For certain applications it is desirable to rapidly boot a KVM virtual
machine. In cases where legacy hardware and software support within the
guest is not needed, Qemu should be able to boot directly into the
uncompressed Linux kernel binary without the need to run firmware.
There already exists
The start info structure that is defined as part of the x86/HVM direct boot
ABI and used for starting Xen PVH guests would be more versatile if it also
included a way to pass information about the memory map to the guest. This
would allow KVM guests to share the same entry point.
Signed-off-by: Ma
We need to refactor PVH entry code so that support for other hypervisors
like Qemu/KVM can be added more easily.
The first step in that direction is to create a new file that will
eventually hold the Xen specific routines.
Signed-off-by: Maran Wilson
---
arch/x86/platform/pvh/enlighten.c | 5 +
We need to refactor PVH entry code so that support for other hypervisors
like Qemu/KVM can be added more easily.
This patch moves the small block of code used for initializing Xen PVH
virtual machines into the Xen specific file. This initialization is not
going to be needed for Qemu/KVM guests. Mo
On Wed, Apr 4, 2018 at 12:07 PM, Oleksandr Natalenko
wrote:
> [ 261.262135] Bad or missing usercopy whitelist? Kernel memory exposure
> attempt detected from SLUB object 'scsi_sense_cache' (offset 94, size 22)!
> I can easily reproduce it with a qemu VM and 2 virtual SCSI disks by calling
> smart
On Wed, Apr 4, 2018 at 9:17 PM, Matthias Kaehlcke wrote:
> El Wed, Apr 04, 2018 at 11:30:07AM +0200 Peter Zijlstra ha dit:
>
>> On Tue, Apr 03, 2018 at 11:06:58AM -0700, Matthias Kaehlcke wrote:
>>
>> > Yes, Chrome OS R67 (currently dev, soon beta) will ship a kernel built
>> > with Clang for mult
We need to refactor PVH entry code so that support for other hypervisors
like Qemu/KVM can be added more easily.
The original design for PVH entry in Xen guests relies on being able to
obtain the memory map from the hypervisor using a hypercall. When we
extend the PVH entry ABI to support other hy
Once hypervisors other than Xen start using the PVH entry point for
starting VMs, we would like the option of being able to compile PVH entry
capable kernels without enabling CONFIG_XEN and all the code that comes
along with that. To allow that, we are moving the PVH code out of Xen and
into files
In order to pave the way for hypervisors other than Xen to use the PVH
entry point for VMs, we need to factor the PVH entry code into Xen specific
and hypervisor agnostic components. The first step in doing that, is to
create a new config option for PVH entry that can be enabled
independently from
On Wed, Apr 04, 2018 at 09:48:57PM +0200, Christian Brauner wrote:
> commit 07e98962fa77 ("kobject: Send hotplug events in all network namespaces")
>
> enabled sending hotplug events into all network namespaces back in 2010.
> Over time the set of uevents that get sent into all network namespaces
On Wed, 28 Mar 2018 17:07:47 +0200,
Stuart Hayes wrote:
>
> @@ -180,6 +181,12 @@ static int create_packet(void *data, size_t length)
> invalid_addr_packet_array[idx++] = packet_data_temp_buf;
> packet_data_temp_buf = NULL;
> }
> +
While enabling/disabling DPMS before link training with MST hubs is
perfectly valid; unfortunately disabling DPMS results in some devices
disabling their AUX CH block as well. For SST this isn't as much of a
problem, but for MST we need to be able to continue handling aux
transactions even when non
Resend that was required anyway since I missed some t-b's and some acks.
Trying to figure out what patchwork is doing that's making this patch
not get noticed. Maybe it's the lack of cover letters on the previous
versions of this
Lyude Paul (1):
drm/i915: Keep AUX block running when disablin
For certain applications it is desirable to rapidly boot a KVM virtual
machine. In cases where legacy hardware and software support within the
guest is not needed, Qemu should be able to boot directly into the
uncompressed Linux kernel binary without the need to run firmware.
There already exists
HI,
On 04-04-18 19:18, Peter Jones wrote:
On Tue, Apr 03, 2018 at 06:58:48PM +, Luis R. Rodriguez wrote:
On Tue, Apr 03, 2018 at 08:07:11PM +0200, Lukas Wunner wrote:
On Tue, Apr 03, 2018 at 10:33:25AM +0200, Hans de Goede wrote:
I asked Peter Jones for suggestions how to extract this dur
On Wed, Apr 4, 2018 at 12:07 PM, Oleksandr Natalenko
wrote:
> With v4.16 I get the following dump while using smartctl:
> [...]
> [ 261.262135] Bad or missing usercopy whitelist? Kernel memory exposure
> attempt detected from SLUB object 'scsi_sense_cache' (offset 94, size 22)!
> [...]
> [ 261.3
On Thu, Mar 29, 2018 at 6:07 PM, LEROY Christophe
wrote:
> Mathieu Malaterre a écrit :
>
>
>> Since the value of x is never intended to be read, declare it with gcc
>> attribute as unused. Fix warning treated as error with W=1:
>>
>> arch/powerpc/platforms/powermac/bootx_init.c:471:21: error: v
; > > > always_inline 'memcmp': function not inlinable
> > > > ...
> > > > pavel@duo:/data/l/linux-next-n900$ git branch -l
> > > > * (detached from next-20180403)
> > > >
> > > > I'm using
> > >
On Thu, Mar 29, 2018 at 6:02 PM, LEROY Christophe
wrote:
> Mathieu Malaterre a écrit :
>
>
>> On Fri, Mar 23, 2018 at 1:20 PM, christophe leroy
>> wrote:
>>>
>>>
>>>
>>> Le 22/03/2018 à 21:20, Mathieu Malaterre a écrit :
Add one missing prototype for function rh_dump_blk. Fix warn
On Wed, Apr 4, 2018 at 1:01 PM Thomas Gleixner wrote:
> Now where the disagreement lies is the way how the uid/ring0 aspect is
tied
> to secure boot, which makes it impossible to be useful independent of
> Secure Boot.
It doesn't - you can pass a command line parameter that enables it, or your
bo
While enabling/disabling DPMS before link training with MST hubs is
perfectly valid; unfortunately disabling DPMS results in some devices
disabling their AUX CH block as well. For SST this isn't as much of a
problem, but for MST we need to be able to continue handling aux
transactions even when non
These functions can all be static, make it so. Fix warnings treated as
errors with W=1:
arch/powerpc/platforms/chrp/pci.c:34:5: error: no previous prototype for
‘gg2_read_config’ [-Werror=missing-prototypes]
arch/powerpc/platforms/chrp/pci.c:61:5: error: no previous prototype for
‘gg2_write_
The pmac_pfunc_base_install prototype was declared in powermac/smp.c since
function was used there, move it to pmac_pfunc.h header to be visible in
pfunc_base.c. Fix a warning treated as error with W=1:
arch/powerpc/platforms/powermac/pfunc_base.c:330:12: error: no previous
prototype for ‘pmac_
The function prototypes were declared within a `#ifdef CONFIG_PPC_LITE5200`
block which would prevent them from being visible when compiling
`mpc52xx_pm.c`. Move the prototypes outside of the `#ifdef` block to fix
the following warnings treated as errors with W=1:
arch/powerpc/platforms/52xx/mpc
Add a missing prototype for function `note_bootable_part` to silence a
warning treated as error with W=1:
arch/powerpc/platforms/powermac/setup.c:361:12: error: no previous prototype
for ‘note_bootable_part’ [-Werror=missing-prototypes]
Suggested-by: Christophe Leroy
Signed-off-by: Mathieu Ma
Add one missing prototype for function rh_dump_blk. Fix warning treated as
error in W=1:
arch/powerpc/lib/rheap.c:740:6: error: no previous prototype for
‘rh_dump_blk’ [-Werror=missing-prototypes]
Suggested-by: Christophe Leroy
Signed-off-by: Mathieu Malaterre
---
v3: remove extern keyword
v
On Wed, 2018-04-04 at 22:35 +0300, Ville Syrjälä wrote:
> On Wed, Apr 04, 2018 at 03:00:12PM -0400, Lyude Paul wrote:
> > On Wed, 2018-04-04 at 21:53 +0300, Ville Syrjälä wrote:
> > > On Wed, Apr 04, 2018 at 02:37:41PM -0400, Lyude Paul wrote:
> > > > On Wed, 2018-04-04 at 18:34 +0300, Ville Syrjäl
Some function prototypes and body for Thermal Assist Units were not in
sync. Update the function definition to match the existing function
declaration found in `setup-common.c`, changing an `int` return type to a
`u32` return type. Move the prototypes to a header file. Fix the following
warnings, t
Remove variable declaration idu_size and associated code since not used.
These functions can all be static, make it so. Fix warnings treated as
errors with W=1:
arch/powerpc/platforms/chrp/setup.c:97:6: error: no previous prototype for
‘chrp_show_cpuinfo’ [-Werror=missing-prototypes]
arch/po
Hi,
On 04-04-18 14:21, Arnd Bergmann wrote:
The new axp288 extcon driver has no dependency on USB itself but
calls the usb role switch helper functions. This causes a link error
when USB_COMMON is disabled, as that subdirectory never gets entered:
drivers/extcon/extcon-axp288.o: In function `ax
Add gcc attribute unused for two variables. Fix warnings treated as errors
with W=1:
arch/powerpc/kernel/prom_init.c:1388:8: error: variable ‘path’ set but not
used [-Werror=unused-but-set-variable]
Suggested-by: Christophe Leroy
Signed-off-by: Mathieu Malaterre
---
v3: really move path with
Since the value of x is never intended to be read, declare it with gcc
attribute as unused. Fix warning treated as error with W=1:
arch/powerpc/platforms/powermac/bootx_init.c:471:21: error: variable ‘x’ set
but not used [-Werror=unused-but-set-variable]
Suggested-by: Christophe Leroy
Signed-
On Mon, Apr 2, 2018 at 8:36 PM, Wu Hao wrote:
> On Mon, Apr 02, 2018 at 02:06:56PM -0500, Alan Tull wrote:
>> On Sun, Apr 1, 2018 at 11:22 PM, Wu Hao wrote:
>> > On Thu, Mar 29, 2018 at 04:57:22PM -0500, Alan Tull wrote:
>> >> On Mon, Mar 26, 2018 at 9:35 PM, Wu Hao wrote:
>> >>
>> >> Hi Hao,
>>
On Wed, Apr 04, 2018 at 12:24:33PM -0700, Randy Dunlap wrote:
>
> > + pr_warn_once("Non PR_SET_MM_MAP operations are deprecated\n");
> > + return -EINVAL;
> > }
>
> I'm not against removing such functionality, but I think that it's more than
> "deprecated." It's gone.
At first this was pla
On Wed, 4 Apr 2018, Peter Jones wrote:
> That is to say, as a result of the way malware has been written, our way
> of thinking about it is often that it's a way to build a boot loader for
> a malicious kernel, so that's how we wind up talking about it. Are we
> concerned with malware stealing you
ta/l/linux-next-n900$ git branch -l
> > > * (detached from next-20180403)
> > >
> > > I'm using
> > >
> > > eval ` eldk-switch.sh -r 5.4 armv7a`
> > >
> > > for cross-compilation.
> >
> > Hmm I'm not seeing buil
On Wed, 04 Apr 2018 21:49:26 +0200
Robert Jarzmik wrote:
> Ulf Hansson writes:
>
> > On 2 April 2018 at 16:26, Robert Jarzmik wrote:
> >> Hi,
> >>
> >> This serie is aimed at removing the dmaengine slave compat use, and
> >> transfer
> >> knowledge of the DMA requestors into architecture co
On Wed, 28 Mar 2018 22:51:44 +0200
Thomas Gleixner wrote:
> The reed solomon library is moving the on stack decoder buffers into the rs
> control structure. That would break the DoC driver because multiple
> instances share the same control structure and can operate in parallel. At
> least in the
On Wed, Apr 4, 2018 at 7:48 PM, Sinan Kaya wrote:
> On 4/4/2018 11:55 AM, Arnd Bergmann wrote:
>> Yes, exactly, plus the same for write and in/out of course.
>
> I was looking at this...
>
> inb() and outb() seem to be calling writeb(). It gets the wmb/barrier
> automatically
> when we fix writeb
On Tue, 3 Apr 2018 18:38:19 -0400
Steven Rostedt wrote:
> On Tue, 3 Apr 2018 12:52:20 -0700
> Tim Tianyang Chen wrote:
>
> > Hi Steve, did you get a chance to take a look? cc'ing myself and a
> > personal email. When I sent the patchset I forgot to include.
>
> Sorry, I'm trying to get my o
On 04/04/2018 11:53 AM, James Morse wrote:
> Hi Alex,
(snip)
>>> How do we know we will survive this trip?
>>
>> We don't.
>
> Isn't that even worse than panic()ing? (No output, followed by a watchdog
> reboot
> if we're lucky)
On the contrary. No output, followed by a watchdog reboot is usual
commit 07e98962fa77 ("kobject: Send hotplug events in all network namespaces")
enabled sending hotplug events into all network namespaces back in 2010.
Over time the set of uevents that get sent into all network namespaces has
shrunk. We have now reached the point where hotplug events for all devi
Ulf Hansson writes:
> On 2 April 2018 at 16:26, Robert Jarzmik wrote:
>> Hi,
>>
>> This serie is aimed at removing the dmaengine slave compat use, and transfer
>> knowledge of the DMA requestors into architecture code.
>> As this looks like a patch bomb, each maintainer expressing for his tree
On Wed, 2018-04-04 at 22:31 +0300, Ville Syrjälä wrote:
> On Wed, Apr 04, 2018 at 02:59:09PM -0400, Lyude Paul wrote:
> > On Wed, 2018-04-04 at 21:53 +0300, Ville Syrjälä wrote:
> > > On Wed, Apr 04, 2018 at 02:37:41PM -0400, Lyude Paul wrote:
> > > > On Wed, 2018-04-04 at 18:34 +0300, Ville Syrjäl
Bartosz Golaszewski writes:
> We want to work towards phasing out the at24_platform_data structure.
> There are few users and its contents can be represented using generic
> device properties. Using device properties only will allow us to
> significantly simplify the at24 configuration code.
>
>
On Wed, Apr 4, 2018 at 12:26 PM, James Y Knight wrote:
>
> (OTOH, I _do_ expect clang to eventually gain support for a flag to treat
> NULL-pointer deref as a legal operation instead of UB. I'm not really sure
> it makes sense for the linux kernel, but it's a useful feature for the
> compiler to p
Hi Thomas,
On Wed, 28 Mar 2018 22:51:43 +0200
Thomas Gleixner wrote:
> The decoder library uses variable length arrays on stack. To get rid of
> them it's it would be simple to allocate fixed length arrays on stack, but
^ s/it's//
> those might become rather large. The other solution is
On Wed, 4 Apr 2018, Ming Lei wrote:
> On Wed, Apr 04, 2018 at 10:25:16AM +0200, Thomas Gleixner wrote:
> > In the example above:
> >
> > > > > irq 39, cpu list 0,4
> > > > > irq 40, cpu list 1,6
> > > > > irq 41, cpu list 2,5
> > > > > irq 42, cpu list 3,7
> >
> > and assu
On Wed, Apr 04, 2018 at 03:00:12PM -0400, Lyude Paul wrote:
> On Wed, 2018-04-04 at 21:53 +0300, Ville Syrjälä wrote:
> > On Wed, Apr 04, 2018 at 02:37:41PM -0400, Lyude Paul wrote:
> > > On Wed, 2018-04-04 at 18:34 +0300, Ville Syrjälä wrote:
> > > > On Mon, Apr 02, 2018 at 05:26:16PM -0400, Lyude
On Wed, Apr 04, 2018 at 09:24:05PM +0200, Dmitry Vyukov wrote:
> On Tue, Apr 3, 2018 at 4:01 AM, syzbot
> wrote:
> > DEBUG_LOCKS_WARN_ON(sem->owner != get_current())
> > WARNING: CPU: 1 PID: 4441 at kernel/locking/rwsem.c:133 up_write+0x1cc/0x210
> > kernel/locking/rwsem.c:133
> > Kernel panic - n
From: Sai Praneeth
When the platform supports PCID and if CONFIG_DEBUG_VM is enabled,
build_cr3_noflush() (called via switch_mm()) does a sanity check to see
if X86_FEATURE_PCID is set. Presently, build_cr3_noflush() uses
"this_cpu_has(X86_FEATURE_PCID)" to perform the check but this_cpu_has()
wo
From: Jérôme Glisse
Regroup all helpers that dereference struct page.index field into one
place and require a the address_space (mapping) against which caller
is looking the index (offset, pgoff, ...)
Signed-off-by: Jérôme Glisse
Cc: linux...@kvack.org
CC: Andrew Morton
Cc: Alexander Viro
Cc:
On Wed, Apr 04, 2018 at 04:53:52PM +, Nick Desaulniers wrote:
> (re-sending as plain text)
>
> On Wed, Apr 4, 2018 at 2:38 AM Greg KH wrote:
> > There are known-bugs with building a kernel with clang right now (I
> > pointed one out a few days ago about NULL checks being deleted from the
> >
On Wed, Apr 04, 2018 at 02:59:09PM -0400, Lyude Paul wrote:
> On Wed, 2018-04-04 at 21:53 +0300, Ville Syrjälä wrote:
> > On Wed, Apr 04, 2018 at 02:37:41PM -0400, Lyude Paul wrote:
> > > On Wed, 2018-04-04 at 18:34 +0300, Ville Syrjälä wrote:
> > > > On Mon, Apr 02, 2018 at 05:26:16PM -0400, Lyude
From: Jérôme Glisse
https://cgit.freedesktop.org/~glisse/linux/log/?h=generic-write-protection-rfc
This is an RFC for LSF/MM discussions. It impacts the file subsystem,
the block subsystem and the mm subsystem. Hence it would benefit from
a cross sub-system discussion.
Patchset is not fully bak
On Wed, 4 Apr 2018 12:04:42 -0700
Linus Torvalds wrote:
>
> So at the *very* least this would need to be percpu logic, but even
> that is honestly broken since an NMI might come in and want to printk
> too.
>
> Why don't you just use %px? That avoids all of these hacks.
Just need to remember
From: Jérôme Glisse
Pipes are associated with a file and thus an inode, store a pointer
back to the inode in struct pipe_inode_info, this will be use when
testing pages haven't been truncated.
Signed-off-by: Jérôme Glisse
Cc: Eric Biggers
Cc: Kees Cook
Cc: Joe Lawrence
Cc: Willy Tarreau
Cc:
From: Jérôme Glisse
For now this simply use exist page_mapping() inline. Latter it will
use buffer head pointer as a key to lookup mapping for write protected
page.
Signed-off-by: Jérôme Glisse
Cc: linux...@kvack.org
CC: Andrew Morton
Cc: Alexander Viro
Cc: linux-fsde...@vger.kernel.org
Cc: T
From: Jérôme Glisse
Add struct address_space to callback arguments of read_cache_page()
and read_cache_pages(). Note this patch only add arguments and modify
callback function signature, it does not make use of the new argument
and thus it should be regression free.
One step toward dropping reli
From: Jérôme Glisse
When page undergo io it is associated with a unique bio and thus we can
use it to lookup other page fields which are relevant only for the bio
under consideration.
Note this only apply when page is special ie page->mapping is pointing
to some special structure which is not a
A question for memory-barriers.txt aficionados.
Is there a control dependency between the prior load of 'a' and the
later store of 'c'?:
while (READ_ONCE(a));
WRITE_ONCE(c, 1);
I have my doubts because memory-barriers.txt doesn't talk much about
loops and because of what that document sa
From: Jérôme Glisse
Add struct address_space to mpage_readpage(). Note this patch only add
arguments and modify call site conservatily using page->mapping and thus
the end result is as before this patch.
One step toward dropping reliance on page->mapping.
Signed-off-by: Jérôme Glisse
Cc: Alexa
From: Jérôme Glisse
Add struct inode to block_read_full_page(). Note this patch only add
arguments and modify call site conservatily using page->mapping and
thus the end result is as before this patch.
One step toward dropping reliance on page->mapping.
Signed-off-by: Jérôme Glisse
Cc: Alexand
From: Jérôme Glisse
Add struct inode to nobh_writepage(). Note this patch only add arguments
and modify call site conservatily using page->mapping and thus the end
result is as before this patch.
One step toward dropping reliance on page->mapping.
Signed-off-by: Jérôme Glisse
Cc: Alexander Vir
From: Jérôme Glisse
Add struct address_space to fscache_read*() callback argument. Note
this patch only add arguments and modify call site conservatily using
page->mapping and thus the end result is as before this patch.
One step toward dropping reliance on page->mapping.
Signed-off-by: Jérôme
From: Jérôme Glisse
Add struct address_space to callback arguments of write_cache_pages()
Note this patch only add arguments and modify all callback functions
signature, it does not make use of the new argument and thus it should
be regression free.
One step toward dropping reliance on page->map
From: Jérôme Glisse
Add struct address_space to __block_write_begin() arguments.
One step toward dropping reliance on page->mapping.
--
identifier M;
expression E1, E2, E3, E4;
@@
struct address_space *M;
...
-__block_write_beg
From: Jérôme Glisse
This patch remove most dereference of page->mapping and get the mapping
from the call context (either already available in the function or by
adding it to function arguments).
Signed-off-by: Jérôme Glisse
Cc: Jens Axboe
CC: Andrew Morton
Cc: Alexander Viro
Cc: linux-fsde.
From: Jérôme Glisse
Simple helper to unify all truncation test to one logic. This also
unify logic that was bit different in various places.
Convertion done using following coccinelle spatch on fs and mm dir:
-
@@
struct page *
From: Jérôme Glisse
Add struct address_space to __block_write_begin_int() arguments.
One step toward dropping reliance on page->mapping.
--
@exists@
identifier M;
expression E1, E2, E3, E4, E5;
@@
struct address_space *M;
...
-
From: Jérôme Glisse
For the holy crusade to stop relying on struct page mapping field, add
struct super_block to jbd2_journal_forget() arguments.
spatch --sp-file zemantic-010a.spatch --in-place --dir fs/
--
@exists@
expression
From: Jérôme Glisse
For the holy crusade to stop relying on struct page mapping field, add
struct super_block to jbd2_journal_revoke() arguments.
spatch --sp-file zemantic-011a.spatch --in-place --dir fs/
--
@exists@
expression
On Wed, Apr 4, 2018 at 12:59 PM Greg KH wrote:
> Here is another horrible work around that was needed to get clang to
> stop generating invalid code, beaec533fc27 ("llist: clang: introduce
> member_address_is_nonnull()") That one caused a lot of odd failures by
> users, I wonder what else is lurk
From: Jérôme Glisse
A common pattern in code is that we have a buffer_head and we want to
get the first buffer_head in buffer_head list for a page. Before this
patch it was simply done with page_buffers(bh->b_page).
This patch introduce an helper bh_first_for_page(struct buffer_head *)
which can
From: Jérôme Glisse
For the holy crusade to stop relying on struct page mapping field, add
struct super_block to __bforget() arguments.
spatch --sp-file zemantic-013a.spatch --in-place --dir fs/
spatch --sp-file zemantic-013a.spatch --in-place --dir include/
--include-headers
--
From: Jérôme Glisse
For the holy crusade to stop relying on struct page mapping field, add
struct super_block to bforget() arguments.
spatch --sp-file zemantic-012a.spatch --in-place --dir fs/
--
@exists@
expression E1;
identifi
From: Jérôme Glisse
Add struct address_space to bdev_write_page() arguments.
One step toward dropping reliance on page->mapping.
Signed-off-by: Jérôme Glisse
Cc: Jens Axboe
CC: Andrew Morton
Cc: Alexander Viro
Cc: linux-fsde...@vger.kernel.org
Cc: Tejun Heo
Cc: Jan Kara
Cc: Josef Bacik
C
From: Jérôme Glisse
Add struct address_space to clean_page_buffers() arguments.
One step toward dropping reliance on page->mapping.
Signed-off-by: Jérôme Glisse
Cc: Jens Axboe
CC: Andrew Morton
Cc: Alexander Viro
Cc: linux-fsde...@vger.kernel.org
Cc: Tejun Heo
Cc: Jan Kara
Cc: Josef Bacik
From: Jérôme Glisse
Holy grail, remove all usage of mapping field of struct page inside
common fs code.
spatch --sp-file zemantic-015a.spatch --in-place fs/*.c
--
@exists@
struct page * P;
identifier I;
@@
struct address_space *
On Wed, Apr 4, 2018 at 1:41 PM, Noralf Trønnes wrote:
>
>
> Den 04.04.2018 00.42, skrev Rob Clark:
>>
>> Add an atomic helper to implement dirtyfb support. This is needed to
>> support DSI command-mode panels with x11 userspace (ie. when we can't
>> rely on pageflips to trigger a flush to the pan
From: Jérôme Glisse
For the holy crusade to stop relying on struct page mapping field, add
struct address_space and struct page to the end_io callback of buffer
head. Caller of this callback have more context information to find
the match page and mapping.
Signed-off-by: Jérôme Glisse
CC: Andre
Hi,
On 04/04/2018 11:55 AM, Cyrill Gorcunov wrote:
> ---
> kernel/sys.c | 146
> ---
> 1 file changed, 2 insertions(+), 144 deletions(-)
>
> Index: linux-ml.git/kernel/sys.c
> =
On Tue, Apr 3, 2018 at 4:01 AM, syzbot
wrote:
> Hello,
>
> syzbot hit the following crash on upstream commit
> 86bbbebac1933e6e95e8234c4f7d220c5ddd38bc (Mon Apr 2 18:47:07 2018 +)
> Merge branch 'ras-core-for-linus' of
> git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
> syzbot dashboard
From: Jérôme Glisse
The former need the address_space for which the buffer_head is being
lookup.
--
@exists@
identifier M;
expression E;
@@
struct address_space *M;
...
-page_buffers(E)
+_page_buffers(E, M)
@exists@
identifier
From: Jérôme Glisse
This patch switch mm to lookup the page index or offset value to be
against specific mapping. The page index value only have a meaning
against a mapping.
Using coccinelle:
-
@@
struct page *P;
expression E;
@
From: Jérôme Glisse
The former need the address_space for which the buffer_head is being
lookup.
--
@exists@
identifier M;
expression E;
@@
struct address_space *M;
...
-page_buffers(E)
+_page_buffers(E, M)
@exists@
identifier
From: Jérôme Glisse
Add struct swap_info_struct swap_readpage() arguments. One step toward
dropping reliance on page->private during swap read back.
Signed-off-by: Jérôme Glisse
CC: Andrew Morton
Cc: Alexander Viro
Cc: linux-fsde...@vger.kernel.org
Cc: Tejun Heo
Cc: Jan Kara
Cc: Josef Bacik
From: Jérôme Glisse
For the holy crusade to stop relying on struct page mapping field, add
struct address_space to jbd2_journal_try_to_free_buffers() arguments.
<-
@@
type T1, T2, T3;
@@
int
-jbd2_journal_try_to_free_buffers(T1
Arnd Bergmann writes:
> On Tue, Apr 3, 2018 at 10:19 PM, Robert Jarzmik
> wrote:
>> ... chop chop removing unneeded recipients
>>
>> Arnd Bergmann writes:
>>> It still feels odd to me that there is an entry in the slave map for
>>> a device that does not have a request line. However, it a
From: Jérôme Glisse
For the holy crusade to stop relying on struct page mapping field, add
struct address_space to set_page_dirty() arguments.
<-
@@
identifier I1;
type T1;
@@
int
-set_page_dirty(T1 I1)
+set_page_dirty(struct ad
From: Jérôme Glisse
For the holy crusade to stop relying on struct page mapping field, add
struct address_space to mark_buffer_dirty() arguments.
<-
@@
identifier I1;
type T1;
@@
void
-mark_buffer_dirty(T1 I1)
+mark_buffer_dirty
From: Jérôme Glisse
Set page->mapping to the page_ronly struct instead of stable_node
struct. There is no functional change as page_ronly is just a field
of stable_node.
Signed-off-by: Jérôme Glisse
Cc: Andrea Arcangeli
---
mm/ksm.c | 9 +++--
1 file changed, 7 insertions(+), 2 deletions(
From: Jérôme Glisse
Holy grail, remove all usage of mapping field of struct page inside
common fs code. This is the manual conversion patch (so much can be
done with coccinelle).
Signed-off-by: Jérôme Glisse
Cc: Alexander Viro
Cc: linux-fsde...@vger.kernel.org
Cc: Jens Axboe
Cc: Tejun Heo
Cc
From: Jérôme Glisse
For the holy crusade to stop relying on struct page mapping field, add
struct address_space to set_page_dirty_lock() arguments.
<-
@@
identifier I1;
type T1;
@@
int
-set_page_dirty_lock(T1 I1)
+set_page_dirty
From: Jérôme Glisse
Page read only is a generic framework for page write protection.
It reuses the same mechanism as KSM by using the lower bit of the
page->mapping fields, and KSM is converted to use this generic
framework.
Signed-off-by: Jérôme Glisse
Cc: Andrea Arcangeli
---
include/linux/
From: Jérôme Glisse
Pass down struct address_space to set_page_dirty() everywhere it is
already available.
<-
@exists@
expression E;
identifier F, M;
@@
F(..., struct address_space * M, ...) {
...
-set_page_dirty(NULL, E)
+set_p
From: Jérôme Glisse
Signed-off-by: Jérôme Glisse
Cc: Andrea Arcangeli
---
mm/Kconfig | 1 +
1 file changed, 1 insertion(+)
diff --git a/mm/Kconfig b/mm/Kconfig
index aeffb6e8dd21..6994a1fdf847 100644
--- a/mm/Kconfig
+++ b/mm/Kconfig
@@ -308,6 +308,7 @@ config MMU_NOTIFIER
config KSM
From: Jérôme Glisse
It's really just a config option patch.
Signed-off-by: Jérôme Glisse
Cc: Andrea Arcangeli
---
mm/Kconfig | 3 +++
1 file changed, 3 insertions(+)
diff --git a/mm/Kconfig b/mm/Kconfig
index c782e8fb7235..aeffb6e8dd21 100644
--- a/mm/Kconfig
+++ b/mm/Kconfig
@@ -149,6 +149,
On 04/04/2018 10:08 AM, Maxime Ripard wrote:
On Tue, Apr 03, 2018 at 07:24:11PM +0300, Sergey Suloev wrote:
On 04/03/2018 07:18 PM, Mark Brown wrote:
On Tue, Apr 03, 2018 at 07:00:55PM +0300, Sergey Suloev wrote:
On 04/03/2018 06:52 PM, Mark Brown wrote:
On Tue, Apr 03, 2018 at 06:29:00PM +03
From: Jérôme Glisse
Pass down the mapping ...
Signed-off-by: Jérôme Glisse
Cc: Andrew Morton
Cc: Mel Gorman
Cc: linux...@kvack.org
Cc: Alexander Viro
Cc: linux-fsde...@vger.kernel.org
---
mm/internal.h | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/mm/internal.h b/mm
201 - 300 of 917 matches
Mail list logo