Hi!
> > +/*
> > + * State component 12 is Control flow Enforcement kernel states
> > + */
> > +struct cet_kernel_state {
> > + u64 kernel_ssp; /* kernel shadow stack */
> > + u64 pl1_ssp;/* ring-1 shadow stack */
> > + u64 pl2_ssp;/* ring-2 shadow stack */
>
> Just write "privilege
> > Just write "privilege level" everywhere - not "ring".
> >
> > Btw, do you see how the type and the name of all those other fields in
> > that file are tabulated? Except yours...
>
> I will fix it.
Don't. It is not broken.
--
(english) http://www.livejournal.com/~pavelmachek
(cesky, picture
> > > > +/*
> > > > + * State component 12 is Control flow Enforcement kernel states
> > > > + */
> > > > +struct cet_kernel_state {
> > > > + u64 kernel_ssp; /* kernel shadow stack */
> > > > + u64 pl1_ssp;/* ring-1 shadow stack */
> > > > + u64 pl2_ssp;/* ring-2 shadow s
> On Nov 11, 2018, at 3:31 AM, Pavel Machek wrote:
>
> Hi!
>
>>> +/*
>>> + * State component 12 is Control flow Enforcement kernel states
>>> + */
>>> +struct cet_kernel_state {
>>> +u64 kernel_ssp;/* kernel shadow stack */
>>> +u64 pl1_ssp;/* ring-1 shadow stack */
>>> +u
On Fri, Oct 26, 2018 at 04:43:24PM +0200, Boris Brezillon wrote:
> Hi Greg,
>
> I think we've reached a point where we can eventually consider the I3C
> framework for inclusion in 4.20 (5.0?). A few more issues were reported
> on v9 and fixed in v10. I can't guarantee that the implementation is
>
On Thu, Nov 08, 2018 at 05:14:08PM +, Vitor soares wrote:
> This patch series is a proposal for the I3C master driver for Synopsys IP.
> This patch is to be applied on top of I3C subsystem RFC V10 submitted by
> Boris Brezillon.
I'd like to get Boris's reviewed/signed-off on these before I tak
Hi Greg,
On Sun, 11 Nov 2018 09:39:32 -0800
Greg Kroah-Hartman wrote:
> On Fri, Oct 26, 2018 at 04:43:24PM +0200, Boris Brezillon wrote:
> > Hi Greg,
> >
> > I think we've reached a point where we can eventually consider the I3C
> > framework for inclusion in 4.20 (5.0?). A few more issues were
On 11/10/18 1:03 AM, Juergen Gross wrote:
>
> How would that help? The garabge data written could have the correct
> terminal sentinel value by chance.
>
> That's why I re-used an existing field in setup_header (the version) to
> let grub tell the kernel which part of setup_header was written by
On Sun 2018-11-11 06:59:24, Andy Lutomirski wrote:
>
>
> > On Nov 11, 2018, at 3:31 AM, Pavel Machek wrote:
> >
> > Hi!
> >
> >>> +/*
> >>> + * State component 12 is Control flow Enforcement kernel states
> >>> + */
> >>> +struct cet_kernel_state {
> >>> +u64 kernel_ssp;/* kernel shado
On Sun, Nov 11, 2018 at 07:10:17PM +0100, Boris Brezillon wrote:
> Hi Greg,
>
> On Sun, 11 Nov 2018 09:39:32 -0800
> Greg Kroah-Hartman wrote:
>
> > On Fri, Oct 26, 2018 at 04:43:24PM +0200, Boris Brezillon wrote:
> > > Hi Greg,
> > >
> > > I think we've reached a point where we can eventually
On Sun, 11 Nov 2018 11:10:20 -0800
Greg Kroah-Hartman wrote:
> On Sun, Nov 11, 2018 at 07:10:17PM +0100, Boris Brezillon wrote:
> > Hi Greg,
> >
> > On Sun, 11 Nov 2018 09:39:32 -0800
> > Greg Kroah-Hartman wrote:
> >
> > > On Fri, Oct 26, 2018 at 04:43:24PM +0200, Boris Brezillon wrote:
>
On Sun, Nov 11, 2018 at 09:08:18PM +0100, Boris Brezillon wrote:
> On Sun, 11 Nov 2018 11:10:20 -0800
> Greg Kroah-Hartman wrote:
>
> > On Sun, Nov 11, 2018 at 07:10:17PM +0100, Boris Brezillon wrote:
> > > Hi Greg,
> > >
> > > On Sun, 11 Nov 2018 09:39:32 -0800
> > > Greg Kroah-Hartman wrote:
On Sun, Nov 11, 2018 at 12:57:18PM -0800, Greg Kroah-Hartman wrote:
> On Sun, Nov 11, 2018 at 09:08:18PM +0100, Boris Brezillon wrote:
> > On Sun, 11 Nov 2018 11:10:20 -0800
> > Greg Kroah-Hartman wrote:
> >
> > > On Sun, Nov 11, 2018 at 07:10:17PM +0100, Boris Brezillon wrote:
> > > > Hi Greg,
>
From: Timofey Titovets
ksm by default working only on memory that added by
madvice().
And only way get that work on other applications:
- Use LD_PRELOAD and libraries
- Patch kernel
Lets use kernel task list in ksm_scan_thread and add logic to allow ksm
import VMA from tasks.
That behaviour c
4.18-stable review patch. If anyone has any objections, please let me know.
--
From: Juergen Gross
commit 357d291ce035d1b757568058f3c9898c60d125b1 upstream.
The boot loader version reported via sysfs is wrong in case of the
kernel being booted via the Xen PVH boot entry. it sh
4.14-stable review patch. If anyone has any objections, please let me know.
--
From: Juergen Gross
commit 357d291ce035d1b757568058f3c9898c60d125b1 upstream.
The boot loader version reported via sysfs is wrong in case of the
kernel being booted via the Xen PVH boot entry. it sh
On November 10, 2018 7:22:29 AM PST, Juergen Gross wrote:
>On 09/11/2018 23:23, H. Peter Anvin wrote:
>> I just noticed this patch -- I missed it because the cover message
>> seemed far more harmless so I didn't notice this change.
>>
>> THIS PATCH IS FATALLY WRONG AND NEEDS TO BE IMMEDIATELY REV
4.19-stable review patch. If anyone has any objections, please let me know.
--
From: Juergen Gross
commit 357d291ce035d1b757568058f3c9898c60d125b1 upstream.
The boot loader version reported via sysfs is wrong in case of the
kernel being booted via the Xen PVH boot entry. it sh
On Mon, Nov 12, 2018 at 12:26:10AM +0300, Timofey Titovets wrote:
> ksm by default working only on memory that added by
> madvice().
>
> And only way get that work on other applications:
> - Use LD_PRELOAD and libraries
> - Patch kernel
>
> Lets use kernel task list in ksm_scan_thread and add l
Hello Stephen & All,
On Mon, Sep 03, 2018 at 09:38:43AM +0300, Matti Vaittinen wrote:
>
> On Sat, Sep 01, 2018 at 12:13:26PM -0700, Stephen Boyd wrote:
> > Quoting Matti Vaittinen (2018-08-31 03:21:23)
> > > Hello All,
> > >
> > > Just wanted to point out for the reviewers that this patch depend
From: Kenneth Lee
*WarpDrive* is a general accelerator framework for the user application to
access the hardware without going through the kernel in data path.
WarpDrive is the name for the whole framework. The component in kernel
is called uacce, meaning "Unified/User-space-access-intended Acce
Signed-off-by: Mike Rapoport
Reviewed-by: Randy Dunlap
---
v2: address Matthew's feedback
Documentation/admin-guide/mm/concepts.rst | 51 ---
1 file changed, 26 insertions(+), 25 deletions(-)
diff --git a/Documentation/admin-guide/mm/concepts.rst
b/Documentation/a
Add references to GFP documentation and the memory-allocation.rst and remove
GFP_USER, GFP_DMA and GFP_NOIO descriptions.
While on it slightly change the formatting so that the list of GFP flags
will be rendered as "description" in the generated html.
Signed-off-by: Mike Rapoport
---
Probably t
Hi,friend,
This is Daniel Murray and i am from Sinara Group Co.Ltd Group Co.,LTD in Russia.
We are glad to know about your company from the web and we are interested in
your products.
Could you kindly send us your Latest catalog and price list for our trial order.
Best Regards,
Daniel Murray
24 matches
Mail list logo