Re: [PATCH v1 02/13] xen/pvcalls: connect to the backend

2017-07-24 Thread Juergen Gross
On 22/07/17 02:11, Stefano Stabellini wrote: > Implement the probe function for the pvcalls frontend. Read the > supported versions, max-page-order and function-calls nodes from > xenstore. > > Introduce a data structure named pvcalls_bedata. It contains pointers to > the command ring, the event

Re: [PATCH] HID: rmi: Make sure the HID device is opened on resume

2017-07-24 Thread Jiri Kosina
On Mon, 24 Jul 2017, Lyude Paul wrote: > > > So, call hid_hw_open() in rmi_post_resume() so we make sure that > > > the > > > device is alive before we try talking to it. > > > > > > This fixes RMI device suspend/resume over HID. > > > - int ret; > > > + int ret = 0; > > > > What's

Re: bcache with existing ext4 filesystem

2017-07-24 Thread Theodore Ts'o
On Mon, Jul 24, 2017 at 09:15:48PM +0200, Pavel Machek wrote: > > > > Am 24.07.2017 um 20:57 schrieb Pavel Machek: > > >Would it be feasible to run bcache (write-through) with existing ext4 > > >filesystem? > > > > > >I have 400GB of data I'd rather not move, and SSD I could use for > > >caching.

Re: bcache with existing ext4 filesystem

2017-07-24 Thread Reindl Harald
Am 24.07.2017 um 20:57 schrieb Pavel Machek: Would it be feasible to run bcache (write-through) with existing ext4 filesystem? I have 400GB of data I'd rather not move, and SSD I could use for caching. Ok, SSD is connecte over USB2, but I guess it is still way faster then seeking harddrive on

Re: [PATCH v3 2/2] dt-bindings: mfd: Add bindings for ZII RAVE devices

2017-07-24 Thread Andrey Smirnov
On Mon, Jul 24, 2017 at 9:23 AM, Rob Herring wrote: > On Mon, Jul 24, 2017 at 08:09:15AM -0700, Andrey Smirnov wrote: >> Cc: cphe...@gmail.com >> Cc: Lucas Stach >> Cc: Nikita Yushchenko >> Cc: Rob Herring

Re: [PATCH v1 04/13] xen/pvcalls: implement connect command

2017-07-24 Thread Juergen Gross
On 22/07/17 02:11, Stefano Stabellini wrote: > Send PVCALLS_CONNECT to the backend. Allocate a new ring and evtchn for > the active socket. > > Introduce a data structure to keep track of sockets. Introduce a > waitqueue to allow the frontend to wait on data coming from the backend > on the

Re: [PATCH v1 07/13] xen/pvcalls: implement accept command

2017-07-24 Thread Juergen Gross
On 22/07/17 02:11, Stefano Stabellini wrote: > Send PVCALLS_ACCEPT to the backend. Allocate a new active socket. Make > sure that only one accept command is executed at any given time by > setting PVCALLS_FLAG_ACCEPT_INFLIGHT and waiting on the > inflight_accept_req waitqueue. > >

Re: [PATCH 3/4] can: m_can: Update documentation to mention new fixed transceiver binding

2017-07-24 Thread Rob Herring
On Wed, Jul 19, 2017 at 06:36:53PM -0500, Franklin S Cooper Jr wrote: > Add information regarding fixed transceiver binding. This is especially > important for MCAN since the IP allows CAN FD mode to run significantly > faster than what most transceivers are capable of. > > Signed-off-by:

[PATCH] mod_devicetable.h: Fix docs build warnings

2017-07-24 Thread Jonathan Corbet
Commit 0afef45654ae908536278ecb143ded5bbc713391 (staging: fsl-mc: add support for device table matching) added kerneldoc comments for two nonexistent structure fields, leading to these warnings in the docs build: ./include/linux/mod_devicetable.h:687: warning: Excess struct/union/enum/typedef

[PATCH] sched/wait: Clean up some documentation warnings

2017-07-24 Thread Jonathan Corbet
A couple of kerneldoc comments in had incorrect names for macro parameters, with this unsightly result: ./include/linux/wait.h:555: warning: No description found for parameter 'wq' ./include/linux/wait.h:555: warning: Excess function parameter 'wq_head' description in

[RFC Part2 PATCH v3 03/26] crypto: ccp: Add Secure Encrypted Virtualization (SEV) device support

2017-07-24 Thread Brijesh Singh
AMDs new Secure Encrypted Virtualization (SEV) feature allows the memory contents of a virtual machine to be transparently encrypted with a key unique to the guest VM. The programming and management of the encryption keys are handled by the AMD Secure Processor (AMD-SP), which exposes the commands

[RFC Part2 PATCH v3 06/26] KVM: SVM: Prepare for new bit definition in nested_ctl

2017-07-24 Thread Brijesh Singh
From: Tom Lendacky Currently the nested_ctl variable in the vmcb_control_area structure is used to indicate nested paging support. The nested paging support field is actually defined as bit 0 of the field. In order to support a new feature flag the usage of the

[RFC Part2 PATCH v3 05/26] KVM: SVM: Reserve ASID range for SEV guest

2017-07-24 Thread Brijesh Singh
SEV-enabled guest must use ASIDs from the defined subset, while non-SEV guests can use the remaining ASID range. The range of ASID allowed for SEV-enabled guest is from 1 to a maximum value defined via CPUID Fn8000_001f[ECX]. Signed-off-by: Brijesh Singh ---

[RFC Part2 PATCH v3 04/26] KVM: SVM: Prepare to reserve asid for SEV guest

2017-07-24 Thread Brijesh Singh
In current implementation, asid allocation starts from 1, this patch adds a min_asid variable in svm_vcpu structure to allow starting asid from something other than 1. Signed-off-by: Brijesh Singh Reviewed-by: Paolo Bonzini --- arch/x86/kvm/svm.c | 4

[RFC Part2 PATCH v3 22/26] KVM: SVM: Pin guest memory when SEV is active

2017-07-24 Thread Brijesh Singh
The SEV memory encryption engine uses a tweak such that two identical plaintexts at different location will have a different ciphertexts. So swapping or moving ciphertexts of two pages will not result in plaintexts being swapped. Relocating (or migrating) a physical backing pages for SEV guest

[RFC Part2 PATCH v3 23/26] KVM: X86: Add memory encryption enabled ops

2017-07-24 Thread Brijesh Singh
Extend kvm_x86_ops to add memory_encyption_enabled() ops. It returns a boolean indicating whether memory encryption is enabled on the VCPU. Signed-off-by: Brijesh Singh --- arch/x86/include/asm/kvm_host.h | 1 + arch/x86/kvm/svm.c | 8 2 files

[RFC Part2 PATCH v3 24/26] KVM: SVM: Clear C-bit from the page fault address

2017-07-24 Thread Brijesh Singh
When SEV is active, on #NPF the page fault address will contain C-bit. We must clear the C-bit before handling the fault. Signed-off-by: Brijesh Singh --- arch/x86/kvm/svm.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/kvm/svm.c

Re: [PATCH v1 13/13] xen: introduce a Kconfig option to enable the pvcalls frontend

2017-07-24 Thread Juergen Gross
On 22/07/17 02:12, Stefano Stabellini wrote: > Also add pvcalls-front to the Makefile. > > Signed-off-by: Stefano Stabellini > CC: boris.ostrov...@oracle.com > CC: jgr...@suse.com > --- > drivers/xen/Kconfig | 9 + > drivers/xen/Makefile | 1 + > 2 files changed,

[PATCH 01/14] amdgpu: powerplay: Remove unused function

2017-07-24 Thread Ricardo Ribalda Delgado
amd_powerplay_display_configuration_change is never called. Signed-off-by: Ricardo Ribalda Delgado --- drivers/gpu/drm/amd/powerplay/amd_powerplay.c | 21 - drivers/gpu/drm/amd/powerplay/inc/amd_powerplay.h | 3 --- 2 files changed, 24

[PATCH 14/14] amdgpu: powerplay: Remove unused structure

2017-07-24 Thread Ricardo Ribalda Delgado
Remove unused structure definition amd_pp_display_configuration. Signed-off-by: Ricardo Ribalda Delgado --- drivers/gpu/drm/amd/powerplay/inc/amd_powerplay.h | 40 --- 1 file changed, 40 deletions(-) diff --git

[PATCH 03/14] amdgpu: powerplay: cz_hwmgr: Fix invalid error message.

2017-07-24 Thread Ricardo Ribalda Delgado
display_config is never set, therefore we can assume it is zero. Without this fix, the user will get the following invalid warning on its dmesg: amdgpu: [powerplay] min_core_set_clock not set. Signed-off-by: Ricardo Ribalda Delgado ---

[PATCH 02/14] amdgpu: powerplay: Remove unused function

2017-07-24 Thread Ricardo Ribalda Delgado
phm_store_dal_configuration_data is not used anymore. Remove also reference on comments to the function Signed-off-by: Ricardo Ribalda Delgado --- .../gpu/drm/amd/powerplay/eventmgr/eventtasks.c| 1 - .../gpu/drm/amd/powerplay/hwmgr/hardwaremanager.c | 25

Re: [PATCH 01/14] amdgpu: powerplay: Remove unused function

2017-07-24 Thread Harry Wentland
On 2017-07-24 09:35 AM, Ricardo Ribalda Delgado wrote: > amd_powerplay_display_configuration_change is never called. > > Signed-off-by: Ricardo Ribalda Delgado > --- > drivers/gpu/drm/amd/powerplay/amd_powerplay.c | 21 - >

[PATCH v3 07/10] ARM: dts: sun8i: a83t: Add MMC controller device nodes

2017-07-24 Thread Chen-Yu Tsai
The A83T has 3 MMC controllers. The third one is a bit special, as it supports a wider 8-bit bus, and a "new timing mode". Signed-off-by: Chen-Yu Tsai --- arch/arm/boot/dts/sun8i-a83t.dtsi | 59 +++ 1 file changed, 59 insertions(+) diff --git

Re: KASAN vs. boot-time switching between 4- and 5-level paging

2017-07-24 Thread Andrey Ryabinin
On 07/24/2017 03:13 PM, Kirill A. Shutemov wrote: > On Thu, Jul 13, 2017 at 05:19:22PM +0300, Andrey Ryabinin wrote: https://git.kernel.org/pub/scm/linux/kernel/git/kas/linux.git/commit/?h=la57/boot-switching/v2=13327fec85ffe95d9c8a3f57ba174bf5d5c1fb01 > As for KASAN, I think it

[PATCH 1/4] gpio: tegra: Remove unnecessary check

2017-07-24 Thread Thierry Reding
From: Thierry Reding of_device_get_match_data() can never return NULL, therefore the check for NULL values is unnecessary. Signed-off-by: Thierry Reding --- drivers/gpio/gpio-tegra.c | 11 ++- 1 file changed, 2 insertions(+), 9 deletions(-)

[PATCH 3/4] gpio: tegra: Fix checkpatch warnings

2017-07-24 Thread Thierry Reding
From: Thierry Reding Fix a couple of checkpatch warnings, such as complaints about bare unsigned being used (instead of unsigned int) and missing blank lines after declarations. Signed-off-by: Thierry Reding --- drivers/gpio/gpio-tegra.c | 32

[PATCH 2/4] gpio: tegra: Prefer kcalloc() over kzalloc() with multiplies

2017-07-24 Thread Thierry Reding
From: Thierry Reding Rather than manually compute the size of an array, pass the number and element size to kcalloc(). Signed-off-by: Thierry Reding --- drivers/gpio/gpio-tegra.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git

Re: [PATCH 3/3] iio: adc: stm32: add optional min-sample-time

2017-07-24 Thread Jonathan Cameron
On Mon, 24 Jul 2017 10:16:00 +0200 Fabrice Gasnier wrote: > On 07/23/2017 01:00 PM, Jonathan Cameron wrote: > > On Tue, 18 Jul 2017 14:35:32 +0200 > > Fabrice Gasnier wrote: > > > >> STM32 ADC allows each channel to be sampled with a different

Re: [PATCH v4 1/5] mm: add mkwrite param to vm_insert_mixed()

2017-07-24 Thread Ross Zwisler
On Mon, Jul 24, 2017 at 01:25:30PM +0200, Jan Kara wrote: > > @@ -1658,14 +1658,28 @@ static int insert_pfn(struct vm_area_struct *vma, > > unsigned long addr, > > if (!pte) > > goto out; > > retval = -EBUSY; > > - if (!pte_none(*pte)) > > - goto out_unlock; > > +

Re: [PATCH] gpio: mvebu: Fix cause computation in irq handler

2017-07-24 Thread Gregory CLEMENT
Hi Linus, On mer., juil. 12 2017, Gregory CLEMENT wrote: > When switching to regmap, the way to compute the irq cause was > reorganized. However while doing it, a typo was introduced: a 'xor' > replaced a 'and'. > > This lead to wrong behavior in the

Re: [PATCH] power: supply: constify attribute_group structures.

2017-07-24 Thread Sebastian Reichel
Hi, On Wed, Jul 12, 2017 at 05:13:22PM +0530, Arvind Yadav wrote: > attribute_groups are not supposed to change at runtime. All functions > working with attribute_groups provided by work > with const attribute_group. So mark the non-const structs as const. > > File size before: >text

Re: [PATCH v2] gpio-exar: Use correct property prefix and document bindings

2017-07-24 Thread Rob Herring
On Wed, Jul 19, 2017 at 07:31:14AM +0200, Jan Kiszka wrote: > The device-specific property should be prefixed with the vendor name, > not "linux,", as Linus Walleij pointed out. Change this and document the > bindings of this platform device. > > We didn't ship the old binding in a release yet.

Re: [PATCH v1 01/13] xen/pvcalls: introduce the pvcalls xenbus frontend

2017-07-24 Thread Juergen Gross
On 22/07/17 02:11, Stefano Stabellini wrote: > Introduce a xenbus frontend for the pvcalls protocol, as defined by > https://xenbits.xen.org/docs/unstable/misc/pvcalls.html. > > This patch only adds the stubs, the code will be added by the following > patches. > > Signed-off-by: Stefano

Re: [PATCH 3/5] iommu/arm-smmu-v3: add IOMMU_CAP_BYPASS to the ARM SMMUv3 driver

2017-07-24 Thread Alex Williamson
On Mon, 24 Jul 2017 18:23:20 +0100 Robin Murphy wrote: > On 24/07/17 18:16, Alex Williamson wrote: > > On Thu, 20 Jul 2017 12:17:12 +0100 > > Robin Murphy wrote: > > > >> On 20/07/17 10:10, Will Deacon wrote: > >>> On Thu, Jul 20, 2017 at

Re: [PATCH] perf, tools: Make build fail on JSON parse error

2017-07-24 Thread Sukadev Bhattiprolu
Andi Kleen [a...@firstfloor.org] wrote: > On Mon, Jul 24, 2017 at 02:42:09PM -0300, Arnaldo Carvalho de Melo wrote: > > Em Mon, Jul 24, 2017 at 04:16:49PM +0200, Jiri Olsa escreveu: > > > On Fri, Jul 21, 2017 at 05:31:59PM -0700, Sukadev Bhattiprolu wrote: > > > > Andi Kleen [a...@firstfloor.org]

[RFC Part1 PATCH v3 00/17] x86: Secure Encrypted Virtualization (AMD)

2017-07-24 Thread Brijesh Singh
This part of Secure Encrypted Virtualization (SEV) series focuses on the changes required in a guest OS for SEV support. When SEV is active, the memory content of guest OS will be transparently encrypted with a key unique to the guest VM. SEV guests have concept of private and shared memory.

[RFC Part1 PATCH v3 01/17] Documentation/x86: Add AMD Secure Encrypted Virtualization (SEV) descrption

2017-07-24 Thread Brijesh Singh
Update amd-memory-encryption document describing the AMD Secure Encrypted Virtualization (SEV) feature. Signed-off-by: Brijesh Singh --- Documentation/x86/amd-memory-encryption.txt | 29 ++--- 1 file changed, 26 insertions(+), 3 deletions(-) diff

[RFC Part1 PATCH v3 03/17] x86/mm: Secure Encrypted Virtualization (SEV) support

2017-07-24 Thread Brijesh Singh
From: Tom Lendacky Provide support for Secure Encyrpted Virtualization (SEV). This initial support defines a flag that is used by the kernel to determine if it is running with SEV active. Signed-off-by: Tom Lendacky Signed-off-by: Brijesh Singh

[RFC 0/5] Open source FPGA image header

2017-07-24 Thread Alan Tull
This patch set adds open source FPGA image headers. This allows FPGA FPGA image specific information to be added to the images themselves. The header format is a simplified form of u-boot FIT images and can be expanded as real use cases are raised. As all the FPGA kernel frameworks are intended

[RFC 1/5] doc: fpga: add document for the fdt FPGA header

2017-07-24 Thread Alan Tull
Add a document for the open source fdt FPGA header. Signed-off-by: Alan Tull --- Documentation/fpga/fpga-header.txt | 103 + 1 file changed, 103 insertions(+) create mode 100644 Documentation/fpga/fpga-header.txt diff --git

Re: [PATCH v1 08/13] xen/pvcalls: implement sendmsg

2017-07-24 Thread Juergen Gross
On 22/07/17 02:11, Stefano Stabellini wrote: > Send data to an active socket by copying data to the "out" ring. Take > the active socket out_mutex so that only one function can access the > ring at any given time. > > If not enough room is available on the ring, rather than returning >

Re: [PATCH v3 1/2] platform: Add driver for RAVE Supervisory Processor

2017-07-24 Thread Andrey Smirnov
On Mon, Jul 24, 2017 at 10:25 AM, Andy Shevchenko wrote: > On Mon, Jul 24, 2017 at 6:09 PM, Andrey Smirnov > wrote: >> Add a driver for RAVE Supervisory Processor, an MCU implementing >> varoius bits of housekeeping functionality (watchdoging,

Re: [PATCH v5 6/7] dt-bindings: display: rockchip: fill Documents for vop series

2017-07-24 Thread Rob Herring
On Thu, Jul 20, 2017 at 10:43:53AM +0800, Mark Yao wrote: > Signed-off-by: Mark Yao > --- > Changes in v5: > - clean document commit title > - move changes description out of docummit commit msg > > Changes in v2: > - rename rk322x to rk3228 > - correct some vop

[RFC Part2 PATCH v3 02/26] crypto: ccp: Add Platform Security Processor (PSP) device support

2017-07-24 Thread Brijesh Singh
Platform Security Processor (PSP) is part of AMD Secure Processor (AMD-SP), PSP is a dedicated processor that provides the support for key management commands in a Secure Encrypted Virtualiztion (SEV) mode, along with software-based Tursted Executation Environment (TEE) to enable the third-party

[RFC Part2 PATCH v3 01/26] Documentation/virtual/kvm: Add AMD Secure Encrypted Virtualization (SEV)

2017-07-24 Thread Brijesh Singh
Create a Documentation entry to describe the AMD Secure Encrypted Virtualization (SEV) feature. Signed-off-by: Brijesh Singh --- .../virtual/kvm/amd-memory-encryption.txt | 328 + 1 file changed, 328 insertions(+) create mode 100644

[RFC Part2 PATCH v3 19/26] KVM: svm: Add support for SEV GUEST_STATUS command

2017-07-24 Thread Brijesh Singh
The command is used for querying the SEV guest status. Signed-off-by: Brijesh Singh --- arch/x86/kvm/svm.c | 38 ++ 1 file changed, 38 insertions(+) diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index 7a77197..21f85e1 100644 ---

[RFC Part2 PATCH v3 18/26] KVM: SVM: Add support for SEV LAUNCH_FINISH command

2017-07-24 Thread Brijesh Singh
The command is used for finializing the SEV guest launch process. Signed-off-by: Brijesh Singh --- arch/x86/kvm/svm.c | 23 +++ 1 file changed, 23 insertions(+) diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index 9b672eb..7a77197 100644 ---

[RFC Part2 PATCH v3 17/26] KVM: SVM: Add support for SEV LAUNCH_MEASURE command

2017-07-24 Thread Brijesh Singh
The command is used to retrieve the measurement of memory encrypted through the LAUNCH_UPDATE_DATA command. This measurement can be used for attestation purposes. Signed-off-by: Brijesh Singh --- arch/x86/kvm/svm.c | 52

Re: [PATCH 07/10] percpu: fix misnomer in schunk/dchunk variable names

2017-07-24 Thread Dennis Zhou
Hi Tejun, On Mon, Jul 17, 2017 at 03:10:09PM -0400, Tejun Heo wrote: > > /* > > +* Initialize first chunk. > > +* pcpu_first_chunk will always manage the dynamic region of the > > +* first chunk. The static region is dropped as those addresses > > Would "not covered by any

[PATCH] ext4: backward compatibility support for Lustre ea_inode implementation

2017-07-24 Thread Tahsin Erdogan
Original Lustre ea_inode feature did not have ref counts on xattr inodes because there was always one parent that referenced it. New implementation expects ref count to be initialized which is not true for Lustre case. Handle this by detecting Lustre created xattr inode and set its ref count to 1.

Re: [PATCH 08/10] percpu: change the number of pages marked in the first_chunk bitmaps

2017-07-24 Thread Dennis Zhou
On Mon, Jul 17, 2017 at 03:26:02PM -0400, Tejun Heo wrote: > > This patch changes the allocator to only mark allocated pages for the > > region the population bitmap is used for. Prior, the bitmap was marked > > completely used as the first chunk was allocated and immutable. This is > > misleading

Re: [PATCH v1 12/13] xen/pvcalls: implement frontend disconnect

2017-07-24 Thread Juergen Gross
On 22/07/17 02:12, Stefano Stabellini wrote: > Implement pvcalls frontend removal function. Go through the list of > active and passive sockets and free them all, one at a time. > > Signed-off-by: Stefano Stabellini > CC: boris.ostrov...@oracle.com > CC: jgr...@suse.com

Re: [PATCH v7 3/3] perf: cavium: Add Documentation

2017-07-24 Thread Jonathan Cameron
On Wed, 19 Jul 2017 14:08:47 +0200 Jan Glauber wrote: > Document Cavium SoC PMUs. > > Signed-off-by: Jan Glauber And just to finish - the utterly trivial ;) > --- > Documentation/perf/cavium-pmu.txt | 74 > +++ > 1

[PATCH] of: return of_get_cpu_node from of_cpu_device_node_get if CPUs are not registered

2017-07-24 Thread Sudeep Holla
Instead of the callsites choosing between of_cpu_device_node_get if the CPUs are registered as of_node is populated by then and of_get_cpu_node when the CPUs are not yet registered as CPU of_nodes are not yet stashed thereby needing to parse the device tree, we can call of_get_cpu_node in case the

Re: [PATCH v2 1/1] KVM: make pid available for uevents without debugfs

2017-07-24 Thread Paolo Bonzini
On 24/07/2017 13:40, Claudio Imbrenda wrote: > Simplify and improve the code so that the PID is always available in > the uevent even when debugfs is not available. > > This adds a userspace_pid field to struct kvm, as per Radim's > suggestion, so that the PID can be retrieved on destruction too.

Re: [RFC/RFT PATCH] KVM: nVMX: fixes to nested virt interrupt injection

2017-07-24 Thread Wanpeng Li
2017-07-24 22:20 GMT+08:00 Paolo Bonzini : > There are three issues in nested_vmx_check_exception: > > 1) it is not taking PFEC_MATCH/PFEC_MASK into account, as reported > by Wanpeng Li; > > 2) it should rebuild the interruption info and exit qualification fields > from

Re: [PATCH v7 2/3] PCI: Enable PCIe Relaxed Ordering if supported

2017-07-24 Thread Alex Williamson
On Sat, 22 Jul 2017 12:19:38 +0800 Ding Tianhong wrote: > Hi Sinan, Bjorn: > > On 2017/7/14 21:54, Sinan Kaya wrote: > > On 7/13/2017 9:26 PM, Ding Tianhong wrote: > >> There is no code to enable the PCIe Relaxed Ordering bit in the > >> configuration space, > >> it

Re: [PATCH] MAINTAINERS: Remove dead greybus/timesync entry

2017-07-24 Thread Bryan O'Donoghue
On 24/07/17 16:16, Joe Perches wrote: On Mon, 2017-07-24 at 16:19 +0100, Bryan O'Donoghue wrote: On 24/07/17 12:27, Johan Hovold wrote: On Mon, Jul 24, 2017 at 11:05:49AM +0100, Bryan O'Donoghue wrote: commit bdfb95c4baab ("staging: greybus: remove timesync protocol support") commit

Re: [PATCH V2 2/2] pinctrl: qcom: spmi-gpio: Add dtest route for digital input

2017-07-24 Thread Rob Herring
On Wed, Jul 19, 2017 at 02:30:46PM +0800, fengl...@codeaurora.org wrote: > From: Fenglin Wu > > Add property "qcom,dtest-buffer" to specify which dtest rail to feed > when the pin is configured as a digital input. > > Signed-off-by: Fenglin Wu

Re: [PATCH V3 2/9] cpufreq: Use transition_delay_us for legacy governors as well

2017-07-24 Thread Peter Zijlstra
On Wed, Jul 19, 2017 at 03:42:42PM +0530, Viresh Kumar wrote: > The policy->transition_delay_us field is used only by the schedutil > governor currently, and this field describes how fast the driver wants > the cpufreq governor to change CPUs frequency. It should rather be a > common thing across

Re: [PATCH 23/32] tracing: Add 'onmatch' hist trigger action support

2017-07-24 Thread Tom Zanussi
Hi Namhyung, On Mon, 2017-07-24 at 00:12 +0900, Namhyung Kim wrote: > On Mon, Jun 26, 2017 at 05:49:24PM -0500, Tom Zanussi wrote: > > Add an 'onmatch(matching.event).(param list)' > > hist trigger action which is invoked with the set of variables or > > event fields named in the 'param list'.

[RFC Part1 PATCH v3 05/17] x86, realmode: Don't decrypt trampoline area under SEV

2017-07-24 Thread Brijesh Singh
From: Tom Lendacky When SEV is active the trampoline area will need to be in encrypted memory so only mark the area decrypted if SME is active. Signed-off-by: Tom Lendacky Signed-off-by: Brijesh Singh ---

[RFC Part1 PATCH v3 06/17] x86/mm: Use encrypted access of boot related data with SEV

2017-07-24 Thread Brijesh Singh
From: Tom Lendacky When Secure Encrypted Virtualization (SEV) is active, boot data (such as EFI related data, setup data) is encrypted and needs to be accessed as such when mapped. Update the architecture override in early_memremap to keep the encryption attribute when

[RFC Part1 PATCH v3 07/17] x86/mm: Include SEV for encryption memory attribute changes

2017-07-24 Thread Brijesh Singh
From: Tom Lendacky The current code checks only for sme_active() when determining whether to perform the encryption attribute change. Include sev_active() in this check so that memory attribute changes can occur under SME and SEV. Signed-off-by: Tom Lendacky

[RFC Part1 PATCH v3 12/17] x86/mm: DMA support for SEV memory encryption

2017-07-24 Thread Brijesh Singh
From: Tom Lendacky DMA access to memory mapped as encrypted while SEV is active can not be encrypted during device write or decrypted during device read. In order for DMA to properly work when SEV is active, the SWIOTLB bounce buffers must be used. Signed-off-by: Tom

[GIT PULL 1/5] ARM: s3c24xx: Early stuff for v4.14

2017-07-24 Thread Krzysztof Kozlowski
The following changes since commit 5771a8c08880cdca3bfb4a3fc6d309d6bba20877: Linux v4.13-rc1 (2017-07-15 15:22:10 -0700) are available in the git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/krzk/linux.git tags/samsung-soc-4.14 for you to fetch changes up to

[RFC Part1 PATCH v3 09/17] resource: Consolidate resource walking code

2017-07-24 Thread Brijesh Singh
From: Tom Lendacky The walk_iomem_res_desc(), walk_system_ram_res() and walk_system_ram_range() functions each have much of the same code. Create a new function that consolidates the common code from these functions in one place to reduce the amount of duplicated code.

[GIT PULL 2/5] ARM: dts: exynos: Updates for v4.14

2017-07-24 Thread Krzysztof Kozlowski
The following changes since commit 5771a8c08880cdca3bfb4a3fc6d309d6bba20877: Linux v4.13-rc1 (2017-07-15 15:22:10 -0700) are available in the git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/krzk/linux.git tags/samsung-dt-4.14 for you to fetch changes up to

[RFC Part1 PATCH v3 10/17] resource: Provide resource struct in resource walk callback

2017-07-24 Thread Brijesh Singh
From: Tom Lendacky In prep for a new function that will need additional resource information during the resource walk, update the resource walk callback to pass the resource structure. Since the current callback start and end arguments are pulled from the resource

[RFC Part1 PATCH v3 11/17] x86/mm, resource: Use PAGE_KERNEL protection for ioremap of memory pages

2017-07-24 Thread Brijesh Singh
From: Tom Lendacky In order for memory pages to be properly mapped when SEV is active, we need to use the PAGE_KERNEL protection attribute as the base protection. This will insure that memory mapping of, e.g. ACPI tables, receives the proper mapping attributes.

Re: Simplfying copy_siginfo_to_user

2017-07-24 Thread Eric W. Biederman
Linus Torvalds writes: > On Sat, Jul 22, 2017 at 1:25 PM, Eric W. Biederman > wrote: >> I played with some clever changes such as limiting the copy to 48 bytes, >> disabling the memset and the like but I could not get a strong enough >>

[RFC Part1 PATCH v3 17/17] X86/KVM: Clear encryption attribute when SEV is active

2017-07-24 Thread Brijesh Singh
The guest physical memory area holding the struct pvclock_wall_clock and struct pvclock_vcpu_time_info are shared with the hypervisor. Hypervisor periodically updates the contents of the memory. When SEV is active, we must clear the encryption attributes from the shared memory pages so that both

Re: [PATCH v2 06/25] dt-bindings: qcom_nandc: remove chip select compatible string

2017-07-24 Thread Rob Herring
On Wed, Jul 19, 2017 at 05:17:54PM +0530, Abhishek Sahu wrote: > Currently the compatible “qcom,nandcs” is being used for each > connected NAND device to support for multiple NAND devices in the > same bus. The same thing can be achieved by looking reg property > for each sub nodes which contains

Re: [PATCH v2 04/25] dt-bindings: qcom_nandc: change compatible string for EBI2 NANDC

2017-07-24 Thread Rob Herring
On Wed, Jul 19, 2017 at 05:17:52PM +0530, Abhishek Sahu wrote: > The current compatible string “qcom,ipq806x-nand" implies that > the driver is specific to IPQ806x. This driver can be used by > any chip which uses EBI2 NAND controller so changed the > compatible string to “qcom,ebi2-nandc” to give

Re: [GIT PULL] MFD for v4.13

2017-07-24 Thread Pavel Machek
Hi! > > > > include/linux/mfd/madera/registers.h | 8832 > > > > > > > > > > So I've pulled everything but this, because honestly, that file looks > > > like utter garbage. > > > > > > Why are there all those _hundreds_ of odd defines for > > > > > >

Re: [PATCH v4 2/5] dt-bindings: pwm-backlight: add PWM delay proprieties.

2017-07-24 Thread Pavel Machek
On Mon 2017-07-24 16:21:44, Daniel Thompson wrote: > On 21/07/17 11:48, Enric Balletbo i Serra wrote: > >Hardware needs a delay between setting an initial (non-zero) PWM and > >enabling the backlight using GPIO. The post-pwm-on-delay-ms specifies > >this delay in milli seconds. Hardware also needs

Re: [PATCH V2 2/9] dt-bindings: usb: bdc: Add Device Tree binding for Broadcom UDC driver

2017-07-24 Thread Rob Herring
On Wed, Jul 19, 2017 at 03:11:41PM -0400, Al Cooper wrote: > Add Device Tree binding document for Broadcom USB Device > Controller (BDC). > > Signed-off-by: Al Cooper > --- > Documentation/devicetree/bindings/usb/brcm,bdc.txt | 29 > ++ > 1 file

Re: [PATCH v1 05/13] xen/pvcalls: implement bind command

2017-07-24 Thread Juergen Gross
On 22/07/17 02:11, Stefano Stabellini wrote: > Send PVCALLS_BIND to the backend. Introduce a new structure, part of > struct sock_mapping, to store information specific to passive sockets. > > Introduce a status field to keep track of the status of the passive > socket. > > Introduce a waitqueue

Re: [PATCH v1 06/13] xen/pvcalls: implement listen command

2017-07-24 Thread Juergen Gross
On 22/07/17 02:11, Stefano Stabellini wrote: > Send PVCALLS_LISTEN to the backend. > > Signed-off-by: Stefano Stabellini > CC: boris.ostrov...@oracle.com > CC: jgr...@suse.com > --- > drivers/xen/pvcalls-front.c | 49 > + >

Re: [PATCH] HID: rmi: Make sure the HID device is opened on resume

2017-07-24 Thread Lyude Paul
Yeah I noticed that, sorry if my response wasn't very clear! Should probably wait to have my morning coffee before responding to these messages :P On Mon, 2017-07-24 at 21:28 +0200, Jiri Kosina wrote: > On Mon, 24 Jul 2017, Lyude Paul wrote: > > > > > So, call hid_hw_open() in rmi_post_resume()

[RFC 5/5] fpga-region support for fdt headers on fpga images

2017-07-24 Thread Alan Tull
Support a FDT header for FPGA images. Header format is a simplified FIT containing at most one FPGA image and one DT overlay. The FPGA image section includes FPGA image info properties needed for programming. If present, the DT overlay image is applied after the FPGA is programmed. Both images

[RFC 4/5] fpga-region: new function fpga_region_free

2017-07-24 Thread Alan Tull
Add FPGA region API function fpga_region_free() that undoes some of what fpga_region_program_fpga() does to free up a region to be reprogrammed. Signed-off-by: Alan Tull --- drivers/fpga/fpga-region.c | 20 drivers/fpga/of-fpga-region.c| 5 +

[RFC 3/5] fpga: add dev to fpga_image_info

2017-07-24 Thread Alan Tull
This patch should be rolled into the next version of my "non-dt support for FPGA regions" patchset. Add a pointer to the device that owns the fpga_image_info to fpga_image_info. That way the fpga_image_info_free can drop the 'dev' parameter and we are left with: struct fpga_image_info

[RFC 2/5] doc: fpga: add sysfs document for fpga region

2017-07-24 Thread Alan Tull
Document the firmware_name attribute added for each region. Signed-off-by: Alan Tull --- Documentation/ABI/testing/sysfs-class-fpga-region | 7 +++ 1 file changed, 7 insertions(+) create mode 100644 Documentation/ABI/testing/sysfs-class-fpga-region diff --git

Re: [PATCH 1/4] ARM: mediatek: dts: Cleanup bindings documentation

2017-07-24 Thread Rob Herring
On Thu, Jul 20, 2017 at 12:22:44PM +0200, Matthias Brugger wrote: > From: Matthias Brugger > > This patch cleans up the binding documentation stating explicitly > the binding and it's fallback for every SoC. > > Signed-off-by: Matthias Brugger > --- >

[PATCH] sched/core: Fix some documentation build warnings

2017-07-24 Thread Jonathan Corbet
The kerneldoc comments for try_to_wake_up_local() were out of date, leading to these documentation build warnings: ./kernel/sched/core.c:2080: warning: No description found for parameter 'rf' ./kernel/sched/core.c:2080: warning: Excess function parameter 'cookie' description in

Re: [PATCH 2/4] ARM: mediatek: dts: Add mt6796 binding

2017-07-24 Thread Rob Herring
On Thu, Jul 20, 2017 at 12:22:45PM +0200, Matthias Brugger wrote: > From: Matthias Brugger > > This patch adds the binding for the MT6797 SoC. > > Signed-off-by: Matthias Brugger > --- > Documentation/devicetree/bindings/watchdog/mtk-wdt.txt | 1 + >

v4.13-rc2: usb mouse stopped working?

2017-07-24 Thread Pavel Machek
Hi! On thinkpad x220, USB mouse stopped working in v4.13-rc2. v4.12 was ok, iirc. Now, USB mouse is so common hw that I may have something wrong in my config...? But I did not change anything there. In v4.9: [ 87.064408] input: Logitech USB Optical Mouse as

[RFC Part2 PATCH v3 07/26] KVM: SVM: Add SEV feature definitions to KVM

2017-07-24 Thread Brijesh Singh
From: Tom Lendacky Define the SEV enable bit for the VMCB control structure. The hypervisor will use this bit to enable SEV in the guest. Signed-off-by: Tom Lendacky Signed-off-by: Brijesh Singh ---

[RFC Part2 PATCH v3 09/26] KVM: Introduce KVM_MEMORY_ENCRYPT_OP ioctl

2017-07-24 Thread Brijesh Singh
If hardware supports encrypting then KVM_MEMORY_ENCRYPT_OP ioctl can be used by qemu to issue platform specific memory encryption commands. Signed-off-by: Brijesh Singh Reviewed-by: Paolo Bonzini --- arch/x86/include/asm/kvm_host.h | 2 ++

[RFC Part2 PATCH v3 08/26] KVM: X86: Extend CPUID range to include new leaf

2017-07-24 Thread Brijesh Singh
This CPUID provides the memory encryption support information on AMD Platform. The complete description for CPUID leaf is available in APM volume 2, Section 15.34 Signed-off-by: Brijesh Singh --- arch/x86/kvm/cpuid.c | 2 +- arch/x86/kvm/svm.c | 6 ++ 2 files

[RFC Part2 PATCH v3 14/26] KVM: SVM: VMRUN should use assosiated ASID when SEV is enabled

2017-07-24 Thread Brijesh Singh
SEV hardware uses ASIDs to associate memory encryption key with the guest VMs. During the guest creation time, we use SEV_CMD_ACTIVATE command to bind a particular ASID to the guest. Lets make sure that VMCB is programmed with the binded ASID before a VMRUN. Signed-off-by: Brijesh Singh

[RFC Part2 PATCH v3 15/26] KVM: SVM: Add support for SEV LAUNCH_START command

2017-07-24 Thread Brijesh Singh
The command is used to bootstrap SEV guest from unencrypted boot images. The command creates a new VM encryption key (VEK) using the guest owner's policy, public DH certificates, and session information. Signed-off-by: Brijesh Singh --- arch/x86/kvm/svm.c | 165

Re: v4.13-rc2: usb mouse stopped working?

2017-07-24 Thread Jiri Kosina
On Mon, 24 Jul 2017, Pavel Machek wrote: > On thinkpad x220, USB mouse stopped working in v4.13-rc2. v4.12 was > ok, iirc. > > Now, USB mouse is so common hw that I may have something wrong in my > config...? But I did not change anything there. Well, your particular USB mouse requires an

[RFC Part2 PATCH v3 13/26] KVM: SVM: Add KVM_SEV_INIT command

2017-07-24 Thread Brijesh Singh
The command initializes the SEV firmware and allocate a new ASID for this guest from SEV ASID pool. The firmware must be initialized before we issue guest launch command to create a new encryption context. Signed-off-by: Brijesh Singh --- arch/x86/kvm/svm.c | 188

[RFC Part2 PATCH v3 16/26] KVM: SVM: Add support for SEV LAUNCH_UPDATE_DATA command

2017-07-24 Thread Brijesh Singh
The command is used for encrypting the guest memory region using the VM encryption key (VEK) created during LAUNCH_START. Signed-off-by: Brijesh Singh --- arch/x86/kvm/svm.c | 165 + 1 file changed, 165 insertions(+)

[RFC Part2 PATCH v3 11/26] KVM: X86: Extend struct kvm_arch to include SEV information

2017-07-24 Thread Brijesh Singh
The patch adds a new member (sev_info) in 'struct kvm_arch', and setter/getter functions for the sev_info field. Signed-off-by: Brijesh Singh --- arch/x86/include/asm/kvm_host.h | 9 + arch/x86/kvm/svm.c | 45 +

[RFC Part2 PATCH v3 21/26] KVM: SVM: Add support for SEV DEBUG_ENCRYPT command

2017-07-24 Thread Brijesh Singh
The command copies a plain text into guest memory and encrypts it using the VM encryption key. The command will be used for debug purposes (e.g setting breakpoint through gdbserver) Signed-off-by: Brijesh Singh --- arch/x86/kvm/svm.c | 174

Re: [PATCH v1 10/13] xen/pvcalls: implement poll command

2017-07-24 Thread Juergen Gross
On 22/07/17 02:12, Stefano Stabellini wrote: > For active sockets, check the indexes and use the inflight_conn_req > waitqueue to wait. > > For passive sockets, send PVCALLS_POLL to the backend. Use the > inflight_accept_req waitqueue if an accept is outstanding. Otherwise use > the inflight_req

<    1   2   3   4   5   6   7   8   9   10   >