Commit-ID: caeb5882979bc6f3c8766fcf59c6269b38f521bc
Gitweb: http://git.kernel.org/tip/caeb5882979bc6f3c8766fcf59c6269b38f521bc
Author: Matt Fleming
AuthorDate: Fri, 17 Feb 2017 12:07:31 +
Committer: Ingo Molnar
CommitDate: Thu, 16 Mar 2017 09:21:01 +0100
sched/loadavg: Use {READ
Commit-ID: 6e5f32f7a43f45ee55c401c0b9585eb01f9629a8
Gitweb: http://git.kernel.org/tip/6e5f32f7a43f45ee55c401c0b9585eb01f9629a8
Author: Matt Fleming <m...@codeblueprint.co.uk>
AuthorDate: Fri, 17 Feb 2017 12:07:30 +
Committer: Ingo Molnar <mi...@kernel.org>
CommitDate:
Commit-ID: 6e5f32f7a43f45ee55c401c0b9585eb01f9629a8
Gitweb: http://git.kernel.org/tip/6e5f32f7a43f45ee55c401c0b9585eb01f9629a8
Author: Matt Fleming
AuthorDate: Fri, 17 Feb 2017 12:07:30 +
Committer: Ingo Molnar
CommitDate: Thu, 16 Mar 2017 09:21:00 +0100
sched/loadavg: Avoid
se of all the DL double rq locking going on inside of
dl_task_offline_migration().
I'd definitely like someone else to verify, but this looks OK to me.
Reviewed-by: Matt Fleming <m...@codeblueprint.co.uk>
going on inside of
dl_task_offline_migration().
I'd definitely like someone else to verify, but this looks OK to me.
Reviewed-by: Matt Fleming
On Fri, 17 Feb, at 05:13:10PM, Kirill A. Shutemov wrote:
> Allocate additional page table level and change efi_sync_low_kernel_mappings()
> to make syncing logic work with additional page table level.
>
> Signed-off-by: Kirill A. Shutemov <kirill.shute...@linux.intel.com>
>
On Fri, 17 Feb, at 05:13:10PM, Kirill A. Shutemov wrote:
> Allocate additional page table level and change efi_sync_low_kernel_mappings()
> to make syncing logic work with additional page table level.
>
> Signed-off-by: Kirill A. Shutemov
> Cc: Matt Fleming
> ---
> arch/x8
On Tue, 28 Feb, at 01:20:25PM, Jan Kiszka wrote:
>
> From you POV, does this exclude upstream quirk support for already
> shipped devices?
It would need to be an extremely small, well-contained change, that
had no chance of disrupting other users of the capsule interface and
where I had a good
On Tue, 28 Feb, at 01:20:25PM, Jan Kiszka wrote:
>
> From you POV, does this exclude upstream quirk support for already
> shipped devices?
It would need to be an extremely small, well-contained change, that
had no chance of disrupting other users of the capsule interface and
where I had a good
On Fri, 17 Feb, at 10:24:41AM, Jan Kiszka wrote:
>
> I just can re-express my frustration that this essential step hasn't
> been started years ago by whoever designed the extension. Then I bet
> there would have been constructive feedback on the interface BEFORE its
> ugliness spread to broader
On Fri, 17 Feb, at 10:24:41AM, Jan Kiszka wrote:
>
> I just can re-express my frustration that this essential step hasn't
> been started years ago by whoever designed the extension. Then I bet
> there would have been constructive feedback on the interface BEFORE its
> ugliness spread to broader
16918c54e01802af4e891 Mon Sep 17 00:00:00 2001
From: Matt Fleming <m...@codeblueprint.co.uk>
Date: Mon, 27 Feb 2017 21:14:29 +
Subject: [PATCH] mm/memblock: Warn if used after slab is up and prevent memory
corruption
Historically there have been many memory corruption bugs caused by
using
16918c54e01802af4e891 Mon Sep 17 00:00:00 2001
From: Matt Fleming
Date: Mon, 27 Feb 2017 21:14:29 +
Subject: [PATCH] mm/memblock: Warn if used after slab is up and prevent memory
corruption
Historically there have been many memory corruption bugs caused by
using the memblock API after its int
On Fri, 24 Feb, at 05:19:03PM, Dave Jones wrote:
> Looks like fallout from cb42c9a3e23448c3f9a25417fae6309b1a92
>
> WARNING: CPU: 1 PID: 561 at kernel/sched/sched.h:812
> set_next_entity+0x11d/0x350
> rq->clock_update_flags < RQCF_ACT_SKIP
> CPU: 1 PID: 561 Comm: trinity-c36 Not tainted
On Fri, 24 Feb, at 05:19:03PM, Dave Jones wrote:
> Looks like fallout from cb42c9a3e23448c3f9a25417fae6309b1a92
>
> WARNING: CPU: 1 PID: 561 at kernel/sched/sched.h:812
> set_next_entity+0x11d/0x350
> rq->clock_update_flags < RQCF_ACT_SKIP
> CPU: 1 PID: 561 Comm: trinity-c36 Not tainted
On Thu, 23 Feb, at 11:27:55AM, Tom Lendacky wrote:
>
> I can do that, I'll change the return type to an int. For the
> !efi_enabled I can return -ENOTSUPP and for when an entry isn't
> found I can return -EINVAL. Sound good?
Sounds good to me!
On Thu, 23 Feb, at 11:27:55AM, Tom Lendacky wrote:
>
> I can do that, I'll change the return type to an int. For the
> !efi_enabled I can return -ENOTSUPP and for when an entry isn't
> found I can return -EINVAL. Sound good?
Sounds good to me!
On Wed, 22 Feb, at 12:41:01PM, Linus Torvalds wrote:
> Hmm. The scheduler changes seem to show problems with suspend/resume.
>
> I now get his when suspending:
>
> ...
> Disabling non-boot CPUs ...
> Cannot set affinity for irq 285
> smpboot: CPU 1 is now offline
> [ cut
On Wed, 22 Feb, at 12:41:01PM, Linus Torvalds wrote:
> Hmm. The scheduler changes seem to show problems with suspend/resume.
>
> I now get his when suspending:
>
> ...
> Disabling non-boot CPUs ...
> Cannot set affinity for irq 285
> smpboot: CPU 1 is now offline
> [ cut
ng rq clock after holding rq->lock/pi_lock
> just as what other dequeue + put_prev + enqueue + set_curr story does.
>
> Cc: Peter Zijlstra <pet...@infradead.org>
> Cc: Thomas Gleixner <t...@linutronix.de>
> Cc: Ingo Molnar <mi...@kernel.org>
> Cc: Matt Flem
q->lock/pi_lock
> just as what other dequeue + put_prev + enqueue + set_curr story does.
>
> Cc: Peter Zijlstra
> Cc: Thomas Gleixner
> Cc: Ingo Molnar
> Cc: Matt Fleming
> Signed-off-by: Wanpeng Li
> ---
> kernel/sched/core.c | 1 +
> 1 file changed, 1 insertion(+)
This looks correct. Thanks for doing it.
Reviewed-by: Matt Fleming
On Thu, 16 Feb, at 09:44:57AM, Tom Lendacky wrote:
> Update the efi_mem_type() to return EFI_RESERVED_TYPE instead of a
> hardcoded 0.
>
> Signed-off-by: Tom Lendacky
> ---
> arch/x86/platform/efi/efi.c |4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
>
>
On Thu, 16 Feb, at 09:44:57AM, Tom Lendacky wrote:
> Update the efi_mem_type() to return EFI_RESERVED_TYPE instead of a
> hardcoded 0.
>
> Signed-off-by: Tom Lendacky
> ---
> arch/x86/platform/efi/efi.c |4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
>
> diff --git
gwanakikb...@gmail.com>
Cc: Morten Rasmussen <morten.rasmus...@arm.com>
Cc: Vincent Guittot <vincent.guit...@linaro.org>
Cc: Frederic Weisbecker <fweis...@gmail.com>
Cc: <sta...@vger.kernel.org> # v3.5+
Signed-off-by: Matt Fleming <m...@codeblueprint.co.uk>
---
kernel/sched
uittot
Cc: Frederic Weisbecker
Cc: # v3.5+
Signed-off-by: Matt Fleming
---
kernel/sched/loadavg.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
Changes in v2:
- Folded in Peter's suggestion for how to fix this.
- Tried to clairfy the changelog based on feedback from Peter and
<umgwanakikb...@gmail.com>
Cc: Morten Rasmussen <morten.rasmus...@arm.com>
Cc: Vincent Guittot <vincent.guit...@linaro.org>
Signed-off-by: Matt Fleming <m...@codeblueprint.co.uk>
---
kernel/sched/loadavg.c | 18 +++---
1 file changed, 11 insertions(+), 7 del
2924.3038-1-m...@codeblueprint.co.uk
Matt Fleming (2):
sched/loadavg: Avoid loadavg spikes caused by delayed NO_HZ accounting
sched/loadavg: Use {READ,WRITE}_ONCE() for sample window
kernel/sched/loadavg.c | 20
1 file changed, 12 insertions(+), 8 deletions(-)
--
2.10.0
-by: Matt Fleming
---
kernel/sched/loadavg.c | 18 +++---
1 file changed, 11 insertions(+), 7 deletions(-)
diff --git a/kernel/sched/loadavg.c b/kernel/sched/loadavg.c
index ec91fcc09bfe..3f96a7d014ce 100644
--- a/kernel/sched/loadavg.c
+++ b/kernel/sched/loadavg.c
@@ -168,7 +168,7
2924.3038-1-m...@codeblueprint.co.uk
Matt Fleming (2):
sched/loadavg: Avoid loadavg spikes caused by delayed NO_HZ accounting
sched/loadavg: Use {READ,WRITE}_ONCE() for sample window
kernel/sched/loadavg.c | 20
1 file changed, 12 insertions(+), 8 deletions(-)
--
2.10.0
On Wed, 15 Feb, at 04:12:11PM, Frederic Weisbecker wrote:
> On Wed, Feb 08, 2017 at 01:29:24PM +0000, Matt Fleming wrote:
> > The calculation for the next sample window when exiting NOH_HZ idle
> > does not handle the fact that we may not have reached the next sample
On Wed, 15 Feb, at 04:12:11PM, Frederic Weisbecker wrote:
> On Wed, Feb 08, 2017 at 01:29:24PM +0000, Matt Fleming wrote:
> > The calculation for the next sample window when exiting NOH_HZ idle
> > does not handle the fact that we may not have reached the next sample
("sched/nohz: Rewrite and fix load-avg computation --
again")
Cc: Peter Zijlstra <pet...@infradead.org>
Cc: Mike Galbraith <umgwanakikb...@gmail.com>
Cc: Morten Rasmussen <morten.rasmus...@arm.com>
Cc: Vincent Guittot <vincent.guit...@linaro.org>
Cc: <sta...@vger.
("sched/nohz: Rewrite and fix load-avg computation --
again")
Cc: Peter Zijlstra
Cc: Mike Galbraith
Cc: Morten Rasmussen
Cc: Vincent Guittot
Cc: # v3.5+
Signed-off-by: Matt Fleming
---
kernel/sched/loadavg.c | 13 ++---
1 file changed, 10 insertions(+), 3 deletions(-)
di
d some of you test this? It seems to cure things in my (very)
> limited testing.
I haven't tested it but this looks like the correct fix to me.
Reviewed-by: Matt Fleming <m...@codeblueprint.co.uk>
is? It seems to cure things in my (very)
> limited testing.
I haven't tested it but this looks like the correct fix to me.
Reviewed-by: Matt Fleming
On Wed, 01 Feb, at 03:02:14PM, Ard Biesheuvel wrote:
>
> Let's wait for Matt to comment on the x86 bits before reissuing
> anything, but if the subsequent patches still apply cleanly, I don't
> think there is a need to resend or re-sign.
This all looks fine to me now, thanks for the re-work
On Wed, 01 Feb, at 03:02:14PM, Ard Biesheuvel wrote:
>
> Let's wait for Matt to comment on the x86 bits before reissuing
> anything, but if the subsequent patches still apply cleanly, I don't
> think there is a need to resend or re-sign.
This all looks fine to me now, thanks for the re-work
On Tue, 31 Jan, at 03:13:49PM, David Howells wrote:
> diff --git a/arch/x86/boot/compressed/eboot.c
> b/arch/x86/boot/compressed/eboot.c
> index f99978db6b6f..57c2c9c71e53 100644
> --- a/arch/x86/boot/compressed/eboot.c
> +++ b/arch/x86/boot/compressed/eboot.c
> @@ -988,6 +988,12 @@ struct
On Tue, 31 Jan, at 03:13:49PM, David Howells wrote:
> diff --git a/arch/x86/boot/compressed/eboot.c
> b/arch/x86/boot/compressed/eboot.c
> index f99978db6b6f..57c2c9c71e53 100644
> --- a/arch/x86/boot/compressed/eboot.c
> +++ b/arch/x86/boot/compressed/eboot.c
> @@ -988,6 +988,12 @@ struct
On Mon, 30 Jan, at 02:01:32PM, David Howells wrote:
> Matt Fleming <m...@codeblueprint.co.uk> wrote:
>
> > > Matt argues, however, that boot_params->secure_boot should be propagated
> > > from
> > > the bootloader and if the bootloader wants to set it,
On Mon, 30 Jan, at 02:01:32PM, David Howells wrote:
> Matt Fleming wrote:
>
> > > Matt argues, however, that boot_params->secure_boot should be propagated
> > > from
> > > the bootloader and if the bootloader wants to set it, then we should skip
> &
On Tue, 31 Jan, at 08:24:53AM, Michael Ellerman wrote:
>
> I'm hitting this on multiple powerpc systems:
>
> [ 38.339126] rq->clock_update_flags < RQCF_ACT_SKIP
> [ 38.339134] [ cut here ]
> [ 38.339142] WARNING: CPU: 2 PID: 1 at kernel/sched/sched.h:804
>
On Tue, 31 Jan, at 08:24:53AM, Michael Ellerman wrote:
>
> I'm hitting this on multiple powerpc systems:
>
> [ 38.339126] rq->clock_update_flags < RQCF_ACT_SKIP
> [ 38.339134] [ cut here ]
> [ 38.339142] WARNING: CPU: 2 PID: 1 at kernel/sched/sched.h:804
>
On Mon, 30 Jan, at 12:10:29PM, David Howells wrote:
>
> Matt argues, however, that boot_params->secure_boot should be propagated from
> the bootloader and if the bootloader wants to set it, then we should skip the
> check in efi_main() and go with the bootloader's opinion. This is something
> we
On Mon, 30 Jan, at 12:10:29PM, David Howells wrote:
>
> Matt argues, however, that boot_params->secure_boot should be propagated from
> the bootloader and if the bootloader wants to set it, then we should skip the
> check in efi_main() and go with the bootloader's opinion. This is something
> we
F_ACT_SKIP
The following patch queued in tip/sched/core should fix this issue:
>8
>From 4d25b35ea3729affd37d69c78191ce6f92766e1a Mon Sep 17 00:00:00 2001
From: Matt Fleming <m...@codeblueprint.co.uk>
Date: Wed, 26 Oct 2016 16:15:44 +0100
Subject: [PATCH] sched/fair: Restore pre
F_ACT_SKIP
The following patch queued in tip/sched/core should fix this issue:
>8
>From 4d25b35ea3729affd37d69c78191ce6f92766e1a Mon Sep 17 00:00:00 2001
From: Matt Fleming
Date: Wed, 26 Oct 2016 16:15:44 +0100
Subject: [PATCH] sched/fair: Restore previous rq_flags when
On Mon, 24 Oct, at 12:54:11PM, Laura Abbott wrote:
>
> Was out for a few days, reporter says the below patch does not work.
> There was some confusion with secure boot so I've asked them to re-test
> with efi=old_map and secure boot off.
FYI, you may want to ask the reporter to try out Jiri's
On Mon, 24 Oct, at 12:54:11PM, Laura Abbott wrote:
>
> Was out for a few days, reporter says the below patch does not work.
> There was some confusion with secure boot so I've asked them to re-test
> with efi=old_map and secure boot off.
FYI, you may want to ask the reporter to try out Jiri's
<b...@alien8.de>
Cc: Ard Biesheuvel <ard.biesheu...@linaro.org>
Fixes: 129766708 ("x86/efi: Only map RAM into EFI page tables if in mixed-mode")
Signed-off-by: Matt Fleming <m...@codeblueprint.co.uk>
---
arch/x86/platform/efi/efi_64.c | 16
1 file chan
Jiri Kosina
Cc: sta...@kernel.org # v4.8+
Cc: Waiman Long
Cc: Borislav Petkov
Cc: Laura Abbott
Cc: Vojtech Pavlik
Cc: Borislav Petkov
Cc: Ard Biesheuvel
Fixes: 129766708 ("x86/efi: Only map RAM into EFI page tables if in mixed-mode")
Signed-off-by: Matt Fleming
---
arch/
On Fri, 27 Jan, at 05:04:50PM, Ard Biesheuvel wrote:
> On 27 January 2017 at 14:48, Matt Fleming <m...@codeblueprint.co.uk> wrote:
> > On Fri, 13 Jan, at 05:29:52AM, Dave Young wrote:
> >>
> >> It sounds reasonable though I'm still not sure about EFI_LO
On Fri, 27 Jan, at 05:04:50PM, Ard Biesheuvel wrote:
> On 27 January 2017 at 14:48, Matt Fleming wrote:
> > On Fri, 13 Jan, at 05:29:52AM, Dave Young wrote:
> >>
> >> It sounds reasonable though I'm still not sure about EFI_LOADER*.
> >>
> >>
Folks, please pull the below fix from Jiri which fixes a triple fault
affecting the Lenovo Yogas since v4.8.
The following changes since commit 7a308bb3016f57e5be11a677d15b821536419d36:
Linux 4.10-rc5 (2017-01-22 12:54:15 -0800)
are available in the git repository at:
Folks, please pull the below fix from Jiri which fixes a triple fault
affecting the Lenovo Yogas since v4.8.
The following changes since commit 7a308bb3016f57e5be11a677d15b821536419d36:
Linux 4.10-rc5 (2017-01-22 12:54:15 -0800)
are available in the git repository at:
On Fri, 27 Jan, at 04:39:59PM, Jiri Kosina wrote:
> From: Jiri Kosina
>
> Commit 129766708 ("x86/efi: Only map RAM into EFI page tables if in
> mixed-mode") stopped creating 1:1 mapping for all RAM in case of running
> in native 64bit mode.
>
> It turns out though that there
On Fri, 27 Jan, at 04:39:59PM, Jiri Kosina wrote:
> From: Jiri Kosina
>
> Commit 129766708 ("x86/efi: Only map RAM into EFI page tables if in
> mixed-mode") stopped creating 1:1 mapping for all RAM in case of running
> in native 64bit mode.
>
> It turns out though that there are 64bit EFI
On Wed, 25 Jan, at 09:31:53PM, Jiri Kosina wrote:
>
> [ CCing mailinglists that got eaten by my newly configured mail setup,
> sorry for that ]
>
> On Wed, 25 Jan 2017, Jiri Kosina wrote:
>
> > From: Jiri Kosina
> >
> > Commit 129766708 ("x86/efi: Only map RAM into EFI
On Wed, 25 Jan, at 09:31:53PM, Jiri Kosina wrote:
>
> [ CCing mailinglists that got eaten by my newly configured mail setup,
> sorry for that ]
>
> On Wed, 25 Jan 2017, Jiri Kosina wrote:
>
> > From: Jiri Kosina
> >
> > Commit 129766708 ("x86/efi: Only map RAM into EFI page tables if in
>
On Fri, 13 Jan, at 05:29:52AM, Dave Young wrote:
>
> It sounds reasonable though I'm still not sure about EFI_LOADER*.
>
> The main purpose of this patch is to address the invalid mem ranges
> case. As Ard mentioned I will test with Peter's patch first, if it works
> fine I would like to either
On Fri, 13 Jan, at 05:29:52AM, Dave Young wrote:
>
> It sounds reasonable though I'm still not sure about EFI_LOADER*.
>
> The main purpose of this patch is to address the invalid mem ranges
> case. As Ard mentioned I will test with Peter's patch first, if it works
> fine I would like to either
On Mon, 23 Jan, at 10:11:43PM, David Howells wrote:
> Matt Fleming <m...@codeblueprint.co.uk> wrote:
>
> > > (4) extract_kernel() calls sanitize_boot_params() which would otherwise
> > > clear
> > > the secure-boot flag.
> >
> > The
On Mon, 23 Jan, at 10:11:43PM, David Howells wrote:
> Matt Fleming wrote:
>
> > > (4) extract_kernel() calls sanitize_boot_params() which would otherwise
> > > clear
> > > the secure-boot flag.
> >
> > The ->sentinel flag should be clear (
On Mon, 16 Jan, at 03:39:18PM, David Howells wrote:
> Matt Fleming <m...@codeblueprint.co.uk> wrote:
>
> > On Wed, 11 Jan, at 03:27:23PM, David Howells wrote:
> > > Matt Fleming <m...@codeblueprint.co.uk> wrote:
> > >
> > > > >
On Mon, 16 Jan, at 03:39:18PM, David Howells wrote:
> Matt Fleming wrote:
>
> > On Wed, 11 Jan, at 03:27:23PM, David Howells wrote:
> > > Matt Fleming wrote:
> > >
> > > > > + movb$0, BP_secure_boot(%rsi)
> > > > > #ifdef CON
(Cc'ing Peter A. and Peter J. for boot params discussion)
On Wed, 11 Jan, at 03:27:23PM, David Howells wrote:
> Matt Fleming <m...@codeblueprint.co.uk> wrote:
>
> > > + movb$0, BP_secure_boot(%rsi)
> > > #ifdef CONFIG_EFI_STUB
> > > /*
> > >
(Cc'ing Peter A. and Peter J. for boot params discussion)
On Wed, 11 Jan, at 03:27:23PM, David Howells wrote:
> Matt Fleming wrote:
>
> > > + movb$0, BP_secure_boot(%rsi)
> > > #ifdef CONFIG_EFI_STUB
> > > /*
> > >* The entry point for
On Wed, 11 Jan, at 03:29:24PM, David Howells wrote:
> Matt Fleming <m...@codeblueprint.co.uk> wrote:
>
> > Before we add more efi.flags bits I'd like this series to include the
> > patch that makes use of EFI_SECURE_BOOT. Alternatively, you move this
> > last patch
On Wed, 11 Jan, at 03:29:24PM, David Howells wrote:
> Matt Fleming wrote:
>
> > Before we add more efi.flags bits I'd like this series to include the
> > patch that makes use of EFI_SECURE_BOOT. Alternatively, you move this
> > last patch to a new series.
>
> Are
Commit-ID: cb42c9a3e23448c3f9a25417fae6309b1a92
Gitweb: http://git.kernel.org/tip/cb42c9a3e23448c3f9a25417fae6309b1a92
Author: Matt Fleming <m...@codeblueprint.co.uk>
AuthorDate: Wed, 21 Sep 2016 14:38:13 +0100
Committer: Ingo Molnar <mi...@kernel.org>
CommitDate:
Commit-ID: cb42c9a3e23448c3f9a25417fae6309b1a92
Gitweb: http://git.kernel.org/tip/cb42c9a3e23448c3f9a25417fae6309b1a92
Author: Matt Fleming
AuthorDate: Wed, 21 Sep 2016 14:38:13 +0100
Committer: Ingo Molnar
CommitDate: Sat, 14 Jan 2017 11:29:35 +0100
sched/core: Add debugging
Commit-ID: 92509b732baf14c59ca702307270cfaa3a585ae7
Gitweb: http://git.kernel.org/tip/92509b732baf14c59ca702307270cfaa3a585ae7
Author: Matt Fleming <m...@codeblueprint.co.uk>
AuthorDate: Wed, 21 Sep 2016 14:38:11 +0100
Committer: Ingo Molnar <mi...@kernel.org>
CommitDate:
Commit-ID: d8ac897137a230ec351269f6378017f2decca512
Gitweb: http://git.kernel.org/tip/d8ac897137a230ec351269f6378017f2decca512
Author: Matt Fleming <m...@codeblueprint.co.uk>
AuthorDate: Wed, 21 Sep 2016 14:38:10 +0100
Committer: Ingo Molnar <mi...@kernel.org>
CommitDate:
Commit-ID: d8ac897137a230ec351269f6378017f2decca512
Gitweb: http://git.kernel.org/tip/d8ac897137a230ec351269f6378017f2decca512
Author: Matt Fleming
AuthorDate: Wed, 21 Sep 2016 14:38:10 +0100
Committer: Ingo Molnar
CommitDate: Sat, 14 Jan 2017 11:29:30 +0100
sched/core: Add wrappers
Commit-ID: 92509b732baf14c59ca702307270cfaa3a585ae7
Gitweb: http://git.kernel.org/tip/92509b732baf14c59ca702307270cfaa3a585ae7
Author: Matt Fleming
AuthorDate: Wed, 21 Sep 2016 14:38:11 +0100
Committer: Ingo Molnar
CommitDate: Sat, 14 Jan 2017 11:29:31 +0100
sched/core: Reset
Commit-ID: 46f69fa33712ad12ccaa723e46ed5929ee93589b
Gitweb: http://git.kernel.org/tip/46f69fa33712ad12ccaa723e46ed5929ee93589b
Author: Matt Fleming <m...@codeblueprint.co.uk>
AuthorDate: Wed, 21 Sep 2016 14:38:12 +0100
Committer: Ingo Molnar <mi...@kernel.org>
CommitDate:
Commit-ID: 46f69fa33712ad12ccaa723e46ed5929ee93589b
Gitweb: http://git.kernel.org/tip/46f69fa33712ad12ccaa723e46ed5929ee93589b
Author: Matt Fleming
AuthorDate: Wed, 21 Sep 2016 14:38:12 +0100
Committer: Ingo Molnar
CommitDate: Sat, 14 Jan 2017 11:29:32 +0100
sched/fair: Push rq lock
On Thu, 08 Dec, at 12:30:08PM, David Howells wrote:
>
> Here's a set of patches that can determine the secure boot state of the
> UEFI BIOS and pass that along to the main kernel image. This involves
> generalising ARM's efi_get_secureboot() function and making it mixed-mode
> safe.
This
On Thu, 08 Dec, at 12:30:08PM, David Howells wrote:
>
> Here's a set of patches that can determine the secure boot state of the
> UEFI BIOS and pass that along to the main kernel image. This involves
> generalising ARM's efi_get_secureboot() function and making it mixed-mode
> safe.
This
On Thu, 08 Dec, at 12:31:08PM, David Howells wrote:
> From: Josh Boyer
>
> UEFI machines can be booted in Secure Boot mode. Add a EFI_SECURE_BOOT bit
> that can be passed to efi_enabled() to find out whether secure boot is
> enabled.
>
> This will be used by the
On Thu, 08 Dec, at 12:31:08PM, David Howells wrote:
> From: Josh Boyer
>
> UEFI machines can be booted in Secure Boot mode. Add a EFI_SECURE_BOOT bit
> that can be passed to efi_enabled() to find out whether secure boot is
> enabled.
>
> This will be used by the SysRq+x handler, registered by
On Thu, 08 Dec, at 12:30:45PM, David Howells wrote:
> Get the firmware's secure-boot status in the kernel boot wrapper and stash
> it somewhere that the main kernel image can find.
>
> The efi_get_secureboot() function is extracted from the arm stub and (a)
> generalised so that it can be called
On Thu, 08 Dec, at 12:30:45PM, David Howells wrote:
> Get the firmware's secure-boot status in the kernel boot wrapper and stash
> it somewhere that the main kernel image can find.
>
> The efi_get_secureboot() function is extracted from the arm stub and (a)
> generalised so that it can be called
On Tue, 10 Jan, at 08:37:35AM, Dave Young wrote:
>
> It is true that it depends on acpi init, I was wondering if bgrt parsing can
> be moved to early acpi code. But anyway I'm not sure it is doable and
> worth.
That's a good question. I think I gave up last time I tried to move
the BGRT code to
On Tue, 10 Jan, at 08:37:35AM, Dave Young wrote:
>
> It is true that it depends on acpi init, I was wondering if bgrt parsing can
> be moved to early acpi code. But anyway I'm not sure it is doable and
> worth.
That's a good question. I think I gave up last time I tried to move
the BGRT code to
On Mon, 09 Jan, at 01:31:52PM, Mel Gorman wrote:
>
> Well, you could put in a __init global variable about availability into
> mm/memblock.c and then check it in memblock APIs like memblock_reserve()
> to BUG_ON? I know BUG_ON is frowned upon but this is not likely to be a
> situation that can be
On Mon, 09 Jan, at 01:31:52PM, Mel Gorman wrote:
>
> Well, you could put in a __init global variable about availability into
> mm/memblock.c and then check it in memblock APIs like memblock_reserve()
> to BUG_ON? I know BUG_ON is frowned upon but this is not likely to be a
> situation that can be
On Sun, 08 Jan, at 01:24:49AM, Nicolai Stange wrote:
>
> Out of curiosity, I had a deeper look at the BootServices*-md
> requirement though:
>
> > Another problem is that we never check that the reservation is covered
> > by a BootServicesData region, which are the only ones that are
> >
On Sun, 08 Jan, at 01:24:49AM, Nicolai Stange wrote:
>
> Out of curiosity, I had a deeper look at the BootServices*-md
> requirement though:
>
> > Another problem is that we never check that the reservation is covered
> > by a BootServicesData region, which are the only ones that are
> >
On Fri, 06 Jan, at 07:28:40PM, Ard Biesheuvel wrote:
>
> This is my point exactly. But it appears efi_free_boot_services()
> occurs much later than I thought, and so there is a sizabe time window
> where SLAB is up but reservations can still be made. But we don't
> check whether
On Fri, 06 Jan, at 07:28:40PM, Ard Biesheuvel wrote:
>
> This is my point exactly. But it appears efi_free_boot_services()
> occurs much later than I thought, and so there is a sizabe time window
> where SLAB is up but reservations can still be made. But we don't
> check whether
On Thu, 05 Jan, at 05:12:42PM, Dave Young wrote:
> On 12/22/16 at 11:23am, Nicolai Stange wrote:
> > Before invoking the arch specific handler, efi_mem_reserve() reserves
> > the given memory region through memblock.
> >
> > efi_mem_reserve() can get called after mm_init() though -- through
> >
On Thu, 05 Jan, at 05:12:42PM, Dave Young wrote:
> On 12/22/16 at 11:23am, Nicolai Stange wrote:
> > Before invoking the arch specific handler, efi_mem_reserve() reserves
> > the given memory region through memblock.
> >
> > efi_mem_reserve() can get called after mm_init() though -- through
> >
On Thu, 05 Jan, at 02:41:09PM, David Howells wrote:
> Matt Fleming <m...@codeblueprint.co.uk> wrote:
>
> > > Is it too late to request this for the upcoming merge window?
> >
> > For something as non-trivial as this, yes, it's too late. We generally
> > clo
On Thu, 05 Jan, at 02:41:09PM, David Howells wrote:
> Matt Fleming wrote:
>
> > > Is it too late to request this for the upcoming merge window?
> >
> > For something as non-trivial as this, yes, it's too late. We generally
> > close the EFI tree window
with this patch and saw no
detectable change in performance.
Cc: Mel Gorman <mgor...@techsingularity.net>
Signed-off-by: Matt Fleming <m...@codeblueprint.co.uk>
---
lib/Kconfig.debug | 1 +
1 file changed, 1 insertion(+)
diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug
index a6c8db1d62f6..
with this patch and saw no
detectable change in performance.
Cc: Mel Gorman
Signed-off-by: Matt Fleming
---
lib/Kconfig.debug | 1 +
1 file changed, 1 insertion(+)
diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug
index a6c8db1d62f6..7fe1ff001792 100644
--- a/lib/Kconfig.debug
+++ b/lib/Kconfig.debug
On Thu, 22 Dec, at 11:23:39AM, Nicolai Stange wrote:
> With commit 4bc9f92e64c8 ("x86/efi-bgrt: Use efi_mem_reserve() to avoid
> copying image data"), efi_bgrt_init() calls into the memblock allocator
> through efi_mem_reserve() => efi_arch_mem_reserve() *after* mm_init()
> has been called.
>
>
On Thu, 22 Dec, at 11:23:39AM, Nicolai Stange wrote:
> With commit 4bc9f92e64c8 ("x86/efi-bgrt: Use efi_mem_reserve() to avoid
> copying image data"), efi_bgrt_init() calls into the memblock allocator
> through efi_mem_reserve() => efi_arch_mem_reserve() *after* mm_init()
> has been called.
>
>
On Wed, 21 Dec, at 02:11:38PM, Petr Oros wrote:
> Booting on EFI with ESRT table has been stop since commit:
> 8e80632 efi/esrt: Use efi_mem_reserve() and avoid a kmalloc()
>
> This is caused by this commit:
> 816e761 efi: Allow drivers to reserve boot services forever
>
> Problem
201 - 300 of 4043 matches
Mail list logo