From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
To: linux-kernel@vger.kernel.org
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
stable@vger.kernel.org,
"Peter Zijlstra (Intel)" <peterz@infradead.org>,
Thomas Gleixner <tglx@linutronix.de>,
Andy Lutomirski <luto@kernel.org>,
Boris Ostrovsky <boris.ostrovsky@oracle.com>,
Borislav Petkov <bp@alien8.de>, Brian Gerst <brgerst@gmail.com>,
Dave Hansen <dave.hansen@linux.intel.com>,
David Laight <David.Laight@aculab.com>,
Denys Vlasenko <dvlasenk@redhat.com>,
Eduardo Valentin <eduval@amazon.com>,
"H. Peter Anvin" <hpa@zytor.com>,
Josh Poimboeuf <jpoimboe@redhat.com>,
Juergen Gross <jgross@suse.com>,
Linus Torvalds <torvalds@linux-foundation.org>,
Will Deacon <will.deacon@arm.com>,
aliguori@amazon.com, daniel.gruss@iaik.tugraz.at,
hughd@google.com, keescook@google.com,
Ingo Molnar <mingo@kernel.org>
Subject: [PATCH 4.14 026/146] x86/mm: Use/Fix PCID to optimize user/kernel switches
Date: Mon, 1 Jan 2018 15:36:57 +0100 [thread overview]
Message-ID: <20180101140127.611381099@linuxfoundation.org> (raw)
In-Reply-To: <20180101140123.743014891@linuxfoundation.org>
4.14-stable review patch. If anyone has any objections, please let me know.
------------------
From: Peter Zijlstra <peterz@infradead.org>
commit 6fd166aae78c0ab738d49bda653cbd9e3b1491cf upstream.
We can use PCID to retain the TLBs across CR3 switches; including those now
part of the user/kernel switch. This increases performance of kernel
entry/exit at the cost of more expensive/complicated TLB flushing.
Now that we have two address spaces, one for kernel and one for user space,
we need two PCIDs per mm. We use the top PCID bit to indicate a user PCID
(just like we use the PFN LSB for the PGD). Since we do TLB invalidation
from kernel space, the existing code will only invalidate the kernel PCID,
we augment that by marking the corresponding user PCID invalid, and upon
switching back to userspace, use a flushing CR3 write for the switch.
In order to access the user_pcid_flush_mask we use PER_CPU storage, which
means the previously established SWAPGS vs CR3 ordering is now mandatory
and required.
Having to do this memory access does require additional registers, most
sites have a functioning stack and we can spill one (RAX), sites without
functional stack need to otherwise provide the second scratch register.
Note: PCID is generally available on Intel Sandybridge and later CPUs.
Note: Up until this point TLB flushing was broken in this series.
Based-on-code-from: Dave Hansen <dave.hansen@linux.intel.com>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Boris Ostrovsky <boris.ostrovsky@oracle.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Brian Gerst <brgerst@gmail.com>
Cc: Dave Hansen <dave.hansen@linux.intel.com>
Cc: David Laight <David.Laight@aculab.com>
Cc: Denys Vlasenko <dvlasenk@redhat.com>
Cc: Eduardo Valentin <eduval@amazon.com>
Cc: Greg KH <gregkh@linuxfoundation.org>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Josh Poimboeuf <jpoimboe@redhat.com>
Cc: Juergen Gross <jgross@suse.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Will Deacon <will.deacon@arm.com>
Cc: aliguori@amazon.com
Cc: daniel.gruss@iaik.tugraz.at
Cc: hughd@google.com
Cc: keescook@google.com
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
---
arch/x86/entry/calling.h | 72 ++++++++++++++++++----
arch/x86/entry/entry_64.S | 9 +-
arch/x86/entry/entry_64_compat.S | 4 -
arch/x86/include/asm/processor-flags.h | 5 +
arch/x86/include/asm/tlbflush.h | 91 ++++++++++++++++++++++++----
arch/x86/include/uapi/asm/processor-flags.h | 7 +-
arch/x86/kernel/asm-offsets.c | 4 +
arch/x86/mm/init.c | 2
arch/x86/mm/tlb.c | 1
9 files changed, 162 insertions(+), 33 deletions(-)
--- a/arch/x86/entry/calling.h
+++ b/arch/x86/entry/calling.h
@@ -3,6 +3,9 @@
#include <asm/unwind_hints.h>
#include <asm/cpufeatures.h>
#include <asm/page_types.h>
+#include <asm/percpu.h>
+#include <asm/asm-offsets.h>
+#include <asm/processor-flags.h>
/*
@@ -191,17 +194,21 @@ For 32-bit we have the following convent
#ifdef CONFIG_PAGE_TABLE_ISOLATION
-/* PAGE_TABLE_ISOLATION PGDs are 8k. Flip bit 12 to switch between the two halves: */
-#define PTI_SWITCH_MASK (1<<PAGE_SHIFT)
+/*
+ * PAGE_TABLE_ISOLATION PGDs are 8k. Flip bit 12 to switch between the two
+ * halves:
+ */
+#define PTI_SWITCH_PGTABLES_MASK (1<<PAGE_SHIFT)
+#define PTI_SWITCH_MASK (PTI_SWITCH_PGTABLES_MASK|(1<<X86_CR3_PTI_SWITCH_BIT))
-.macro ADJUST_KERNEL_CR3 reg:req
- /* Clear "PAGE_TABLE_ISOLATION bit", point CR3 at kernel pagetables: */
- andq $(~PTI_SWITCH_MASK), \reg
+.macro SET_NOFLUSH_BIT reg:req
+ bts $X86_CR3_PCID_NOFLUSH_BIT, \reg
.endm
-.macro ADJUST_USER_CR3 reg:req
- /* Move CR3 up a page to the user page tables: */
- orq $(PTI_SWITCH_MASK), \reg
+.macro ADJUST_KERNEL_CR3 reg:req
+ ALTERNATIVE "", "SET_NOFLUSH_BIT \reg", X86_FEATURE_PCID
+ /* Clear PCID and "PAGE_TABLE_ISOLATION bit", point CR3 at kernel pagetables: */
+ andq $(~PTI_SWITCH_MASK), \reg
.endm
.macro SWITCH_TO_KERNEL_CR3 scratch_reg:req
@@ -212,21 +219,58 @@ For 32-bit we have the following convent
.Lend_\@:
.endm
-.macro SWITCH_TO_USER_CR3 scratch_reg:req
+#define THIS_CPU_user_pcid_flush_mask \
+ PER_CPU_VAR(cpu_tlbstate) + TLB_STATE_user_pcid_flush_mask
+
+.macro SWITCH_TO_USER_CR3_NOSTACK scratch_reg:req scratch_reg2:req
ALTERNATIVE "jmp .Lend_\@", "", X86_FEATURE_PTI
mov %cr3, \scratch_reg
- ADJUST_USER_CR3 \scratch_reg
+
+ ALTERNATIVE "jmp .Lwrcr3_\@", "", X86_FEATURE_PCID
+
+ /*
+ * Test if the ASID needs a flush.
+ */
+ movq \scratch_reg, \scratch_reg2
+ andq $(0x7FF), \scratch_reg /* mask ASID */
+ bt \scratch_reg, THIS_CPU_user_pcid_flush_mask
+ jnc .Lnoflush_\@
+
+ /* Flush needed, clear the bit */
+ btr \scratch_reg, THIS_CPU_user_pcid_flush_mask
+ movq \scratch_reg2, \scratch_reg
+ jmp .Lwrcr3_\@
+
+.Lnoflush_\@:
+ movq \scratch_reg2, \scratch_reg
+ SET_NOFLUSH_BIT \scratch_reg
+
+.Lwrcr3_\@:
+ /* Flip the PGD and ASID to the user version */
+ orq $(PTI_SWITCH_MASK), \scratch_reg
mov \scratch_reg, %cr3
.Lend_\@:
.endm
+.macro SWITCH_TO_USER_CR3_STACK scratch_reg:req
+ pushq %rax
+ SWITCH_TO_USER_CR3_NOSTACK scratch_reg=\scratch_reg scratch_reg2=%rax
+ popq %rax
+.endm
+
.macro SAVE_AND_SWITCH_TO_KERNEL_CR3 scratch_reg:req save_reg:req
ALTERNATIVE "jmp .Ldone_\@", "", X86_FEATURE_PTI
movq %cr3, \scratch_reg
movq \scratch_reg, \save_reg
/*
- * Is the switch bit zero? This means the address is
- * up in real PAGE_TABLE_ISOLATION patches in a moment.
+ * Is the "switch mask" all zero? That means that both of
+ * these are zero:
+ *
+ * 1. The user/kernel PCID bit, and
+ * 2. The user/kernel "bit" that points CR3 to the
+ * bottom half of the 8k PGD
+ *
+ * That indicates a kernel CR3 value, not a user CR3.
*/
testq $(PTI_SWITCH_MASK), \scratch_reg
jz .Ldone_\@
@@ -251,7 +295,9 @@ For 32-bit we have the following convent
.macro SWITCH_TO_KERNEL_CR3 scratch_reg:req
.endm
-.macro SWITCH_TO_USER_CR3 scratch_reg:req
+.macro SWITCH_TO_USER_CR3_NOSTACK scratch_reg:req scratch_reg2:req
+.endm
+.macro SWITCH_TO_USER_CR3_STACK scratch_reg:req
.endm
.macro SAVE_AND_SWITCH_TO_KERNEL_CR3 scratch_reg:req save_reg:req
.endm
--- a/arch/x86/entry/entry_64.S
+++ b/arch/x86/entry/entry_64.S
@@ -23,7 +23,6 @@
#include <asm/segment.h>
#include <asm/cache.h>
#include <asm/errno.h>
-#include "calling.h"
#include <asm/asm-offsets.h>
#include <asm/msr.h>
#include <asm/unistd.h>
@@ -40,6 +39,8 @@
#include <asm/frame.h>
#include <linux/err.h>
+#include "calling.h"
+
.code64
.section .entry.text, "ax"
@@ -406,7 +407,7 @@ syscall_return_via_sysret:
* We are on the trampoline stack. All regs except RDI are live.
* We can do future final exit work right here.
*/
- SWITCH_TO_USER_CR3 scratch_reg=%rdi
+ SWITCH_TO_USER_CR3_STACK scratch_reg=%rdi
popq %rdi
popq %rsp
@@ -744,7 +745,7 @@ GLOBAL(swapgs_restore_regs_and_return_to
* We can do future final exit work right here.
*/
- SWITCH_TO_USER_CR3 scratch_reg=%rdi
+ SWITCH_TO_USER_CR3_STACK scratch_reg=%rdi
/* Restore RDI. */
popq %rdi
@@ -857,7 +858,7 @@ native_irq_return_ldt:
*/
orq PER_CPU_VAR(espfix_stack), %rax
- SWITCH_TO_USER_CR3 scratch_reg=%rdi /* to user CR3 */
+ SWITCH_TO_USER_CR3_STACK scratch_reg=%rdi
SWAPGS /* to user GS */
popq %rdi /* Restore user RDI */
--- a/arch/x86/entry/entry_64_compat.S
+++ b/arch/x86/entry/entry_64_compat.S
@@ -275,9 +275,9 @@ sysret32_from_system_call:
* switch until after after the last reference to the process
* stack.
*
- * %r8 is zeroed before the sysret, thus safe to clobber.
+ * %r8/%r9 are zeroed before the sysret, thus safe to clobber.
*/
- SWITCH_TO_USER_CR3 scratch_reg=%r8
+ SWITCH_TO_USER_CR3_NOSTACK scratch_reg=%r8 scratch_reg2=%r9
xorq %r8, %r8
xorq %r9, %r9
--- a/arch/x86/include/asm/processor-flags.h
+++ b/arch/x86/include/asm/processor-flags.h
@@ -38,6 +38,11 @@
#define CR3_ADDR_MASK __sme_clr(0x7FFFFFFFFFFFF000ull)
#define CR3_PCID_MASK 0xFFFull
#define CR3_NOFLUSH BIT_ULL(63)
+
+#ifdef CONFIG_PAGE_TABLE_ISOLATION
+# define X86_CR3_PTI_SWITCH_BIT 11
+#endif
+
#else
/*
* CR3_ADDR_MASK needs at least bits 31:5 set on PAE systems, and we save
--- a/arch/x86/include/asm/tlbflush.h
+++ b/arch/x86/include/asm/tlbflush.h
@@ -10,6 +10,8 @@
#include <asm/special_insns.h>
#include <asm/smp.h>
#include <asm/invpcid.h>
+#include <asm/pti.h>
+#include <asm/processor-flags.h>
static inline u64 inc_mm_tlb_gen(struct mm_struct *mm)
{
@@ -24,24 +26,54 @@ static inline u64 inc_mm_tlb_gen(struct
/* There are 12 bits of space for ASIDS in CR3 */
#define CR3_HW_ASID_BITS 12
+
/*
* When enabled, PAGE_TABLE_ISOLATION consumes a single bit for
* user/kernel switches
*/
-#define PTI_CONSUMED_ASID_BITS 0
+#ifdef CONFIG_PAGE_TABLE_ISOLATION
+# define PTI_CONSUMED_PCID_BITS 1
+#else
+# define PTI_CONSUMED_PCID_BITS 0
+#endif
+
+#define CR3_AVAIL_PCID_BITS (X86_CR3_PCID_BITS - PTI_CONSUMED_PCID_BITS)
-#define CR3_AVAIL_ASID_BITS (CR3_HW_ASID_BITS - PTI_CONSUMED_ASID_BITS)
/*
* ASIDs are zero-based: 0->MAX_AVAIL_ASID are valid. -1 below to account
* for them being zero-based. Another -1 is because ASID 0 is reserved for
* use by non-PCID-aware users.
*/
-#define MAX_ASID_AVAILABLE ((1 << CR3_AVAIL_ASID_BITS) - 2)
+#define MAX_ASID_AVAILABLE ((1 << CR3_AVAIL_PCID_BITS) - 2)
+
+/*
+ * 6 because 6 should be plenty and struct tlb_state will fit in two cache
+ * lines.
+ */
+#define TLB_NR_DYN_ASIDS 6
static inline u16 kern_pcid(u16 asid)
{
VM_WARN_ON_ONCE(asid > MAX_ASID_AVAILABLE);
+
+#ifdef CONFIG_PAGE_TABLE_ISOLATION
/*
+ * Make sure that the dynamic ASID space does not confict with the
+ * bit we are using to switch between user and kernel ASIDs.
+ */
+ BUILD_BUG_ON(TLB_NR_DYN_ASIDS >= (1 << X86_CR3_PTI_SWITCH_BIT));
+
+ /*
+ * The ASID being passed in here should have respected the
+ * MAX_ASID_AVAILABLE and thus never have the switch bit set.
+ */
+ VM_WARN_ON_ONCE(asid & (1 << X86_CR3_PTI_SWITCH_BIT));
+#endif
+ /*
+ * The dynamically-assigned ASIDs that get passed in are small
+ * (<TLB_NR_DYN_ASIDS). They never have the high switch bit set,
+ * so do not bother to clear it.
+ *
* If PCID is on, ASID-aware code paths put the ASID+1 into the
* PCID bits. This serves two purposes. It prevents a nasty
* situation in which PCID-unaware code saves CR3, loads some other
@@ -95,12 +127,6 @@ static inline bool tlb_defer_switch_to_i
return !static_cpu_has(X86_FEATURE_PCID);
}
-/*
- * 6 because 6 should be plenty and struct tlb_state will fit in
- * two cache lines.
- */
-#define TLB_NR_DYN_ASIDS 6
-
struct tlb_context {
u64 ctx_id;
u64 tlb_gen;
@@ -146,6 +172,13 @@ struct tlb_state {
bool invalidate_other;
/*
+ * Mask that contains TLB_NR_DYN_ASIDS+1 bits to indicate
+ * the corresponding user PCID needs a flush next time we
+ * switch to it; see SWITCH_TO_USER_CR3.
+ */
+ unsigned short user_pcid_flush_mask;
+
+ /*
* Access to this CR4 shadow and to H/W CR4 is protected by
* disabling interrupts when modifying either one.
*/
@@ -250,14 +283,41 @@ static inline void cr4_set_bits_and_upda
extern void initialize_tlbstate_and_flush(void);
/*
+ * Given an ASID, flush the corresponding user ASID. We can delay this
+ * until the next time we switch to it.
+ *
+ * See SWITCH_TO_USER_CR3.
+ */
+static inline void invalidate_user_asid(u16 asid)
+{
+ /* There is no user ASID if address space separation is off */
+ if (!IS_ENABLED(CONFIG_PAGE_TABLE_ISOLATION))
+ return;
+
+ /*
+ * We only have a single ASID if PCID is off and the CR3
+ * write will have flushed it.
+ */
+ if (!cpu_feature_enabled(X86_FEATURE_PCID))
+ return;
+
+ if (!static_cpu_has(X86_FEATURE_PTI))
+ return;
+
+ __set_bit(kern_pcid(asid),
+ (unsigned long *)this_cpu_ptr(&cpu_tlbstate.user_pcid_flush_mask));
+}
+
+/*
* flush the entire current user mapping
*/
static inline void __native_flush_tlb(void)
{
+ invalidate_user_asid(this_cpu_read(cpu_tlbstate.loaded_mm_asid));
/*
- * If current->mm == NULL then we borrow a mm which may change during a
- * task switch and therefore we must not be preempted while we write CR3
- * back:
+ * If current->mm == NULL then we borrow a mm which may change
+ * during a task switch and therefore we must not be preempted
+ * while we write CR3 back:
*/
preempt_disable();
native_write_cr3(__native_read_cr3());
@@ -301,7 +361,14 @@ static inline void __native_flush_tlb_gl
*/
static inline void __native_flush_tlb_single(unsigned long addr)
{
+ u32 loaded_mm_asid = this_cpu_read(cpu_tlbstate.loaded_mm_asid);
+
asm volatile("invlpg (%0)" ::"r" (addr) : "memory");
+
+ if (!static_cpu_has(X86_FEATURE_PTI))
+ return;
+
+ invalidate_user_asid(loaded_mm_asid);
}
/*
--- a/arch/x86/include/uapi/asm/processor-flags.h
+++ b/arch/x86/include/uapi/asm/processor-flags.h
@@ -78,7 +78,12 @@
#define X86_CR3_PWT _BITUL(X86_CR3_PWT_BIT)
#define X86_CR3_PCD_BIT 4 /* Page Cache Disable */
#define X86_CR3_PCD _BITUL(X86_CR3_PCD_BIT)
-#define X86_CR3_PCID_MASK _AC(0x00000fff,UL) /* PCID Mask */
+
+#define X86_CR3_PCID_BITS 12
+#define X86_CR3_PCID_MASK (_AC((1UL << X86_CR3_PCID_BITS) - 1, UL))
+
+#define X86_CR3_PCID_NOFLUSH_BIT 63 /* Preserve old PCID */
+#define X86_CR3_PCID_NOFLUSH _BITULL(X86_CR3_PCID_NOFLUSH_BIT)
/*
* Intel CPU features in CR4
--- a/arch/x86/kernel/asm-offsets.c
+++ b/arch/x86/kernel/asm-offsets.c
@@ -17,6 +17,7 @@
#include <asm/sigframe.h>
#include <asm/bootparam.h>
#include <asm/suspend.h>
+#include <asm/tlbflush.h>
#ifdef CONFIG_XEN
#include <xen/interface/xen.h>
@@ -94,6 +95,9 @@ void common(void) {
BLANK();
DEFINE(PTREGS_SIZE, sizeof(struct pt_regs));
+ /* TLB state for the entry code */
+ OFFSET(TLB_STATE_user_pcid_flush_mask, tlb_state, user_pcid_flush_mask);
+
/* Layout info for cpu_entry_area */
OFFSET(CPU_ENTRY_AREA_tss, cpu_entry_area, tss);
OFFSET(CPU_ENTRY_AREA_entry_trampoline, cpu_entry_area, entry_trampoline);
--- a/arch/x86/mm/init.c
+++ b/arch/x86/mm/init.c
@@ -855,7 +855,7 @@ void __init zone_sizes_init(void)
free_area_init_nodes(max_zone_pfns);
}
-DEFINE_PER_CPU_SHARED_ALIGNED(struct tlb_state, cpu_tlbstate) = {
+__visible DEFINE_PER_CPU_SHARED_ALIGNED(struct tlb_state, cpu_tlbstate) = {
.loaded_mm = &init_mm,
.next_asid = 1,
.cr4 = ~0UL, /* fail hard if we screw up cr4 shadow initialization */
--- a/arch/x86/mm/tlb.c
+++ b/arch/x86/mm/tlb.c
@@ -105,6 +105,7 @@ static void load_new_mm_cr3(pgd_t *pgdir
unsigned long new_mm_cr3;
if (need_flush) {
+ invalidate_user_asid(new_asid);
new_mm_cr3 = build_cr3(pgdir, new_asid);
} else {
new_mm_cr3 = build_cr3_noflush(pgdir, new_asid);
next prev parent reply other threads:[~2018-01-01 14:36 UTC|newest]
Thread overview: 147+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-01-01 14:36 [PATCH 4.14 000/146] 4.14.11-stable review Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 001/146] tracing: Remove extra zeroing out of the ring buffer page Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 002/146] tracing: Fix possible double free on failure of allocating trace buffer Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 003/146] tracing: Fix crash when it fails to alloc ring buffer Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 004/146] x86/cpufeatures: Add X86_BUG_CPU_INSECURE Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 005/146] x86/mm/pti: Disable global pages if PAGE_TABLE_ISOLATION=y Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 006/146] x86/mm/pti: Prepare the x86/entry assembly code for entry/exit CR3 switching Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 007/146] x86/mm/pti: Add infrastructure for page table isolation Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 008/146] x86/pti: Add the pti= cmdline option and documentation Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 009/146] x86/mm/pti: Add mapping helper functions Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 010/146] x86/mm/pti: Allow NX poison to be set in p4d/pgd Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 011/146] x86/mm/pti: Allocate a separate user PGD Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 012/146] x86/mm/pti: Populate " Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 013/146] x86/mm/pti: Add functions to clone kernel PMDs Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 014/146] x86/mm/pti: Force entry through trampoline when PTI active Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 015/146] x86/mm/pti: Share cpu_entry_area with user space page tables Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 016/146] x86/entry: Align entry text section to PMD boundary Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 017/146] x86/mm/pti: Share entry text PMD Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 018/146] x86/mm/pti: Map ESPFIX into user space Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 019/146] x86/cpu_entry_area: Add debugstore entries to cpu_entry_area Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 020/146] x86/events/intel/ds: Map debug buffers in cpu_entry_area Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 021/146] x86/mm/64: Make a full PGD-entry size hole in the memory map Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 022/146] x86/pti: Put the LDT in its own PGD if PTI is on Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 023/146] x86/pti: Map the vsyscall page if needed Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 024/146] x86/mm: Allow flushing for future ASID switches Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 025/146] x86/mm: Abstract switching CR3 Greg Kroah-Hartman
2018-01-01 14:36 ` Greg Kroah-Hartman [this message]
2018-01-01 14:36 ` [PATCH 4.14 027/146] x86/mm: Optimize RESTORE_CR3 Greg Kroah-Hartman
2018-01-01 14:36 ` [PATCH 4.14 028/146] x86/mm: Use INVPCID for __native_flush_tlb_single() Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 029/146] x86/mm: Clarify the whole ASID/kernel PCID/user PCID naming Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 030/146] x86/dumpstack: Indicate in Oops whether PTI is configured and enabled Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 031/146] x86/mm/pti: Add Kconfig Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 032/146] x86/mm/dump_pagetables: Add page table directory to the debugfs VFS hierarchy Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 033/146] x86/mm/dump_pagetables: Check user space page table for WX pages Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 034/146] x86/mm/dump_pagetables: Allow dumping current pagetables Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 035/146] x86/ldt: Make the LDT mapping RO Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 036/146] ring-buffer: Mask out the info bits when returning buffer page length Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 037/146] ring-buffer: Do no reuse reader page if still in use Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 038/146] iw_cxgb4: Only validate the MSN for successful completions Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 039/146] ASoC: codecs: msm8916-wcd: Fix supported formats Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 040/146] ASoC: wm_adsp: Fix validation of firmware and coeff lengths Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 041/146] ASoC: da7218: fix fix child-node lookup Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 042/146] ASoC: fsl_ssi: AC97 ops need regmap, clock and cleaning up on failure Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 043/146] ASoC: twl4030: fix child-node lookup Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 044/146] ASoC: tlv320aic31xx: Fix GPIO1 register definition Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 045/146] gpio: fix "gpio-line-names" property retrieval Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 046/146] IB/hfi: Only read capability registers if the capability exists Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 047/146] IB/mlx5: Serialize access to the VMA list Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 048/146] IB/uverbs: Fix command checking as part of ib_uverbs_ex_modify_qp() Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 049/146] IB/core: Verify that QP is security enabled in create and destroy Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 050/146] ALSA: hda: Drop useless WARN_ON() Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 051/146] ALSA: hda - Add MIC_NO_PRESENCE fixup for 2 HP machines Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 052/146] ALSA: hda - change the location for one mic on a Lenovo machine Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 053/146] ALSA: hda - fix headset mic detection issue on a Dell machine Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 054/146] ALSA: hda - Fix missing COEF init for ALC225/295/299 Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 055/146] cpufreq: schedutil: Use idle_calls counter of the remote CPU Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 056/146] block: fix blk_rq_append_bio Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 057/146] block: dont let passthrough IO go into .make_request_fn() Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 060/146] ipv6: mcast: better catch silly mtu values Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 061/146] net: fec: unmap the xmit buffer that are not transferred by DMA Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 062/146] net: igmp: Use correct source address on IGMPv3 reports Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 063/146] netlink: Add netns check on taps Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 065/146] net: reevalulate autoflowlabel setting after sysctl setting Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 066/146] ptr_ring: add barriers Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 067/146] RDS: Check cmsg_len before dereferencing CMSG_DATA Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 068/146] tcp_bbr: record "full bw reached" decision in new full_bw_reached bit Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 069/146] tcp md5sig: Use skbs saddr when replying to an incoming segment Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 070/146] tg3: Fix rx hang on MTU change with 5717/5719 Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 071/146] tcp_bbr: reset full pipe detection on loss recovery undo Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 072/146] tcp_bbr: reset long-term bandwidth sampling " Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 073/146] s390/qeth: apply takeover changes when mode is toggled Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 074/146] s390/qeth: dont apply takeover changes to RXIP Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 075/146] s390/qeth: lock IP table while applying takeover changes Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 076/146] s390/qeth: update takeover IPs after configuration change Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 077/146] net: ipv4: fix for a race condition in raw_sendmsg Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 078/146] net: mvmdio: disable/unprepare clocks in EPROBE_DEFER case Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 079/146] sctp: Replace use of sockets_allocated with specified macro Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 080/146] adding missing rcu_read_unlock in ipxip6_rcv Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 081/146] ip6_gre: fix device features for ioctl setup Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 082/146] ipv4: Fix use-after-free when flushing FIB tables Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 083/146] net: bridge: fix early call to br_stp_change_bridge_id and plug newlink leaks Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 084/146] net: Fix double free and memory corruption in get_net_ns_by_id() Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 085/146] net: phy: micrel: ksz9031: reconfigure autoneg after phy autoneg workaround Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 086/146] sock: free skb in skb_complete_tx_timestamp on error Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 087/146] tcp: invalidate rate samples during SACK reneging Greg Kroah-Hartman
2018-01-01 14:37 ` [PATCH 4.14 088/146] net/mlx5: Fix rate limit packet pacing naming and struct Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 089/146] net/mlx5e: Fix possible deadlock of VXLAN lock Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 090/146] net/mlx5e: Fix features check of IPv6 traffic Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 091/146] net/mlx5e: Add refcount to VXLAN structure Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 092/146] net/mlx5e: Prevent possible races in VXLAN control flow Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 093/146] net/mlx5: Fix error flow in CREATE_QP command Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 094/146] openvswitch: Fix pop_vlan action for double tagged frames Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 095/146] sfc: pass valid pointers from efx_enqueue_unwind Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 096/146] net: dsa: bcm_sf2: Clear IDDQ_GLOBAL_PWR bit for PHY Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 097/146] s390/qeth: fix error handling in checksum cmd callback Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 098/146] sctp: make sure stream nums can match optlen in sctp_setsockopt_reset_streams Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 099/146] tipc: fix hanging poll() for stream sockets Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 100/146] mlxsw: spectrum: Disable MAC learning for ovs port Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 101/146] tcp: fix potential underestimation on rcv_rtt Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 102/146] net: phy: marvell: Limit 88m1101 autoneg errata to 88E1145 as well Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 103/146] ipv6: Honor specified parameters in fibmatch lookup Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 104/146] tcp: refresh tcp_mstamp from timers callbacks Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 105/146] net/mlx5: FPGA, return -EINVAL if size is zero Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 106/146] vxlan: restore dev->mtu setting based on lower device Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 107/146] net: sched: fix static key imbalance in case of ingress/clsact_init error Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 108/146] bnxt_en: Fix sources of spurious netpoll warnings Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 109/146] phylink: ensure the PHY interface mode is appropriately set Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 110/146] phylink: ensure AN is enabled Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 111/146] ipv4: fib: Fix metrics match when deleting a route Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 112/146] ipv6: set all.accept_dad to 0 by default Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 113/146] Revert "mlx5: move affinity hints assignments to generic code" Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 114/146] skbuff: orphan frags before zerocopy clone Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 115/146] skbuff: skb_copy_ubufs must release uarg even without user frags Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 116/146] skbuff: in skb_copy_ubufs unclone before releasing zerocopy Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 117/146] [PATCH] sparc64: repair calling incorrect hweight function from stubs Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 118/146] usbip: fix usbip bind writing random string after command in match_busid Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 119/146] usbip: prevent leaking socket pointer address in messages Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 120/146] usbip: stub: stop printing kernel pointer addresses " Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 121/146] usbip: vhci: " Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 122/146] USB: chipidea: msm: fix ulpi-node lookup Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 123/146] USB: serial: ftdi_sio: add id for Airbus DS P8GR Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 125/146] USB: serial: option: add support for Telit ME910 PID 0x1101 Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 127/146] usb: Add device quirk for Logitech HD Pro Webcam C925e Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 128/146] usb: add RESET_RESUME for ELSA MicroLink 56K Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 129/146] USB: Fix off by one in type-specific length check of BOS SSP capability Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 130/146] usb: xhci: Add XHCI_TRUST_TX_LENGTH for Renesas uPD720201 Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 131/146] timers: Use deferrable base independent of base::nohz_active Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 132/146] timers: Invoke timer_start_debug() where it makes sense Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 133/146] timers: Reinitialize per cpu bases on hotplug Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 134/146] binder: fix proc->files use-after-free Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 135/146] phy: tegra: fix device-tree node lookups Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 136/146] drivers: base: cacheinfo: fix cache type for non-architected system cache Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 137/146] staging: android: ion: Fix dma direction for dma_sync_sg_for_cpu/device Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 138/146] nohz: Prevent a timer interrupt storm in tick_nohz_stop_sched_tick() Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 139/146] x86/smpboot: Remove stale TLB flush invocations Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 140/146] x86/mm: Remove preempt_disable/enable() from __native_flush_tlb() Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 141/146] x86-32: Fix kexec with stack canary (CONFIG_CC_STACKPROTECTOR) Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 142/146] x86/espfix/64: Fix espfix double-fault handling on 5-level systems Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 143/146] x86/ldt: Plug memory leak in error path Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 144/146] x86/ldt: Make LDT pgtable free conditional Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 145/146] n_tty: fix EXTPROC vs ICANON interaction with TIOCINQ (aka FIONREAD) Greg Kroah-Hartman
2018-01-01 14:38 ` [PATCH 4.14 146/146] tty: fix tty_ldisc_receive_buf() documentation Greg Kroah-Hartman
2018-01-01 20:28 ` [PATCH 4.14 000/146] 4.14.11-stable review Naresh Kamboju
2018-01-02 8:56 ` Greg Kroah-Hartman
2018-01-02 17:40 ` Guenter Roeck
2018-01-02 22:34 ` Shuah Khan
2018-01-03 10:00 ` Greg Kroah-Hartman
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20180101140127.611381099@linuxfoundation.org \
--to=gregkh@linuxfoundation.org \
--cc=David.Laight@aculab.com \
--cc=aliguori@amazon.com \
--cc=boris.ostrovsky@oracle.com \
--cc=bp@alien8.de \
--cc=brgerst@gmail.com \
--cc=daniel.gruss@iaik.tugraz.at \
--cc=dave.hansen@linux.intel.com \
--cc=dvlasenk@redhat.com \
--cc=eduval@amazon.com \
--cc=hpa@zytor.com \
--cc=hughd@google.com \
--cc=jgross@suse.com \
--cc=jpoimboe@redhat.com \
--cc=keescook@google.com \
--cc=linux-kernel@vger.kernel.org \
--cc=luto@kernel.org \
--cc=mingo@kernel.org \
--cc=peterz@infradead.org \
--cc=stable@vger.kernel.org \
--cc=tglx@linutronix.de \
--cc=torvalds@linux-foundation.org \
--cc=will.deacon@arm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).