4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Jesse Chan
commit 09c479f7f1fbfaf848e5813996793966cd50be81 upstream.
This change resolves a new compile-time warning
when built as a loadable module:
WARNING: modpost: missing
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Jesse Chan
commit 09c479f7f1fbfaf848e5813996793966cd50be81 upstream.
This change resolves a new compile-time warning
when built as a loadable module:
WARNING: modpost: missing
According to the latest microcode update from Intel (on Feb 8, 2018) on
Skylake we should be using the microcode revisions 0xC2***, so we need
to remove that from the blacklist now.
Signed-off-by: Darren Kenny
Reviewed-by: Konrad Rzeszutek Wilk
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: David Woodhouse
(cherry picked from commit fc67dd70adb711a45d2ef34e12d1a8be75edde61)
Add three feature bits exposed by new microcode on Intel CPUs for
speculation control.
According to the latest microcode update from Intel (on Feb 8, 2018) on
Skylake we should be using the microcode revisions 0xC2***, so we need
to remove that from the blacklist now.
Signed-off-by: Darren Kenny
Reviewed-by: Konrad Rzeszutek Wilk
Tested-by: Konrad Rzeszutek Wilk
---
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: David Woodhouse
(cherry picked from commit fc67dd70adb711a45d2ef34e12d1a8be75edde61)
Add three feature bits exposed by new microcode on Intel CPUs for
speculation control.
Signed-off-by:
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: David Woodhouse
(cherry picked from commit 5d10cbc91d9eb5537998b65608441b592eec65e7)
AMD exposes the PRED_CMD/SPEC_CTRL MSRs slightly differently to Intel.
See
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: David Woodhouse
(cherry picked from commit 5d10cbc91d9eb5537998b65608441b592eec65e7)
AMD exposes the PRED_CMD/SPEC_CTRL MSRs slightly differently to Intel.
See
> +|
> +WARN_ON(x op@p y)
> +|
> +WARN_ON_ONCE(x op@p y)
> +|
Can it be nice to work with nested SmPL disjunctions so that a bit of
duplicate SmPL code will be reduced?
> +coccilib.org.print_todo(j0[0], msg)
Will it be nicer to pass a string literal instead of a variable for the message
as a
> +|
> +WARN_ON(x op@p y)
> +|
> +WARN_ON_ONCE(x op@p y)
> +|
Can it be nice to work with nested SmPL disjunctions so that a bit of
duplicate SmPL code will be reduced?
> +coccilib.org.print_todo(j0[0], msg)
Will it be nicer to pass a string literal instead of a variable for the message
as a
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: David Woodhouse
(cherry picked from commit 20ffa1caecca4db8f79fe665acdeaa5af815a24d)
Expose indirect_branch_prediction_barrier() for use in subsequent patches.
[ tglx: Add
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: David Woodhouse
(cherry picked from commit 1e340c60d0dd3ae07b5bedc16a0469c14b9f3410)
Add MSR and bit definitions for SPEC_CTRL, PRED_CMD and ARCH_CAPABILITIES.
See Intel's
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: David Woodhouse
(cherry picked from commit 20ffa1caecca4db8f79fe665acdeaa5af815a24d)
Expose indirect_branch_prediction_barrier() for use in subsequent patches.
[ tglx: Add IBPB status to
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: David Woodhouse
(cherry picked from commit 1e340c60d0dd3ae07b5bedc16a0469c14b9f3410)
Add MSR and bit definitions for SPEC_CTRL, PRED_CMD and ARCH_CAPABILITIES.
See Intel's
MKTME_KEY_PROG allows to manipulate MKTME keys in the CPU.
Signed-off-by: Kirill A. Shutemov
---
arch/x86/include/asm/intel_pconfig.h | 50
1 file changed, 50 insertions(+)
diff --git a/arch/x86/include/asm/intel_pconfig.h
MKTME_KEY_PROG allows to manipulate MKTME keys in the CPU.
Signed-off-by: Kirill A. Shutemov
---
arch/x86/include/asm/intel_pconfig.h | 50
1 file changed, 50 insertions(+)
diff --git a/arch/x86/include/asm/intel_pconfig.h
On Tue, Feb 06, 2018 at 12:58:23PM -0500, Liang, Kan wrote:
>
>
> > With the exception of handling 'empty' buffers, I ended up with the
> > below. Please try again.
> >
>
> There are two small errors. After fixing them, the patch works well.
Well, it still doesn't do A, two read()s without
On Tue, Feb 06, 2018 at 12:58:23PM -0500, Liang, Kan wrote:
>
>
> > With the exception of handling 'empty' buffers, I ended up with the
> > below. Please try again.
> >
>
> There are two small errors. After fixing them, the patch works well.
Well, it still doesn't do A, two read()s without
CPUID.0x7.0x0:EDX[18] indicates whether Intel CPU support PCONFIG instruction.
Signed-off-by: Kirill A. Shutemov
---
arch/x86/include/asm/cpufeatures.h | 1 +
1 file changed, 1 insertion(+)
diff --git a/arch/x86/include/asm/cpufeatures.h
CPUID.0x7.0x0:EDX[18] indicates whether Intel CPU support PCONFIG instruction.
Signed-off-by: Kirill A. Shutemov
---
arch/x86/include/asm/cpufeatures.h | 1 +
1 file changed, 1 insertion(+)
diff --git a/arch/x86/include/asm/cpufeatures.h
b/arch/x86/include/asm/cpufeatures.h
index
CPUID.0x7.0x0:ECX[13] indicates whether CPU supports Intel Total Memory
Encryption.
Signed-off-by: Kirill A. Shutemov
---
arch/x86/include/asm/cpufeatures.h | 1 +
1 file changed, 1 insertion(+)
diff --git a/arch/x86/include/asm/cpufeatures.h
CPUID.0x7.0x0:ECX[13] indicates whether CPU supports Intel Total Memory
Encryption.
Signed-off-by: Kirill A. Shutemov
---
arch/x86/include/asm/cpufeatures.h | 1 +
1 file changed, 1 insertion(+)
diff --git a/arch/x86/include/asm/cpufeatures.h
b/arch/x86/include/asm/cpufeatures.h
index
IA32_TME_ACTIVATE MSR (0x982) can be used to check if BIOS has enabled
TME and MKTME. It includes which encryption policy/algorithm is selected
for TME or available for MKTME. For MKTME, the MSR also enumerates how
many KeyIDs are available.
We would need to exclude KeyID bits from physical
IA32_TME_ACTIVATE MSR (0x982) can be used to check if BIOS has enabled
TME and MKTME. It includes which encryption policy/algorithm is selected
for TME or available for MKTME. For MKTME, the MSR also enumerates how
many KeyIDs are available.
We would need to exclude KeyID bits from physical
Intel PCONFIG targets are enumerated via new CPUID leaf 0x1b. This patch
detects all supported targets of PCONFIG and implements helper to check
if the target is supported.
Signed-off-by: Kirill A. Shutemov
---
arch/x86/include/asm/intel_pconfig.h | 15 +++
Intel PCONFIG targets are enumerated via new CPUID leaf 0x1b. This patch
detects all supported targets of PCONFIG and implements helper to check
if the target is supported.
Signed-off-by: Kirill A. Shutemov
---
arch/x86/include/asm/intel_pconfig.h | 15 +++
arch/x86/kernel/cpu/Makefile
Multikey Total Memory Encryption (MKTME)[1] is a technology that allows
transparent memory encryption in upcoming Intel platforms.
MKTME is built on top of TME. TME allows encryption of the entirety of
system memory using a single key. MKTME allows to have multiple encryption
domains, each having
Multikey Total Memory Encryption (MKTME)[1] is a technology that allows
transparent memory encryption in upcoming Intel platforms.
MKTME is built on top of TME. TME allows encryption of the entirety of
system memory using a single key. MKTME allows to have multiple encryption
domains, each having
On Fri, Feb 09, 2018 at 05:12:56PM +0800, Kai Heng Feng wrote:
> Hi Matthew,
>
> > On Feb 9, 2018, at 12:08 PM, Matthew Wilcox wrote:
> > Alternatively, try this. It passes in GFP_DMA32 from vmalloc_32,
> > regardless of whether ZONE_DMA32 exists or not. If ZONE_DMA32
On Fri, Feb 09, 2018 at 05:12:56PM +0800, Kai Heng Feng wrote:
> Hi Matthew,
>
> > On Feb 9, 2018, at 12:08 PM, Matthew Wilcox wrote:
> > Alternatively, try this. It passes in GFP_DMA32 from vmalloc_32,
> > regardless of whether ZONE_DMA32 exists or not. If ZONE_DMA32 doesn't
> > exist, then
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Jesse Chan
commit 0cab20cec0b663b7be8e2be5998d5a4113647f86 upstream.
This change resolves a new compile-time warning
when built as a loadable module:
WARNING: modpost: missing
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Jesse Chan
commit 0cab20cec0b663b7be8e2be5998d5a4113647f86 upstream.
This change resolves a new compile-time warning
when built as a loadable module:
WARNING: modpost: missing
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Dave Hansen
commit 445b69e3b75e42362a5bdc13c8b8f61599e2228a upstream
The inital fix for trusted boot and PTI potentially misses the pgd clearing
if pud_alloc()
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Dave Hansen
commit 445b69e3b75e42362a5bdc13c8b8f61599e2228a upstream
The inital fix for trusted boot and PTI potentially misses the pgd clearing
if pud_alloc() sets a PGD. It probably works
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Hugh Dickins
The 4.9.77 version of "x86/pti/efi: broken conversion from efi to kernel
page table" looked nicer than the 4.4.112 version, but was suboptimal on
machines booted
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Hugh Dickins
The 4.9.77 version of "x86/pti/efi: broken conversion from efi to kernel
page table" looked nicer than the 4.4.112 version, but was suboptimal on
machines booted with "pti=off" (or
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Oliver O'Halloran
commit 6e032b350cd1fdb830f18f8320ef0e13b4e24094 upstream.
New device-tree properties are available which tell the hypervisor
settings related to the RFI
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Oliver O'Halloran
commit 6e032b350cd1fdb830f18f8320ef0e13b4e24094 upstream.
New device-tree properties are available which tell the hypervisor
settings related to the RFI flush. Use them to
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Borislav Petkov
(cherry picked from commit 7a32fc51ca938e67974cbb9db31e1a43f98345a9)
... to adhere to the _ASM_X86_ naming scheme.
No functional change.
Signed-off-by: Borislav
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Borislav Petkov
(cherry picked from commit 7a32fc51ca938e67974cbb9db31e1a43f98345a9)
... to adhere to the _ASM_X86_ naming scheme.
No functional change.
Signed-off-by: Borislav Petkov
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Dan Williams
(cherry picked from commit babdde2698d482b6c0de1eab4f697cf5856c5859)
array_index_nospec() uses a mask to sanitize user controllable array
indexes, i.e.
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Dan Williams
(cherry picked from commit babdde2698d482b6c0de1eab4f697cf5856c5859)
array_index_nospec() uses a mask to sanitize user controllable array
indexes, i.e. generate a 0 mask if
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Dan Williams
(cherry picked from commit f3804203306e098dae9ca51540fcd5eb700d7f40)
array_index_nospec() is proposed as a generic mechanism to mitigate
against
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Dan Williams
(cherry picked from commit f3804203306e098dae9ca51540fcd5eb700d7f40)
array_index_nospec() is proposed as a generic mechanism to mitigate
against Spectre-variant-1 attacks, i.e.
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Mark Rutland
(cherry picked from commit f84a56f73dddaeac1dba8045b007f742f61cd2da)
Document the rationale and usage of the new array_index_nospec() helper.
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Mark Rutland
(cherry picked from commit f84a56f73dddaeac1dba8045b007f742f61cd2da)
Document the rationale and usage of the new array_index_nospec() helper.
Signed-off-by: Mark Rutland
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Dan Williams
(cherry picked from commit b3d7ad85b80bbc404635dca80f5b129f6242bc7a)
Rename the open coded form of this instruction sequence from
rdtsc_ordered() into a
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Dan Williams
(cherry picked from commit b3d7ad85b80bbc404635dca80f5b129f6242bc7a)
Rename the open coded form of this instruction sequence from
rdtsc_ordered() into a generic barrier
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Dan Williams
(cherry picked from commit b5c4ae4f35325d520b230bab6eb3310613b72ac1)
In preparation for converting some __uaccess_begin() instances to
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Dan Williams
(cherry picked from commit b5c4ae4f35325d520b230bab6eb3310613b72ac1)
In preparation for converting some __uaccess_begin() instances to
__uacess_begin_nospec(), make sure all
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Borislav Petkov
(cherry picked from commit 55fa19d3e51f33d9cd4056d25836d93abf9438db)
Make
[0.031118] Spectre V2 mitigation: Mitigation: Full generic retpoline
into
[
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Borislav Petkov
(cherry picked from commit 55fa19d3e51f33d9cd4056d25836d93abf9438db)
Make
[0.031118] Spectre V2 mitigation: Mitigation: Full generic retpoline
into
[0.031118]
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Colin Ian King
(cherry picked from commit e698dcdfcda41efd0984de539767b4cddd235f1e)
Trivial fix to spelling mistake in pr_err error message text.
Signed-off-by:
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Colin Ian King
(cherry picked from commit e698dcdfcda41efd0984de539767b4cddd235f1e)
Trivial fix to spelling mistake in pr_err error message text.
Signed-off-by: Colin Ian King
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Dan Williams
(cherry picked from commit 56c30ba7b348b90484969054d561f711ba196507)
'fd' is a user controlled value that is used as a data dependency to
read from the
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Dan Williams
(cherry picked from commit 56c30ba7b348b90484969054d561f711ba196507)
'fd' is a user controlled value that is used as a data dependency to
read from the 'fdt->fd' array. In order
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: David Woodhouse
(cherry picked from commit 7fcae1118f5fd44a862aa5c3525248e35ee67c3b)
Despite the fact that all the other code there seems to be doing it, just
using
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: David Woodhouse
(cherry picked from commit 7fcae1118f5fd44a862aa5c3525248e35ee67c3b)
Despite the fact that all the other code there seems to be doing it, just
using set_cpu_cap() in
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Dan Williams
(cherry picked from commit 085331dfc6bbe3501fb936e657331ca943827600)
Commit 75f139aaf896 "KVM: x86: Add memory barrier on vmcs field lookup"
added a raw
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Dan Williams
(cherry picked from commit 085331dfc6bbe3501fb936e657331ca943827600)
Commit 75f139aaf896 "KVM: x86: Add memory barrier on vmcs field lookup"
added a raw 'asm("lfence");' to
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Josh Poimboeuf
(cherry picked from commit 12c69f1e94c89d40696e83804dd2f0965b5250cd)
The 'noreplace-paravirt' option disables paravirt patching, leaving the
original pv
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Josh Poimboeuf
(cherry picked from commit 12c69f1e94c89d40696e83804dd2f0965b5250cd)
The 'noreplace-paravirt' option disables paravirt patching, leaving the
original pv indirect calls in
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: David Woodhouse
(cherry picked from commit 66f793099a636862a71c59d4a6ba91387b155e0c)
There's no point in building init code with retpolines, since it runs before
any
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: David Woodhouse
(cherry picked from commit 66f793099a636862a71c59d4a6ba91387b155e0c)
There's no point in building init code with retpolines, since it runs before
any potentially hostile
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: KarimAllah Ahmed
(cherry picked from commit 9005c6834c0ffdfe46afa76656bd9276cca864f6)
[dwmw2: Use ARRAY_SIZE]
Signed-off-by: KarimAllah Ahmed
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: KarimAllah Ahmed
(cherry picked from commit 9005c6834c0ffdfe46afa76656bd9276cca864f6)
[dwmw2: Use ARRAY_SIZE]
Signed-off-by: KarimAllah Ahmed
Signed-off-by: David Woodhouse
Signed-off-by:
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Arnd Bergmann
(cherry picked from commit 4bf5d56d429cbc96c23d809a08f63cd29e1a702e)
I'm seeing build failures from the two newly introduced arrays that
are marked 'const' and
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Arnd Bergmann
(cherry picked from commit 4bf5d56d429cbc96c23d809a08f63cd29e1a702e)
I'm seeing build failures from the two newly introduced arrays that
are marked 'const' and '__initdata',
On 02/09/2018 06:14 AM, Li Zhijian wrote:
> Hi
>
> INTEL 0-Day noticed that bpf/test_maps has different results at different
> platforms.
> when it fails, the details are like
Sorry for the late reply and thanks for reporting! More below:
> --
> 880 Failed to create hashmap
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: David Hildenbrand
commit 42cf014d38d8822cce63703a467e00f65d000952 upstream.
kmap() can't fail, therefore it will always return a valid pointer. Let's
just get rid of the
On 02/09/2018 06:14 AM, Li Zhijian wrote:
> Hi
>
> INTEL 0-Day noticed that bpf/test_maps has different results at different
> platforms.
> when it fails, the details are like
Sorry for the late reply and thanks for reporting! More below:
> --
> 880 Failed to create hashmap
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: David Hildenbrand
commit 42cf014d38d8822cce63703a467e00f65d000952 upstream.
kmap() can't fail, therefore it will always return a valid pointer. Let's
just get rid of the unnecessary checks.
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Paolo Bonzini
(cherry picked from commit 904e14fb7cb96401a7dc803ca2863fd5ba32ffe6)
Place the MSR bitmap in struct loaded_vmcs, and update it in place
every time the
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Paolo Bonzini
(cherry picked from commit 904e14fb7cb96401a7dc803ca2863fd5ba32ffe6)
Place the MSR bitmap in struct loaded_vmcs, and update it in place
every time the x2apic or APICv state can
Hi Linus,
Please pull fbdev fix for v4.16 (just a single fix to make
omapfb driver build again).
Best regards,
--
Bartlomiej Zolnierkiewicz
Samsung R Institute Poland
Samsung Electronics
The following changes since commit f1517df8701c9f12dae9ce7f43a5d300a6917619:
Merge tag 'nfsd-4.16' of
Hi Linus,
Please pull fbdev fix for v4.16 (just a single fix to make
omapfb driver build again).
Best regards,
--
Bartlomiej Zolnierkiewicz
Samsung R Institute Poland
Samsung Electronics
The following changes since commit f1517df8701c9f12dae9ce7f43a5d300a6917619:
Merge tag 'nfsd-4.16' of
[...]
>> > I'd like to know if any progress has been made on that problem (I may
>> > have missed patches).
>> > Had you had the time to look at the issue?
>>
>> I have looked at the issue, but not manage to cook some patches for it.
>>
>> However, it's on my top of my TODO list for mmc. No
[...]
>> > I'd like to know if any progress has been made on that problem (I may
>> > have missed patches).
>> > Had you had the time to look at the issue?
>>
>> I have looked at the issue, but not manage to cook some patches for it.
>>
>> However, it's on my top of my TODO list for mmc. No
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: KarimAllah Ahmed
(cherry picked from commit 28c1c9fabf48d6ad596273a11c46e0d0da3e14cd)
Intel processors use MSR_IA32_ARCH_CAPABILITIES MSR to indicate RDCL_NO
(bit 0) and
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: KarimAllah Ahmed
(cherry picked from commit 28c1c9fabf48d6ad596273a11c46e0d0da3e14cd)
Intel processors use MSR_IA32_ARCH_CAPABILITIES MSR to indicate RDCL_NO
(bit 0) and IBRS_ALL (bit 1).
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: David Woodhouse
(cherry picked from commit 2961298efe1ea1b6fc0d7ee8b76018fa6c0bcef2)
We want to expose the hardware features simply in /proc/cpuinfo as "ibrs",
"ibpb" and
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: David Woodhouse
(cherry picked from commit 2961298efe1ea1b6fc0d7ee8b76018fa6c0bcef2)
We want to expose the hardware features simply in /proc/cpuinfo as "ibrs",
"ibpb" and "stibp". Since AMD
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Dou Liyang
(cherry picked from commit 9471eee9186a46893726e22ebb54cade3f9bc043)
The spectre_v2 option 'auto' does not check whether CONFIG_RETPOLINE is
enabled. As a
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Dou Liyang
(cherry picked from commit 9471eee9186a46893726e22ebb54cade3f9bc043)
The spectre_v2 option 'auto' does not check whether CONFIG_RETPOLINE is
enabled. As a consequence it fails to
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Borislav Petkov
(cherry picked from commit 0e6c16c652cadaffd25a6bb326ec10da5bcec6b4)
After commit ad67b74d2469 ("printk: hash addresses printed with %p")
pointers are being
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Andy Lutomirski
(cherry picked from commit d1f7732009e0549eedf8ea1db948dc37be77fd46)
With the fast path removed there is no point in splitting the push of the
normal and the
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Borislav Petkov
(cherry picked from commit 0e6c16c652cadaffd25a6bb326ec10da5bcec6b4)
After commit ad67b74d2469 ("printk: hash addresses printed with %p")
pointers are being hashed when
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Andy Lutomirski
(cherry picked from commit d1f7732009e0549eedf8ea1db948dc37be77fd46)
With the fast path removed there is no point in splitting the push of the
normal and the extra register
The problem is that you can not find a proper value of the threshold
time, when f2fs_gc select the GCed data page of the atomic file (which
has atomic started but not atomic committed yet), then f2fs_gc will
run into loop, and all the f2fs ops will be blocked in f2fs_balane_fs.
If the threshold
The problem is that you can not find a proper value of the threshold
time, when f2fs_gc select the GCed data page of the atomic file (which
has atomic started but not atomic committed yet), then f2fs_gc will
run into loop, and all the f2fs ops will be blocked in f2fs_balane_fs.
If the threshold
On 26 January 2018 at 09:38, Jia-Ju Bai wrote:
> After checking all possible call chains to genpd_dev_pm_detach() and
> genpd_dev_pm_attach() here,
> my tool finds that these functions are never called in atomic context,
> namely never in an interrupt handler or holding a
On 26 January 2018 at 09:38, Jia-Ju Bai wrote:
> After checking all possible call chains to genpd_dev_pm_detach() and
> genpd_dev_pm_attach() here,
> my tool finds that these functions are never called in atomic context,
> namely never in an interrupt handler or holding a spinlock.
> Thus mdelay
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Kuninori Morimoto
commit 1f8754d4daea5f257370a52a30fcb22798c54516 upstream.
If SSI uses shared pin, some SSI will be used as parent SSI.
Then, normal SSI's
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Kuninori Morimoto
commit 1f8754d4daea5f257370a52a30fcb22798c54516 upstream.
If SSI uses shared pin, some SSI will be used as parent SSI.
Then, normal SSI's remove and Parent SSI's remove
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Laurent Pinchart
commit 641307df71fe77d7b38a477067495ede05d47295 upstream.
When stopping the CRTC the driver must disable all planes and wait for
the
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: Laurent Pinchart
commit 641307df71fe77d7b38a477067495ede05d47295 upstream.
When stopping the CRTC the driver must disable all planes and wait for
the change to take effect at the next vblank.
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: KarimAllah Ahmed
(cherry picked from commit b2ac58f90540e39324e7a29a7ad471407ae0bf48)
[ Based on a patch from Paolo Bonzini ]
... basically doing
4.9-stable review patch. If anyone has any objections, please let me know.
--
From: KarimAllah Ahmed
(cherry picked from commit b2ac58f90540e39324e7a29a7ad471407ae0bf48)
[ Based on a patch from Paolo Bonzini ]
... basically doing exactly what we do for VMX:
- Passthrough
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Jason Wang
[ Upstream commit 4cd879515d686849eec5f718aeac62a70b067d82 ]
We don't stop device before reset owner, this means we could try to
serve any virtqueue kick
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Jason Wang
[ Upstream commit 4cd879515d686849eec5f718aeac62a70b067d82 ]
We don't stop device before reset owner, this means we could try to
serve any virtqueue kick before reset dev->worker.
901 - 1000 of 1658 matches
Mail list logo