Skip to content
  1. Feb 15, 2023
    • Paolo Bonzini's avatar
      Documentation/hw-vuln: Fix rST warning · 971cecb9
      Paolo Bonzini authored
      
      
      The following warning:
      
         Documentation/admin-guide/hw-vuln/cross-thread-rsb.rst:92: ERROR: Unexpected indentation.
      
      was introduced by commit 493a2c2d.  Fix it by placing everything in
      the same paragraph and also use a monospace font.
      
      Fixes: 493a2c2d ("Documentation/hw-vuln: Add documentation for Cross-Thread Return Predictions")
      Reported-by: Stephen Rothwell <sfr@canb@auug.org.au>
      Signed-off-by: default avatarPaolo Bonzini <pbonzini@redhat.com>
      971cecb9
  2. Feb 10, 2023
  3. Feb 09, 2023
  4. Feb 02, 2023
  5. Feb 01, 2023
    • Michal Hocko's avatar
      Revert "mm: add nodes= arg to memory.reclaim" · 55ab834a
      Michal Hocko authored
      This reverts commit 12a5d395.
      
      Although it is recognized that a finer grained pro-active reclaim is
      something we need and want the semantic of this implementation is really
      ambiguous.
      
      In a follow up discussion it became clear that there are two essential
      usecases here.  One is to use memory.reclaim to pro-actively reclaim
      memory and expectation is that the requested and reported amount of memory
      is uncharged from the memcg.  Another usecase focuses on pro-active
      demotion when the memory is merely shuffled around to demotion targets
      while the overall charged memory stays unchanged.
      
      The current implementation considers demoted pages as reclaimed and that
      break both usecases.  [1] has tried to address the reporting part but
      there are more issues with that summarized in [2] and follow up emails.
      
      Let's revert the nodemask based extension of the memcg pro-active
      reclaim for now until we settle with a more robust semantic.
      
      [1] http://lkml.kernel.org/r/http://lkml.kernel.org/r/20221206023406.3182800-1-almasrymina@google.com
      [2] http://lkml.kernel.org/r/Y5bsmpCyeryu3Zz1@dhcp22.suse.cz
      
      Link: https://lkml.kernel.org/r/Y5xASNe1x8cusiTx@dhcp22.suse.cz
      
      
      Fixes: 12a5d395 ("mm: add nodes= arg to memory.reclaim")
      Signed-off-by: default avatarMichal Hocko <mhocko@suse.com>
      Cc: Bagas Sanjaya <bagasdotme@gmail.com>
      Cc: Huang Ying <ying.huang@intel.com>
      Cc: Johannes Weiner <hannes@cmpxchg.org>
      Cc: Jonathan Corbet <corbet@lwn.net>
      Cc: Mina Almasry <almasrymina@google.com>
      Cc: Muchun Song <songmuchun@bytedance.com>
      Cc: Roman Gushchin <roman.gushchin@linux.dev>
      Cc: Shakeel Butt <shakeelb@google.com>
      Cc: Tejun Heo <tj@kernel.org>
      Cc: Wei Xu <weixugc@google.com>
      Cc: Yang Shi <yang.shi@linux.alibaba.com>
      Cc: Yosry Ahmed <yosryahmed@google.com>
      Cc: zefan li <lizefan.x@bytedance.com>
      Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
      55ab834a
  6. Jan 29, 2023
  7. Jan 28, 2023
    • Linus Torvalds's avatar
      Fix up more non-executable files marked executable · c9661827
      Linus Torvalds authored
      
      
      Joe found another DT file that shouldn't be executable, and that
      frustrated me enough that I went hunting with this script:
      
          git ls-files -s |
              grep '^100755' |
              cut -f2 |
              xargs grep -L '^#!'
      
      and that found another file that shouldn't have been marked executable
      either, despite being in the scripts directory.
      
      Maybe these two are the last ones at least for now.  But I'm sure we'll
      be back in a few years, fixing things up again.
      
      Fixes: 8c6789f4 ("ASoC: dt-bindings: Add Everest ES8326 audio CODEC")
      Fixes: 4d8e5cd2 ("locking/atomics: Fix scripts/atomic/ script permissions")
      Reported-by: default avatarJoe Perches <joe@perches.com>
      Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
      c9661827
  8. Jan 27, 2023
  9. Jan 26, 2023
  10. Jan 24, 2023
    • Sriram Yagnaraman's avatar
      netfilter: conntrack: unify established states for SCTP paths · a44b7651
      Sriram Yagnaraman authored
      
      
      An SCTP endpoint can start an association through a path and tear it
      down over another one. That means the initial path will not see the
      shutdown sequence, and the conntrack entry will remain in ESTABLISHED
      state for 5 days.
      
      By merging the HEARTBEAT_ACKED and ESTABLISHED states into one
      ESTABLISHED state, there remains no difference between a primary or
      secondary path. The timeout for the merged ESTABLISHED state is set to
      210 seconds (hb_interval * max_path_retrans + rto_max). So, even if a
      path doesn't see the shutdown sequence, it will expire in a reasonable
      amount of time.
      
      With this change in place, there is now more than one state from which
      we can transition to ESTABLISHED, COOKIE_ECHOED and HEARTBEAT_SENT, so
      handle the setting of ASSURED bit whenever a state change has happened
      and the new state is ESTABLISHED. Removed the check for dir==REPLY since
      the transition to ESTABLISHED can happen only in the reply direction.
      
      Fixes: 9fb9cbb1 ("[NETFILTER]: Add nf_conntrack subsystem.")
      Signed-off-by: default avatarSriram Yagnaraman <sriram.yagnaraman@est.tech>
      Signed-off-by: default avatarPablo Neira Ayuso <pablo@netfilter.org>
      a44b7651
  11. Jan 20, 2023
  12. Jan 19, 2023
    • Nikunj A Dadhania's avatar
      x86/sev: Add SEV-SNP guest feature negotiation support · 8c29f016
      Nikunj A Dadhania authored
      The hypervisor can enable various new features (SEV_FEATURES[1:63]) and start a
      SNP guest. Some of these features need guest side implementation. If any of
      these features are enabled without it, the behavior of the SNP guest will be
      undefined.  It may fail booting in a non-obvious way making it difficult to
      debug.
      
      Instead of allowing the guest to continue and have it fail randomly later,
      detect this early and fail gracefully.
      
      The SEV_STATUS MSR indicates features which the hypervisor has enabled.  While
      booting, SNP guests should ascertain that all the enabled features have guest
      side implementation. In case a feature is not implemented in the guest, the
      guest terminates booting with GHCB protocol Non-Automatic Exit(NAE) termination
      request event, see "SEV-ES Guest-Hypervisor Communication Block Standardization"
      document (currently at https://developer.amd.com/wp-content/resources/56421.pdf
      
      ),
      section "Termination Request".
      
      Populate SW_EXITINFO2 with mask of unsupported features that the hypervisor can
      easily report to the user.
      
      More details in the AMD64 APM Vol 2, Section "SEV_STATUS MSR".
      
        [ bp:
          - Massage.
          - Move snp_check_features() call to C code.
          Note: the CC:stable@ aspect here is to be able to protect older, stable
          kernels when running on newer hypervisors. Or not "running" but fail
          reliably and in a well-defined manner instead of randomly. ]
      
      Fixes: cbd3d4f7 ("x86/sev: Check SEV-SNP features support")
      Signed-off-by: default avatarNikunj A Dadhania <nikunj@amd.com>
      Signed-off-by: default avatarBorislav Petkov (AMD) <bp@alien8.de>
      Reviewed-by: default avatarTom Lendacky <thomas.lendacky@amd.com>
      Cc: <stable@kernel.org>
      Link: https://lore.kernel.org/r/20230118061943.534309-1-nikunj@amd.com
      8c29f016
  13. Jan 18, 2023
  14. Jan 16, 2023
  15. Jan 13, 2023
  16. Jan 12, 2023
  17. Jan 11, 2023
  18. Jan 09, 2023
  19. Jan 08, 2023
  20. Jan 07, 2023
  21. Jan 06, 2023
  22. Jan 05, 2023
Loading