All of lore.kernel.org
 help / color / mirror / Atom feed
* Backport request
@ 2019-07-16 22:08 Thomas Gleixner
  2019-07-16 23:01 ` Greg KH
  2019-07-17 23:38 ` Sasha Levin
  0 siblings, 2 replies; 33+ messages in thread
From: Thomas Gleixner @ 2019-07-16 22:08 UTC (permalink / raw)
  To: stable

[-- Attachment #1: Type: text/plain, Size: 991 bytes --]

Folks!

There are more and more people worried about these usually harmless
warnings:

	do_IRQ: 0.39 No irq handler for vector

It took a while to figure out why that happens and why it is harmless for
most interrupts, but there is also a real issue hidden for level type
IOAPIC interrupts.

The following commits in Linus tree are addressing the issue:

 b7107a67f0d1 ("x86/irq: Handle spurious interrupt after shutdown gracefully")
 dfe0cf8b51b0 ("x86/ioapic: Implement irq_get_irqchip_state() callback")
 62e0468650c3 ("genirq: Add optional hardware synchronization for shutdown")
 1d21f2af8571 ("genirq: Fix misleading synchronize_irq() documentation")
 4001d8e8762f ("genirq: Delay deactivation in free_irq()")

There is another one which makes sense to be backported:

 f8a8fe61fec8 ("x86/irq: Seperate unused system vectors from spurious entry again")

These should go back to 4.19, but not farther.

They apply cleanly to 5.1 and 5.2. A backport to 4.19 is attached.

Thanks,

	tglx

[-- Attachment #2: Type: application/octet-stream, Size: 9027 bytes --]

^ permalink raw reply	[flat|nested] 33+ messages in thread
* Backport request
@ 2023-08-01  7:17 Hemdan, Hagar Gamal Halim
  2023-08-01  7:24 ` Greg KH
  0 siblings, 1 reply; 33+ messages in thread
From: Hemdan, Hagar Gamal Halim @ 2023-08-01  7:17 UTC (permalink / raw)
  To: stable; +Cc: Yadav, Pratyush

Hi,

Please backport commits:

c02d5feb6e2f ("ACPI: processor: perflib: Use the "no limit" frequency QoS")
99387b016022 ("ACPI: processor: perflib: Avoid updating frequency QoS unnecessarily")
e8a0e30b742f ("cpufreq: intel_pstate: Drop ACPI _PSS states table patching")

To stable trees 5.4.y, 5.10.y, 5.15.y, 6.1.y. These commits fix Intel Turbo enabling when
bringing CPUs offline and online again. I've tested this on the mentioned stable trees.
Feel free to add

Tested-by: Hagar Hemdan <hagarhem@amazon.de>

Thanks,
Hagar




Amazon Development Center Germany GmbH
Krausenstr. 38
10117 Berlin
Geschaeftsfuehrung: Christian Schlaeger, Jonathan Weiss
Eingetragen am Amtsgericht Charlottenburg unter HRB 149173 B
Sitz: Berlin
Ust-ID: DE 289 237 879



^ permalink raw reply	[flat|nested] 33+ messages in thread
* backport request
@ 2023-07-25 11:13 Ard Biesheuvel
  2023-07-25 11:17 ` Ard Biesheuvel
                   ` (2 more replies)
  0 siblings, 3 replies; 33+ messages in thread
From: Ard Biesheuvel @ 2023-07-25 11:13 UTC (permalink / raw)
  To: # 3.4.x

Please backport commit

commit 9cf42bca30e98a1c6c9e8abf876940a551eaa3d1
Author: Ard Biesheuvel <ardb@kernel.org>
Date:   Tue Aug 2 11:00:16 2022 +0200

    efi: libstub: use EFI_LOADER_CODE region when moving the kernel in memory

to all active stable trees all the way back to v5.15. I will provide a
separate backport for v5.10, and possibly a [much] larger set of
backports for v5.4 for EFI boot support.

Thanks,
Ard.

^ permalink raw reply	[flat|nested] 33+ messages in thread
* Backport request
@ 2022-08-24 11:20 Juergen Gross
  2022-08-24 12:10 ` Greg Kroah-Hartman
  0 siblings, 1 reply; 33+ messages in thread
From: Juergen Gross @ 2022-08-24 11:20 UTC (permalink / raw)
  To: Greg Kroah-Hartman, stable; +Cc: Lai Jiangshan, xen-devel


[-- Attachment #1.1.1: Type: text/plain, Size: 359 bytes --]

Hi Greg,

stable kernels 5.18 and 5.15 seem to be missing upstream patch
c64cc2802a78 ("x86/entry: Move CLD to the start of the idtentry macro").
This is a prerequisite patch for 64cbd0acb582 ("x86/entry: Don't call
error_entry() for XENPV"), which is included in 5.15.y and 5.18.y.

Could you please take c64cc2802a78 for 5.15 and 5.18?


Juergen

[-- Attachment #1.1.2: OpenPGP public key --]
[-- Type: application/pgp-keys, Size: 3149 bytes --]

[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 495 bytes --]

^ permalink raw reply	[flat|nested] 33+ messages in thread
* Backport request
@ 2020-12-15 16:02 Daniel Vetter
  2020-12-19 12:42 ` Greg KH
  0 siblings, 1 reply; 33+ messages in thread
From: Daniel Vetter @ 2020-12-15 16:02 UTC (permalink / raw)
  To: stable; +Cc: Wilson, Chris, Lionel Landwerlin

Dear stable team (aka Greg)

Please backport

a04ac8273665 ("drm/i915/gt: Fixup tgl mocs for PTE tracking")

Note that this needs

4d8a5cfe3b13 ("drm/i915/gt: Initialize reserved and unspecified MOCS indices")

but that one has already a cc: stable, unfortunately the bugfix didn't.
-Daniel
-- 
Daniel Vetter
Software Engineer, Intel Corporation
http://blog.ffwll.ch

^ permalink raw reply	[flat|nested] 33+ messages in thread
* Backport request
@ 2018-02-28 13:56 Corey Minyard
  2018-02-28 14:18 ` Greg KH
  0 siblings, 1 reply; 33+ messages in thread
From: Corey Minyard @ 2018-02-28 13:56 UTC (permalink / raw)
  To: stable; +Cc: Laura Abbott

Requesting backport of:

174134ac760275457bb0d1560a0dbe6cf8a12ad6
ipmi_si: Fix error handling of platform device

to 4.15 only.  Without it, an oops can occur in certain
situations.

Thanks,

-corey

^ permalink raw reply	[flat|nested] 33+ messages in thread
* Backport request
@ 2017-03-01 12:31 Juergen Gross
  2017-03-21  7:58 ` Juergen Gross
  2017-04-05 13:24 ` Ian Jackson
  0 siblings, 2 replies; 33+ messages in thread
From: Juergen Gross @ 2017-03-01 12:31 UTC (permalink / raw)
  To: xen-devel; +Cc: Ian Jackson, Jan Beulich

[-- Attachment #1: Type: text/plain, Size: 277 bytes --]

I'd like to request backport of upstream commit bc6a499ebcf1
("libxl: correct xenstore entry for empty cdrom") to at least
4.8 and 4.7.

As libxl sources have been split in 4.9 the patch doesn't apply.
Attached patch applies cleanly to 4.8 and with an offset to 4.7.


Juergen

[-- Attachment #2: cdrom.patch --]
[-- Type: text/x-patch, Size: 1614 bytes --]

>From bc6a499ebcf102060987fb845c1450a38de441c7 Mon Sep 17 00:00:00 2001
From: Juergen Gross <jgross@suse.com>
Date: Wed, 15 Feb 2017 12:11:12 +0100
Subject: [PATCH] libxl: correct xenstore entry for empty cdrom

Specifying an empty cdrom device will result in a Xenstore entry

params = aio:(null)

as the physical device path isn't existing. This lets a domain booted
via OVMF hang as OVMF is checking for "aio:" only in order to detect
the empty cdrom case.

Use an empty string for the physical device path in this case. As a
cdrom device for HVM is always backed by qdisk we only need to cover this
backend.

Signed-off-by: Juergen Gross <jgross@suse.com>
Acked-by: Wei Liu <wei.liu2@citrix.com>
---
 tools/libxl/libxl.c | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c
index ac49df2..63de75c 100644
--- a/tools/libxl/libxl.c
+++ b/tools/libxl/libxl.c
@@ -2255,7 +2255,8 @@ static void device_disk_add(libxl__egc *egc, uint32_t domid,
             case LIBXL_DISK_BACKEND_QDISK:
                 flexarray_append(back, "params");
                 flexarray_append(back, GCSPRINTF("%s:%s",
-                              libxl__device_disk_string_of_format(disk->format), disk->pdev_path));
+                              libxl__device_disk_string_of_format(disk->format),
+                              disk->pdev_path ? : ""));
                 if (libxl_defbool_val(disk->colo_enable)) {
                     flexarray_append(back, "colo-host");
                     flexarray_append(back, libxl__sprintf(gc, "%s", disk->colo_host));
-- 
2.1.4


[-- Attachment #3: Type: text/plain, Size: 127 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

^ permalink raw reply related	[flat|nested] 33+ messages in thread
* Backport request
@ 2014-01-13  9:49 Andrew Cooper
  2014-01-13 10:47 ` David Vrabel
  2014-01-13 11:13 ` Jan Beulich
  0 siblings, 2 replies; 33+ messages in thread
From: Andrew Cooper @ 2014-01-13  9:49 UTC (permalink / raw)
  To: Jan Beulich; +Cc: Xen-devel List

Hello,

Can you please backport c/s 0896bd8bea84526b00e00d2d076f4f953a3d73cb
"x86: map portion of kexec crash area that is within the direct map
area" to staging-4.3 ASAP, as following the backport of
8d611a00d3389d9c16506326e24145b94ac6fb86 "kexec/x86: do not map crash
kernel area", kexec loading is broken in exactly the same way as it was
in staging.

~Andrew

^ permalink raw reply	[flat|nested] 33+ messages in thread

end of thread, other threads:[~2023-08-01  7:24 UTC | newest]

Thread overview: 33+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-07-16 22:08 Backport request Thomas Gleixner
2019-07-16 23:01 ` Greg KH
2019-07-17 23:38 ` Sasha Levin
2019-07-18  7:57   ` Thomas Gleixner
  -- strict thread matches above, loose matches on Subject: below --
2023-08-01  7:17 Hemdan, Hagar Gamal Halim
2023-08-01  7:24 ` Greg KH
2023-07-25 11:13 backport request Ard Biesheuvel
2023-07-25 11:17 ` Ard Biesheuvel
2023-07-25 12:29 ` Greg KH
2023-07-25 12:51   ` Ard Biesheuvel
2023-07-25 13:21     ` Greg KH
2023-07-25 13:25       ` Ard Biesheuvel
2023-07-25 13:41         ` Greg KH
2023-07-25 13:48           ` Ard Biesheuvel
2023-07-27 10:59 ` Greg KH
2022-08-24 11:20 Backport request Juergen Gross
2022-08-24 12:10 ` Greg Kroah-Hartman
2022-08-24 13:52   ` Juergen Gross
2022-08-25 11:59     ` Greg Kroah-Hartman
2020-12-15 16:02 Daniel Vetter
2020-12-19 12:42 ` Greg KH
2020-12-19 13:56   ` Daniel Vetter
2018-02-28 13:56 Corey Minyard
2018-02-28 14:18 ` Greg KH
2017-03-01 12:31 Juergen Gross
2017-03-21  7:58 ` Juergen Gross
2017-04-05 13:24 ` Ian Jackson
2014-01-13  9:49 Andrew Cooper
2014-01-13 10:47 ` David Vrabel
2014-01-13 11:13 ` Jan Beulich
2014-01-13 11:30   ` David Vrabel
2014-01-13 11:36     ` Jan Beulich
2014-01-13 13:38       ` Daniel Kiper

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.