Suspend with shallow wakes is not a useful parameter since the phenomena
does not exist on deployed devices and is only a parameter of use during
device power-on phase. The field always reads zero. Additionally there
are other easier methods to detect it, e.g., if the S0ix counter
increments by
Suspend with shallow wakes is not a useful parameter since the phenomena
does not exist on deployed devices and is only a parameter of use during
device power-on phase. The field always reads zero. Additionally there
are other easier methods to detect it, e.g., if the S0ix counter
increments by
Suspend stats are not reported consistently due to a limitation in the PMC
firmware. This limitation causes a delay in updating the s0ix counters and
residencies in the telemetry log upon s0ix exit. As a consequence, reading
these counters from the suspend-exit notifier may result in zero read.
Add intel_pmc_gcr_read64() API for reading from 64-bit GCR registers.
This API will be called from intel_telemetry. Update description of
intel_pmc_gcr_read().
Signed-off-by: Souvik Kumar Chakravarty
---
arch/x86/include/asm/intel_pmc_ipc.h | 6 ++
Suspend stats are not reported consistently due to a limitation in the PMC
firmware. This limitation causes a delay in updating the s0ix counters and
residencies in the telemetry log upon s0ix exit. As a consequence, reading
these counters from the suspend-exit notifier may result in zero read.
Add intel_pmc_gcr_read64() API for reading from 64-bit GCR registers.
This API will be called from intel_telemetry. Update description of
intel_pmc_gcr_read().
Signed-off-by: Souvik Kumar Chakravarty
---
arch/x86/include/asm/intel_pmc_ipc.h | 6 ++
drivers/platform/x86/intel_pmc_ipc.c | 33
This patch removes unnecessary header files and newlines.
It also fixes some alignment issues.
Signed-off-by: Souvik Kumar Chakravarty
---
drivers/platform/x86/intel_telemetry_debugfs.c | 13 +++--
1 file changed, 3 insertions(+), 10 deletions(-)
Changes
This patch removes unnecessary header files and newlines.
It also fixes some alignment issues.
Signed-off-by: Souvik Kumar Chakravarty
---
drivers/platform/x86/intel_telemetry_debugfs.c | 13 +++--
1 file changed, 3 insertions(+), 10 deletions(-)
Changes since v1:
* Consolidated
This patchset fixes https://bugzilla.kernel.org/show_bug.cgi?id=197833, and
other issues related to telemetry counters. It also cleans up formatting
and removes redundant code.
It is rebased on top of the TESTING branch.
Changes since v2:
* Changes in GCR read API name and adding back static
This patchset fixes https://bugzilla.kernel.org/show_bug.cgi?id=197833, and
other issues related to telemetry counters. It also cleans up formatting
and removes redundant code.
It is rebased on top of the TESTING branch.
Changes since v2:
* Changes in GCR read API name and adding back static
commit 7fb2b2d51 ("s390/virtio: remove the old KVM virtio transport")
dropped the transport support. We don't need to keep the header around.
Cc: Thomas Huth
Cc: Cornelia Huck
Cc: Halil Pasic
Cc: Heiko Carstens
The original intent of the virtio header relicensing
from 2008 was to make sure anyone can implement compatible
devices/drivers. The virtio-ccw was omitted by mistake.
We have an ack from the only contributor as well as the
maintainer from IBM, so it's not too late to fix that.
Make it
commit 7fb2b2d51 ("s390/virtio: remove the old KVM virtio transport")
dropped the transport support. We don't need to keep the header around.
Cc: Thomas Huth
Cc: Cornelia Huck
Cc: Halil Pasic
Cc: Heiko Carstens
Cc: Martin Schwidefsky
Signed-off-by: Michael S. Tsirkin
---
The original intent of the virtio header relicensing
from 2008 was to make sure anyone can implement compatible
devices/drivers. The virtio-ccw was omitted by mistake.
We have an ack from the only contributor as well as the
maintainer from IBM, so it's not too late to fix that.
Make it
On Wed, 22 Nov 2017 16:30:41 -0800
Solio Sarabia wrote:
> The netdevice gso_max_size is exposed to allow users fine-control on
> systems with multiple NICs with different GSO buffer sizes, and where
> the virtual devices like bridge and veth, need to be aware of the GSO
On Wed, 22 Nov 2017 16:30:41 -0800
Solio Sarabia wrote:
> The netdevice gso_max_size is exposed to allow users fine-control on
> systems with multiple NICs with different GSO buffer sizes, and where
> the virtual devices like bridge and veth, need to be aware of the GSO
> size of the underlying
Hi Sudip,
On Thu, 2017-11-23 at 23:01 +, Sudip Mukherjee wrote:
> Hi Alexey,
>
> On Thu, Nov 23, 2017 at 05:17:19PM +, Alexey Brodkin wrote:
> >
> > Hi Sudip,
> >
> > On Tue, 2017-11-21 at 22:10 +, Sudip Mukherjee wrote:
> > >
> > > The frv defconfig build is failing with the
Hi Sudip,
On Thu, 2017-11-23 at 23:01 +, Sudip Mukherjee wrote:
> Hi Alexey,
>
> On Thu, Nov 23, 2017 at 05:17:19PM +, Alexey Brodkin wrote:
> >
> > Hi Sudip,
> >
> > On Tue, 2017-11-21 at 22:10 +, Sudip Mukherjee wrote:
> > >
> > > The frv defconfig build is failing with the
On Wed, Nov 22, 2017 at 08:55:14AM +, Ard Biesheuvel wrote:
>
> Would this also fix it?
Looks good. Could you resubmit with a sign-off?
Thanks,
--
Email: Herbert Xu
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key:
On Wed, Nov 22, 2017 at 08:55:14AM +, Ard Biesheuvel wrote:
>
> Would this also fix it?
Looks good. Could you resubmit with a sign-off?
Thanks,
--
Email: Herbert Xu
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
Hello Dan,
On Thu, 2017-11-23 at 13:44 +0300, Dan Carpenter wrote:
> On Thu, Nov 23, 2017 at 09:27:19AM +0800, Ching Huang wrote:
> > From: Ching Huang
> >
> > Add module parameter msi_enable to has a chance to disable msi interrupt if
> > it does not work properly.
> >
Hello Dan,
On Thu, 2017-11-23 at 13:44 +0300, Dan Carpenter wrote:
> On Thu, Nov 23, 2017 at 09:27:19AM +0800, Ching Huang wrote:
> > From: Ching Huang
> >
> > Add module parameter msi_enable to has a chance to disable msi interrupt if
> > it does not work properly.
> >
> > Signed-off-by:
This will simplify future changes that want scratch variables early in
the SYSENTER handler -- they'll be able to spill registers to the
stack. It also lets us get rid of a SWAPGS_UNSAFE_STACK user.
This does not depend on CONFIG_IA32_EMULATION because we'll want the
stack space even without
This will simplify future changes that want scratch variables early in
the SYSENTER handler -- they'll be able to spill registers to the
stack. It also lets us get rid of a SWAPGS_UNSAFE_STACK user.
This does not depend on CONFIG_IA32_EMULATION because we'll want the
stack space even without
We currently have CPU 0's GDT at the top of the GDT range and
higher-numbered CPUs at lower addresses. This happens because the
fixmap is upside down (index 0 is the top of the fixmap).
Flip it so that GDTs are in ascending order by virtual address.
This will simplify a future patch that will
We currently have CPU 0's GDT at the top of the GDT range and
higher-numbered CPUs at lower addresses. This happens because the
fixmap is upside down (index 0 is the top of the fixmap).
Flip it so that GDTs are in ascending order by virtual address.
This will simplify a future patch that will
The cpu_entry_area will contain stacks. Make sure that KASAN has
appropriate shadow mappings for them.
Cc: Andrey Ryabinin
Cc: Alexander Potapenko
Cc: Dmitry Vyukov
Cc: kasan-...@googlegroups.com
Signed-off-by: Andy Lutomirski
get_stack_info() doesn't currently know about the SYSENTER stack, so
unwinding will fail if we entered the kernel on the SYSENTER stack
and haven't fully switched off. Teach get_stack_info() about the
SYSENTER stack.
With future patches applied that run part of the entry code on the
SYSENTER
The cpu_entry_area will contain stacks. Make sure that KASAN has
appropriate shadow mappings for them.
Cc: Andrey Ryabinin
Cc: Alexander Potapenko
Cc: Dmitry Vyukov
Cc: kasan-...@googlegroups.com
Signed-off-by: Andy Lutomirski
---
arch/x86/mm/kasan_init_64.c | 13 -
1 file
get_stack_info() doesn't currently know about the SYSENTER stack, so
unwinding will fail if we entered the kernel on the SYSENTER stack
and haven't fully switched off. Teach get_stack_info() about the
SYSENTER stack.
With future patches applied that run part of the entry code on the
SYSENTER
We currently special-case stack overflow on the task stack. We're
going to start putting special stacks in the fixmap with a custom
layout, so they'll have guard pages, too. Teach the unwinder to be
able to unwind an overflow of any of the stacks.
Reviewed-by: Borislav Petkov
We currently special-case stack overflow on the task stack. We're
going to start putting special stacks in the fixmap with a custom
layout, so they'll have guard pages, too. Teach the unwinder to be
able to unwind an overflow of any of the stacks.
Reviewed-by: Borislav Petkov
Signed-off-by:
On 64-bit kernels, we used to assume that TSS.sp0 was the current
top of stack. With the addition of an entry trampoline, this will
no longer be the case. Store the current top of stack in TSS.sp1,
which is otherwise unused but shares the same cacheline.
Reviewed-by: Thomas Gleixner
On 64-bit kernels, we used to assume that TSS.sp0 was the current
top of stack. With the addition of an entry trampoline, this will
no longer be the case. Store the current top of stack in TSS.sp1,
which is otherwise unused but shares the same cacheline.
Reviewed-by: Thomas Gleixner
This has a secondary purpose: it puts the entry stack into a region
with a well-controlled layout. A subsequent patch will take
advantage of this to streamline the SYSCALL entry code to be able to
find it more easily.
Reviewed-by: Thomas Gleixner
Signed-off-by: Andy
This has a secondary purpose: it puts the entry stack into a region
with a well-controlled layout. A subsequent patch will take
advantage of this to streamline the SYSCALL entry code to be able to
find it more easily.
Reviewed-by: Thomas Gleixner
Signed-off-by: Andy Lutomirski
---
SYSENTER_stack should have reliable overflow detection, which
means that it needs to be at the bottom of a page, not the top.
Move it to the beginning of struct tss_struct and page-align it.
Also add an assertion to make sure that the fixed hardware TSS
doesn't cross a page boundary.
SYSENTER_stack should have reliable overflow detection, which
means that it needs to be at the bottom of a page, not the top.
Move it to the beginning of struct tss_struct and page-align it.
Also add an assertion to make sure that the fixed hardware TSS
doesn't cross a page boundary.
Handling SYSCALL is tricky: the SYSCALL handler is entered with every
single register (except FLAGS), including RSP, live. It somehow needs
to set RSP to point to a valid stack, which means it needs to save the
user RSP somewhere and find its own stack pointer. The canonical way
to do this is
Handling SYSCALL is tricky: the SYSCALL handler is entered with every
single register (except FLAGS), including RSP, live. It somehow needs
to set RSP to point to a valid stack, which means it needs to save the
user RSP somewhere and find its own stack pointer. The canonical way
to do this is
In case something goes wrong with unwind (not unlikely in case of
overflow), print the offending IP where we detected the overflow.
Signed-off-by: Andy Lutomirski
---
arch/x86/kernel/irq_64.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git
In case something goes wrong with unwind (not unlikely in case of
overflow), print the offending IP where we detected the overflow.
Signed-off-by: Andy Lutomirski
---
arch/x86/kernel/irq_64.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kernel/irq_64.c
By itself, this is useless. It gives us the ability to run some final
code before exit that cannnot run on the kernel stack. This could
include a CR3 switch a la KAISER or some kernel stack erasing, for
example. (Or even weird things like *changing* which kernel stack
gets used as an
By itself, this is useless. It gives us the ability to run some final
code before exit that cannnot run on the kernel stack. This could
include a CR3 switch a la KAISER or some kernel stack erasing, for
example. (Or even weird things like *changing* which kernel stack
gets used as an
Now that the SYSENTER stack has a guard page, there's no need for a
canary to detect overflow after the fact.
Signed-off-by: Andy Lutomirski
---
arch/x86/include/asm/processor.h | 1 -
arch/x86/kernel/dumpstack.c | 3 +--
arch/x86/kernel/process.c| 1 -
Now that the SYSENTER stack has a guard page, there's no need for a
canary to detect overflow after the fact.
Signed-off-by: Andy Lutomirski
---
arch/x86/include/asm/processor.h | 1 -
arch/x86/kernel/dumpstack.c | 3 +--
arch/x86/kernel/process.c| 1 -
arch/x86/kernel/traps.c
That race has been fixed and code cleaned up for a while now.
Signed-off-by: Andy Lutomirski
---
arch/x86/kernel/irq.c | 12
1 file changed, 12 deletions(-)
diff --git a/arch/x86/kernel/irq.c b/arch/x86/kernel/irq.c
index 49cfd9fe7589..68e1867cca80 100644
---
Historically, IDT entries from usermode have always gone directly
to the running task's kernel stack. Rearrange it so that we enter on
a percpu trampoline stack and then manually switch to the task's stack.
This touches a couple of extra cachelines, but it gives us a chance
to run some code
Historically, IDT entries from usermode have always gone directly
to the running task's kernel stack. Rearrange it so that we enter on
a percpu trampoline stack and then manually switch to the task's stack.
This touches a couple of extra cachelines, but it gives us a chance
to run some code
That race has been fixed and code cleaned up for a while now.
Signed-off-by: Andy Lutomirski
---
arch/x86/kernel/irq.c | 12
1 file changed, 12 deletions(-)
diff --git a/arch/x86/kernel/irq.c b/arch/x86/kernel/irq.c
index 49cfd9fe7589..68e1867cca80 100644
---
The IST stacks are needed when an IST exception occurs and are
accessed before any kernel code at all runs. Move them into
cpu_entry_area.
Signed-off-by: Andy Lutomirski
---
arch/x86/include/asm/fixmap.h | 10 ++
arch/x86/kernel/cpu/common.c | 40
When we start using an entry trampoline, a #GP from userspace will
be delivered on the entry stack, not on the task stack. Fix the
espfix64 #DF fixup to set up #GP according to TSS.SP0, rather than
assuming that pt_regs + 1 == SP0. This won't change anything
without an entry stack, but it will
The IST stacks are needed when an IST exception occurs and are
accessed before any kernel code at all runs. Move them into
cpu_entry_area.
Signed-off-by: Andy Lutomirski
---
arch/x86/include/asm/fixmap.h | 10 ++
arch/x86/kernel/cpu/common.c | 40
When we start using an entry trampoline, a #GP from userspace will
be delivered on the entry stack, not on the task stack. Fix the
espfix64 #DF fixup to set up #GP according to TSS.SP0, rather than
assuming that pt_regs + 1 == SP0. This won't change anything
without an entry stack, but it will
Currently, the GDT is an ad-hoc array of pages, one per CPU, in the
fixmap. Generalize it to be an array of a new struct cpu_entry_area
so that we can cleanly add new things to it.
Reviewed-by: Thomas Gleixner
Signed-off-by: Andy Lutomirski
---
This sets up stack switching, including for SYSCALL. I think it's
in decent shape.
I'm fiddling with a patch to make the TSS remap read-only on 64-bit.
Known issues:
- I think we're going to want a way to turn the stack switching on and
off either at boot time or at runtime. It should be
The existing code was a mess, mainly because C arrays are nasty.
Turn SYSENTER_stack into a struct, add a helper to find it, and do
all the obvious cleanups this enables.
Signed-off-by: Andy Lutomirski
---
arch/x86/entry/entry_32.S| 4 ++--
arch/x86/entry/entry_64.S
This sets up stack switching, including for SYSCALL. I think it's
in decent shape.
I'm fiddling with a patch to make the TSS remap read-only on 64-bit.
Known issues:
- I think we're going to want a way to turn the stack switching on and
off either at boot time or at runtime. It should be
The existing code was a mess, mainly because C arrays are nasty.
Turn SYSENTER_stack into a struct, add a helper to find it, and do
all the obvious cleanups this enables.
Signed-off-by: Andy Lutomirski
---
arch/x86/entry/entry_32.S| 4 ++--
arch/x86/entry/entry_64.S| 2 +-
Currently, the GDT is an ad-hoc array of pages, one per CPU, in the
fixmap. Generalize it to be an array of a new struct cpu_entry_area
so that we can cleanly add new things to it.
Reviewed-by: Thomas Gleixner
Signed-off-by: Andy Lutomirski
---
arch/x86/include/asm/desc.h | 9 +
A future patch will move SYSENTER_stack to the beginning of cpu_tss
to help detect overflow. Before this can happen, fix several code
paths that hardcode assumptions about the old layout
Reviewed-by: Borislav Petkov
Reviewed-by: Thomas Gleixner
Signed-off-by:
A future patch will move SYSENTER_stack to the beginning of cpu_tss
to help detect overflow. Before this can happen, fix several code
paths that hardcode assumptions about the old layout
Reviewed-by: Borislav Petkov
Reviewed-by: Thomas Gleixner
Signed-off-by: Andy Lutomirski
---
On Nov 23, 2017, at 6:16 PM, Matthew Wilcox wrote:
>
> Here's the current state of the documentation for the XArray. Suggestions
> for improvement gratefully received.
>
> ==
> XArray
> ==
>
> Overview
>
>
> The XArray is an array of ULONG_MAX entries.
On Nov 23, 2017, at 6:16 PM, Matthew Wilcox wrote:
>
> Here's the current state of the documentation for the XArray. Suggestions
> for improvement gratefully received.
>
> ==
> XArray
> ==
>
> Overview
>
>
> The XArray is an array of ULONG_MAX entries. Each entry can be
On Thu, Nov 23, 2017 at 06:36:57AM -0800, Christoph Hellwig wrote:
> On Thu, Nov 23, 2017 at 03:02:05PM +0100, Marc-André Lureau wrote:
> > The following patch is going to use the symbol from the fw_cfg module,
> > to call the function and write the note location details in the
> > vmcoreinfo
On Thu, Nov 23, 2017 at 06:36:57AM -0800, Christoph Hellwig wrote:
> On Thu, Nov 23, 2017 at 03:02:05PM +0100, Marc-André Lureau wrote:
> > The following patch is going to use the symbol from the fw_cfg module,
> > to call the function and write the note location details in the
> > vmcoreinfo
On Thu, Nov 23, 2017 at 6:40 PM, Andy Lutomirski wrote:
> On Thu, Nov 23, 2017 at 12:37 PM, Borislav Petkov wrote:
>> On Thu, Nov 23, 2017 at 12:15:14PM -0800, Andy Lutomirski wrote:
>>> >> diff --git a/arch/x86/kernel/asm-offsets.c
>>> >>
On Thu, Nov 23, 2017 at 6:40 PM, Andy Lutomirski wrote:
> On Thu, Nov 23, 2017 at 12:37 PM, Borislav Petkov wrote:
>> On Thu, Nov 23, 2017 at 12:15:14PM -0800, Andy Lutomirski wrote:
>>> >> diff --git a/arch/x86/kernel/asm-offsets.c
>>> >> b/arch/x86/kernel/asm-offsets.c
>>> >> index
On Thu, Nov 23, 2017 at 3:44 PM, Thomas Gleixner wrote:
> On Tue, 21 Nov 2017, Andy Lutomirski wrote:
>> The asm isn't exactly beautiful,
>
> Delightful euphemism :)
>
>> but I think that fully refactoring
>> it can wait.
>
>> @@ -560,6 +560,14 @@ END(irq_entries_start)
>>
On Thu, Nov 23, 2017 at 3:44 PM, Thomas Gleixner wrote:
> On Tue, 21 Nov 2017, Andy Lutomirski wrote:
>> The asm isn't exactly beautiful,
>
> Delightful euphemism :)
>
>> but I think that fully refactoring
>> it can wait.
>
>> @@ -560,6 +560,14 @@ END(irq_entries_start)
>> .macro interrupt
Acked-by : sudeep
-Original Message-
From: Andreas Färber [mailto:afaer...@suse.de]
Sent: Tuesday, November 14, 2017 11:31 PM
To: linux-arm-ker...@lists.infradead.org
Cc: Thomas Liau ; Jeff Chen
;
Acked-by : sudeep
-Original Message-
From: Andreas Färber [mailto:afaer...@suse.de]
Sent: Tuesday, November 14, 2017 11:31 PM
To: linux-arm-ker...@lists.infradead.org
Cc: Thomas Liau ; Jeff Chen
; 张东风 ; 刘炜
; 张天益 ; 梅利
; Ioan B ; Sudeep Kumar
; linux-kernel@vger.kernel.org; Andreas
Acked-by : sudeep
-Original Message-
From: Andreas Färber [mailto:afaer...@suse.de]
Sent: Tuesday, November 14, 2017 11:31 PM
To: linux-arm-ker...@lists.infradead.org
Cc: Thomas Liau ; Jeff Chen
;
Acked-by : sudeep
-Original Message-
From: Andreas Färber [mailto:afaer...@suse.de]
Sent: Tuesday, November 14, 2017 11:31 PM
To: linux-arm-ker...@lists.infradead.org
Cc: Thomas Liau ; Jeff Chen
; 张东风 ; 刘炜
; 张天益 ; 梅利
; Ioan B ; Sudeep Kumar
; linux-kernel@vger.kernel.org; Andreas
Hi Linus,
This is an incremental pull on top of yesterdays, it contains all of that,
Summary from first pull:
This is just some bits and pieces for the second half of the merge window,
1. Remove the MSM dt-bindings file Rob managed to push in the previous pull.
2. Add a property/edid quirk to
Hi Linus,
This is an incremental pull on top of yesterdays, it contains all of that,
Summary from first pull:
This is just some bits and pieces for the second half of the merge window,
1. Remove the MSM dt-bindings file Rob managed to push in the previous pull.
2. Add a property/edid quirk to
On Mon, Nov 20, 2017 at 2:06 PM, Paolo Bonzini wrote:
>
> I am not including the host side of AMD SEV, because it wouldn't have gotten
> enough time in linux-next even with a "regular-length" merge window. It
> will be in 4.16.
So I pulled it, but then checked,
None of
On Mon, Nov 20, 2017 at 2:06 PM, Paolo Bonzini wrote:
>
> I am not including the host side of AMD SEV, because it wouldn't have gotten
> enough time in linux-next even with a "regular-length" merge window. It
> will be in 4.16.
So I pulled it, but then checked,
None of this was in linux-next
> On 23 Nov 2017, at 5:24 PM, Greg KH wrote:
>
> On Thu, Nov 23, 2017 at 04:53:41PM +0800, Kai Heng Feng wrote:
>>
>> What I want to do here is to finding this connection:
>> Realtek r8153 <-> SMSC hub (USD ID: 0424:5537) <->
>> ASMedia XHCI controller (PCI ID:
> On 23 Nov 2017, at 5:24 PM, Greg KH wrote:
>
> On Thu, Nov 23, 2017 at 04:53:41PM +0800, Kai Heng Feng wrote:
>>
>> What I want to do here is to finding this connection:
>> Realtek r8153 <-> SMSC hub (USD ID: 0424:5537) <->
>> ASMedia XHCI controller (PCI ID: 1b21:1142).
>>
>> Is there a
On Thu, Nov 23, 2017 at 4:37 AM, Richard Weinberger wrote:
>
> git://git.infradead.org/linux-ubifs.git tags/upstream-4.15-rc1
Similarly to the arch/um case, none of this seems to have been in
linux-next, and is sent late in the merge window, so I'm skipping it.
On Thu, Nov 23, 2017 at 4:37 AM, Richard Weinberger wrote:
>
> git://git.infradead.org/linux-ubifs.git tags/upstream-4.15-rc1
Similarly to the arch/um case, none of this seems to have been in
linux-next, and is sent late in the merge window, so I'm skipping it.
Linus
On Thu, Nov 23, 2017 at 4:36 AM, Richard Weinberger wrote:
>
> git://git.kernel.org/pub/scm/linux/kernel/git/rw/uml.git for-linus-4.15-rc1
I asked people to send me their pull requests early before I was
traveling, and this second week I'm only taking fixes, or things that
were
On Thu, Nov 23, 2017 at 4:36 AM, Richard Weinberger wrote:
>
> git://git.kernel.org/pub/scm/linux/kernel/git/rw/uml.git for-linus-4.15-rc1
I asked people to send me their pull requests early before I was
traveling, and this second week I'm only taking fixes, or things that
were in linux-next.
On Thu, 2017-11-23 at 04:57 -0800, Christoph Hellwig wrote:
> On Thu, Nov 23, 2017 at 09:22:03AM +0800, Ching Huang wrote:
> > From: Ching Huang
> >
> > Hi all,
> >
> > The following patches apply to Martin's 4.16/scsi-queue.
> >
> > Patch 1: Add module parameter
On Thu, 2017-11-23 at 04:57 -0800, Christoph Hellwig wrote:
> On Thu, Nov 23, 2017 at 09:22:03AM +0800, Ching Huang wrote:
> > From: Ching Huang
> >
> > Hi all,
> >
> > The following patches apply to Martin's 4.16/scsi-queue.
> >
> > Patch 1: Add module parameter msi_enable to has a chance to
On Thu, 2017-11-23 at 14:43 +0300, Dan Carpenter wrote:
> On Thu, Nov 23, 2017 at 09:31:14AM +0800, Ching Huang wrote:
> > @@ -829,12 +833,15 @@ arcmsr_request_irq(struct pci_dev *pdev,
> > unsigned long flags;
> > int nvec, i;
> >
> > + if (msix_enable == 0)
> > + goto
On Thu, 2017-11-23 at 14:43 +0300, Dan Carpenter wrote:
> On Thu, Nov 23, 2017 at 09:31:14AM +0800, Ching Huang wrote:
> > @@ -829,12 +833,15 @@ arcmsr_request_irq(struct pci_dev *pdev,
> > unsigned long flags;
> > int nvec, i;
> >
> > + if (msix_enable == 0)
> > + goto
On Thu, Nov 16, 2017 at 02:07:46PM +0100, Michal Hocko wrote:
> On Thu 16-11-17 21:48:05, Byungchul Park wrote:
> > On 11/16/2017 9:02 PM, Michal Hocko wrote:
> > > for each struct page. So you are doubling the size. Who is going to
> > > enable this config option? You are moving this to page_ext
On Thu, Nov 16, 2017 at 02:07:46PM +0100, Michal Hocko wrote:
> On Thu 16-11-17 21:48:05, Byungchul Park wrote:
> > On 11/16/2017 9:02 PM, Michal Hocko wrote:
> > > for each struct page. So you are doubling the size. Who is going to
> > > enable this config option? You are moving this to page_ext
tree: https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git WIP.x86/mm
head: 7d2da250f83856bbf697d58a3c10c5673e8146bc
commit: 93e8b1bed0d21ad5a5bf0e1151a9163a72f89072 [37/50] x86/mm/kaiser: Map
virtually-addressed performance monitoring buffers
config: i386-randconfig-x019-201747
tree: https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git WIP.x86/mm
head: 7d2da250f83856bbf697d58a3c10c5673e8146bc
commit: 93e8b1bed0d21ad5a5bf0e1151a9163a72f89072 [37/50] x86/mm/kaiser: Map
virtually-addressed performance monitoring buffers
config: i386-randconfig-x019-201747
On Fri, November 24, 2017 at 2:55 AM, Andy Shevchenko
wrote:
> On Tue, Nov 21, 2017 at 4:36 PM, Souvik Kumar Chakravarty
> wrote:
> > Suspend stats are not reported consistently due to a limitation in the
> > PMC firmware. This
On Fri, November 24, 2017 at 2:55 AM, Andy Shevchenko
wrote:
> On Tue, Nov 21, 2017 at 4:36 PM, Souvik Kumar Chakravarty
> wrote:
> > Suspend stats are not reported consistently due to a limitation in the
> > PMC firmware. This limitation causes a delay in updating the s0ix
> > counters and
From: Jacob Chen
This commit adds a subdev driver for Rockchip MIPI Synopsys DPHY driver.
The phy driver is kind of independent compare to the other parts, but i'd like
to keep it in rkisp1 driver, unless people want to generalize it
Signed-off-by: Jacob Chen
From: Jacob Chen
This commit adds a subdev driver for Rockchip MIPI Synopsys DPHY driver.
The phy driver is kind of independent compare to the other parts, but i'd like
to keep it in rkisp1 driver, unless people want to generalize it
Signed-off-by: Jacob Chen
Signed-off-by: Shunqian Zheng
Hi all,
Please do not add any v4.16 material to your linux-next included trees
until v4.15-rc1 has been released.
Changes since 20171123:
The drm tree gained a conflict against Linus' tree.
Non-merge commits (relative to Linus' tree): 766
849 files changed, 17680 insertions(+), 8497 deletions
Hi all,
Please do not add any v4.16 material to your linux-next included trees
until v4.15-rc1 has been released.
Changes since 20171123:
The drm tree gained a conflict against Linus' tree.
Non-merge commits (relative to Linus' tree): 766
849 files changed, 17680 insertions(+), 8497 deletions
On Thu, Nov 23, 2017 at 12:37 PM, Borislav Petkov wrote:
> On Thu, Nov 23, 2017 at 12:15:14PM -0800, Andy Lutomirski wrote:
>> >> diff --git a/arch/x86/kernel/asm-offsets.c b/arch/x86/kernel/asm-offsets.c
>> >> index b275863128eb..55858b277cf6 100644
>> >> ---
On Thu, Nov 23, 2017 at 12:37 PM, Borislav Petkov wrote:
> On Thu, Nov 23, 2017 at 12:15:14PM -0800, Andy Lutomirski wrote:
>> >> diff --git a/arch/x86/kernel/asm-offsets.c b/arch/x86/kernel/asm-offsets.c
>> >> index b275863128eb..55858b277cf6 100644
>> >> --- a/arch/x86/kernel/asm-offsets.c
>>
101 - 200 of 1220 matches
Mail list logo