On Sat, Jan 20, 2018 at 08:22:51PM +0100, KarimAllah Ahmed wrote:
> Start using the newly-added microcode features for speculation control on both
> Intel and AMD CPUs to protect against Spectre v2.
Thank you posting these.
>
> This patch series covers interrupts, system calls, context switching
On Sat, Jan 20, 2018 at 08:23:01PM +0100, KarimAllah Ahmed wrote:
> From: Tim Chen
>
> Stop Indirect Branch Speculation on every user space to kernel space
> transition and reenable it when returning to user space./
How about interrupts?
That is should .macro interrupt have the same treatment?
On Wed, Jan 10, 2018 at 09:09:16AM +0100, Christoph Hellwig wrote:
OK?
Reviewed-by: Konrad Rzeszutek Wilk
> Signed-off-by: Christoph Hellwig
> ---
> arch/powerpc/kernel/dma-swiotlb.c | 2 +-
> arch/x86/kernel/pci-swiotlb.c | 2 +-
> include/linux/swiotlb.h
On Wed, Jan 10, 2018 at 09:09:15AM +0100, Christoph Hellwig wrote:
> We'll need that name for a generic implementation soon.
>
> Signed-off-by: Christoph Hellwig
Reviewed-by: Konrad Rzeszutek Wilk
> ---
> arch/x86/kernel/pci-swiotlb.c | 4 ++--
> 1 file changed, 2 ins
On Wed, Jan 10, 2018 at 09:09:14AM +0100, Christoph Hellwig wrote:
> We'll need that name for a generic implementation soon.
>
Reviewed-by: Konrad Rzeszutek Wilk
> Signed-off-by: Christoph Hellwig
> ---
> arch/powerpc/include/asm/swiotlb.h | 2 +-
> arch/powerpc/ke
On Wed, Jan 10, 2018 at 09:09:13AM +0100, Christoph Hellwig wrote:
> We'll need that name for a generic implementation soon.
>
> Signed-off-by: Christoph Hellwig
Reviewed-by: Konrad Rzeszutek Wilk
> ---
> arch/ia64/hp/common/hwsw_iommu.c | 4 ++--
> arch/ia64/hp/
On Wed, Jan 10, 2018 at 09:00:15AM +0100, Christoph Hellwig wrote:
> To implement the x86 forbid_dac and iommu_sac_force we want an arch hook
> so that it can apply the global options across all dma_map_ops
> implementations.
>
> Signed-off-by: Christoph Hellwig
Reviewed-by: K
f-by: Christoph Hellwig
Reviewed-by: Konrad Rzeszutek Wilk
> ---
> include/linux/dma-mapping.h | 1 +
> 1 file changed, 1 insertion(+)
>
> diff --git a/include/linux/dma-mapping.h b/include/linux/dma-mapping.h
> index d84951865be7..9f28b2fa329e 100644
> --- a/include/linux/dma
On Tue, Jan 09, 2018 at 05:03:22PM -0800, Andi Kleen wrote:
> From: Andi Kleen
>
> Add 64bit assembler macros to clear registers on kernel entry.
> Used in followon patches.
>
> Signed-off-by: Andi Kleen
> ---
> arch/x86/entry/calling.h | 28
> 1 file changed, 28 i
On Wed, Jan 10, 2018 at 03:28:43PM +0100, Paolo Bonzini wrote:
> On 10/01/2018 15:06, Arjan van de Ven wrote:
> > On 1/10/2018 5:20 AM, Paolo Bonzini wrote:
> >> * a simple specification that does "IBRS=1 blocks indirect branch
> >> prediction altogether" would actually satisfy the specification ju
On Tue, Jan 09, 2018 at 01:12:51PM -0800, Christoph Hellwig wrote:
> On Tue, Jan 09, 2018 at 03:04:17PM -0500, Konrad Rzeszutek Wilk wrote:
> > Totally. Thanks for taking care of it - been slammed with x86 architecture
> > craziness.
>
> I'll take this as an Acked
(Removing 't...@char.us.oracle.com') from the email. Adding Jun.
>
> On Tue, Jan 9, 2018 at 12:47 PM, Konrad Rzeszutek Wilk
> wrote:
> > On Tue, Jan 09, 2018 at 03:39:09PM -0500, Konrad Rzeszutek Wilk wrote:
> >> On Tue, Jan 09, 2018 at 05:49:08PM +0100, Paolo Bonzini
On Tue, Jan 09, 2018 at 03:39:09PM -0500, Konrad Rzeszutek Wilk wrote:
> On Tue, Jan 09, 2018 at 05:49:08PM +0100, Paolo Bonzini wrote:
> > On 09/01/2018 17:23, Arjan van de Ven wrote:
> > > On 1/9/2018 8:17 AM, Paolo Bonzini wrote:
> > >> On 09/01/2018 16:19, Arjan
On Tue, Jan 09, 2018 at 05:49:08PM +0100, Paolo Bonzini wrote:
> On 09/01/2018 17:23, Arjan van de Ven wrote:
> > On 1/9/2018 8:17 AM, Paolo Bonzini wrote:
> >> On 09/01/2018 16:19, Arjan van de Ven wrote:
> >>> On 1/9/2018 7:00 AM, Liran Alon wrote:
>
> - ar...@linux.intel.com wrote:
On Tue, Jan 09, 2018 at 11:47:55AM -0800, Christoph Hellwig wrote:
> On Thu, Jan 04, 2018 at 02:49:21PM +0100, Christian König wrote:
> > I perfectly agree on that, but this is for stable kernel backports. Because
> > of this I want to keep the footprint as low as possible.
> >
> > When your patch
On Tue, Jan 09, 2018 at 01:03:09PM +0100, Paolo Bonzini wrote:
> From: Tom Lendacky
>
> Set IBPB (Indirect Branch Prediction Barrier) when the current CPU is
> going to run a VCPU different from what was previously run. Nested
> virtualization uses the same VMCB for the second level guest, but t
On Tue, Jan 09, 2018 at 01:03:08PM +0100, Paolo Bonzini wrote:
> Direct access to MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD is important
> for performance. Allow load/store of MSR_IA32_SPEC_CTRL, restore guest
> IBRS on VM entry and set it to 0 on VM exit (because Linux does not use
> it yet).
>
>
On Mon, Jan 08, 2018 at 07:08:41PM +0100, Paolo Bonzini wrote:
> Direct access to MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD is important
> for performance. Allow load/store of MSR_IA32_SPEC_CTRL, restore guest
> IBRS on VM entry and set it to 0 on VM exit (because Linux does not use
> it yet).
>
>
On Mon, Jan 08, 2018 at 07:08:40PM +0100, Paolo Bonzini wrote:
> KVM will start using them soon.
Perhaps include a bit of description?
>
> Signed-off-by: Paolo Bonzini
> ---
> arch/x86/include/asm/msr-index.h | 5 +
> 1 file changed, 5 insertions(+)
>
> diff --git a/arch/x86/include/asm/ms
On Mon, Jan 08, 2018 at 07:08:39PM +0100, Paolo Bonzini wrote:
> As an interim measure until SPEC_CTRL is supported by upstream
> Linux in cpufeatures, add a function that lets vmx.c and svm.c
> know whether to save/restore MSR_IA32_SPEC_CTRL.
Reviewed-by: Konrad Rzeszutek Wilk
>
On Mon, Jan 08, 2018 at 01:22:04AM +0300, Alexey Dobriyan wrote:
> Thomas Gleixner wrote:
> > Create /sys/devices/system/cpu/vulnerabilities folder and files for
> > meltdown, spectre_v1 and spectre_v2.
>
> It is called "grep -e '^bugs' /proc/cpuinfo".
>
> kpti is deduceable from .config and /pro
y: capacity of cpu#.
> +
> +What:/sys/devices/system/cpu/vulnerabilities
> + /sys/devices/system/cpu/vulnerabilities/meltdown
> + /sys/devices/system/cpu/vulnerabilities/spectre_v1
> + /sys/devices/system/cpu/vulnerabilities/spectre_v2
&g
On Sun, Jan 07, 2018 at 10:48:01PM +0100, Thomas Gleixner wrote:
> Implement the CPU vulnerabilty show functions for meltdown, spectre_v1 and
> spectre_v2.
>
> Signed-off-by: Thomas Gleixner
Reviewed-by: Konrad Rzeszutek Wilk
Thank you!
> ---
> arch/x86/Kconfig |
On Sat, Jan 06, 2018 at 10:39:27PM +0100, Thomas Gleixner wrote:
> On Sat, 6 Jan 2018, Konrad Rzeszutek Wilk wrote:
> > On Sat, Jan 06, 2018 at 08:47:19PM +0100, Thomas Gleixner wrote:
> > > On Sat, 6 Jan 2018, Dave Hansen wrote:
> > >
> > > > On 01/06
On Sat, Jan 06, 2018 at 09:34:01PM +, Van De Ven, Arjan wrote:
> > I agree. But this is what customers are told to inspect to see if they
> > are impacted. And if in the future versions this goes away or such - they
> > will freak out and cause needless escalations.
>
>
> it's a mistake thoug
On Sat, Jan 06, 2018 at 08:47:19PM +0100, Thomas Gleixner wrote:
> On Sat, 6 Jan 2018, Dave Hansen wrote:
>
> > On 01/06/2018 09:41 AM, Van De Ven, Arjan wrote:
> > .macro DISABLE_IBRS
> > - ALTERNATIVE "jmp .Lskip_\@", "", X86_FEATURE_SPEC_CTRL
> > + testl $1, dynamic_
On Sat, Jan 06, 2018 at 10:10:59AM -0800, Tim Chen wrote:
>
>
> On 01/06/2018 12:54 AM, Greg KH wrote:
> > On Fri, Jan 05, 2018 at 06:12:19PM -0800, Tim Chen wrote:
> >> From: Tim Chen
> >> From: Andrea Arcangeli
> >>
> >> There are 2 ways to control IBRS
> >>
> >> 1. At boot time
> >> noib
On Fri, Jan 05, 2018 at 06:12:19PM -0800, Tim Chen wrote:
> From: Tim Chen
> From: Andrea Arcangeli
>
> There are 2 ways to control IBRS
>
> 1. At boot time
> noibrs kernel boot parameter will disable IBRS usage
>
> Otherwise if the above parameters are not specified, the system
> will ena
On Tue, Jan 02, 2018 at 01:13:58PM +0100, Christian König wrote:
> TTM tries to allocate coherent memory in chunks of 2MB first to improve
> TLB efficiency and falls back to allocating 4K pages if that fails.
>
> Suppress the warning when the 2MB allocations fails since there is a
> valid fall bac
On Tue, Dec 26, 2017 at 07:00:43PM -0800, h...@zytor.com wrote:
> On December 26, 2017 6:54:55 PM PST, Linus Torvalds
> wrote:
> >On Tue, Dec 26, 2017 at 6:25 PM, wrote:
> >>
> >> This is why I personally prefer to see these kinds of terminal stubs
> >written in assembly explicitly: the C compi
On Fri, Dec 22, 2017 at 05:48:45PM +0200, Oleksandr Andrushchenko wrote:
>
> On 12/22/2017 05:12 PM, Konrad Rzeszutek Wilk wrote:
> > On Mon, Dec 11, 2017 at 10:45:27AM +0200, Oleksandr Andrushchenko wrote:
> > > ping
> > ..snip..
> > > > > This is implem
On Mon, Dec 11, 2017 at 10:45:27AM +0200, Oleksandr Andrushchenko wrote:
> ping
..snip..
> > > This is implemented as a change to the sndif protocol [8] and allows
> > > [8]
> > > https://github.com/andr2000/linux/commit/095d7feae00bf00c852c67c4f1044de5601678ed
.. I must have missed it being post
On December 19, 2017 9:32:55 AM EST, "Christian König"
wrote:
>TTM tries to allocate coherent memory in chunks of 2MB first to improve
>TLB efficiency and falls back to allocating 4K pages if that fails.
>
>Suppress the warning when the 2MB allocations fails since there is a
>valid fall back path
On Wed, Dec 13, 2017 at 11:25:13PM +0800, Quan Xu wrote:
> On Fri, Dec 8, 2017 at 11:10 PM, Konrad Rzeszutek Wilk <
> konrad.w...@oracle.com> wrote:
>
> > On Fri, Dec 08, 2017 at 04:39:43PM +0800, Quan Xu wrote:
> > > From: Ben Luo
> > >
> > >
On Wed, Dec 13, 2017 at 01:13:56PM +0100, Paolo Bonzini wrote:
> Compared to when VMCS shadowing was added to KVM, we are reading/writing
> a few more fields: the PML index, the interrupt status and the preemption
> timer value. The first two are because we are exposing more features
> to nested g
On Wed, Dec 13, 2017 at 01:47:47PM +0300, Yury Norov wrote:
> On Mon, Dec 11, 2017 at 10:33:32AM -0500, Konrad Rzeszutek Wilk wrote:
> > On Mon, Dec 11, 2017 at 05:16:00PM +0300, Yury Norov wrote:
> > > This benchmark sends many IPIs in different modes and measures
> >
On Mon, Dec 11, 2017 at 05:16:00PM +0300, Yury Norov wrote:
> This benchmark sends many IPIs in different modes and measures
> time for IPI delivery (first column), and total time, ie including
> time to acknowledge the receive by sender (second column).
>
> The scenarios are:
> Dry-run: do e
On Fri, Dec 08, 2017 at 04:39:43PM +0800, Quan Xu wrote:
> From: Ben Luo
>
> This patchset introduces a new paravirtualized mechanism to reduce VM-exit
> caused by guest timer accessing.
And how bad is this blib in arming the timer?
And how often do you get this timer to be armed? OR better yet
On Fri, Dec 08, 2017 at 04:39:46PM +0800, Quan Xu wrote:
> From: Ben Luo
>
> In general, KVM guest programs tsc-deadline timestamp to
> MSR_IA32_TSC_DEADLINE MSR. This will cause a VM-exit, and
> then KVM handles this timer for guest.
>
> The tsc-deadline timestamp is mostly recorded in share pa
On Wed, Dec 06, 2017 at 02:43:01PM +0300, Jan Dakinevich wrote:
> w2k16 essentials fails to boot if underlying hypervisor lacks of support for
> LBR MSRs. To workaround the issue, it suggessted to ignore these MSRs (but
> not
> all).
This is without any hyperv enablement? Meaning normal stock g
On Wed, Dec 06, 2017 at 01:28:30AM -0800, Wanpeng Li wrote:
> From: Wanpeng Li
>
> The below test case can cause infinite loop in kvm when ept=0.
>
> #include
> #include
> #include
> #include
> #include
> #include
> #include
>
> long r[5];
> int main()
On Wed, Nov 29, 2017 at 03:24:53PM -0800, H. Peter Anvin wrote:
> On 11/29/17 14:31, Borislav Petkov wrote:
> >
> > A couple of points:
> >
> > * so this box here has a normal grub installation and apparently grub
> > jumps to some other entry point.
Ouch. Perhaps you can report this on grub-dev
On Wed, Nov 29, 2017 at 09:40:20AM -0700, Jan Beulich wrote:
> >>> On 29.11.17 at 17:29, wrote:
> > On Wed, Nov 29, 2017 at 08:35:33AM -0700, Jan Beulich wrote:
> >> >>> On 29.11.17 at 16:08, wrote:
> >> > On 11/9/2017 2:28 AM, Jan Beulich wrote:
> >> > On 08.11.17 at 16:44, wrote:
> >> >>>
On Wed, Nov 29, 2017 at 08:35:33AM -0700, Jan Beulich wrote:
> >>> On 29.11.17 at 16:08, wrote:
> > On 11/9/2017 2:28 AM, Jan Beulich wrote:
> > On 08.11.17 at 16:44, wrote:
> >>> On 11/7/2017 8:40 AM, Jan Beulich wrote:
> >>> On 06.11.17 at 18:48, wrote:
> > --- a/Documentation/ABI/
..snip..
> > There doesn't seem to be much good reason for SWIOTLB to be more special
> > than other DMA API backends, and not all of them have enough internal state
> > to
> > be able to make such a check. It's also not necessarily possible to "prevent
> > damage" anyway - if a driver does pass a
et_bus_and_slot() function in favor of
> pci_get_domain_bus_and_slot().
Aha!
>
> We don't search for the device in other domains than zero. This is because
> on x86 platforms the BIOS executes only devices which are in domain 0.
> Furthermore, the iBFT spec doesn't have a doma
On Mon, Nov 20, 2017 at 08:17:14AM +, Eric Yang wrote:
> Hi all,
Hi!
>
> During debug a device only support 32bits DMA(Qualcomm Atheros AP) in our
> LS1043A 64bits ARM SOC, we found that the invoke of dma_unmap_single -->
> swiotlb_tbl_unmap_single will unmap the passed "size" anyway eve
On Fri, Nov 17, 2017 at 11:42:02PM +0100, Thomas Gleixner wrote:
> On Thu, 16 Nov 2017, Jan Kiszka wrote:
>
> Just noticed, that all prefixes should be 'x86/jailhouse:' please
>
> > +static unsigned int x2apic_get_apic_id(unsigned long id)
> > +{
> > +return id;
> > +}
> > +
> > static v
On Thu, Nov 16, 2017 at 12:00:45PM +0100, Paolo Bonzini wrote:
> On 15/11/2017 22:11, Konrad Rzeszutek Wilk wrote:
> > If we migrate to another host that does not expose this, should the
> > flush_tlb_others be reset back to the generic one? Or we don't care that
> >
On Mon, Nov 13, 2017 at 06:05:59PM +0800, Quan Xu wrote:
> From: Yang Zhang
>
> Some latency-intensive workload have seen obviously performance
> drop when running inside VM. The main reason is that the overhead
> is amplified when running inside VM. The most cost I have seen is
> inside idle pat
On Mon, Nov 13, 2017 at 02:01:18AM -0800, Wanpeng Li wrote:
> From: Wanpeng Li
>
> Remote flushing api's does a busy wait which is fine in bare-metal
> scenario. But with-in the guest, the vcpus might have been pre-empted
> or blocked. In this scenario, the initator vcpu would end up
> busy-waiti
On Mon, Nov 13, 2017 at 02:01:16AM -0800, Wanpeng Li wrote:
> Remote flushing api's does a busy wait which is fine in bare-metal
> scenario. But with-in the guest, the vcpus might have been pre-empted
> or blocked. In this scenario, the initator vcpu would end up
> busy-waiting for a long amount of
On Wed, Nov 08, 2017 at 06:52:12PM -0800, Wanpeng Li wrote:
> From: Wanpeng Li
>
> watchdog: BUG: soft lockup - CPU#6 stuck for 22s! [qemu-system-x86:10185]
> CPU: 6 PID: 10185 Comm: qemu-system-x86 Tainted: G OE
> 4.14.0-rc4+ #4
> RIP: 0010:kvm_get_time_scale+0x4e/0xa0 [kvm]
> C
On Tue, Oct 31, 2017 at 07:48:38PM +0800, Haozhong Zhang wrote:
> [I just copy the commit message from patch 2]
>
> Some reserved pages, such as those from NVDIMM DAX devices, are
> not for MMIO, and can be mapped with cached memory type for better
> performance. However, the above check misconcei
S MSR must be 0.
> - The linear address in bits 63:12 must be canonical.
>
> Cc: Paolo Bonzini
> Cc: Radim Krčmář
> Cc: Jim Mattson
> Signed-off-by: Wanpeng Li
Reviewed-by: Konrad Rzeszutek Wilk
> ---
> arch/x86/kvm/vmx.c | 7 +++
> 1 file changed, 7 insertion
On October 16, 2017 8:14:11 AM EDT, Luwei Kang wrote:
>From: Chao Peng
>
>Trap for Intel processor trace is none sense. Pass through to
>guest directly.
And none of those MSRs can be subverted by the guest? That is none of these
should be filtered / audited first?
>
>Signed-off-by: Chao Peng
eader file, hence this commit simply enforces it more
> explicitly and have both peers noticed when such changes happen.
>
> Signed-off-by: Joao Martins
> Acked-by: Juergen Gross
Reviewed-by: Konrad Rzeszutek Wilk
> ---
> In the end, I choose the originally posted because t
the L1 hypervsior, however,
> ple_window still
s/hypervsior/hypervisor/
> shows the default value on L1 hypervsior. This patch fixes it by clearing all
> the
Ditto here.
> PLE related module parameter if there is no PLE capability.
>
> Cc: Paolo Bonzini
> Cc: Radim Krčmář
&g
> I think you are missing the following point:
>
> "vcpu0 can be interrupted when its not in a spinlock protected section,
> otherwise it can't."
>
> So you _have_ to communicate to the host when the guest enters/leaves a
> critical section.
How would this work for Windows or FreeBSD?
On Thu, Sep 21, 2017 at 08:38:38AM -0300, Marcelo Tosatti wrote:
> Add hypercalls to spinlock/unlock to set/unset FIFO priority
> for the vcpu, protected by a static branch to avoid performance
> increase in the normal kernels.
>
> Enable option by "kvmfifohc" kernel command line parameter (disabl
On Thu, Sep 21, 2017 at 08:38:37AM -0300, Marcelo Tosatti wrote:
> When executing guest vcpu-0 with FIFO:1 priority, which is necessary to
> deal with the following situation:
>
> VCPU-0 (housekeeping VCPU)VCPU-1 (realtime VCPU)
>
> raw_spin_lock(A)
> interrupted, schedule task T-1
On Tue, Aug 29, 2017 at 10:02:15PM +0800, Wanpeng Li wrote:
> > Here is the data we get when running benchmark netperf:
> >
> >2. w/ patch:
> > halt_poll_threshold=1 -- 15803.89 bits/s -- 159.5 %CPU
> > halt_poll_threshold=2 -- 15899.04 bits/s -- 161.5 %CPU
> > halt_po
On Tue, Aug 29, 2017 at 09:34:46AM +0530, Anup Patel wrote:
> This patch adds Broadcom FlexRM low-level reset for
> VFIO platform.
>
Is there an document that explains and /or details the various
registers?
> It will do the following:
> 1. Disable/Deactivate each FlexRM ring
> 2. Flush each FlexR
On Tue, Aug 29, 2017 at 11:46:35AM +, Yang Zhang wrote:
> So far, pv_idle_ops.poll is the only ops for pv_idle. .poll is called in
> idle path which will polling for a while before we enter the real idle
> state.
>
> In virtualization, idle path includes several heavy operations
> includes tim
Hey Jens,
Please git pull the following branch:
git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git
stable/for-jens-4.13
.. which as a bug-fix when shutting down xen block backend driver with
multiple queues and the driver not clearing all of them.
Thank you!
If you pull it in your
.snip..
> >
> > Acked-by: Roger Pau Monné
>
> Forgot to add, this needs to be backported to stable branches, so:
Annie, could you resend the patch with the tags and an update
to the description to me please?
>
> Cc: sta...@vger.kernel.org
>
> Roger.
>
> __
On Wed, Aug 16, 2017 at 11:07:55AM +0800, Lan Tianyu wrote:
> On 2017年08月15日 22:10, Konrad Rzeszutek Wilk wrote:
> > On Tue, Aug 15, 2017 at 11:00:04AM +0800, Lan Tianyu wrote:
> >> On 2017年08月12日 03:35, Konrad Rzeszutek Wilk wrote:
> >>> On Fri, Aug 11, 2017 at
On Tue, Aug 15, 2017 at 06:13:29PM +0200, Radim Krčmář wrote:
> (Missed this mail before my last reply.)
>
> 2017-08-15 10:10-0400, Konrad Rzeszutek Wilk:
> > On Tue, Aug 15, 2017 at 11:00:04AM +0800, Lan Tianyu wrote:
> > > On 2017年08月12日 03:35, Konrad Rzeszutek Wilk
Hey Jens,
Please git pull the following branch:
git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git
stable/for-jens-4.13
which has two fixes, both of them spotted by Amazon.
1) Fix in Xen-blkfront caused by the re-write in 4.8 time-frame.
2) Fix in the xen_biovec_phys_mergeable whi
On Tue, Aug 15, 2017 at 11:00:04AM +0800, Lan Tianyu wrote:
> On 2017年08月12日 03:35, Konrad Rzeszutek Wilk wrote:
> > On Fri, Aug 11, 2017 at 03:00:20PM +0200, Radim Krčmář wrote:
> >> 2017-08-11 10:11+0200, David Hildenbrand:
> >>> On 11.08.2017 09:49, Lan
On Fri, Aug 11, 2017 at 03:00:20PM +0200, Radim Krčmář wrote:
> 2017-08-11 10:11+0200, David Hildenbrand:
> > On 11.08.2017 09:49, Lan Tianyu wrote:
> >> Hi Konrad:
> >>Thanks for your review.
> >>
> >> On 2017年08月11日 01:50, Konrad Rzeszutek Wi
On Wed, Aug 09, 2017 at 02:07:53PM -0600, Tycho Andersen wrote:
> From: Juerg Haefliger
>
> Pages that are unmapped by XPFO need to be mapped before and unmapped
> again after (to restore the original state) the __dma_{map,unmap}_area()
> operations to prevent fatal page faults.
>
> Signed-off-b
On Wed, Aug 09, 2017 at 02:07:48PM -0600, Tycho Andersen wrote:
> From: Juerg Haefliger
>
> Signed-off-by: Juerg Haefliger
> Tested-by: Tycho Andersen
> ---
> include/linux/xpfo.h | 4
> lib/swiotlb.c| 3 ++-
> mm/xpfo.c| 9 +
> 3 files changed, 15 insertions(+
Hi Jens,
Please git pull in your branch "for-linus" the following
branch which is based on 765e40b675a9566459ddcb8358ad16f3b8344bbe
"blk-mq: map queues to all present CPUs":
git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git
stable/for-jens-4.13
It has two bug-fixes for the xen-blkfr
On Tue, Mar 28, 2017 at 05:30:24PM +0200, Juergen Gross wrote:
> On 28/03/17 16:27, Boris Ostrovsky wrote:
> > On 03/28/2017 04:08 AM, Jan Beulich wrote:
> > On 28.03.17 at 03:57, wrote:
> >>> I think there is indeed a disconnect between target memory (provided by
> >>> the toolstack) and cur
On Mon, Jun 26, 2017 at 06:39:30PM +0200, Vitaly Kuznetsov wrote:
> CONFIG_BOOTPARAM_HOTPLUG_CPU0 allows to offline CPU0 but Xen HVM guests
> BUG() in xen_teardown_timer(). Remove the BUG_ON(), this is probably a
> leftover from ancient times when CPU0 hotplug was impossible, it works
> just fine f
On Tue, Jun 20, 2017 at 07:11:01AM -0600, Jens Axboe wrote:
> On 06/20/2017 06:13 AM, Konrad Rzeszutek Wilk wrote:
> > Hey Jens,
> >
> > Please git pull the following branch:
> >
> > git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git
> >
Hey Jens,
Please git pull the following branch:
git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git
stable/for-jens-4.12
which has security and memory leak fixes in xen block driver.
Thank you.
Jan Beulich (1):
xen-blkback: don't leak stack data via response ring
Juergen Gross
On June 15, 2017 11:33:22 AM EDT, Borislav Petkov wrote:
>On Thu, Jun 15, 2017 at 09:59:45AM -0500, Tom Lendacky wrote:
>> Actually the detection routine, amd_iommu_detect(), is part of the
>> IOMMU_INIT_FINISH macro support which is called early through
>mm_init()
>> from start_kernel() and that
On Thu, Jun 08, 2017 at 03:25:33PM +0200, Christoph Hellwig wrote:
> DMA_ERROR_CODE is going to go away, so don't rely on it.
Reviewed-by: Konrad Rzeszutek Wilk
---
> drivers/xen/swiotlb-xen.c | 93
> ++
> include/xen/swiotlb-xen.h | 62 +---
> 4 files changed, 49 insertions(+), 137 deletions(-)
Yeeey!
Reviewed-by: Konrad Rzeszutek Wilk
On Thu, Jun 08, 2017 at 10:28:15AM +0200, Juergen Gross wrote:
> On 03/06/17 02:05, Ankur Arora wrote:
> > This patch series fixes a bunch of issues in the xen_vcpu setup
> > logic.
> >
> > Simplify xen_vcpu related code: code refactoring in advance of the
> > rest of the patch series.
> >
> > Su
On Wed, Jun 07, 2017 at 10:36:58PM +1000, Steven Haigh wrote:
> On Friday, 19 May 2017 1:28:46 AM AEST Juergen Gross wrote:
> > Destroying a Xen guest domain while it was doing I/Os via xen-blkback
> > leaked several resources, including references of the guest's memory
> > pages.
> >
> > This pat
On Mon, May 22, 2017 at 10:57:00AM +0200, Juergen Gross wrote:
> Currently there is no reliable user interface inside a Xen guest to
> determine its type (e.g. HVM, PV or PVH). Instead of letting user mode
> try to determine this by various rather hacky mechanisms (parsing of
> boot messages before
Hey Jens,
Could you kindly pull:
git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git
stable/for-jens-4.12
which has one tiny fix:
Thanks!
Gustavo A. R. Silva (1):
block: xen-blkback: add null check to avoid null pointer dereference
drivers/block/xen-blkback/xenbus.c | 8
On Thu, May 11, 2017 at 10:27:35AM -0500, Gustavo A. R. Silva wrote:
> Add null check before calling xen_blkif_put() to avoid potential
> null pointer dereference.
>
Applied to 'stable/for-jens-4.12' and will push soon to Jens.
> Addresses-Coverity-ID: 1350942
> Cc: Juergen Gross
> Signed-off-b
Hey Jens,
Please git pull the following branch:
git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git
stable/for-jens-4.12
which is based on your 'for-4.12/block' branch. It has one fix - to emit an
uevent whenever the size of the guest disk image changes.
Please pull!
drivers/block/x
On Tue, Apr 18, 2017 at 09:42:20AM -0600, Logan Gunthorpe wrote:
>
>
> On 18/04/17 08:27 AM, Konrad Rzeszutek Wilk wrote:
> > Interesting that you didn't CC any of the maintainers. Could you
> > do that in the future please?
>
> Please read the cover lette
v().
> Note: I only fixed conditional cleancache_invalidate_inode() here.
>Do we also need to add ->nrexceptional check in into invalidate_bdev()?
>
> - Patches 3-4: some optimizations.
Acked-by: Konrad Rzeszutek Wilk
Thanks!
>
> Andrey Ryabinin (4):
> fs: f
On Tue, Apr 18, 2017 at 02:13:59PM +, David Laight wrote:
> From: Logan Gunthorpe
> > Sent: 13 April 2017 23:05
> > Straightforward conversion to the new helper, except due to
> > the lack of error path, we have to warn if unmapable memory
> > is ever present in the sgl.
Interesting that you d
> > Signed-off-by: Stefano Stabellini
> > CC: li...@armlinux.org.uk
> > CC: catalin.mari...@arm.com
> > CC: will.dea...@arm.com
> > CC: boris.ostrov...@oracle.com
> > CC: jgr...@suse.com
> > CC: Julien Grall
>
> Reviewed-by: Boris Ostrovsky
>
> (
On Tue, Apr 11, 2017 at 12:24:09PM -0700, Marc Olson wrote:
> When a blkfront device is resized from dom0, emit a KOBJ_CHANGE uevent to
> notify the guest about the change. This allows for custom udev rules, such
> as automatically resizing a filesystem, when an event occurs.
Looks pretty reasonab
On Fri, Apr 07, 2017 at 01:29:27PM +0200, Juergen Gross wrote:
> On 07/04/17 10:30, Oleksandr Andrushchenko wrote:
> > From: Oleksandr Andrushchenko
> >
> > The patch clarifies the protocol that is used by the PV keyboard
> > drivers.
> >
> > Reviewed-by:
On Fri, Mar 31, 2017 at 04:40:56PM +0200, Juergen Gross wrote:
> There are several functions in xen-acpi-processor which either always
> return the same value or where the returned value is never checked.
>
> Make the functions return void.
Well, we could actually check it and do some extra error
On Fri, Mar 24, 2017 at 04:34:23PM -0400, Dan Streetman wrote:
> On Wed, Mar 22, 2017 at 10:13 PM, Boris Ostrovsky
> wrote:
> >
> >
> > On 03/22/2017 05:16 PM, Dan Streetman wrote:
> >>
> >> I have a question about a problem introduced by this commit:
> >> c275a57f5ec3056f732843b11659d892235faff7
cessor.c | 36 +++-
> > 1 file changed, 27 insertions(+), 9 deletions(-)
> >
>
> Applied to for-linus-4.11b, with some modifications to commit message in
> patch 2.
>
> Next time please copy maintainers (Juergen and me), otherwise there
On Fri, Mar 17, 2017 at 05:54:47AM +0100, Juergen Gross wrote:
> On 16/03/17 19:03, Stefano Stabellini wrote:
> > On Thu, 16 Mar 2017, Juergen Gross wrote:
> >> On 15/03/17 19:44, Stefano Stabellini wrote:
> >>> On Wed, 15 Mar 2017, Juergen Gross wrote:
> On 14/03/17 22:22, Stefano Stabellini
On Tue, Mar 07, 2017 at 05:13:59PM -0800, Stefano Stabellini wrote:
> On Tue, 7 Mar 2017, Stefano Stabellini wrote:
> > > > +
> > > > + ring = container_of(work, struct xen_9pfs_dataring, work);
> > > > + priv = ring->priv;
> > > > +
> > > > + while (1) {
> > > > + c
On Mon, Mar 06, 2017 at 11:52:06AM -0500, Konrad Rzeszutek Wilk wrote:
> Hey Linus,
Vacation does strange things to my brain. Fixed up the LKML mailing list
address.
>
> Please git pull the following branch:
>
> git://git.kernel.org/pub/scm/linux/kernel/git/konrad/swiotlb.gi
On Thu, Feb 16, 2017 at 09:46:19AM -0600, Tom Lendacky wrote:
> Add warnings to let the user know when bounce buffers are being used for
> DMA when SME is active. Since the bounce buffers are not in encrypted
> memory, these notifications are to allow the user to determine some
> appropriate actio
301 - 400 of 2730 matches
Mail list logo