1. 31 7月, 2018 2 次提交
  2. 30 7月, 2018 8 次提交
  3. 17 5月, 2018 1 次提交
  4. 24 1月, 2018 1 次提交
  5. 23 1月, 2018 1 次提交
  6. 16 1月, 2018 1 次提交
    • D
      s390x/mm: cleanup gmap_pte_op_walk() · 96965941
      David Hildenbrand 提交于
      gmap_mprotect_notify() refuses shadow gmaps. Turns out that
      a) gmap_protect_range()
      b) gmap_read_table()
      c) gmap_pte_op_walk()
      
      Are never called for gmap shadows. And never should be. This dates back
      to gmap shadow prototypes where we allowed to call mprotect_notify() on
      the gmap shadow (to get notified about the prefix pages getting removed).
      This is avoided by always getting notified about any change on the gmap
      shadow.
      
      The only real function for walking page tables on shadow gmaps is
      gmap_table_walk().
      
      So, essentially, these functions should never get called and
      gmap_pte_op_walk() can be cleaned up. Add some checks to callers of
      gmap_pte_op_walk().
      Signed-off-by: NDavid Hildenbrand <david@redhat.com>
      Message-Id: <20171110151805.7541-1-david@redhat.com>
      Reviewed-by: NJanosch Frank <frankja@linux.vnet.ibm.com>
      Acked-by: NCornelia Huck <cohuck@redhat.com>
      Signed-off-by: NChristian Borntraeger <borntraeger@de.ibm.com>
      96965941
  7. 24 11月, 2017 1 次提交
    • G
      s390: mm: add SPDX identifiers to the remaining files · ac41aaee
      Greg Kroah-Hartman 提交于
      It's good to have SPDX identifiers in all files to make it easier to
      audit the kernel tree for correct licenses.
      
      Update the arch/s390/mm/ files with the correct SPDX license
      identifier based on the license text in the file itself.  The SPDX
      identifier is a legally binding shorthand, which can be used instead of
      the full boiler plate text.
      
      This work is based on a script and data from Thomas Gleixner, Philippe
      Ombredanne, and Kate Stewart.
      
      Cc: Martin Schwidefsky <schwidefsky@de.ibm.com>
      Cc: Heiko Carstens <heiko.carstens@de.ibm.com>
      Cc: Christian Borntraeger <borntraeger@de.ibm.com>
      Cc: Cornelia Huck <cohuck@redhat.com>
      Cc: Thomas Gleixner <tglx@linutronix.de>
      Cc: Kate Stewart <kstewart@linuxfoundation.org>
      Cc: Philippe Ombredanne <pombredanne@nexb.com>
      Signed-off-by: NGreg Kroah-Hartman <gregkh@linuxfoundation.org>
      Signed-off-by: NMartin Schwidefsky <schwidefsky@de.ibm.com>
      ac41aaee
  8. 15 11月, 2017 1 次提交
  9. 06 9月, 2017 1 次提交
  10. 29 8月, 2017 1 次提交
    • C
      s390/mm: avoid empty zero pages for KVM guests to avoid postcopy hangs · fa41ba0d
      Christian Borntraeger 提交于
      Right now there is a potential hang situation for postcopy migrations,
      if the guest is enabling storage keys on the target system during the
      postcopy process.
      
      For storage key virtualization, we have to forbid the empty zero page as
      the storage key is a property of the physical page frame.  As we enable
      storage key handling lazily we then drop all mappings for empty zero
      pages for lazy refaulting later on.
      
      This does not work with the postcopy migration, which relies on the
      empty zero page never triggering a fault again in the future. The reason
      is that postcopy migration will simply read a page on the target system
      if that page is a known zero page to fault in an empty zero page.  At
      the same time postcopy remembers that this page was already transferred
      - so any future userfault on that page will NOT be retransmitted again
      to avoid races.
      
      If now the guest enters the storage key mode while in postcopy, we will
      break this assumption of postcopy.
      
      The solution is to disable the empty zero page for KVM guests early on
      and not during storage key enablement. With this change, the postcopy
      migration process is guaranteed to start after no zero pages are left.
      
      As guest pages are very likely not empty zero pages anyway the memory
      overhead is also pretty small.
      
      While at it this also adds proper page table locking to the zero page
      removal.
      Signed-off-by: NChristian Borntraeger <borntraeger@de.ibm.com>
      Acked-by: NJanosch Frank <frankja@linux.vnet.ibm.com>
      Cc: stable@vger.kernel.org
      Signed-off-by: NMartin Schwidefsky <schwidefsky@de.ibm.com>
      fa41ba0d
  11. 26 7月, 2017 1 次提交
  12. 12 6月, 2017 2 次提交
  13. 25 4月, 2017 1 次提交
  14. 24 3月, 2017 1 次提交
  15. 23 2月, 2017 2 次提交
  16. 13 12月, 2016 1 次提交
  17. 24 8月, 2016 1 次提交
  18. 13 7月, 2016 1 次提交
  19. 06 7月, 2016 1 次提交
  20. 20 6月, 2016 11 次提交