[powerpc:fixes-test] BUILD SUCCESS 3a7cf8fdb114ea9f709a2e7f0494908bacf1b190

2023-10-24 Thread kernel test robot
allmodconfig gcc arc allnoconfig gcc arc allyesconfig gcc arc defconfig gcc archsdk_defconfig gcc arc randconfig-001-20231024 gcc arc

[PATCH] powerpc: Make cpu_spec __ro_after_init

2023-10-24 Thread Michael Ellerman
The cpu_spec is a struct holding various information about the CPU the kernel is executing on. It's populated early in boot and must not change after that. In particular the cpu_features and mmu_features hold the set of discovered CPU/MMU features and are used to set static keys for each feature,

[PATCH v4 5/5] docs: trusted-encrypted: add DCP as new trust source

2023-10-24 Thread David Gstir
Update the documentation for trusted and encrypted KEYS with DCP as new trust source: - Describe security properties of DCP trust source - Describe key usage - Document blob format Co-developed-by: Richard Weinberger Signed-off-by: Richard Weinberger Co-developed-by: David Oberhollenzer Signed

[PATCH v4 4/5] docs: document DCP-backed trusted keys kernel params

2023-10-24 Thread David Gstir
Document the kernel parameters trusted.dcp_use_otp_key and trusted.dcp_skip_zk_test for DCP-backed trusted keys. Co-developed-by: Richard Weinberger Signed-off-by: Richard Weinberger Co-developed-by: David Oberhollenzer Signed-off-by: David Oberhollenzer Signed-off-by: David Gstir --- Docume

[PATCH v4 3/5] MAINTAINERS: add entry for DCP-based trusted keys

2023-10-24 Thread David Gstir
This covers trusted keys backed by NXP's DCP (Data Co-Processor) chip found in smaller i.MX SoCs. Signed-off-by: David Gstir --- MAINTAINERS | 9 + 1 file changed, 9 insertions(+) diff --git a/MAINTAINERS b/MAINTAINERS index 90f13281d297..988d01226131 100644 --- a/MAINTAINERS +++ b/MAIN

[PATCH v4 2/5] KEYS: trusted: Introduce NXP DCP-backed trusted keys

2023-10-24 Thread David Gstir
DCP (Data Co-Processor) is the little brother of NXP's CAAM IP. Beside of accelerated crypto operations, it also offers support for hardware-bound keys. Using this feature it is possible to implement a blob mechanism similar to what CAAM offers. Unlike on CAAM, constructing and parsing the blob has

[PATCH v4 1/5] crypto: mxs-dcp: Add support for hardware-bound keys

2023-10-24 Thread David Gstir
DCP is capable of performing AES with two hardware-bound keys: - The one-time programmable (OTP) key which is burnt via on-chip fuses - The unique key (UK) which is derived from the OTP key In addition to the two hardware-bound keys, DCP also supports storing keys in 4 dedicated key slots within

[PATCH v4 0/5] DCP as trusted keys backend

2023-10-24 Thread David Gstir
This is a revival of the previous patch set submitted by Richard Weinberger: https://lore.kernel.org/linux-integrity/20210614201620.30451-1-rich...@nod.at/ v3 is here: https://lore.kernel.org/keyrings/20230918141826.8139-1-da...@sigma-star.at/ v3 -> v4: - Split changes on MAINTAINERS and document

[PATCH v2] powerpc/mm: Avoid calling arch_enter/leave_lazy_mmu() in set_ptes

2023-10-24 Thread Aneesh Kumar K.V
With commit 9fee28baa601 ("powerpc: implement the new page table range API") we added set_ptes to powerpc architecture. The implementation included calling arch_enter/leave_lazy_mmu() calls. The patch removes the usage of arch_enter/leave_lazy_mmu() because set_pte is not supposed to be used when

Re: [PATCH v2] ASoC: fsl: Fix PM disable depth imbalance in fsl_easrc_probe

2023-10-24 Thread Mark Brown
On Thu, 12 Oct 2023 21:03:15 +0800, Zhang Shurong wrote: > The pm_runtime_enable will increase power disable depth. Thus > a pairing decrement is needed on the error handling path to > keep it balanced according to context. We fix it by calling > pm_runtime_disable when error returns. > > Applie

Re: [PATCH 1/2] kexec: fix KEXEC_FILE dependencies

2023-10-24 Thread Arnd Bergmann
On Tue, Oct 24, 2023, at 14:44, Baoquan He wrote: > Just add people and mailing list to CC since I didn't find this mail in > my box, just drag it via 'b4 am'. > > On 10/23/23 at 01:01pm, Arnd Bergmann wrote: > .. >> diff --git a/kernel/Kconfig.kexec b/kernel/Kconfig.kexec >> index 7aff28ded2f

Re: [PATCH 1/2] kexec: fix KEXEC_FILE dependencies

2023-10-24 Thread Baoquan He
Just add people and mailing list to CC since I didn't find this mail in my box, just drag it via 'b4 am'. On 10/23/23 at 01:01pm, Arnd Bergmann wrote: .. > --- > arch/powerpc/Kconfig | 4 ++-- > arch/riscv/Kconfig | 4 +--- > arch/s390/Kconfig| 4 ++-- > arch/x86/Kconfig | 4 ++-- >

[PATCH] ocxl: make ocxl_class constant

2023-10-24 Thread Greg Kroah-Hartman
Now that the driver core allows for struct class to be in read-only memory, we should make all 'class' structures declared at build time placing them into read-only memory, instead of having to be dynamically allocated at runtime. Cc: Frederic Barrat Cc: Andrew Donnellan Cc: Arnd Bergmann Cc: l

[PATCH] cxl: make cxl_class constant

2023-10-24 Thread Greg Kroah-Hartman
Now that the driver core allows for struct class to be in read-only memory, we should make all 'class' structures declared at build time placing them into read-only memory, instead of having to be dynamically allocated at runtime. Cc: Frederic Barrat Cc: Andrew Donnellan Cc: Arnd Bergmann Cc: l

[PATCH] powerpc/configs/64s: Enable CONFIG_MEM_SOFT_DIRTY

2023-10-24 Thread Michael Ellerman
Enable CONFIG_MEM_SOFT_DIRTY to get some test coverage. Distros enable it, and it has been broken previously. See commit 66b2ca086210 ("powerpc/64s/radix: Fix soft dirty tracking"). Signed-off-by: Michael Ellerman --- arch/powerpc/configs/ppc64_defconfig | 1 + 1 file changed, 1 insertion(+) di

Re: [PATCH 10/10] [RFC] wifi: remove ipw2100/ipw2200 drivers

2023-10-24 Thread Kalle Valo
Stefan Lippers-Hollmann writes: > On 2023-10-23, Arnd Bergmann wrote: >> From: Arnd Bergmann >> >> These two drivers were used for the earliest "Centrino" branded Intel >> laptops during the late 32-bit Pentium-M era, roughly 2003 to 2005, which >> probably makes it the most modern platform that

Re: [PATCH 2/2] kexec: select CRYPTO from KEXEC_FILE instead of depending on it

2023-10-24 Thread Arnd Bergmann
On Tue, Oct 24, 2023, at 06:10, Baoquan He wrote: > On 10/24/23 at 11:55am, Baoquan He wrote: >> On 10/23/23 at 01:01pm, Arnd Bergmann wrote: >> > From: Arnd Bergmann >> > >> > All other users of crypto code use 'select' instead of 'depends on', >> > so do the same thing with KEXEC_FILE for consi