diff for duplicates of <Ynk40U/KA+hLBZRC@google.com>
diff --git a/a/content_digest b/N1/content_digest
index aa65352..4c129b3 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -17,66 +17,66 @@
"To\0Guilherme G. Piccoli <gpiccoli\@igalia.com>\0"
]
[
- "Cc\0akpm\@linux-foundation.org",
+ "Cc\0linux-hyperv\@vger.kernel.org",
+ " halves\@canonical.com",
+ " linux-xtensa\@linux-xtensa.org",
+ " peterz\@infradead.org",
+ " alejandro.j.jimenez\@oracle.com",
+ " linux-remoteproc\@vger.kernel.org",
+ " feng.tang\@intel.com",
+ " linux-mips\@vger.kernel.org",
+ " hidehiro.kawai.ez\@hitachi.com",
+ " sparclinux\@vger.kernel.org",
+ " will\@kernel.org",
+ " tglx\@linutronix.de",
+ " linux-leds\@vger.kernel.org",
+ " linux-s390\@vger.kernel.org",
+ " mikelley\@microsoft.com",
+ " john.ogness\@linutronix.de",
" bhe\@redhat.com",
- " pmladek\@suse.com",
- " kexec\@lists.infradead.org",
- " linux-kernel\@vger.kernel.org",
+ " corbet\@lwn.net",
+ " paulmck\@kernel.org",
+ " fabiomirmar\@gmail.com",
+ " x86\@kernel.org",
+ " David P . Reed <dpreed\@deepplum.com>",
+ " mingo\@redhat.com",
" bcm-kernel-feedback-list\@broadcom.com",
+ " xen-devel\@lists.xenproject.org",
+ " dyoung\@redhat.com",
+ " vgoyal\@redhat.com",
+ " pmladek\@suse.com",
+ " dave.hansen\@linux.intel.com",
+ " keescook\@chromium.org",
+ " arnd\@arndb.de",
+ " linux-pm\@vger.kernel.org",
" coresight\@lists.linaro.org",
- " linuxppc-dev\@lists.ozlabs.org",
- " linux-alpha\@vger.kernel.org",
+ " linux-um\@lists.infradead.org",
+ " rostedt\@goodmis.org",
+ " rcu\@vger.kernel.org",
+ " gregkh\@linuxfoundation.org",
+ " bp\@alien8.de",
+ " luto\@kernel.org",
+ " linux-tegra\@vger.kernel.org",
+ " openipmi-developer\@lists.sourceforge.net",
+ " andriy.shevchenko\@linux.intel.com",
+ " vkuznets\@redhat.com",
" linux-arm-kernel\@lists.infradead.org",
" linux-edac\@vger.kernel.org",
- " linux-hyperv\@vger.kernel.org",
- " linux-leds\@vger.kernel.org",
- " linux-mips\@vger.kernel.org",
+ " jgross\@suse.com",
" linux-parisc\@vger.kernel.org",
- " linux-pm\@vger.kernel.org",
- " linux-remoteproc\@vger.kernel.org",
- " linux-s390\@vger.kernel.org",
- " linux-tegra\@vger.kernel.org",
- " linux-um\@lists.infradead.org",
- " linux-xtensa\@linux-xtensa.org",
" netdev\@vger.kernel.org",
- " openipmi-developer\@lists.sourceforge.net",
- " rcu\@vger.kernel.org",
- " sparclinux\@vger.kernel.org",
- " xen-devel\@lists.xenproject.org",
- " x86\@kernel.org",
- " kernel-dev\@igalia.com",
" kernel\@gpiccoli.net",
- " halves\@canonical.com",
- " fabiomirmar\@gmail.com",
- " alejandro.j.jimenez\@oracle.com",
- " andriy.shevchenko\@linux.intel.com",
- " arnd\@arndb.de",
- " bp\@alien8.de",
- " corbet\@lwn.net",
+ " kexec\@lists.infradead.org",
+ " linux-kernel\@vger.kernel.org",
+ " stern\@rowland.harvard.edu",
+ " senozhatsky\@chromium.org",
" d.hatayama\@jp.fujitsu.com",
- " dave.hansen\@linux.intel.com",
- " dyoung\@redhat.com",
- " feng.tang\@intel.com",
- " gregkh\@linuxfoundation.org",
- " mikelley\@microsoft.com",
- " hidehiro.kawai.ez\@hitachi.com",
- " jgross\@suse.com",
- " john.ogness\@linutronix.de",
- " keescook\@chromium.org",
- " luto\@kernel.org",
" mhiramat\@kernel.org",
- " mingo\@redhat.com",
- " paulmck\@kernel.org",
- " peterz\@infradead.org",
- " rostedt\@goodmis.org",
- " senozhatsky\@chromium.org",
- " stern\@rowland.harvard.edu",
- " tglx\@linutronix.de",
- " vgoyal\@redhat.com",
- " vkuznets\@redhat.com",
- " will\@kernel.org",
- " David P . Reed <dpreed\@deepplum.com>",
- " Paolo Bonzini <pbonzini\@redhat.com>\0"
+ " kernel-dev\@igalia.com",
+ " linux-alpha\@vger.kernel.org",
+ " Paolo Bonzini <pbonzini\@redhat.com>",
+ " akpm\@linux-foundation.org",
+ " linuxppc-dev\@lists.ozlabs.org\0"
]
[
"\0001:1\0"
@@ -502,4 +502,4 @@
"2.36.0.512.ge40c2bad7a-goog"
]
-a6a9e40794703b8011962d999dd7df619b7303378979eb2ea04e0d7294044c02
+658177ca5613ca74a5d829503562a1bb0499ab596315408bbac76ea0b4323066
diff --git a/a/1.txt b/N2/1.txt
index d8215eb..7fc43ae 100644
--- a/a/1.txt
+++ b/N2/1.txt
@@ -142,4 +142,18 @@ official mini series.
>
> --
> 2.36.0
->
\ No newline at end of file
+>
+-------------- next part --------------
+A non-text attachment was scrubbed...
+Name: 0001-x86-crash-Disable-virt-in-core-NMI-crash-handler-to-.patch
+Type: text/x-diff
+Size: 6626 bytes
+Desc: not available
+URL: <http://lists.infradead.org/pipermail/kexec/attachments/20220509/5e99544c/attachment-0002.bin>
+-------------- next part --------------
+A non-text attachment was scrubbed...
+Name: 0002-x86-reboot-Disable-virtualization-in-an-emergency-if.patch
+Type: text/x-diff
+Size: 2721 bytes
+Desc: not available
+URL: <http://lists.infradead.org/pipermail/kexec/attachments/20220509/5e99544c/attachment-0003.bin>
\ No newline at end of file
diff --git a/a/2.hdr b/a/2.hdr
deleted file mode 100644
index 3482a00..0000000
--- a/a/2.hdr
+++ /dev/null
@@ -1,3 +0,0 @@
-Content-Type: text/x-diff; charset=us-ascii
-Content-Disposition: attachment;
- filename="0001-x86-crash-Disable-virt-in-core-NMI-crash-handler-to-.patch"
diff --git a/a/2.txt b/a/2.txt
deleted file mode 100644
index cf855b0..0000000
--- a/a/2.txt
+++ /dev/null
@@ -1,176 +0,0 @@
-From 8a4573b7cf3a3e49b409ba3a504934de181c259d Mon Sep 17 00:00:00 2001
-From: Sean Christopherson <seanjc@google.com>
-Date: Mon, 9 May 2022 07:36:34 -0700
-Subject: [PATCH 1/2] x86/crash: Disable virt in core NMI crash handler to
- avoid double list_add
-
-Disable virtualization in crash_nmi_callback() and skip the requested NMI
-shootdown if a shootdown has already occurred, i.e. a callback has been
-registered. The NMI crash shootdown path doesn't play nice with multiple
-invocations, e.g. attempting to register the NMI handler multiple times
-will trigger a double list_add() and hang the sytem (in addition to
-multiple other issues). If "crash_kexec_post_notifiers" is specified on
-the kernel command line, panic() will invoke crash_smp_send_stop() and
-result in a second call to nmi_shootdown_cpus() during
-native_machine_emergency_restart().
-
-Invoke the callback _before_ disabling virtualization, as the current
-VMCS needs to be cleared before doing VMXOFF. Note, this results in a
-subtle change in ordering between disabling virtualization and stopping
-Intel PT on the responding CPUs. While VMX and Intel PT do interact,
-VMXOFF and writes to MSR_IA32_RTIT_CTL do not induce faults between one
-another, which is all that matters when panicking.
-
-WARN if nmi_shootdown_cpus() is called a second time with anything other
-than the reboot path's "nop" handler, as bailing means the requested
-isn't being invoked. Punt true handling of multiple shootdown callbacks
-until there's an actual use case for doing so (beyond disabling
-virtualization).
-
-Extract the disabling logic to a common helper to deduplicate code, and
-to prepare for doing the shootdown in the emergency reboot path if SVM
-is supported.
-
-Note, prior to commit ed72736183c4 ("x86/reboot: Force all cpus to exit
-VMX root if VMX is supported), nmi_shootdown_cpus() was subtly protected
-against a second invocation by a cpu_vmx_enabled() check as the kdump
-handler would disable VMX if it ran first.
-
-Fixes: ed72736183c4 ("x86/reboot: Force all cpus to exit VMX root if VMX is supported)
-Cc: stable@vger.kernel.org
-Reported-by: Guilherme G. Piccoli <gpiccoli@igalia.com>
-Signed-off-by: Sean Christopherson <seanjc@google.com>
----
- arch/x86/include/asm/reboot.h | 1 +
- arch/x86/kernel/crash.c | 16 +--------------
- arch/x86/kernel/reboot.c | 38 ++++++++++++++++++++++++++++++++---
- 3 files changed, 37 insertions(+), 18 deletions(-)
-
-diff --git a/arch/x86/include/asm/reboot.h b/arch/x86/include/asm/reboot.h
-index 04c17be9b5fd..8f2da36435a6 100644
---- a/arch/x86/include/asm/reboot.h
-+++ b/arch/x86/include/asm/reboot.h
-@@ -25,6 +25,7 @@ void __noreturn machine_real_restart(unsigned int type);
- #define MRR_BIOS 0
- #define MRR_APM 1
-
-+void cpu_crash_disable_virtualization(void);
- typedef void (*nmi_shootdown_cb)(int, struct pt_regs*);
- void nmi_panic_self_stop(struct pt_regs *regs);
- void nmi_shootdown_cpus(nmi_shootdown_cb callback);
-diff --git a/arch/x86/kernel/crash.c b/arch/x86/kernel/crash.c
-index e8326a8d1c5d..fe0cf83843ba 100644
---- a/arch/x86/kernel/crash.c
-+++ b/arch/x86/kernel/crash.c
-@@ -81,15 +81,6 @@ static void kdump_nmi_callback(int cpu, struct pt_regs *regs)
- */
- cpu_crash_vmclear_loaded_vmcss();
-
-- /* Disable VMX or SVM if needed.
-- *
-- * We need to disable virtualization on all CPUs.
-- * Having VMX or SVM enabled on any CPU may break rebooting
-- * after the kdump kernel has finished its task.
-- */
-- cpu_emergency_vmxoff();
-- cpu_emergency_svm_disable();
--
- /*
- * Disable Intel PT to stop its logging
- */
-@@ -148,12 +139,7 @@ void native_machine_crash_shutdown(struct pt_regs *regs)
- */
- cpu_crash_vmclear_loaded_vmcss();
-
-- /* Booting kdump kernel with VMX or SVM enabled won't work,
-- * because (among other limitations) we can't disable paging
-- * with the virt flags.
-- */
-- cpu_emergency_vmxoff();
-- cpu_emergency_svm_disable();
-+ cpu_crash_disable_virtualization();
-
- /*
- * Disable Intel PT to stop its logging
-diff --git a/arch/x86/kernel/reboot.c b/arch/x86/kernel/reboot.c
-index fa700b46588e..f9543a4e9b09 100644
---- a/arch/x86/kernel/reboot.c
-+++ b/arch/x86/kernel/reboot.c
-@@ -528,9 +528,9 @@ static inline void kb_wait(void)
- }
- }
-
--static void vmxoff_nmi(int cpu, struct pt_regs *regs)
-+static void nmi_shootdown_nop(int cpu, struct pt_regs *regs)
- {
-- cpu_emergency_vmxoff();
-+ /* Nothing to do, the NMI shootdown handler disables virtualization. */
- }
-
- /* Use NMIs as IPIs to tell all CPUs to disable virtualization */
-@@ -554,7 +554,7 @@ static void emergency_vmx_disable_all(void)
- __cpu_emergency_vmxoff();
-
- /* Halt and exit VMX root operation on the other CPUs. */
-- nmi_shootdown_cpus(vmxoff_nmi);
-+ nmi_shootdown_cpus(nmi_shootdown_nop);
- }
- }
-
-@@ -802,6 +802,18 @@ static nmi_shootdown_cb shootdown_callback;
- static atomic_t waiting_for_crash_ipi;
- static int crash_ipi_issued;
-
-+void cpu_crash_disable_virtualization(void)
-+{
-+ /*
-+ * Disable virtualization, i.e. VMX or SVM, so that INIT is recognized
-+ * during reboot. VMX blocks INIT if the CPU is post-VMXON, and SVM
-+ * blocks INIT if GIF=0. Note, CLGI #UDs if SVM isn't enabled, so it's
-+ * easier to just disable SVM unconditionally.
-+ */
-+ cpu_emergency_vmxoff();
-+ cpu_emergency_svm_disable();
-+}
-+
- static int crash_nmi_callback(unsigned int val, struct pt_regs *regs)
- {
- int cpu;
-@@ -819,6 +831,12 @@ static int crash_nmi_callback(unsigned int val, struct pt_regs *regs)
-
- shootdown_callback(cpu, regs);
-
-+ /*
-+ * Prepare the CPU for reboot _after_ invoking the callback so that the
-+ * callback can safely use virtualization instructions, e.g. VMCLEAR.
-+ */
-+ cpu_crash_disable_virtualization();
-+
- atomic_dec(&waiting_for_crash_ipi);
- /* Assume hlt works */
- halt();
-@@ -840,6 +858,20 @@ void nmi_shootdown_cpus(nmi_shootdown_cb callback)
- unsigned long msecs;
- local_irq_disable();
-
-+ /*
-+ * Invoking multiple callbacks is not currently supported, registering
-+ * the NMI handler twice will cause a list_add() double add BUG().
-+ * The exception is the "nop" handler in the emergency reboot path,
-+ * which can run after e.g. kdump's shootdown. Do nothing if the crash
-+ * handler has already run, i.e. has already prepared other CPUs, the
-+ * reboot path doesn't have any work of its to do, it just needs to
-+ * ensure all CPUs have prepared for reboot.
-+ */
-+ if (shootdown_callback) {
-+ WARN_ON_ONCE(callback != nmi_shootdown_nop);
-+ return;
-+ }
-+
- /* Make a note of crashing cpu. Will be used in NMI callback. */
- crashing_cpu = safe_smp_processor_id();
-
-
-base-commit: 2764011106d0436cb44702cfb0981339d68c3509
---
-2.36.0.512.ge40c2bad7a-goog
\ No newline at end of file
diff --git a/a/3.hdr b/a/3.hdr
deleted file mode 100644
index 88c74d8..0000000
--- a/a/3.hdr
+++ /dev/null
@@ -1,3 +0,0 @@
-Content-Type: text/x-diff; charset=us-ascii
-Content-Disposition: attachment;
- filename="0002-x86-reboot-Disable-virtualization-in-an-emergency-if.patch"
diff --git a/a/3.txt b/a/3.txt
deleted file mode 100644
index 3cdd05b..0000000
--- a/a/3.txt
+++ /dev/null
@@ -1,72 +0,0 @@
-From ce4b8fb50962c00a9bb29663e96501e90d68bd8b Mon Sep 17 00:00:00 2001
-From: Sean Christopherson <seanjc@google.com>
-Date: Mon, 9 May 2022 08:28:14 -0700
-Subject: [PATCH 2/2] x86/reboot: Disable virtualization in an emergency if SVM
- is supported
-
-Disable SVM on all CPUs via NMI shootdown during an emergency reboot.
-Like VMX, SVM can block INIT and thus prevent bringing up other CPUs via
-INIT-SIPI-SIPI.
-
-Cc: stable@vger.kernel.org
-Signed-off-by: Sean Christopherson <seanjc@google.com>
----
- arch/x86/kernel/reboot.c | 26 ++++++++++++++------------
- 1 file changed, 14 insertions(+), 12 deletions(-)
-
-diff --git a/arch/x86/kernel/reboot.c b/arch/x86/kernel/reboot.c
-index f9543a4e9b09..33c1f4883b27 100644
---- a/arch/x86/kernel/reboot.c
-+++ b/arch/x86/kernel/reboot.c
-@@ -533,27 +533,29 @@ static void nmi_shootdown_nop(int cpu, struct pt_regs *regs)
- /* Nothing to do, the NMI shootdown handler disables virtualization. */
- }
-
--/* Use NMIs as IPIs to tell all CPUs to disable virtualization */
--static void emergency_vmx_disable_all(void)
-+static void emergency_reboot_disable_virtualization(void)
- {
- /* Just make sure we won't change CPUs while doing this */
- local_irq_disable();
-
- /*
-- * Disable VMX on all CPUs before rebooting, otherwise we risk hanging
-- * the machine, because the CPU blocks INIT when it's in VMX root.
-+ * Disable virtualization on all CPUs before rebooting to avoid hanging
-+ * the system, as VMX and SVM block INIT when running in the host
- *
- * We can't take any locks and we may be on an inconsistent state, so
-- * use NMIs as IPIs to tell the other CPUs to exit VMX root and halt.
-+ * use NMIs as IPIs to tell the other CPUs to disable VMX/SVM and halt.
- *
-- * Do the NMI shootdown even if VMX if off on _this_ CPU, as that
-- * doesn't prevent a different CPU from being in VMX root operation.
-+ * Do the NMI shootdown even if virtualization is off on _this_ CPU, as
-+ * other CPUs may have virtualization enabled.
- */
-- if (cpu_has_vmx()) {
-- /* Safely force _this_ CPU out of VMX root operation. */
-- __cpu_emergency_vmxoff();
-+ if (cpu_has_vmx() || cpu_has_svm(NULL)) {
-+ /* Safely force _this_ CPU out of VMX/SVM operation. */
-+ if (cpu_has_vmx())
-+ __cpu_emergency_vmxoff();
-+ else
-+ cpu_emergency_svm_disable();
-
-- /* Halt and exit VMX root operation on the other CPUs. */
-+ /* Disable VMX/SVM and halt on other CPUs. */
- nmi_shootdown_cpus(nmi_shootdown_nop);
- }
- }
-@@ -590,7 +592,7 @@ static void native_machine_emergency_restart(void)
- unsigned short mode;
-
- if (reboot_emergency)
-- emergency_vmx_disable_all();
-+ emergency_reboot_disable_virtualization();
-
- tboot_shutdown(TB_SHUTDOWN_REBOOT);
-
---
-2.36.0.512.ge40c2bad7a-goog
\ No newline at end of file
diff --git a/a/content_digest b/N2/content_digest
index aa65352..adc3d5f 100644
--- a/a/content_digest
+++ b/N2/content_digest
@@ -8,78 +8,16 @@
"From\0Sean Christopherson <seanjc\@google.com>\0"
]
[
- "Subject\0Re: [PATCH 01/30] x86/crash,reboot: Avoid re-disabling VMX in all CPUs on crash/restart\0"
+ "Subject\0[PATCH 01/30] x86/crash,reboot: Avoid re-disabling VMX in all CPUs on crash/restart\0"
]
[
"Date\0Mon, 9 May 2022 15:52:49 +0000\0"
]
[
- "To\0Guilherme G. Piccoli <gpiccoli\@igalia.com>\0"
+ "To\0kexec\@lists.infradead.org\0"
]
[
- "Cc\0akpm\@linux-foundation.org",
- " bhe\@redhat.com",
- " pmladek\@suse.com",
- " kexec\@lists.infradead.org",
- " linux-kernel\@vger.kernel.org",
- " bcm-kernel-feedback-list\@broadcom.com",
- " coresight\@lists.linaro.org",
- " linuxppc-dev\@lists.ozlabs.org",
- " linux-alpha\@vger.kernel.org",
- " linux-arm-kernel\@lists.infradead.org",
- " linux-edac\@vger.kernel.org",
- " linux-hyperv\@vger.kernel.org",
- " linux-leds\@vger.kernel.org",
- " linux-mips\@vger.kernel.org",
- " linux-parisc\@vger.kernel.org",
- " linux-pm\@vger.kernel.org",
- " linux-remoteproc\@vger.kernel.org",
- " linux-s390\@vger.kernel.org",
- " linux-tegra\@vger.kernel.org",
- " linux-um\@lists.infradead.org",
- " linux-xtensa\@linux-xtensa.org",
- " netdev\@vger.kernel.org",
- " openipmi-developer\@lists.sourceforge.net",
- " rcu\@vger.kernel.org",
- " sparclinux\@vger.kernel.org",
- " xen-devel\@lists.xenproject.org",
- " x86\@kernel.org",
- " kernel-dev\@igalia.com",
- " kernel\@gpiccoli.net",
- " halves\@canonical.com",
- " fabiomirmar\@gmail.com",
- " alejandro.j.jimenez\@oracle.com",
- " andriy.shevchenko\@linux.intel.com",
- " arnd\@arndb.de",
- " bp\@alien8.de",
- " corbet\@lwn.net",
- " d.hatayama\@jp.fujitsu.com",
- " dave.hansen\@linux.intel.com",
- " dyoung\@redhat.com",
- " feng.tang\@intel.com",
- " gregkh\@linuxfoundation.org",
- " mikelley\@microsoft.com",
- " hidehiro.kawai.ez\@hitachi.com",
- " jgross\@suse.com",
- " john.ogness\@linutronix.de",
- " keescook\@chromium.org",
- " luto\@kernel.org",
- " mhiramat\@kernel.org",
- " mingo\@redhat.com",
- " paulmck\@kernel.org",
- " peterz\@infradead.org",
- " rostedt\@goodmis.org",
- " senozhatsky\@chromium.org",
- " stern\@rowland.harvard.edu",
- " tglx\@linutronix.de",
- " vgoyal\@redhat.com",
- " vkuznets\@redhat.com",
- " will\@kernel.org",
- " David P . Reed <dpreed\@deepplum.com>",
- " Paolo Bonzini <pbonzini\@redhat.com>\0"
-]
-[
- "\0001:1\0"
+ "\0000:1\0"
]
[
"b\0"
@@ -229,277 +167,21 @@
"> \n",
"> -- \n",
"> 2.36.0\n",
- ">"
-]
-[
- "\0001:2\0"
-]
-[
- "fn\0000001-x86-crash-Disable-virt-in-core-NMI-crash-handler-to-.patch\0"
-]
-[
- "b\0"
-]
-[
- "From 8a4573b7cf3a3e49b409ba3a504934de181c259d Mon Sep 17 00:00:00 2001\n",
- "From: Sean Christopherson <seanjc\@google.com>\n",
- "Date: Mon, 9 May 2022 07:36:34 -0700\n",
- "Subject: [PATCH 1/2] x86/crash: Disable virt in core NMI crash handler to\n",
- " avoid double list_add\n",
- "\n",
- "Disable virtualization in crash_nmi_callback() and skip the requested NMI\n",
- "shootdown if a shootdown has already occurred, i.e. a callback has been\n",
- "registered. The NMI crash shootdown path doesn't play nice with multiple\n",
- "invocations, e.g. attempting to register the NMI handler multiple times\n",
- "will trigger a double list_add() and hang the sytem (in addition to\n",
- "multiple other issues). If \"crash_kexec_post_notifiers\" is specified on\n",
- "the kernel command line, panic() will invoke crash_smp_send_stop() and\n",
- "result in a second call to nmi_shootdown_cpus() during\n",
- "native_machine_emergency_restart().\n",
- "\n",
- "Invoke the callback _before_ disabling virtualization, as the current\n",
- "VMCS needs to be cleared before doing VMXOFF. Note, this results in a\n",
- "subtle change in ordering between disabling virtualization and stopping\n",
- "Intel PT on the responding CPUs. While VMX and Intel PT do interact,\n",
- "VMXOFF and writes to MSR_IA32_RTIT_CTL do not induce faults between one\n",
- "another, which is all that matters when panicking.\n",
- "\n",
- "WARN if nmi_shootdown_cpus() is called a second time with anything other\n",
- "than the reboot path's \"nop\" handler, as bailing means the requested\n",
- "isn't being invoked. Punt true handling of multiple shootdown callbacks\n",
- "until there's an actual use case for doing so (beyond disabling\n",
- "virtualization).\n",
- "\n",
- "Extract the disabling logic to a common helper to deduplicate code, and\n",
- "to prepare for doing the shootdown in the emergency reboot path if SVM\n",
- "is supported.\n",
- "\n",
- "Note, prior to commit ed72736183c4 (\"x86/reboot: Force all cpus to exit\n",
- "VMX root if VMX is supported), nmi_shootdown_cpus() was subtly protected\n",
- "against a second invocation by a cpu_vmx_enabled() check as the kdump\n",
- "handler would disable VMX if it ran first.\n",
- "\n",
- "Fixes: ed72736183c4 (\"x86/reboot: Force all cpus to exit VMX root if VMX is supported)\n",
- "Cc: stable\@vger.kernel.org\n",
- "Reported-by: Guilherme G. Piccoli <gpiccoli\@igalia.com>\n",
- "Signed-off-by: Sean Christopherson <seanjc\@google.com>\n",
- "---\n",
- " arch/x86/include/asm/reboot.h | 1 +\n",
- " arch/x86/kernel/crash.c | 16 +--------------\n",
- " arch/x86/kernel/reboot.c | 38 ++++++++++++++++++++++++++++++++---\n",
- " 3 files changed, 37 insertions(+), 18 deletions(-)\n",
- "\n",
- "diff --git a/arch/x86/include/asm/reboot.h b/arch/x86/include/asm/reboot.h\n",
- "index 04c17be9b5fd..8f2da36435a6 100644\n",
- "--- a/arch/x86/include/asm/reboot.h\n",
- "+++ b/arch/x86/include/asm/reboot.h\n",
- "\@\@ -25,6 +25,7 \@\@ void __noreturn machine_real_restart(unsigned int type);\n",
- " #define MRR_BIOS\t0\n",
- " #define MRR_APM\t\t1\n",
- " \n",
- "+void cpu_crash_disable_virtualization(void);\n",
- " typedef void (*nmi_shootdown_cb)(int, struct pt_regs*);\n",
- " void nmi_panic_self_stop(struct pt_regs *regs);\n",
- " void nmi_shootdown_cpus(nmi_shootdown_cb callback);\n",
- "diff --git a/arch/x86/kernel/crash.c b/arch/x86/kernel/crash.c\n",
- "index e8326a8d1c5d..fe0cf83843ba 100644\n",
- "--- a/arch/x86/kernel/crash.c\n",
- "+++ b/arch/x86/kernel/crash.c\n",
- "\@\@ -81,15 +81,6 \@\@ static void kdump_nmi_callback(int cpu, struct pt_regs *regs)\n",
- " \t */\n",
- " \tcpu_crash_vmclear_loaded_vmcss();\n",
- " \n",
- "-\t/* Disable VMX or SVM if needed.\n",
- "-\t *\n",
- "-\t * We need to disable virtualization on all CPUs.\n",
- "-\t * Having VMX or SVM enabled on any CPU may break rebooting\n",
- "-\t * after the kdump kernel has finished its task.\n",
- "-\t */\n",
- "-\tcpu_emergency_vmxoff();\n",
- "-\tcpu_emergency_svm_disable();\n",
- "-\n",
- " \t/*\n",
- " \t * Disable Intel PT to stop its logging\n",
- " \t */\n",
- "\@\@ -148,12 +139,7 \@\@ void native_machine_crash_shutdown(struct pt_regs *regs)\n",
- " \t */\n",
- " \tcpu_crash_vmclear_loaded_vmcss();\n",
- " \n",
- "-\t/* Booting kdump kernel with VMX or SVM enabled won't work,\n",
- "-\t * because (among other limitations) we can't disable paging\n",
- "-\t * with the virt flags.\n",
- "-\t */\n",
- "-\tcpu_emergency_vmxoff();\n",
- "-\tcpu_emergency_svm_disable();\n",
- "+\tcpu_crash_disable_virtualization();\n",
- " \n",
- " \t/*\n",
- " \t * Disable Intel PT to stop its logging\n",
- "diff --git a/arch/x86/kernel/reboot.c b/arch/x86/kernel/reboot.c\n",
- "index fa700b46588e..f9543a4e9b09 100644\n",
- "--- a/arch/x86/kernel/reboot.c\n",
- "+++ b/arch/x86/kernel/reboot.c\n",
- "\@\@ -528,9 +528,9 \@\@ static inline void kb_wait(void)\n",
- " \t}\n",
- " }\n",
- " \n",
- "-static void vmxoff_nmi(int cpu, struct pt_regs *regs)\n",
- "+static void nmi_shootdown_nop(int cpu, struct pt_regs *regs)\n",
- " {\n",
- "-\tcpu_emergency_vmxoff();\n",
- "+\t/* Nothing to do, the NMI shootdown handler disables virtualization. */\n",
- " }\n",
- " \n",
- " /* Use NMIs as IPIs to tell all CPUs to disable virtualization */\n",
- "\@\@ -554,7 +554,7 \@\@ static void emergency_vmx_disable_all(void)\n",
- " \t\t__cpu_emergency_vmxoff();\n",
- " \n",
- " \t\t/* Halt and exit VMX root operation on the other CPUs. */\n",
- "-\t\tnmi_shootdown_cpus(vmxoff_nmi);\n",
- "+\t\tnmi_shootdown_cpus(nmi_shootdown_nop);\n",
- " \t}\n",
- " }\n",
- " \n",
- "\@\@ -802,6 +802,18 \@\@ static nmi_shootdown_cb shootdown_callback;\n",
- " static atomic_t waiting_for_crash_ipi;\n",
- " static int crash_ipi_issued;\n",
- " \n",
- "+void cpu_crash_disable_virtualization(void)\n",
- "+{\n",
- "+\t/*\n",
- "+\t * Disable virtualization, i.e. VMX or SVM, so that INIT is recognized\n",
- "+\t * during reboot. VMX blocks INIT if the CPU is post-VMXON, and SVM\n",
- "+\t * blocks INIT if GIF=0. Note, CLGI #UDs if SVM isn't enabled, so it's\n",
- "+\t * easier to just disable SVM unconditionally.\n",
- "+\t */\n",
- "+\tcpu_emergency_vmxoff();\n",
- "+\tcpu_emergency_svm_disable();\n",
- "+}\n",
- "+\n",
- " static int crash_nmi_callback(unsigned int val, struct pt_regs *regs)\n",
- " {\n",
- " \tint cpu;\n",
- "\@\@ -819,6 +831,12 \@\@ static int crash_nmi_callback(unsigned int val, struct pt_regs *regs)\n",
- " \n",
- " \tshootdown_callback(cpu, regs);\n",
- " \n",
- "+\t/*\n",
- "+\t * Prepare the CPU for reboot _after_ invoking the callback so that the\n",
- "+\t * callback can safely use virtualization instructions, e.g. VMCLEAR.\n",
- "+\t */\n",
- "+\tcpu_crash_disable_virtualization();\n",
- "+\n",
- " \tatomic_dec(&waiting_for_crash_ipi);\n",
- " \t/* Assume hlt works */\n",
- " \thalt();\n",
- "\@\@ -840,6 +858,20 \@\@ void nmi_shootdown_cpus(nmi_shootdown_cb callback)\n",
- " \tunsigned long msecs;\n",
- " \tlocal_irq_disable();\n",
- " \n",
- "+\t/*\n",
- "+\t * Invoking multiple callbacks is not currently supported, registering\n",
- "+\t * the NMI handler twice will cause a list_add() double add BUG().\n",
- "+\t * The exception is the \"nop\" handler in the emergency reboot path,\n",
- "+\t * which can run after e.g. kdump's shootdown. Do nothing if the crash\n",
- "+\t * handler has already run, i.e. has already prepared other CPUs, the\n",
- "+\t * reboot path doesn't have any work of its to do, it just needs to\n",
- "+\t * ensure all CPUs have prepared for reboot.\n",
- "+\t */\n",
- "+\tif (shootdown_callback) {\n",
- "+\t\tWARN_ON_ONCE(callback != nmi_shootdown_nop);\n",
- "+\t\treturn;\n",
- "+\t}\n",
- "+\n",
- " \t/* Make a note of crashing cpu. Will be used in NMI callback. */\n",
- " \tcrashing_cpu = safe_smp_processor_id();\n",
- " \n",
- "\n",
- "base-commit: 2764011106d0436cb44702cfb0981339d68c3509\n",
- "-- \n",
- "2.36.0.512.ge40c2bad7a-goog"
-]
-[
- "\0001:3\0"
-]
-[
- "fn\0000002-x86-reboot-Disable-virtualization-in-an-emergency-if.patch\0"
-]
-[
- "b\0"
-]
-[
- "From ce4b8fb50962c00a9bb29663e96501e90d68bd8b Mon Sep 17 00:00:00 2001\n",
- "From: Sean Christopherson <seanjc\@google.com>\n",
- "Date: Mon, 9 May 2022 08:28:14 -0700\n",
- "Subject: [PATCH 2/2] x86/reboot: Disable virtualization in an emergency if SVM\n",
- " is supported\n",
- "\n",
- "Disable SVM on all CPUs via NMI shootdown during an emergency reboot.\n",
- "Like VMX, SVM can block INIT and thus prevent bringing up other CPUs via\n",
- "INIT-SIPI-SIPI.\n",
- "\n",
- "Cc: stable\@vger.kernel.org\n",
- "Signed-off-by: Sean Christopherson <seanjc\@google.com>\n",
- "---\n",
- " arch/x86/kernel/reboot.c | 26 ++++++++++++++------------\n",
- " 1 file changed, 14 insertions(+), 12 deletions(-)\n",
- "\n",
- "diff --git a/arch/x86/kernel/reboot.c b/arch/x86/kernel/reboot.c\n",
- "index f9543a4e9b09..33c1f4883b27 100644\n",
- "--- a/arch/x86/kernel/reboot.c\n",
- "+++ b/arch/x86/kernel/reboot.c\n",
- "\@\@ -533,27 +533,29 \@\@ static void nmi_shootdown_nop(int cpu, struct pt_regs *regs)\n",
- " \t/* Nothing to do, the NMI shootdown handler disables virtualization. */\n",
- " }\n",
- " \n",
- "-/* Use NMIs as IPIs to tell all CPUs to disable virtualization */\n",
- "-static void emergency_vmx_disable_all(void)\n",
- "+static void emergency_reboot_disable_virtualization(void)\n",
- " {\n",
- " \t/* Just make sure we won't change CPUs while doing this */\n",
- " \tlocal_irq_disable();\n",
- " \n",
- " \t/*\n",
- "-\t * Disable VMX on all CPUs before rebooting, otherwise we risk hanging\n",
- "-\t * the machine, because the CPU blocks INIT when it's in VMX root.\n",
- "+\t * Disable virtualization on all CPUs before rebooting to avoid hanging\n",
- "+\t * the system, as VMX and SVM block INIT when running in the host\n",
- " \t *\n",
- " \t * We can't take any locks and we may be on an inconsistent state, so\n",
- "-\t * use NMIs as IPIs to tell the other CPUs to exit VMX root and halt.\n",
- "+\t * use NMIs as IPIs to tell the other CPUs to disable VMX/SVM and halt.\n",
- " \t *\n",
- "-\t * Do the NMI shootdown even if VMX if off on _this_ CPU, as that\n",
- "-\t * doesn't prevent a different CPU from being in VMX root operation.\n",
- "+\t * Do the NMI shootdown even if virtualization is off on _this_ CPU, as\n",
- "+\t * other CPUs may have virtualization enabled.\n",
- " \t */\n",
- "-\tif (cpu_has_vmx()) {\n",
- "-\t\t/* Safely force _this_ CPU out of VMX root operation. */\n",
- "-\t\t__cpu_emergency_vmxoff();\n",
- "+\tif (cpu_has_vmx() || cpu_has_svm(NULL)) {\n",
- "+\t\t/* Safely force _this_ CPU out of VMX/SVM operation. */\n",
- "+\t\tif (cpu_has_vmx())\n",
- "+\t\t\t__cpu_emergency_vmxoff();\n",
- "+\t\telse\n",
- "+\t\t\tcpu_emergency_svm_disable();\n",
- " \n",
- "-\t\t/* Halt and exit VMX root operation on the other CPUs. */\n",
- "+\t\t/* Disable VMX/SVM and halt on other CPUs. */\n",
- " \t\tnmi_shootdown_cpus(nmi_shootdown_nop);\n",
- " \t}\n",
- " }\n",
- "\@\@ -590,7 +592,7 \@\@ static void native_machine_emergency_restart(void)\n",
- " \tunsigned short mode;\n",
- " \n",
- " \tif (reboot_emergency)\n",
- "-\t\temergency_vmx_disable_all();\n",
- "+\t\temergency_reboot_disable_virtualization();\n",
- " \n",
- " \ttboot_shutdown(TB_SHUTDOWN_REBOOT);\n",
- " \n",
- "-- \n",
- "2.36.0.512.ge40c2bad7a-goog"
+ "> \n",
+ "-------------- next part --------------\n",
+ "A non-text attachment was scrubbed...\n",
+ "Name: 0001-x86-crash-Disable-virt-in-core-NMI-crash-handler-to-.patch\n",
+ "Type: text/x-diff\n",
+ "Size: 6626 bytes\n",
+ "Desc: not available\n",
+ "URL: <http://lists.infradead.org/pipermail/kexec/attachments/20220509/5e99544c/attachment-0002.bin>\n",
+ "-------------- next part --------------\n",
+ "A non-text attachment was scrubbed...\n",
+ "Name: 0002-x86-reboot-Disable-virtualization-in-an-emergency-if.patch\n",
+ "Type: text/x-diff\n",
+ "Size: 2721 bytes\n",
+ "Desc: not available\n",
+ "URL: <http://lists.infradead.org/pipermail/kexec/attachments/20220509/5e99544c/attachment-0003.bin>"
]
-a6a9e40794703b8011962d999dd7df619b7303378979eb2ea04e0d7294044c02
+3be9201c695e4da7cfca208c981473813e543ff3a9120ce19aba847befe8a493
diff --git a/N3/4.hdr b/N3/4.hdr
new file mode 100644
index 0000000..4b86001
--- /dev/null
+++ b/N3/4.hdr
@@ -0,0 +1,4 @@
+Content-Type: text/plain; charset="us-ascii"
+MIME-Version: 1.0
+Content-Transfer-Encoding: 7bit
+Content-Disposition: inline
diff --git a/N3/4.txt b/N3/4.txt
new file mode 100644
index 0000000..d149a3e
--- /dev/null
+++ b/N3/4.txt
@@ -0,0 +1,4 @@
+_______________________________________________
+linux-um mailing list
+linux-um@lists.infradead.org
+http://lists.infradead.org/mailman/listinfo/linux-um
\ No newline at end of file
diff --git a/a/content_digest b/N3/content_digest
index aa65352..0593864 100644
--- a/a/content_digest
+++ b/N3/content_digest
@@ -501,5 +501,17 @@
"-- \n",
"2.36.0.512.ge40c2bad7a-goog"
]
+[
+ "\0001:4\0"
+]
+[
+ "b\0"
+]
+[
+ "_______________________________________________\n",
+ "linux-um mailing list\n",
+ "linux-um\@lists.infradead.org\n",
+ "http://lists.infradead.org/mailman/listinfo/linux-um"
+]
-a6a9e40794703b8011962d999dd7df619b7303378979eb2ea04e0d7294044c02
+47953dea01cf292163ceacfbcea2addcdd88e068217178573a781c3decb20287
diff --git a/a/1.txt b/N4/1.txt
index d8215eb..50784c7 100644
--- a/a/1.txt
+++ b/N4/1.txt
@@ -41,11 +41,11 @@ Call stacks for the two callers would be very, very helpful.
>
> Fixes: ed72736183c4 ("x86/reboot: Force all cpus to exit VMX root if VMX is supported)
> Fixes: 0ee59413c967 ("x86/panic: replace smp_send_stop() with kdump friendly version in panic path")
-> Cc: David P. Reed <dpreed@deepplum.com>
-> Cc: Hidehiro Kawai <hidehiro.kawai.ez@hitachi.com>
-> Cc: Paolo Bonzini <pbonzini@redhat.com>
-> Cc: Sean Christopherson <seanjc@google.com>
-> Signed-off-by: Guilherme G. Piccoli <gpiccoli@igalia.com>
+> Cc: David P. Reed <dpreed-UISbPGJNPmdWk0Htik3J/w@public.gmane.org>
+> Cc: Hidehiro Kawai <hidehiro.kawai.ez-FCd8Q96Dh0JBDgjK7y7TUQ@public.gmane.org>
+> Cc: Paolo Bonzini <pbonzini-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
+> Cc: Sean Christopherson <seanjc-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org>
+> Signed-off-by: Guilherme G. Piccoli <gpiccoli-wEGTBA9jqPzQT0dZR+AlfA@public.gmane.org>
> ---
> arch/x86/include/asm/cpu.h | 1 +
> arch/x86/kernel/crash.c | 8 ++++----
diff --git a/a/2.txt b/N4/2.txt
index cf855b0..b04f525 100644
--- a/a/2.txt
+++ b/N4/2.txt
@@ -1,5 +1,5 @@
From 8a4573b7cf3a3e49b409ba3a504934de181c259d Mon Sep 17 00:00:00 2001
-From: Sean Christopherson <seanjc@google.com>
+From: Sean Christopherson <seanjc-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org>
Date: Mon, 9 May 2022 07:36:34 -0700
Subject: [PATCH 1/2] x86/crash: Disable virt in core NMI crash handler to
avoid double list_add
@@ -37,9 +37,9 @@ against a second invocation by a cpu_vmx_enabled() check as the kdump
handler would disable VMX if it ran first.
Fixes: ed72736183c4 ("x86/reboot: Force all cpus to exit VMX root if VMX is supported)
-Cc: stable@vger.kernel.org
-Reported-by: Guilherme G. Piccoli <gpiccoli@igalia.com>
-Signed-off-by: Sean Christopherson <seanjc@google.com>
+Cc: stable-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
+Reported-by: Guilherme G. Piccoli <gpiccoli-wEGTBA9jqPzQT0dZR+AlfA@public.gmane.org>
+Signed-off-by: Sean Christopherson <seanjc-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org>
---
arch/x86/include/asm/reboot.h | 1 +
arch/x86/kernel/crash.c | 16 +--------------
diff --git a/a/3.txt b/N4/3.txt
index 3cdd05b..2929db9 100644
--- a/a/3.txt
+++ b/N4/3.txt
@@ -1,5 +1,5 @@
From ce4b8fb50962c00a9bb29663e96501e90d68bd8b Mon Sep 17 00:00:00 2001
-From: Sean Christopherson <seanjc@google.com>
+From: Sean Christopherson <seanjc-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org>
Date: Mon, 9 May 2022 08:28:14 -0700
Subject: [PATCH 2/2] x86/reboot: Disable virtualization in an emergency if SVM
is supported
@@ -8,8 +8,8 @@ Disable SVM on all CPUs via NMI shootdown during an emergency reboot.
Like VMX, SVM can block INIT and thus prevent bringing up other CPUs via
INIT-SIPI-SIPI.
-Cc: stable@vger.kernel.org
-Signed-off-by: Sean Christopherson <seanjc@google.com>
+Cc: stable-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
+Signed-off-by: Sean Christopherson <seanjc-hpIqsD4AKlfQT0dZR+AlfA@public.gmane.org>
---
arch/x86/kernel/reboot.c | 26 ++++++++++++++------------
1 file changed, 14 insertions(+), 12 deletions(-)
diff --git a/a/content_digest b/N4/content_digest
index aa65352..d7f2219 100644
--- a/a/content_digest
+++ b/N4/content_digest
@@ -5,7 +5,10 @@
"ref\00020220427224924.592546-2-gpiccoli\@igalia.com\0"
]
[
- "From\0Sean Christopherson <seanjc\@google.com>\0"
+ "ref\00020220427224924.592546-2-gpiccoli-wEGTBA9jqPzQT0dZR+AlfA\@public.gmane.org\0"
+]
+[
+ "From\0Sean Christopherson <seanjc-hpIqsD4AKlfQT0dZR+AlfA\@public.gmane.org>\0"
]
[
"Subject\0Re: [PATCH 01/30] x86/crash,reboot: Avoid re-disabling VMX in all CPUs on crash/restart\0"
@@ -14,69 +17,38 @@
"Date\0Mon, 9 May 2022 15:52:49 +0000\0"
]
[
- "To\0Guilherme G. Piccoli <gpiccoli\@igalia.com>\0"
+ "To\0Guilherme G. Piccoli <gpiccoli-wEGTBA9jqPzQT0dZR+AlfA\@public.gmane.org>\0"
]
[
- "Cc\0akpm\@linux-foundation.org",
- " bhe\@redhat.com",
- " pmladek\@suse.com",
- " kexec\@lists.infradead.org",
- " linux-kernel\@vger.kernel.org",
- " bcm-kernel-feedback-list\@broadcom.com",
- " coresight\@lists.linaro.org",
- " linuxppc-dev\@lists.ozlabs.org",
- " linux-alpha\@vger.kernel.org",
- " linux-arm-kernel\@lists.infradead.org",
- " linux-edac\@vger.kernel.org",
- " linux-hyperv\@vger.kernel.org",
- " linux-leds\@vger.kernel.org",
- " linux-mips\@vger.kernel.org",
- " linux-parisc\@vger.kernel.org",
- " linux-pm\@vger.kernel.org",
- " linux-remoteproc\@vger.kernel.org",
- " linux-s390\@vger.kernel.org",
- " linux-tegra\@vger.kernel.org",
- " linux-um\@lists.infradead.org",
- " linux-xtensa\@linux-xtensa.org",
- " netdev\@vger.kernel.org",
- " openipmi-developer\@lists.sourceforge.net",
- " rcu\@vger.kernel.org",
- " sparclinux\@vger.kernel.org",
- " xen-devel\@lists.xenproject.org",
- " x86\@kernel.org",
- " kernel-dev\@igalia.com",
- " kernel\@gpiccoli.net",
- " halves\@canonical.com",
- " fabiomirmar\@gmail.com",
- " alejandro.j.jimenez\@oracle.com",
- " andriy.shevchenko\@linux.intel.com",
- " arnd\@arndb.de",
- " bp\@alien8.de",
- " corbet\@lwn.net",
- " d.hatayama\@jp.fujitsu.com",
- " dave.hansen\@linux.intel.com",
- " dyoung\@redhat.com",
- " feng.tang\@intel.com",
- " gregkh\@linuxfoundation.org",
- " mikelley\@microsoft.com",
- " hidehiro.kawai.ez\@hitachi.com",
- " jgross\@suse.com",
- " john.ogness\@linutronix.de",
- " keescook\@chromium.org",
- " luto\@kernel.org",
- " mhiramat\@kernel.org",
- " mingo\@redhat.com",
- " paulmck\@kernel.org",
- " peterz\@infradead.org",
- " rostedt\@goodmis.org",
- " senozhatsky\@chromium.org",
- " stern\@rowland.harvard.edu",
- " tglx\@linutronix.de",
- " vgoyal\@redhat.com",
- " vkuznets\@redhat.com",
- " will\@kernel.org",
- " David P . Reed <dpreed\@deepplum.com>",
- " Paolo Bonzini <pbonzini\@redhat.com>\0"
+ "Cc\0akpm-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b\@public.gmane.org",
+ " bhe-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org",
+ " pmladek-IBi9RG/b67k\@public.gmane.org",
+ " kexec-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r\@public.gmane.org",
+ " linux-kernel-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " bcm-kernel-feedback-list-dY08KVG/lbpWk0Htik3J/w\@public.gmane.org",
+ " coresight-cunTk1MwBs8s++Sfvej+rw\@public.gmane.org",
+ " linuxppc-dev-uLR06cmDAlY/bJ5BZ2RsiQ\@public.gmane.org",
+ " linux-alpha-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " linux-arm-kernel-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r\@public.gmane.org",
+ " linux-edac-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " linux-hyperv-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " linux-leds-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " linux-mips-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " linux-parisc-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " linux-pm-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " linux-remoteproc-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " linux-s390-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " linux-tegra-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " linux-um-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r\@public.gmane.org",
+ " linux-xtensa-PjhNF2WwrV/0Sa2dR60CXw\@public.gmane.org",
+ " netdev-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " openipmi-developer-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f\@public.gmane.org",
+ " rcu-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " sparclinux-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org",
+ " xen-devel-GuqFBffKawtpuQazS67q72D2FQJk+8+b\@public.gmane.org",
+ " x86-DgEjT+Ai2ygdnm+yROfE0A\@public.gmane.org",
+ " kernel-dev-wEGTBA9jqPzQT0dZR+AlfA\@public.gmane.org",
+ " k\0"
]
[
"\0001:1\0"
@@ -128,11 +100,11 @@
"> \n",
"> Fixes: ed72736183c4 (\"x86/reboot: Force all cpus to exit VMX root if VMX is supported)\n",
"> Fixes: 0ee59413c967 (\"x86/panic: replace smp_send_stop() with kdump friendly version in panic path\")\n",
- "> Cc: David P. Reed <dpreed\@deepplum.com>\n",
- "> Cc: Hidehiro Kawai <hidehiro.kawai.ez\@hitachi.com>\n",
- "> Cc: Paolo Bonzini <pbonzini\@redhat.com>\n",
- "> Cc: Sean Christopherson <seanjc\@google.com>\n",
- "> Signed-off-by: Guilherme G. Piccoli <gpiccoli\@igalia.com>\n",
+ "> Cc: David P. Reed <dpreed-UISbPGJNPmdWk0Htik3J/w\@public.gmane.org>\n",
+ "> Cc: Hidehiro Kawai <hidehiro.kawai.ez-FCd8Q96Dh0JBDgjK7y7TUQ\@public.gmane.org>\n",
+ "> Cc: Paolo Bonzini <pbonzini-H+wXaHxf7aLQT0dZR+AlfA\@public.gmane.org>\n",
+ "> Cc: Sean Christopherson <seanjc-hpIqsD4AKlfQT0dZR+AlfA\@public.gmane.org>\n",
+ "> Signed-off-by: Guilherme G. Piccoli <gpiccoli-wEGTBA9jqPzQT0dZR+AlfA\@public.gmane.org>\n",
"> ---\n",
"> arch/x86/include/asm/cpu.h | 1 +\n",
"> arch/x86/kernel/crash.c | 8 ++++----\n",
@@ -242,7 +214,7 @@
]
[
"From 8a4573b7cf3a3e49b409ba3a504934de181c259d Mon Sep 17 00:00:00 2001\n",
- "From: Sean Christopherson <seanjc\@google.com>\n",
+ "From: Sean Christopherson <seanjc-hpIqsD4AKlfQT0dZR+AlfA\@public.gmane.org>\n",
"Date: Mon, 9 May 2022 07:36:34 -0700\n",
"Subject: [PATCH 1/2] x86/crash: Disable virt in core NMI crash handler to\n",
" avoid double list_add\n",
@@ -280,9 +252,9 @@
"handler would disable VMX if it ran first.\n",
"\n",
"Fixes: ed72736183c4 (\"x86/reboot: Force all cpus to exit VMX root if VMX is supported)\n",
- "Cc: stable\@vger.kernel.org\n",
- "Reported-by: Guilherme G. Piccoli <gpiccoli\@igalia.com>\n",
- "Signed-off-by: Sean Christopherson <seanjc\@google.com>\n",
+ "Cc: stable-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org\n",
+ "Reported-by: Guilherme G. Piccoli <gpiccoli-wEGTBA9jqPzQT0dZR+AlfA\@public.gmane.org>\n",
+ "Signed-off-by: Sean Christopherson <seanjc-hpIqsD4AKlfQT0dZR+AlfA\@public.gmane.org>\n",
"---\n",
" arch/x86/include/asm/reboot.h | 1 +\n",
" arch/x86/kernel/crash.c | 16 +--------------\n",
@@ -429,7 +401,7 @@
]
[
"From ce4b8fb50962c00a9bb29663e96501e90d68bd8b Mon Sep 17 00:00:00 2001\n",
- "From: Sean Christopherson <seanjc\@google.com>\n",
+ "From: Sean Christopherson <seanjc-hpIqsD4AKlfQT0dZR+AlfA\@public.gmane.org>\n",
"Date: Mon, 9 May 2022 08:28:14 -0700\n",
"Subject: [PATCH 2/2] x86/reboot: Disable virtualization in an emergency if SVM\n",
" is supported\n",
@@ -438,8 +410,8 @@
"Like VMX, SVM can block INIT and thus prevent bringing up other CPUs via\n",
"INIT-SIPI-SIPI.\n",
"\n",
- "Cc: stable\@vger.kernel.org\n",
- "Signed-off-by: Sean Christopherson <seanjc\@google.com>\n",
+ "Cc: stable-u79uwXL29TY76Z2rM5mHXA\@public.gmane.org\n",
+ "Signed-off-by: Sean Christopherson <seanjc-hpIqsD4AKlfQT0dZR+AlfA\@public.gmane.org>\n",
"---\n",
" arch/x86/kernel/reboot.c | 26 ++++++++++++++------------\n",
" 1 file changed, 14 insertions(+), 12 deletions(-)\n",
@@ -502,4 +474,4 @@
"2.36.0.512.ge40c2bad7a-goog"
]
-a6a9e40794703b8011962d999dd7df619b7303378979eb2ea04e0d7294044c02
+1aae2f1845de36a34b6901e81ac337ea9cab5cebbd792c2a999f035747a30fde
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.