[PATCH v4] mm: slub: move sysfs slab alloc/free interfaces to debugfs

2021-04-16 Thread Faiyaz Mohammed
alloc_calls and free_calls implementation in sysfs have two issues, one is PAGE_SIZE limitiation of sysfs and other is it does not adhere to "one value per file" rule. To overcome this issues, move the alloc_calls and free_calls implemeation to debugfs. Signed-off-by: Faiya

Re: [PATCH] mm: slub: move sysfs slab alloc/free interfaces to debugfs

2021-04-06 Thread Faiyaz Mohammed
Please ignore this patch! Thanks and regards, Mohammed Faiyaz. On 4/6/2021 5:55 PM, Faiyaz Mohammed wrote: > alloc_calls and free_calls implementation in sysfs have two issues, > one is PAGE_SIZE limitiation of sysfs and other is it does not adhere > to "one value

[PATCH v3] mm: slub: move sysfs slab alloc/free interfaces to debugfs

2021-04-06 Thread Faiyaz Mohammed
alloc_calls and free_calls implementation in sysfs have two issues, one is PAGE_SIZE limitiation of sysfs and other is it does not adhere to "one value per file" rule. To overcome this issues, move the alloc_calls and free_calls implemeation to debugfs. Signed-off-by: Faiyaz Mohamme

[PATCH] mm: slub: move sysfs slab alloc/free interfaces to debugfs

2021-04-06 Thread Faiyaz Mohammed
alloc_calls and free_calls implementation in sysfs have two issues, one is PAGE_SIZE limitiation of sysfs and other is it does not adhere to "one value per file" rule. To overcome this issues, move the alloc_calls and free_calls implemeation to debugfs. Signed-off-by: Faiyaz Mohamme

Good Day

2021-04-01 Thread Mr Mohammed Mashab
Good Day, Please accept my apologies for writing you a surprise letter.I am Mr.Mohammed Mashab, account Manager with an investment bank here in Burkina Faso.I have a very important business I want to discuss with you.There is a draft account opened in my firm by a long-time client of our bank.I

OK.........................

2021-03-17 Thread Mohammed Saad
Greetings, This is a personal email directed to you for your consideration alone. I request that it remain and be treated as such only. My name is Mr. Mohammed Saad . I have an interesting business proposal for you that will be of immense benefit to both of us, although this may be hard for you

Re: [PATCH v2] mm: slub: Convert sys slab alloc_calls, free_calls to bin attribute

2021-02-17 Thread Faiyaz Mohammed
+linux-mm, linux-kernel. On 2/17/2021 12:01 PM, Faiyaz Mohammed wrote: > Reading the sys slab alloc_calls, free_calls returns the available object > owners, but the size of this file is limited to PAGE_SIZE > because of the limitation of sysfs attributes, it is returning the > partia

Re: [PATCH] mm: slub: Convert sys slab alloc_calls, free_calls to bin attribute

2021-02-16 Thread Faiyaz Mohammed
Hi Vlastimil, On 1/13/2021 9:35 PM, Vlastimil Babka wrote: > On 1/12/21 10:21 AM, Faiyaz Mohammed wrote: >> Reading the sys slab alloc_calls, free_calls returns the available object >> owners, but the size of this file is limited to PAGE_SIZE >> because of the limitatio

Re: [PATCH] mm: slub: Convert sys slab alloc_calls, free_calls to bin attribute

2021-02-16 Thread Faiyaz Mohammed
Hi Matthew, On 1/12/2021 5:52 PM, Matthew Wilcox wrote: > On Tue, Jan 12, 2021 at 02:51:27PM +0530, Faiyaz Mohammed wrote: >> @@ -5180,6 +5187,7 @@ static int any_slab_objects(struct kmem_cache *s) >> >> struct slab_attribute { >> struct attribute attr; &

[no subject]

2021-01-26 Thread HK Mohammed Hossain
-- Dearest Friend, I have an important message for you just get back for details. Regards Mohammed Hossain

Re: [PATCH] mm: slub: Convert sys slab alloc_calls, free_calls to bin attribute

2021-01-24 Thread Faiyaz Mohammed
On 1/13/2021 9:35 PM, Vlastimil Babka wrote: > On 1/12/21 10:21 AM, Faiyaz Mohammed wrote: >> Reading the sys slab alloc_calls, free_calls returns the available object >> owners, but the size of this file is limited to PAGE_SIZE >> because of the limitation of sysfs attrib

[no subject]

2021-01-21 Thread Mohammed Hossain
-- I have an proposal for you get back for more details.

Re: [PATCH] KVM: x86: VMX: Make smaller physical guest address space support user-configurable

2021-01-18 Thread Mohammed Gamal
On Fri, 2021-01-15 at 16:08 -0800, Jim Mattson wrote: > On Thu, Sep 3, 2020 at 7:12 AM Mohammed Gamal > wrote: > > > > This patch exposes allow_smaller_maxphyaddr to the user as a module > > parameter. > > > > Since smaller physical address spaces are only

OK.........................

2021-01-15 Thread Mohammed Saad
name, and telephone number to reach you and most importantly, a confirmation of acceptance from you. Mr Mohammed Saad

Re: [PATCH] mm: slub: Convert sys slab alloc_calls, free_calls to bin attribute

2021-01-12 Thread Faiyaz Mohammed
On 1/12/2021 5:52 PM, Matthew Wilcox wrote: > On Tue, Jan 12, 2021 at 02:51:27PM +0530, Faiyaz Mohammed wrote: >> @@ -5180,6 +5187,7 @@ static int any_slab_objects(struct kmem_cache *s) >> >> struct slab_attribute { >> struct attribute attr; >> +

[no subject]

2021-01-12 Thread Mohammed Hossain
-- I have an important message for you get back for more details.

[PATCH] mm: slub: Convert sys slab alloc_calls, free_calls to bin attribute

2021-01-12 Thread Faiyaz Mohammed
is not matching with /proc/slabinfo. To remove the PAGE_SIZE limitation converted the sys slab alloc_calls, free_calls to bin attribute. Signed-off-by: Faiyaz Mohammed --- mm/slub.c | 61 +++-- 1 file changed, 47 insertions(+), 14

[PATCH v2] mm: memblock: drop __init from memblock functions to make it inline

2020-11-16 Thread Faiyaz Mohammed
start_kernel+0xa4/0x568 [0.00] memblock_reserve: [0x00023f09a3c0-0x00023f09a991] memblock_alloc_range_nid+0xc0/0x188 Signed-off-by: Faiyaz Mohammed --- include/linux/memblock.h | 18 +- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/include/linux/memblock.h b

[PATCH v2] mm: memblock: add more debug logs

2020-11-15 Thread Faiyaz Mohammed
early_pgtable_alloc+0x24/0x178 [0.00] memblock_reserve: [0x00023fc6b000-0x00023fc6bfff] memblock_alloc_range_nid+0xc0/0x188 Signed-off-by: Faiyaz Mohammed --- mm/memblock.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/mm/memblock.c b/mm/memblock.c index 049df41..f65af9f

Re: [PATCH] mm: memblock: always inline memblock_alloc

2020-11-11 Thread Faiyaz Mohammed
On 11/11/2020 12:11 AM, Mike Rapoport wrote: Hi, On Tue, Nov 10, 2020 at 05:50:17PM +0530, Faiyaz Mohammed wrote: Since memblock_alloc is not getting inlined, memblock_reserve owner info is lost. Below information is not enough for memory accounting. for example: [0.00

Re: [PATCH] mm: memblock: add more debug logs

2020-11-11 Thread Faiyaz Mohammed
On 11/10/2020 11:46 PM, Mike Rapoport wrote: Hi, On Tue, Nov 10, 2020 at 05:49:58PM +0530, Faiyaz Mohammed wrote: Exact caller of memblock_phys_alloc_range is not available with "memblock=debug". Below information is not enough for memory accounting. for example: [

[PATCH] mm: memblock: always inline memblock_alloc

2020-11-10 Thread Faiyaz Mohammed
ytes align=0x40 nid=-1 from=0x max_addr=0x start_kernel+0xa4/0x568 [0.00] memblock_reserve: [0x00023f09a3c0-0x00023f09a991] memblock_alloc_range_nid+0xc0/0x188 Signed-off-by: Faiyaz Mohammed --- include/linux/memblock.h | 2 +- 1 file changed, 1 inser

[PATCH] mm: memblock: add more debug logs

2020-11-10 Thread Faiyaz Mohammed
0.00] memblock_reserve: [0x00023fc6b000-0x00023fc6bfff] memblock_alloc_range_nid+0xc0/0x188 Signed-off-by: Faiyaz Mohammed --- mm/memblock.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/mm/memblock.c b/mm/memblock.c index 049df41..f65af9f 100644 --- a/mm/memblock.c +++ b/mm/

Re: [PATCH RESEND] hv: clocksource: Add notrace attribute to read_hv_sched_clock_*() functions

2020-10-05 Thread Mohammed Gamal
On Mon, 2020-10-05 at 13:47 +0200, Mohammed Gamal wrote: > When selecting function_graph tracer with the command: > # echo function_graph > /sys/kernel/debug/tracing/current_tracer > > The kernel crashes with the following stack trace: > > [69703.122389] BUG: sta

[PATCH RESEND] hv: clocksource: Add notrace attribute to read_hv_sched_clock_*() functions

2020-10-05 Thread Mohammed Gamal
on") Suggested-by: Vitaly Kuznetsov Signed-off-by: Mohammed Gamal --- drivers/clocksource/hyperv_timer.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/clocksource/hyperv_timer.c b/drivers/clocksource/hyperv_timer.c index 09aa44cb8a91d..ba04cb381cd3f 100644 --- a/

[PATCH] hv: clocksource: Add notrace attribute to read_hv_sched_clock_*() functions

2020-09-24 Thread Mohammed Gamal
c_cs+0x10/0x10 [69703.123068] ? sched_clock+0x5/0x10 Setting the notrace attribute for read_hv_sched_clock_msr() and read_hv_sched_clock_tsc() fixes it Fixes: bd00cd52d5be ("clocksource/drivers/hyperv: Add Hyper-V specific sched clock function") Signed-off-by: Vitaly Kuznetsov Sign

[PATCH] KVM: x86: VMX: Make smaller physical guest address space support user-configurable

2020-09-03 Thread Mohammed Gamal
is enabled. Also disable support by default, and let the user decide if they want to enable it. Signed-off-by: Mohammed Gamal --- arch/x86/kvm/vmx/vmx.c | 15 ++- arch/x86/kvm/vmx/vmx.h | 3 +++ arch/x86/kvm/x86.c | 2 +- 3 files changed, 10 insertions(+), 10 deletions(-) diff

[PATCH] staging: rtl8723bs: os_dep: fix function-name print using __func__

2020-08-12 Thread Mohammed Rushad
This patch to the os_intfs.c fixes the printing of function names using the preferred '"%s...", __func__' and alignment issues as pointed out by the checkpatch.pl tool. Signed-off-by: Mohammed Rushad --- drivers/staging/rtl8723bs/os_dep/os_intfs.c | 56 +++-- 1 file c

Hello My Dear,

2020-08-09 Thread Mrs Faiza Mohammed
Hello My Dear, Please do not feel disturbed for contacting you, based on the critical condition I find mine self though, it's not financial problem, but my health you might have know that cancer is not what to talk home about, I am married to Mr.Umair Mohammed who worked with Tunisia

[PATCH] staging: rtl8723bs: os_dep: fix brace coding style issue in sdio_intf.c

2020-08-02 Thread Mohammed Rushad
This is a patch to the sdio_intf.c file that fixes up an incorrectly placed brace found by the checkpatch.pl tool Signed-off-by: Mohammed Rushad --- drivers/staging/rtl8723bs/os_dep/sdio_intf.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/drivers/staging/rtl8723bs

[PATCH] staging: rtl8723bs: os_dep: fix coding style issue in xmit_linux.c

2020-08-02 Thread Mohammed Rushad
This is a patch to the xmit_linux.c file that fixes brace and missing line warning found by checkpatch.pl tool Signed-off-by: Mohammed Rushad --- drivers/staging/rtl8723bs/os_dep/xmit_linux.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/staging/rtl8723bs

[PATCH] Staging: rtl8192e: fix indent coding style issue in rtllib_tx.c

2020-08-02 Thread Mohammed Rushad
This is a patch to the rtllib_tx.c file that fixes fixes an improper indent found by the checkpatch.pl tool Signed-off-by: Mohammed Rushad --- drivers/staging/rtl8192e/rtllib_tx.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/staging/rtl8192e/rtllib_tx.c b/drivers

[PATCH v3 6/9] KVM: VMX: introduce vmx_need_pf_intercept

2020-07-10 Thread Mohammed Gamal
From: Paolo Bonzini Signed-off-by: Paolo Bonzini --- arch/x86/kvm/vmx/nested.c | 28 +--- arch/x86/kvm/vmx/vmx.c| 2 +- arch/x86/kvm/vmx/vmx.h| 5 + 3 files changed, 23 insertions(+), 12 deletions(-) diff --git a/arch/x86/kvm/vmx/nested.c

[PATCH v3 9/9] KVM: x86: SVM: VMX: Make GUEST_MAXPHYADDR < HOST_MAXPHYADDR support configurable

2020-07-10 Thread Mohammed Gamal
-cpu ..,phys-bits=X) CC: Tom Lendacky CC: Babu Moger Signed-off-by: Mohammed Gamal --- arch/x86/include/asm/kvm_host.h | 2 +- arch/x86/kvm/svm/svm.c | 15 +++ arch/x86/kvm/vmx/vmx.c | 7 +++ arch/x86/kvm/x86.c | 6 ++ include/uapi/linux/kvm.

[PATCH v3 4/9] KVM: x86: rename update_bp_intercept to update_exception_bitmap

2020-07-10 Thread Mohammed Gamal
From: Paolo Bonzini We would like to introduce a callback to update the #PF intercept when CPUID changes. Just reuse update_bp_intercept since VMX is already using update_exception_bitmap instead of a bespoke function. While at it, remove an unnecessary assignment in the SVM version, which is

[PATCH v3 8/9] KVM: VMX: optimize #PF injection when MAXPHYADDR does not match

2020-07-10 Thread Mohammed Gamal
From: Paolo Bonzini Ignore non-present page faults, since those cannot have reserved bits set. When running access.flat with "-cpu Haswell,phys-bits=36", the number of trapped page faults goes down from 8872644 to 3978948. Signed-off-by: Paolo Bonzini --- arch/x86/kvm/vmx/vmx.c | 10

[PATCH v3 7/9] KVM: VMX: Add guest physical address check in EPT violation and misconfig

2020-07-10 Thread Mohammed Gamal
. On a supervisor-mode access, the EPT violation path would trigger. However, on a user-mode access, the processor will not notice the reserved bit and not include PFERR_RSVD_MASK in the error code. Co-developed-by: Mohammed Gamal Signed-off-by: Paolo Bonzini --- arch/x86/kvm/vmx/vmx.c | 24

[PATCH v3 3/9] KVM: x86: mmu: Add guest physical address check in translate_gpa()

2020-07-10 Thread Mohammed Gamal
physical memory and if it's exceeded, we need to add the PFERR_RSVD_MASK bits to the PF's error code. Also make sure the error code isn't overwritten by the page table walker. Signed-off-by: Mohammed Gamal Signed-off-by: Paolo Bonzini --- arch/x86/kvm/mmu/mmu.c | 6 ++ 1 file changed, 6 insertions

[PATCH v3 1/9] KVM: x86: Add helper functions for illegal GPA checking and page fault injection

2020-07-10 Thread Mohammed Gamal
-by: Mohammed Gamal Signed-off-by: Paolo Bonzini --- arch/x86/kvm/mmu.h | 6 ++ arch/x86/kvm/x86.c | 21 + arch/x86/kvm/x86.h | 1 + 3 files changed, 28 insertions(+) diff --git a/arch/x86/kvm/mmu.h b/arch/x86/kvm/mmu.h index 444bb9c54548..59930231d5d5 100644 --- a/arch

[PATCH v3 0/9] KVM: Support guest MAXPHYADDR < host MAXPHYADDR

2020-07-10 Thread Mohammed Gamal
PFERR_RSVD_MASK error code to the page fault if needed. Changes from v2: - Drop support for this feature on AMD processors after discussion with AMD Mohammed Gamal (5): KVM: x86: Add helper functions for illegal GPA checking and page fault injection KVM: x86: mmu: Move translate_gpa() to mmu.c

[PATCH v3 5/9] KVM: x86: update exception bitmap on CPUID changes

2020-07-10 Thread Mohammed Gamal
From: Paolo Bonzini Allow vendor code to observe changes to MAXPHYADDR and start/stop intercepting page faults. Signed-off-by: Paolo Bonzini --- arch/x86/kvm/cpuid.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c index

[PATCH v3 2/9] KVM: x86: mmu: Move translate_gpa() to mmu.c

2020-07-10 Thread Mohammed Gamal
Also no point of it being inline since it's always called through function pointers. So remove that. Signed-off-by: Mohammed Gamal Signed-off-by: Paolo Bonzini --- arch/x86/include/asm/kvm_host.h | 6 -- arch/x86/kvm/mmu/mmu.c | 6 ++ 2 files changed, 6 insertions(+), 6

greetings

2020-07-07 Thread Hamza Mohammed
COMPENSATION PAYMENT THROUGH ATM VISA CARD Attn: Beneficiaries This is to officially inform you that we have verified your inheritance file fund presently on my desk, and I found out that you have not received your payment due to your lack of co-operation and not fulfilling the obligations

Re: [PATCH v2 00/11] KVM: Support guest MAXPHYADDR < host MAXPHYADDR

2020-06-22 Thread Mohammed Gamal
On Fri, 2020-06-19 at 16:52 -0500, Tom Lendacky wrote: > On 6/19/20 10:39 AM, Mohammed Gamal wrote: > > When EPT/NPT is enabled, KVM does not really look at guest physical > > address size. Address bits above maximum physical memory size are > > reserved. > >

Re: [PATCH v2 01/11] KVM: x86: Add helper functions for illegal GPA checking and page fault injection

2020-06-22 Thread Mohammed Gamal
On Mon, 2020-06-22 at 12:44 +0800, Yuan Yao wrote: > On Fri, Jun 19, 2020 at 05:39:15PM +0200, Mohammed Gamal wrote: > > This patch adds two helper functions that will be used to support > > virtualizing > > MAXPHYADDR in both kvm-intel.ko and kvm.ko. > > > &

[PATCH v2 00/11] KVM: Support guest MAXPHYADDR < host MAXPHYADDR

2020-06-19 Thread Mohammed Gamal
), and thus we are proposing a workaround (see last patch) that adds a capability that userspace can use to decide who to deal with hosts that might have issues supprting guest MAXPHYADDR < host MAXPHYADDR. Mohammed Gamal (7): KVM: x86: Add helper functions for illegal GPA checking and page fa

[PATCH v2 01/11] KVM: x86: Add helper functions for illegal GPA checking and page fault injection

2020-06-19 Thread Mohammed Gamal
-by: Mohammed Gamal Signed-off-by: Paolo Bonzini --- arch/x86/kvm/mmu.h | 6 ++ arch/x86/kvm/x86.c | 21 + arch/x86/kvm/x86.h | 1 + 3 files changed, 28 insertions(+) diff --git a/arch/x86/kvm/mmu.h b/arch/x86/kvm/mmu.h index 0ad06bfe2c2c..555237dfb91c 100644 --- a/arch

[PATCH v2 03/11] KVM: x86: mmu: Add guest physical address check in translate_gpa()

2020-06-19 Thread Mohammed Gamal
physical memory and if it's exceeded, we need to add the PFERR_RSVD_MASK bits to the PF's error code. Also make sure the error code isn't overwritten by the page table walker. Signed-off-by: Mohammed Gamal Signed-off-by: Paolo Bonzini --- arch/x86/kvm/mmu/mmu.c | 6 ++ 1 file changed, 6 insertions

[PATCH v2 04/11] KVM: x86: rename update_bp_intercept to update_exception_bitmap

2020-06-19 Thread Mohammed Gamal
From: Paolo Bonzini We would like to introduce a callback to update the #PF intercept when CPUID changes. Just reuse update_bp_intercept since VMX is already using update_exception_bitmap instead of a bespoke function. While at it, remove an unnecessary assignment in the SVM version, which is

[PATCH v2 02/11] KVM: x86: mmu: Move translate_gpa() to mmu.c

2020-06-19 Thread Mohammed Gamal
Also no point of it being inline since it's always called through function pointers. So remove that. Signed-off-by: Mohammed Gamal Signed-off-by: Paolo Bonzini --- arch/x86/include/asm/kvm_host.h | 6 -- arch/x86/kvm/mmu/mmu.c | 6 ++ 2 files changed, 6 insertions(+), 6

[PATCH v2 06/11] KVM: VMX: introduce vmx_need_pf_intercept

2020-06-19 Thread Mohammed Gamal
From: Paolo Bonzini Signed-off-by: Paolo Bonzini --- arch/x86/kvm/vmx/nested.c | 28 +--- arch/x86/kvm/vmx/vmx.c| 2 +- arch/x86/kvm/vmx/vmx.h| 5 + 3 files changed, 23 insertions(+), 12 deletions(-) diff --git a/arch/x86/kvm/vmx/nested.c

[PATCH v2 09/11] KVM: SVM: introduce svm_need_pf_intercept

2020-06-19 Thread Mohammed Gamal
CC: Tom Lendacky CC: Babu Moger Signed-off-by: Mohammed Gamal --- arch/x86/kvm/svm/svm.c | 8 arch/x86/kvm/svm/svm.h | 6 ++ 2 files changed, 14 insertions(+) diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c index 94108e6cc6da..05412818027d 100644 --- a/arch/x86/kvm

[PATCH v2 11/11] KVM: x86: SVM: VMX: Make GUEST_MAXPHYADDR < HOST_MAXPHYADDR support configurable

2020-06-19 Thread Mohammed Gamal
-cpu ..,phys-bits=X) CC: Tom Lendacky CC: Babu Moger Signed-off-by: Mohammed Gamal --- arch/x86/include/asm/kvm_host.h | 2 +- arch/x86/kvm/svm/svm.c | 15 +++ arch/x86/kvm/vmx/vmx.c | 7 +++ arch/x86/kvm/x86.c | 6 ++ include/uapi/linux/kvm.

[PATCH v2 10/11] KVM: SVM: Add guest physical address check in NPF/PF interception

2020-06-19 Thread Mohammed Gamal
a reserved bit set. On a supervisor-mode access, the EPT violation path would trigger. However, on a user-mode access, the processor will not notice the reserved bit and not include PFERR_RSVD_MASK in the error code. CC: Tom Lendacky CC: Babu Moger Signed-off-by: Mohammed Gamal --- arch/x86/kvm/svm

[PATCH v2 07/11] KVM: VMX: Add guest physical address check in EPT violation and misconfig

2020-06-19 Thread Mohammed Gamal
. On a supervisor-mode access, the EPT violation path would trigger. However, on a user-mode access, the processor will not notice the reserved bit and not include PFERR_RSVD_MASK in the error code. Co-developed-by: Mohammed Gamal Signed-off-by: Paolo Bonzini --- arch/x86/kvm/vmx/vmx.c | 24

[PATCH v2 05/11] KVM: x86: update exception bitmap on CPUID changes

2020-06-19 Thread Mohammed Gamal
From: Paolo Bonzini Allow vendor code to observe changes to MAXPHYADDR and start/stop intercepting page faults. Signed-off-by: Paolo Bonzini --- arch/x86/kvm/cpuid.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/x86/kvm/cpuid.c b/arch/x86/kvm/cpuid.c index

[PATCH v2 08/11] KVM: VMX: optimize #PF injection when MAXPHYADDR does not match

2020-06-19 Thread Mohammed Gamal
From: Paolo Bonzini Ignore non-present page faults, since those cannot have reserved bits set. When running access.flat with "-cpu Haswell,phys-bits=36", the number of trapped page faults goes down from 8872644 to 3978948. Signed-off-by: Paolo Bonzini --- arch/x86/kvm/vmx/vmx.c | 10

Re: ARM: vmsplit 4g/4g

2020-06-15 Thread afzal mohammed
Hi Linus, On Mon, Jun 15, 2020 at 11:11:04AM +0200, Linus Walleij wrote: > OK I would be very happy to look at it so I can learn a bit about the > hands-on and general approach here. Just send it to this address > directly and I will look! Have sent it > > For the next 3 weeks, right now, i

Re: [RFC 1/3] lib: copy_{from,to}_user using gup & kmap_atomic()

2020-06-14 Thread afzal mohammed
Hi, On Sun, Jun 14, 2020 at 06:51:43PM +0530, afzal mohammed wrote: > It is MB/s for copying one file to another via user space buffer, i.e. > the value coreutils 'dd' shows w/ status=progress (here it was busybox > 'dd', so instead it was enabling a compile time option) Just for co

Re: [RFC 1/3] lib: copy_{from,to}_user using gup & kmap_atomic()

2020-06-14 Thread afzal mohammed
Hi, On Sat, Jun 13, 2020 at 10:45:33PM +0200, Arnd Bergmann wrote: > 4% boot time increase sounds like a lot, especially if that is only for > copy_from_user/copy_to_user. In the end it really depends on how well > get_user()/put_user() and small copies can be optimized in the end. i mentioned

Re: [RFC 1/3] lib: copy_{from,to}_user using gup & kmap_atomic()

2020-06-14 Thread afzal mohammed
Hi, On Sat, Jun 13, 2020 at 02:15:52PM +0100, Russell King - ARM Linux admin wrote: > On Sat, Jun 13, 2020 at 05:34:32PM +0530, afzal mohammed wrote: > > i think C > > library cuts any size read, write to page size (if it exceeds) & > > invokes the system call. > Yo

Re: [RFC 1/3] lib: copy_{from,to}_user using gup & kmap_atomic()

2020-06-13 Thread afzal mohammed
Hi, On Sat, Jun 13, 2020 at 01:56:15PM +0100, Al Viro wrote: > Incidentally, what about get_user()/put_user()? _That_ is where it's > going to really hurt... All other uaccess routines are also planned to be added, posting only copy_{from,to}_user() was to get early feedback (mentioned in the

Re: [RFC 1/3] lib: copy_{from,to}_user using gup & kmap_atomic()

2020-06-13 Thread afzal mohammed
Hi, On Sat, Jun 13, 2020 at 02:08:11PM +0300, Andy Shevchenko wrote: > On Fri, Jun 12, 2020 at 1:20 PM afzal mohammed > wrote: > > +// Started from arch/um/kernel/skas/uaccess.c > > Does it mean you will deduplicate it there? What i meant was, that file was taken as a templ

Re: [RFC 1/3] lib: copy_{from,to}_user using gup & kmap_atomic()

2020-06-13 Thread afzal mohammed
Hi, On Fri, Jun 12, 2020 at 10:07:28PM +0200, Arnd Bergmann wrote: > I think a lot > of usercopy calls are only for a few bytes, though this is of course > highly workload dependent and you might only care about the large > ones. Observation is that max. pages reaching copy_{from,to}_user() is

Re: [RFC 0/3] ARM: copy_{from,to}_user() for vmsplit 4g/4g

2020-06-12 Thread afzal mohammed
Hi, On Fri, Jun 12, 2020 at 09:31:12PM +0530, afzal mohammed wrote: > 512 1K 4K 16K 32K 64K 1M > > normal 30 46 89 95 90 85 65 > > uaccess_w_memcpy 28.545 85 92 91 85 65

Re: [RFC 0/3] ARM: copy_{from,to}_user() for vmsplit 4g/4g

2020-06-12 Thread afzal mohammed
Hi, On Fri, Jun 12, 2020 at 11:19:23AM -0400, Nicolas Pitre wrote: > On Fri, 12 Jun 2020, afzal mohammed wrote: > > Performance wise, results are not encouraging, 'dd' on tmpfs results, > Could you compare with CONFIG_UACCESS_WITH_MEMCPY as well? 512 1K

Re: [RFC 1/3] lib: copy_{from,to}_user using gup & kmap_atomic()

2020-06-12 Thread afzal mohammed
Hi, On Fri, Jun 12, 2020 at 02:02:13PM +0200, Arnd Bergmann wrote: > On Fri, Jun 12, 2020 at 12:18 PM afzal mohammed > wrote: > > Roughly a one-third drop in performance. Disabling highmem improves > > performance only slightly. > There are probably some things that ca

Re: ARM: vmsplit 4g/4g

2020-06-12 Thread afzal mohammed
Hi, On Wed, Jun 10, 2020 at 12:10:21PM +0200, Linus Walleij wrote: > On Mon, Jun 8, 2020 at 1:09 PM afzal mohammed wrote: > > Not yet. Yes, i will do the performance evaluation. > > > > i am also worried about the impact on performance as these > > [ get_user_page

[RFC 3/3] ARM: provide CONFIG_VMSPLIT_4G_DEV for development

2020-06-12 Thread afzal mohammed
Select UACCESS_GUP_KMAP_MEMCPY initially. Signed-off-by: afzal mohammed --- arch/arm/Kconfig | 9 + 1 file changed, 9 insertions(+) diff --git a/arch/arm/Kconfig b/arch/arm/Kconfig index c77c93c485a08..ae2687679d7c8 100644 --- a/arch/arm/Kconfig +++ b/arch/arm/Kconfig @@ -1326,6

[RFC 1/3] lib: copy_{from,to}_user using gup & kmap_atomic()

2020-06-12 Thread afzal mohammed
[1] https://lore.kernel.org/lkml/Pine.LNX.4.44.0307082332450.17252-10@localhost.localdomain/ Signed-off-by: afzal mohammed --- lib/Kconfig | 4 + lib/Makefile | 3 + lib/uaccess_gup_kmap_memcpy.c | 162 ++ 3 files changed, 16

[RFC 2/3] ARM: uaccess: let UACCESS_GUP_KMAP_MEMCPY enabling

2020-06-12 Thread afzal mohammed
Turn off existing raw_copy_{from,to}_user() using arm_copy_{from,to}_user() when CONFIG_UACCESS_GUP_KMAP_MEMCPY is enabled. Signed-off-by: afzal mohammed --- arch/arm/include/asm/uaccess.h | 20 arch/arm/kernel/armksyms.c | 2 ++ arch/arm/lib/Makefile | 7

[RFC 0/3] ARM: copy_{from,to}_user() for vmsplit 4g/4g

2020-06-12 Thread afzal mohammed
patch. Regards afzal afzal mohammed (3): lib: copy_{from,to}_user using gup & kmap_atomic() ARM: uaccess: let UACCESS_GUP_KMAP_MEMCPY enabling ARM: provide CONFIG_VMSPLIT_4G_DEV for development arch/arm/Kconfig | 9 ++ arch/arm/include/asm/uaccess.h | 20 arch/ar

Re: ARM: vmsplit 4g/4g

2020-06-09 Thread afzal mohammed
Hi, On Mon, Jun 08, 2020 at 08:47:27PM +0530, afzal mohammed wrote: > On Mon, Jun 08, 2020 at 04:43:57PM +0200, Arnd Bergmann wrote: > > There is another difference: get_user_pages_fast() does not return > > a vm_area_struct pointer, which is where you would check the access >

Re: ARM: vmsplit 4g/4g

2020-06-08 Thread afzal mohammed
Hi, On Mon, Jun 08, 2020 at 04:43:57PM +0200, Arnd Bergmann wrote: > There is another difference: get_user_pages_fast() does not return > a vm_area_struct pointer, which is where you would check the access > permissions. I suppose those pointers could not be returned to callers > that don't

Re: ARM: vmsplit 4g/4g

2020-06-08 Thread afzal mohammed
Hi, On Sun, Jun 07, 2020 at 09:26:26PM +0200, Arnd Bergmann wrote: > I think you have to use get_user_pages() though instead of > get_user_pages_fast(), > in order to be able to check the permission bits to prevent doing a > copy_to_user() > into read-only mappings. i was not aware of this, is

Re: ARM: vmsplit 4g/4g

2020-06-08 Thread afzal mohammed
zal mohammed wrote: > > get_user_pages_fast() followed by kmap_atomic() & then memcpy() seems > > to work in principle for user copy. > > Have you done any performance evaluation of the changes yet? I think > it would be a good idea to keep that in the picture. If there's

ARM: vmsplit 4g/4g

2020-06-07 Thread afzal mohammed
Hi, On Sat, May 16, 2020 at 09:35:57AM +0200, Arnd Bergmann wrote: > On Sat, May 16, 2020 at 8:06 AM afzal mohammed > wrote: > > Okay, so the conclusion i take is, > > 1. VMSPLIT 4G/4G have to live alongside highmem > > 2. For user space copy, do pinning followed

Re: ARM: static kernel in vmalloc space

2020-05-16 Thread afzal mohammed
Hi, On Thu, May 14, 2020 at 05:32:41PM +0200, Arnd Bergmann wrote: > Typical distros currently offer two kernels, with and without LPAE, > and they probably don't want to add a third one for LPAE with > either highmem or vmsplit-4g-4g. Having extra user address > space and more lowmem is both

Re: ARM: static kernel in vmalloc space

2020-05-14 Thread afzal mohammed
Hi, On Thu, May 14, 2020 at 07:05:45PM +0530, afzal mohammed wrote: > So if we make VMSPLIT_4G_4G, depends on !HIGH_MEMORY (w/ mention of > caveat in Kconfig help that this is meant for platforms w/ <=4GB), then > we can do copy_{from,to}_user the same way currently do, and no

Re: ARM: static kernel in vmalloc space

2020-05-14 Thread afzal mohammed
Hi, On Thu, May 14, 2020 at 02:41:11PM +0200, Arnd Bergmann wrote: > On Thu, May 14, 2020 at 1:18 PM afzal mohammed > wrote: > > 1. SoC w/ LPAE > > 2. TTBR1 (top 256MB) for static kernel, modules, io mappings, vmalloc, > > kmap, fixmap & vectors > R

Re: ARM: static kernel in vmalloc space

2020-05-14 Thread afzal mohammed
Hi, On Tue, May 12, 2020 at 09:49:59PM +0200, Arnd Bergmann wrote: > Any idea which bit you want to try next? My plan has been to next post patches for the static kernel migration to vmalloc space (currently the code is rigid, taking easy route wherever possible & not of high quality) as that

Re: ARM: static kernel in vmalloc space

2020-05-12 Thread afzal mohammed
Hi, On Mon, May 11, 2020 at 05:29:29PM +0200, Arnd Bergmann wrote: > What do you currently do with the module address space? In the current setup, module address space was untouched, i.e. virtual address difference b/n text & module space is far greater than 32MB, at least > (2+768+16)MB and

ARM: static kernel in vmalloc space (was Re: [PATCH 0/3] Highmem support for 32-bit RISC-V)

2020-05-11 Thread afzal mohammed
Hi, Kernel now boots to prompt w/ static kernel mapping moved to vmalloc space. Changes currently done have a couple of platform specific things, this has to be modified to make it multiplatform friendly (also to be taken care is ARM_PATCH_PHYS_VIRT case). Module address space has to be taken

Re: [PATCH] ARM: omap1: fix irq setup

2020-05-05 Thread afzal mohammed
P: replace setup_irq() by request_irq()") > Signed-off-by: Arnd Bergmann Sorry for the mistake and thanks for the fix, Acked-by: afzal mohammed Regards afzal

Re: [PATCH 0/3] Highmem support for 32-bit RISC-V

2020-05-04 Thread afzal mohammed
[ +linux-arm-kernel Context: This is regarding VMSPLIT_4G_4G support for 32-bit ARM as a possible replacement to highmem. For that, initially, it is being attempted to move static kernel mapping from lowmem to vmalloc space. in next reply, i will remove everyone/list !ARM related ] Hi,

Re: [PATCH 0/3] Highmem support for 32-bit RISC-V

2020-05-03 Thread afzal mohammed
Hi Arnd, > On Tue, Apr 14, 2020 at 09:29:46PM +0200, Arnd Bergmann wrote: > > Another thing to try early is to move the vmlinux virtual address > > from the linear mapping into vmalloc space. This does not require > > LPAE either, but it only works on relatively modern platforms that > > don't

Re: CONGRATULATION ONCE AGAIN

2019-08-24 Thread Mrs.Amina Jane Mohammed
Nations Democracy Fund grants,therefore, contact her immediately with these informations as required above. Congratulations once again. Mrs.Amina Jane Mohammed Deputy Secretary-General of the United Nations.

Dear Friend,

2019-07-16 Thread Salif Mohammed
details that you need for us to proceed. Sincerely, Salif Mohammed. Senior Auditor Dubai Islamic Bank, Abu Dhabi, U.A.E my email [ mohmm54...@gmail.com ]

Hello....

2019-07-01 Thread Edith Mohammed
Date: Mon, 1 Jul 2019 10:16:36 + Subject: Hello <>

Re: [PATCH] hyper-v: Check for ring buffer in hv_get_bytes_to_read/write

2019-03-13 Thread Mohammed Gamal
On Tue, 2019-03-12 at 18:02 +, Haiyang Zhang wrote: >   >   > > -Original Message- > > From: Mohammed Gamal > > Sent: Thursday, March 7, 2019 1:32 PM > > To: Michael Kelley ; linux-hyp...@vger.kern > el.org; > > kimbrownkd > > Cc: Sas

Re: [PATCH] hyper-v: Check for ring buffer in hv_get_bytes_to_read/write

2019-03-07 Thread Mohammed Gamal
On Thu, 2019-03-07 at 17:33 +, Michael Kelley wrote: > From: Mohammed Gamal Sent: Thursday, March 7, > 2019 8:36 AM > > > > This patch adds a check for the presence of the ring buffer in > > hv_get_bytes_to_read/write() to avoid possible NULL pointer > > derefe

[PATCH] hyper-v: Check for ring buffer in hv_get_bytes_to_read/write

2019-03-07 Thread Mohammed Gamal
hv_get_bytes_to_read/write() could be vulnerable to the race condition discussed in https://lkml.org/lkml/2018/10/18/779 This race is being addressed by the patch series by Kimberly Brown in https://lkml.org/lkml/2019/2/21/1236 which is not final yet Signed-off-by: Mohammed Gamal --- include/linux/hyperv.h | 6

Dear,

2018-12-07 Thread Mohammed Rouhani
your reply I shall give you the details and procedures of this transaction, waiting your reply. Regards, Mohammed Rouhani

Dear,

2018-12-07 Thread Mohammed Rouhani
your reply I shall give you the details and procedures of this transaction, waiting your reply. Regards, Mohammed Rouhani

Urgent Respond Needed

2018-11-14 Thread Ibrahim Mohammed
I need am Honest Person to support and your cooperation with me in business of $26,700,000.00 thanks.

Urgent Respond Needed

2018-11-14 Thread Ibrahim Mohammed
I need am Honest Person to support and your cooperation with me in business of $26,700,000.00 thanks.

Dear,

2018-10-15 Thread Mohammed Rouhani
your reply I shall give you the details and procedures of this transaction, waiting your reply. Regards, Mohammed Rouhani

Dear,

2018-10-15 Thread Mohammed Rouhani
your reply I shall give you the details and procedures of this transaction, waiting your reply. Regards, Mohammed Rouhani

Dear,

2018-10-06 Thread Mohammed Rouhani
your reply I shall give you the details and procedures of this transaction, waiting your reply. Regards, Mohammed Rouhani

Dear,

2018-10-06 Thread Mohammed Rouhani
your reply I shall give you the details and procedures of this transaction, waiting your reply. Regards, Mohammed Rouhani

  1   2   3   4   5   6   7   8   9   10   >