From: Sean Christopherson
Add a capability, KVM_CAP_SGX_ATTRIBUTE, that can be used by userspace
to grant a VM access to a priveleged attribute, with args[0] holding a
file handle to a valid SGX attribute file.
The SGX subsystem restricts access to a subset of enclave attributes to
provide
From: Sean Christopherson
Add a capability, KVM_CAP_SGX_ATTRIBUTE, that can be used by userspace
to grant a VM access to a priveleged attribute, with args[0] holding a
file handle to a valid SGX attribute file.
The SGX subsystem restricts access to a subset of enclave attributes to
provide
From: Sean Christopherson
Add a capability, KVM_CAP_SGX_ATTRIBUTE, that can be used by userspace
to grant a VM access to a priveleged attribute, with args[0] holding a
file handle to a valid SGX attribute file.
The SGX subsystem restricts access to a subset of enclave attributes to
provide
/grant-table.c | 72 +
drivers/xen/xen-scsiback.c | 60
include/xen/grant_table.h | 13 +
6 files changed, 116 insertions(+), 128 deletions(-)
--- a/drivers/block/xen-blkback/blkback.c
+++ b/drivers/block/xen
On 12/7/20 8:30 AM, Juergen Gross wrote:
> Instead of having similar helpers in multiple backend drivers use
> common helpers for caching pages allocated via gnttab_alloc_pages().
>
> Make use of those helpers in blkback and scsiback.
>
> Signed-off-by: Juergen Gross
Reviewed-by: Boris Ostrovs
++---
drivers/block/xen-blkback/common.h | 4 +-
drivers/block/xen-blkback/xenbus.c | 6 +-
drivers/xen/grant-table.c | 72 +++
drivers/xen/xen-scsiback.c | 60 ---
include/xen/grant_table.h | 13 +
6 files changed, 116 insertions
On 9/1/20 4:49 PM, Khazhismel Kumykov wrote:
> On Sat, Aug 29, 2020 at 6:00 PM Bart Van Assche wrote:
>>
>> From https://www.kernel.org/doc/man-pages/linux-api-ml.html:
>> "all Linux kernel patches that change userspace interfaces should be CCed
>> to linux-...@vger.kernel.org"
>>
>> So I have add
On Sat, Aug 29, 2020 at 6:00 PM Bart Van Assche wrote:
>
> From https://www.kernel.org/doc/man-pages/linux-api-ml.html:
> "all Linux kernel patches that change userspace interfaces should be CCed
> to linux-...@vger.kernel.org"
>
> So I have added the linux-api mailing list to the Cc-list. Anyway:
On 2020-08-24 15:10, Khazhismel Kumykov wrote:
> CAP_SYS_ADMIN is too broad, and ionice fits into CAP_SYS_NICE's grouping.
>
> Retain CAP_SYS_ADMIN permission for backwards compatibility.
>
> Signed-off-by: Khazhismel Kumykov
> ---
> block/ioprio.c | 2 +-
> include/uapi/linux/
On Mon, Aug 24, 2020 at 03:10:34PM -0700, Khazhismel Kumykov wrote:
> CAP_SYS_ADMIN is too broad, and ionice fits into CAP_SYS_NICE's grouping.
>
> Retain CAP_SYS_ADMIN permission for backwards compatibility.
>
> Signed-off-by: Khazhismel Kumykov
Acked-by: Serge Hallyn
> ---
> block/ioprio.c
CAP_SYS_ADMIN is too broad, and ionice fits into CAP_SYS_NICE's grouping.
Retain CAP_SYS_ADMIN permission for backwards compatibility.
Signed-off-by: Khazhismel Kumykov
---
block/ioprio.c | 2 +-
include/uapi/linux/capability.h | 2 ++
2 files changed, 3 insertions(+), 1 deleti
On Mon, Aug 24, 2020 at 1:45 PM Khazhismel Kumykov wrote:
>
> CAP_SYS_ADMIN is too broad, and ionice fits into CAP_SYS_NICE's grouping.
>
> Retain CAP_SYS_ADMIN permission for backwards compatibility.
>
> Signed-off-by: Khazhismel Kumykov
> ---
> block/ioprio.c | 2 +-
> include
CAP_SYS_ADMIN is too broad, and ionice fits into CAP_SYS_NICE's grouping.
Retain CAP_SYS_ADMIN permission for backwards compatibility.
Signed-off-by: Khazhismel Kumykov
---
block/ioprio.c | 2 +-
include/uapi/linux/capability.h | 2 ++
2 files changed, 3 insertions(+), 1 deleti
ing tag as appropriate
Reported-by: kernel test robot
sparse warnings: (new ones prefixed by >>)
drivers/xen/grant-table.c:739:15: sparse: sparse: incorrect type in
assignment (different address spaces) @@ expected void *vaddr @@ got
void [noderef] __iomem * @@
drivers/xen/gran
_user_writeable() to fix the error -> retry;
.
The first perspective of root cause:
Futex think a pte have write permission will have read permission.
When page fault, it only try to fixup with FAULT_FLAG_WRITE.
The second perspective of root cause:
MIPS platform doesn't grant pte r
Lieber Bewohner, lieber
Die DBZ Project Foundation hat 25 Millionen US-Dollar für Notfallzuschüsse für
kleine Unternehmen und einzelne Projekte bereitgestellt.
Der Betrag variiert zwischen 300.000,00 USD und 800.000,00 USD pro
Antragsteller.
Die Bewerbung beginnt am 27. April unter folgender E-
From: Juergen Gross
[ Upstream commit 6b51fd3f65a22e3d1471b18a1d56247e246edd46 ]
xenbus_map_ring_valloc() maps a ring page and returns the status of the
used grant (0 meaning success).
There are Xen hypervisors which might return the value 1 for the status
of a failed grant mapping due to a
From: Juergen Gross
[ Upstream commit 6b51fd3f65a22e3d1471b18a1d56247e246edd46 ]
xenbus_map_ring_valloc() maps a ring page and returns the status of the
used grant (0 meaning success).
There are Xen hypervisors which might return the value 1 for the status
of a failed grant mapping due to a
From: Juergen Gross
[ Upstream commit 6b51fd3f65a22e3d1471b18a1d56247e246edd46 ]
xenbus_map_ring_valloc() maps a ring page and returns the status of the
used grant (0 meaning success).
There are Xen hypervisors which might return the value 1 for the status
of a failed grant mapping due to a
From: Juergen Gross
[ Upstream commit 6b51fd3f65a22e3d1471b18a1d56247e246edd46 ]
xenbus_map_ring_valloc() maps a ring page and returns the status of the
used grant (0 meaning success).
There are Xen hypervisors which might return the value 1 for the status
of a failed grant mapping due to a
From: Juergen Gross
[ Upstream commit 6b51fd3f65a22e3d1471b18a1d56247e246edd46 ]
xenbus_map_ring_valloc() maps a ring page and returns the status of the
used grant (0 meaning success).
There are Xen hypervisors which might return the value 1 for the status
of a failed grant mapping due to a
From: Juergen Gross
[ Upstream commit 6b51fd3f65a22e3d1471b18a1d56247e246edd46 ]
xenbus_map_ring_valloc() maps a ring page and returns the status of the
used grant (0 meaning success).
There are Xen hypervisors which might return the value 1 for the status
of a failed grant mapping due to a
On 10.10.19 10:32, Fuqian Huang wrote:
xen_auto_xlat_grant_frames.vaddr is definitely NULL in this case.
So the address printing is unnecessary.
Signed-off-by: Fuqian Huang
Reviewed-by: Juergen Gross
Juergen
xen_auto_xlat_grant_frames.vaddr is definitely NULL in this case.
So the address printing is unnecessary.
Signed-off-by: Fuqian Huang
---
drivers/xen/grant-table.c | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/drivers/xen/grant-table.c b/drivers/xen/grant-table.c
index
g
> inside a geniune SGX enclave and/or to obtain a stable fingerprint.
>
> To prevent userspace from circumventing such restrictions by running an
> enclave in a VM, KVM restricts guest access to privileged attributes by
> default. Add a capability, KVM_CAP_SGX_ATTRIBUTE, that can be use
userspace from circumventing such restrictions by running an
enclave in a VM, KVM restricts guest access to privileged attributes by
default. Add a capability, KVM_CAP_SGX_ATTRIBUTE, that can be used by
userspace to grant a VM access to a priveleged attribute, with args[0]
holding a file handle to a
Grant Link permission to the possessers of request_key authentication keys,
thereby allowing a daemon that is servicing upcalls to arrange things such
that only the necessary auth key is passed to the actual service program
and not all the daemon's pending auth keys.
Signed-off-by: David Ho
On 6/17/19 3:55 AM, Juergen Gross wrote:
On 09.05.19 19:25, Ankur Arora wrote:
Xenhost type xenhost_r0 does not support standard GNTTABOP_map_grant_ref
semantics (map a gref onto a specified host_addr). That's because
since the hypervisor is local (same address space as the caller of
GNTTABOP_ma
On 6/17/19 2:36 AM, Juergen Gross wrote:
On 09.05.19 19:25, Ankur Arora wrote:
Largely mechanical changes: the exported grant table symbols now take
xenhost_t * as a parameter. Also, move the grant table global state
inside xenhost_t.
If there's more than one xenhost, then initialize
On 09.05.19 19:25, Ankur Arora wrote:
Xenhost type xenhost_r0 does not support standard GNTTABOP_map_grant_ref
semantics (map a gref onto a specified host_addr). That's because
since the hypervisor is local (same address space as the caller of
GNTTABOP_map_grant_ref), there is no external entity
On 09.05.19 19:25, Ankur Arora wrote:
Largely mechanical changes: the exported grant table symbols now take
xenhost_t * as a parameter. Also, move the grant table global state
inside xenhost_t.
If there's more than one xenhost, then initialize both.
Signed-off-by: Ankur Arora
---
arc
Hello Dear,
We are a large Company based in Istanbul Turkey and we offers flexible loans
and funding for all projects for as low as 2% interest rate per annum for a
period of 5-15 yrs .
We invite you to partner with us and benefit in our new Loan and Project
funding program.
We can approve a
Grant Link permission to the possessers of request_key authentication keys,
thereby allowing a daemon that is servicing upcalls to arrange things such
that only the necessary auth key is passed to the actual service program
and not all the daemon's pending auth keys.
Signed-off-by: David Ho
On Wed, 22 May 2019, David Howells wrote:
> Grant Link permission to the possessers of request_key authentication keys,
> thereby allowing a daemon that is servicing upcalls to arrange things such
> that only the necessary auth key is passed to the actual service program
> and
Grant Link permission to the possessers of request_key authentication keys,
thereby allowing a daemon that is servicing upcalls to arrange things such
that only the necessary auth key is passed to the actual service program
and not all the daemon's pending auth keys.
Signed-off-by: David Ho
Largely mechanical changes: the exported grant table symbols now take
xenhost_t * as a parameter. Also, move the grant table global state
inside xenhost_t.
If there's more than one xenhost, then initialize both.
Signed-off-by: Ankur Arora
---
arch/x86/xen/grant-table.c | 71 +++--
driver
rtins
Signed-off-by: Ankur Arora
---
drivers/block/xen-blkback/blkback.c | 14 +-
drivers/xen/gntdev.c| 2 +-
drivers/xen/grant-table.c | 20 ++--
include/xen/grant_table.h | 11 ++-
4 files changed, 38 insertions(+), 9 dele
This syscall allows easy fileless execution, without calling chmod() first.
Thus, some security-related restrictions (like seccomp filters that deny
chmod +x) can by bypassed using memfd_create() if the policy author is
unaware of this.
Signed-off-by: Dima Krasner
Cc: linux...@kvack.org
Cc: Hugh
I Mikhail Fridman picked you for $5,000,000 donatiion,Reply for more details
IZJAVA O ODRICANJU ODGOVORNOSTI: Ova elektronicka posta moze sadrzavati
povjerljive
informacije i namijenjena je samo osobama na koje je naslovljena. Ukoliko Vi
niste
navedeni primatelj nije Vam dopusteno koristiti nje
. This eventually results in
leaking grant ref mappings since xenvif_zerocopy_callback() is never
called for these fragments. Those eventually build up and cause Xen
to kill Dom0 as the slots get reused for new mappings:
"d0v0 Attempt to implicitly unmap a granted PTE c01329fce005"
That b
. This eventually results in
leaking grant ref mappings since xenvif_zerocopy_callback() is never
called for these fragments. Those eventually build up and cause Xen
to kill Dom0 as the slots get reused for new mappings:
"d0v0 Attempt to implicitly unmap a granted PTE c01329fce005"
That b
. This eventually results in
leaking grant ref mappings since xenvif_zerocopy_callback() is never
called for these fragments. Those eventually build up and cause Xen
to kill Dom0 as the slots get reused for new mappings:
"d0v0 Attempt to implicitly unmap a granted PTE c01329fce005"
Tha
/lottery-mania/
I intend to grant you a portion of my wealth as a free-will financial grant to
you. Respond to sjjo...@mail.com to partake.
IMPORTANT NOTE: Only mails sent to sjjo...@mail.com will be attend to.
Best Regards,
Mrs Mavis Wanczyk
You were chosen to receive a Cash Grant Donation of €1,700,000 from
Maria-Elisabeth Schaeffler, Respond back for more details email me at:
patriciachandl...@gmail.com
. This eventually results in
leaking grant ref mappings since xenvif_zerocopy_callback() is never
called for these fragments. Those eventually build up and cause Xen
to kill Dom0 as the slots get reused for new mappings:
"d0v0 Attempt to implicitly unmap a granted PTE c01329fce005"
Tha
. This eventually results in
leaking grant ref mappings since xenvif_zerocopy_callback() is never
called for these fragments. Those eventually build up and cause Xen
to kill Dom0 as the slots get reused for new mappings:
"d0v0 Attempt to implicitly unmap a granted PTE c01329fce005"
Tha
From: Igor Druzhinin
Date: Thu, 28 Feb 2019 12:48:03 +
> Zero-copy callback flag is not yet set on frag list skb at the moment
> xenvif_handle_frag_list() returns -ENOMEM. This eventually results in
> leaking grant ref mappings since xenvif_zerocopy_callback() is never
> call
On Thu, Feb 28, 2019 at 12:48:03PM +, Igor Druzhinin wrote:
> Zero-copy callback flag is not yet set on frag list skb at the moment
> xenvif_handle_frag_list() returns -ENOMEM. This eventually results in
> leaking grant ref mappings since xenvif_zerocopy_callback() is never
> call
Zero-copy callback flag is not yet set on frag list skb at the moment
xenvif_handle_frag_list() returns -ENOMEM. This eventually results in
leaking grant ref mappings since xenvif_zerocopy_callback() is never
called for these fragments. Those eventually build up and cause Xen
to kill Dom0 as the
On Thu, Feb 28, 2019 at 12:07:07PM +, Paul Durrant wrote:
> Yes, I meant kfree_skb(nskb).
>
In that case I think your patch looks fine.
Wei.
...@lists.xenproject.org;
> da...@davemloft.net
> Subject: Re: [Xen-devel] [PATCH] xen-netback: fix occasional leak of grant
> ref mappings under memory
> pressure
>
> > -Original Message-
> > From: Wei Liu [mailto:wei.l...@citrix.com]
> > Sent: 28 Februar
Subject: Re: [PATCH] xen-netback: fix occasional leak of grant ref mappings
> under memory pressure
>
> On 28/02/2019 11:21, Paul Durrant wrote:
> >>> @@ -1153,6 +1152,10 @@ static int xenvif_tx_submit(struct xenvif_queue
> >>> *q
On 28/02/2019 11:21, Paul Durrant wrote:
>>> @@ -1153,6 +1152,10 @@ static int xenvif_tx_submit(struct xenvif_queue
>>> *queue)
>>> kfree_skb(skb);
>>> continue;
>>> }
>>> +
>>> + /* Copie
t.net
> Subject: Re: [PATCH] xen-netback: fix occasional leak of grant ref mappings
> under memory pressure
>
> On Thu, Feb 28, 2019 at 09:46:57AM +, Paul Durrant wrote:
> > > -Original Message-
> > > From: Igor Druzhinin [mailto:igor.druzhi...@citrix
el@vger.kernel.org
> > Cc: Wei Liu ; Paul Durrant ;
> > da...@davemloft.net; Igor
> > Druzhinin
> > Subject: [PATCH] xen-netback: fix occasional leak of grant ref mappings
> > under memory pressure
> >
> > Zero-copy callback flag is not yet set on frag li
On 28/02/2019 02:03, Igor Druzhinin wrote:
> Zero-copy callback flag is not yet set on frag list skb at the moment
> xenvif_handle_frag_list() returns -ENOMEM. This eventually results in
> leaking grant ref mappings since xenvif_zerocopy_callback() is never
> called for these frag
gt; Druzhinin
> Subject: [PATCH] xen-netback: fix occasional leak of grant ref mappings under
> memory pressure
>
> Zero-copy callback flag is not yet set on frag list skb at the moment
> xenvif_handle_frag_list() returns -ENOMEM. This eventually results in
> leaking grant ref ma
Zero-copy callback flag is not yet set on frag list skb at the moment
xenvif_handle_frag_list() returns -ENOMEM. This eventually results in
leaking grant ref mappings since xenvif_zerocopy_callback() is never
called for these fragments. Those eventually build up and cause Xen
to kill Dom0 as the
From: Ankur Arora
Introduce support for mapping grant references. The sequence of events
to map a grant is:
rframe = read_shared_entry(guest_grant_table, grant-ref);
rpfn = get_user_pages_remote(remote_mm, rframe);
mark_shared_entry(guest_grant_table, grant-ref
From: Ankur Arora
Grant unmap removes the grant from maptrack and marks it as not in use.
We maintain a one-to-one correspondence between grant table and maptrack
entries so there's no contention in allocation/free.
Co-developed-by: Joao Martins
Signed-off-by: Ankur Arora
Signed-off-by:
With xen-shim, allocate_xenballooned_pages() only allocates a
place-holder page (pfn 0) expecting a subsequent map_grant_ref to fix
it up.
However, this means that, until the grant operation
(GNTTABOP_map_grant_ref) provides a valid page, we cannot set
PagePrivate or save any state.
This patch
Guests grant tables with core Xen PV devices (xenbus, console) need to
be seeded with a bunch of reserved entries at boot. However, at init,
the grant table is, from a guest perspective, empty and has no frames
backing it. That only happens once the guest does:
XENMEM_add_to_physmap(idx=N,gfn=M
Add support for guest grant table initialization. This is mostly
scaffolding at this point: we allocate grant table state and map
it globally.
Later patches add support for seeding the grant table with reserved
entries, and setup maptrack which would be used for grant map and unmap
operations
Copies from source grant reference to dest grant reference (or the
other way around.)
Signed-off-by: Joao Martins
---
arch/x86/kvm/xen.c | 151 +
1 file changed, 151 insertions(+)
diff --git a/arch/x86/kvm/xen.c b/arch/x86/kvm/xen.c
index
Provide a sample program that will grant access to the specified key for a
container named "foo-test" (as created by the test-container sample) and
then link the key into the container keyring (either given on the command
line or searches for a keyring called "_container" in th
Grant Link permission to the possessers of request_key authentication keys,
thereby allowing a daemon that is servicing upcalls to arrange things such
that only the necessary auth key is passed to the actual service program
and not all the daemon's pending auth keys.
Signed-off-by: David Ho
4.19-stable review patch. If anyone has any objections, please let me know.
--
From: Pavel Shilovsky
commit 33fa5c8b8a7dbe6353a56eaa654b790348890d42 upstream.
Currently we reset the number of total credits granted by the server
to 1 if the server didn't grant us anythin
4.20-stable review patch. If anyone has any objections, please let me know.
--
From: Pavel Shilovsky
commit 33fa5c8b8a7dbe6353a56eaa654b790348890d42 upstream.
Currently we reset the number of total credits granted by the server
to 1 if the server didn't grant us anythin
That may be OpenBSD policy, but it is not the law.
Your OpenBSD policy cannot bind the copyright holder of the works you
distribute.
It's also an incorrect statement of the law.
If the copyright holder did not receive consideration/payment/etc from
you: you have no interest to bind him with.
Subject: Re: [gentoo-user] Re: Yes: The linux devs can rescind their
license grant. GPLv2 is a bare license and is revocable by the grantor.
FromR0b0t1
To gentoo-u...@lists.gentoo.org
Cc ubuntu-us...@lists.ubuntu.com
, debian-u...@lists.debian.org, d...@lists.dyne.org
Reply-To
Re: [gentoo-user] Re: Yes: The linux devs can rescind their license
grant. GPLv2 is a bare license and is revocable by the grantor.
FromR0b0t1
To gentoo-u...@lists.gentoo.org
Cc ubuntu-us...@lists.ubuntu.com
, debian-u...@lists.debian.org, d...@lists.dyne.org
Reply-Togentoo
Did each of the linux programmers make such a promise to you?
No they did not.
Did you pay each of the linux programmers anything.
No you did not.
They can rescind the license from you.
Understand?
A license is a temporary grant, it is not a transfer.
On Thu, Dec 27, 2018 at 3:12 PM wrote:
> ... pompous programmer asshole*.
I think you are projecting your own personality in your perception of
others (which is a natural thing to do - everyone does that to some
degree).
That said, I am going to filter your messages to my spam bucket from now on
(2) ... (I am not going to go over the legal mistakes you've made,
because of (1))...
I have not made legal mistakes, pompous programmer a__hole*.
A gratuitous license, absent an attached interest, is revocable at will.
This goes for GPLv2 as used by linux, just as it goes for the BSD
license
a
permanent alienation of the article(property) in question. The
impinged
property, being under a non bargained-for temporary grant, can be
taken
back into the sole dominion of the owner - at his election to do so.
Now as to the 9th circuit appellate court's decision in Jacobsen v.
Katzer .
Original Message
Subject: Re: [DNG] 2 months and no response from Eben Moglen - Yes you
can rescind your grant. -- The CoC regime is a License violation -
Additional restrictive terms
Date: 2018-12-24 16:24
From: vnsnda...@memeware.net
To: d...@lists.dyne.org
Version 2 of
Hendrik Boom, are you a lawyer?
No? How about you shut your fucking mouth about things you have no clue
of?
Sound like a plan, ignorant lay person?
Below is an explanation of just how it is a violation of the
rights-holder's grant. The courts are not fooled by "clever" verbi
he article of
property that is being impinged. A license is NOT a full nor is it a
permanent alienation of the article(property) in question. The impinged
property, being under a non bargained-for temporary grant, can be taken
back into the sole dominion of the owner - at his election to do so.
It has been 2 months. Eben Moglen has published no research.
Because there is nothing more to say: The GPLv2, as used by linux, is a
bare license. It can be rescinded at the will of the grantor.
The regime that the FSF used, vis-a-vis the GPLv2, is essential:
copyright transfers to a central
is being impinged. A license is NOT a full nor is it a
permanent alienation of the article(property) in question. The impinged
property, being under a non bargained-for temporary grant, can be taken
back into the sole dominion of the owner - at his election to do so.
Now as to the 9th circuit appell
It has been 2 months. Eben Moglen has published no research.
Because there is nothing more to say: The GPLv2, as used by linux, is a
bare license. It can be rescinded at the will of the grantor.
The regime that the FSF used, vis-a-vis the GPLv2, is essential:
copyright transfers to a central
It has been 2 months. Eben Moglen has published no research.
Because there is nothing more to say: The GPLv2, as used by linux, is a
bare license. It can be rescinded at the will of the grantor.
The regime that the FSF used, vis-a-vis the GPLv2, is essential:
copyright transfers to a central
is being impinged. A license is NOT a full nor is it a
permanent alienation of the article(property) in question. The impinged
property, being under a non bargained-for temporary grant, can be taken
back into the sole dominion of the owner - at his election to do so.
Now as to the 9th circuit appell
is being impinged. A license is NOT a full nor is it a
permanent alienation of the article(property) in question. The impinged
property, being under a non bargained-for temporary grant, can be taken
back into the sole dominion of the owner - at his election to do so.
Now as to the 9th circuit appell
Has the analysis been published yet?
I have been away on an artistic sabbatical, but I don't see it in the
inbox using searches, this was the last mail I received on the subject.
On 2018-10-26 18:31, Eben Moglen wrote:
On Friday, 26 October 2018, visionsofal...@redchan.it wrote:
You are co
ation..." which
should be "Failed to increase reservation..."
Fixes: 9bdc7304f536 ('xen/grant-table: Allow allocating buffers suitable for
DMA')
Reported-by: Ross Philipson
Signed-off-by: Liam Merwick
Reviewed-by: Mark Kanda
Reviewed-by: Juergen Gross
Signed-off-by: Juergen Gro
: 9bdc7304f536 ('xen/grant-table: Allow allocating buffers suitable for
DMA')
Reported-by: Ross Philipson
Signed-off-by: Liam Merwick
Reviewed-by: Mark Kanda
Reviewed-by: Juergen Gross
Signed-off-by: Juergen Gross
Signed-off-by: Sasha Levin
---
drivers/xen/grant-table.c | 2 +-
1 f
4.19-stable review patch. If anyone has any objections, please let me know.
--
From: Chuck Lever
[ Upstream commit ef739b2175dde9c05594f768cb78149f1ce2ac36 ]
On a fresh connection, an RPC/RDMA client is supposed to send only
one RPC Call until it gets a credit grant in the
4.18-stable review patch. If anyone has any objections, please let me know.
--
From: Chuck Lever
[ Upstream commit ef739b2175dde9c05594f768cb78149f1ce2ac36 ]
On a fresh connection, an RPC/RDMA client is supposed to send only
one RPC Call until it gets a credit grant in the
I, Mikhail Fridman have selected you specifically as one of my beneficiaries
for my Charitable Donation of $5 Million Dollars,
Check the link below for confirmation:
https://www.rt.com/business/343781-mikhail-fridman-will-charity/
I await your earliest response for further directives.
Best Reg
On Fri, Oct 26, 2018 at 12:12 AM NeilBrown wrote:
> On Thu, Oct 25 2018, Eric S. Raymond wrote:
> > Theodore Y. Ts'o :
> >> On Thu, Oct 25, 2018 at 03:39:01PM -0400, Eric S. Raymond wrote:
> >> > Under Jacobsen vs. Katzer (535 f 3d 1373 fed cir 2008) authors of
> >> > GPLed software have a specifi
From: Chuck Lever
[ Upstream commit ef739b2175dde9c05594f768cb78149f1ce2ac36 ]
On a fresh connection, an RPC/RDMA client is supposed to send only
one RPC Call until it gets a credit grant in the first RPC Reply
from the server [RFC 8166, Section 3.3.3].
There is a bug in the Linux client
From: Chuck Lever
[ Upstream commit ef739b2175dde9c05594f768cb78149f1ce2ac36 ]
On a fresh connection, an RPC/RDMA client is supposed to send only
one RPC Call until it gets a credit grant in the first RPC Reply
from the server [RFC 8166, Section 3.3.3].
There is a bug in the Linux client
On Thu, Oct 25, 2018 at 07:56:26AM +, visionsofal...@redchan.it wrote:
> The linux devs can rescind their license grant.
Greg KH responded on Thu, 25 Oct 2018 09:19:11 +0100:
>> No they can not, please do not keep spreading false information.
I was explicitly cc'ed on
On Sun, Oct 28 2018, Jiri Kosina wrote:
> On Sat, 27 Oct 2018, tim.b...@sony.com wrote:
>
>> Al,
>>
>> Can you please, even in the face of comments you find irritating, keep
>> your responses more civil? Calling someone a "wankstain" is
>> unprofessional
>
> Tim,
>
> to be completely honest, co
On Sat, Oct 27, 2018 at 03:46:02PM -0700, Bruce Perens wrote:
> The anonymous person is generally thought to have appeared on the net
> previously as MikeeUSA. That entity has a well-recorded history of misogyny
> and other anti-social behaviour.
You are misreading it - behaviour of that... membe
Bruce Perens :
> The anonymous person is generally thought to have appeared on the net
> previously as MikeeUSA. That entity has a well-recorded history of misogyny
> and other anti-social behaviour. He's also complained to me recently that
> because of "people like me", the law prohibits him from
On Sat, 27 Oct 2018, tim.b...@sony.com wrote:
> Al,
>
> Can you please, even in the face of comments you find irritating, keep
> your responses more civil? Calling someone a "wankstain" is
> unprofessional
Tim,
to be completely honest, communicating anonymously doesn't really match my
"this
> -Original Message-
> From: Al Viro
>
> On Sat, Oct 27, 2018 at 06:52:44AM +, visionsofal...@redchan.it wrote:
> > Al: the FSF was so insistent on the adoption of the GPL version 3
> > because the GPL version 2 is not operative against the grantor.
>
> Anonymous wankstain: sod off an
On Sat, Oct 27, 2018 at 06:52:44AM +, visionsofal...@redchan.it wrote:
> Al: the FSF was so insistent on the adoption of the GPL version 3
> because the GPL version 2 is not operative against the grantor.
Anonymous wankstain: sod off and learn to troll properly. It *is* an art
form, and the o
1 - 100 of 859 matches
Mail list logo