Re: [PATCH] arm64: dts: qcom: sc7180: Fix one forgotten interconnect reference

2020-10-02 Thread Georgi Djakov
Thanks for the patch! On 10/2/20 00:18, Douglas Anderson wrote: > In commit e23b1220a246 ("arm64: dts: qcom: sc7180: Increase the number > of interconnect cells") we missed increasing the cells on one > interconnect. That's no bueno. Fix it. > > NOTE: it appears that things aren't totally broke

Re: [PATCH 1/1] mfd: sl28cpld: Depend on I2C

2020-10-02 Thread Randy Dunlap
On 10/2/20 1:35 AM, Lee Jones wrote: > Fixes the following randconfig build error: > > ld: drivers/mfd/simple-mfd-i2c.o: in function `simple_mfd_i2c_probe': > simple-mfd-i2c.c:(.text+0x48): undefined reference to > `__devm_regmap_init_i2c' > ld: drivers/mfd/simple-mfd-i2c.o: in function `simpl

Re: [PATCH rdma-next v4 1/4] lib/scatterlist: Add support in dynamic allocation of SG table from pages

2020-10-02 Thread Jason Gunthorpe
On Fri, Oct 02, 2020 at 07:11:33PM +0300, Maor Gottlieb wrote: > > On 10/2/2020 6:02 PM, Jason Gunthorpe wrote: > > On Sun, Sep 27, 2020 at 09:46:44AM +0300, Leon Romanovsky wrote: > > > +struct scatterlist *__sg_alloc_table_from_pages(struct sg_table *sgt, > > > + struct page **pages, uns

Re: [PATCH v3 2/2] arm64: kvm: Introduce MTE VCPU feature

2020-10-02 Thread Andrew Jones
On Fri, Oct 02, 2020 at 04:30:47PM +0100, Steven Price wrote: > On 02/10/2020 15:30, Andrew Jones wrote: > > On Fri, Sep 25, 2020 at 10:36:07AM +0100, Steven Price wrote: > > > + if (system_supports_mte() && kvm->arch.mte_enabled && pfn_valid(pfn)) { > > > > 'system_supports_mte() && kvm->arch.mte

[PATCH v2 0/6] Speed up mremap on large regions

2020-10-02 Thread Kalesh Singh
This version 2 of the mremap speed up patches previously posted at: https://lore.kernel.org/r/20200930222130.4175584-1-kaleshsi...@google.com mremap time can be optimized by moving entries at the PMD/PUD level if the source and destination addresses are PMD/PUD-aligned and PMD/PUD-sized. Enable mo

[PATCH v2 1/6] kselftests: vm: Add mremap tests

2020-10-02 Thread Kalesh Singh
Test mremap on regions of various sizes and alignments and validate data after remapping. Also provide total time for remapping the region which is useful for performance comparison of the mremap optimizations that move pages at the PMD/PUD levels if HAVE_MOVE_PMD and/or HAVE_MOVE_PUD are enabled.

[PATCH v2 3/6] mm: Speedup mremap on 1GB or larger regions

2020-10-02 Thread Kalesh Singh
Android needs to move large memory regions for garbage collection. The GC requires moving physical pages of multi-gigabyte heap using mremap. During this move, the application threads have to be paused for correctness. It is critical to keep this pause as short as possible to avoid jitters during u

[PATCH v2 4/6] arm64: Add set_pud_at() function

2020-10-02 Thread Kalesh Singh
set_pud_at() is used in move_normal_pud() for remapping pages at the PUD level. Signed-off-by: Kalesh Singh --- arch/arm64/include/asm/pgtable.h | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/arm64/include/asm/pgtable.h b/arch/arm64/include/asm/pgtable.h index d5d3fbe73953..8848125e302

[PATCH v2 2/6] arm64: mremap speedup - Enable HAVE_MOVE_PMD

2020-10-02 Thread Kalesh Singh
HAVE_MOVE_PMD enables remapping pages at the PMD level if both the source and destination addresses are PMD-aligned. HAVE_MOVE_PMD is already enabled on x86. The original patch [1] that introduced this config did not enable it on arm64 at the time because of performance issues with flushing the TL

[PATCH v2 5/6] arm64: mremap speedup - Enable HAVE_MOVE_PUD

2020-10-02 Thread Kalesh Singh
HAVE_MOVE_PUD enables remapping pages at the PUD level if both the source and destination addresses are PUD-aligned. With HAVE_MOVE_PUD enabled it can be inferred that there is approximately a 19x improvement in performance on arm64. (See data below). --- Test Results - The following

[PATCH][next] PCI/ASPM: fix an unintended sign extension of a u16

2020-10-02 Thread Colin King
From: Colin Ian King The multiplication of the u16 variable 'value' causes it to be prompted to a int type and this is then sign extended to a u64. When the result of the multiplication is > 0x7fff the upper bits are all unitentionally set to 1 on a sign extension operation. Fix this by expli

[PATCH v2 6/6] x86: mremap speedup - Enable HAVE_MOVE_PUD

2020-10-02 Thread Kalesh Singh
HAVE_MOVE_PUD enables remapping pages at the PUD level if both the source and destination addresses are PUD-aligned. With HAVE_MOVE_PUD enabled it can be inferred that there is approximately a 13x improvement in performance on x86. (See data below). --- Test Results - The following r

Re: [PATCHv1] power: supply: document current direction

2020-10-02 Thread Andreas Kemnade
On Thu, 27 Aug 2020 16:02:48 +0200 Sebastian Reichel wrote: > Currently the sign for CURRENT_NOW and CURRENT_AVG is a bit > of a mess. There are basically 3 different ways battery fuel > gauges report the current: > > 1. uses negative values for discharging and positive values >for charging

Re: [PATCH] mm/util.c: Add error logs for commitment overflow

2020-10-02 Thread pintu
On 2020-10-02 17:47, Michal Hocko wrote: __vm_enough_memory: commitment overflow: ppid:150, pid:164, pages:62451 fork failed[count:0]: Cannot allocate memory While I understand that fork failing due to overrcomit heuristic is non intuitive and I have seen people scratching heads due to this i

Re: [PATCH v7 2/2] soc: mediatek: add mt6779 devapc driver

2020-10-02 Thread Chun-Kuang Hu
Hi, Neal: Neal Liu 於 2020年8月27日 週四 上午11:07寫道: > > MediaTek bus fabric provides TrustZone security support and data > protection to prevent slaves from being accessed by unexpected > masters. > The security violation is logged and sent to the processor for > further analysis or countermeasures. >

Re: [PATCH v3 0/2] MTE support for KVM guest

2020-10-02 Thread Andrew Jones
On Fri, Oct 02, 2020 at 04:38:11PM +0100, Steven Price wrote: > On 02/10/2020 15:36, Andrew Jones wrote: > > On Fri, Sep 25, 2020 at 10:36:05AM +0100, Steven Price wrote: > > > Version 3 of adding MTE support for KVM guests. See the previous (v2) > > > posting for background: > > > > > > https:/

Re: [PATCH v3 01/27] Input: Simplify with dev_err_probe()

2020-10-02 Thread Krzysztof Kozlowski
On Thu, Aug 27, 2020 at 08:58:02PM +0200, Krzysztof Kozlowski wrote: > Hi, > > Changes since v2: > 1. Add review tags, > 2. Fixes after review (see individual patches). > 3. Two new patches - 26 and 27. > > Hi Dmitry, Any comments here? Some of these nicely simplify the code or remove some lin

Re: [linux-sunxi] [PATCH v5 09/20] arm64: dts: allwinner: h6: Add DAI node and soundcard for HDMI

2020-10-02 Thread Maxime Ripard
On Fri, Oct 02, 2020 at 06:01:21PM +0200, Clément Péron wrote: > Hi Chen-Yu, > > On Mon, 28 Sep 2020 at 07:42, Chen-Yu Tsai wrote: > > > > On Mon, Sep 28, 2020 at 1:32 PM Chen-Yu Tsai wrote: > > > > > > On Mon, Sep 28, 2020 at 3:29 AM Clément Péron > > > wrote: > > > > > > > > From: Jernej Skr

Re: [PATCH 1/1] blk-snap - Block snapshot module This module implements snapshot and changed block tracking functionality. It is intended to create backup copies of any block devices without usage of

2020-10-02 Thread kernel test robot
Hi Sergei, I love your patch! Yet something to improve: [auto build test ERROR on linus/master] [also build test ERROR on v5.9-rc7] [cannot apply to block/for-next sparc-next/master next-20201002] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch

Re: [PATCH 05/14] fs: don't allow kernel reads and writes without iter ops

2020-10-02 Thread Linus Torvalds
On Thu, Oct 1, 2020 at 3:41 PM Al Viro wrote: > > Better > loff_t dummy = 0; > ... > wr = __kernel_write(file, data, bytes, &dummy); No, just fix __kernel_write() to work correctly. The fact is, NULL _is_ the right pointer for ppos these days. That commit by Christoph is

virtiofs: WARN_ON(out_sgs + in_sgs != total_sgs)

2020-10-02 Thread Qian Cai
ump: loaded Not tainted 5.9.0-rc7-next-20201002+ #5 [ 4328.053714] Hardware name: Red Hat KVM, BIOS 1.14.0-1.module+el8.3.0+7638+07cf13d2 04/01/2014 [ 4328.059513] RIP: 0010:virtio_fs_enqueue_req+0xa86/0xdb0 [virtiofs] [ 4328.063812] Code: c1 e7 05 48 03 7c 24 10 6a 00 e8 85 a4 ff ff 8d 48 01 58 41

Re: [PATCH v3] mailbox: mediatek: Fix handling of platform_get_irq() error

2020-10-02 Thread Krzysztof Kozlowski
On Thu, Aug 27, 2020 at 08:25:07PM +0200, Krzysztof Kozlowski wrote: > platform_get_irq() returns -ERRNO on error. In such case casting to u32 > and comparing to 0 would pass the check. > > Fixes: 623a6143a845 ("mailbox: mediatek: Add Mediatek CMDQ driver") > Signed-off-by: Krzysztof Kozlowski >

drivers/net/wireless/realtek/rtw88/rtw8822c.c:2456:5: warning: variable 'corr_val' set but not used

2020-10-02 Thread kernel test robot
tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master head: 472e5b056f000a778abb41f1e443de58eb259783 commit: ba0fbe236fb8a7b992e82d6eafb03a600f5eba43 rtw88: extract: make 8822c an individual kernel module date: 5 months ago config: parisc-randconfig-r024-20201002

Re: [DISCUSSION PATCH 00/41] random: possible ways towards NIST SP800-90B compliance

2020-10-02 Thread Randy Dunlap
On 10/2/20 8:39 AM, Van Leeuwen, Pascal wrote: >> -Original Message- >> From: Greg Kroah-Hartman >> Sent: Friday, October 2, 2020 5:13 PM >> To: Van Leeuwen, Pascal >> Cc: Torsten Duwe ; Theodore Y. Ts'o ; >> linux-cry...@vger.kernel.org; Nicolai Stange >> ; LKML ; Arnd Bergmann >> ; Er

Re: [PATCH v3 0/3] media: rockchip: Introduce driver for Rockchip's camera interface

2020-10-02 Thread Ezequiel Garcia
Hi Maxime, On Tue, 22 Sep 2020 at 13:55, Maxime Chevallier wrote: > > Hi everyone, > > This is the third iteration of the series introducing a driver for the > PX30 camera interface. > > This was previously known as the "cif" driver in other iterations, but > was renamed to "vip" following Ezequi

Re: [PATCH 1/3] watchdog: cadence: Simplify with dev_err_probe()

2020-10-02 Thread Krzysztof Kozlowski
On Tue, Sep 01, 2020 at 08:49:52AM -0700, Guenter Roeck wrote: > On Tue, Sep 01, 2020 at 05:31:39PM +0200, Krzysztof Kozlowski wrote: > > Common pattern of handling deferred probe can be simplified with > > dev_err_probe(). Less code and the error value gets printed. > > > > Signed-off-by: Krzysz

Re: [PATCH 1/2] mmap locking API: Order lock of nascent mm outside lock of live mm

2020-10-02 Thread Jann Horn
On Fri, Oct 2, 2020 at 11:18 AM Michel Lespinasse wrote: > On Thu, Oct 1, 2020 at 6:25 PM Jann Horn wrote: > > Until now, the mmap lock of the nascent mm was ordered inside the mmap lock > > of the old mm (in dup_mmap() and in UML's activate_mm()). > > A following patch will change the exec path

Re: [PATCH v4 2/3] iommu/tegra-smmu: Rework tegra_smmu_probe_device()

2020-10-02 Thread Dmitry Osipenko
02.10.2020 19:00, Dmitry Osipenko пишет: > 02.10.2020 18:23, Dmitry Osipenko пишет: >> 02.10.2020 09:08, Nicolin Chen пишет: >>> Then when a client gets probed, of_iommu_configure() in >>> iommu core will search DTB for swgroup ID and call ->of_xlate() >>> to prepare an fwspec, similar to tegra_smm

[RESEND PATCH v3 1/2] ARM: dts: aspeed: fix PCA95xx GPIO expander properties on Portwell

2020-10-02 Thread Krzysztof Kozlowski
The PCA95xx GPIO expander requires GPIO controller properties to operate properly. Signed-off-by: Krzysztof Kozlowski Acked-by: Joel Stanley --- arch/arm/boot/dts/aspeed-bmc-portwell-neptune.dts | 2 ++ 1 file changed, 2 insertions(+) The dt-schema changes were applied. diff --git a/arch/arm/

[RESEND PATCH v3 2/2] ARM: dts: aspeed: align GPIO hog names with dtschema

2020-10-02 Thread Krzysztof Kozlowski
dtschema for pca95xx expects GPIO hogs to end with 'hog' suffix. Signed-off-by: Krzysztof Kozlowski --- arch/arm/boot/dts/aspeed-bmc-ibm-rainier.dts | 2 +- arch/arm/boot/dts/aspeed-bmc-opp-mihawk.dts | 16 2 files changed, 9 insertions(+), 9 deletions(-) diff --git a/arch/ar

[RESEND PATCH v3] arm64: dts: renesas: align GPIO hog names with dtschema

2020-10-02 Thread Krzysztof Kozlowski
The convention for node names is to use hyphens, not underscores. dtschema for pca95xx expects GPIO hogs to end with 'hog' suffix. Signed-off-by: Krzysztof Kozlowski --- .../boot/dts/renesas/r8a77951-salvator-xs.dts | 2 +- .../boot/dts/renesas/r8a77965-salvator-xs.dts | 2 +- arch/a

[RESEND PATCH v3] arm64: dts: mediatek: align GPIO hog names with dtschema

2020-10-02 Thread Krzysztof Kozlowski
The convention for node names is to use hyphens, not underscores. dtschema for pca95xx expects GPIO hogs to end with 'hog' suffix. Signed-off-by: Krzysztof Kozlowski --- .../boot/dts/mediatek/pumpkin-common.dtsi | 26 +-- 1 file changed, 13 insertions(+), 13 deletions(-) The

Re: [PATCH v2 3/3] dt-bindings: thermal: update sustainable-power with abstract scale

2020-10-02 Thread Lukasz Luba
On 10/2/20 4:47 PM, Doug Anderson wrote: Hi, On Fri, Oct 2, 2020 at 8:13 AM Lukasz Luba wrote: Hi Doug, On 10/2/20 3:31 PM, Doug Anderson wrote: Hi, On Fri, Oct 2, 2020 at 4:45 AM Lukasz Luba wrote: Update the documentation for the binding 'sustainable-power' and allow to provide val

Re: [PATCH v3 0/3] media: rockchip: Introduce driver for Rockchip's camera interface

2020-10-02 Thread Dafna Hirschfeld
Am 02.10.20 um 18:31 schrieb Ezequiel Garcia: Hi Maxime, On Tue, 22 Sep 2020 at 13:55, Maxime Chevallier wrote: Hi everyone, This is the third iteration of the series introducing a driver for the PX30 camera interface. This was previously known as the "cif" driver in other iterations, bu

Re: [PATCH 3/3] task_work: use TIF_TASKWORK if available

2020-10-02 Thread Jens Axboe
On 10/2/20 9:52 AM, Jens Axboe wrote: > On 10/2/20 9:31 AM, Thomas Gleixner wrote: >> On Fri, Oct 02 2020 at 17:14, Oleg Nesterov wrote: >>> Heh. To be honest I don't really like 1-2 ;) >> >> I do not like any of this :) >> >>> So I think that if we are going to add TIF_TASKWORK we should generaliz

[PATCH 1/2] arm64: defconfig: Enable OMAP I2C driver

2020-10-02 Thread Faiz Abbas
Enable support for devices compatible with TI's OMAP I2C controllers. Signed-off-by: Faiz Abbas --- arch/arm64/configs/defconfig | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/arm64/configs/defconfig b/arch/arm64/configs/defconfig index 55f9c35568bf..0d5b81264fa1 100644 --- a/arch/arm6

[PATCH 2/2] arm64: defconfig: Enable DAVINCI_GPIO driver

2020-10-02 Thread Faiz Abbas
Enable support for devices compatible with TI's davinci gpio controllers. Signed-off-by: Faiz Abbas --- arch/arm64/configs/defconfig | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/arm64/configs/defconfig b/arch/arm64/configs/defconfig index 0d5b81264fa1..c4b657644e33 100644 --- a/arch/

[PATCH 0/2] Enable GPIO and I2C configs for TI's J721e platform

2020-10-02 Thread Faiz Abbas
The following patches enable configs in the arm64 defconfig to support GPIO and I2C support on TI's J721e platform. Faiz Abbas (2): arm64: defconfig: Enable OMAP I2C driver arm64: defconfig: Enable DAVINCI_GPIO driver arch/arm64/configs/defconfig | 2 ++ 1 file changed, 2 insertions(+) --

Re: [mac80211_hwsim] 148fe295b7: hwsim.ap_long_preamble.fail

2020-10-02 Thread Thomas Pedersen
On 2020-10-02 01:29, kernel test robot wrote: Greeting, FYI, we noticed the following commit (built with gcc-9): commit: 148fe295b7d9d892b2b0f47070233ccdc70c83cd ("mac80211_hwsim: indicate support for S1G") https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master in testcase: h

Re: [LKP] Re: [drm/dp] 6509ca051a: PANIC:double_fault

2020-10-02 Thread Ville Syrjälä
On Tue, Sep 29, 2020 at 01:26:09PM +0800, Rong Chen wrote: > > > On 9/25/20 12:42 AM, Ville Syrjälä wrote: > > On Thu, Sep 24, 2020 at 10:30:49PM +0800, kernel test robot wrote: > >> Greeting, > >> > >> FYI, we noticed the following commit (built with gcc-9): > >> > >> commit: 6509ca051abf4ff60d6

Re: [PATCH 00/18] use semicolons rather than commas to separate statements

2020-10-02 Thread Shuah Khan
On 9/29/20 7:42 AM, Shuah Khan wrote: On 9/29/20 7:34 AM, Joe Perches wrote: On Tue, 2020-09-29 at 14:47 +0200, Julia Lawall wrote: On Tue, 29 Sep 2020, Dan Carpenter wrote: The times where commas are used deliberately to replace curly braces are just evil.  Either way the code is cleaner wit

[GIT PULL] Power management fixes for v5.9-rc8

2020-10-02 Thread Rafael J. Wysocki
Hi Linus, Please pull from the tag git://git.kernel.org/pub/scm/linux/kernel/git/rafael/linux-pm.git \ pm-5.9-rc8 with top-most commit 7bbe8f2a7e7e819c050212a4bc984f03dc85af9d Merge branch 'pm-cpufreq' on top of commit a1b8638ba1320e6684aa98233c15255eb803fac7 Linux 5.9-rc7 to receive pow

[PATCH] mmc: meson-gx: remove IRQF_ONESHOT

2020-10-02 Thread Jerome Brunet
IRQF_ONESHOT was added to this driver to make sure the irq was not enabled again until the thread part of the irq had finished doing its job. Doing so upsets RT because, under RT, the hardirq part of the irq handler is not migrated to a thread if the irq is claimed with IRQF_ONESHOT. In this case,

Re: [RFC PATCH v1 05/26] docs: reporting-bugs: begin reference section providing details

2020-10-02 Thread Randy Dunlap
Hi-- On 10/1/20 1:39 AM, Thorsten Leemhuis wrote: > Provide an introduction to the reference section that will provide more > details how to report an issue. Mention a few general things here. Those > are not strictly needed, but likely wise to write down somewhere. > > Signed-off-by: Thorsten Le

Re: [PATCH v4 2/3] iommu/tegra-smmu: Rework tegra_smmu_probe_device()

2020-10-02 Thread Dmitry Osipenko
02.10.2020 19:37, Dmitry Osipenko пишет: > 02.10.2020 19:00, Dmitry Osipenko пишет: >> 02.10.2020 18:23, Dmitry Osipenko пишет: >>> 02.10.2020 09:08, Nicolin Chen пишет: Then when a client gets probed, of_iommu_configure() in iommu core will search DTB for swgroup ID and call ->of_xlate()

Re: [PATCH v2 3/6] mm: Speedup mremap on 1GB or larger regions

2020-10-02 Thread Kirill A. Shutemov
On Fri, Oct 02, 2020 at 04:20:48PM +, Kalesh Singh wrote: > Android needs to move large memory regions for garbage collection. > The GC requires moving physical pages of multi-gigabyte heap > using mremap. During this move, the application threads have to > be paused for correctness. It is crit

Re: [PATCH v2 4/6] arm64: Add set_pud_at() function

2020-10-02 Thread Kirill A. Shutemov
On Fri, Oct 02, 2020 at 04:20:49PM +, Kalesh Singh wrote: > set_pud_at() is used in move_normal_pud() for remapping > pages at the PUD level. > > Signed-off-by: Kalesh Singh > --- > arch/arm64/include/asm/pgtable.h | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/arch/arm64/include/

Re: [PATCH v5 11/15] misc: bcm-vk: add BCM_VK_QSTATS

2020-10-02 Thread Scott Branden
On 2020-10-01 9:55 p.m., Greg Kroah-Hartman wrote: > On Thu, Oct 01, 2020 at 03:12:11PM -0700, Scott Branden wrote: >> >> On 2020-09-30 7:33 p.m., Florian Fainelli wrote: >>> >>> On 9/30/2020 6:28 PM, Scott Branden wrote: Add BCM_VK_QSTATS Kconfig option to allow for enabling debug VK q

Re: [PATCH v5 11/15] misc: bcm-vk: add BCM_VK_QSTATS

2020-10-02 Thread Scott Branden
On 2020-10-01 3:13 p.m., Florian Fainelli wrote: > > > On 10/1/2020 3:12 PM, Scott Branden wrote: >> >> >> On 2020-09-30 7:33 p.m., Florian Fainelli wrote: >>> >>> >>> On 9/30/2020 6:28 PM, Scott Branden wrote: Add BCM_VK_QSTATS Kconfig option to allow for enabling debug VK queue statis

[PATCH][next] net: phy: dp83869: fix unsigned comparisons against less than zero values

2020-10-02 Thread Colin King
From: Colin Ian King Currently the comparisons of u16 integers value and sopass_val with less than zero for error checking is always false because the values are unsigned. Fix this by making these variables int. This does not affect the shift and mask operations performed on these variables Add

Re: [PATCH v12 0/6] ACPI: Support Generic Initiator proximity domains

2020-10-02 Thread Rafael J. Wysocki
On Wed, Sep 30, 2020 at 4:07 PM Jonathan Cameron wrote: > > It would be very nice to finally merge this support during the next cycle, > so please take a look. > > I think we need acks covering x86, ARM and ACPI. Rafael took a look back > in November at v5 and was looking for x86 and ARM acks. W

[PATCH v7 1/3] media: i2c: ov772x: Parse endpoint properties

2020-10-02 Thread Lad Prabhakar
Parse endpoint properties using v4l2_fwnode_endpoint_alloc_parse() to determine the bus type and store it in the driver structure. Set bus_type to V4L2_MBUS_PARALLEL as it's the only supported one Signed-off-by: Lad Prabhakar Reviewed-by: Jacopo Mondi --- drivers/media/i2c/ov772x.c | 33 ++

[PATCH v7 0/3] media: i2c: ov772x: Enable BT.656 mode and test pattern support

2020-10-02 Thread Lad Prabhakar
Hi All, This patch series adds support for BT.656 mode in the ov772x sensor and also enables color bar test pattern control. Cheers, Prabhakar v6->v7 * Fixed review comments pointed by Sakari * Included Ack from Jacopo v5->v6 * Introduced new function ov772x_parse_dt() * Moved the backward comp

[PATCH v7 2/3] media: i2c: ov772x: Add support for BT.656 mode

2020-10-02 Thread Lad Prabhakar
Add support to read the bus-type for V4L2_MBUS_BT656 and enable BT.656 mode in the sensor if needed. For backward compatibility with older DTS where the bus-type property was not mandatory, assume V4L2_MBUS_PARALLEL as it was the only supported bus at the time. v4l2_fwnode_endpoint_alloc_parse() w

[PATCH v7 3/3] media: i2c: ov772x: Add test pattern control

2020-10-02 Thread Lad Prabhakar
Add support for test pattern control supported by the sensor. Signed-off-by: Lad Prabhakar Reviewed-by: Biju Das Reviewed-by: Jacopo Mondi --- drivers/media/i2c/ov772x.c | 17 - 1 file changed, 16 insertions(+), 1 deletion(-) diff --git a/drivers/media/i2c/ov772x.c b/drivers/m

[PATCH] ASoC: wm8523: Fix a typo in a comment

2020-10-02 Thread Christophe JAILLET
It is likely that this header file is about the WM8523. Signed-off-by: Christophe JAILLET --- sound/soc/codecs/wm8523.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/sound/soc/codecs/wm8523.h b/sound/soc/codecs/wm8523.h index 79afbf1e4f1a..5f9bb3df1866 100644 --- a/sound/so

Re: [RFC PATCH v1 07/26] docs: reporting-bugs: let users classify their issue

2020-10-02 Thread Randy Dunlap
On 10/1/20 1:39 AM, Thorsten Leemhuis wrote: > Explicitly outline that some issues are more important than others and > thus need to be handled differently in some steps that are about to > follow. This makes things explicit and easy to find if you need to look > up what issues actually qualify as

Re: [PATCH v2 1/2] system_data_types.7: Add 'void *'

2020-10-02 Thread Paul Eggert
On 10/2/20 2:10 AM, David Laight wrote: > Also, you should > warn that because one can convert from any pointer type to void * and > then to any other pointer type, it's a deliberate hole in C's > type-checking. That isn't what the C standard says at all. What is says is that you can ca

Re: [PATCH 0/2] Enable GPIO and I2C configs for TI's J721e platform

2020-10-02 Thread Nishanth Menon
On 22:15-20201002, Faiz Abbas wrote: > The following patches enable configs in the arm64 defconfig to support > GPIO and I2C support on TI's J721e platform. > > Faiz Abbas (2): > arm64: defconfig: Enable OMAP I2C driver > arm64: defconfig: Enable DAVINCI_GPIO driver &

Re: [PATCH v4 1/2] system_data_types.7: Add 'void *'

2020-10-02 Thread Paul Eggert
On 10/2/20 8:14 AM, Alejandro Colomar wrote: +.I void * GNU style is a space between "void" and "*", so this should be '.I "void\ *"', both here and elsewhere. The backslash prevents a line break. +Conversions from and to any other pointer type are done implicitly, +not requiring casts at

[RFC PATCH v2 00/33] SEV-ES hypervisor support

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky This patch series provides support for running SEV-ES guests under KVM. Secure Encrypted Virtualization - Encrypted State (SEV-ES) expands on the SEV support to protect the guest register state from the hypervisor. See "AMD64 Architecture Programmer's Manual Volume 2: System P

[RFC PATCH v2 01/33] KVM: SVM: Remove the call to sev_platform_status() during setup

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky When both KVM support and the CCP driver are built into the kernel instead of as modules, KVM initialization happens before CCP initialization. As a result, sev_platform_status() will return a failure when it is called from sev_hardware_setup(), when this isn't really an error

[RFC PATCH v2 03/33] KVM: SVM: Add GHCB accessor functions for retrieving fields

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky Update the GHCB accessor functions to add functions for retrieve GHCB fields by name. Update existing code to use the new accessor functions. Signed-off-by: Tom Lendacky --- arch/x86/include/asm/svm.h | 10 ++ arch/x86/kernel/cpu/vmware.c | 12 ++-- 2 files

[PATCH][next] drm/i915: fix size_t greater or equal to zero comparison

2020-10-02 Thread Colin King
From: Colin Ian King Currently the check that the unsigned size_t variable i is >= 0 is always true because the unsigned variable will never be negative, causing the loop to run forever. Fix this by changing the pre-decrement check to a zero check on i followed by a decrement of i. Addresses-Co

[RFC PATCH v2 02/33] KVM: SVM: Add support for SEV-ES capability in KVM

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky Add support to KVM for determining if a system is capable of supporting SEV-ES as well as determining if a guest is an SEV-ES guest. Signed-off-by: Tom Lendacky --- arch/x86/kvm/Kconfig | 3 ++- arch/x86/kvm/svm/sev.c | 47 ++ arch/

[RFC PATCH v2 04/33] KVM: SVM: Add support for the SEV-ES VMSA

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky Allocate a page during vCPU creation to be used as the encrypted VM save area (VMSA) for the SEV-ES guest. Provide a flag in the kvm_vcpu_arch structure that indicates whether the guest state is protected. When freeing a VMSA page that has been encrypted, the cache contents mu

[RFC PATCH v2 05/33] KVM: x86: Mark GPRs dirty when written

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky When performing VMGEXIT processing for an SEV-ES guest, register values will be synced between KVM and the GHCB. Prepare for detecting when a GPR has been updated (marked dirty) in order to determine whether to sync the register to the GHCB. Signed-off-by: Tom Lendacky --- a

[RFC PATCH v2 06/33] KVM: SVM: Add required changes to support intercepts under SEV-ES

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky When a guest is running under SEV-ES, the hypervisor cannot access the guest register state. There are numerous places in the KVM code where certain registers are accessed that are not allowed to be accessed (e.g. RIP, CR0, etc). Add checks to prevent register accesses and add

[RFC PATCH v2 08/33] KVM: SVM: Do not allow instruction emulation under SEV-ES

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky When a guest is running as an SEV-ES guest, it is not possible to emulate instructions. Add support to prevent instruction emulation. Signed-off-by: Tom Lendacky --- arch/x86/kvm/svm/svm.c | 6 ++ 1 file changed, 6 insertions(+) diff --git a/arch/x86/kvm/svm/svm.c b/arc

[RFC PATCH v2 10/33] KVM: SVM: Prepare for SEV-ES exit handling in the sev.c file

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky This is a pre-patch to consolidate some exit handling code into callable functions. Follow-on patches for SEV-ES exit handling will then be able to use them from the sev.c file. Signed-off-by: Tom Lendacky --- arch/x86/kvm/svm/svm.c | 64 +

[RFC PATCH v2 07/33] KVM: SVM: Prevent debugging under SEV-ES

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky Since the guest register state of an SEV-ES guest is encrypted, debugging is not supported. Update the code to prevent guest debugging when the guest has protected state. Additionally, an SEV-ES guest must only and always intercept DR7 reads and writes. Update set_dr_intercept

[RFC PATCH v2 13/33] KVM: SVM: Add support for SEV-ES GHCB MSR protocol function 0x002

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky The GHCB specification defines a GHCB MSR protocol using the lower 12-bits of the GHCB MSR (in the hypervisor this corresponds to the GHCB GPA field in the VMCB). Function 0x002 is a request to set the GHCB MSR value to the SEV INFO as per the specification via the VMCB GHCB G

[RFC PATCH v2 09/33] KVM: SVM: Cannot re-initialize the VMCB after shutdown with SEV-ES

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky When a SHUTDOWN VMEXIT is encountered, normally the VMCB is re-initialized so that the guest can be re-launched. But when a guest is running as an SEV-ES guest, the VMSA cannot be re-initialized because it has been encrypted. For now, just return -EINVAL to prevent a possible a

[RFC PATCH v2 14/33] KVM: SVM: Add support for SEV-ES GHCB MSR protocol function 0x004

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky The GHCB specification defines a GHCB MSR protocol using the lower 12-bits of the GHCB MSR (in the hypervisor this corresponds to the GHCB GPA field in the VMCB). Function 0x004 is a request for CPUID information. Only a single CPUID result register can be sent per invocation,

[RFC PATCH v2 19/33] KVM: SVM: Add support for EFER write traps for an SEV-ES guest

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky For SEV-ES guests, the interception of EFER write access is not recommended. EFER interception occurs prior to EFER being modified and the hypervisor is unable to modify EFER itself because the register is located in the encrypted register state. SEV-ES support introduces a ne

[RFC PATCH v2 18/33] KVM: SVM: Support port IO operations for an SEV-ES guest

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky For an SEV-ES guest, string-based port IO is performed to a shared (un-encrypted) page so that both the hypervisor and guest can read or write to it and each see the contents. For string-based port IO operations, invoke SEV-ES specific routines that can complete the operation

[RFC PATCH v2 17/33] KVM: SVM: Support MMIO for an SEV-ES guest

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky For an SEV-ES guest, MMIO is performed to a shared (un-encrypted) page so that both the hypervisor and guest can read or write to it and each see the contents. The GHCB specification provides software-defined VMGEXIT exit codes to indicate a request for an MMIO read or an MMIO

[RFC PATCH v2 20/33] KVM: SVM: Add support for CR0 write traps for an SEV-ES guest

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky For SEV-ES guests, the interception of control register write access is not recommended. Control register interception occurs prior to the control register being modified and the hypervisor is unable to modify the control register itself because the register is located in the e

[RFC PATCH v2 11/33] KVM: SVM: Add initial support for a VMGEXIT VMEXIT

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky SEV-ES adds a new VMEXIT reason code, VMGEXIT. Initial support for a VMGEXIT includes mapping the GHCB based on the guest GPA, which is obtained from a new VMCB field, and then validating the required inputs for the VMGEXIT exit reason. Since many of the VMGEXIT exit reasons c

[RFC PATCH v2 12/33] KVM: SVM: Create trace events for VMGEXIT processing

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky Add trace events for entry to and exit from VMGEXIT processing. The vCPU id and the exit reason will be common for the trace events. The exit info fields will represent the input and output values for the entry and exit events, respectively. Signed-off-by: Tom Lendacky --- a

[RFC PATCH v2 16/33] KVM: SVM: Create trace events for VMGEXIT MSR protocol processing

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky Add trace events for entry to and exit from VMGEXIT MSR protocol processing. The vCPU will be common for the trace events. The MSR protocol processing is guided by the GHCB GPA in the VMCB, so the GHCB GPA will represent the input and output values for the entry and exit events

[RFC PATCH v2 15/33] KVM: SVM: Add support for SEV-ES GHCB MSR protocol function 0x100

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky The GHCB specification defines a GHCB MSR protocol using the lower 12-bits of the GHCB MSR (in the hypervisor this corresponds to the GHCB GPA field in the VMCB). Function 0x100 is a request for termination of the guest. The guest has encountered some situation for which it ha

[RFC PATCH v2 25/33] KVM: SVM: Guest FPU state save/restore not needed for SEV-ES guest

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky The guest FPU state is automatically restored on VMRUN and saved on VMEXIT by the hardware, so there is no reason to do this in KVM. Eliminate the allocation of the guest_fpu save area and key off that to skip operations related to the guest FPU state. Signed-off-by: Tom Lenda

[RFC PATCH v2 27/33] KVM: SVM: Add NMI support for an SEV-ES guest

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky The GHCB specification defines how NMIs are to be handled for an SEV-ES guest. To detect the completion of an NMI the hypervisor must not intercept the IRET instruction (because a #VC while running the NMI will issue an IRET) and, instead, must receive an NMI Complete exit even

[RFC PATCH v2 23/33] KVM: x86: Update __get_sregs() / __set_sregs() to support SEV-ES

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky Since many of the registers used by the SEV-ES are encrypted and cannot be read or written, adjust the __get_sregs() / __set_sregs() to take into account whether the VMSA/guest state is encrypted. For __get_sregs(), return the actual value that is in use by the guest for all r

[RFC PATCH v2 26/33] KVM: SVM: Add support for booting APs for an SEV-ES guest

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky Typically under KVM, an AP is booted using the INIT-SIPI-SIPI sequence, where the guest vCPU register state is updated and then the vCPU is VMRUN to begin execution of the AP. For an SEV-ES guest, this won't work because the guest register state is encrypted. Following the GHC

[RFC PATCH v2 22/33] KVM: SVM: Add support for CR8 write traps for an SEV-ES guest

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky For SEV-ES guests, the interception of control register write access is not recommended. Control register interception occurs prior to the control register being modified and the hypervisor is unable to modify the control register itself because the register is located in the e

[RFC PATCH v2 24/33] KVM: SVM: Do not report support for SMM for an SEV-ES guest

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky SEV-ES guests do not currently support SMM. Update the has_emulated_msr() kvm_x86_ops function to take a struct kvm parameter so that the capability can be reported at a VM level. Since this op is also called during KVM initialization and before a struct kvm instance is availa

[PATCH v2] net: qrtr: ns: Fix the incorrect usage of rcu_read_lock()

2020-10-02 Thread Manivannan Sadhasivam
The rcu_read_lock() is not supposed to lock the kernel_sendmsg() API since it has the lock_sock() in qrtr_sendmsg() which will sleep. Hence, fix it by excluding the locking for kernel_sendmsg(). While at it, let's also use radix_tree_deref_retry() to confirm the validity of the pointer returned by

[RFC PATCH v2 21/33] KVM: SVM: Add support for CR4 write traps for an SEV-ES guest

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky For SEV-ES guests, the interception of control register write access is not recommended. Control register interception occurs prior to the control register being modified and the hypervisor is unable to modify the control register itself because the register is located in the e

[RFC PATCH v2 28/33] KVM: SVM: Set the encryption mask for the SVM host save area

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky The SVM host save area is used to restore some host state on VMEXIT of an SEV-ES guest. After allocating the save area, clear it and add the encryption mask to the SVM host save area physical address that is programmed into the VM_HSAVE_PA MSR. Signed-off-by: Tom Lendacky ---

[RFC PATCH v2 29/33] KVM: SVM: Update ASID allocation to support SEV-ES guests

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky SEV and SEV-ES guests each have dedicated ASID ranges. Update the ASID allocation routine to return an ASID in the respective range. Signed-off-by: Tom Lendacky --- arch/x86/kvm/svm/sev.c | 25 ++--- 1 file changed, 14 insertions(+), 11 deletions(-) diff

[RFC PATCH v2 33/33] KVM: SVM: Provide support to launch and run an SEV-ES guest

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky An SEV-ES guest is started by invoking a new SEV initialization ioctl, KVM_SEV_ES_INIT. This identifies the guest as an SEV-ES guest, which is used to drive the appropriate ASID allocation, VMSA encryption, etc. Before being able to run an SEV-ES vCPU, the vCPU VMSA must be en

[RFC PATCH v2 30/33] KVM: SVM: Provide support for SEV-ES vCPU creation/loading

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky An SEV-ES vCPU requires additional VMCB initialization requirements for vCPU creation and vCPU load/put requirements. This includes: General VMCB initialization changes: - Set a VMCB control bit to enable SEV-ES support on the vCPU. - Set the VMCB encrypted VM save area ad

[RFC PATCH v2 32/33] KVM: SVM: Provide an updated VMRUN invocation for SEV-ES guests

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky The run sequence is different for an SEV-ES guest compared to a legacy or even an SEV guest. The guest vCPU register state of an SEV-ES guest will be restored on VMRUN and saved on VMEXIT. There is no need to restore the guest registers directly and through VMLOAD before VMRUN

[RFC PATCH v2 31/33] KVM: SVM: Provide support for SEV-ES vCPU loading

2020-10-02 Thread Tom Lendacky
From: Tom Lendacky An SEV-ES vCPU requires additional VMCB vCPU load/put requirements. SEV-ES hardware will restore certain registers on VMEXIT, but not save them on VMRUM (see Table B-3 and Table B-4 of the AMD64 APM Volume 2), so make the following changes: General vCPU load changes: - Durin

Re: [PATCH v4 1/2] dt-bindings: usb: Add binding for discrete onboard USB hubs

2020-10-02 Thread Doug Anderson
Hi, On Wed, Sep 30, 2020 at 1:20 PM Rob Herring wrote: > > > > > Datasheets from different manufacturers refer to these ICs as "USB hub > > > > controller". Calling the node "usb-hub-controller" would indeed help to > > > > distinguish it from the USB hub devices and represent existing hardware.

Re: [RFC PATCH v1 08/26] docs: reporting-bugs: make readers check the taint flag

2020-10-02 Thread Randy Dunlap
On 10/1/20 1:39 AM, Thorsten Leemhuis wrote: > Tell users early in the process to check the taint flag, as that will > prevent them from investing time into a report that might be worthless. > That way users for example will notice that the issue they face is in > fact caused by an add-on kernel mo

Re: [PATCH v2] scsi: ufs: fix missing brace warning for old compilers

2020-10-02 Thread ebiggers
On Fri, Oct 02, 2020 at 02:35:38PM +0800, Pujin Shi wrote: > For older versions of gcc, the array = {0}; will cause warnings: > > drivers/scsi/ufs/ufshcd-crypto.c: In function 'ufshcd_crypto_keyslot_program': > drivers/scsi/ufs/ufshcd-crypto.c:62:8: warning: missing braces around > initializer [-

[PATCH v2] platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse

2020-10-02 Thread Aaron Ma
Evaluating ACPI _BCL could fail, then ACPI buffer size will be set to 0. When reuse this ACPI buffer, AE_BUFFER_OVERFLOW will be triggered. Re-initialize buffer size will make ACPI evaluate successfully. Fixes: 46445b6b896fd ("thinkpad-acpi: fix handle locate for video and query of _BCL") Signed

<    2   3   4   5   6   7   8   9   10   11   >