1. 11 Oct, 2021 2 commits
  2. 08 Oct, 2021 3 commits
  3. 07 Oct, 2021 1 commit
  4. 05 Oct, 2021 2 commits
    • Steven Rostedt (VMware)'s avatar
      tracing: Create a sparse bitmask for pid filtering · 8d6e9098
      Steven Rostedt (VMware) authored
      When the trace_pid_list was created, the default pid max was 32768.
      Creating a bitmask that can hold one bit for all 32768 took up 4096 (one
      page). Having a one page bitmask was not much of a problem, and that was
      used for mapping pids. But today, systems are bigger and can run more
      tasks, and now the default pid_max is usually set to 4194304. Which means
      to handle that many pids requires 524288 bytes. Worse yet, the pid_max can
      be set to 2^30 (1073741824 or 1G) which would take 134217728 (128M) of
      memory to store this array.
      
      Since the pid_list array is very sparsely populated, it is a huge waste of
      memory to store all possible bits for each pid when most will not be set.
      
      Instead, use a page table scheme to store the array, and allow this to
      handle up to 30 bit pids.
      
      The pid_mask will start out with 256 entries for the first 8 MSB bits.
      This will cost 1K for 32 bit architectures and 2K for 64 bit. Each of
      these will have a 256 array to store the next 8 bits of the pid (another
      1 or 2K). These will hold an 2K byte bitmask (which will cover the LSB
      14 bits or 16384 pids).
      
      When the trace_pid_list is allocated, it will have the 1/2K upper bits
      allocated, and then it will allocate a cache for the next upper chunks and
      the lower chunks (default 6 of each). Then when a bit is "set", these
      chunks will be pulled from the free list and added to the array. If the
      free list gets down to a lever (default 2), it will trigger an irqwork
      that will refill the cache back up.
      
      On clearing a bit, if the clear causes the bitmask to be zero, that chunk
      will then be placed back into the free cache for later use, keeping the
      need to allocate more down to a minimum.
      Signed-off-by: default avatarSteven Rostedt (VMware) <rostedt@goodmis.org>
      8d6e9098
    • Steven Rostedt (VMware)'s avatar
      tracing: Place trace_pid_list logic into abstract functions · 6954e415
      Steven Rostedt (VMware) authored
      Instead of having the logic that does trace_pid_list open coded, wrap it in
      abstract functions. This will allow a rewrite of the logic that implements
      the trace_pid_list without affecting the users.
      
      Note, this causes a change in behavior. Every time a pid is written into
      the set_*_pid file, it creates a new list and uses RCU to update it. If
      pid_max is lowered, but there was a pid currently in the list that was
      higher than pid_max, those pids will now be removed on updating the list.
      The old behavior kept that from happening.
      
      The rewrite of the pid_list logic will no longer depend on pid_max,
      and will return the old behavior.
      Signed-off-by: default avatarSteven Rostedt (VMware) <rostedt@goodmis.org>
      6954e415
  5. 01 Oct, 2021 27 commits
  6. 26 Sep, 2021 5 commits
    • Linus Torvalds's avatar
      Linux 5.15-rc3 · 5816b3e6
      Linus Torvalds authored
      5816b3e6
    • Linus Torvalds's avatar
      Merge tag '5.15-rc2-ksmbd-fixes' of git://git.samba.org/ksmbd · 5e5d7597
      Linus Torvalds authored
      Pull ksmbd fixes from Steve French:
       "Five fixes for the ksmbd kernel server, including three security
        fixes:
      
         - remove follow symlinks support
      
         - use LOOKUP_BENEATH to prevent out of share access
      
         - SMB3 compounding security fix
      
         - fix for returning the default streams correctly, fixing a bug when
           writing ppt or doc files from some clients
      
         - logging more clearly that ksmbd is experimental (at module load
           time)"
      
      * tag '5.15-rc2-ksmbd-fixes' of git://git.samba.org/ksmbd:
        ksmbd: use LOOKUP_BENEATH to prevent the out of share access
        ksmbd: remove follow symlinks support
        ksmbd: check protocol id in ksmbd_verify_smb_message()
        ksmbd: add default data stream name in FILE_STREAM_INFORMATION
        ksmbd: log that server is experimental at module load
      5e5d7597
    • Linus Torvalds's avatar
      Merge tag 'edac_urgent_for_v5.15_rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/ras/ras · 996148ee
      Linus Torvalds authored
      Pull EDAC fixes from Borislav Petkov:
       "Fix two EDAC drivers using the wrong value type for the DIMM mode"
      
      * tag 'edac_urgent_for_v5.15_rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/ras/ras:
        EDAC/dmc520: Assign the proper type to dimm->edac_mode
        EDAC/synopsys: Fix wrong value type assignment for edac_mode
      996148ee
    • Linus Torvalds's avatar
      Merge tag 'thermal-v5.15-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/thermal/linux · 299d6e47
      Linus Torvalds authored
      Pull thermal fixes from Daniel Lezcano:
      
       - Fix thermal shutdown after a suspend/resume due to a wrong TCC value
         restored on Intel platform (Antoine Tenart)
      
       - Fix potential buffer overflow when building the list of policies. The
         buffer size is not updated after writing to it (Dan Carpenter)
      
       - Fix wrong check against IS_ERR instead of NULL (Ansuel Smith)
      
      * tag 'thermal-v5.15-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/thermal/linux:
        thermal/drivers/tsens: Fix wrong check for tzd in irq handlers
        thermal/core: Potential buffer overflow in thermal_build_list_of_policies()
        thermal/drivers/int340x: Do not set a wrong tcc offset on resume
      299d6e47
    • Linus Torvalds's avatar
      Merge tag 'x86-urgent-2021-09-26' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip · 5bb7b210
      Linus Torvalds authored
      Pull x86 fixes from Thomas Gleixner:
       "A set of fixes for X86:
      
         - Prevent sending the wrong signal when protection keys are enabled
           and the kernel handles a fault in the vsyscall emulation.
      
         - Invoke early_reserve_memory() before invoking e820_memory_setup()
           which is required to make the Xen dom0 e820 hooks work correctly.
      
         - Use the correct data type for the SETZ operand in the EMQCMDS
           instruction wrapper.
      
         - Prevent undefined behaviour to the potential unaligned accesss in
           the instruction decoder library"
      
      * tag 'x86-urgent-2021-09-26' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
        x86/insn, tools/x86: Fix undefined behavior due to potential unaligned accesses
        x86/asm: Fix SETZ size enqcmds() build failure
        x86/setup: Call early_reserve_memory() earlier
        x86/fault: Fix wrong signal when vsyscall fails with pkey
      5bb7b210