[GIT PULL] Ceph fixes for -rc7
Hi Linus, Please pull the following Ceph patch from git://git.kernel.org/pub/scm/linux/kernel/git/sage/ceph-client.git for-linus This is a final
View ArticleLinux 3.18.28
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I'm announcing the release of the 3.18.28 kernel. All users of the 3.18 kernel series must upgrade. T
View ArticleLinux 4.1.19
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I'm announcing the release of the 4.1.19 kernel. All users of the 4.1 kernel series must upgrade. The
View Article[PATCH v2] serial: mvebu-uart: fix platform_no_drv_owner.cocci warnings
No need to set .owner here. The core will do it. Generated by: scripts/coccinelle/api/platform_no_drv_owner.cocci CC: Wilson Ding <dingwei@marvell.c
View Articleinclude/linux/kprobes.h:361:2: error: invalid use of undefined type...
tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master head: 67944024c1cdd897e49a09b0d6af3ea38d1388ca commit: b2c0b2cbb28
View Article[PATCH] target: Drop incorrect ABORT_TASK put for completed commands
From: Nicholas Bellinger <nab@linux-iscsi.org> This patch fixes a recent ABORT_TASK regression associated with commit febe562c, where a left-over tar
View Article[RESEND PATCH v2 1/2] dt/bindings: Add bindings for PIC32 SPI peripheral
Signed-off-by: Purna Chandra Mandal <purna.mandal@microchip.com> --- Changes in v2: - fix indentation - add space after comma - moved 'cs-gpios'
View Article[PATCH v2] sched/cputime: steal_account_process_tick() should return jiffies
The callers of steal_account_process_tick() expect it to return whether a jiffy should be considered stolen or not. Currently the return value of ste
View Article[PATCH v2 01/10] selftests/x86: In syscall_nt, test NT|TF as well
Setting TF prevents fastpath returns in most cases, which causes the test to fail on 32-bit kernels because 32-bit kernels do not, in fact, handle NT
View Article[PATCH v2 02/10] x86/entry/compat: In SYSENTER, sink AC clearing below the...
CLAC is slow, and the SYSENTER code already has an unlikely path that runs if unusual flags are set. Drop the CLAC and instead rely on the unlikely p
View Article[PATCH v2 03/10] x86/entry/32: Filter NT and speed up AC filtering in SYSENTER
This makes the 32-bit code work just like the 64-bit code. It should speed up syscalls on 32-bit kernels on Skylake by something like 20 cycles (by a
View Article[PATCH v2 04/10] x86/entry/32: Restore FLAGS on SYSEXIT
We weren't restoring FLAGS at all on SYSEXIT. Apparently no one cared. With this patch applied, native kernels should always honor task_pt_regs()->f
View Article[PATCH v2 05/10] x86/traps: Clear TIF_BLOCKSTEP on all debug exceptions
The SDM says that debug exceptions clear BTF, and we need to keep TIF_BLOCKSTEP in sync with BTF. Clear it unconditionally and improve the comment.
View Article[PATCH v2 06/10] x86/traps: Clear DR6 early in do_debug and improve the comment
Leaving any bits set in DR6 on return from a debug exception is asking for trouble. Prevent it by writing zero right away and clarify the comment. S
View Article[PATCH v2 07/10] x86/entry: Vastly simplify SYSENTER TF handling
Due to a blatant design error, SYSENTER doesn't clear TF. As a result, if a user does SYSENTER with TF set, we will single-step through the kernel un
View Article[PATCH v2 08/10] x86/entry: Only allocate space for SYSENTER_stack if needed
The SYSENTER stack is only used on 32-bit kernels. Remove it in 64-bit kernels. (We may end up using it down the road on 64-bit kernels. If so, we
View Article[PATCH v2 09/10] x86/entry/32: Simplify and fix up the SYSENTER stack #DB/NMI...
Right after SYSENTER, we can get a #DB or NMI. On x86_32, there's no IST, so the exception handler is invoked on the temporary SYSENTER stack. Becau
View Article[PATCH v2 10/10] x86/entry/32: Add and check a stack canary for the SYSENTER...
Signed-off-by: Andy Lutomirski <luto@kernel.org> --- arch/x86/include/asm/processor.h | 3 ++- arch/x86/kernel/process.c | 3 +++ arch/x86/ker
View Articleuser namespace and fully visible proc and sys mounts
Hi, So we've been over this many times... but unfortunately there is more breakage to report. Regular privileged and unprivileged containers work a
View Article[PATCH 2/2] mmc: dw_mmc: add resets support to dw_mmc
mmc registers may in abnormal state if mmc is used in bootloader, eg. to support booting from eMMC. So we need reset mmc registers when kernel boots u
View Article