[PATCH v5 RESEND 01/17] asm-generic/iomap.h: remove ARCH_HAS_IOREMAP_xx macros

2023-05-15 Thread Baoquan He
Let's use '#define ioremap_xx' and "#ifdef ioremap_xx" instead. For each architecture to remove defined ARCH_HAS_IOREMAP_xx macros in To remove defined ARCH_HAS_IOREMAP_xx macros in of each ARCH, the ARCH's own ioremap_wc|wt|np definition need be above "#include . Otherwise the redefinition error

[PATCH v5 RESEND 15/17] powerpc: mm: Convert to GENERIC_IOREMAP

2023-05-15 Thread Baoquan He
From: Christophe Leroy By taking GENERIC_IOREMAP method, the generic generic_ioremap_prot(), generic_iounmap(), and their generic wrapper ioremap_prot(), ioremap() and iounmap() are all visible and available to arch. Arch needs to provide wrapper functions to override the generic versions if ther

Re: [RFC PATCH v2] fs/xattr: add *at family syscalls

2023-05-15 Thread Christian Brauner
On Thu, May 11, 2023 at 05:08:02PM +0200, Christian Göttsche wrote: > Add the four syscalls setxattrat(), getxattrat(), listxattrat() and > removexattrat(). Those can be used to operate on extended attributes, > especially security related ones, either relative to a pinned directory > or on a file

Re: [PATCH v5 5/6] mm/gup: remove vmas parameter from pin_user_pages()

2023-05-15 Thread Christoph Hellwig
On Sun, May 14, 2023 at 10:26:58PM +0100, Lorenzo Stoakes wrote: > We are now in a position where no caller of pin_user_pages() requires the > vmas parameter at all, so eliminate this parameter from the function and > all callers. > > This clears the way to removing the vmas parameter from GUP alt

[RFC 0/1] sched/fair: Consider asymmetric scheduler groups in load balancer

2023-05-15 Thread Tobias Huschle
The current load balancer implementation implies that scheduler groups, within the same scheduler domain, all host the same number of CPUs. This appears to be valid for non-s390 architectures. Nevertheless, s390 can actually have scheduler groups of unequal size. The current scheduler behavior ca

[RFC 1/1] sched/fair: Consider asymmetric scheduler groups in load balancer

2023-05-15 Thread Tobias Huschle
The current load balancer implementation implies that scheduler groups, within the same domain, all host the same number of CPUs. This is reflected in the condition, that a scheduler group, which is load balancing and classified as having spare capacity, should pull work from the busiest group, if

Re: [PATCH] powerpc/64s/radix: Fix soft dirty tracking

2023-05-15 Thread Dan Horák
On Thu, 11 May 2023 21:42:24 +1000 Michael Ellerman wrote: > It was reported that soft dirty tracking doesn't work when using the > Radix MMU. > > The tracking is supposed to work by clearing the soft dirty bit for a > mapping and then write protecting the PTE. If/when the page is written > to,

[PATCH] powerpc/crypto: Fix aes-gcm-p10 build when VSX=n

2023-05-15 Thread Michael Ellerman
When VSX is disabled, eg. microwatt_defconfig, the build fails with: In function ‘enable_kernel_vsx’, inlined from ‘vsx_begin’ at arch/powerpc/crypto/aes-gcm-p10-glue.c:68:2, inlined from ‘p10_aes_gcm_crypt.constprop’ at arch/powerpc/crypto/aes-gcm-p10-glue.c:244:2: ... arch/pow

Re: [PATCH v2 6/6] powerpc/64: Rename entry_64.S to prom_entry_64.S

2023-05-15 Thread Nicholas Piggin
On Mon May 15, 2023 at 2:45 PM AEST, Nicholas Piggin wrote: > This file contains only the enter_prom implementation now. > Trim includes and update header comment while we're here. > > Signed-off-by: Nicholas Piggin > --- > arch/powerpc/kernel/Makefile | 8 +++-- > .../kernel/{e

Re: [RFC PATCH v2] fs/xattr: add *at family syscalls

2023-05-15 Thread Christian Brauner
On Mon, May 15, 2023 at 04:04:21PM +0300, Amir Goldstein wrote: > On Mon, May 15, 2023 at 1:33 PM Christian Brauner wrote: > > > > On Thu, May 11, 2023 at 05:08:02PM +0200, Christian Göttsche wrote: > > > Add the four syscalls setxattrat(), getxattrat(), listxattrat() and > > > removexattrat(). T

[PATCH 3/3][For 4.19/4.14] spi: fsl-cpm: Use 16 bit mode for large transfers with even size

2023-05-15 Thread Christophe Leroy
(cherry picked from upstream fc96ec826bced75cc6b9c07a4ac44bbf651337ab) On CPM, the RISC core is a lot more efficiant when doing transfers in 16-bits chunks than in 8-bits chunks, but unfortunately the words need to be byte swapped as seen in a previous commit. So, for large tranfers with an even

[PATCH 2/2][For 5.15/5.10/5.4] spi: fsl-cpm: Use 16 bit mode for large transfers with even size

2023-05-15 Thread Christophe Leroy
(cherry picked from upstream fc96ec826bced75cc6b9c07a4ac44bbf651337ab) On CPM, the RISC core is a lot more efficiant when doing transfers in 16-bits chunks than in 8-bits chunks, but unfortunately the words need to be byte swapped as seen in a previous commit. So, for large tranfers with an even

[PATCH 2/3][For 4.19/4.14] spi: fsl-spi: Re-organise transfer bits_per_word adaptation

2023-05-15 Thread Christophe Leroy
(backported from upstream 8a5299a1278eadf1e08a598a5345c376206f171e) For different reasons, fsl-spi driver performs bits_per_word modifications for different reasons: - On CPU mode, to minimise amount of interrupts - On CPM/QE mode to work around controller byte order For CPU mode that's done in f

[PATCH 1/2][For 5.15/5.10/5.4] spi: fsl-spi: Re-organise transfer bits_per_word adaptation

2023-05-15 Thread Christophe Leroy
(backported from upstream 8a5299a1278eadf1e08a598a5345c376206f171e) For different reasons, fsl-spi driver performs bits_per_word modifications for different reasons: - On CPU mode, to minimise amount of interrupts - On CPM/QE mode to work around controller byte order For CPU mode that's done in f

[PATCH 1/3][For 4.19/4.14] spi: spi-fsl-spi: automatically adapt bits-per-word in cpu mode

2023-05-15 Thread Christophe Leroy
From: Rasmus Villemoes (cherry picked from upstream af0e6242909c3c4297392ca3e94eff1b4db71a97) Taking one interrupt for every byte is rather slow. Since the controller is perfectly capable of transmitting 32 bits at a time, change t->bits_per-word to 32 when the length is divisible by 4 and large

Re: [PATCH v2 6/6] powerpc/64: Rename entry_64.S to prom_entry_64.S

2023-05-15 Thread Christophe Leroy
Le 15/05/2023 à 15:17, Nicholas Piggin a écrit : > On Mon May 15, 2023 at 2:45 PM AEST, Nicholas Piggin wrote: >> This file contains only the enter_prom implementation now. >> Trim includes and update header comment while we're here. >> >> Signed-off-by: Nicholas Piggin >> --- >> arch/powerpc/

[PATCH v4 1/1] PCI: layerscape: Add the endpoint linkup notifier support

2023-05-15 Thread Frank Li
Layerscape has PME interrupt, which can be used as linkup notifier. Set CFG_READY bit of PEX_PF0_CONFIG to enable accesses from root complex when linkup detected. Acked-by: Manivannan Sadhasivam Signed-off-by: Xiaowei Bao Signed-off-by: Frank Li --- Change from v3 to v4 - swap irq and big_endi

[PATCH 4.14 094/116] perf vendor events power9: Remove UTF-8 characters from JSON files

2023-05-15 Thread Greg Kroah-Hartman
From: Kajol Jain [ Upstream commit 5d9df8731c0941f3add30f96745a62586a0c9d52 ] Commit 3c22ba5243040c13 ("perf vendor events powerpc: Update POWER9 events") added and updated power9 PMU JSON events. However some of the JSON events which are part of other.json and pipeline.json files, contains UTF-

[PATCH 4.19 164/191] perf vendor events power9: Remove UTF-8 characters from JSON files

2023-05-15 Thread Greg Kroah-Hartman
From: Kajol Jain [ Upstream commit 5d9df8731c0941f3add30f96745a62586a0c9d52 ] Commit 3c22ba5243040c13 ("perf vendor events powerpc: Update POWER9 events") added and updated power9 PMU JSON events. However some of the JSON events which are part of other.json and pipeline.json files, contains UTF-

[PATCH 6.3 110/246] perf vendor events power9: Remove UTF-8 characters from JSON files

2023-05-15 Thread Greg Kroah-Hartman
From: Kajol Jain [ Upstream commit 5d9df8731c0941f3add30f96745a62586a0c9d52 ] Commit 3c22ba5243040c13 ("perf vendor events powerpc: Update POWER9 events") added and updated power9 PMU JSON events. However some of the JSON events which are part of other.json and pipeline.json files, contains UTF-

[PATCH 6.1 095/239] perf vendor events power9: Remove UTF-8 characters from JSON files

2023-05-15 Thread Greg Kroah-Hartman
From: Kajol Jain [ Upstream commit 5d9df8731c0941f3add30f96745a62586a0c9d52 ] Commit 3c22ba5243040c13 ("perf vendor events powerpc: Update POWER9 events") added and updated power9 PMU JSON events. However some of the JSON events which are part of other.json and pipeline.json files, contains UTF-

[PATCH 6.2 101/242] perf vendor events power9: Remove UTF-8 characters from JSON files

2023-05-15 Thread Greg Kroah-Hartman
From: Kajol Jain [ Upstream commit 5d9df8731c0941f3add30f96745a62586a0c9d52 ] Commit 3c22ba5243040c13 ("perf vendor events powerpc: Update POWER9 events") added and updated power9 PMU JSON events. However some of the JSON events which are part of other.json and pipeline.json files, contains UTF-

[PATCH 5.15 050/134] perf vendor events power9: Remove UTF-8 characters from JSON files

2023-05-15 Thread Greg Kroah-Hartman
From: Kajol Jain [ Upstream commit 5d9df8731c0941f3add30f96745a62586a0c9d52 ] Commit 3c22ba5243040c13 ("perf vendor events powerpc: Update POWER9 events") added and updated power9 PMU JSON events. However some of the JSON events which are part of other.json and pipeline.json files, contains UTF-

[PATCH 5.10 329/381] perf vendor events power9: Remove UTF-8 characters from JSON files

2023-05-15 Thread Greg Kroah-Hartman
From: Kajol Jain [ Upstream commit 5d9df8731c0941f3add30f96745a62586a0c9d52 ] Commit 3c22ba5243040c13 ("perf vendor events powerpc: Update POWER9 events") added and updated power9 PMU JSON events. However some of the JSON events which are part of other.json and pipeline.json files, contains UTF-

[PATCH 5.4 236/282] perf vendor events power9: Remove UTF-8 characters from JSON files

2023-05-15 Thread Greg Kroah-Hartman
From: Kajol Jain [ Upstream commit 5d9df8731c0941f3add30f96745a62586a0c9d52 ] Commit 3c22ba5243040c13 ("perf vendor events powerpc: Update POWER9 events") added and updated power9 PMU JSON events. However some of the JSON events which are part of other.json and pipeline.json files, contains UTF-

Re: [PATCH v2 30/34] sh: Convert pte_free_tlb() to use ptdescs

2023-05-15 Thread Vishal Moola
On Sat, May 6, 2023 at 4:35 AM John Paul Adrian Glaubitz wrote: > > Hi Vishal! > > On Mon, 2023-05-01 at 12:28 -0700, Vishal Moola (Oracle) wrote: > > Part of the conversions to replace pgtable constructor/destructors with > > ptdesc equivalents. Also cleans up some spacing issues. > > > > Signed-

Re: [PATCH v2 08/11] powerpc: Mark writes registering ipi to host cpu through kvm and polling

2023-05-15 Thread Rohan McLure
> On 15 May 2023, at 3:53 pm, Nicholas Piggin wrote: > > On Wed May 10, 2023 at 1:31 PM AEST, Rohan McLure wrote: >> Mark writes to hypervisor ipi state so that KCSAN recognises these >> asynchronous issue of kvmppc_{set,clear}_host_ipi to be intended, with >> atomic writes. Mark asynchronous pol

Re: [RFC PATCH v2] fs/xattr: add *at family syscalls

2023-05-15 Thread Amir Goldstein
On Mon, May 15, 2023 at 1:33 PM Christian Brauner wrote: > > On Thu, May 11, 2023 at 05:08:02PM +0200, Christian Göttsche wrote: > > Add the four syscalls setxattrat(), getxattrat(), listxattrat() and > > removexattrat(). Those can be used to operate on extended attributes, > > especially securit

Re: [RFC PATCH v2] fs/xattr: add *at family syscalls

2023-05-15 Thread Amir Goldstein
On Mon, May 15, 2023 at 4:52 PM Christian Brauner wrote: > > On Mon, May 15, 2023 at 04:04:21PM +0300, Amir Goldstein wrote: > > On Mon, May 15, 2023 at 1:33 PM Christian Brauner > > wrote: > > > > > > On Thu, May 11, 2023 at 05:08:02PM +0200, Christian Göttsche wrote: > > > > Add the four sysca

[PATCH v2 11/25] iommu/tegra-smmu: Implement an IDENTITY domain

2023-05-15 Thread Jason Gunthorpe
What tegra-smmu does during tegra_smmu_set_platform_dma() is actually putting the iommu into identity mode. Move to the new core support for ARM_DMA_USE_IOMMU by defining ops->identity_domain. Signed-off-by: Jason Gunthorpe --- drivers/iommu/tegra-smmu.c | 37 ---

[PATCH v2 25/25] iommu: Convert remaining simple drivers to domain_alloc_paging()

2023-05-15 Thread Jason Gunthorpe
These drivers don't support IOMMU_DOMAIN_DMA, so this commit effectively allows them to support that mode. The prior work to require default_domains makes this safe because every one of these drivers is either compilation incompatible with dma-iommu.c, or already establishing a default_domain. In

[PATCH v2 24/25] iommu: Convert simple drivers with DOMAIN_DMA to domain_alloc_paging()

2023-05-15 Thread Jason Gunthorpe
These drivers are all trivially converted since the function is only called if the domain type is going to be IOMMU_DOMAIN_UNMANAGED/DMA. Tested-by: Heiko Stuebner Signed-off-by: Jason Gunthorpe --- drivers/iommu/arm/arm-smmu/qcom_iommu.c | 6 ++ drivers/iommu/exynos-iommu.c| 7

[PATCH v2 17/25] iommu/qcom_iommu: Add an IOMMU_IDENTITIY_DOMAIN

2023-05-15 Thread Jason Gunthorpe
This brings back the ops->detach_dev() code that commit 1b932ceddd19 ("iommu: Remove detach_dev callbacks") deleted and turns it into an IDENTITY domain. Signed-off-by: Jason Gunthorpe --- drivers/iommu/arm/arm-smmu/qcom_iommu.c | 39 + 1 file changed, 39 insertions(+) d

[PATCH v2 02/25] iommu: Add IOMMU_DOMAIN_PLATFORM

2023-05-15 Thread Jason Gunthorpe
This is used when the iommu driver is taking control of the dma_ops, currently only on S390 and power spapr. It is designed to preserve the original ops->detach_dev() semantic that these S390 was built around. Provide an opaque domain type and a 'default_domain' ops value that allows the driver to

[PATCH v2 10/25] iommu/exynos: Implement an IDENTITY domain

2023-05-15 Thread Jason Gunthorpe
What exynos calls exynos_iommu_detach_device is actually putting the iommu into identity mode. Move to the new core support for ARM_DMA_USE_IOMMU by defining ops->identity_domain. Signed-off-by: Jason Gunthorpe --- drivers/iommu/exynos-iommu.c | 66 +--- 1 file c

[PATCH v2 14/25] iommu/msm: Implement an IDENTITY domain

2023-05-15 Thread Jason Gunthorpe
What msm does during omap_iommu_set_platform_dma() is actually putting the iommu into identity mode. Move to the new core support for ARM_DMA_USE_IOMMU by defining ops->identity_domain. This driver does not support IOMMU_DOMAIN_DMA, however it cannot be compiled on ARM64 either. Most likely it is

[PATCH v2 01/25] iommu: Add iommu_ops->identity_domain

2023-05-15 Thread Jason Gunthorpe
This allows a driver to set a global static to an IDENTITY domain and the core code will automatically use it whenever an IDENTITY domain is requested. By making it always available it means the IDENTITY can be used in error handling paths to force the iommu driver into a known state. Devices impl

[PATCH v2 23/25] iommu: Add ops->domain_alloc_paging()

2023-05-15 Thread Jason Gunthorpe
This callback requests the driver to create only a __IOMMU_DOMAIN_PAGING domain, so it saves a few lines in a lot of drivers needlessly checking the type. More critically, this allows us to sweep out all the IOMMU_DOMAIN_UNMANAGED and IOMMU_DOMAIN_DMA checks from a lot of the drivers, simplifying

[PATCH v2 09/25] iommu/fsl_pamu: Implement an IDENTITY domain

2023-05-15 Thread Jason Gunthorpe
Robin was able to check the documentation and what fsl_pamu has historically called detach_dev() is really putting the IOMMU into an IDENTITY mode. Move to the new core support for ARM_DMA_USE_IOMMU by defining ops->identity_domain. This is a ppc driver without any dma_ops, so ensure the identity

[PATCH v2 07/25] iommu: Reorganize iommu_get_default_domain_type() to respect def_domain_type()

2023-05-15 Thread Jason Gunthorpe
Except for dart every driver returns 0 or IDENTITY from def_domain_type(). The drivers that return IDENTITY have some kind of good reason, typically that quirky hardware really can't support anything other than IDENTITY. Arrange things so that if the driver says it needs IDENTITY then iommu_get_d

[PATCH v2 18/25] iommu/ipmmu: Add an IOMMU_IDENTITIY_DOMAIN

2023-05-15 Thread Jason Gunthorpe
This brings back the ops->detach_dev() code that commit 1b932ceddd19 ("iommu: Remove detach_dev callbacks") deleted and turns it into an IDENTITY domain. Also reverts commit 584d334b1393 ("iommu/ipmmu-vmsa: Remove ipmmu_utlb_disable()") Signed-off-by: Jason Gunthorpe --- drivers/iommu/ipmmu-vms

[PATCH v2 04/25] iommu: Add IOMMU_DOMAIN_PLATFORM for S390

2023-05-15 Thread Jason Gunthorpe
The PLATFORM domain will be set as the default domain and attached as normal during probe. The driver will ignore the initial attach from a NULL domain to the PLATFORM domain. After this, the PLATFORM domain's attach_dev will be called whenever we detach from an UNMANAGED domain (eg for VFIO). Thi

[PATCH v2 12/25] iommu/tegra-smmu: Support DMA domains in tegra

2023-05-15 Thread Jason Gunthorpe
All ARM64 iommu drivers should support IOMMU_DOMAIN_DMA to enable dma-iommu.c. tegra is blocking dma-iommu usage, and also default_domain's, because it wants an identity translation. This is needed for some device quirk. The correct way to do this is to support IDENTITY domains and use ops->def_do

[PATCH v2 00/25] iommu: Make default_domain's mandatory

2023-05-15 Thread Jason Gunthorpe
[ There was alot of unexpected complication after rc1 with this series, several new patches were needed ] It has been a long time coming, this series completes the default_domain transition and makes it so that the core IOMMU code will always have a non-NULL default_domain for every driver on ever

[PATCH v2 20/25] iommu/sun50i: Add an IOMMU_IDENTITIY_DOMAIN

2023-05-15 Thread Jason Gunthorpe
Prior to commit 1b932ceddd19 ("iommu: Remove detach_dev callbacks") the sun50i_iommu_detach_device() function was being called by ops->detach_dev(). This is an IDENTITY domain so convert sun50i_iommu_detach_device() into sun50i_iommu_identity_attach() and a full IDENTITY domain and thus hook it ba

[PATCH v2 05/25] iommu/tegra-gart: Remove tegra-gart

2023-05-15 Thread Jason Gunthorpe
Thierry says this is not used anymore, and doesn't think it ever will be. The HW it supports is about 10 years old now and newer HW uses different IOMMU drivers. As this is the only driver with a GART approach, and it doesn't really meet the driver expectations from the IOMMU core, let's just remo

[PATCH v2 22/25] iommu: Add __iommu_group_domain_alloc()

2023-05-15 Thread Jason Gunthorpe
Allocate a domain from a group. Automatically obtains the iommu_ops to use from the device list of the group. Convert the internal callers to use it. Signed-off-by: Jason Gunthorpe --- drivers/iommu/iommu.c | 66 --- 1 file changed, 37 insertions(+), 29 de

[PATCH v2 21/25] iommu: Require a default_domain for all iommu drivers

2023-05-15 Thread Jason Gunthorpe
At this point every iommu driver will cause a default_domain to be selected, so we can finally remove this gap from the core code. The following table explains what each driver supports and what the resulting default_domain will be: ops->defaut_domain

[PATCH v2 13/25] iommu/omap: Implement an IDENTITY domain

2023-05-15 Thread Jason Gunthorpe
What omap does during omap_iommu_set_platform_dma() is actually putting the iommu into identity mode. Move to the new core support for ARM_DMA_USE_IOMMU by defining ops->identity_domain. This driver does not support IOMMU_DOMAIN_DMA, however it cannot be compiled on ARM64 either. Most likely it i

[PATCH v2 15/25] iommufd/selftest: Make the mock iommu driver into a real driver

2023-05-15 Thread Jason Gunthorpe
I've avoided doing this because there is no way to make this happen without an intrusion into the core code. Up till now this has avoided needing the core code's probe path with some hackery - but now that default domains are becoming mandatory it is unavoidable. The core probe path must be run to

[PATCH v2 06/25] iommu/mtk_iommu_v1: Implement an IDENTITY domain

2023-05-15 Thread Jason Gunthorpe
What mtk does during mtk_iommu_v1_set_platform_dma() is actually putting the iommu into identity mode. Make this available as a proper IDENTITY domain. The mtk_iommu_v1_def_domain_type() from commit 8bbe13f52cb7 ("iommu/mediatek-v1: Add def_domain_type") explains this was needed to allow probe_fin

[PATCH v2 08/25] iommu: Allow an IDENTITY domain as the default_domain in ARM32

2023-05-15 Thread Jason Gunthorpe
Even though dma-iommu.c and CONFIG_ARM_DMA_USE_IOMMU do approximately the same stuff, the way they relate to the IOMMU core is quiet different. dma-iommu.c expects the core code to setup an UNMANAGED domain (of type IOMMU_DOMAIN_DMA) and then configures itself to use that domain. This becomes the

[PATCH v2 03/25] powerpc/iommu: Setup a default domain and remove set_platform_dma_ops

2023-05-15 Thread Jason Gunthorpe
POWER is using the set_platform_dma_ops() callback to hook up its private dma_ops, but this is buired under some indirection and is weirdly happening for a BLOCKED domain as well. For better documentation create a PLATFORM domain to manage the dma_ops, since that is what it is for, and make the BL

[PATCH v2 16/25] iommu: Remove ops->set_platform_dma_ops()

2023-05-15 Thread Jason Gunthorpe
All drivers are now using IDENTITY or PLATFORM domains for what this did, we can remove it now. It is no longer possible to attach to a NULL domain. Tested-by: Heiko Stuebner Tested-by: Niklas Schnelle Signed-off-by: Jason Gunthorpe --- drivers/iommu/iommu.c | 30 +-

[PATCH v2 19/25] iommu/mtk_iommu: Add an IOMMU_IDENTITIY_DOMAIN

2023-05-15 Thread Jason Gunthorpe
This brings back the ops->detach_dev() code that commit 1b932ceddd19 ("iommu: Remove detach_dev callbacks") deleted and turns it into an IDENTITY domain. Signed-off-by: Jason Gunthorpe --- drivers/iommu/mtk_iommu.c | 23 +++ 1 file changed, 23 insertions(+) diff --git a/driv

[PATCH rc] iommu/power: Remove iommu_del_device()

2023-05-15 Thread Jason Gunthorpe
Now that power calls iommu_device_register() and populates its groups using iommu_ops->device_group it should not be calling iommu_group_remove_device(). The core code owns the groups and all the other related iommu data, it will clean it up automatically. Remove the bus notifiers and explicit ca

Re: [PATCH v5 14/26] alpha: Remove empty

2023-05-15 Thread Maciej W. Rozycki
On Mon, 6 Mar 2023, Alexandre Ghiti wrote: > diff --git a/arch/alpha/include/uapi/asm/setup.h > b/arch/alpha/include/uapi/asm/setup.h > deleted file mode 100644 > index 9b3b5ba39b1d.. > --- a/arch/alpha/include/uapi/asm/setup.h > +++ /dev/null > @@ -1,5 +0,0 @@ > -/* SPDX-License-Iden

[powerpc:next-test] BUILD SUCCESS 7d3ee229ea51a17afc1e53272e2a8f377cc82ba2

2023-05-15 Thread kernel test robot
tree/branch: https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git next-test branch HEAD: 7d3ee229ea51a17afc1e53272e2a8f377cc82ba2 powerpc: Drop MPC5200 LocalPlus bus FIFO driver elapsed time: 731m configs tested: 2 configs skipped: 191 The following configs have been built succes

[powerpc:fixes-test] BUILD SUCCESS 8133a3f0aa66ed3d7d974c89ac6aca6fe6cec837

2023-05-15 Thread kernel test robot
successfully. More configs may be tested in the coming days. tested configs: alphaallyesconfig gcc alphabuildonly-randconfig-r003-20230515 gcc alpha defconfig gcc arc allyesconfig gcc arc

[powerpc:merge] BUILD SUCCESS 6d40746dbb75f85a18a0df005f1a8d6147abec22

2023-05-15 Thread kernel test robot
onfig-r011-20230515 gcc alpharandconfig-r013-20230515 gcc alpharandconfig-r025-20230515 gcc alpharandconfig-r034-20230515 gcc arc allyesconfig gcc arc defconfig

Re: linux-next: Tree for May 15 (drivers/macintosh/ams/ams-core.c)

2023-05-15 Thread Randy Dunlap
On 5/14/23 21:12, Stephen Rothwell wrote: > Hi all, > > Changes since 20230512: > ../drivers/macintosh/ams/ams-core.c: In function 'ams_init': ../drivers/macintosh/ams/ams-core.c:181:29: warning: unused variable 'np' [-Wunused-variable] 181 | struct device_node *np; |

Re: [PATCH v2 05/11] powerpc: Mark accesses to power_save callback in arch_cpu_idle

2023-05-15 Thread Rohan McLure
> On 15 May 2023, at 3:50 pm, Nicholas Piggin wrote: > > On Wed May 10, 2023 at 1:31 PM AEST, Rohan McLure wrote: >> The power_save callback can be overwritten by another core at boot time. >> Specifically, null values will be replaced exactly once with the callback >> suitable for the particular

Re: [PATCH v5 RESEND 01/17] asm-generic/iomap.h: remove ARCH_HAS_IOREMAP_xx macros

2023-05-15 Thread Mike Rapoport
Hi, On Mon, May 15, 2023 at 05:08:32PM +0800, Baoquan He wrote: > Let's use '#define ioremap_xx' and "#ifdef ioremap_xx" instead. > > For each architecture to remove defined ARCH_HAS_IOREMAP_xx macros in This sentence seems to be stale. > To remove defined ARCH_HAS_IOREMAP_xx macros in of each