>From 728a17e2de591b557c3c8ba31076b4bf2ca5ab42 Mon Sep 17 00:00:00 2001
From: Liu, Jinsong
Date: Wed, 5 Sep 2012 03:18:15 +0800
Subject: [PATCH] KVM: tsc deadline timer works only when hrtimer high
resolution configured
This is for 2 reasons:
1. it's pointless to enable tsc deadline timer to gue
Hello Jiří,
On Tue, 4 Sep 2012, Jiri Kosina wrote:
> Paul Walmsley has implemented dynamic quirk handling back in 2007 through
> commits:
>
> 2eb5dc30eb ("USB HID: encapsulate quirk handling into hid-quirks.c")
> 8222fbe67c ("USB HID: clarify static quirk handling as squirks")
> 8cef908235 ("US
On Sat, 1 Sep 2012, Liu, Chuansheng wrote:
> From: liu chuansheng
> Subject: [PATCH] USB/host: Cleanup unneccessary irq disable code
>
> Because the IRQF_DISABLED as the flag is now a NOOP and has been
> deprecated and in hardirq context the interrupt is disabled.
>
> so in usb/host code:
> Rem
Hello,
This bunch of patches adds support to autoload IP module drivers when they are
detected by the ipack bus driver.
Also, it changes the endianness of the carrier device to Big Endian as it is
defined in the Industry Pack standard. Due to that, the source code is
simplified too.
There are mo
From: Jens Taprogge
Before it was using the functions in ipack_bus_ops.
Signed-off-by: Jens Taprogge
Signed-off-by: Samuel Iglesias Gonsálvez
---
drivers/staging/ipack/devices/ipoctal.c | 29 -
1 file changed, 8 insertions(+), 21 deletions(-)
diff --git a/driver
From: Jens Taprogge
These changes make it easier to add more initialization steps later on.
Signed-off-by: Jens Taprogge
Signed-off-by: Samuel Iglesias Gonsálvez
---
drivers/staging/ipack/bridges/tpci200.c | 25 +++--
1 file changed, 15 insertions(+), 10 deletions(-)
di
They are not used any longer.
Signed-off-by: Jens Taprogge
Signed-off-by: Samuel Iglesias Gonsálvez
---
drivers/staging/ipack/ipack.h | 12
1 file changed, 12 deletions(-)
diff --git a/drivers/staging/ipack/ipack.h b/drivers/staging/ipack/ipack.h
index 8bc001e..e3609b1 100644
--
From: Jens Taprogge
Rename them in the process.
Signed-off-by: Jens Taprogge
Signed-off-by: Samuel Iglesias Gonsálvez
---
drivers/staging/ipack/devices/ipoctal.c | 26 +++---
drivers/staging/ipack/ipack_ids.h |5 +
2 files changed, 16 insertions(+), 15 dele
From: Jens Taprogge
No need to have a struct when it has only one field.
Signed-off-by: Jens Taprogge
Signed-off-by: Samuel Iglesias Gonsálvez
---
drivers/staging/ipack/devices/ipoctal.c | 82 +++---
drivers/staging/ipack/devices/scc2698.h | 116 +++-
From: Jens Taprogge
Also expose the values through sysfs.
Signed-off-by: Jens Taprogge
Signed-off-by: Samuel Iglesias Gonsálvez
---
drivers/staging/ipack/ipack.c | 81 +++--
drivers/staging/ipack/ipack.h |4 +-
2 files changed, 80 insertions(+), 5 del
From: Jens Taprogge
Also include it in the hotplug event so that udev can
provide the respective driver.
Signed-off-by: Jens Taprogge
Signed-off-by: Samuel Iglesias Gonsálvez
---
drivers/staging/ipack/ipack.c | 36
1 file changed, 36 insertions(+)
diff
From: Jens Taprogge
Signed-off-by: Jens Taprogge
Signed-off-by: Samuel Iglesias Gonsálvez
---
drivers/staging/ipack/ipack.c | 31 +++
1 file changed, 31 insertions(+)
diff --git a/drivers/staging/ipack/ipack.c b/drivers/staging/ipack/ipack.c
index a5ef28f..ff907f
On 2012-09-04 15:39, Jan Kara wrote:
Hello,
first, you have my address wrong (you had suze instead of suse) which is
why I wasn't getting your email and not replying (missed the patch in LKML
traffic). Second, it's good to CC also linux-fsdevel for UDF related
matters (I tend to use that f
From: Jens Taprogge
Signed-off-by: Jens Taprogge
Signed-off-by: Samuel Iglesias Gonsálvez
---
drivers/staging/ipack/devices/ipoctal.c |8 +---
drivers/staging/ipack/ipack.h |2 +-
2 files changed, 6 insertions(+), 4 deletions(-)
diff --git a/drivers/staging/ipack/devices
From: Jens Taprogge
The modalias entries for the module are now created.
Signed-off-by: Jens Taprogge
Signed-off-by: Samuel Iglesias Gonsálvez
---
drivers/staging/ipack/devices/ipoctal.c | 13 +
1 file changed, 13 insertions(+)
diff --git a/drivers/staging/ipack/devices/ipoctal
From: Jens Taprogge
Devices are match based upon their vendor and device ids. Since
the individual drivers provide a list of supported ids they do not
need to implement the matching themselves.
Signed-off-by: Jens Taprogge
Signed-off-by: Samuel Iglesias Gonsálvez
---
drivers/staging/ipack/de
On 09/04/2012 03:55 PM, David Vrabel wrote:
On 04/09/12 15:37, Konrad Rzeszutek Wilk wrote:
On Tue, Sep 04, 2012 at 03:07:42PM +0100, Stefano Panella wrote:
So if hwdev->coherent_dma_mask is set to 0x our dma_mask will
be u64 set to 0x even if we set it to DMA_BI
From: Jens Taprogge
We keep a copy of the ID space for later use.
Signed-off-by: Jens Taprogge
Signed-off-by: Samuel Iglesias Gonsálvez
---
drivers/staging/ipack/ipack.c | 80 +
drivers/staging/ipack/ipack.h |5 +++
2 files changed, 85 insertions(
From: Jens Taprogge
The modaliases look like ipack:fXvNdM, where X is the format version (8
bit) and N and M are the vendor and device ID represented as 32 bit
hexadecimal numbers each. Using 32 bits allows us to define IPACK_ANY_ID
as (~0) without interfering with the valid ids.
The resulting m
From: Jens Taprogge
They are not used any longer.
Signed-off-by: Jens Taprogge
Signed-off-by: Samuel Iglesias Gonsálvez
---
drivers/staging/ipack/bridges/tpci200.c | 218 ---
1 file changed, 218 deletions(-)
diff --git a/drivers/staging/ipack/bridges/tpci200.c
b
synchronize_net is called every time we close a PF_PACKET socket which is
causing performance loss when doing this on many sockets.
Signed-off-by: Sorin Dumitru
Signed-off-by: Iulius Curt
---
Statistics using test program [1]
Sockets count | Not patched | Patched
___
From: Jens Taprogge
Define memory address space, fix sparse warnings and mark the structs
reflecting hardware memory layout "packed" to be on the safe side.
Signed-off-by: Jens Taprogge
Signed-off-by: Samuel Iglesias Gonsálvez
---
drivers/staging/ipack/devices/ipoctal.c | 14 ++---
drivers/
From: Jens Taprogge
During initialization we configure the TPCI200 so it does not swap data
lanes on IndustryPack module access. The read and write functions are
changed accordingly.
We are taking this approach in the hope that all IP Carriers are able to
present the Module memory layout unchan
On Tue, 2012-08-28 at 10:12 +0200, Robert Richter wrote:
> On 27.08.12 17:14:27, Robert Richter wrote:
> > Steven and Ingo,
> >
> > while running profiling tests on 32 bit I got a
> >
> > Kernel panic - not syncing: Fatal exception in interrupt
Sorry for the late response, was too busy drinking
On Tue, Sep 4, 2012 at 4:16 PM, Iulius Curt wrote:
> synchronize_net is called every time we close a PF_PACKET socket which is
> causing performance loss when doing this on many sockets.
Do you have any particular use case in mind? I can imagine if you are
closing a PF_PACKET socket in a network
On Tue, 2012-08-21 at 17:48 -0700, Tim Chen wrote:
>
> Thanks to Matthew's suggestions on improving the patch. Here's the
> updated version. It seems to be sane when I booted my machine up. I
> will put it through more testing when I get a chance.
>
> Tim
>
Matthew,
The new patch seems to b
On 04.09.12 11:16:16, Steven Rostedt wrote:
> On Tue, 2012-08-28 at 10:12 +0200, Robert Richter wrote:
> > BUG: unable to handle kernel NULL pointer dereference at 0040
> > IP: [] print_context_stack+0x6e/0x8d
> > *pde =
> > Oops: [#1] SMP
> > Modules linked in:
> >
> > Pid: 1
On Tue, 2012-08-28 at 19:00 -0400, Mathieu Desnoyers wrote:
> Looking again at:
>
> +#define hash_for_each_size(name, bits, bkt, node, obj, member)
> \
> + for (bkt = 0; bkt < HASH_SIZE(bits); bkt++)
> \
> + hlist_for_each_entry(ob
On 09/03, Al Viro wrote:
>
> On Mon, Sep 03, 2012 at 06:05:38PM +0200, Oleg Nesterov wrote:
>
> > This is not easy to fix. ptrace_disable() and user_disable_single_step()
> > is arch dependant, but at least on x86 it assumes that the tracee is not
> > running, so exit_ptrace() can't do this.
>
> Tr
On Wed, 2012-08-29 at 09:28 +0800, Cong Wang wrote:
> On Tue, Aug 28, 2012 at 2:22 AM, Steven Rostedt wrote:
> > The file feature-removal-schedule.txt is ignored by most people except
> > for people that add to it. It's more of a global TODO list for
> > developers than being anything useful by an
On Tue, Sep 04, 2012 at 07:46:02PM +0800, Dong Aisheng wrote:
> On Tue, Sep 04, 2012 at 07:35:45PM +0800, Andi Shyti wrote:
> > Hi Dong,
> >
> > On Tue, Sep 04, 2012 at 11:20:08AM +0800, Dong Aisheng wrote:
> > > +static int __devinit syscon_probe(struct platform_device *pdev)
> > > +{
> > > + str
On Tue, Sep 4, 2012 at 9:06 PM, Takashi Iwai wrote:
> Hi,
>
> as I've got recently a few bug reports regarding the stuck with
> request_firmware() in module_init of some sound drivers, I started
> looking at the issue. Strangely, the problem doesn't happen on
> openSUSE 12.2 although it has the s
IO port access would permit users to gain access to PCI configuration
registers, which in turn (on a lot of hardware) give access to MMIO register
space. This would potentially permit root to trigger arbitrary DMA, so lock
it down by default.
Signed-off-by: Matthew Garrett
---
arch/x86/kernel/io
From: Josh Boyer
This forcibly drops CAP_SECURE_FIRMWARE from both cap_permitted and cap_bset
in the init_cred struct, which everything else inherits from. This works on
any machine and can be used to develop even if the box doesn't have UEFI.
Signed-off-by: Josh Boyer
---
kernel/cred.c | 17
The UEFI Secure Boot trust model is based on it not being possible for a
user to cause a signed OS to boot an unsigned OS, even if that user has
administrative privileges. This is an initial attempt at a set of patches
to reduce root's ability to modify the kernel. We've done this with an
additiona
The firmware has a set of flags that indicate whether secure boot is enabled
and enforcing. Use them to indicate whether the kernel should lock itself
down.
Signed-off-by: Matthew Garrett
---
Documentation/x86/zero-page.txt | 2 ++
arch/x86/boot/compressed/eboot.c | 32
kexec could be used as a vector for a malicious user to use a signed kernel
to circumvent the secure boot trust model. In the long run we'll want to
support signed kexec payloads, but for the moment we should just disable
loading entirely in that situation.
Signed-off-by: Matthew Garrett
---
ker
Allowing users to write to address space makes it possible for the kernel
to be subverted. Restrict this when we need to protect the kernel.
Signed-off-by: Matthew Garrett
---
drivers/char/mem.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/drivers/char/mem.c b/drivers/char/mem.c
ind
Secure boot adds certain policy requirements, including that root must not
be able to do anything that could cause the kernel to execute arbitrary code.
The simplest way to handle this would seem to be to add a new capability
and gate various functionality on that. We'll then strip it from the init
We have no way of validating what all of the Asus WMI methods do on a
given machine, and there's a risk that some will allow hardware state to
be manipulated in such a way that arbitrary code can be executed in the
kernel. Add a capability check to prevent that.
Signed-off-by: Matthew Garrett
---
From: Namjae Jeon
This patch-set eliminates the client side ESTALE errors when a FAT partition
exported over NFS has its dentries evicted from the cache.
One of the reasons for this error is lack of permanent inode numbers on FAT
which makes it difficult to construct persistent file handles.
Thi
It must be impossible for even root to get code executed in kernel context
under a secure boot environment. custom_method effectively allows arbitrary
access to system memory, so it needs to have a capability check here.
Signed-off-by: Matthew Garrett
---
drivers/acpi/custom_method.c | 3 +++
1
From: Namjae Jeon
Since the previous patch in this patch-set uses i_pos as the inode
number, we can use it to find the directory entry of the inode and
subsequently rebuild the inode if the cache lookups fail.
Since this involves accessing the FAT media,it is better to do this
only if the 'nfs'
From: Namjae Jeon
This patch enables rebuilding of directory inodes which are not present
in the cache.This is done by traversing the disk clusters to find the
directory entry of the parent directory and using its i_pos to build the
inode.
Signed-off-by: Namjae Jeon
Signed-off-by: Ravishankar N
From: Namjae Jeon
Maintain a list of inode(i_pos) numbers of orphaned inodes (i.e the
inodes that have been unlinked but still having open file
descriptors).At file/directory creation time, skip using such i_pos
values.Removal of the i_pos from the list is done during inode eviction.
Signed-off-
From: Namjae Jeon
update nfs option in filesystem/vfat.txt
Signed-off-by: Namjae Jeon
Signed-off-by: Ravishankar N
Signed-off-by: Amit Sahrawat
---
Documentation/filesystems/vfat.txt |3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/Documentation/filesystems/vfat.txt
From: Namjae Jeon
All the files on a FAT partition have an on-disk directory entry.
The location of these entries, i_pos, is unique and is constructed by the
fat_make_i_pos() function.We can use this as the inode number making it
peristent across remounts.
Signed-off-by: Namjae Jeon
Signed-off-
Any hardware that can potentially generate DMA has to be locked down from
userspace in order to avoid it being possible for an attacker to cause
arbitrary kernel behaviour. Default to paranoid - in future we can
potentially relax this for sufficiently IOMMU-isolated devices.
Signed-off-by: Matthew
On 8/22/12 8:37 AM, chenggang qin wrote:
> From: Chenggang Qin
>
> While we use "perf top -p 'pid'" to monitor the symbols of specified
> processes, some new threads would be created by the monitored processes
> during "perf top" is running. In current version, these new threads and
> their symbo
On 09/04, Andrew Vagin wrote:
>
> The kernel doesn't check pid on a negative values, so if
> you would try to write -2 in /proc/sys/kernel/ns_last_pid,
> you will get a kernel panic.
>
> In this case the next pid is -1, and alloc_pidmap will try to access
> to a nonexistent pidmap.
>
> map = &pid_n
On Tue, 4 Sep 2012 11:55:06 -0400
Matthew Garrett wrote:
> The UEFI Secure Boot trust model is based on it not being possible for a
> user to cause a signed OS to boot an unsigned OS
Unfortunately you can't fix this at kernel level because an untrusted
application can at GUI level fake a system
On 9/4/12 4:32 AM, Maciek Borzecki wrote:
When analyzing perf data from hosts of other architecture than one of the local
host it's useful to call objdump that is part of a toolchain for that
architecture. Instead of calling regular objdump, call one that user specified
in command line.
Why not
On Tue, 4 Sep 2012 11:55:11 -0400
Matthew Garrett wrote:
> We have no way of validating what all of the Asus WMI methods do on a
> given machine, and there's a risk that some will allow hardware state to
> be manipulated in such a way that arbitrary code can be executed in the
> kernel. Add a ca
On Tue, Sep 04, 2012 at 05:39:38PM +0200, Oleg Nesterov wrote:
> > BTW, speaking of alpha, what about PTRACE_SINGLESTEP when the task is
> > stopped
> > on syscall entry/exit after previous PTRACE_SYSCALL, BTW? Looks like it
> > will
> > be like PTRACE_CONT until we hit the first signal, at whi
Hi Aaro,
On Mon, Sep 03, 2012 at 11:23:21PM +0300, Aaro Koskinen wrote:
> This patch set introduces drivers for CBUS access and Retu multifunction
> chip found on Nokia Internet Tablets (770, N800, N810). It would be
> nice get these patches applied as the functionality of these devices is
> sever
At Tue, 4 Sep 2012 23:52:15 +0800,
Ming Lei wrote:
>
> On Tue, Sep 4, 2012 at 9:06 PM, Takashi Iwai wrote:
> > Hi,
> >
> > as I've got recently a few bug reports regarding the stuck with
> > request_firmware() in module_init of some sound drivers, I started
> > looking at the issue. Strangely, t
On Tue, 4 Sep 2012 11:55:09 -0400
Matthew Garrett wrote:
> IO port access would permit users to gain access to PCI configuration
> registers, which in turn (on a lot of hardware) give access to MMIO register
> space. This would potentially permit root to trigger arbitrary DMA, so lock
> it down
On Tue, Sep 04, 2012 at 05:08:53PM +0100, Alan Cox wrote:
> On Tue, 4 Sep 2012 11:55:06 -0400
> Matthew Garrett wrote:
>
> > The UEFI Secure Boot trust model is based on it not being possible for a
> > user to cause a signed OS to boot an unsigned OS
>
> Unfortunately you can't fix this at kern
On Tue, Sep 04, 2012 at 05:12:05PM +0100, Alan Cox wrote:
> On Tue, 4 Sep 2012 11:55:11 -0400
> Matthew Garrett wrote:
>
> > We have no way of validating what all of the Asus WMI methods do on a
> > given machine, and there's a risk that some will allow hardware state to
> > be manipulated in su
From: Peter Senna Tschudin
Convert a nonnegative error return code to a negative one, as returned
elsewhere in the function.
A simplified version of the semantic match that finds this problem is as
follows: (http://coccinelle.lip6.fr/)
//
(
if@p1 (\(ret < 0\|ret != 0\))
{ ... return ret; }
|
From: Peter Senna Tschudin
Convert a nonnegative error return code to a negative one, as returned
elsewhere in the function.
A simplified version of the semantic match that finds this problem is as
follows: (http://coccinelle.lip6.fr/)
//
(
if@p1 (\(ret < 0\|ret != 0\))
{ ... return ret; }
|
From: Peter Senna Tschudin
Convert a nonnegative error return code to a negative one, as returned
elsewhere in the function.
A simplified version of the semantic match that finds this problem is as
follows: (http://coccinelle.lip6.fr/)
//
(
if@p1 (\(ret < 0\|ret != 0\))
{ ... return ret; }
|
From: Peter Senna Tschudin
Convert a nonnegative error return code to a negative one, as returned
elsewhere in the function.
A simplified version of the semantic match that finds this problem is as
follows: (http://coccinelle.lip6.fr/)
//
(
if@p1 (\(ret < 0\|ret != 0\))
{ ... return ret; }
|
From: Peter Senna Tschudin
Convert a nonnegative error return code to a negative one, as returned
elsewhere in the function.
A simplified version of the semantic match that finds this problem is as
follows: (http://coccinelle.lip6.fr/)
//
(
if@p1 (\(ret < 0\|ret != 0\))
{ ... return ret; }
|
On Tue, Sep 04, 2012 at 05:16:03PM +0100, Alan Cox wrote:
> On Tue, 4 Sep 2012 11:55:09 -0400
> Matthew Garrett wrote:
>
> > IO port access would permit users to gain access to PCI configuration
> > registers, which in turn (on a lot of hardware) give access to MMIO register
> > space. This woul
From: Josh Boyer
This option allows userspace to pass the RSDP address to the kernel. This
could potentially be used to circumvent the secure boot trust model.
We ignore the setting if we don't have the CAP_SECURE_FIRMWARE capability.
Signed-off-by: Josh Boyer
---
drivers/acpi/osl.c | 2 +-
1
From: Josh Boyer
Add the name of the new Secure Boot capability. This allows SELinux
policies to properly map CAP_SECURE_FIRMWARE to the appropriate
capability class.
Signed-off-by: Josh Boyer
---
security/selinux/include/classmap.h | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
d
On Wed, Sep 05, 2012 at 12:57:44AM +0900, Namjae Jeon wrote:
> From: Namjae Jeon
>
> All the files on a FAT partition have an on-disk directory entry.
> The location of these entries, i_pos, is unique and is constructed by the
> fat_make_i_pos() function.We can use this as the inode number making
On Tue, Sep 04, 2012 at 10:41:34AM +0200, Christophe Leroy wrote:
> Adding support for LM74 and LM71 chips
>
> Signed-off-by: Christophe Leroy
>
Hi Christophe,
couple of comments below.
> diff -u linux-3.5-vanilla/drivers/hwmon/Kconfig
> linux-3.5/drivers/hwmon/Kconfig
> --- linux-3.5-vanilla
On Tue 04-09-12 18:54:08, Glauber Costa wrote:
[...]
> >> I'd personally believe merging both our patches together would achieve a
> >> good result.
> >
> > I am still not sure we want to add a config option for something that is
> > meant to go away. But let's see what others think.
> >
>
> So
On Tue, Sep 04, 2012 at 10:40:44AM +0200, Christophe Leroy wrote:
> Removing the 3wire limitation on LM70 as the component also allows
> operation on 4wire SPI bus
>
> Signed-off-by: Christophe Leroy
>
Applied to -next.
Thanks,
Guenter
> diff -u linux-3.5-vanilla/drivers/hwmon/lm70.c linux-3.5
Some rbtree documentation fixes/changes. After applying these changes,
the rb_entry() macro only gets a single mention in the document to say
it does the same thing as container_of().
1) Documentation/rbtree.txt: Fix possible typo in example
2) Documentation/rbtree.txt: Remove bogus description o
In two places, the document mentions that individual members of the
containing structure of the struct rb_node may be accessed by a macro
call such as rb_entry(node, type, member). This is bogus, so remove the
offending text.
The example code used to amplify this bogosity, but that was fixed in a
The example code for rb_erase() usage has a function call to mysearch().
Presumably this ought to be my_search() to match the example code
earlier in the document.
Signed-off-by: Ian Abbott
---
Documentation/rbtree.txt | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Documenta
Mention that rb_entry() can be used as a synonym for the standard
container_of() macro.
Signed-off-by: Ian Abbott
---
Documentation/rbtree.txt | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/Documentation/rbtree.txt b/Documentation/rbtree.txt
index 47a8cb5..55008c3 100644
-
On Sun, Sep 02, 2012 at 09:30:30AM -0700, Dan Carpenter wrote:
> Sparse finds that bug as well. ;)
>
> drivers/acpi/acpica/tbfadt.c:247:15: warning: incorrect type in assignment
> (different address spaces)
> drivers/acpi/acpica/tbfadt.c:247:15:expected struct acpi_table_header
> *table
> d
On Tue, Sep 4, 2012 at 9:55 AM, Matthew Garrett wrote:
> From: Josh Boyer
>
> This option allows userspace to pass the RSDP address to the kernel. This
> could potentially be used to circumvent the secure boot trust model.
> We ignore the setting if we don't have the CAP_SECURE_FIRMWARE capabili
On 09/04/2012 04:35 PM, Steven Rostedt wrote:
> On Tue, 2012-08-28 at 19:00 -0400, Mathieu Desnoyers wrote:
>
>> Looking again at:
>>
>> +#define hash_for_each_size(name, bits, bkt, node, obj, member)
>>\
>> + for (bkt = 0; bkt < HASH_SIZE(bits); bkt++)
* Steven Rostedt (rost...@goodmis.org) wrote:
> On Tue, 2012-08-28 at 19:00 -0400, Mathieu Desnoyers wrote:
>
> > Looking again at:
> >
> > +#define hash_for_each_size(name, bits, bkt, node, obj, member)
> > \
> > + for (bkt = 0; bkt < HASH_SIZE(bits); bkt++)
On Mon, 2012-09-03 at 14:27 -0700, Yinghai Lu wrote:
> From: Ashok Raj
>
> Emulate an ACPI SCI interrupt to emulate a hot-plug event. Useful
> for testing ACPI based hot-plug on systems that don't have the
> necessary firmware support.
>
> Enable CONFIG_ACPI_SCI_EMULATE on kernel compile.
>
> N
On 08/31/2012 12:56 PM, Michael S. Tsirkin wrote:
> On Fri, Aug 31, 2012 at 11:36:07AM +0200, Sasha Levin wrote:
>> On 08/30/2012 03:38 PM, Michael S. Tsirkin wrote:
>> >> +static unsigned int indirect_alloc_thresh = 16;
>> > Why 16? Please make is MAX_SG + 1 this makes some sense.
>>
>> Wouldn't
On 09/04/2012 07:34 PM, Avi Kivity wrote:
> On 08/31/2012 12:56 PM, Michael S. Tsirkin wrote:
>> On Fri, Aug 31, 2012 at 11:36:07AM +0200, Sasha Levin wrote:
>>> On 08/30/2012 03:38 PM, Michael S. Tsirkin wrote:
>>> >> +static unsigned int indirect_alloc_thresh = 16;
>>> > Why 16? Please make is M
acpi_os_map_memory expects its return value to be in the __iomem address
space. Tag the variable we're using as such and use memcpy_fromio to
avoid further sparse warnings.
Signed-off-by: Kent Yoder
---
drivers/char/tpm/tpm_acpi.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff -
On Tue, Sep 04, 2012 at 10:30:46AM -0600, Shuah Khan wrote:
> On Tue, Sep 4, 2012 at 9:55 AM, Matthew Garrett wrote:
> > From: Josh Boyer
> >
> > This option allows userspace to pass the RSDP address to the kernel. This
> > could potentially be used to circumvent the secure boot trust model.
> >
From: Daniel Borkmann
Date: Tue, 4 Sep 2012 16:53:06 +0200
> On Tue, Sep 4, 2012 at 4:16 PM, Iulius Curt wrote:
>> synchronize_net is called every time we close a PF_PACKET socket which is
>> causing performance loss when doing this on many sockets.
>
> Do you have any particular use case in mi
Hi Rusty,
I used libsparse and kernel source annotations to check that code uses
for_each_online_cpu in contexts with hotplug disabled
(e.g. get_online_cpus(), preempt_disable, ..). I compiled with an x86
64-bit allyesconfig, so I missed other architecture specific usages.
The checker code isn't
On 09/04/2012 05:30 PM, Pedro Alves wrote:
> On 09/04/2012 04:35 PM, Steven Rostedt wrote:
>> On Tue, 2012-08-28 at 19:00 -0400, Mathieu Desnoyers wrote:
>>
>>> Looking again at:
>>>
>>> +#define hash_for_each_size(name, bits, bkt, node, obj, member)
>>> \
>>> + for (bkt = 0;
On 04/09/12 16:12, Stefano Panella wrote:
> On 09/04/2012 03:55 PM, David Vrabel wrote:
>> On 04/09/12 15:37, Konrad Rzeszutek Wilk wrote:
>>> On Tue, Sep 04, 2012 at 03:07:42PM +0100, Stefano Panella wrote:
So if hwdev->coherent_dma_mask is set to 0x our
dma_mask will
>>>
On Tue, Sep 4, 2012 at 10:38 AM, Matthew Garrett wrote:
> On Tue, Sep 04, 2012 at 10:30:46AM -0600, Shuah Khan wrote:
>> On Tue, Sep 4, 2012 at 9:55 AM, Matthew Garrett wrote:
>> > From: Josh Boyer
>> >
>> > This option allows userspace to pass the RSDP address to the kernel. This
>> > could po
On Tue, Sep 04, 2012 at 05:44:46PM +0100, David Vrabel wrote:
> On 04/09/12 16:12, Stefano Panella wrote:
> > On 09/04/2012 03:55 PM, David Vrabel wrote:
> >> On 04/09/12 15:37, Konrad Rzeszutek Wilk wrote:
> >>> On Tue, Sep 04, 2012 at 03:07:42PM +0100, Stefano Panella wrote:
> So if hwdev->c
On 09/04, Al Viro wrote:
>
> On Tue, Sep 04, 2012 at 05:39:38PM +0200, Oleg Nesterov wrote:
>
> > > BTW, speaking of alpha, what about PTRACE_SINGLESTEP when the task is
> > > stopped
> > > on syscall entry/exit after previous PTRACE_SYSCALL, BTW? Looks like it
> > > will
> > > be like PTRACE_CO
Hi Michael,
> Exactly. Though if we just fail load it will be much less code.
>
> Generally, using a feature bit for this is a bit of a problem though:
> normally driver is expected to be able to simply ignore
> a feature bit. In this case driver is required to
> do something so a feature bit is n
Namjae Jeon writes:
> From: Namjae Jeon
>
> Maintain a list of inode(i_pos) numbers of orphaned inodes (i.e the
> inodes that have been unlinked but still having open file
> descriptors).At file/directory creation time, skip using such i_pos
> values.Removal of the i_pos from the list is done du
On 08/30/2012 02:29 AM, Thomas Renninger wrote:
From: "H. Peter Anvin"
Add a simple cpio decoder without library dependencies for the purpose
of extracting components from the initramfs blob for early kernel
uses. Intended consumers so far are microcode and ACPI override.
Signed-off-by: H. Pe
* Pedro Alves (pal...@redhat.com) wrote:
> On 09/04/2012 05:30 PM, Pedro Alves wrote:
> > On 09/04/2012 04:35 PM, Steven Rostedt wrote:
> >> On Tue, 2012-08-28 at 19:00 -0400, Mathieu Desnoyers wrote:
> >>
> >>> Looking again at:
> >>>
> >>> +#define hash_for_each_size(name, bits, bkt, node, obj, m
On 09/04/2012 12:13 AM, Stephen Rothwell wrote:
> Hi all,
>
> Changes since 20120824:
>
UML on x86_64 (defconfig):
fs/built-in.o: In function `kernel_execve':
fs/exec.c:2342: multiple definition of `kernel_execve'
arch/um/kernel/built-in.o:arch/um/kernel/syscall.c:57: first defined here
fs/bui
OGAWA Hirofumi writes:
> Namjae Jeon writes:
>
>> From: Namjae Jeon
>>
>> Maintain a list of inode(i_pos) numbers of orphaned inodes (i.e the
>> inodes that have been unlinked but still having open file
>> descriptors).At file/directory creation time, skip using such i_pos
>> values.Removal of
On Tue, 2012-09-04 at 17:40 +0100, Pedro Alves wrote:
> BTW, you can also go a step further and remove the need to close with double
> }},
> with something like:
>
> #define do_for_each_ftrace_rec(pg, rec)
>\
> for (pg = ftrace_pages_start, rec
On Tue, Sep 04, 2012 at 08:32:28PM +0530, anish kumar wrote:
> On Sun, 2012-09-02 at 07:51 -0700, Guenter Roeck wrote:
> > On Sat, Sep 01, 2012 at 11:31:11AM +0200, Lars-Peter Clausen wrote:
> > > On 08/31/2012 06:04 PM, Guenter Roeck wrote:
> > > > On Thu, Aug 30, 2012 at 09:42:57PM -0400, Vivien
On Tue, Sep 04, 2012 at 02:25:58PM +0530, Venu Byravarasu wrote:
> As otg.h is containing lots of phy interface related
> stuff, moving all phy interface related stuff to new
> file named phy.h
>
> Signed-off-by: Venu Byravarasu
For some reason, I don't think that is a valid email address :(
--
201 - 300 of 656 matches
Mail list logo