[ Upstream commit db5ebd6edd2627d7e81a031643cf43587f63e66c ]
XEN has special page merge requirement, see xen_biovec_phys_mergeable().
We can't merge pages into one bvec simply for XEN.
So move XEN's specific check on page merge into __bio_try_merge_page(),
then abvoid to break XEN by multi-page b
[ Upstream commit 0383ad4374f7ad7edd925a2ee4753035c3f5508a ]
xen_biovec_phys_mergeable() only needs .bv_page of the 2nd bio bvec
for checking if the two bvecs can be merged, so pass page to
xen_biovec_phys_mergeable() directly.
No function change.
Cc: ris Ostrovsky
Cc: Juergen Gross
Cc: xen-de
[ Upstream commit 0383ad4374f7ad7edd925a2ee4753035c3f5508a ]
xen_biovec_phys_mergeable() only needs .bv_page of the 2nd bio bvec
for checking if the two bvecs can be merged, so pass page to
xen_biovec_phys_mergeable() directly.
No function change.
Cc: ris Ostrovsky
Cc: Juergen Gross
Cc: xen-de
4.14-stable review patch. If anyone has any objections, please let me know.
--
[ Upstream commit 254eb5505ca0ca749d3a491fc6668b6c16647a99 ]
The LDT remap placement has been changed. It's now placed before the direct
mapping in the kernel virtual address space for both paging mod
4.14-stable review patch. If anyone has any objections, please let me know.
--
[ Upstream commit 16877a5570e0c5f4270d5b17f9bab427bcae9514 ]
There is a guard hole at the beginning of the kernel address space, also
used by hypervisors. It occupies 16 PGD entries.
This reserved ra
4.19-stable review patch. If anyone has any objections, please let me know.
--
[ Upstream commit 254eb5505ca0ca749d3a491fc6668b6c16647a99 ]
The LDT remap placement has been changed. It's now placed before the direct
mapping in the kernel virtual address space for both paging mod
4.19-stable review patch. If anyone has any objections, please let me know.
--
[ Upstream commit 16877a5570e0c5f4270d5b17f9bab427bcae9514 ]
There is a guard hole at the beginning of the kernel address space, also
used by hypervisors. It occupies 16 PGD entries.
This reserved ra
/page_ext.c | 2 +-
> mm/percpu.c| 11 ---
> mm/sparse.c| 6 ++
> 14 files changed, 37 insertions(+), 114 deletions(-)
Acked-by: Greg Kroah-Hartman
___
Xen-devel mailing list
Xen-devel@lists.
Petkov
Cc: "H. Peter Anvin"
Cc:
Cc:
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/xen/debugfs.c | 7 +--
arch/x86/xen/p2m.c | 3 ---
2 files changed, 1 insertion(+), 9 deletions(-)
diff --git a/arch/x86/xen/debugfs.c b/arch/x86/xen/debugfs.c
index 13da87918b4f..532410998
e112802780020d...@prv1-mh.provo.novell.com
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/entry/entry_64_compat.S |6 --
1 file changed, 4 insertions(+), 2 deletions(-)
--- a/arch/x86/entry/entry_64_compat.S
+++ b/arch/x86/entry/entry_64_compat.S
@@ -361,7 +361,8 @@ ENTRY(
e112802780020d...@prv1-mh.provo.novell.com
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/entry/entry_64_compat.S |6 --
1 file changed, 4 insertions(+), 2 deletions(-)
--- a/arch/x86/entry/entry_64_compat.S
+++ b/arch/x86/entry/entry_64_compat.S
@@ -356,7 +356,8 @@ ENTRY(
s is part a tree-wide conversion, as described in commit fc1d8e7cca2d
> ("mm: introduce put_user_page*(), placeholder versions").
>
> Cc: Eric Anholt
> Cc: Stefan Wahren
> Cc: Greg Kroah-Hartman
> Cc: Mihaela Muraru
> Cc: Suniel Mahesh
> Cc: Al Viro
&
; was wrong anyway, because the get_user_pages() pattern of usage here
> never allowed for NULL entries within a range of pinned pages.
>
> Cc: Frank Haverkamp
> Cc: "Guilherme G. Piccoli"
> Cc: Arnd Bergmann
> Cc: Greg Kroah-Hartman
> Signed-off-by: John Hubbard
>
Kroah-Hartman
---
drivers/net/xen-netback/netback.c | 3 --
drivers/net/xen-netback/xenbus.c | 46 ---
2 files changed, 11 insertions(+), 38 deletions(-)
diff --git a/drivers/net/xen-netback/netback.c
b/drivers/net/xen-netback/netback.c
index 1d9940d4e8c7
4.19-stable review patch. If anyone has any objections, please let me know.
--
[ Upstream commit 9f51c05dc41a6d69423e3d03d18eb7ab22f9ec19 ]
The problem is that we call this with a spin lock held.
The call tree is:
pvcalls_front_accept() holds bedata->socket_lock.
-> create_a
4.19-stable review patch. If anyone has any objections, please let me know.
--
[ Upstream commit b4711098066f1cf808d4dc11a1a842860a3292fe ]
static checker warning:
drivers/xen/pvcalls-front.c:373 alloc_active_ring()
error: we previously assumed 'map->active.ring' could
4.20-stable review patch. If anyone has any objections, please let me know.
--
[ Upstream commit b4711098066f1cf808d4dc11a1a842860a3292fe ]
static checker warning:
drivers/xen/pvcalls-front.c:373 alloc_active_ring()
error: we previously assumed 'map->active.ring' could
4.20-stable review patch. If anyone has any objections, please let me know.
--
[ Upstream commit 9f51c05dc41a6d69423e3d03d18eb7ab22f9ec19 ]
The problem is that we call this with a spin lock held.
The call tree is:
pvcalls_front_accept() holds bedata->socket_lock.
-> create_a
From: Jason Gunthorpe
[ Upstream commit fa6614d8ef13c63aac52ad7c07c5e69ce4aba3dd ]
DMA_SHARED_BUFFER can not be enabled by the user (it represents a library
set in the kernel). The kconfig convention is to use select for such
symbols so they are turned on implicitly when the user enables a kconf
From: Jason Gunthorpe
[ Upstream commit fa6614d8ef13c63aac52ad7c07c5e69ce4aba3dd ]
DMA_SHARED_BUFFER can not be enabled by the user (it represents a library
set in the kernel). The kconfig convention is to use select for such
symbols so they are turned on implicitly when the user enables a kconf
4.4-stable review patch. If anyone has any objections, please let me know.
--
[ Upstream commit b3681dd548d06deb2e1573890829dff4b15abf46 ]
error_entry and error_exit communicate the user vs. kernel status of
the frame using %ebx. This is unnecessary -- the information is in
reg
/20180226140818.4849-1-jgr...@suse.com
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/xen/suspend.c | 16
1 file changed, 16 insertions(+)
--- a/arch/x86/xen/suspend.c
+++ b/arch/x86/xen/suspend.c
@@ -1,12 +1,15 @@
// SPDX-License-Identifier: GPL-2.0
#include
#include
+#include
/20180226140818.4849-1-jgr...@suse.com
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/xen/suspend.c | 16
1 file changed, 16 insertions(+)
--- a/arch/x86/xen/suspend.c
+++ b/arch/x86/xen/suspend.c
@@ -1,12 +1,15 @@
// SPDX-License-Identifier: GPL-2.0
#include
#include
+#include
/20180226140818.4849-1-jgr...@suse.com
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/xen/suspend.c | 16
1 file changed, 16 insertions(+)
--- a/arch/x86/xen/suspend.c
+++ b/arch/x86/xen/suspend.c
@@ -1,11 +1,14 @@
#include
#include
+#include
#include
#include
#include
ergen Gross
Cc: Dou Liyang
Cc: Prarit Bhargava
Cc: Kate Stewart
Cc: Greg Kroah-Hartman
Cc: Andy Lutomirski
Cc: Andi Kleen
Cc: Vitaly Kuznetsov
Cc: xen-devel@lists.xenproject.org
Reviewed-by: Boris Ostrovsky
Signed-off-by: Juergen Gross
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/incl
ris.ostrov...@oracle.com
Cc: xen-devel@lists.xenproject.org
Fixes: 1f50ddb4f4189243c05926b842dc1a0332195f31 ("x86/speculation: Handle HT
correctly on AMD")
Link: https://lore.kernel.org/lkml/20180621084331.21228-1-jgr...@suse.com
Signed-off-by: Ingo Molnar
Signed-off-by: Greg Kroah-Hartman
ris.ostrov...@oracle.com
Cc: xen-devel@lists.xenproject.org
Fixes: 1f50ddb4f4189243c05926b842dc1a0332195f31 ("x86/speculation: Handle HT
correctly on AMD")
Link: https://lore.kernel.org/lkml/20180621084331.21228-1-jgr...@suse.com
Signed-off-by: Ingo Molnar
Signed-off-by: Greg Kroah-Hartman
ris.ostrov...@oracle.com
Cc: xen-devel@lists.xenproject.org
Fixes: 1f50ddb4f4189243c05926b842dc1a0332195f31 ("x86/speculation: Handle HT
correctly on AMD")
Link: https://lore.kernel.org/lkml/20180621084331.21228-1-jgr...@suse.com
Signed-off-by: Ingo Molnar
Signed-off-by: Greg Kroah-Hartman
---
/20180226140818.4849-1-jgr...@suse.com
Signed-off-by: Greg Kroah-Hartman
Signed-off-by: Srivatsa S. Bhat
Reviewed-by: Matt Helsley (VMware)
Reviewed-by: Alexey Makhalov
Reviewed-by: Bo Gan
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/xen/suspend.c | 16
1 file changed, 16
ris.ostrov...@oracle.com
Cc: xen-devel@lists.xenproject.org
Fixes: 1f50ddb4f4189243c05926b842dc1a0332195f31 ("x86/speculation: Handle HT
correctly on AMD")
Link: https://lore.kernel.org/lkml/20180621084331.21228-1-jgr...@suse.com
Signed-off-by: Ingo Molnar
Signed-off-by: Greg Kroah-Hartman
Signe
.1532282627.git.l...@kernel.org
Signed-off-by: Ingo Molnar
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/entry/entry_64.S | 18 --
1 file changed, 4 insertions(+), 14 deletions(-)
--- a/arch/x86/entry/entry_64.S
+++ b/arch/x86/entry/entry_64.S
@@ -981,7 +981,7 @@ ENTRY(
.1532282627.git.l...@kernel.org
Signed-off-by: Ingo Molnar
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/entry/entry_64.S | 18 --
1 file changed, 4 insertions(+), 14 deletions(-)
--- a/arch/x86/entry/entry_64.S
+++ b/arch/x86/entry/entry_64.S
@@ -933,7 +933,7 @@ ENTRY(
y: Eduardo Valentin
Reviewed-by: Alakesh Haloi
Reviewed-by: Vallish Vaidyeshwara
Reviewed-by: Boris Ostrovsky
Cc: Juergen Gross
Cc: Boris Ostrovsky
Cc: xen-devel@lists.xenproject.org
Signed-off-by: Boris Ostrovsky
Signed-off-by: Sasha Levin
Signed-off-by: Greg Kroah-Hartman
---
ar
y: Eduardo Valentin
Reviewed-by: Alakesh Haloi
Reviewed-by: Vallish Vaidyeshwara
Reviewed-by: Boris Ostrovsky
Cc: Juergen Gross
Cc: Boris Ostrovsky
Cc: xen-devel@lists.xenproject.org
Signed-off-by: Boris Ostrovsky
Signed-off-by: Sasha Levin
Signed-off-by: Greg Kroah-Hartman
---
ar
roject.org
Cc: x...@kernel.org
Cc: sta...@vger.kernel.org # for v4.17 and up
Fixes: d94a155c59c9 ("x86/cpu: Prevent cpuinfo_x86::x86_phys_bits adjustment
corruption")
Signed-off-by: Boris Ostrovsky
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/kernel/cpu/common.c |2 +-
arch/x8
roject.org
Cc: x...@kernel.org
Cc: sta...@vger.kernel.org # for v4.17 and up
Fixes: d94a155c59c9 ("x86/cpu: Prevent cpuinfo_x86::x86_phys_bits adjustment
corruption")
Signed-off-by: Boris Ostrovsky
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/kernel/cpu/common.c |2 +-
arch/x8
On Fri, Aug 17, 2018 at 09:59:00AM +0200, David Hildenbrand wrote:
> From: Vitaly Kuznetsov
>
> Well require to call add_memory()/add_memory_resource() with
> device_hotplug_lock held, to avoid a lock inversion. Allow external modules
> (e.g. hv_balloon) that make use of add_memory()/add_memory_r
On Fri, Aug 17, 2018 at 11:41:24AM +0200, David Hildenbrand wrote:
> On 17.08.2018 11:03, Rafael J. Wysocki wrote:
> > On Fri, Aug 17, 2018 at 10:56 AM David Hildenbrand wrote:
> >>
> >> On 17.08.2018 10:41, Greg Kroah-Hartman wrote:
> >>> On Fri,
On Fri, Aug 17, 2018 at 01:56:35PM +0200, David Hildenbrand wrote:
> E.g. When adding the memory block devices, we know that there won't be a
> driver to attach to (as there are no drivers for the "memory" subsystem)
> - the bus_probe_device() function that takes the device_lock() could
> pretty mu
.1532282627.git.l...@kernel.org
Signed-off-by: Ingo Molnar
Signed-off-by: Sarah Newman
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/entry/entry_64.S | 20
1 file changed, 4 insertions(+), 16 deletions(-)
--- a/arch/x86/entry/entry_64.S
+++ b/arch/x86/entry/entry_64.S
org/r/20180911195538.23289-1-boris.ostrov...@oracle.com
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/kernel/eisa.c | 10 --
1 file changed, 8 insertions(+), 2 deletions(-)
--- a/arch/x86/kernel/eisa.c
+++ b/arch/x86/kernel/eisa.c
@@ -7,11 +7,17 @@
#include
#include
+#include
+
static _
org/r/20180911195538.23289-1-boris.ostrov...@oracle.com
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/kernel/eisa.c | 10 --
1 file changed, 8 insertions(+), 2 deletions(-)
--- a/arch/x86/kernel/eisa.c
+++ b/arch/x86/kernel/eisa.c
@@ -7,11 +7,17 @@
#include
#include
+#include
+
static _
ovsky
Cc: xen-devel
Link:
http://lkml.kernel.org/r/685bd083a7c036f7769510b6846315b17d6ba71f.1481307769.git.l...@kernel.org
Signed-off-by: Thomas Gleixner
Cc: "Zhang, Ning A"
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/include/asm/processor.h |2 +-
1 file changed, 1 insertion
ovsky
Cc: xen-devel
Link:
http://lkml.kernel.org/r/685bd083a7c036f7769510b6846315b17d6ba71f.1481307769.git.l...@kernel.org
Signed-off-by: Thomas Gleixner
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/include/asm/processor.h |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
--- a/arc
ovsky
Cc: xen-devel
Link:
http://lkml.kernel.org/r/685bd083a7c036f7769510b6846315b17d6ba71f.1481307769.git.l...@kernel.org
Signed-off-by: Thomas Gleixner
Cc: "Zhang, Ning A"
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/include/asm/processor.h |2 +-
1 file changed, 1 insertion
-off-by: Sasha Levin
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/include/asm/segment.h | 12
arch/x86/mm/extable.c |4 +++-
arch/x86/xen/enlighten_pv.c| 37 -
arch/x86/xen/xen-asm_64.S | 14 ++
4 files
com
Cc: b...@alien8.de
Cc: cor...@lwn.net
Cc: linux-...@vger.kernel.org
Cc: xen-devel@lists.xenproject.org
Link: http://lkml.kernel.org/r/20181010061456.22238-2-jgr...@suse.com
Signed-off-by: Ingo Molnar
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/xen/enlighten_pvh.c |2 +-
1 file chan
com
Cc: b...@alien8.de
Cc: cor...@lwn.net
Cc: linux-...@vger.kernel.org
Cc: xen-devel@lists.xenproject.org
Link: http://lkml.kernel.org/r/20181010061456.22238-2-jgr...@suse.com
Signed-off-by: Ingo Molnar
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/xen/enlighten_pvh.c |2 +-
1 file chan
com
Cc: b...@alien8.de
Cc: cor...@lwn.net
Cc: linux-...@vger.kernel.org
Cc: xen-devel@lists.xenproject.org
Link: http://lkml.kernel.org/r/20181010061456.22238-2-jgr...@suse.com
Signed-off-by: Ingo Molnar
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/xen/enlighten_pvh.c |2 +-
1 file chan
: rkrc...@redhat.com
Cc: sthem...@microsoft.com
Cc: virtualizat...@lists.linux-foundation.org
Cc: xen-devel@lists.xenproject.org
Link: http://lkml.kernel.org/r/20171109132739.23465-3-jgr...@suse.com
Signed-off-by: Ingo Molnar
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/hyperv/hv_init.c
...@rustcorp.com.au
Cc: sthem...@microsoft.com
Cc: virtualizat...@lists.linux-foundation.org
Cc: xen-devel@lists.xenproject.org
Link: http://lkml.kernel.org/r/20171109132739.23465-2-jgr...@suse.com
Signed-off-by: Ingo Molnar
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/include/asm/hypervisor.h
ff-by: Ingo Molnar
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/entry/entry_64.S|7 ---
arch/x86/include/asm/irqflags.h |3 +++
arch/x86/include/asm/paravirt.h |9 +
arch/x86/kernel/asm-offsets_64.c |3 +++
4 files changed, 19 insertions(+), 3 deletions(-)
liams
> Cc: Jason Gunthorpe
> Cc: Kees Cook
> Cc: Ard Biesheuvel
> Cc: Pankaj Gupta
> Cc: Baoquan He
> Cc: Wei Yang
> Cc: Eric Biederman
> Cc: Thomas Gleixner
> Cc: Greg Kroah-Hartman
> Cc: ke...@lists.infradead.org
> Signed-off-by: David Hildenbrand
> --
On Tue, Sep 08, 2020 at 10:10:08PM +0200, David Hildenbrand wrote:
> We soon want to pass flags, e.g., to mark added System RAM resources.
> mergeable. Prepare for that.
What are these random "flags", and how do we know what should be passed
to them?
Why not make this an enumerated type so that w
rix.com
Cc: konrad.w...@oracle.com
Cc: virtualizat...@lists.linux-foundation.org
Cc: xen-devel@lists.xenproject.org
Link:
http://lkml.kernel.org/r/1447970147-1733-3-git-send-email-boris.ostrov...@oracle.com
Signed-off-by: Ingo Molnar
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/entry/
On Mon, Nov 02, 2020 at 12:04:36PM +0100, Fabrice Gasnier wrote:
> On 10/30/20 11:09 AM, Mauro Carvalho Chehab wrote:
> > Em Fri, 30 Oct 2020 10:19:12 +0100
> > Fabrice Gasnier escreveu:
> >
> >> Hi Mauro,
> >>
> >> [...]
> >>
> >>>
> >>> +What:
> >>> /sys/bus/iio/devices/iio:device
Cc: Pavel Machek
Cc: Peter Zijlstra
Cc: Thomas Gleixner
Cc: Will Deacon
Cc: x86-ml
Cc: xen-devel@lists.xenproject.org
Link: https://lkml.kernel.org/r/2019105108.12392-2-jsl...@suse.cz
Cc: Jian Cai
Signed-off-by: Greg Kroah-Hartman
---
Documentation/asm-an
From: Jiri Slaby
commit 78762b0e79bc1dd01347be061abdf505202152c9 upstream.
All these are functions which are invoked from elsewhere but they are
not typical C functions. So annotate them using the new SYM_CODE_START.
All these were not balanced with any END, so mark their ends by
SYM_CODE_END, a
On Fri, Jan 29, 2021 at 01:22:15PM +0100, Roger Pau Monne wrote:
> commit ef3a575baf53571dc405ee4028e26f50856898e7 upstream.
>
Now queued up, thanks.
greg k-h
On Thu, Aug 20, 2020 at 07:13:00AM +0200, Jürgen Groß wrote:
> On 19.08.20 18:57, Sarah Newman wrote:
> > On 7/10/20 5:01 AM, Jürgen Groß wrote:
> > > On 10.07.20 13:55, Jan Beulich wrote:
> > > > On 10.07.2020 12:50, Jürgen Groß wrote:
> > > > > On 10.07.20 11:49, Jan Beulich wrote:
> > > > > > On
On Thu, Aug 20, 2020 at 07:58:55AM +0200, Jürgen Groß wrote:
> On 20.08.20 07:44, Greg Kroah-Hartman wrote:
> > On Thu, Aug 20, 2020 at 07:13:00AM +0200, Jürgen Groß wrote:
> > > On 19.08.20 18:57, Sarah Newman wrote:
> > > > On 7/10/20 5:01 AM, Jürgen Groß wrote:
&g
From: Randy Dunlap
[ Upstream commit ee87e1557c42dc9c2da11c38e11b87c311569853 ]
../arch/x86/pci/xen.c: In function ‘pci_xen_init’:
../arch/x86/pci/xen.c:410:2: error: implicit declaration of function
‘acpi_noirq_set’; did you mean ‘acpi_irq_get’?
[-Werror=implicit-function-declaration]
acpi_
From: Randy Dunlap
[ Upstream commit ee87e1557c42dc9c2da11c38e11b87c311569853 ]
../arch/x86/pci/xen.c: In function ‘pci_xen_init’:
../arch/x86/pci/xen.c:410:2: error: implicit declaration of function
‘acpi_noirq_set’; did you mean ‘acpi_irq_get’?
[-Werror=implicit-function-declaration]
acpi_
From: Randy Dunlap
[ Upstream commit ee87e1557c42dc9c2da11c38e11b87c311569853 ]
../arch/x86/pci/xen.c: In function ‘pci_xen_init’:
../arch/x86/pci/xen.c:410:2: error: implicit declaration of function
‘acpi_noirq_set’; did you mean ‘acpi_irq_get’?
[-Werror=implicit-function-declaration]
acpi_
From: Randy Dunlap
[ Upstream commit ee87e1557c42dc9c2da11c38e11b87c311569853 ]
../arch/x86/pci/xen.c: In function ‘pci_xen_init’:
../arch/x86/pci/xen.c:410:2: error: implicit declaration of function
‘acpi_noirq_set’; did you mean ‘acpi_irq_get’?
[-Werror=implicit-function-declaration]
acpi_
;
> rts5208 enables its PCI-Device with pcim_enable_device(). Thus, it needs the
> always-managed version.
>
> Replace pci_intx() with pcim_intx().
>
> Signed-off-by: Philipp Stanner
> ---
> drivers/staging/rts5208/rtsx.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
Acked-by: Greg Kroah-Hartman
On Tue, Oct 15, 2024 at 08:51:23PM +0200, Philipp Stanner wrote:
> pci_intx() and its managed counterpart pcim_intx() only exist for older
> drivers which have not been ported yet for various reasons. Future
> drivers should preferably use pci_alloc_irq_vectors().
>
> Mark pci_intx() and pcim_intx
On Thu, Oct 10, 2024 at 10:03:30AM +0200, Philipp Stanner wrote:
> On Wed, 2024-10-09 at 21:41 +0200, Philipp Hortmann wrote:
> > On 10/9/24 11:38, Greg Kroah-Hartman wrote:
> > > On Wed, Oct 09, 2024 at 10:35:16AM +0200, Philipp Stanner wrote:
> > > > pci_intx()
On Fri, Mar 11, 2022 at 11:35:09AM +0100, Juergen Gross wrote:
> Make sure a malicious backend can't cause any harm other than wrong
> I/O data.
>
> Missing are verification of the request id in a response, sanitizing
> the reported actual I/O length, and protection against interrupt storms
> from
On Wed, Mar 16, 2022 at 06:29:00AM +0100, Juergen Gross wrote:
> On 15.03.22 18:41, Greg Kroah-Hartman wrote:
> > On Fri, Mar 11, 2022 at 11:35:09AM +0100, Juergen Gross wrote:
> > > Make sure a malicious backend can't cause any harm other than wrong
> > > I/
tions(+), 8 deletions(-)
Acked-by: Greg Kroah-Hartman
-
> 1 file changed, 13 insertions(+), 42 deletions(-)
Acked-by: Greg Kroah-Hartman
On Sat, Mar 05, 2022 at 09:38:23PM +0800, zhanglianjie wrote:
> Use helper macro __ATTR_RW to define HYPERVISOR_ATTR_RW to make code more
> clear.
> Minor readability improvement.
>
> Signed-off-by: zhanglianjie
Is this the name you sign legal documents with? (I have to ask...)
>
> diff --gi
On Sat, Mar 05, 2022 at 11:33:58PM +0800, zhanglianjie wrote:
> Hi,
>
> 在 2022/3/5 21:55, Greg Kroah-Hartman 写道:
> > On Sat, Mar 05, 2022 at 09:38:23PM +0800, zhanglianjie wrote:
> > > Use helper macro __ATTR_RW to define HYPERVISOR_ATTR_RW to make code more
> > &g
On Wed, Aug 24, 2022 at 01:20:22PM +0200, Juergen Gross wrote:
> Hi Greg,
>
> stable kernels 5.18 and 5.15 seem to be missing upstream patch
> c64cc2802a78 ("x86/entry: Move CLD to the start of the idtentry macro").
> This is a prerequisite patch for 64cbd0acb582 ("x86/entry: Don't call
> error_en
On Wed, Aug 24, 2022 at 03:52:27PM +0200, Juergen Gross wrote:
> On 24.08.22 14:10, Greg Kroah-Hartman wrote:
> > On Wed, Aug 24, 2022 at 01:20:22PM +0200, Juergen Gross wrote:
> > > Hi Greg,
> > >
> > > stable kernels 5.18 and 5.15 seem to be missing upstream
On Fri, Jul 22, 2022 at 11:44:10PM -0400, Demi Marie Obenour wrote:
> This series backports upstream commit 166d3863231667c4f64dee72b77d1102cdfad11f
> to all supported stable kernel trees.
All now queued up, thanks.
greg k-h
On Mon, Jul 05, 2021 at 01:58:09PM +0200, Juergen Gross wrote:
> Hi Greg,
>
> the attached patch is a backport of upstream commit 3de218ff39b9e3f0d4
> for Linux 5.10 and older (I've checked it to apply down to 4.4).
Now applied, thanks.
greg k-h
On Tue, Jul 13, 2021 at 09:35:17PM +0200, Uwe Kleine-König wrote:
> Hello,
>
> this is v4 of the final patch set for my effort to make struct
> bus_type::remove return void.
>
> The first four patches contain cleanups that make some of these
> callbacks (more obviously) always return 0. They are
On Wed, Jul 21, 2021 at 12:09:41PM +0200, Greg Kroah-Hartman wrote:
> On Tue, Jul 13, 2021 at 09:35:17PM +0200, Uwe Kleine-König wrote:
> > Hello,
> >
> > this is v4 of the final patch set for my effort to make struct
> > bus_type::remove return void.
> >
&
ated tracking of a pci_dev's bound driver
Other than my objection to patch 5/5 lack of changelog, looks sane to
me:
Acked-by: Greg Kroah-Hartman
On Mon, Aug 16, 2021 at 01:09:52PM +0200, Juergen Gross wrote:
> Greg,
>
> could you please add upstream commit 05d69d950d9d8 ("xen-blkfront:
> sanitize the removal state machine") to the stable 5.13 kernel?
>
> The patch seems not to have a "Cc: stable" tag while it fixes an
> issue introduced i
On Mon, Dec 19, 2022 at 04:37:10PM +0100, Pratyush Yadav wrote:
> The removal of "hotplug-status" has moved around a bit. First it was
> moved from netback_remove() to hotplug_status_changed() in upstream
> commit 1f2565780e9b ("xen-netback: remove 'hotplug-status' once it has
> served its purpose"
Stabellini
Cc: Oleksandr Tyshchenko
Cc: xen-devel@lists.xenproject.org
Signed-off-by: Greg Kroah-Hartman
---
include/xen/xenbus.h | 5 +
1 file changed, 1 insertion(+), 4 deletions(-)
diff --git a/include/xen/xenbus.h b/include/xen/xenbus.h
index eaa932b99d8a..b31f77f9c50c 100644
--- a/include/xen
On Tue, May 11, 2021 at 06:18:21PM -0600, Connor Davis wrote:
> When running as a dom0 guest on Xen, check if the USB3 debug
> capability is enabled before xHCI reset, suspend, and resume. If it
> is, call xen_dbgp_reset_prep() to notify Xen that it is unsafe to touch
> MMIO registers until the nex
On Thu, May 13, 2021 at 12:03:02PM +0200, Juergen Gross wrote:
> Xen frontends shouldn't BUG() in case of illegal data received from
> their backends. So replace the BUG_ON()s when reading illegal data from
> the ring page with negative return values.
>
> Signed-off-by: Juergen Gross
> ---
> dri
On Thu, May 13, 2021 at 06:56:47PM -0600, Connor Davis wrote:
> Hi all,
>
> This goal of this series is to allow the USB3 debug capability (DbC) to be
> safely used by xen while linux runs as dom0.
Patch 2/4 does not seem to be showing up anywhere, did it get lost?
thanks,
greg k-h
On Wed, May 22, 2024 at 06:20:15PM -0700, Pawan Gupta wrote:
> From: Juergen Gross
>
> commit afd30525a659ac0ae0904f0cb4a2ca75522c3123 upstream.
Now queued up, thanks.
greg k-h
larger pool
> from CMA (not implemented in this series yet).
>
> I have no good explanation for the increase in performance of the
> 24-thread I/O test with the default (non-growing) memory pool. Although the
> difference is within variance, it seems to be real. The average bandwidth
> is consistently above that of the unpatched kernel.
>
> To sum it up:
>
> - All workloads benefit from reduced memory footprint.
> - No performance regressions have been observed with the default size of
> the software IO TLB.
> - Most workloads retain their former performance even if the software IO
> TLB grows at run time.
>
For the driver-core touched portions:
Reviewed-by: Greg Kroah-Hartman
On Wed, Jun 21, 2023 at 11:09:57AM +0200, Joel Granados wrote:
> static int __init random_sysctls_init(void)
> {
> - register_sysctl_init("kernel/random", random_table);
> + register_sysctl_init("kernel/random", random_table,
> + ARRAY_SIZE(random_table));
As men
On Tue, Jun 27, 2023 at 11:54:23AM +0200, Petr Tesarik wrote:
> +/**
> + * is_swiotlb_active() - check if the software IO TLB is initialized
> + * @dev: Device to check, or %NULL for the default IO TLB.
> + */
> bool is_swiotlb_active(struct device *dev)
> {
> - struct io_tlb_mem *mem = d
On Thu, Jul 06, 2023 at 03:50:55AM +, Michael Kelley (LINUX) wrote:
> From: Petr Tesarik Sent: Tuesday, June 27, 2023
> 2:54 AM
> >
> > Try to allocate a transient memory pool if no suitable slots can be found,
> > except when allocating from a restricted pool. The transient pool is just
> >
On Thu, Jul 06, 2023 at 02:22:50PM +, Michael Kelley (LINUX) wrote:
> From: Greg Kroah-Hartman Sent: Thursday, July 6,
> 2023 1:07 AM
> >
> > On Thu, Jul 06, 2023 at 03:50:55AM +, Michael Kelley (LINUX) wrote:
> > > From: Petr Tesarik Sent: Tuesday, June
On Fri, Oct 20, 2023 at 05:15:27PM +0100, David Woodhouse wrote:
> From: David Woodhouse
>
> The xencons_connect_backend() function allocates a local interdomain
> event channel with xenbus_alloc_evtchn(), then calls
> bind_interdomain_evtchn_to_irq_lateeoi() to bind to that port# on the
> *remot
-by: Greg Kroah-Hartman
---
arch/x86/include/asm/asm.h |8 +---
1 file changed, 5 insertions(+), 3 deletions(-)
--- a/arch/x86/include/asm/asm.h
+++ b/arch/x86/include/asm/asm.h
@@ -7,9 +7,11 @@
# define __ASM_FORM_RAW(x) x
# define __ASM_FORM_COMMA(x) x,
#else
-# define __ASM_FORM(x
@devnote2
Signed-off-by: Maximilian Heyne
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/include/asm/emulate_prefix.h | 14 ++
arch/x86/include/asm/xen/interface.h | 11 ---
arch/x86/kvm/x86.c|4 +++-
3 files changed, 21 insertions(+), 8 deletions
.org
Cc: Randy Dunlap
Link:
https://lkml.kernel.org/r/156777564986.25081.4964537658500952557.stgit@devnote2
[mheyne: resolved contextual conflict in tools/objtools/sync-check.sh]
Signed-off-by: Maximilian Heyne
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/include/asm/insn.h
f
Link:
https://lkml.kernel.org/r/156777566048.25081.6296162369492175325.stgit@devnote2
Signed-off-by: Maximilian Heyne
Signed-off-by: Greg Kroah-Hartman
---
arch/x86/kernel/kprobes/core.c |4
1 file changed, 4 insertions(+)
--- a/arch/x86/kernel/kprobes/core.c
+++ b/arch/x86/kernel/kprobes/c
On Mon, Nov 29, 2021 at 08:19:18AM +0100, Juergen Gross wrote:
> Hi Greg,
>
> could you please add the following upstream patches to the stable 5.10
> kernel (I'll send separate mails for the older stable kernels as some
> of the patches don't apply for those)? They are hardening Xen PV
> frontend
On Mon, Nov 29, 2021 at 04:15:31PM +0100, Juergen Gross wrote:
> Hi Greg,
>
> attached are git bundles for some patches you merged into the 5.10
> stable kernel already this morning.
>
> Naming should be obvious, the patches are on the branch "back" in
> each bundle.
All now queued up, thanks!
1 - 100 of 148 matches
Mail list logo