If the interrupt destination mode of the APIC is physical then the
effective affinity is restricted to a single CPU.
Mark the interrupt accordingly in the domain allocation code, so the core
code can avoid pointless affinity setting attempts.
Signed-off-by: Thomas Gleixner
Affinity managed interrupts should keep their assigned affinity accross CPU
hotplug. To avoid magic hackery in device drivers, the core code shall
manage them transparently and set these interrupts into a managed shutdown
state when the last CPU of the assigned affinity mask goes offline. The
Affinity managed interrupts should keep their assigned affinity accross CPU
hotplug. To avoid magic hackery in device drivers, the core code shall
manage them transparently. This will set these interrupts into a managed
shutdown state when the last CPU of the assigned affinity mask goes
offline.
From: Christoph Hellwig
Currently the irq vector spread algorithm is restricted to online CPUs,
which ties the IRQ mapping to the currently online devices and doesn't deal
nicely with the fact that CPUs could come and go rapidly due to e.g. power
management.
Instead assign vectors
If the interrupt destination mode of the APIC is physical then the
effective affinity is restricted to a single CPU.
Mark the interrupt accordingly in the domain allocation code, so the core
code can avoid pointless affinity setting attempts.
Signed-off-by: Thomas Gleixner
---
Affinity managed interrupts should keep their assigned affinity accross CPU
hotplug. To avoid magic hackery in device drivers, the core code shall
manage them transparently and set these interrupts into a managed shutdown
state when the last CPU of the assigned affinity mask goes offline. The
Affinity managed interrupts should keep their assigned affinity accross CPU
hotplug. To avoid magic hackery in device drivers, the core code shall
manage them transparently. This will set these interrupts into a managed
shutdown state when the last CPU of the assigned affinity mask goes
offline.
From: Christoph Hellwig
Currently the irq vector spread algorithm is restricted to online CPUs,
which ties the IRQ mapping to the currently online devices and doesn't deal
nicely with the fact that CPUs could come and go rapidly due to e.g. power
management.
Instead assign vectors to all
Set the force migration flag when migrating interrupts away from an
outgoing CPU.
Signed-off-by: Thomas Gleixner
---
kernel/irq/cpuhotplug.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
--- a/kernel/irq/cpuhotplug.c
+++ b/kernel/irq/cpuhotplug.c
@@ -79,7 +79,7
Set the force migration flag when migrating interrupts away from an
outgoing CPU.
Signed-off-by: Thomas Gleixner
---
kernel/irq/cpuhotplug.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
--- a/kernel/irq/cpuhotplug.c
+++ b/kernel/irq/cpuhotplug.c
@@ -79,7 +79,7 @@ static bool
Same functionality except the extra bits ored on the apicid.
Signed-off-by: Thomas Gleixner
---
arch/x86/kernel/apic/x2apic_uv_x.c | 19 ---
1 file changed, 4 insertions(+), 15 deletions(-)
--- a/arch/x86/kernel/apic/x2apic_uv_x.c
+++
All callers hand in GPF_KERNEL. No point to have an extra argument for
that.
Signed-off-by: Thomas Gleixner
---
kernel/irq/irqdesc.c | 15 +++
1 file changed, 7 insertions(+), 8 deletions(-)
--- a/kernel/irq/irqdesc.c
+++ b/kernel/irq/irqdesc.c
@@ -54,14
Same functionality except the extra bits ored on the apicid.
Signed-off-by: Thomas Gleixner
---
arch/x86/kernel/apic/x2apic_uv_x.c | 19 ---
1 file changed, 4 insertions(+), 15 deletions(-)
--- a/arch/x86/kernel/apic/x2apic_uv_x.c
+++ b/arch/x86/kernel/apic/x2apic_uv_x.c
@@
All callers hand in GPF_KERNEL. No point to have an extra argument for
that.
Signed-off-by: Thomas Gleixner
---
kernel/irq/irqdesc.c | 15 +++
1 file changed, 7 insertions(+), 8 deletions(-)
--- a/kernel/irq/irqdesc.c
+++ b/kernel/irq/irqdesc.c
@@ -54,14 +54,14 @@ static void
Signed-off-by: Thomas Gleixner
---
arch/x86/include/asm/irq_remapping.h |1 -
arch/x86/kernel/apic/msi.c |6 --
2 files changed, 7 deletions(-)
--- a/arch/x86/include/asm/irq_remapping.h
+++ b/arch/x86/include/asm/irq_remapping.h
@@ -55,7 +55,6 @@
Signed-off-by: Thomas Gleixner
---
arch/x86/include/asm/irq_remapping.h |1 -
arch/x86/kernel/apic/msi.c |6 --
2 files changed, 7 deletions(-)
--- a/arch/x86/include/asm/irq_remapping.h
+++ b/arch/x86/include/asm/irq_remapping.h
@@ -55,7 +55,6 @@ extern struct irq_domain
Use the fwnode to create a named domain so diagnosis works.
Mark the init function __init while at it.
Signed-off-by: Thomas Gleixner
---
arch/x86/kernel/apic/htirq.c | 21 -
1 file changed, 16 insertions(+), 5 deletions(-)
---
Use the fwnode to create a named domain so diagnosis works.
Signed-off-by: Thomas Gleixner
---
arch/x86/platform/uv/uv_irq.c | 18 +-
1 file changed, 13 insertions(+), 5 deletions(-)
--- a/arch/x86/platform/uv/uv_irq.c
+++ b/arch/x86/platform/uv/uv_irq.c
Use the fwnode to create a named domain so diagnosis works.
Mark the init function __init while at it.
Signed-off-by: Thomas Gleixner
---
arch/x86/kernel/apic/htirq.c | 21 -
1 file changed, 16 insertions(+), 5 deletions(-)
--- a/arch/x86/kernel/apic/htirq.c
+++
Use the fwnode to create a named domain so diagnosis works.
Signed-off-by: Thomas Gleixner
---
arch/x86/platform/uv/uv_irq.c | 18 +-
1 file changed, 13 insertions(+), 5 deletions(-)
--- a/arch/x86/platform/uv/uv_irq.c
+++ b/arch/x86/platform/uv/uv_irq.c
@@ -160,13 +160,21 @@
On Tue, Jun 20, 2017 at 1:37 AM, Zheng, Lv wrote:
> Hi, Rafael
>
>> From: linux-acpi-ow...@vger.kernel.org
>> [mailto:linux-acpi-ow...@vger.kernel.org] On Behalf Of Rafael J.
>> Wysocki
>> Subject: [PATCH v2 3/3] ACPI / sleep: EC-based wakeup from suspend-to-idle
>> on
On Tue, Jun 20, 2017 at 1:37 AM, Zheng, Lv wrote:
> Hi, Rafael
>
>> From: linux-acpi-ow...@vger.kernel.org
>> [mailto:linux-acpi-ow...@vger.kernel.org] On Behalf Of Rafael J.
>> Wysocki
>> Subject: [PATCH v2 3/3] ACPI / sleep: EC-based wakeup from suspend-to-idle
>> on recent Dell systems
>>
>>
From: David Windsor
XFS inline inode data, stored in struct xfs_inode_t.i_df.if_u2.if_inline_data
and therefore contained in the xfs_inode slab cache, needs to be copied
to/from userspace.
In support of usercopy hardening, this patch defines a region in
the xfs_inode slab
From: David Windsor
Mark the kmalloc slab caches as entirely whitelisted. These
caches are frequently used to fulfill kernel allocations that contain
data to be copied to/from userspace. It is impossible to know
at build time what objects will be contained in these caches,
From: David Windsor
SCSI sense buffers, stored in struct scsi_cmnd.sense and therefore
contained in the scsi_sense_cache slab cache, need to be copied to/from
userspace.
In support of usercopy hardening, this patch defines a region in
the scsi_sense_cache slab cache in which
From: David Windsor
XFS inline inode data, stored in struct xfs_inode_t.i_df.if_u2.if_inline_data
and therefore contained in the xfs_inode slab cache, needs to be copied
to/from userspace.
In support of usercopy hardening, this patch defines a region in
the xfs_inode slab cache in which
From: David Windsor
Mark the kmalloc slab caches as entirely whitelisted. These
caches are frequently used to fulfill kernel allocations that contain
data to be copied to/from userspace. It is impossible to know
at build time what objects will be contained in these caches,
so the entire cache
From: David Windsor
SCSI sense buffers, stored in struct scsi_cmnd.sense and therefore
contained in the scsi_sense_cache slab cache, need to be copied to/from
userspace.
In support of usercopy hardening, this patch defines a region in
the scsi_sense_cache slab cache in which userspace copy
From: David Windsor
When a dentry name is short enough, it can be stored directly in
the dentry itself. These dentry short names, stored in struct
dentry.d_iname and therefore contained in the dentry_cache slab cache,
need to be coped to/from userspace.
In support of
With all known usercopied cache whitelists now defined in the kernel, switch
the default usercopy region of kmem_cache_create() to size 0. Any new caches
with usercopy regions will now need to use kmem_cache_create_usercopy()
instead of kmem_cache_create().
This patch is modified from Brad
From: David Windsor
When a dentry name is short enough, it can be stored directly in
the dentry itself. These dentry short names, stored in struct
dentry.d_iname and therefore contained in the dentry_cache slab cache,
need to be coped to/from userspace.
In support of usercopy hardening, this
With all known usercopied cache whitelists now defined in the kernel, switch
the default usercopy region of kmem_cache_create() to size 0. Any new caches
with usercopy regions will now need to use kmem_cache_create_usercopy()
instead of kmem_cache_create().
This patch is modified from Brad
Some hardened environments want to build kernels with slab_nomerge
already set (so that they do not depend on remembering to set the kernel
command line option). This is desired to reduce the risk of kernel heap
overflows being able to overwrite objects from merged caches, increasing
the
Some hardened environments want to build kernels with slab_nomerge
already set (so that they do not depend on remembering to set the kernel
command line option). This is desired to reduce the risk of kernel heap
overflows being able to overwrite objects from merged caches, increasing
the
From: David Windsor
vfs pathnames stored internally in inodes and contained in
the names_cache slab cache need to be copied to/from userspace.
In support of usercopy hardening, this patch defines the entire
cache object in the names_cache slab cache as whitelisted, since
it
From: David Windsor
vfs pathnames stored internally in inodes and contained in
the names_cache slab cache need to be copied to/from userspace.
In support of usercopy hardening, this patch defines the entire
cache object in the names_cache slab cache as whitelisted, since
it holds name strings
From: David Windsor
This patch adds the enforcement component of usercopy cache whitelisting,
and is modified from Brad Spengler/PaX Team's PAX_USERCOPY whitelisting
code in the last public patch of grsecurity/PaX based on my understanding
of the code. Changes or omissions
From: David Windsor
This patch adds the enforcement component of usercopy cache whitelisting,
and is modified from Brad Spengler/PaX Team's PAX_USERCOPY whitelisting
code in the last public patch of grsecurity/PaX based on my understanding
of the code. Changes or omissions from the original code
From: David Windsor
The mnt_id field can be copied with put_user(), so there is no need to
use copy_to_user(). In both cases, hardened usercopy is being bypassed
since the size is constant, and not open to runtime manipulation.
This patch is verbatim from Brad Spengler/PaX
From: David Windsor
This patch prepares the slab allocator to handle caches having annotations
(useroffset and usersize) defining usercopy regions.
This patch is modified from Brad Spengler/PaX Team's PAX_USERCOPY
whitelisting code in the last public patch of grsecurity/PaX
From: David Windsor
The mnt_id field can be copied with put_user(), so there is no need to
use copy_to_user(). In both cases, hardened usercopy is being bypassed
since the size is constant, and not open to runtime manipulation.
This patch is verbatim from Brad Spengler/PaX Team's PAX_USERCOPY
From: David Windsor
This patch prepares the slab allocator to handle caches having annotations
(useroffset and usersize) defining usercopy regions.
This patch is modified from Brad Spengler/PaX Team's PAX_USERCOPY
whitelisting code in the last public patch of grsecurity/PaX based on
my
From: David Windsor
The befs symlink pathnames, stored in struct befs_inode_info.i_data.symlink
and therefore contained in the befs_inode_cache slab cache, need to be
copied to/from userspace.
In support of usercopy hardening, this patch defines a region in
the
From: David Windsor
The befs symlink pathnames, stored in struct befs_inode_info.i_data.symlink
and therefore contained in the befs_inode_cache slab cache, need to be
copied to/from userspace.
In support of usercopy hardening, this patch defines a region in
the befs_inode_cache slab cache in
From: David Windsor
exofs short symlink names and device #'s, stored in struct
exofs_i_info.i_data and therefore contained in the exofs_inode_cache
slab cache, need to be copied to/from userspace.
In support of usercopy hardening, this patch defines a region in
the
From: David Windsor
exofs short symlink names and device #'s, stored in struct
exofs_i_info.i_data and therefore contained in the exofs_inode_cache
slab cache, need to be copied to/from userspace.
In support of usercopy hardening, this patch defines a region in
the exofs_inode_cache slab cache
From: David Windsor
cifs request buffers, stored in the cifs_request slab cache,
need to be copied to/from userspace.
In support of usercopy hardening, this patch defines a region in
the cifs_request slab cache in which userspace copy operations
are allowed.
This region is
From: David Windsor
cifs request buffers, stored in the cifs_request slab cache,
need to be copied to/from userspace.
In support of usercopy hardening, this patch defines a region in
the cifs_request slab cache in which userspace copy operations
are allowed.
This region is known as the slab
From: David Windsor
The orangefs symlink pathnames, stored in struct orangefs_inode_s.link_target
and therefore contained in the orangefs_inode_cache, need to be copied
to/from userspace.
In support of usercopy hardening, this patch defines a region in
the
From: David Windsor
The orangefs symlink pathnames, stored in struct orangefs_inode_s.link_target
and therefore contained in the orangefs_inode_cache, need to be copied
to/from userspace.
In support of usercopy hardening, this patch defines a region in
the orangefs_inode_cache slab cache in
From: David Windsor
The jfs symlink pathnames, stored in struct jfs_inode_info.i_inline
and therefore contained in the jfs_ip slab cache, need to be copied to/from
userspace.
In support of usercopy hardening, this patch defines a region in
the jfs_ip slab cache in which
From: David Windsor
The vxfs symlink pathnames, stored in struct vxfs_inode_info.vii_immed.vi_immed
and therefore contained in the vxfs_inode slab cache, need to be copied
to/from userspace.
In support of usercopy hardening, this patch defines a region in
the vxfs_inode slab
From: David Windsor
The jfs symlink pathnames, stored in struct jfs_inode_info.i_inline
and therefore contained in the jfs_ip slab cache, need to be copied to/from
userspace.
In support of usercopy hardening, this patch defines a region in
the jfs_ip slab cache in which userspace copy
From: David Windsor
The vxfs symlink pathnames, stored in struct vxfs_inode_info.vii_immed.vi_immed
and therefore contained in the vxfs_inode slab cache, need to be copied
to/from userspace.
In support of usercopy hardening, this patch defines a region in
the vxfs_inode slab cache in which
This series is modified from Brad Spengler/PaX Team's PAX_USERCOPY code
in the last public patch of grsecurity/PaX based on our understanding
of the code. Changes or omissions from the original code are ours and
don't reflect the original grsecurity/PaX code.
David Windsor did the bulk of the
From: David Windsor
The ext4 symlink pathnames, stored in struct ext4_inode_info.i_data
and therefore contained in the ext4_inode_cache slab cache, need
to be copied to/from userspace.
In support of usercopy hardening, this patch defines a region in
the ext4_inode_cache slab
From: David Windsor
The ext4 symlink pathnames, stored in struct ext4_inode_info.i_data
and therefore contained in the ext4_inode_cache slab cache, need
to be copied to/from userspace.
In support of usercopy hardening, this patch defines a region in
the ext4_inode_cache slab cache in which
This series is modified from Brad Spengler/PaX Team's PAX_USERCOPY code
in the last public patch of grsecurity/PaX based on our understanding
of the code. Changes or omissions from the original code are ours and
don't reflect the original grsecurity/PaX code.
David Windsor did the bulk of the
On 05/22, Leo Yan wrote:
> The timer will register into system at very early phase at kernel boot;
> if timer needs to use clock, the clock should be get ready in function
> of_clk_init() so later the timer driver probe can retrieve clock
> successfully. This is finished in below flow on arm64:
>
On 05/22, Leo Yan wrote:
> The timer will register into system at very early phase at kernel boot;
> if timer needs to use clock, the clock should be get ready in function
> of_clk_init() so later the timer driver probe can retrieve clock
> successfully. This is finished in below flow on arm64:
>
From: David Windsor
In support of usercopy hardening, this patch defines a region in
the thread_stack, task_struct and mm_struct slab caches in which
userspace copy operations are allowed. Since only a single whitelisted
buffer region is used, this moves the usercopyable
From: David Windsor
In support of usercopy hardening, this patch defines a region in
the thread_stack, task_struct and mm_struct slab caches in which
userspace copy operations are allowed. Since only a single whitelisted
buffer region is used, this moves the usercopyable fields next to each
Hi, Rafael
> From: linux-acpi-ow...@vger.kernel.org
> [mailto:linux-acpi-ow...@vger.kernel.org] On Behalf Of Rafael J.
> Wysocki
> Subject: [PATCH v2 3/3] ACPI / sleep: EC-based wakeup from suspend-to-idle on
> recent Dell systems
>
> From: Rafael J. Wysocki
>
>
From: David Windsor
The ufs symlink pathnames, stored in struct ufs_inode_info.i_u1.i_symlink
and therefore contained in the ufs_inode_cache slab cache, need to be copied
to/from userspace.
In support of usercopy hardening, this patch defines a region in the
ufs_inode_cache
Hi, Rafael
> From: linux-acpi-ow...@vger.kernel.org
> [mailto:linux-acpi-ow...@vger.kernel.org] On Behalf Of Rafael J.
> Wysocki
> Subject: [PATCH v2 3/3] ACPI / sleep: EC-based wakeup from suspend-to-idle on
> recent Dell systems
>
> From: Rafael J. Wysocki
>
> Some recent Dell laptops,
From: David Windsor
The ufs symlink pathnames, stored in struct ufs_inode_info.i_u1.i_symlink
and therefore contained in the ufs_inode_cache slab cache, need to be copied
to/from userspace.
In support of usercopy hardening, this patch defines a region in the
ufs_inode_cache slab cache in which
From: David Windsor
The autoclose field can be copied with put_user(), so there is no need to
use copy_to_user(). In both cases, hardened usercopy is being bypassed
since the size is constant, and not open to runtime manipulation.
This patch is verbatim from Brad Spengler/PaX
From: David Windsor
The autoclose field can be copied with put_user(), so there is no need to
use copy_to_user(). In both cases, hardened usercopy is being bypassed
since the size is constant, and not open to runtime manipulation.
This patch is verbatim from Brad Spengler/PaX Team's
From: David Windsor
The following objects need to be copied to/from userspace:
* sctp socket event notification subscription information
* ICMP filters for IPv4 and IPv6 raw sockets
* CAIF channel connection request parameters
These objects are stored in per-protocol
From: David Windsor
The ext2 symlink pathnames, stored in struct ext2_inode_info.i_data
and therefore contained in the ext2_inode_cache slab cache, need to be
copied to/from userspace.
In support of usercopy hardening, this patch defines a region in
the ext2_inode_cache slab
From: David Windsor
Some userspace APIs (e.g. ipc, seq_file) provide precise control over
the size of kernel kmallocs, which provides a trivial way to perform
heap overflow attacks where the attacker must control neighboring
allocations of a specific size. Instead, move these
From: David Windsor
The ext2 symlink pathnames, stored in struct ext2_inode_info.i_data
and therefore contained in the ext2_inode_cache slab cache, need to be
copied to/from userspace.
In support of usercopy hardening, this patch defines a region in
the ext2_inode_cache slab cache in which
From: David Windsor
Some userspace APIs (e.g. ipc, seq_file) provide precise control over
the size of kernel kmallocs, which provides a trivial way to perform
heap overflow attacks where the attacker must control neighboring
allocations of a specific size. Instead, move these APIs into their own
From: David Windsor
The following objects need to be copied to/from userspace:
* sctp socket event notification subscription information
* ICMP filters for IPv4 and IPv6 raw sockets
* CAIF channel connection request parameters
These objects are stored in per-protocol slabs.
In support
Add a missing lockdep_assert_held for pcpu_lock to improve consistency
and safety throughout mm/percpu.c.
Signed-off-by: Dennis Zhou
---
mm/percpu.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/mm/percpu.c b/mm/percpu.c
index e0aa8ae..f94a5eb 100644
--- a/mm/percpu.c
Add a missing lockdep_assert_held for pcpu_lock to improve consistency
and safety throughout mm/percpu.c.
Signed-off-by: Dennis Zhou
---
mm/percpu.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/mm/percpu.c b/mm/percpu.c
index e0aa8ae..f94a5eb 100644
--- a/mm/percpu.c
+++ b/mm/percpu.c
Migrates pcpu_chunk definition and a few percpu static variables to an
internal header file from mm/percpu.c. These will be used with debugfs
to expose statistics about percpu memory improving visibility regarding
allocations and fragmentation.
Signed-off-by: Dennis Zhou
---
Migrates pcpu_chunk definition and a few percpu static variables to an
internal header file from mm/percpu.c. These will be used with debugfs
to expose statistics about percpu memory improving visibility regarding
allocations and fragmentation.
Signed-off-by: Dennis Zhou
---
There is limited visibility into the percpu memory allocator making it hard to
understand usage patterns. Without these concrete numbers, we are left to
conjecture about the correctness of percpu memory patterns and usage.
Additionally, there is no mechanism to review the correctness/efficiency of
Add support for tracepoints to the following events: chunk allocation,
chunk free, area allocation, area free, and area allocation failure.
This should let us replay percpu memory requests and evaluate
corresponding decisions.
Signed-off-by: Dennis Zhou
---
Add support for tracepoints to the following events: chunk allocation,
chunk free, area allocation, area free, and area allocation failure.
This should let us replay percpu memory requests and evaluate
corresponding decisions.
Signed-off-by: Dennis Zhou
---
include/trace/events/percpu.h | 125
There is limited visibility into the percpu memory allocator making it hard to
understand usage patterns. Without these concrete numbers, we are left to
conjecture about the correctness of percpu memory patterns and usage.
Additionally, there is no mechanism to review the correctness/efficiency of
There is limited visibility into the use of percpu memory leaving us
unable to reason about correctness of parameters and overall use of
percpu memory. These counters and statistics aim to help understand
basic statistics about percpu memory such as number of allocations over
the lifetime,
There is limited visibility into the use of percpu memory leaving us
unable to reason about correctness of parameters and overall use of
percpu memory. These counters and statistics aim to help understand
basic statistics about percpu memory such as number of allocations over
the lifetime,
On Mon, Jun 19, 2017 at 01:02:18PM -0700, Laura Abbott wrote:
> On 06/19/2017 11:43 AM, Paul Donohue wrote:
> > I get the same results as you - x_max and y_max affect cursor speed, and
> > x_res and y_res seem to have no effect. I can't seem to come up with any
> > values that cause
On Mon, Jun 19, 2017 at 01:02:18PM -0700, Laura Abbott wrote:
> On 06/19/2017 11:43 AM, Paul Donohue wrote:
> > I get the same results as you - x_max and y_max affect cursor speed, and
> > x_res and y_res seem to have no effect. I can't seem to come up with any
> > values that cause
Nadav Amit wrote:
>>
> Just to clarify: I asked since I don’t understand how the interaction with
> PCID-unaware CR3 users go. Specifically, IIUC, arch_efi_call_virt_teardown()
> can reload CR3 with an old PCID value. No?
Please ignore this email. I realized it is not a
Nadav Amit wrote:
>>
> Just to clarify: I asked since I don’t understand how the interaction with
> PCID-unaware CR3 users go. Specifically, IIUC, arch_efi_call_virt_teardown()
> can reload CR3 with an old PCID value. No?
Please ignore this email. I realized it is not a problem.
Nadav
Andy Lutomirski wrote:
> On Sat, Jun 17, 2017 at 11:26 PM, Nadav Amit wrote:
>>> On Jun 13, 2017, at 9:56 PM, Andy Lutomirski wrote:
>>>
>>> PCID is a "process context ID" -- it's what other architectures call
>>> an address space ID.
Andy Lutomirski wrote:
> On Sat, Jun 17, 2017 at 11:26 PM, Nadav Amit wrote:
>>> On Jun 13, 2017, at 9:56 PM, Andy Lutomirski wrote:
>>>
>>> PCID is a "process context ID" -- it's what other architectures call
>>> an address space ID. Every non-global TLB entry is tagged with a
>>> PCID,
Hi Guenter,
On Mon, Jun 19, 2017 at 03:46:36PM -0700, Guenter Roeck wrote:
> Build results:
> total: 121 pass: 118 fail: 3
> Failed builds:
> arm:at91_dt_defconfig
> arm:sama5_defconfig
> s390:defconfig
>
> Qemu test results:
> total: 83 pass: 82 fail: 1
> Failed
Hi Guenter,
On Mon, Jun 19, 2017 at 03:46:36PM -0700, Guenter Roeck wrote:
> Build results:
> total: 121 pass: 118 fail: 3
> Failed builds:
> arm:at91_dt_defconfig
> arm:sama5_defconfig
> s390:defconfig
>
> Qemu test results:
> total: 83 pass: 82 fail: 1
> Failed
Hi Greg,
On 6/17/2017 2:38 PM, Greg KH wrote:
On Tue, Jun 13, 2017 at 09:40:11PM +0200, Luis R. Rodriguez wrote:
On Tue, Jun 13, 2017 at 11:05:48AM +0200, Greg KH wrote:
On Mon, Jun 05, 2017 at 02:39:33PM -0700, Luis R. Rodriguez wrote:
As the firmware API evolves we keep extending functions
Hi Greg,
On 6/17/2017 2:38 PM, Greg KH wrote:
On Tue, Jun 13, 2017 at 09:40:11PM +0200, Luis R. Rodriguez wrote:
On Tue, Jun 13, 2017 at 11:05:48AM +0200, Greg KH wrote:
On Mon, Jun 05, 2017 at 02:39:33PM -0700, Luis R. Rodriguez wrote:
As the firmware API evolves we keep extending functions
On Mon, Jun 19, 2017 at 11:15:00PM +0800, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 4.11.7 release.
> There are 78 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me
On Mon, Jun 19, 2017 at 11:15:00PM +0800, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 4.11.7 release.
> There are 78 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me
On Mon, Jun 19, 2017 at 11:20:44PM +0800, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 3.18.58 release.
> There are 32 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me
On Mon, Jun 19, 2017 at 11:20:44PM +0800, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 3.18.58 release.
> There are 32 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me
On Mon, Jun 19, 2017 at 08:28:19PM +0200, Willy Tarreau wrote:
> This is the start of the stable review cycle for the 3.10.107 release.
> All patches will be posted as a response to this one. If anyone has any
> issue with these being applied, please let me know. If anyone thinks some
> important
On Mon, Jun 19, 2017 at 08:28:19PM +0200, Willy Tarreau wrote:
> This is the start of the stable review cycle for the 3.10.107 release.
> All patches will be posted as a response to this one. If anyone has any
> issue with these being applied, please let me know. If anyone thinks some
> important
501 - 600 of 3154 matches
Mail list logo