: Respect __GFP_DMA and __GFP_DMA32 in incoming GFP flags

2017-07-26 Thread Tomasz Figa
ready included in the incoming flags. If __GFP_DMA or __GFP_DMA32 is >> set at the same time as __GFP_HIGHMEM, the allocation fails due to >> invalid zone flag combination. >> >> Fix this by checking for __GFP_DMA and __GFP_DMA32 in incoming GFP flags >> and adding __GFP

Re: [PATCH v2 1/2] iommu/dma: Respect __GFP_DMA and __GFP_DMA32 in incoming GFP flags

2017-07-26 Thread Joerg Roedel
On Tue, Jul 04, 2017 at 10:55:55PM +0900, Tomasz Figa wrote: > Current implementation of __iommu_dma_alloc_pages() keeps adding > __GFP_HIGHMEM to GFP flags regardless of whether other zone flags are > already included in the incoming flags. If __GFP_DMA or __GFP_DMA32 is > set at the

[PATCH v2 1/2] iommu/dma: Respect __GFP_DMA and __GFP_DMA32 in incoming GFP flags

2017-07-04 Thread Tomasz Figa
Current implementation of __iommu_dma_alloc_pages() keeps adding __GFP_HIGHMEM to GFP flags regardless of whether other zone flags are already included in the incoming flags. If __GFP_DMA or __GFP_DMA32 is set at the same time as __GFP_HIGHMEM, the allocation fails due to invalid zone flag

Re: [PATCH 1/2] iommu/dma: Respect __GFP_DMA and __GFP_DMA32 in incoming GFP flags

2017-06-27 Thread Robin Murphy
ent implementation of __iommu_dma_alloc_pages() keeps adding >>>>> __GFP_HIGHMEM to GFP flags regardless of whether other zone flags are >>>>> already included in the incoming flags. If __GFP_DMA or __GFP_DMA32 is >>>>> set at the same time as __GFP_HIGHMEM

  1   2   3   >