1. 25 3月, 2014 1 次提交
  2. 17 3月, 2014 2 次提交
  3. 04 3月, 2014 7 次提交
  4. 27 2月, 2014 2 次提交
  5. 05 2月, 2014 1 次提交
    • M
      s390: fix kernel crash due to linkage stack instructions · 8d7f6690
      Martin Schwidefsky 提交于
      The kernel currently crashes with a low-address-protection exception
      if a user space process executes an instruction that tries to use the
      linkage stack. Set the base-ASTE origin and the subspace-ASTE origin
      of the dispatchable-unit-control-table to point to a dummy ASTE.
      Set up control register 15 to point to an empty linkage stack with no
      room left.
      
      A user space process with a linkage stack instruction will still crash
      but with a different exception which is correctly translated to a
      segmentation fault instead of a kernel oops.
      Signed-off-by: NMartin Schwidefsky <schwidefsky@de.ibm.com>
      8d7f6690
  6. 04 2月, 2014 1 次提交
    • M
      s390/dump: Fix dump memory detection · d7736ff5
      Michael Holzheu 提交于
      Dumps created by kdump or zfcpdump can contain invalid memory holes when
      dumping z/VM systems that have memory pressure.
      
      For example:
      
         # zgetdump -i /proc/vmcore.
         Memory map:
         0000000000000000 - 0000000000bfffff (12 MB)
         0000000000e00000 - 00000000014fffff (7 MB)
         000000000bd00000 - 00000000f3bfffff (3711 MB)
      
      The memory detection function find_memory_chunks() issues tprot to
      find valid memory chunks. In case of CMM it can happen that pages are
      marked as unstable via set_page_unstable() in arch_free_page().
      If z/VM has released that pages, tprot returns -EFAULT and indicates
      a memory hole.
      
      So fix this and switch off CMM in case of kdump or zfcpdump.
      
      Cc: <stable@vger.kernel.org>
      Signed-off-by: NMichael Holzheu <holzheu@linux.vnet.ibm.com>
      Signed-off-by: NMartin Schwidefsky <schwidefsky@de.ibm.com>
      d7736ff5
  7. 30 1月, 2014 10 次提交
  8. 29 1月, 2014 1 次提交
  9. 24 1月, 2014 2 次提交
  10. 22 1月, 2014 6 次提交
  11. 20 1月, 2014 1 次提交
    • C
      KVM: s390: Fix memory access error detection · 699bde3b
      Christian Borntraeger 提交于
      Seems that commit 210b1607
      (KVM: s390: Removed SIE_INTERCEPT_UCONTROL) lost a hunk when we
      reworked our patch queue to rework the async_fp code. We now
      ignore faults on the sie instruction (guest accesses non-existing
      memory) instead of sending a fault into the guest. This leads to
      hang situations with the old virtio transport that checks for
      descriptor memory after guest memory. Instead of bailing out this
      code now goes wild...
      Lets re-add the check.
      Signed-off-by: NChristian Borntraeger <borntraeger@de.ibm.com>
      699bde3b
  12. 19 1月, 2014 1 次提交
    • M
      net: introduce SO_BPF_EXTENSIONS · ea02f941
      Michal Sekletar 提交于
      For user space packet capturing libraries such as libpcap, there's
      currently only one way to check which BPF extensions are supported
      by the kernel, that is, commit aa1113d9 ("net: filter: return
      -EINVAL if BPF_S_ANC* operation is not supported"). For querying all
      extensions at once this might be rather inconvenient.
      
      Therefore, this patch introduces a new option which can be used as
      an argument for getsockopt(), and allows one to obtain information
      about which BPF extensions are supported by the current kernel.
      
      As David Miller suggests, we do not need to define any bits right
      now and status quo can just return 0 in order to state that this
      versions supports SKF_AD_PROTOCOL up to SKF_AD_PAY_OFFSET. Later
      additions to BPF extensions need to add their bits to the
      bpf_tell_extensions() function, as documented in the comment.
      Signed-off-by: NMichal Sekletar <msekleta@redhat.com>
      Cc: David Miller <davem@davemloft.net>
      Reviewed-by: NDaniel Borkmann <dborkman@redhat.com>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      ea02f941
  13. 18 1月, 2014 1 次提交
    • H
      s390/bpf,jit: fix 32 bit divisions, use unsigned divide instructions · 3af57f78
      Heiko Carstens 提交于
      The s390 bpf jit compiler emits the signed divide instructions "dr" and "d"
      for unsigned divisions.
      This can cause problems: the dividend will be zero extended to a 64 bit value
      and the divisor is the 32 bit signed value as specified A or X accumulator,
      even though A and X are supposed to be treated as unsigned values.
      
      The divide instrunctions will generate an exception if the result cannot be
      expressed with a 32 bit signed value.
      This is the case if e.g. the dividend is 0xffffffff and the divisor either 1
      or also 0xffffffff (signed: -1).
      
      To avoid all these issues simply use unsigned divide instructions.
      Signed-off-by: NHeiko Carstens <heiko.carstens@de.ibm.com>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      3af57f78
  14. 17 1月, 2014 2 次提交
  15. 16 1月, 2014 2 次提交