[PATCH v3 41/75] x86/sev-es: Setup early #VC handler

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Setup an early handler for #VC exceptions. There is no GHCB mapped yet, so just re-use the vc_no_ghcb_handler. It can only handle CPUID exit-codes, but that should be enough to get the kernel through verify_cpu() and __startup_64() until it runs on virtual addresses. Signed-of

[PATCH v3 52/75] x86/sev-es: Handle MMIO String Instructions

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Add handling for emulation the MOVS instruction on MMIO regions, as done by the memcpy_toio() and memcpy_fromio() functions. Signed-off-by: Joerg Roedel --- arch/x86/kernel/sev-es.c | 78 1 file changed, 78 insertions(+) diff --git a

[PATCH v3 72/75] x86/head/64: Rename start_cpu0

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel For SEV-ES this entry point will be used for restarting APs after they have been offlined. Remove the '0' from the name to reflect that. Signed-off-by: Joerg Roedel --- arch/x86/include/asm/cpu.h | 2 +- arch/x86/kernel/head_32.S | 4 ++-- arch/x86/kernel/head_64.S | 6 +++

[PATCH v3 62/75] x86/sev-es: Handle #AC Events

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Implement a handler for #VC exceptions caused by #AC exceptions. The #AC exception is just forwarded to do_alignment_check() and not pushed down to the hypervisor, as requested by the SEV-ES GHCB Standardization Specification. Signed-off-by: Joerg Roedel --- arch/x86/kernel/

Re: [PATCH] Remove drm_display_mode.hsync

2020-04-28 Thread Daniel Vetter
On Mon, Apr 27, 2020 at 10:05:17AM +0200, Michal Orzel wrote: > As suggested by the TODO list of DRM subsystem: > -remove the member hsync of drm_display_mode > -convert code using hsync member to use drm_mode_hsync() > > Signed-off-by: Michal Orzel I think Ville has a bunch of patches doing thi

[PATCH v3 64/75] x86/sev-es: Cache CPUID results for improved performance

2020-04-28 Thread Joerg Roedel
From: Mike Stunes To avoid a future VMEXIT for a subsequent CPUID function, cache the results returned by CPUID into an xarray. [tl: coding standard changes, register zero extension] Signed-off-by: Mike Stunes Signed-off-by: Tom Lendacky [ jroe...@suse.de: - Wrapped cache handling into vc_ha

[PATCH v3 66/75] x86/kvm: Add KVM specific VMMCALL handling under SEV-ES

2020-04-28 Thread Joerg Roedel
From: Tom Lendacky Implement the callbacks to copy the processor state required by KVM to the GHCB. Signed-off-by: Tom Lendacky [ jroe...@suse.de: - Split out of a larger patch - Adapt to different callback functions ] Co-developed-by: Joerg Roedel Signed-off-by: Joerg Roede

[PATCH v3 68/75] x86/realmode: Add SEV-ES specific trampoline entry point

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel The code at the trampoline entry point is executed in real-mode. In real-mode #VC exceptions can't be handled, so anything that might cause such an exception must be avoided. In the standard trampoline entry code this is the WBINVD instruction and the call to verify_cpu(), whi

[PATCH v3 67/75] x86/vmware: Add VMware specific handling for VMMCALL under SEV-ES

2020-04-28 Thread Joerg Roedel
From: Doug Covelli This change adds VMware specific handling for #VC faults caused by VMMCALL instructions. Signed-off-by: Doug Covelli Signed-off-by: Tom Lendacky [ jroe...@suse.de: - Adapt to different paravirt interface ] Co-developed-by: Joerg Roedel Signed-off-by: Joerg Roedel --- arch

[PATCH v3 65/75] x86/paravirt: Allow hypervisor specific VMMCALL handling under SEV-ES

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Add two new paravirt callbacks to provide hypervisor specific processor state in the GHCB and to copy state from the hypervisor back to the processor. Signed-off-by: Joerg Roedel --- arch/x86/include/asm/x86_init.h | 16 +++- arch/x86/kernel/sev-es.c| 12

[PATCH v3 61/75] x86/sev-es: Handle VMMCALL Events

2020-04-28 Thread Joerg Roedel
From: Tom Lendacky Implement a handler for #VC exceptions caused by VMMCALL instructions. This patch is only a starting point, VMMCALL emulation under SEV-ES needs further hypervisor-specific changes to provide additional state. Signed-off-by: Tom Lendacky [ jroe...@suse.de: Adapt to #VC handli

[PATCH v3 58/75] x86/sev-es: Handle INVD Events

2020-04-28 Thread Joerg Roedel
From: Tom Lendacky Implement a handler for #VC exceptions caused by INVD instructions. Since Linux should never use INVD, just mark it as unsupported. Signed-off-by: Tom Lendacky [ jroe...@suse.de: Adapt to #VC handling infrastructure ] Co-developed-by: Joerg Roedel Signed-off-by: Joerg Roedel

[PATCH v3 59/75] x86/sev-es: Handle MONITOR/MONITORX Events

2020-04-28 Thread Joerg Roedel
From: Tom Lendacky Implement a handler for #VC exceptions caused by MONITOR and MONITORX instructions. Signed-off-by: Tom Lendacky [ jroe...@suse.de: Adapt to #VC handling infrastructure ] Co-developed-by: Joerg Roedel Signed-off-by: Joerg Roedel --- arch/x86/kernel/sev-es.c | 19 +++

[PATCH v3 60/75] x86/sev-es: Handle MWAIT/MWAITX Events

2020-04-28 Thread Joerg Roedel
From: Tom Lendacky Implement a handler for #VC exceptions caused by MWAIT and MWAITX instructions. Signed-off-by: Tom Lendacky [ jroe...@suse.de: Adapt to #VC handling infrastructure ] Co-developed-by: Joerg Roedel Signed-off-by: Joerg Roedel --- arch/x86/kernel/sev-es.c | 12 1

[PATCH v3 51/75] x86/sev-es: Handle MMIO events

2020-04-28 Thread Joerg Roedel
From: Tom Lendacky Add handler for VC exceptions caused by MMIO intercepts. These intercepts come along as nested page faults on pages with reserved bits set. Signed-off-by: Tom Lendacky [ jroe...@suse.de: Adapt to VC handling framework ] Co-developed-by: Joerg Roedel Signed-off-by: Joerg Roed

[PATCH v3 27/75] x86/sev-es: Add CPUID handling to #VC handler

2020-04-28 Thread Joerg Roedel
From: Tom Lendacky Handle #VC exceptions caused by CPUID instructions. These happen in early boot code when the KASLR code checks for RDTSC. Signed-off-by: Tom Lendacky [ jroe...@suse.de: Adapt to #VC handling framework ] Co-developed-by: Joerg Roedel Signed-off-by: Joerg Roedel --- arch/x86

[PATCH v3 57/75] x86/sev-es: Handle RDPMC Events

2020-04-28 Thread Joerg Roedel
From: Tom Lendacky Implement a handler for #VC exceptions caused by RDPMC instructions. Signed-off-by: Tom Lendacky [ jroe...@suse.de: Adapt to #VC handling infrastructure ] Co-developed-by: Joerg Roedel Signed-off-by: Joerg Roedel --- arch/x86/kernel/sev-es.c | 22 ++ 1

[PATCH v3 54/75] x86/sev-es: Handle DR7 read/write events

2020-04-28 Thread Joerg Roedel
From: Tom Lendacky Add code to handle #VC exceptions on DR7 register reads and writes. This is needed early because show_regs() reads DR7 to print it out. Under SEV-ES there is currently no support for saving/restoring the DRx registers, but software expects to be able to write to the DR7 regist

Re: [PATCH v3 3/4] thermal/drivers/cpuidle_cooling: Change the registration function

2020-04-28 Thread Lukasz Luba
Hi Daniel, I have checked the patches and run them on Juno. Please find my comments below. On 4/14/20 11:08 PM, Daniel Lezcano wrote: Today, there is no user for the cpuidle cooling device. The targetted platform is ARM and ARM64. The cpuidle and the cpufreq cooling device are based on the dev

[PATCH v3 50/75] x86/sev-es: Do not crash on #VC exceptions from user-space

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Send SIGBUS to the user-space process that caused the #VC exception instead of killing the machine. Also ratelimit the error messages so that user-space can't flood the kernel log and add a prefix the the messages printed for SEV-ES. Signed-off-by: Joerg Roedel --- arch/x86/

[PATCH v3 56/75] x86/sev-es: Handle RDTSC(P) Events

2020-04-28 Thread Joerg Roedel
From: Tom Lendacky Implement a handler for #VC exceptions caused by RDTSC and RDTSCP instructions. Also make it available in the pre-decompression stage because the KASLR code used RDTSC/RDTSCP to gather entropy and some hypervisors intercept these instructions. Signed-off-by: Tom Lendacky [ jr

[PATCH v3 53/75] x86/sev-es: Handle MSR events

2020-04-28 Thread Joerg Roedel
From: Tom Lendacky Implement a handler for #VC exceptions caused by RDMSR/WRMSR instructions. Signed-off-by: Tom Lendacky [ jroe...@suse.de: Adapt to #VC handling infrastructure ] Co-developed-by: Joerg Roedel Signed-off-by: Joerg Roedel --- arch/x86/kernel/sev-es.c | 28

[PATCH v3 17/75] x86/boot/compressed/64: Don't pre-map memory in KASLR code

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel With the page-fault handler in place the identity mapping can be built on-demand. So remove the code which manually creates the mappings and unexport/remove the functions used for it. Signed-off-by: Joerg Roedel --- arch/x86/boot/compressed/ident_map_64.c | 16 ++

[PATCH v3 20/75] x86/boot/compressed/64: Call set_sev_encryption_mask earlier

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Call set_sev_encryption_mask() while still on the stage 1 #VC-handler, because the stage 2 handler needs our own page-tables to be set up, to which calling set_sev_encryption_mask() is a prerequisite. Signed-off-by: Joerg Roedel --- arch/x86/boot/compressed/head_64.S |

[PATCH v3 47/75] x86/sev-es: Add Runtime #VC Exception Handler

2020-04-28 Thread Joerg Roedel
From: Tom Lendacky Add the handler for #VC exceptions invoked at runtime. Signed-off-by: Tom Lendacky Signed-off-by: Joerg Roedel --- arch/x86/entry/entry_64.S| 4 + arch/x86/include/asm/traps.h | 7 ++ arch/x86/kernel/idt.c| 4 +- arch/x86/kernel/sev-es.c | 167

[PATCH v3 43/75] x86/sev-es: Setup per-cpu GHCBs for the runtime handler

2020-04-28 Thread Joerg Roedel
From: Tom Lendacky The runtime handler needs a GHCB per CPU. Set them up and map them unencrypted. Signed-off-by: Tom Lendacky Signed-off-by: Joerg Roedel --- arch/x86/include/asm/mem_encrypt.h | 2 ++ arch/x86/kernel/sev-es.c | 56 +- arch/x86/kernel/tr

[PATCH v3 45/75] x86/dumpstack/64: Handle #VC exception stacks

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Make the stack unwinder aware of the IST stacks for the #VC exception handler. Signed-off-by: Joerg Roedel --- arch/x86/include/asm/cpu_entry_area.h | 1 + arch/x86/include/asm/sev-es.h | 13 arch/x86/include/asm/stacktrace.h | 4 +++ arch/x86/kernel/d

Re: [PATCH v2] arm64: dts: allwinner: h6: Use dummy regulator for Tanix TX6

2020-04-28 Thread Robin Murphy
On 2020-04-28 3:26 pm, Clément Péron wrote: Tanix TX6 has a fixed regulator. As DVFS is instructed to change voltage to meet OPP table, the DVFS is not working as expected. Hmm, isn't that really a bug in the DVFS code? I guess it's just blindly propagating -EINVAL from the fixed regulators no

[PATCH v3 42/75] x86/sev-es: Setup GHCB based boot #VC handler

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Add the infrastructure to handle #VC exceptions when the kernel runs on virtual addresses and has a GHCB mapped. This handler will be used until the runtime #VC handler takes over. Signed-off-by: Joerg Roedel --- arch/x86/include/asm/segment.h | 2 +- arch/x86/include/asm

[PATCH v3 44/75] x86/sev-es: Allocate and Map IST stacks for #VC handler

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Allocate and map enough stacks for the #VC handler to support sufficient levels of nesting and the NMI-in-#VC scenario. Also setup the IST entrys for the #VC handler on all CPUs because #VC needs to work before cpu_init() has set up the per-cpu TSS. Signed-off-by: Joerg Roede

[PATCH v3 49/75] x86/sev-es: Handle instruction fetches from user-space

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel When a #VC exception is triggered by user-space the instruction decoder needs to read the instruction bytes from user addresses. Enhance vc_decode_insn() to safely fetch kernel and user instructions. Signed-off-by: Joerg Roedel --- arch/x86/kernel/sev-es.c | 31

[PATCH v3 46/75] x86/sev-es: Shift #VC IST Stack in nmi_enter()/nmi_exit()

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel When an NMI hits in the #VC handler entry code before it shifted its IST entry, then any subsequent #VC exception in the NMI code-path will overwrite the interrupted #VC handlers stack. Make sure this doesn't happen by explicitly shifting the #VC IST entry in the NMI handler

[PATCH v3 22/75] x86/boot/compressed/64: Add set_page_en/decrypted() helpers

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel The functions are needed to map the GHCB for SEV-ES guests. The GHCB is used for communication with the hypervisor, so its content must not be encrypted. After the GHCB is not needed anymore it must be mapped encrypted again so that the running kernel image can safely re-use th

[PATCH v3 19/75] x86/boot/compressed/64: Add stage1 #VC handler

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Add the first handler for #VC exceptions. At stage 1 there is no GHCB yet becaue we might still be on the EFI page table and thus can't map memory unencrypted. The stage 1 handler is limited to the MSR based protocol to talk to the hypervisor and can only support CPUID exit-co

[PATCH v3 40/75] x86/sev-es: Compile early handler code into kernel image

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Setup sev-es.c and include the code from the pre-decompression stage to also build it into the image of the running kernel. Temporarily add __maybe_unused annotations to avoid build warnings until the functions get used. Signed-off-by: Joerg Roedel --- arch/x86/kernel/Makefi

[PATCH v3 14/75] x86/boot/compressed/64: Rename kaslr_64.c to ident_map_64.c

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel The file contains only code related to identity mapped page-tables. Rename the file and compile it always in. Signed-off-by: Joerg Roedel --- arch/x86/boot/compressed/Makefile| 2 +- .../boot/compressed/{kaslr_64.c => ident_map_64.c} | 12

[PATCH v3 35/75] x86/head/64: Build k/head64.c with -fno-stack-protector

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel The code inserted by the stack protector does not work in the early boot environment because it uses the GS segment, at least with memory encryption enabled. Make sure the early code is compiled without this feature enabled. Signed-off-by: Joerg Roedel --- arch/x86/kernel/Ma

[PATCH v3 33/75] x86/head/64: Load segment registers earlier

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Make sure segments are properly set up before setting up an IDT and doing anything that might cause a #VC exception. This is later needed for early exception handling. Signed-off-by: Joerg Roedel --- arch/x86/kernel/head_64.S | 52 +++ 1 f

[PATCH v3 31/75] x86/head/64: Install boot GDT

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Handling exceptions during boot requires a working GDT. The kernel GDT is not yet ready for use, so install a temporary boot GDT. Signed-off-by: Joerg Roedel --- arch/x86/kernel/head_64.S | 36 1 file changed, 36 insertions(+) diff --git

[PATCH v3 38/75] x86/sev-es: Add SEV-ES Feature Detection

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Add the sev_es_active function for checking whether SEV-ES is enabled. Also cache the value of MSR_AMD64_SEV at boot to speed up the feature checking in the running code. Signed-off-by: Joerg Roedel --- arch/x86/include/asm/mem_encrypt.h | 3 +++ arch/x86/include/asm/msr-in

[PATCH v3 28/75] x86/idt: Move IDT to data segment

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel With SEV-ES, exception handling is needed very early, even before the kernel has cleared the bss segment. In order to prevent clearing the currently used IDT, move the IDT to the data segment. Signed-off-by: Joerg Roedel --- arch/x86/kernel/idt.c | 8 ++-- 1 file changed

[PATCH v3 32/75] x86/head/64: Reload GDT after switch to virtual addresses

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Reload the GDT after switching to virtual addresses to make sure it will not go away when the lower mappings are removed. This will also reload the GDT for booting APs, which will need a working GDT too to handle #VC exceptions. Signed-off-by: Joerg Roedel --- arch/x86/kerne

[PATCH v3 39/75] x86/sev-es: Print SEV-ES info into kernel log

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Refactor the message printed to the kernel log which indicates whether SEV or SME is active to print a list of enabled encryption features. This will scale better in the future when more memory encryption features might be added. Also add SEV-ES to the list of features. Signed

[PATCH v3 16/75] x86/boot/compressed/64: Always switch to own page-table

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel When booted through startup_64 the kernel keeps running on the EFI page-table until the KASLR code sets up its own page-table. Without KASLR the pre-decompression boot code never switches off the EFI page-table. Change that by unconditionally switching to a kernel controlled pa

[PATCH v3 25/75] x86/sev-es: Add support for handling IOIO exceptions

2020-04-28 Thread Joerg Roedel
From: Tom Lendacky Add support for decoding and handling #VC exceptions for IOIO events. Signed-off-by: Tom Lendacky [ jroe...@suse.de: Adapted code to #VC handling framework ] Co-developed-by: Joerg Roedel Signed-off-by: Joerg Roedel --- arch/x86/boot/compressed/sev-es.c | 32 + arch/x

[PATCH v3 18/75] x86/boot/compressed/64: Change add_identity_map() to take start and end

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Changing the function to take start and end as parameters instead of start and size simplifies the callers, which don't need to calculate the size if they already have start and end. Signed-off-by: Joerg Roedel --- arch/x86/boot/compressed/ident_map_64.c | 15 +--

[PATCH v3 26/75] x86/fpu: Move xgetbv()/xsetbv() into separate header

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel The xgetbv() function is needed in pre-decompression boot code, but asm/fpu/internal.h can't be included there directly. Doing so opens the door to include-hell due to various include-magic in boot/compressed/misc.h. Avoid that by moving xgetbv()/xsetbv() to a separate header

[PATCH v3 10/75] x86/insn: Add insn_rep_prefix() helper

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Add a function to check whether an instruction has a REP prefix. Signed-off-by: Joerg Roedel --- arch/x86/include/asm/insn-eval.h | 1 + arch/x86/lib/insn-eval.c | 24 2 files changed, 25 insertions(+) diff --git a/arch/x86/include/asm/insn

[PATCH v3 29/75] x86/idt: Split idt_data setup out of set_intr_gate()

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel The code to setup idt_data is needed for early exception handling, but set_intr_gate() can't be used that early because it has pv-ops in its code path, which don't work that early. Split out the idt_data initialization part from set_intr_gate() so that it can be used separatly

[PATCH v3 21/75] x86/boot/compressed/64: Check return value of kernel_ident_mapping_init()

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel The function can fail to create an identity mapping, check for that and bail out if it happens. Signed-off-by: Joerg Roedel --- arch/x86/boot/compressed/ident_map_64.c | 7 +-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/arch/x86/boot/compressed/ident_m

[PATCH v3 30/75] x86/idt: Move two function from k/idt.c to i/a/desc.h

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Move these two functions from kernel/idt.c to include/asm/desc.h: * init_idt_data() * idt_init_desc() These functions are needed to setup IDT entries very early and need to be called from head64.c. To be usable this early these functions need to be compiled wi

Re: [RFC PATCH v1 3/5] media: tegra-video: Move PM runtime handle to streaming

2020-04-28 Thread Sowjanya Komatineni
On 4/28/20 8:15 AM, Dmitry Osipenko wrote: External email: Use caution opening links or attachments 28.04.2020 18:08, Sowjanya Komatineni пишет: On 4/28/20 7:59 AM, Dmitry Osipenko wrote: External email: Use caution opening links or attachments 28.04.2020 17:51, Sowjanya Komatineni пишет:

[PATCH v3 13/75] x86/boot/compressed/64: Add IDT Infrastructure

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Add code needed to setup an IDT in the early pre-decompression boot-code. The IDT is loaded first in startup_64, which is after EfiExitBootServices() has been called, and later reloaded when the kernel image has been relocated to the end of the decompression area. This allows

[PATCH v3 24/75] x86/boot/compressed/64: Unmap GHCB page before booting the kernel

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Force a page-fault on any further accesses to the GHCB page when they shouldn't happen anymore. This will catch the bugs where a #VC exception is raised when no one is expected anymore. Signed-off-by: Joerg Roedel --- arch/x86/boot/compressed/ident_map_64.c | 23

[PATCH v3 12/75] x86/boot/compressed/64: Switch to __KERNEL_CS after GDT is loaded

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel When the pre-decompression code loads its first GDT in startup_64, it is still running on the CS value of the previous GDT. In the case of SEV-ES this is the EFI GDT. To make exception handling work (especially IRET) the CPU needs to switch to a CS value in the current GDT, so

[PATCH v3 23/75] x86/boot/compressed/64: Setup GHCB Based VC Exception handler

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Install an exception handler for #VC exception that uses a GHCB. Also add the infrastructure for handling different exit-codes by decoding the instruction that caused the exception and error handling. Signed-off-by: Joerg Roedel --- arch/x86/Kconfig

[PATCH v3 07/75] x86/umip: Factor out instruction fetch

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Factor out the code to fetch the instruction from user-space to a helper function. No functional changes. Signed-off-by: Joerg Roedel --- arch/x86/include/asm/insn-eval.h | 2 ++ arch/x86/kernel/umip.c | 26 +- arch/x86/lib/insn-eval.c

[PATCH v3 15/75] x86/boot/compressed/64: Add page-fault handler

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Install a page-fault handler to add an identity mapping to addresses not yet mapped. Also do some checking whether the error code is sane. This makes non SEV-ES machines use the exception handling infrastructure in the pre-decompressions boot code too, making it less likely to

[PATCH v3 11/75] x86/boot/compressed/64: Disable red-zone usage

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel The x86-64 ABI defines a red-zone on the stack: The 128-byte area beyond the location pointed to by %rsp is considered to be reserved and shall not be modified by signal or interrupt handlers. Therefore, functions may use this area for temporary data that is not needed

[PATCH v3 06/75] x86/insn: Make inat-tables.c suitable for pre-decompression code

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel The inat-tables.c file has some arrays in it that contain pointers to other arrays. These pointers need to be relocated when the kernel image is moved to a different location. The pre-decompression boot-code has no support for applying ELF relocations, so initialize these arra

[PATCH v3 03/75] KVM: SVM: Use __packed shorthand

2020-04-28 Thread Joerg Roedel
From: Borislav Petkov I guess we can do that ontop. Signed-off-by: Joerg Roedel --- arch/x86/include/asm/svm.h | 16 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/arch/x86/include/asm/svm.h b/arch/x86/include/asm/svm.h index e4e9f6bacfaa..9adbf69f003c 100644 --

[PATCH v3 09/75] x86/insn: Add insn_get_modrm_reg_off()

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Add a function to the instruction decoder which returns the pt_regs offset of the register specified in the reg field of the modrm byte. Signed-off-by: Joerg Roedel Acked-by: Masami Hiramatsu --- arch/x86/include/asm/insn-eval.h | 1 + arch/x86/lib/insn-eval.c | 23

[PATCH v3 08/75] x86/umip: Factor out instruction decoding

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Factor out the code used to decode an instruction with the correct address and operand sizes to a helper function. No functional changes. Signed-off-by: Joerg Roedel --- arch/x86/include/asm/insn-eval.h | 2 ++ arch/x86/kernel/umip.c | 23 +--- arch/x

[PATCH v3 00/75] x86: SEV-ES Guest Support

2020-04-28 Thread Joerg Roedel
Hi, here is the next version of changes to enable Linux to run as an SEV-ES guest. The code was rebased to v5.7-rc3 and got a fair number of changes since the last version. What is SEV-ES == SEV-ES is an acronym for 'Secure Encrypted Virtualization - Encrypted State' and means a hard

[PATCH v3 04/75] x86/cpufeatures: Add SEV-ES CPU feature

2020-04-28 Thread Joerg Roedel
From: Tom Lendacky Add CPU feature detection for Secure Encrypted Virtualization with Encrypted State. This feature enhances SEV by also encrypting the guest register state, making it in-accessible to the hypervisor. Signed-off-by: Tom Lendacky Signed-off-by: Joerg Roedel --- arch/x86/include

[PATCH v3 05/75] x86/traps: Move some definitions to

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Move the definition of x86 trap vector numbers and the page-fault error code bits to the new header file asm/trap_defs.h. This makes it easier to include them into pre-decompression boot code. No functional changes. Signed-off-by: Joerg Roedel --- arch/x86/include/asm/trap_d

Re: [PATCH v1 00/15] Add support for Nitro Enclaves

2020-04-28 Thread Alexander Graf
On 27.04.20 13:44, Liran Alon wrote: On 27/04/2020 10:56, Paraschiv, Andra-Irina wrote: On 25/04/2020 18:25, Liran Alon wrote: On 23/04/2020 16:19, Paraschiv, Andra-Irina wrote: The memory and CPUs are carved out of the primary VM, they are dedicated for the enclave. The Nitro hypervisor

Re: [PATCH v3 02/16] mfd: mfd-core: Don't overwrite the dma_mask of the child device

2020-04-28 Thread Mark Brown
On Tue, Apr 28, 2020 at 03:49:49PM +0100, Robin Murphy wrote: > For better or worse, the platform bus is the dumping ground for random crap, > so we just have to deal with all the abstraction breakage that leaks out of > that. The reason we're using the platform bus for this is that historically

[PATCH v3 02/75] KVM: SVM: Add GHCB Accessor functions

2020-04-28 Thread Joerg Roedel
From: Joerg Roedel Building a correct GHCB for the hypervisor requires setting valid bits in the GHCB. Simplify that process by providing accessor functions to set values and to update the valid bitmap. Signed-off-by: Joerg Roedel --- arch/x86/include/asm/svm.h | 61 +++

Re: [PATCH v2] virtio-blk: handle block_device_operations callbacks after hot unplug

2020-04-28 Thread Michael S. Tsirkin
On Tue, Apr 28, 2020 at 03:30:09PM +0100, Stefan Hajnoczi wrote: > A userspace process holding a file descriptor to a virtio_blk device can > still invoke block_device_operations after hot unplug. For example, a > program that has /dev/vdb open can call ioctl(HDIO_GETGEO) after hot > unplug to inv

Re: x86 entry perf unwinding failure (missing IRET_REGS annotation on stack switch?)

2020-04-28 Thread Peter Zijlstra
On Tue, Apr 28, 2020 at 09:31:57AM -0500, Josh Poimboeuf wrote: > That's quite the monstrosity, and I still don't see the point. I > thought we decided to just disallow CFI changes in alternatives anyway? > That can be done much simpler. Something like so then ? --- diff --git a/tools/objtool/ch

Re: [PATCH 0/2] Add support for StorageD3Enable _DSD property

2020-04-28 Thread David E. Box
On Tue, 2020-04-28 at 16:22 +0200, Christoph Hellwig wrote: > On Tue, Apr 28, 2020 at 07:09:59AM -0700, David E. Box wrote: > > > I'm not sure who came up with the idea to put this into ACPI, but > > > it > > > belongs into NVMe. Please talk to the NVMe technical working > > > group > > > instead

Re: [PATCH v3 3/4] drm: ipk: Add extensions for DW MIPI DSI Host driver

2020-04-28 Thread Daniel Vetter
On Mon, Apr 27, 2020 at 04:00:35PM +0200, Angelo Ribeiro wrote: > Add Synopsys DesignWare IPK specific extensions for Synopsys DesignWare > MIPI DSI Host driver. > > Cc: Maarten Lankhorst > Cc: Maxime Ripard > Cc: David Airlie > Cc: Daniel Vetter > Cc: Sam Ravnborg > Cc: Gustavo Pimentel > C

Re: [PATCH v2 01/12] dt-bindings: mfd: stm32-fmc2: add STM32 FMC2 controller documentation

2020-04-28 Thread Rob Herring
On Wed, Apr 15, 2020 at 05:57:25PM +0200, Christophe Kerello wrote: > This patch adds the documentation of the device tree bindings for the STM32 > FMC2 controller. > > Signed-off-by: Christophe Kerello > --- > .../devicetree/bindings/mfd/st,stm32-fmc2.yaml | 370 > + >

Re: [PATCH] interconnect: Add helpers for enabling/disabling a path

2020-04-28 Thread Matthias Kaehlcke
Hi Georgi, On Tue, Apr 28, 2020 at 12:16:50PM +0300, Georgi Djakov wrote: > There is a repeated pattern in multiple drivers where they want to switch > the bandwidth between zero and some other value. This is happening often > in the suspend/resume callbacks. Let's add helper functions to enable a

Re: [PATCH 03/12] task_isolation: userspace hard isolation from kernel

2020-04-28 Thread Marcelo Tosatti
I like the idea as well, especially the reporting infrastructure, and would like to see something like this integrated upstream. On Thu, Mar 05, 2020 at 07:33:13PM +0100, Frederic Weisbecker wrote: > On Wed, Mar 04, 2020 at 04:07:12PM +, Alex Belits wrote: > > The existing nohz_full mode is

Re: [PATCH net-next v3] net: phy: micrel: add phy-mode support for the KSZ9031 PHY

2020-04-28 Thread Geert Uytterhoeven
Hi Oleksij, On Wed, Apr 22, 2020 at 9:24 AM Oleksij Rempel wrote: > Add support for following phy-modes: rgmii, rgmii-id, rgmii-txid, rgmii-rxid. > > This PHY has an internal RX delay of 1.2ns and no delay for TX. > > The pad skew registers allow to set the total TX delay to max 1.38ns and > the

Re: [LTP] [fs] ce436509a8: ltp.openat203.fail

2020-04-28 Thread Cyril Hrubis
Hi! > > > commit: ce436509a8e109330c56bb4d8ec87d258788f5f4 ("[PATCH v4 2/3] fs: > > > openat2: Extend open_how to allow userspace-selected fds") > > > url: > > > https://github.com/0day-ci/linux/commits/Josh-Triplett/Support-userspace-selected-fds/20200414-102939 > > > base: > > > https://git.ke

Re: [PATCH v3 3/4] thermal/drivers/cpuidle_cooling: Change the registration function

2020-04-28 Thread Daniel Lezcano
Hi Lukasz, On 28/04/2020 17:20, Lukasz Luba wrote: > Hi Daniel, > > I have checked the patches and run them on Juno. > Please find my comments below. thanks a lot for the review and the testing. > On 4/14/20 11:08 PM, Daniel Lezcano wrote: >> Today, there is no user for the cpuidle cooling

Re: [PATCH v2 2/2] gpio: mm-lantiq: Fix small typo

2020-04-28 Thread Andy Shevchenko
On Tue, Apr 28, 2020 at 4:53 PM Linus Walleij wrote: > > On Fri, Apr 24, 2020 at 5:41 PM Dejin Zheng wrote: > > > Fix a spelling typo in gpio-mm-lantiq.c by codespell > > s/dont/don't/ > > > > Cc: Andy Shevchenko > > Signed-off-by: Dejin Zheng > > --- > > v1 -> v2: > > - split patch v1

Re: [PATCH v3 2/3] hwrng: cctrng - change default to n

2020-04-28 Thread Geert Uytterhoeven
On Mon, Apr 27, 2020 at 1:39 PM Hadar Gat wrote: > For many users, the Arm CryptoCell HW is not available, so the default for > HW_RANDOM_CCTRNG should to n. > Remove the line to follow the convention - 'n' is the default anyway so no > need to state it explicitly. > > Signed-off-by: Hadar Gat A

Re: [PATCH v3 4/4] thermal: cpuidle: Register cpuidle cooling device

2020-04-28 Thread Lukasz Luba
On 4/14/20 11:08 PM, Daniel Lezcano wrote: The cpuidle driver can be used as a cooling device by injecting idle cycles. The DT binding for the idle state added an optional When the property is set, register the cpuidle driver with the idle state node pointer as a cooling device. The thermal f

Re: [RFC 00/17] DRM: fix struct sg_table nents vs. orig_nents misuse

2020-04-28 Thread Daniel Vetter
On Tue, Apr 28, 2020 at 04:02:57PM +0200, Christoph Hellwig wrote: > On Tue, Apr 28, 2020 at 03:19:48PM +0200, Marek Szyprowski wrote: > > 1. introduce a dma_{map,sync,unmap}_sgtable() wrappers, which will use > >a proper sg_table entries and call respective DMA-mapping functions > >and ada

[PATCH] x86/xen: drop an unused parameter gsi_override

2020-04-28 Thread Wei Liu
All callers within the same file pass in -1 (no override). Signed-off-by: Wei Liu --- arch/x86/pci/xen.c | 16 ++-- 1 file changed, 6 insertions(+), 10 deletions(-) diff --git a/arch/x86/pci/xen.c b/arch/x86/pci/xen.c index 91220cc25854..e3f1ca316068 100644 --- a/arch/x86/pci/xen.c

Re: [LTP] [fs] ce436509a8: ltp.openat203.fail

2020-04-28 Thread Aleksa Sarai
On 2020-04-28, Cyril Hrubis wrote: > Hi! > > > > commit: ce436509a8e109330c56bb4d8ec87d258788f5f4 ("[PATCH v4 2/3] fs: > > > > openat2: Extend open_how to allow userspace-selected fds") > > > > url: > > > > https://github.com/0day-ci/linux/commits/Josh-Triplett/Support-userspace-selected-fds/202

Re: [PATCH] ASoC: davinci-mcasp: Fix dma_chan refcnt leak when getting dma type

2020-04-28 Thread Mark Brown
On Sat, 25 Apr 2020 20:48:35 +0800, Xiyu Yang wrote: > davinci_mcasp_get_dma_type() invokes dma_request_chan(), which returns a > reference of the specified dma_chan object to "chan" with increased > refcnt. > > When davinci_mcasp_get_dma_type() returns, local variable "chan" becomes > invalid, so

Re: [PATCH] ASoC: tlv320adcx140: Fix mic gain registers

2020-04-28 Thread Mark Brown
On Mon, 27 Apr 2020 15:36:08 -0500, Dan Murphy wrote: > Fix the mic gain registers for channels 2-4. > The incorret register was being set as it was touching the CH1 config > registers. > > Fixes: 37bde5acf040 ("ASoC: tlv320adcx140: Add the tlv320adcx140 codec driver > family") > Signed-off-by: D

Re: 回复: Re: [RFC PATCH 0/8] dax: Add a dax-rmap tree to support reflink

2020-04-28 Thread Darrick J. Wong
On Tue, Apr 28, 2020 at 09:24:41PM +1000, Dave Chinner wrote: > On Tue, Apr 28, 2020 at 04:16:36AM -0700, Matthew Wilcox wrote: > > On Tue, Apr 28, 2020 at 05:32:41PM +0800, Ruan Shiyang wrote: > > > On 2020/4/28 下午2:43, Dave Chinner wrote: > > > > On Tue, Apr 28, 2020 at 06:09:47AM +, Ruan, Sh

Re: [PATCH v2 0/3] add channel constraint for BDW machine drivers

2020-04-28 Thread Mark Brown
On Tue, 28 Apr 2020 01:13:31 +0800, Brent Lu wrote: > The machine driver bdw-rt5650 (for Google buddy) supports 2 or 4-channel > recording while other two drivers support only 2-channel recording. HW > constraints are implemented to reflect the hardware limitation on BDW > platform. > > Changes si

Re: [PATCH] printk: Add loglevel for "do not print to consoles".

2020-04-28 Thread Michal Hocko
On Tue 28-04-20 22:11:19, Tetsuo Handa wrote: > On 2020/04/28 21:18, Michal Hocko wrote: > > On Tue 28-04-20 20:33:21, Tetsuo Handa wrote: > >> On 2020/04/27 15:21, Sergey Senozhatsky wrote: > KERN_NO_CONSOLES is for type of messages where "saved for later > analysis" is > important

Re: [PATCH] Remove drm_display_mode.hsync

2020-04-28 Thread Ville Syrjälä
On Tue, Apr 28, 2020 at 05:18:13PM +0200, Daniel Vetter wrote: > On Mon, Apr 27, 2020 at 10:05:17AM +0200, Michal Orzel wrote: > > As suggested by the TODO list of DRM subsystem: > > -remove the member hsync of drm_display_mode > > -convert code using hsync member to use drm_mode_hsync() > > > > S

Re: [PATCH net-next v3] net: phy: micrel: add phy-mode support for the KSZ9031 PHY

2020-04-28 Thread Andrew Lunn
On Tue, Apr 28, 2020 at 05:28:30PM +0200, Geert Uytterhoeven wrote: > This triggers on Renesas Salvator-X(S): > > Micrel KSZ9031 Gigabit PHY e680.ethernet-:00: > *-skew-ps values should be used only with phy-mode = "rgmii" > > which uses: > > phy-mode = "rgmii-txid"; > >

[PATCH v6 0/3] crypto: engine - support for parallel and batch requests

2020-04-28 Thread Iuliana Prodan
Added support for executing multiple, independent or not, requests for crypto engine based on a retry mechanism. If hardware was unable to execute a backlog request, enqueue it back in front of crypto-engine queue, to keep the order of requests. Now do_one_request() returns: >= 0: hardware execute

[PATCH v6 1/3] crypto: algapi - create function to add request in front of queue

2020-04-28 Thread Iuliana Prodan
Add crypto_enqueue_request_head function that enqueues a request in front of queue. This will be used in crypto-engine, on error path. In case a request was not executed by hardware, enqueue it back in front of queue (to keep the order of requests). Signed-off-by: Iuliana Prodan --- crypto/algap

Re: x86 entry perf unwinding failure (missing IRET_REGS annotation on stack switch?)

2020-04-28 Thread Josh Poimboeuf
On Tue, Apr 28, 2020 at 05:25:52PM +0200, Peter Zijlstra wrote: > On Tue, Apr 28, 2020 at 09:31:57AM -0500, Josh Poimboeuf wrote: > > That's quite the monstrosity, and I still don't see the point. I > > thought we decided to just disallow CFI changes in alternatives anyway? > > That can be done mu

[PATCH v6 3/3] crypto: engine - support for batch requests

2020-04-28 Thread Iuliana Prodan
Added support for batch requests, per crypto engine. A new callback is added, do_batch_requests, which executes a batch of requests. This has the crypto_engine structure as argument (for cases when more than one crypto-engine is used). The crypto_engine_alloc_init_and_set function, initializes cryp

[PATCH v6 2/3] crypto: engine - support for parallel requests based on retry mechanism

2020-04-28 Thread Iuliana Prodan
Added support for executing multiple requests, in parallel, for crypto engine based on a retry mechanism. If hardware was unable to execute a backlog request, enqueue it back in front of crypto-engine queue, to keep the order of requests. A new variable is added, retry_support (this is to keep the

Re: [PATCH] interconnect: Add helpers for enabling/disabling a path

2020-04-28 Thread Georgi Djakov
Hi Matthias, On 4/28/20 18:28, Matthias Kaehlcke wrote: > Hi Georgi, > > On Tue, Apr 28, 2020 at 12:16:50PM +0300, Georgi Djakov wrote: >> There is a repeated pattern in multiple drivers where they want to switch >> the bandwidth between zero and some other value. This is happening often >> in th

Re: [PATCH v5 5/5] drivers/tty/serial: add LiteUART driver

2020-04-28 Thread Andy Shevchenko
On Sat, Apr 25, 2020 at 2:45 PM Mateusz Holenko wrote: > > From: Filip Kokosinski > > This commit adds driver for the FPGA-based LiteUART serial controller > from LiteX SoC builder. > > The current implementation supports LiteUART configured > for 32 bit data width and 8 bit CSR bus width. > > It

Re: [PATCH v1] driver core: Fix handling of fw_devlink=permissive

2020-04-28 Thread Greg Kroah-Hartman
On Thu, Apr 16, 2020 at 11:25:47AM -0700, Saravana Kannan wrote: > On Tue, Mar 31, 2020 at 12:29 AM Greg Kroah-Hartman > wrote: > > > > On Mon, Mar 30, 2020 at 11:18:01PM -0700, Saravana Kannan wrote: > > > On Mon, Mar 30, 2020 at 10:43 PM Marek Szyprowski > > > wrote: > > > > > > > > Hi, > > > >

<    2   3   4   5   6   7   8   9   10   11   >