public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Ingo Molnar <mingo@kernel.org>
To: Linus Torvalds <torvalds@linux-foundation.org>
Cc: linux-kernel@vger.kernel.org,
	Thomas Gleixner <tglx@linutronix.de>,
	Borislav Petkov <bp@alien8.de>,
	Peter Zijlstra <a.p.zijlstra@chello.nl>,
	Dave Hansen <dave.hansen@linux.intel.com>,
	Andy Lutomirski <luto@kernel.org>,
	Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
	Andrew Morton <akpm@linux-foundation.org>
Subject: [GIT PULL] x86/mm changes for v4.20
Date: Tue, 23 Oct 2018 14:03:40 +0200	[thread overview]
Message-ID: <20181023120340.GA38083@gmail.com> (raw)

Linus,

Please pull the latest x86-mm-for-linus git tree from:

   git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git x86-mm-for-linus

   # HEAD: 977e4be5eb714c48a67afc26a6c477f24130a1f2 x86/stackprotector: Remove the call to boot_init_stack_canary() from cpu_startup_entry()

Lots of changes in this cycle:

 - Lots of CPA optimizations and related cleanups (Thomas Gleixner, Peter Zijstra)

 - Make lazy TLB mode even lazier (Rik van Riel)

 - Fault handler cleanups and improvements (Dave Hansen)

 - kdump, vmcore: Enable kdumping encrypted memory with AMD SME enabled 
   (Lianbo Jiang)

 - Clean up VM layout documentation (Baoquan He, Ingo Molnar)

 - ... plus misc other fixes and enhancements.

Thanks,

	Ingo

================>

Baoquan He (2):
      x86/KASLR: Update KERNEL_IMAGE_SIZE description
      x86/mm/doc: Clean up the x86-64 virtual memory layout descriptions

Bjorn Helgaas (3):
      x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error
      resource: Include resource end in walk_*() interfaces
      resource: Fix find_next_iomem_res() iteration issue

Borislav Petkov (2):
      proc/vmcore: Fix i386 build error of missing copy_oldmem_page_encrypted()
      resource: Clean it up a bit

Christophe Leroy (1):
      x86/stackprotector: Remove the call to boot_init_stack_canary() from cpu_startup_entry()

Dave Hansen (9):
      x86/mm: Clarify hardware vs. software "error_code"
      x86/mm: Break out kernel address space handling
      x86/mm: Break out user address space handling
      x86/mm: Add clarifying comments for user addr space
      x86/mm: Fix exception table comments
      x86/mm: Add vsyscall address helper
      x86/mm/vsyscall: Consider vsyscall page part of user address space
      x86/mm: Remove spurious fault pkey check
      x86/mm: Kill stray kernel fault handling comment

Ingo Molnar (1):
      x86/mm/doc: Enhance the x86-64 virtual memory layout descriptions

Lianbo Jiang (4):
      x86/ioremap: Add an ioremap_encrypted() helper
      kexec: Allocate decrypted control pages for kdump if SME is enabled
      iommu/amd: Remap the IOMMU device table with the memory encryption mask for kdump
      kdump, proc/vmcore: Enable kdumping encrypted memory with SME enabled

Peter Zijlstra (9):
      x86/mm/cpa: Use flush_tlb_all()
      x86/mm/cpa: Move flush_tlb_all()
      x86/mm/cpa: Unconditionally avoid WBINDV when we can
      x86/mm/cpa: Use flush_tlb_kernel_range()
      x86/mm/cpa: Move CLFLUSH test into cpa_flush_range()
      x86/mm/cpa: Move CLFLUSH test into cpa_flush_array()
      x86/mm/cpa: Factor common code between cpa_flush_*()
      x86/mm/cpa: Optimize __cpa_flush_range()
      x86/mm: Page size aware flush_tlb_mm_range()

Rik van Riel (7):
      x86/mm/tlb: Always use lazy TLB mode
      x86/mm/tlb: Restructure switch_mm_irqs_off()
      smp: use __cpumask_set_cpu in on_each_cpu_cond
      smp,cpumask: introduce on_each_cpu_cond_mask
      x86/mm/tlb: Add freed_tables argument to flush_tlb_mm_range
      x86/mm/tlb: Add freed_tables element to flush_tlb_info
      x86/mm/tlb: Make lazy TLB mode lazier

Takuya Yamamoto (1):
      x86/mm: Fix typo in comment

Thomas Gleixner (12):
      x86/mm/init32: Mark text and rodata RO in one go
      x86/mm/cpa: Split, rename and clean up try_preserve_large_page()
      x86/mm/cpa: Rework static_protections()
      x86/mm/cpa: Allow range check for static protections
      x86/mm/cpa: Add debug mechanism
      x86/mm/cpa: Add large page preservation statistics
      x86/mm/cpa: Avoid static protection checks on unmap
      x86/mm/cpa: Add sanity check for existing mappings
      x86/mm/cpa: Optimize same protection check
      x86/mm/cpa: Do the range check early
      x86/mm/cpa: Avoid the 4k pages check completely
      x86/mm: Do not warn about PCI BIOS W+X mappings

 Documentation/x86/x86_64/mm.txt      | 171 ++++++++++++++++++++++++++++-------------
 arch/x86/Kconfig                     |   8 ++
 arch/x86/include/asm/io.h            |   3 +-
 arch/x86/include/asm/kexec.h         |   2 +-
 arch/x86/include/asm/page_64_types.h |  15 ++--
 arch/x86/include/asm/tlb.h           |  21 ++++--
 arch/x86/include/asm/tlbflush.h      |  33 +++-----
 arch/x86/kernel/crash_dump_64.c      |  60 ++++++++++-----
 arch/x86/kernel/ldt.c                |   2 +-
 arch/x86/kernel/vm86_32.c            |   2 +-
 arch/x86/mm/dump_pagetables.c        |  35 +++++++--
 arch/x86/mm/extable.c                |   2 +-
 arch/x86/mm/fault.c                  | 288 +++++++++++++++++++++++++++++++++++++++++++++------------------------
 arch/x86/mm/init_32.c                |  23 +-----
 arch/x86/mm/ioremap.c                |  24 ++++--
 arch/x86/mm/pageattr.c               | 627 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++-------------------------------------------------
 arch/x86/mm/tlb.c                    | 167 ++++++++++++++++++++++++----------------
 arch/x86/xen/smp_pv.c                |   2 +
 drivers/iommu/amd_iommu_init.c       |  14 +++-
 fs/proc/vmcore.c                     |  34 +++++++--
 include/linux/crash_dump.h           |   4 +
 include/linux/smp.h                  |   4 +
 kernel/kexec_core.c                  |   6 ++
 kernel/resource.c                    | 141 ++++++++++++++++------------------
 kernel/sched/idle.c                  |  15 ----
 kernel/sched/sched.h                 |   1 -
 kernel/smp.c                         |  19 +++--
 kernel/up.c                          |  14 +++-
 mm/pgtable-generic.c                 |   1 +
 29 files changed, 1118 insertions(+), 620 deletions(-)

                 reply	other threads:[~2018-10-23 12:03 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20181023120340.GA38083@gmail.com \
    --to=mingo@kernel.org \
    --cc=a.p.zijlstra@chello.nl \
    --cc=akpm@linux-foundation.org \
    --cc=bp@alien8.de \
    --cc=dave.hansen@linux.intel.com \
    --cc=gregkh@linuxfoundation.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=luto@kernel.org \
    --cc=tglx@linutronix.de \
    --cc=torvalds@linux-foundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox