'cpu' is used at only one place and there is no need to keep a separate
variable for it.
Signed-off-by: Viresh Kumar
---
drivers/thermal/cpu_cooling.c | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/drivers/thermal/cpu_cooling.c b/drivers/thermal/cpu_cooling.c
index 1f4b6a7
We need such a routine at two places already, lets create one.
Signed-off-by: Viresh Kumar
---
drivers/cpufreq/cpufreq_stats.c | 13 -
drivers/thermal/cpu_cooling.c | 22 +-
include/linux/cpufreq.h | 14 ++
3 files changed, 27 insertions(+),
Objects of "struct cpufreq_cooling_device" are named a bit
inconsistently. Lets use cpufreq_cdev everywhere. Also note that the
lists containing such devices is renamed similarly too.
Signed-off-by: Viresh Kumar
---
drivers/thermal/cpu_cooling.c | 248 +-
Just to make it look better.
Signed-off-by: Viresh Kumar
---
drivers/thermal/cpu_cooling.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/thermal/cpu_cooling.c b/drivers/thermal/cpu_cooling.c
index be29489dd247..ce94aafed25d 100644
--- a/drivers/thermal/cpu_cooling.c
this patch depends on patch 1 and 2
enforces restrictions on unprivileged users injecting commands
into other processes in the same tty session using the TIOCSTI ioctl
Signed-off-by: Matt Brown
---
drivers/tty/tty_io.c | 4
1 file changed, 4 insertions(+)
diff --git a/drivers/tty/tty_io.c
this patch depends on patches 1, 2 and 3
Allow CONFIG_SECURITY_TIOCSTI_RESTRICT to be controlled via sysctl
Signed-off-by: Matt Brown
---
kernel/sysctl.c | 12
1 file changed, 12 insertions(+)
diff --git a/kernel/sysctl.c b/kernel/sysctl.c
index acf0a5a..68d1363 100644
--- a/kerne
This patch add the panel device tree node for s6e3hf2 display
controller to TM2e dts.
Signed-off-by: Hoegeun Kwon
---
arch/arm64/boot/dts/exynos/exynos5433-tm2e.dts | 12
1 file changed, 12 insertions(+)
diff --git a/arch/arm64/boot/dts/exynos/exynos5433-tm2e.dts
b/arch/arm64/boot
adding the kernel config SECURITY_TIOCSTI_RESTRICT in order to allow
the user to restrict unprivileged command injection using TIOCSTI
tty ioctls
Signed-off-by: Matt Brown
---
security/Kconfig | 12
1 file changed, 12 insertions(+)
diff --git a/security/Kconfig b/security/Kconfig
i
The following patchset reproduces GRKERNSEC_HARDEN_TTY functionality from the
grsecurity project in-kernel. The purpose of this feature is to restrict
unprivileged users from injecting commands into other processes in the same tty
session by using the TIOCSTI ioctl.
It creates the kernel config
adding extern variable tiocsti_restrict to allow it to be included
in sysctl
Signed-off-by: Matt Brown
---
include/linux/tty.h | 2 ++
1 file changed, 2 insertions(+)
diff --git a/include/linux/tty.h b/include/linux/tty.h
index 1017e904..7011102 100644
--- a/include/linux/tty.h
+++ b/include/li
On Friday 14 April 2017 07:51 PM, Tony Lindgren wrote:
> * Keerthy [170412 21:55]:
>> Add power hold and power controller properties to palmas node.
>> This is needed to shutdown pmic correctly on boards with
>> powerhold set.
>
> Is this OK to wait for v4.12 or is this needed as a fix for
> th
The attribute declaration is typically before the definition. Move
the __maybe_unused attribute declaration before the struct keyword.
Signed-off-by: Stefan Agner
---
drivers/net/ethernet/cirrus/cs89x0.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/net/ethernet/cir
On Tue, Apr 11, 2017 at 10:18 AM, Ilia Mirkin wrote:
>> However, I totally agree with Alex that someone with a BE machine
>> should review the whole stack before we could be confident with anything.
>
> Here's what I'm confident about: xf86-video-nouveau worked just fine
> on top of kernel 4.3 on
On Sat, Apr 15, 2017 at 07:01:24PM +0200, Thomas Gleixner wrote:
> +++ b/drivers/pci/pci-driver.c
> @@ -320,10 +320,19 @@ static long local_pci_probe(void *_ddi)
> return 0;
> }
>
> +static bool pci_physfn_is_probed(struct pci_dev *dev)
> +{
> +#ifdef CONFIG_ATS
> + return dev->physfn-
On Sun, Apr 16, 2017 at 07:42:27PM -0600, Alex Williamson wrote:
[...]
> -static void vfio_lock_acct(struct task_struct *task, long npage)
> +static int vfio_lock_acct(struct task_struct *task, long npage, bool
> lock_cap)
> {
> - struct vwork *vwork;
> struct mm_struct *mm;
> b
On Sat, Apr 15, 2017 at 07:01:27PM +0200, Thomas Gleixner wrote:
> There are no more (known) nested calls to get_online_cpus() so it's
> possible to remove the nested call magic and convert the mutex to a
> percpu-rwsem, which speeds up get/put_online_cpus() significantly for the
> uncontended case
On Mon, Apr 17, 2017 at 02:07:03AM -0400, Matt Brown wrote:
> adding the kernel config SECURITY_TIOCSTI_RESTRICT in order to allow
> the user to restrict unprivileged command injection using TIOCSTI
> tty ioctls
"unpriviledged command injection"? That sounds a bit "odd", don't you
think?
>
> Si
On Mon, Apr 17, 2017 at 02:07:04AM -0400, Matt Brown wrote:
> adding extern variable tiocsti_restrict to allow it to be included
> in sysctl
>
> Signed-off-by: Matt Brown
> ---
> include/linux/tty.h | 2 ++
> 1 file changed, 2 insertions(+)
I'm all for breaking up changes to be tiny logical pie
On Mon, Apr 17, 2017 at 02:07:05AM -0400, Matt Brown wrote:
> this patch depends on patch 1 and 2
>
> enforces restrictions on unprivileged users injecting commands
> into other processes in the same tty session using the TIOCSTI ioctl
>
> Signed-off-by: Matt Brown
> ---
> drivers/tty/tty_io.c
On Sun, Apr 16, 2017 at 07:42:39PM -0600, Alex Williamson wrote:
> With vfio_lock_acct() testing the locked memory limit under mmap_sem,
> it's redundant to do it here for a single page. We can also reorder
> our tests such that we can avoid testing for reserved pages if we're
> not doing accounti
On Sun, Apr 16, 2017 at 04:30:32PM -0700, Guenter Roeck wrote:
> On 04/16/2017 03:48 AM, Greg Kroah-Hartman wrote:
> > This is the start of the stable review cycle for the 3.18.49 release.
> > There are 145 patches in this series, all will be posted as a response
> > to this one. If anyone has any
401 - 421 of 421 matches
Mail list logo