Andy Lutomirski wrote:
> > A kernel that allows users arbitrary access to ring 0 is just an
> > overfeatured bootloader. Why would you want secure boot in that case?
>
> To get a chain of trust.
You don't have a chain of trust that you can trust in that case.
David
#syz dup: general protection fault in __list_del_entry_valid (3)
> -Original Message-
> From: syzbot
> [mailto:syzbot+4859fe19555ea87c4...@syzkaller.appspotmail.com]
> Sent: Monday, April 02, 2018 02:01
> To: da...@davemloft.net; Jon Maloy ; linux-
>
Andy Lutomirski wrote:
> > A kernel that allows users arbitrary access to ring 0 is just an
> > overfeatured bootloader. Why would you want secure boot in that case?
>
> To get a chain of trust.
You don't have a chain of trust that you can trust in that case.
David
#syz dup: general protection fault in __list_del_entry_valid (3)
> -Original Message-
> From: syzbot
> [mailto:syzbot+4859fe19555ea87c4...@syzkaller.appspotmail.com]
> Sent: Monday, April 02, 2018 02:01
> To: da...@davemloft.net; Jon Maloy ; linux-
> ker...@vger.kernel.org;
On Tue, Apr 03, 2018 at 07:03:46PM +0200, Andreas Färber wrote:
> Hi Mani,
>
> Am 03.04.2018 um 19:00 schrieb Manivannan Sadhasivam:
> > On Sat, Mar 31, 2018 at 12:16:49AM +0300, Andy Shevchenko wrote:
> >> On Wed, Mar 28, 2018 at 8:46 PM, Manivannan Sadhasivam
> >>
On Tue, Apr 03, 2018 at 07:03:46PM +0200, Andreas Färber wrote:
> Hi Mani,
>
> Am 03.04.2018 um 19:00 schrieb Manivannan Sadhasivam:
> > On Sat, Mar 31, 2018 at 12:16:49AM +0300, Andy Shevchenko wrote:
> >> On Wed, Mar 28, 2018 at 8:46 PM, Manivannan Sadhasivam
> >> wrote:
> >>> +static const
On Tue, Apr 03, 2018 at 06:20:22PM +0900, SeongJae Park wrote:
> This patchset applies upstream changes for memory-barriers.txt to the Korean
> version of it.
>
> SeongJae Park (5):
> kokr/doc: READ_ONCE() now implies smp_barrier_depends()
> kokr/doc: De-emphasize smp_read_barrier_depends
>
On Tue, Apr 03, 2018 at 06:20:22PM +0900, SeongJae Park wrote:
> This patchset applies upstream changes for memory-barriers.txt to the Korean
> version of it.
>
> SeongJae Park (5):
> kokr/doc: READ_ONCE() now implies smp_barrier_depends()
> kokr/doc: De-emphasize smp_read_barrier_depends
>
The policy currently is to simply panic() on GHES fatal errors.
Oftentimes we may correct fatal errors
i.e. "Fatal" PCIe errors can be corrected via AER
When these errors are corrected, it doesn't make sense to panic().
Update ghes_do_proc() to return the severity of the worst error, while
The policy currently is to simply panic() on GHES fatal errors.
Oftentimes we may correct fatal errors
i.e. "Fatal" PCIe errors can be corrected via AER
When these errors are corrected, it doesn't make sense to panic().
Update ghes_do_proc() to return the severity of the worst error, while
There seems to be a culture amongst BIOS teams to want to crash the
OS when an error can't be handled in firmware. Marking GHES errors as
"fatal" is a very common way to do this.
However, a number of errors reported by GHES may be fatal in the sense
a device or link is lost, but are not fatal to
There seems to be a culture amongst BIOS teams to want to crash the
OS when an error can't be handled in firmware. Marking GHES errors as
"fatal" is a very common way to do this.
However, a number of errors reported by GHES may be fatal in the sense
a device or link is lost, but are not fatal to
Move ghes_print_queued_estatus() above ghes_proc_in_irq(). In a
subsequent patch, the NMI handler will be updated, and the print
functionality will be used in ghes_proc_in_irq.
This simply makes the subsequent diff look sane.
Signed-off-by: Alexandru Gagniuc
---
Move ghes_print_queued_estatus() above ghes_proc_in_irq(). In a
subsequent patch, the NMI handler will be updated, and the print
functionality will be used in ghes_proc_in_irq.
This simply makes the subsequent diff look sane.
Signed-off-by: Alexandru Gagniuc
---
drivers/acpi/apei/ghes.c | 40
BIOSes like to send NMIs for a number of silly reasons often deemed
to be "fatal". For example pin bounce during a PCIE hotplug/unplug
might cause the link to go down and retrain, with fatal PCI errors
being generated while the link is retraining.
Instead of panic()ing in NMI context, pass fatal
BIOSes like to send NMIs for a number of silly reasons often deemed
to be "fatal". For example pin bounce during a PCIE hotplug/unplug
might cause the link to go down and retrain, with fatal PCI errors
being generated while the link is retraining.
Instead of panic()ing in NMI context, pass fatal
Hi,
I'm helping out Dell work out through the issues related to PCIe and NVMe
hotplug. Although hot-plug generally works, there are corner cases such as
pin bounce, drives failing and surprise removal that are not 100% worked out.
Because of this, NVMe is not yet on feature parity with SCSI and
Hi,
I'm helping out Dell work out through the issues related to PCIe and NVMe
hotplug. Although hot-plug generally works, there are corner cases such as
pin bounce, drives failing and surprise removal that are not 100% worked out.
Because of this, NVMe is not yet on feature parity with SCSI and
On Tue, Apr 03, 2018 at 01:41:31PM +0200, Frederic Weisbecker wrote:
> On Mon, Apr 02, 2018 at 03:04:38PM -0700, Paul E. McKenney wrote:
> > Hello!
> >
> > I am hitting the following on today's mainline under rcutorture, but
> > only on scenarios built with CONFIG_NO_HZ_FULL=y:
> >
> >
The touch sensor buttons on Sony VAIO VGN-CS series laptops (e.g.
VGN-CS31S) are a separate PS/2 device. As the MUX is disabled for all
VAIO machines by the nomux blacklist, the data from touch sensor
buttons and touchpad are combined. The protocol used by the buttons is
probably similar to the
On Tue, Apr 03, 2018 at 01:41:31PM +0200, Frederic Weisbecker wrote:
> On Mon, Apr 02, 2018 at 03:04:38PM -0700, Paul E. McKenney wrote:
> > Hello!
> >
> > I am hitting the following on today's mainline under rcutorture, but
> > only on scenarios built with CONFIG_NO_HZ_FULL=y:
> >
> >
The touch sensor buttons on Sony VAIO VGN-CS series laptops (e.g.
VGN-CS31S) are a separate PS/2 device. As the MUX is disabled for all
VAIO machines by the nomux blacklist, the data from touch sensor
buttons and touchpad are combined. The protocol used by the buttons is
probably similar to the
On Tue, Apr 03, 2018 at 11:09:09AM +0200, Daniel Vetter wrote:
> On Thu, Mar 29, 2018 at 01:34:24PM +0200, Christian König wrote:
> > Am 29.03.2018 um 08:57 schrieb Daniel Vetter:
> > > On Sun, Mar 25, 2018 at 12:59:56PM +0200, Christian König wrote:
> > > > Add a peer2peer flag noting that the
On Tue, Apr 03, 2018 at 11:09:09AM +0200, Daniel Vetter wrote:
> On Thu, Mar 29, 2018 at 01:34:24PM +0200, Christian König wrote:
> > Am 29.03.2018 um 08:57 schrieb Daniel Vetter:
> > > On Sun, Mar 25, 2018 at 12:59:56PM +0200, Christian König wrote:
> > > > Add a peer2peer flag noting that the
On Tue, Apr 3, 2018 at 9:56 AM, Luis R. Rodriguez wrote:
> The biggest thing which has changed since then is that we decided to *not*
> support or streamline generic firmware signing (non-IMA) for now for a few
> reasons [0] [1] which are important to re-iterate as these are
On Tue, Apr 3, 2018 at 9:56 AM, Luis R. Rodriguez wrote:
> The biggest thing which has changed since then is that we decided to *not*
> support or streamline generic firmware signing (non-IMA) for now for a few
> reasons [0] [1] which are important to re-iterate as these are easy to forget,
> and
Hi Mani,
Am 03.04.2018 um 19:00 schrieb Manivannan Sadhasivam:
> On Sat, Mar 31, 2018 at 12:16:49AM +0300, Andy Shevchenko wrote:
>> On Wed, Mar 28, 2018 at 8:46 PM, Manivannan Sadhasivam
>> wrote:
>>> +static const struct pinconf_ops owl_pinconf_ops = {
>>> +
Hi Mani,
Am 03.04.2018 um 19:00 schrieb Manivannan Sadhasivam:
> On Sat, Mar 31, 2018 at 12:16:49AM +0300, Andy Shevchenko wrote:
>> On Wed, Mar 28, 2018 at 8:46 PM, Manivannan Sadhasivam
>> wrote:
>>> +static const struct pinconf_ops owl_pinconf_ops = {
>>> + .is_generic = true,
>>> +
On Sun, 2018-04-01 at 14:27 -0400, Wakko Warner wrote:
> Wakko Warner wrote:
> > Wakko Warner wrote:
> > > I tested 4.14.32 last night with the same oops. 4.9.91 works fine.
> > > From the initiator, if I do cat /dev/sr1 > /dev/null it works. If I mount
> > > /dev/sr1 and then do find -type f |
On 03/04/2018 17:37, Thierry Reding wrote:
On Tue, Apr 03, 2018 at 05:01:37PM +0100, John Garry wrote:
+int logic_pio_register_range(struct logic_pio_hwaddr *new_range)
+{
+ struct logic_pio_hwaddr *range;
+ resource_size_t start = new_range->hw_start;
+ resource_size_t end =
On Sun, 2018-04-01 at 14:27 -0400, Wakko Warner wrote:
> Wakko Warner wrote:
> > Wakko Warner wrote:
> > > I tested 4.14.32 last night with the same oops. 4.9.91 works fine.
> > > From the initiator, if I do cat /dev/sr1 > /dev/null it works. If I mount
> > > /dev/sr1 and then do find -type f |
On 03/04/2018 17:37, Thierry Reding wrote:
On Tue, Apr 03, 2018 at 05:01:37PM +0100, John Garry wrote:
+int logic_pio_register_range(struct logic_pio_hwaddr *new_range)
+{
+ struct logic_pio_hwaddr *range;
+ resource_size_t start = new_range->hw_start;
+ resource_size_t end =
On 04/02/2018 07:18 PM, Sean Wang wrote:
> On Mon, 2018-04-02 at 16:24 -0700, Florian Fainelli wrote:
>> We would be passing 0 instead of NULL as the rsp argument to
>> mt7530_fdb_cmd(), fix that.
>>
>
> Acked-by: Sean Wang
>
> BTW, does the part of the commit message
On 04/02/2018 07:18 PM, Sean Wang wrote:
> On Mon, 2018-04-02 at 16:24 -0700, Florian Fainelli wrote:
>> We would be passing 0 instead of NULL as the rsp argument to
>> mt7530_fdb_cmd(), fix that.
>>
>
> Acked-by: Sean Wang
>
> BTW, does the part of the commit message should be updated with
Hello,
syzbot hit the following crash on upstream commit
642e7fd23353e22290e3d51719fcb658dc252342 (Tue Apr 3 04:22:12 2018 +)
Merge branch 'syscalls-next' of
git://git.kernel.org/pub/scm/linux/kernel/git/brodo/linux
syzbot dashboard link:
Hello,
syzbot hit the following crash on upstream commit
642e7fd23353e22290e3d51719fcb658dc252342 (Tue Apr 3 04:22:12 2018 +)
Merge branch 'syscalls-next' of
git://git.kernel.org/pub/scm/linux/kernel/git/brodo/linux
syzbot dashboard link:
Hello,
syzbot hit the following crash on upstream commit
642e7fd23353e22290e3d51719fcb658dc252342 (Tue Apr 3 04:22:12 2018 +)
Merge branch 'syscalls-next' of
git://git.kernel.org/pub/scm/linux/kernel/git/brodo/linux
syzbot dashboard link:
On Tue, 2018-04-03 at 18:07 +0200, Daniel Kiper wrote:
> On Tue, Apr 03, 2018 at 08:44:41AM -0700, James Bottomley wrote:
> >
> > On Tue, 2018-04-03 at 16:39 +0200, Daniel Kiper wrote:
> > >
> > > Initialize UEFI secure boot state during dom0 boot. Otherwise the
> > > kernel may not even know
Hello,
syzbot hit the following crash on upstream commit
642e7fd23353e22290e3d51719fcb658dc252342 (Tue Apr 3 04:22:12 2018 +)
Merge branch 'syscalls-next' of
git://git.kernel.org/pub/scm/linux/kernel/git/brodo/linux
syzbot dashboard link:
On Tue, 2018-04-03 at 18:07 +0200, Daniel Kiper wrote:
> On Tue, Apr 03, 2018 at 08:44:41AM -0700, James Bottomley wrote:
> >
> > On Tue, 2018-04-03 at 16:39 +0200, Daniel Kiper wrote:
> > >
> > > Initialize UEFI secure boot state during dom0 boot. Otherwise the
> > > kernel may not even know
Hi Andy,
On Sat, Mar 31, 2018 at 12:16:49AM +0300, Andy Shevchenko wrote:
> On Wed, Mar 28, 2018 at 8:46 PM, Manivannan Sadhasivam
> wrote:
> > Add pinctrl driver for Actions Semi S900 SoC. The driver supports
> > pinctrl, pinmux and pinconf functionalities
Hi Andy,
On Sat, Mar 31, 2018 at 12:16:49AM +0300, Andy Shevchenko wrote:
> On Wed, Mar 28, 2018 at 8:46 PM, Manivannan Sadhasivam
> wrote:
> > Add pinctrl driver for Actions Semi S900 SoC. The driver supports
> > pinctrl, pinmux and pinconf functionalities through a range of registers
> >
This commit adds device tree description of Kieback & Peter GmbH
iMX6Q TPC board.
Signed-off-by: Lukasz Majewski
---
Changes for v2:
- SDPX license identifiers used
- Separate regulators
- Proper beeper driver
- Use of the lcd panel (with compatible) instead of timings provided
This commit adds device tree description of Kieback & Peter GmbH
iMX6Q TPC board.
Signed-off-by: Lukasz Majewski
---
Changes for v2:
- SDPX license identifiers used
- Separate regulators
- Proper beeper driver
- Use of the lcd panel (with compatible) instead of timings provided in
device tree
On Tue, 3 Apr 2018 18:11:19 +0200
Michal Hocko wrote:
> yes a fallback is questionable. Whether to make the batch size
> configuration is a matter of how much internal details you want to
> expose to userspace.
Well, it is tracing the guts of the kernel, so internal details
On Tue, 3 Apr 2018 18:11:19 +0200
Michal Hocko wrote:
> yes a fallback is questionable. Whether to make the batch size
> configuration is a matter of how much internal details you want to
> expose to userspace.
Well, it is tracing the guts of the kernel, so internal details are
generally
On Tue, Apr 03, 2018 at 01:27:36AM +, Simon Que wrote:
> Hi kernel community,
>
> We have an external PCIe board with a custom coprocessor on it. We also
> have code for a kernel driver for it. We have thought about upstreaming it,
> but we realized that we can instead convert the driver to a
On Tue, Apr 03, 2018 at 01:27:36AM +, Simon Que wrote:
> Hi kernel community,
>
> We have an external PCIe board with a custom coprocessor on it. We also
> have code for a kernel driver for it. We have thought about upstreaming it,
> but we realized that we can instead convert the driver to a
Signed-off-by: Andrea Parri
---
.../features/core/cBPF-JIT/arch-support.txt| 27 ++
.../features/core/eBPF-JIT/arch-support.txt| 27 ++
.../core/generic-idle-thread/arch-support.txt | 3 ++-
Signed-off-by: Andrea Parri
---
.../features/core/cBPF-JIT/arch-support.txt| 27 ++
.../features/core/eBPF-JIT/arch-support.txt| 27 ++
.../core/generic-idle-thread/arch-support.txt | 3 ++-
Signed-off-by: Andrea Parri
---
.../features/core/BPF-JIT/arch-support.txt | 31 --
.../features/core/cBPF-JIT/arch-support.txt| 5
.../features/core/eBPF-JIT/arch-support.txt| 5
3 files changed, 10
Signed-off-by: Andrea Parri
---
.../features/core/BPF-JIT/arch-support.txt | 31 --
.../features/core/cBPF-JIT/arch-support.txt| 5
.../features/core/eBPF-JIT/arch-support.txt| 5
3 files changed, 10 insertions(+), 31 deletions(-)
delete
In Ingo's words [1]:
"[...] what should be done instead is to write a script that refreshes
all the arch-support.txt files in-place. [...]
It's OK for the script to have various quirks for weirdly implemented
features and exceptions: i.e. basically whenever it gets a feature wrong,
In Ingo's words [1]:
"[...] what should be done instead is to write a script that refreshes
all the arch-support.txt files in-place. [...]
It's OK for the script to have various quirks for weirdly implemented
features and exceptions: i.e. basically whenever it gets a feature wrong,
Suggested-by: Ingo Molnar
Signed-off-by: Andrea Parri
---
Documentation/features/scripts/features-refresh.sh | 55 ++
1 file changed, 55 insertions(+)
create mode 100755 Documentation/features/scripts/features-refresh.sh
Suggested-by: Ingo Molnar
Signed-off-by: Andrea Parri
---
Documentation/features/scripts/features-refresh.sh | 55 ++
1 file changed, 55 insertions(+)
create mode 100755 Documentation/features/scripts/features-refresh.sh
diff --git
On Mon, Apr 02, 2018 at 05:42:22PM -0700, Andy Lutomirski wrote:
> On 11/10/2017 01:02 PM, Mimi Zohar wrote:
> > If the kernel is locked down and IMA-appraisal is not enabled, prevent
> > loading of unsigned firmware.
>
> > diff --git a/security/fw_lockdown/Kconfig b/security/fw_lockdown/Kconfig
On Mon, Apr 02, 2018 at 05:42:22PM -0700, Andy Lutomirski wrote:
> On 11/10/2017 01:02 PM, Mimi Zohar wrote:
> > If the kernel is locked down and IMA-appraisal is not enabled, prevent
> > loading of unsigned firmware.
>
> > diff --git a/security/fw_lockdown/Kconfig b/security/fw_lockdown/Kconfig
> -Original Message-
> From: Bjorn Helgaas [mailto:helg...@kernel.org]
> Sent: Tuesday, April 03, 2018 7:06 AM
> To: Jacob Keller
> Cc: Tal Gilboa ; Tariq Toukan ;
> Keller, Jacob E ; Ariel Elior
>
> -Original Message-
> From: Bjorn Helgaas [mailto:helg...@kernel.org]
> Sent: Tuesday, April 03, 2018 7:06 AM
> To: Jacob Keller
> Cc: Tal Gilboa ; Tariq Toukan ;
> Keller, Jacob E ; Ariel Elior
> ;
> Ganesh Goudar ; Kirsher, Jeffrey T
> ; everest-linux...@cavium.com; intel-wired-
>
Hello-
On Wed, Mar 14, 2018 at 04:14:34PM +0530, nagasureshkumarre...@gmail.com wrote:
> From: Naga Sureshkumar Relli
I'm pleased to see this patchset revived and resubmitted!
It would be easier to follow if you constructed your two patchsets with
git format-patch
Hello-
On Wed, Mar 14, 2018 at 04:14:34PM +0530, nagasureshkumarre...@gmail.com wrote:
> From: Naga Sureshkumar Relli
I'm pleased to see this patchset revived and resubmitted!
It would be easier to follow if you constructed your two patchsets with
git format-patch --thread.
Or, merge them
On Tue, Apr 03, 2018 at 08:48:27AM -0700, Tim Harvey wrote:
> On Wed, Mar 28, 2018 at 8:14 AM, Tim Harvey wrote:
> > The Gateworks System Controller (GSC) is an I2C slave controller
> > implemented with an MSP430 micro-controller whose firmware embeds the
> > following
On Tue, Apr 03, 2018 at 08:48:27AM -0700, Tim Harvey wrote:
> On Wed, Mar 28, 2018 at 8:14 AM, Tim Harvey wrote:
> > The Gateworks System Controller (GSC) is an I2C slave controller
> > implemented with an MSP430 micro-controller whose firmware embeds the
> > following features:
> > - I/O
On Tue, Apr 3, 2018 at 9:29 AM, Matthew Garrett wrote:
> On Tue, Apr 3, 2018 at 8:11 AM Andy Lutomirski wrote:
>> Can you explain that much more clearly? I'm asking why booting via
>> UEFI Secure Boot should enable lockdown, and I don't see what this has
>> to
On Tue, Apr 3, 2018 at 9:29 AM, Matthew Garrett wrote:
> On Tue, Apr 3, 2018 at 8:11 AM Andy Lutomirski wrote:
>> Can you explain that much more clearly? I'm asking why booting via
>> UEFI Secure Boot should enable lockdown, and I don't see what this has
>> to do with kexec. And "someone
On Tue, Apr 03, 2018 at 12:33:05PM -0400, David Miller wrote:
> Yes Al, however the pattern choosen here is probably cheaper on little endian:
>
> __beXX val = x;
> switch (val) {
> case htons(ETH_P_FOO):
>...
> }
>
> This way only the compiler byte swaps the
On Tue, Apr 03, 2018 at 12:33:05PM -0400, David Miller wrote:
> Yes Al, however the pattern choosen here is probably cheaper on little endian:
>
> __beXX val = x;
> switch (val) {
> case htons(ETH_P_FOO):
>...
> }
>
> This way only the compiler byte swaps the
Hi Linus,
Please pull Kconfig updates for 4.17.
The following changes since commit 0c8efd610b58cb23cefdfa12015799079aef94ae:
Linux 4.16-rc5 (2018-03-11 17:25:09 -0700)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/masahiroy/linux-kbuild.git
Hi Linus,
Please pull Kconfig updates for 4.17.
The following changes since commit 0c8efd610b58cb23cefdfa12015799079aef94ae:
Linux 4.16-rc5 (2018-03-11 17:25:09 -0700)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/masahiroy/linux-kbuild.git
Hi Viresh,
On 4/3/2018 9:53 AM, Viresh Kumar wrote:
> On 03-04-18, 08:11, Sricharan R wrote:
>> Right, i was adding a similar one for krait cores [1]. There is code common
>> in the
>> init sequence across both (little). Do you suggest to make them common ?
>
> It may make sense as we are
Hi Viresh,
On 4/3/2018 9:53 AM, Viresh Kumar wrote:
> On 03-04-18, 08:11, Sricharan R wrote:
>> Right, i was adding a similar one for krait cores [1]. There is code common
>> in the
>> init sequence across both (little). Do you suggest to make them common ?
>
> It may make sense as we are
On Tue, Apr 03, 2018 at 05:01:37PM +0100, John Garry wrote:
> > > > +int logic_pio_register_range(struct logic_pio_hwaddr *new_range)
> > > > +{
> > > > + struct logic_pio_hwaddr *range;
> > > > + resource_size_t start = new_range->hw_start;
> > > > + resource_size_t end =
On Tue, Apr 03, 2018 at 05:01:37PM +0100, John Garry wrote:
> > > > +int logic_pio_register_range(struct logic_pio_hwaddr *new_range)
> > > > +{
> > > > + struct logic_pio_hwaddr *range;
> > > > + resource_size_t start = new_range->hw_start;
> > > > + resource_size_t end =
- On Apr 2, 2018, at 11:33 AM, Mathieu Desnoyers
mathieu.desnoy...@efficios.com wrote:
> - On Apr 1, 2018, at 12:13 PM, One Thousand Gnomes
> gno...@lxorguk.ukuu.org.uk wrote:
>
>> On Tue, 27 Mar 2018 12:05:23 -0400
>> Mathieu Desnoyers wrote:
>>
>>>
- On Apr 2, 2018, at 11:33 AM, Mathieu Desnoyers
mathieu.desnoy...@efficios.com wrote:
> - On Apr 1, 2018, at 12:13 PM, One Thousand Gnomes
> gno...@lxorguk.ukuu.org.uk wrote:
>
>> On Tue, 27 Mar 2018 12:05:23 -0400
>> Mathieu Desnoyers wrote:
>>
>>> Expose a new system call allowing
From: Al Viro
Date: Tue, 3 Apr 2018 17:29:33 +0100
> On Mon, Apr 02, 2018 at 03:58:55PM -0700, Florian Fainelli wrote:
>> skb->protocol is a __be16 which we would be calling htons() against,
>> while this is not wrong per-se as it correctly results in swapping the
>>
From: Al Viro
Date: Tue, 3 Apr 2018 17:29:33 +0100
> On Mon, Apr 02, 2018 at 03:58:55PM -0700, Florian Fainelli wrote:
>> skb->protocol is a __be16 which we would be calling htons() against,
>> while this is not wrong per-se as it correctly results in swapping the
>> value on LE hosts, this
On Tue, Apr 03, 2018 at 04:47:31PM +0200, Arnd Bergmann wrote:
> On Sat, Mar 31, 2018 at 7:49 PM, Olof's autobuilder wrote:
>
> > Warnings:
> >
> > arm64.allmodconfig:
> > WARNING: modpost: missing MODULE_LICENSE() in
> > drivers/phy/qualcomm/phy-qcom-ufs.o
>
> This
On Tue, Apr 03, 2018 at 04:47:31PM +0200, Arnd Bergmann wrote:
> On Sat, Mar 31, 2018 at 7:49 PM, Olof's autobuilder wrote:
>
> > Warnings:
> >
> > arm64.allmodconfig:
> > WARNING: modpost: missing MODULE_LICENSE() in
> > drivers/phy/qualcomm/phy-qcom-ufs.o
>
> This needs a backport of
Hi Linus,
Please pull Kbuild updates for v4.17.
You will see a merge conflict in
arch/blackfin/kernel/bfin_ksyms.c
This file was already removed since
the blackfin support was entirely dropped.
So, please remove it.
The following changes since commit
Hi Linus,
Please pull Kbuild updates for v4.17.
You will see a merge conflict in
arch/blackfin/kernel/bfin_ksyms.c
This file was already removed since
the blackfin support was entirely dropped.
So, please remove it.
The following changes since commit
On 04/03/2018 05:26 AM, Sekhar Nori wrote:
On Friday 16 March 2018 08:22 AM, David Lechner wrote:
+static struct resource dm644x_pll1_resources[] = {
+ {
+ .start = DAVINCI_PLL1_BASE,
+ .end= DAVINCI_PLL1_BASE + SZ_4K - 1,
The .end should be
On 04/03/2018 05:26 AM, Sekhar Nori wrote:
On Friday 16 March 2018 08:22 AM, David Lechner wrote:
+static struct resource dm644x_pll1_resources[] = {
+ {
+ .start = DAVINCI_PLL1_BASE,
+ .end= DAVINCI_PLL1_BASE + SZ_4K - 1,
The .end should be
On Tue, Apr 3, 2018 at 8:11 AM Andy Lutomirski wrote:
> Can you explain that much more clearly? I'm asking why booting via
> UEFI Secure Boot should enable lockdown, and I don't see what this has
> to do with kexec. And "someone blacklist[ing] your key in the
> bootloader"
On Tue, Apr 3, 2018 at 8:11 AM Andy Lutomirski wrote:
> Can you explain that much more clearly? I'm asking why booting via
> UEFI Secure Boot should enable lockdown, and I don't see what this has
> to do with kexec. And "someone blacklist[ing] your key in the
> bootloader" sounds like a
On Mon, Apr 02, 2018 at 03:58:55PM -0700, Florian Fainelli wrote:
> skb->protocol is a __be16 which we would be calling htons() against,
> while this is not wrong per-se as it correctly results in swapping the
> value on LE hosts, this still upsets sparse. Adopt a similar pattern to
> what other
On Mon, Apr 02, 2018 at 03:58:55PM -0700, Florian Fainelli wrote:
> skb->protocol is a __be16 which we would be calling htons() against,
> while this is not wrong per-se as it correctly results in swapping the
> value on LE hosts, this still upsets sparse. Adopt a similar pattern to
> what other
On Tue, Apr 3, 2018 at 8:41 AM, Alexei Starovoitov
wrote:
> On Tue, Apr 03, 2018 at 08:11:07AM -0700, Andy Lutomirski wrote:
>> >
>> >> "bpf: Restrict kernel image access functions when the kernel is locked
>> >> down":
>> >> This patch just sucks in general.
>> >
On Tue, Apr 3, 2018 at 8:41 AM, Alexei Starovoitov
wrote:
> On Tue, Apr 03, 2018 at 08:11:07AM -0700, Andy Lutomirski wrote:
>> >
>> >> "bpf: Restrict kernel image access functions when the kernel is locked
>> >> down":
>> >> This patch just sucks in general.
>> >
>> > Yes - but that's what
On 04/03/2018 07:18 PM, Mark Brown wrote:
On Tue, Apr 03, 2018 at 07:00:55PM +0300, Sergey Suloev wrote:
On 04/03/2018 06:52 PM, Mark Brown wrote:
On Tue, Apr 03, 2018 at 06:29:00PM +0300, Sergey Suloev wrote:
As long as sun4i/sun6i SPI drivers have overriden the default
"wait for completion"
On 04/03/2018 07:18 PM, Mark Brown wrote:
On Tue, Apr 03, 2018 at 07:00:55PM +0300, Sergey Suloev wrote:
On 04/03/2018 06:52 PM, Mark Brown wrote:
On Tue, Apr 03, 2018 at 06:29:00PM +0300, Sergey Suloev wrote:
As long as sun4i/sun6i SPI drivers have overriden the default
"wait for completion"
On Mon, Apr 02, 2018 at 03:58:56PM -0700, Florian Fainelli wrote:
> skb->protocol is a __be16 which we would be calling htons() against,
> while this is not wrong per-se as it correctly results in swapping the
> value on LE hosts, this still upsets sparse. Adopt a similar pattern to
> what other
On Mon, Apr 02, 2018 at 03:58:56PM -0700, Florian Fainelli wrote:
> skb->protocol is a __be16 which we would be calling htons() against,
> while this is not wrong per-se as it correctly results in swapping the
> value on LE hosts, this still upsets sparse. Adopt a similar pattern to
> what other
On Tue, 2018-04-03 at 21:33 +0800, Xidong Wang wrote:
> From: Xidong Wang <2711406...@qq.com>
>
> In function fbtft_framebuffer_alloc(), the memory allocated by
> framebuffer_alloc() is not released on the error path that txbuflen > 0
> and txbuf, which holds the return value of devm_kzalloc(),
On Tue, 2018-04-03 at 21:33 +0800, Xidong Wang wrote:
> From: Xidong Wang <2711406...@qq.com>
>
> In function fbtft_framebuffer_alloc(), the memory allocated by
> framebuffer_alloc() is not released on the error path that txbuflen > 0
> and txbuf, which holds the return value of devm_kzalloc(),
On Tue, Apr 03, 2018 at 07:00:55PM +0300, Sergey Suloev wrote:
> On 04/03/2018 06:52 PM, Mark Brown wrote:
> > On Tue, Apr 03, 2018 at 06:29:00PM +0300, Sergey Suloev wrote:
> > > As long as sun4i/sun6i SPI drivers have overriden the default
> > > "wait for completion" procedure then we need to
On Tue, Apr 03, 2018 at 07:00:55PM +0300, Sergey Suloev wrote:
> On 04/03/2018 06:52 PM, Mark Brown wrote:
> > On Tue, Apr 03, 2018 at 06:29:00PM +0300, Sergey Suloev wrote:
> > > As long as sun4i/sun6i SPI drivers have overriden the default
> > > "wait for completion" procedure then we need to
Hi Jeffy,
Sorry for delayed response.
On Mon, Mar 26, 2018 at 1:58 AM JeffyChen wrote:
> Hi Daniel,
> Thanks for your reply.
> On 03/26/2018 02:31 PM, Daniel Kurtz wrote:
> >> >+struct rk_iommudata {
> >> >+ struct rk_iommu *iommu;
> >> >+};
> > Why do we
Hi Jeffy,
Sorry for delayed response.
On Mon, Mar 26, 2018 at 1:58 AM JeffyChen wrote:
> Hi Daniel,
> Thanks for your reply.
> On 03/26/2018 02:31 PM, Daniel Kurtz wrote:
> >> >+struct rk_iommudata {
> >> >+ struct rk_iommu *iommu;
> >> >+};
> > Why do we need this struct? Can't we
801 - 900 of 1836 matches
Mail list logo