On Tue, 12 Nov 2024, Vitaly Kuznetsov wrote:
> >> Reviewed-by: Michael Kelley
> >
> > Tested V2 as well, please feel free to add,
> > Tested-by: Saurabh Sengar
>
> Thank you!
Applied to hid.git, thanks!
--
Jiri Kosina
SUSE Labs
Enable X86_FEATURE_TSC_RELIABLE by default as X86_FEATURE_TSC_RELIABLE is
independent from invariant TSC and should have never been gated by the
HV_ACCESS_TSC_INVARIANT privilege.
To elaborate, the HV_ACCESS_TSC_INVARIANT privilege allows certain types of
guests to opt-in to invariant TSC by writi
Please disregard.
Stanislav
On Tue, Nov 12, 2024 at 06:16:26PM +, Stanislav Kinsburskii wrote:
> x86/hyperv: Set X86_FEATURE_TSC_RELIABLE unconditionally
>
> Enable X86_FEATURE_TSC_RELIABLE by default as X86_FEATURE_TSC_RELIABLE is
> independent from invariant TSC and should have never been
From: Stanislav Kinsburskii Sent: Tuesday,
November 12, 2024 10:18 AM
>
> Enable X86_FEATURE_TSC_RELIABLE by default as X86_FEATURE_TSC_RELIABLE is
> independent from invariant TSC and should have never been gated by the
> HV_ACCESS_TSC_INVARIANT privilege.
I think originally X86_FEATURE_TSC_RE
x86/hyperv: Set X86_FEATURE_TSC_RELIABLE unconditionally
Enable X86_FEATURE_TSC_RELIABLE by default as X86_FEATURE_TSC_RELIABLE is
independent from invariant TSC and should have never been gated by the
HV_ACCESS_TSC_INVARIANT privilege.
To elaborate, the HV_ACCESS_TSC_INVARIANT privilege allows c
The reference implementation of hv_get_dns_info which is in the tree uses
/etc/resolv.conf to get DNS servers and this does not require to know which
NIC is queried. Distro specific implementations, however, may want to
provide per-NIC, fine grained information. E.g. NetworkManager keeps track
of D
Saurabh Singh Sengar writes:
> On Mon, Nov 11, 2024 at 04:50:24PM +, Michael Kelley wrote:
>> From: Vitaly Kuznetsov Sent: Monday, November 11, 2024
>> 5:13 AM
>> >
>> > It was found that unloading 'hid_hyperv' module results in a devres
>> > complaint:
>> >
>> > ...
>> > hv_vmbus: unre