> -Original Message-
> From: alexander.le...@verizon.com [mailto:alexander.le...@verizon.com]
> Sent: Thursday, November 16, 2017 4:56 PM
> To: Schmauss, Erik
> Cc: Moore, Robert ; linux-kernel@vger.kernel.org;
> sta...@vger.kernel.org;
In preparation to enabling -Wimplicit-fallthrough, mark switch cases
where we are expecting to fall through.
Notice that in this particular case I replaced "Fall" with a proper
"fall through" comment, which is what GCC is expecting to find.
Signed-off-by: Gustavo A. R. Silva
In preparation to enabling -Wimplicit-fallthrough, mark switch cases
where we are expecting to fall through.
Notice that in this particular case I replaced "Fall" with a proper
"fall through" comment, which is what GCC is expecting to find.
Signed-off-by: Gustavo A. R. Silva
---
> -Original Message-
> From: alexander.le...@verizon.com [mailto:alexander.le...@verizon.com]
> Sent: Thursday, November 16, 2017 4:56 PM
> To: Schmauss, Erik
> Cc: Moore, Robert ; linux-kernel@vger.kernel.org;
> sta...@vger.kernel.org; Wysocki, Rafael J
> Subject: RE: [PATCH AUTOSEL
On 11/20/2017 05:27 AM, Dou Liyang wrote:
> There are two consumers of apic=: the APIC debug level and the low
> level generic architecture code, but Linux just documented the first
> one.
>
> Append the second description.
>
> Signed-off-by: Dou Liyang
> ---
>
On 11/20/2017 05:27 AM, Dou Liyang wrote:
> There are two consumers of apic=: the APIC debug level and the low
> level generic architecture code, but Linux just documented the first
> one.
>
> Append the second description.
>
> Signed-off-by: Dou Liyang
> ---
>
On Fri, 10 Nov 2017, Dave Hansen wrote:
> diff -puN arch/x86/entry/entry_64.S~kaiser-base arch/x86/entry/entry_64.S
> --- a/arch/x86/entry/entry_64.S~kaiser-base 2017-11-10 11:22:09.007244950
> -0800
> +++ b/arch/x86/entry/entry_64.S 2017-11-10 11:22:09.031244950 -0800
> @@ -145,6 +145,16
On Fri, 10 Nov 2017, Dave Hansen wrote:
> diff -puN arch/x86/entry/entry_64.S~kaiser-base arch/x86/entry/entry_64.S
> --- a/arch/x86/entry/entry_64.S~kaiser-base 2017-11-10 11:22:09.007244950
> -0800
> +++ b/arch/x86/entry/entry_64.S 2017-11-10 11:22:09.031244950 -0800
> @@ -145,6 +145,16
On Sat, Nov 18, 2017 at 12:09:10PM -0800, Linus Torvalds wrote:
> On Sat, Nov 18, 2017 at 10:37 AM, Linus Torvalds
> wrote:
> >
> > So I note that you seem to use the same summary script that Darren used.
>
> .. oh, and I note a *much* worse issue.
>
> You add new
On Sat, Nov 18, 2017 at 12:09:10PM -0800, Linus Torvalds wrote:
> On Sat, Nov 18, 2017 at 10:37 AM, Linus Torvalds
> wrote:
> >
> > So I note that you seem to use the same summary script that Darren used.
>
> .. oh, and I note a *much* worse issue.
>
> You add new drivers and then default them
On Fri, 17 Nov 2017 16:13:45 -0500
Tony Krowiak wrote:
> On 11/16/2017 11:47 AM, Cornelia Huck wrote:
> > [Also, is IOMMU_API only needed to satisfy dependencies?]
> Yes, VFIO is dependent upon it.
Ah, my question was more whether we just need to make sure the
On Fri, 17 Nov 2017 16:13:45 -0500
Tony Krowiak wrote:
> On 11/16/2017 11:47 AM, Cornelia Huck wrote:
> > [Also, is IOMMU_API only needed to satisfy dependencies?]
> Yes, VFIO is dependent upon it.
Ah, my question was more whether we just need to make sure the api is
there, but do not need
On Mon, Nov 20, 2017 at 11:09:47AM -0600, Jeremy Linton wrote:
> Hi,
>
> On 11/20/2017 11:06 AM, Sudeep Holla wrote:
> >On Thu, Nov 09, 2017 at 03:03:05PM -0600, Jeremy Linton wrote:
> >>Its helpful to be able to lookup the acpi_processor_id
> >>associated with a logical cpu. Provide an arm64
>
On Mon, Nov 20, 2017 at 11:09:47AM -0600, Jeremy Linton wrote:
> Hi,
>
> On 11/20/2017 11:06 AM, Sudeep Holla wrote:
> >On Thu, Nov 09, 2017 at 03:03:05PM -0600, Jeremy Linton wrote:
> >>Its helpful to be able to lookup the acpi_processor_id
> >>associated with a logical cpu. Provide an arm64
>
On Fri, 17 Nov 2017 15:28:16 -0500
Tony Krowiak wrote:
> On 11/17/2017 05:07 AM, Cornelia Huck wrote:
> > On Fri, 17 Nov 2017 08:07:15 +0100
> > Pierre Morel wrote:
> >
> >> On 17/11/2017 00:35, Tony Krowiak wrote:
> >>> On 11/16/2017
On Fri, 17 Nov 2017 15:28:16 -0500
Tony Krowiak wrote:
> On 11/17/2017 05:07 AM, Cornelia Huck wrote:
> > On Fri, 17 Nov 2017 08:07:15 +0100
> > Pierre Morel wrote:
> >
> >> On 17/11/2017 00:35, Tony Krowiak wrote:
> >>> On 11/16/2017 03:25 PM, Pierre Morel wrote:
> On 16/11/2017
This sets up stack switching, including for SYSCALL. I think it's
in decent shape.
Known issues:
- KASAN is likely to be busted. This could be fixed either by teaching
KASAN that cpu_entry_area contains valid stacks (I have no clue how
to go about doing this) or by rigging up the IST
This sets up stack switching, including for SYSCALL. I think it's
in decent shape.
Known issues:
- KASAN is likely to be busted. This could be fixed either by teaching
KASAN that cpu_entry_area contains valid stacks (I have no clue how
to go about doing this) or by rigging up the IST
- On Nov 17, 2017, at 3:22 PM, Thomas Gleixner t...@linutronix.de wrote:
> On Fri, 17 Nov 2017, Mathieu Desnoyers wrote:
>> - On Nov 17, 2017, at 5:09 AM, Thomas Gleixner t...@linutronix.de wrote:
>> 7) Allow libraries with multi-part algorithms to work on same per-cpu
>>data without
- On Nov 17, 2017, at 3:22 PM, Thomas Gleixner t...@linutronix.de wrote:
> On Fri, 17 Nov 2017, Mathieu Desnoyers wrote:
>> - On Nov 17, 2017, at 5:09 AM, Thomas Gleixner t...@linutronix.de wrote:
>> 7) Allow libraries with multi-part algorithms to work on same per-cpu
>>data without
get_stack_info() doesn't currently know about the SYSENTER stack, so
unwinding will fail if we entered the kernel on the SYSENTER stack
and haven't fully switched off. Teach get_stack_info() about the
SYSENTER stack.
Signed-off-by: Andy Lutomirski
---
get_stack_info() doesn't currently know about the SYSENTER stack, so
unwinding will fail if we entered the kernel on the SYSENTER stack
and haven't fully switched off. Teach get_stack_info() about the
SYSENTER stack.
Signed-off-by: Andy Lutomirski
---
arch/x86/include/asm/stacktrace.h | 3 +++
We currently have CPU 0's GDT at the top of the GDT range and
higher-numbered CPUs at lower addreses. This happens because the
fixmap is upside down (index 0 is the top of the fixmap).
Flip it so that GDTs are in ascending order by virtual address.
This will simplify a future patch that will
This will simplify future changes that want scratch variables early in
the SYSENTER handler -- they'll be able to spill registers to the
stack. It also lets us get rid of a SWAPGS_UNSAFE_STACK user.
This does not depend on CONFIG_IA32_EMULATION because we'll want the
stack space even without
We currently have CPU 0's GDT at the top of the GDT range and
higher-numbered CPUs at lower addreses. This happens because the
fixmap is upside down (index 0 is the top of the fixmap).
Flip it so that GDTs are in ascending order by virtual address.
This will simplify a future patch that will
This will simplify future changes that want scratch variables early in
the SYSENTER handler -- they'll be able to spill registers to the
stack. It also lets us get rid of a SWAPGS_UNSAFE_STACK user.
This does not depend on CONFIG_IA32_EMULATION because we'll want the
stack space even without
I'm going to move SYSENTER_stack to the beginning of cpu_tss to help
detect overflow. Before this can happen, I need to fix several code
paths that hardcode assumptions about the old layout.
Signed-off-by: Andy Lutomirski
---
arch/x86/include/asm/desc.h | 2 +-
I'm going to move SYSENTER_stack to the beginning of cpu_tss to help
detect overflow. Before this can happen, I need to fix several code
paths that hardcode assumptions about the old layout.
Signed-off-by: Andy Lutomirski
---
arch/x86/include/asm/desc.h | 2 +-
Currently, the GDT is an ad-hoc array of pages, one per CPU, in the
fixmap. Generalize it to be an array of a new struct cpu_entry_area
so that we can cleanly add new things to it.
Signed-off-by: Andy Lutomirski
---
arch/x86/include/asm/desc.h | 9 +
I want SYSENTER_stack to have reliable overflow detection, which
means that it needs to be at the bottom of a page, not the top.
Move it to the beginning of struct tss_struct and page-align it.
Also add an assertion to make sure that the fixed hardware TSS
doesn't cross a page boundary.
Currently, the GDT is an ad-hoc array of pages, one per CPU, in the
fixmap. Generalize it to be an array of a new struct cpu_entry_area
so that we can cleanly add new things to it.
Signed-off-by: Andy Lutomirski
---
arch/x86/include/asm/desc.h | 9 +
arch/x86/include/asm/fixmap.h |
I want SYSENTER_stack to have reliable overflow detection, which
means that it needs to be at the bottom of a page, not the top.
Move it to the beginning of struct tss_struct and page-align it.
Also add an assertion to make sure that the fixed hardware TSS
doesn't cross a page boundary.
We currently special-case stack overflow on the task stack. We're
going to start putting special stacks in the fixmap with a custom
layout, so they'll have guard pages, too. Teach the unwinder to be
able to unwind an overflow of any of the stacks.
Signed-off-by: Andy Lutomirski
We currently special-case stack overflow on the task stack. We're
going to start putting special stacks in the fixmap with a custom
layout, so they'll have guard pages, too. Teach the unwinder to be
able to unwind an overflow of any of the stacks.
Signed-off-by: Andy Lutomirski
---
On 64-bit kernels, we used to assume that TSS.sp0 was the current
top of stack. With the addition of an entry trampoline, this will
no longer be the case. Store the current top of stack in TSS.sp1,
which is otherwise unused but shares the same cacheline.
Signed-off-by: Andy Lutomirski
On 64-bit kernels, we used to assume that TSS.sp0 was the current
top of stack. With the addition of an entry trampoline, this will
no longer be the case. Store the current top of stack in TSS.sp1,
which is otherwise unused but shares the same cacheline.
Signed-off-by: Andy Lutomirski
---
By itself, this is useless. It gives us the ability to run some final
code before exit that cannnot run on the kernel stack. This could
include a CR3 switch a la KAISER or some kernel stack erasing, for
example. (Or even weird things like *changing* which kernel stack
gets used as an
By itself, this is useless. It gives us the ability to run some final
code before exit that cannnot run on the kernel stack. This could
include a CR3 switch a la KAISER or some kernel stack erasing, for
example. (Or even weird things like *changing* which kernel stack
gets used as an
Hi,
On 11/20/2017 11:06 AM, Sudeep Holla wrote:
On Thu, Nov 09, 2017 at 03:03:05PM -0600, Jeremy Linton wrote:
Its helpful to be able to lookup the acpi_processor_id
associated with a logical cpu. Provide an arm64
helper to do this.
Signed-off-by: Jeremy Linton
---
Hi,
On 11/20/2017 11:06 AM, Sudeep Holla wrote:
On Thu, Nov 09, 2017 at 03:03:05PM -0600, Jeremy Linton wrote:
Its helpful to be able to lookup the acpi_processor_id
associated with a logical cpu. Provide an arm64
helper to do this.
Signed-off-by: Jeremy Linton
---
Historically, IDT entries from usermode have always gone directly
to the running task's kernel stack. Rearrange it so that we enter on
a percpu trampoline stack and then manually switch to the task's stack.
This touches a couple of extra cachelines, but it gives us a chance
to run some code
Historically, IDT entries from usermode have always gone directly
to the running task's kernel stack. Rearrange it so that we enter on
a percpu trampoline stack and then manually switch to the task's stack.
This touches a couple of extra cachelines, but it gives us a chance
to run some code
I've just updated a linux source tree to the latest version
(probably from Linus's public tree) and then tried to compile
it (for x86_64) using gcc 4.7.3 and binutils 2.32.2 on a
system running Ubuntu 13.10.
While not the newest gcc, it isn't that old.
The linker is reporting that some of the
That race has been fixed and code cleaned up for a while now.
---
arch/x86/kernel/irq.c | 12
1 file changed, 12 deletions(-)
diff --git a/arch/x86/kernel/irq.c b/arch/x86/kernel/irq.c
index 49cfd9fe7589..68e1867cca80 100644
--- a/arch/x86/kernel/irq.c
+++ b/arch/x86/kernel/irq.c
@@
I've just updated a linux source tree to the latest version
(probably from Linus's public tree) and then tried to compile
it (for x86_64) using gcc 4.7.3 and binutils 2.32.2 on a
system running Ubuntu 13.10.
While not the newest gcc, it isn't that old.
The linker is reporting that some of the
That race has been fixed and code cleaned up for a while now.
---
arch/x86/kernel/irq.c | 12
1 file changed, 12 deletions(-)
diff --git a/arch/x86/kernel/irq.c b/arch/x86/kernel/irq.c
index 49cfd9fe7589..68e1867cca80 100644
--- a/arch/x86/kernel/irq.c
+++ b/arch/x86/kernel/irq.c
@@
The IST stacks are needed when an IST exception occurs and are
accessed before any kernel code at all runs. Move them into
cpu_entry_area.
Signed-off-by: Andy Lutomirski
---
arch/x86/include/asm/fixmap.h | 10 ++
arch/x86/kernel/cpu/common.c | 40
The IST stacks are needed when an IST exception occurs and are
accessed before any kernel code at all runs. Move them into
cpu_entry_area.
Signed-off-by: Andy Lutomirski
---
arch/x86/include/asm/fixmap.h | 10 ++
arch/x86/kernel/cpu/common.c | 40
Handling SYSCALL is tricky: the SYSCALL handler is entered with every
single register (except FLAGS), including RSP, live. It somehow needs
to set RSP to point to a valid stack, which means it needs to save the
user RSP somewhere and find its own stack pointer. The canonical way
to do this is
In case something goes wrong with unwind (not unlikely in case of
overflow), print the offending IP where we detected the overflow.
---
arch/x86/kernel/irq_64.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kernel/irq_64.c b/arch/x86/kernel/irq_64.c
index
Hi Geert,
Le 20/11/2017 à 09:49, Geert Uytterhoeven a écrit :
> Hi Cyrille,
>
> On Fri, Nov 17, 2017 at 6:36 PM, Cyrille Pitchen
> wrote:
>> sorry but I won't apply this patch.
>>
>> New values for the 'compatible' DT properties should only be added for
>> memory
When we start using an entry trampoline, a #GP from userspace will
be delivered on the entry stack, not on the task stack. Fix the
espfix64 #DF fixup to set up #GP according to TSS.SP0, rather than
assuming that pt_regs + 1 == SP0. This won't change anything
without an entry stack, but it will
Handling SYSCALL is tricky: the SYSCALL handler is entered with every
single register (except FLAGS), including RSP, live. It somehow needs
to set RSP to point to a valid stack, which means it needs to save the
user RSP somewhere and find its own stack pointer. The canonical way
to do this is
In case something goes wrong with unwind (not unlikely in case of
overflow), print the offending IP where we detected the overflow.
---
arch/x86/kernel/irq_64.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kernel/irq_64.c b/arch/x86/kernel/irq_64.c
index
Hi Geert,
Le 20/11/2017 à 09:49, Geert Uytterhoeven a écrit :
> Hi Cyrille,
>
> On Fri, Nov 17, 2017 at 6:36 PM, Cyrille Pitchen
> wrote:
>> sorry but I won't apply this patch.
>>
>> New values for the 'compatible' DT properties should only be added for
>> memory parts not supporting the JEDEC
When we start using an entry trampoline, a #GP from userspace will
be delivered on the entry stack, not on the task stack. Fix the
espfix64 #DF fixup to set up #GP according to TSS.SP0, rather than
assuming that pt_regs + 1 == SP0. This won't change anything
without an entry stack, but it will
This has a secondary purpose: it puts the entry stack into a region
with a well-controlled layout. A subsequent patch will take
advantage of this to streamline the SYSCALL entry code to be able to
find it more easily.
Signed-off-by: Andy Lutomirski
---
This has a secondary purpose: it puts the entry stack into a region
with a well-controlled layout. A subsequent patch will take
advantage of this to streamline the SYSCALL entry code to be able to
find it more easily.
Signed-off-by: Andy Lutomirski
---
arch/x86/entry/entry_32.S | 6 --
"Michael Kerrisk (man-pages)" writes:
> On 08/16/2017 07:14 PM, Eric W. Biederman wrote:
>> Aleksa Sarai writes:
>>
A couple of things to note on the bigger picture.
The glibc library on all distributions has been changed to not have a
"Michael Kerrisk (man-pages)" writes:
> On 08/16/2017 07:14 PM, Eric W. Biederman wrote:
>> Aleksa Sarai writes:
>>
A couple of things to note on the bigger picture.
The glibc library on all distributions has been changed to not have a
setuid binary pt_chown, that uses
On Thu, Nov 09, 2017 at 03:03:05PM -0600, Jeremy Linton wrote:
> Its helpful to be able to lookup the acpi_processor_id
> associated with a logical cpu. Provide an arm64
> helper to do this.
>
> Signed-off-by: Jeremy Linton
> ---
> arch/arm64/include/asm/acpi.h | 4
>
In preparation to enabling -Wimplicit-fallthrough, mark switch cases
where we are expecting to fall through.
Notice that in this particular case I replaced "Fall" with a proper
"fall through" comment, which is what GCC is expecting to find.
Signed-off-by: Gustavo A. R. Silva
On Thu, Nov 09, 2017 at 03:03:05PM -0600, Jeremy Linton wrote:
> Its helpful to be able to lookup the acpi_processor_id
> associated with a logical cpu. Provide an arm64
> helper to do this.
>
> Signed-off-by: Jeremy Linton
> ---
> arch/arm64/include/asm/acpi.h | 4
> 1 file changed, 4
In preparation to enabling -Wimplicit-fallthrough, mark switch cases
where we are expecting to fall through.
Notice that in this particular case I replaced "Fall" with a proper
"fall through" comment, which is what GCC is expecting to find.
Signed-off-by: Gustavo A. R. Silva
---
Hi Yan Zi,
thanks for the feedback. Yes, it looks definitely less redundant :)
Regards,
Andrea
On Mon, Nov 20, 2017 at 11:33:06AM -0500, Zi Yan wrote:
> Hi Andrea,
>
> Thanks for pointing this out.
>
> I think the problem is that we should not prep_transhuge_page(new_page)
> unless new_page
Hi Yan Zi,
thanks for the feedback. Yes, it looks definitely less redundant :)
Regards,
Andrea
On Mon, Nov 20, 2017 at 11:33:06AM -0500, Zi Yan wrote:
> Hi Andrea,
>
> Thanks for pointing this out.
>
> I think the problem is that we should not prep_transhuge_page(new_page)
> unless new_page
On Mon, 20 Nov 2017 17:54:27 +0100,
Hans Peter Möller wrote:
>
> Hi, since for Kernel 4.14 the source was changed for the timer issue, I
> need to resend the patches to apply over 4.14 or it's no need for that?
Don't worry, your change was already in Linus tree, included in
4.15-rc1.
Takashi
On Mon, 20 Nov 2017 17:54:27 +0100,
Hans Peter Möller wrote:
>
> Hi, since for Kernel 4.14 the source was changed for the timer issue, I
> need to resend the patches to apply over 4.14 or it's no need for that?
Don't worry, your change was already in Linus tree, included in
4.15-rc1.
Takashi
Hi!
On Monday 20 November 2017 16:08:41 Oleksandr Natalenko wrote:
> Hi.
>
> I've got Dell Vostro 3360 with extra multimedia keys as shown here [1], but
> have no luck to get them working.
>
> I've modified dell_wmi_smbios_list structure in drivers/platform/x86/dell-
> wmi.c adding new entry:
Hi!
On Monday 20 November 2017 16:08:41 Oleksandr Natalenko wrote:
> Hi.
>
> I've got Dell Vostro 3360 with extra multimedia keys as shown here [1], but
> have no luck to get them working.
>
> I've modified dell_wmi_smbios_list structure in drivers/platform/x86/dell-
> wmi.c adding new entry:
> I am aware that Edison could run with a modified 4.4 kernel, I just
> don't know where the firmware is. I don't see anything for Merrifield in
> /lib/firmware/intel?
https://downloadmirror.intel.com/25028/eng/edison-image-from-src-package-ww25.5-15.zip
I have no idea why it never made it
> I am aware that Edison could run with a modified 4.4 kernel, I just
> don't know where the firmware is. I don't see anything for Merrifield in
> /lib/firmware/intel?
https://downloadmirror.intel.com/25028/eng/edison-image-from-src-package-ww25.5-15.zip
I have no idea why it never made it
Vitaly Kuznetsov writes:
> But adding such complexity to the code would require a good
> justification, of course.
Sorry for necroposting, I got distracted :-(
I think I was able to reproduce the reported regression. The reproducer
is dead simple, just several threads
Vitaly Kuznetsov writes:
> But adding such complexity to the code would require a good
> justification, of course.
Sorry for necroposting, I got distracted :-(
I think I was able to reproduce the reported regression. The reproducer
is dead simple, just several threads doing
merged into cifs-2.6.git for-next
On Sun, Nov 5, 2017 at 12:43 AM, Long Li wrote:
> From: Long Li
>
> The upper layer calls this function to connect to peer through SMB Direct.
> Each SMB Direct connection is based on a RDMA RC Queue Pair.
>
merged into cifs-2.6.git for-next
On Sun, Nov 5, 2017 at 12:43 AM, Long Li wrote:
> From: Long Li
>
> The upper layer calls this function to connect to peer through SMB Direct.
> Each SMB Direct connection is based on a RDMA RC Queue Pair.
>
> Signed-off-by: Long Li
> ---
>
merged into cifs-2.6.git for-next after cleaning up a couple checkpatch warnings
On Mon, Nov 20, 2017 at 1:37 AM, Leif Sahlberg wrote:
> Acked-by: Ronnie Sahlberg
>
>
> - Original Message -
> From: "Long Li"
> To:
Al, thanks for the detailed feedback. I didn't know about these rules
(are they written down somewhere?). I'll rework this and post a
compliant v3.
On Fri, Nov 17, 2017 at 11:31 AM, Al Viro wrote:
> On Thu, Nov 16, 2017 at 09:56:50AM -0800, Todd Kjos wrote:
>
>> +static
merged into cifs-2.6.git for-next after cleaning up a couple checkpatch warnings
On Mon, Nov 20, 2017 at 1:37 AM, Leif Sahlberg wrote:
> Acked-by: Ronnie Sahlberg
>
>
> - Original Message -
> From: "Long Li"
> To: "Steve French" , linux-c...@vger.kernel.org,
>
Al, thanks for the detailed feedback. I didn't know about these rules
(are they written down somewhere?). I'll rework this and post a
compliant v3.
On Fri, Nov 17, 2017 at 11:31 AM, Al Viro wrote:
> On Thu, Nov 16, 2017 at 09:56:50AM -0800, Todd Kjos wrote:
>
>> +static struct files_struct
On Thu, Nov 09, 2017 at 03:03:07PM -0600, Jeremy Linton wrote:
> The /sys cache entries should support ACPI/PPTT generated cache
> topology information. Lets detect ACPI systems and call
> an arch specific cache_setup_acpi() routine to update the hardware
> probed cache topology.
>
> For arm64,
On Thu, Nov 09, 2017 at 03:03:07PM -0600, Jeremy Linton wrote:
> The /sys cache entries should support ACPI/PPTT generated cache
> topology information. Lets detect ACPI systems and call
> an arch specific cache_setup_acpi() routine to update the hardware
> probed cache topology.
>
> For arm64,
On Sun, Nov 19, 2017 at 11:11 AM, Marek Vasut wrote:
> On 11/19/2017 06:38 PM, Gabriele Mazzotta wrote:
>> 2017-11-19 18:03 GMT+01:00 Jonathan Cameron :
>>> On Wed, 15 Nov 2017 20:27:54 -0700
>>> Kiernan Hager wrote:
>>>
This makes
Quoting Mimi Zohar (zo...@linux.vnet.ibm.com):
> On Mon, 2017-11-20 at 10:40 +0100, Roberto Sassu wrote:
> > On 11/19/2017 12:23 AM, Mimi Zohar wrote:
> > > Hi Serge,
> > >
> > > On Fri, 2017-11-17 at 22:20 -0600, Serge E. Hallyn wrote:
> > >> On Tue, Nov 07, 2017 at 11:37:01AM +0100, Roberto
On Sun, Nov 19, 2017 at 11:11 AM, Marek Vasut wrote:
> On 11/19/2017 06:38 PM, Gabriele Mazzotta wrote:
>> 2017-11-19 18:03 GMT+01:00 Jonathan Cameron :
>>> On Wed, 15 Nov 2017 20:27:54 -0700
>>> Kiernan Hager wrote:
>>>
This makes acpi-als properly enable the light sensor on the Zenbook
Quoting Mimi Zohar (zo...@linux.vnet.ibm.com):
> On Mon, 2017-11-20 at 10:40 +0100, Roberto Sassu wrote:
> > On 11/19/2017 12:23 AM, Mimi Zohar wrote:
> > > Hi Serge,
> > >
> > > On Fri, 2017-11-17 at 22:20 -0600, Serge E. Hallyn wrote:
> > >> On Tue, Nov 07, 2017 at 11:37:01AM +0100, Roberto
On 20/11/17 16:26, Konrad Rzeszutek Wilk wrote:
On Mon, Nov 20, 2017 at 08:17:14AM +, Eric Yang wrote:
Hi all,
Hi!
During debug a device only support 32bits DMA(Qualcomm Atheros AP) in our LS1043A 64bits ARM SOC, we
found that the invoke of dma_unmap_single -->
On 20/11/17 16:26, Konrad Rzeszutek Wilk wrote:
On Mon, Nov 20, 2017 at 08:17:14AM +, Eric Yang wrote:
Hi all,
Hi!
During debug a device only support 32bits DMA(Qualcomm Atheros AP) in our LS1043A 64bits ARM SOC, we
found that the invoke of dma_unmap_single -->
On Mon, Nov 20, 2017 at 8:29 AM, Russell King - ARM Linux
wrote:
> On Mon, Nov 20, 2017 at 09:56:21PM +0530, Arvind Yadav wrote:
>> The platform_get_irq() function returns negative if an error occurs.
>> zero or positive number on success. platform_get_irq() error checking
> On Nov 20, 2017, at 10:10 AM, Cyril Hrubis wrote:
>
> Hi!
>> So why didn???t we report these? As mentioned we???ve been tossing out dodgy
>> test cases to get to a clean baseline. We don???t need or want noise.
>>
>> For LTS, I want the system when it detects a failure to
On Mon, Nov 20, 2017 at 8:29 AM, Russell King - ARM Linux
wrote:
> On Mon, Nov 20, 2017 at 09:56:21PM +0530, Arvind Yadav wrote:
>> The platform_get_irq() function returns negative if an error occurs.
>> zero or positive number on success. platform_get_irq() error checking
>> for zero is not
> On Nov 20, 2017, at 10:10 AM, Cyril Hrubis wrote:
>
> Hi!
>> So why didn???t we report these? As mentioned we???ve been tossing out dodgy
>> test cases to get to a clean baseline. We don???t need or want noise.
>>
>> For LTS, I want the system when it detects a failure to enable a quick
On Sun, Jun 18, 2017 at 5:36 PM, NeilBrown wrote:
> On Sun, Jun 18 2017, Jens Axboe wrote:
>
>> On Sun, Jun 18 2017, NeilBrown wrote:
>>> This is a resend of my series of patches working
>>> towards removing the bioset work queues.
>>>
>>> This set is based on for-4.13/block.
>>>
On Sun, Jun 18, 2017 at 5:36 PM, NeilBrown wrote:
> On Sun, Jun 18 2017, Jens Axboe wrote:
>
>> On Sun, Jun 18 2017, NeilBrown wrote:
>>> This is a resend of my series of patches working
>>> towards removing the bioset work queues.
>>>
>>> This set is based on for-4.13/block.
>>>
>>> It
On 11/17, Yonghong Song wrote:
>
> On 11/17/17 9:25 AM, Oleg Nesterov wrote:
> >On 11/15, Yonghong Song wrote:
> >>
> >>v3 -> v4:
> >> . Revert most of v3 change as 32bit emulation is not really working
> >> on x86_64 platform as among other issues, function emulate_push_stack()
> >>
On 11/17, Yonghong Song wrote:
>
> On 11/17/17 9:25 AM, Oleg Nesterov wrote:
> >On 11/15, Yonghong Song wrote:
> >>
> >>v3 -> v4:
> >> . Revert most of v3 change as 32bit emulation is not really working
> >> on x86_64 platform as among other issues, function emulate_push_stack()
> >>
On Mon, 20 Nov 2017 17:29:53 +0100
Romain Perier wrote:
> So even if the correspondong syscall are disabled and the
> corresponding clocks too, you should return an -ENOSYS from the
> do_adjtimex helper, in case that another component tries to use it in
> the kernel,
On Mon, 20 Nov 2017 17:29:53 +0100
Romain Perier wrote:
> So even if the correspondong syscall are disabled and the
> corresponding clocks too, you should return an -ENOSYS from the
> do_adjtimex helper, in case that another component tries to use it in
> the kernel, right ?
Probably - but you
Ulf,
On 11/20/17 06:44, Mark Rutland wrote:
> On Sun, Nov 19, 2017 at 11:23:42PM -0500, Frank Rowand wrote:
>> adding devicetree list, devicetree maintainers
>>
>> On 11/18/17 12:59, Ulf Samuelsson wrote:
>>> I noticed when checking out the OpenWRT support for the board that they
>>> have a
Ulf,
On 11/20/17 06:44, Mark Rutland wrote:
> On Sun, Nov 19, 2017 at 11:23:42PM -0500, Frank Rowand wrote:
>> adding devicetree list, devicetree maintainers
>>
>> On 11/18/17 12:59, Ulf Samuelsson wrote:
>>> I noticed when checking out the OpenWRT support for the board that they
>>> have a
1001 - 1100 of 1784 matches
Mail list logo