On Wednesday, June 07, 2017 07:39:14 PM Len Brown wrote:
> From: Len Brown
>
> The x86 cpufreq core now uses aperfmperf_khz_on_cpu()
> to supply /sys/.../cpufreq/scaling_cur_freq
> on all x86 systems supporting APERF/MPERF.
>
> That includes 100% of systems supported by intel_pstate,
> and so in
On Fri, Jun 16, 2017 at 06:46:51PM +0200, Luis R. Rodriguez wrote:
Kees, please review 47e0bbb7fa98 below.
Brian, please review be4a1326d12c below.
On Thu, Jun 15, 2017 at 11:26:53PM +0530, Sumit Semwal wrote:
Hello Greg, Shuah,
While testing 4.4.y and 4.9.y LTS kernels with latest kselftest,
Presently, the order of the block devices listed in /proc/devices is not
entirely sequential. If a block device has a major number greater than
BLKDEV_MAJOR_HASH_SIZE (255), it will be ordered as if its major were
module 255. For example, 511 appears after 1.
This patch cleans that up and prints e
On Fri, Jun 16, 2017 at 03:22:45PM +0200, Hans de Goede wrote:
> Hi,
>
> On 16-06-17 14:44, Andy Shevchenko wrote:
> > On Thu, Jun 15, 2017 at 7:53 PM, Darren Hart wrote:
> > > On Thu, Jun 15, 2017 at 08:48:31AM +0200, Hans de Goede wrote:
> >
> > > > + /* Point of View mobii wintab
From: Yi Li
This adds DRIVER_DATA_REQ_NO_CACHE flag with .req flag under struct
driver_data_req_params. When this flag is set, the driver_data driver
will not cache the firmware during PM cycle, which is expensive. It
will be used by streaming case and other drivers which implement
their own cach
From: Yi Li
Set DRIVER_DATA_REQ_NO_CACHE flag to disable driver_data driver caching
mechanism, iwlwifi has its own firmware cache management.
Signed-off-by: Yi Li
---
drivers/net/wireless/intel/iwlwifi/iwl-drv.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/drivers/net/wireless/intel/i
From: Yi Li
Changes in v3:
- Add a platform device to enable PM support in test driver
- Add a debugfs device to enable driver data cache testing
- Fix a logic error so driver_data can be able to cache
- Add two test cases for caching and non-caching
- Rebase to Luis R. Rodriguez's 20
From: Yi Li
Add a platform device to enable PM cache and add cache/no_cache test.
Signed-off-by: Yi Li
---
lib/test_driver_data.c | 97 ++---
tools/testing/selftests/firmware/driver_data.sh | 67 +
2 files changed, 154 insertions(+),
On Sat, Jun 17, 2017 at 06:31:59AM +0800, Guodong Xu wrote:
> Hi, Bjorn
>
> On Sat, Jun 17, 2017 at 5:11 AM, Bjorn Helgaas wrote:
> > On Tue, Jun 06, 2017 at 07:19:53PM +0800, Guodong Xu wrote:
> >> Hi, Arnd
> >>
> >> On Tue, Jun 6, 2017 at 5:23 PM, Arnd Bergmann wrote:
> >> > On Sun, Jun 4, 201
On Fri, 2017-06-16 at 12:15 -0700, Ram Pai wrote:
> gp_regs size is not changed, nor is the layout. A unused field in
> the gp_regs is used to fill in the AMR contents. Old binaries will not
> be knowing about this unused field, and hence should not break.
>
> New binaries can leverage this alread
On Fri, May 26, 2017 at 10:02:25PM +0100, Piotr Gregor wrote:
> The test for INTx masking via config space command performed
> in pci_intx_mask_supported() should be performed before PCI device
> can be used. This is to avoid reading/writing of PCI_COMMAND_INTX_DISABLE
> register which may collide
Hm, it's probably too late to do it here. Planes have already been
enabled and the engine may have started to fetch data and do the
composition. You could do that in ->update_plane() [1], and make it a
per-plane thing.
I'm not sure, but I think you can get the new crtc
On Fri, 2017-06-16 at 19:45 +0200, Frans Klaver wrote:
> The header field in struct pd_message is declared as an __le16 type. The
> data in the message is supposed to be little endian. This means we don't
> have to go and shift the individual bytes into position when we're
> filling the buffer, we
Hi, Bjorn
On Sat, Jun 17, 2017 at 5:11 AM, Bjorn Helgaas wrote:
> On Tue, Jun 06, 2017 at 07:19:53PM +0800, Guodong Xu wrote:
>> Hi, Arnd
>>
>> On Tue, Jun 6, 2017 at 5:23 PM, Arnd Bergmann wrote:
>> > On Sun, Jun 4, 2017 at 2:03 AM, kbuild test robot wrote:
>> >> Hi Xiaowei,
>> >>
>> >> [auto
On 2017-06-16 23:12, Peter Rosin wrote:
> On 2017-06-16 18:15, Boris Brezillon wrote:
>> To be very clear, I'd like you to test it through DRM ioctls, not only
>> through the fbdev emulation layer.
>
> ...so yeah, right, I couldn't agree more. Any pointers to code w/o a bunch
> of complex library
On Fri, Jun 16, 2017 at 9:45 PM, Bjorn Helgaas wrote:
> On Thu, May 25, 2017 at 04:49:07PM +0800, Chen Yu wrote:
>> Currently we saw a lot of "No irq handler" errors during hibernation,
>> which caused the system hang finally:
>>
>> [ 710.141581] ata4.00: qc timeout (cmd 0xec)
>> [ 710.147135] a
On 06/14/2017 11:05 PM, Serge E. Hallyn wrote:
On Wed, Jun 14, 2017 at 08:27:40AM -0400, Stefan Berger wrote:
On 06/13/2017 07:55 PM, Serge E. Hallyn wrote:
Quoting Stefan Berger (stef...@linux.vnet.ibm.com):
If all extended
attributes were to support this model, maybe the 'uid' could be
ass
On 06/08/2017 05:09 AM, Jason A. Donenfeld wrote:
> On Thu, Jun 8, 2017 at 4:43 AM, Theodore Ts'o wrote:
>> What was the testing that was done for commit? It looks safe, but I'm
>> unfamiliar enough with how the iSCSI authentication works that I'd
>> prefer getting an ack'ed by from the iSCSI mai
On Fri, Jun 16, 2017 at 8:51 AM, Bu Tao wrote:
> add ufs node document for hi3660
>
> Signed-off-by: Bu Tao
> ---
> .../devicetree/bindings/ufs/hi3660-ufs.txt | 58
> ++
> 1 file changed, 58 insertions(+)
> create mode 100644 Documentation/devicetree/bindings/ufs/hi
On Friday 2017-06-16 15:57, Eric W. Biederman wrote:
| I don't believe this is a kernel change.
|
| I dug up an old VM and I was able to reproduce this issue simply
| by installing autofs, and your auto.master and auto.net files.
|
| # uname -a
| Linux ubuntu-16 4.4.0-24-generic #43-Ubuntu SMP We
From: Brian Norris
This commit adds support for the Broadcom STB S2/S3/S5 suspend states on
ARM based SoCs.
This requires quite a lot of code in order to deal with the different HW
blocks that need to be quiesced during suspend:
- DDR PHY SHIM
- DDR memory controller and sequencer
- control pro
On 06/16/2017 03:19 AM, sayli karnik wrote:
> Correct function parameter in kernel-doc comment to fix following
> warnings in the sphinx build:
>
> .//drivers/net/phy/phy.c:259: warning: No description found for
> parameter 'features'
> .//drivers/net/phy/phy.c:259: warning: Excess function parame
Hi,
This patch series adds support for S2/S3/S5 suspend/resume states on
ARM and MIPS based Broadcom STB SoCs.
This was submitted a long time ago by Brian, and I am now picking this
up and trying to get this included with support for our latest chips.
Provided that I can collect the necessary Ac
Update the Broadcom STB binding document with new compatible strings for
the DDR PHY and memory controller found on newer chips.
Signed-off-by: Florian Fainelli
---
Documentation/devicetree/bindings/arm/bcm/brcm,brcmstb.txt | 6 +-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a
From: Justin Chen
This commit adds support for the Broadcom STB S2/S3/S5 suspend
states on MIPS based SoCs.
This requires quite a lot of code in order to deal with the
different HW blocks that need to be quiesced during suspend:
- DDR PHY
- DDR memory controller and arbiter
- control processor
Document the different nodes required for supporting S2/S3/S5 suspend
states on MIPS-based Broadcom STB SoCs.
Signed-off-by: Florian Fainelli
---
.../devicetree/bindings/mips/brcm/soc.txt | 77 ++
1 file changed, 77 insertions(+)
diff --git a/Documentation/devicetre
Add the necessary pluming to select and build CONFIG_BRCMSTB_PM.
Functional code is not added yet.
Signed-off-by: Florian Fainelli
---
drivers/soc/bcm/Kconfig | 2 ++
drivers/soc/bcm/brcmstb/Kconfig | 8
drivers/soc/bcm/brcmstb/Makefile | 1 +
3 files changed, 11 insertions(+)
Hi all,
This patch series makes ARM's fncpy() implementation more generic (dropping the
Thumb-specifics) and available in an asm-generic header file.
Tested on a Broadcom ARM64 STB platform with code that is written to SRAM.
Changes in v2:
- leave the ARM implementation where it is
- make the ge
Define a generic fncpy() implementation largely based on the ARM version
that requires an 8 bytes alignment for the destination address where to
copy this function as well as the function's own address.
Signed-off-by: Florian Fainelli
---
include/asm-generic/fncpy.h | 93
Now that ARM64 also has a fncpy() implementation, allow selection
SRAM_EXEC for ARM64 as well.
Signed-off-by: Florian Fainelli
---
drivers/misc/Kconfig | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/misc/Kconfig b/drivers/misc/Kconfig
index 07bbd4cc1852..ac8779278c0c
In preparation for allowing a generic fncpy() implementation to live
under include/asm-generic/fncpy.h, rename the current include guards to
be __ASM_ARM_FNCPY_H, this also makes the header file more consistent
with other headers in the same directory.
Signed-off-by: Florian Fainelli
---
arch/ar
Utilize the asm-generic/fncpy.h implementation for ARM64 to allow the
use of drivers/misc/sram*.c on these platforms as well.
Signed-off-by: Florian Fainelli
---
arch/arm64/include/asm/fncpy.h | 6 ++
1 file changed, 6 insertions(+)
create mode 100644 arch/arm64/include/asm/fncpy.h
diff --
Dick Streefland writes:
> On Friday 2017-06-16 12:03, Eric W. Biederman wrote:
> | Interesting...
> |
> | Can you test this on a stock 4.11 kernel?
> |
> | I definitely need a little bit more information to solve this. That
> | commit did not add any new error condidtions so I need to understa
On 2017-06-16 18:15, Boris Brezillon wrote:
> Hi Peter,
>
> On Fri, 16 Jun 2017 17:54:04 +0200
> Peter Rosin wrote:
>
>> On 2017-06-16 12:01, Boris Brezillon wrote:
>>> Hi Peter,
>>>
>>> On Fri, 16 Jun 2017 11:12:25 +0200
>>> Peter Rosin wrote:
>>>
All layers of chips support this, the
On 06/14, kgu...@codeaurora.org wrote:
> On 2017-06-01 02:09, Stephen Boyd wrote:
> >On 05/30, Kiran Gunda wrote:
> >>From: Abhijeet Dharmapurikar
> >>
> >>The driver currently invokes the apid handler (periph_handler())
> >
> >You mean periph_interrupt()?
> >
> Yes.
> >>once it sees that the summ
On Tue, Jun 06, 2017 at 07:19:53PM +0800, Guodong Xu wrote:
> Hi, Arnd
>
> On Tue, Jun 6, 2017 at 5:23 PM, Arnd Bergmann wrote:
> > On Sun, Jun 4, 2017 at 2:03 AM, kbuild test robot wrote:
> >> Hi Xiaowei,
> >>
> >> [auto build test ERROR on pci/next]
> >> [also build test ERROR on v4.12-rc3 nex
On Fri, Jun 16, 2017 at 1:56 PM, Arnd Bergmann wrote:
> On Fri, Jun 16, 2017 at 7:29 PM, Dmitry Torokhov
> wrote:
>> On Fri, Jun 16, 2017 at 8:58 AM, Samuel Thibault
>> wrote:
>>> I'm however afraid we'd have to mark a lot of static functions that way,
>>> depending on the aggressivity of gcc...
Dick Streefland writes:
> After a recent upgrade of a Ubuntu xenial machine, a particular
> autofs multi-map mount setup stopped working. A simplified example is:
>
> ::
> auto.master
> ::
> /net /etc/auto.net
> ::
> auto.net
> ::
> localho
On 6/16/2017 11:00 AM, Herbert Xu wrote:
> On Fri, Jun 16, 2017 at 07:57:00AM +, Horia Geantă wrote:
>>
>> Commit 0605c41cc53ca ("crypto: cts - Convert to skcipher") appends
>> CRYPTO_TFM_REQ_MAY_BACKLOG to the original crypto request flags for the
>> last block - when calling cts_cbc_encrypt()
The mm-of-the-moment snapshot 2017-06-16-13-59 has been uploaded to
http://www.ozlabs.org/~akpm/mmotm/
mmotm-readme.txt says
README for mm-of-the-moment:
http://www.ozlabs.org/~akpm/mmotm/
This is a snapshot of my -mm patch queue. Uploaded at random hopefully
more than once a week.
You wi
Neil Armstrong writes:
> From: Helmut Klein
>
> This patch switches to the stable UART bindings but also add the correct
> gate clock to the non-AO UART nodes for GXBB and GXL SoCs.
>
> Acked-by: Jerome Brunet
> Signed-off-by: Helmut Klein
> Signed-off-by: Neil Armstrong
> ---
> arch/arm64/b
On Fri, Jun 16, 2017 at 7:29 PM, Dmitry Torokhov
wrote:
> On Fri, Jun 16, 2017 at 8:58 AM, Samuel Thibault
> wrote:
>> Arnd Bergmann, on ven. 16 juin 2017 17:41:47 +0200, wrote:
>>> The problem are the 'ch' and 'flag' variables that are passed into
>>> tty_insert_flip_char by value, and from ther
Hi Enric,
On 05/16/2017 09:13 AM, Enric Balletbo i Serra wrote:
> From: Nicolas Boichat
>
> ec_params_console_read_v1 is used to capture EC logs from kernel,
> and ec_params_get_cmd_versions_v1 is used to probe whether EC
> supports that command.
>
> Signed-off-by: Nicolas Boichat
> Reviewed-b
Hi Enric,
On 05/16/2017 09:13 AM, Enric Balletbo i Serra wrote:
> From: Gwendal Grignou
>
> Add cros_ec_get_event() entry point to retrieve event within functions
> called by the notifier.
>
> Signed-off-by: Gwendal Grignou
> Signed-off-by: Enric Balletbo i Serra
> Acked-by: Lee Jones
Appli
On 06/16/2017 01:34 AM, Christoph Hellwig wrote:
> On Fri, Jun 16, 2017 at 05:30:50PM +1000, NeilBrown wrote:
>> I've pushed the new version to the same place. Do you actually want
>> me to re-post all the patches?
>
> I personally prefer to always have patches on the list, but I can't
> speak fo
"Paul E. McKenney" writes:
> On Fri, Jun 16, 2017 at 01:26:19AM +0200, Luis R. Rodriguez wrote:
>> On Thu, Jun 15, 2017 at 02:57:17PM -0700, Paul E. McKenney wrote:
>> > On Thu, Jun 15, 2017 at 11:48:18AM -0700, Luis R. Rodriguez wrote:
>> > > While reviewing RCU's interruptible swaits I noticed
Hi Alexander,
Do you have any comments about this patch?
Here is a reproducer for this leak:
$ cat mount.sh
set -e -x
mount --make-rprivate /
mount -t tmpfs zdtm /mnt
mount --make-shared /mnt
mount -t proc procX /proc
for i in `seq $1`; do
mount --bind /mnt /mnt
done
mount --make-rpriva
On Fri, Jun 16, 2017 at 11:10 AM, Christoph Hellwig wrote:
> DMA_ERROR_CODE is not a public API and will go away. Instead properly
> unwind based on the loop counter.
>
> Signed-off-by: Christoph Hellwig
> Acked-by: Dave Jiang
> Acked-By: Vinod Koul
> ---
> drivers/dma/ioat/init.c | 24 ++
On Friday 2017-06-16 12:03, Eric W. Biederman wrote:
| Interesting...
|
| Can you test this on a stock 4.11 kernel?
|
| I definitely need a little bit more information to solve this. That
| commit did not add any new error condidtions so I need to understand
| what state you are getting yourself
Arnd,
Should this patchset go through the ARM maintainers?
On 17-06-15 11:39 PM, Scott Branden wrote:
Add compatible string for ARM CCN-502 interconnect.
CCN-502 interconnect is already compatible with the
existing ARM CCN driver, which supports CCN-504.
Velibor Markovski (2):
dt-bindings:
"Luis R. Rodriguez" writes:
> There are cases where folks are using an interruptible swait when
> using kthreads. This is rather confusing given you'd expect
> interruptible waits to be -- interruptible, but kthreads are not
> interruptible ! The reason for such practice though is to avoid
> havi
On 06/13/2017 03:42 PM, Gustavo A. R. Silva wrote:
Remove unused variable rtlhal.
Addresses-Coverity-ID: 1248810
Signed-off-by: Gustavo A. R. Silva
---
NACK!! That variable is used in file core.c in driver rtlwifi, which is loaded
and used by rtl8821ae.
Please do more than blindly follow C
On Fri, 16 Jun 2017 16:15:23 -0400 Johannes Weiner wrote:
> In any case, memcontrol.h doesn't/shouldn't need hardirq.h. When that
> include is removed, the below patch compiles on: x86 allno, x86_64
> allno, and my regular x86_64 config:
>
> ---
> Subject: mm-memcontrol-per-lruvec-stats-infrastr
On 06/16/2017 08:11 AM, Tony Camuso wrote:
On 06/16/2017 08:15 AM, Corey Minyard wrote:
On 06/15/2017 10:54 AM, Corey Minyard wrote:
On 06/13/2017 09:54 AM, Tony Camuso wrote:
A vendor with a system having more than 128 CPUs occasionally
encounters a
crash during shutdown. This is not an easil
On Fri, Jun 16, 2017 at 01:34:59PM -0600, Logan Gunthorpe
wrote:
>
>
> On 16/06/17 12:38 PM, Serge Semin wrote:
> > On Fri, Jun 16, 2017 at 11:08:52AM -0600, Logan Gunthorpe
> > wrote:
> > It's the way the NTB API was created for, to have set of functions to access
> > NTB devices in the simi
On Fri, 16 Jun 2017, Florian Fainelli wrote:
> > How did you determine that? Malta for one not only has an SMSC FDC37M817
> > Super I/O Controller featuring an 8042-compatible core, but actual PS/2
> > keyboard and mouse connectors as well.
>
> I was just grepping for i8042 in platform code t
On Fri, Jun 16, 2017 at 12:14:53PM -0700, Andrew Morton wrote:
> On Fri, 16 Jun 2017 14:49:51 -0400 Johannes Weiner wrote:
>
> > On Wed, Jun 14, 2017 at 12:26:46AM -0700, Guenter Roeck wrote:
> > > Hi,
> > >
> > > I see the following build error in -next when building hexagon images.
> > >
> >
From: Tony Luck
Speculative processor accesses may reference any memory that has a
valid page table entry. While a speculative access won't generate
a machine check, it will log the error in a machine check bank. That
could cause escalation of a subsequent error since the overflow bit
will be th
Trailing __printf attributes work for function declarations, but not
definitions. This patch fixes arm32/64 builds by placing __printf
before the declarator. Otherwise this happens:
arch/arm64/util/../../arm/util/cs-etm.c:586:1: error: attributes should be
specified before the declarator in a f
On Freitag, 16. Juni 2017 13:57:44 CEST Jan Kratochvil wrote:
> On Fri, 16 Jun 2017 13:51:37 +0200, Milian Wolff wrote:
> > > perf-4.12.0-0.rc5.git0.1.fc27.x86_64
> > >
> > > 39e32e gdb_main (/usr/libexec/gdb)
> > > 10b6fa main (/usr/libexec/gdb)
> > >
> > >
On Fri, Jun 16, 2017 at 09:29:52PM +0200, Greg Kroah-Hartman wrote:
> On Fri, Jun 16, 2017 at 06:46:51PM +0200, Luis R. Rodriguez wrote:
> > Kees, please review 47e0bbb7fa98 below.
> > Brian, please review be4a1326d12c below.
> >
> > On Thu, Jun 15, 2017 at 11:26:53PM +0530, Sumit Semwal wrote:
>
On 16 June 2017 at 22:49, Sumit Semwal wrote:
> Hi Orson,
>
> Thanks for the patch.
>
> On 16 June 2017 at 14:58, Orson Zhai wrote:
>> Sysctl test will fail in some items if the value of /proc/sys/kernel
>> /sysctrl_writes_strict is 0 as the default value in kernel older than v4.5.
>>
>> Make thi
On Thu, Jun 15, 2017 at 04:58:56PM +0200, Jan Kara wrote:
> On Wed 14-06-17 11:22:11, Ross Zwisler wrote:
> > @@ -216,17 +217,6 @@ static void dax_unlock_mapping_entry(struct
> > address_space *mapping,
> > dax_wake_mapping_entry_waiter(mapping, index, entry, false);
> > }
> >
> > -static v
On Thu, May 25, 2017 at 04:49:07PM +0800, Chen Yu wrote:
> Currently we saw a lot of "No irq handler" errors during hibernation,
> which caused the system hang finally:
>
> [ 710.141581] ata4.00: qc timeout (cmd 0xec)
> [ 710.147135] ata4.00: failed to IDENTIFY (I/O error, err_mask=0x4)
> [ 710
On Thu, Jun 15, 2017 at 04:42:04PM +0200, Jan Kara wrote:
> On Wed 14-06-17 11:22:09, Ross Zwisler wrote:
> > To be able to use the common 4k zero page in DAX we need to have our PTE
> > fault path look more like our PMD fault path where a PTE entry can be
> > marked as dirty and writeable as it is
Hi Enric,
I have gotten around to reviewing this series, and hope to get
this in ASAP.
I found an issue with this commit, but I'll go ahead and fix it
myself as I'm creating the immutable branch. No need to respin the series.
On Tue, May 16, 2017 at 06:13:09PM +0200, Enric Balletbo i Serra wrote
Commit-ID: 7a1ac110c22eb726684c837544a2d42c33e07be7
Gitweb: http://git.kernel.org/tip/7a1ac110c22eb726684c837544a2d42c33e07be7
Author: Arnaldo Carvalho de Melo
AuthorDate: Fri, 9 Jun 2017 16:54:28 -0300
Committer: Arnaldo Carvalho de Melo
CommitDate: Wed, 14 Jun 2017 15:44:29 -0300
per
Commit-ID: 7a759cd8e8272ee18922838ee711219c7c796a31
Gitweb: http://git.kernel.org/tip/7a759cd8e8272ee18922838ee711219c7c796a31
Author: Jiada Wang
AuthorDate: Sun, 9 Apr 2017 20:02:37 -0700
Committer: Arnaldo Carvalho de Melo
CommitDate: Wed, 14 Jun 2017 15:44:29 -0300
perf tools: Fix b
Commit-ID: 9126cbbacecb8917bd0418809ef1d26616b2061e
Gitweb: http://git.kernel.org/tip/9126cbbacecb8917bd0418809ef1d26616b2061e
Author: Milian Wolff
AuthorDate: Fri, 2 Jun 2017 16:37:53 +0200
Committer: Arnaldo Carvalho de Melo
CommitDate: Fri, 16 Jun 2017 14:37:30 -0300
perf unwind: Re
On Fri, Jun 16, 2017 at 09:18:29PM +1000, Michael Ellerman wrote:
> Ram Pai writes:
> > diff --git a/arch/powerpc/include/uapi/asm/ptrace.h
> > b/arch/powerpc/include/uapi/asm/ptrace.h
> > index 8036b38..109d0c2 100644
> > --- a/arch/powerpc/include/uapi/asm/ptrace.h
> > +++ b/arch/powerpc/includ
7;xtensa-20170612' of git://github.com/jcmvbkbc/linux-xtensa
> (2017-06-13 15:09:10 +0900)
>
> are available in the git repository at:
>
> git://git.kernel.org/pub/scm/linux/kernel/git/acme/linux.git
> tags/perf-urgent-for-mingo-4.12-20170616
>
> for you to fetch changes
On 16/06/17 12:38 PM, Serge Semin wrote:
> On Fri, Jun 16, 2017 at 11:08:52AM -0600, Logan Gunthorpe
> wrote:
> It's the way the NTB API was created for, to have set of functions to access
> NTB devices in the similar way. These aren't my beliefs, it's the way it was
> created. I agree it can b
On Fri, Jun 16, 2017 at 06:46:51PM +0200, Luis R. Rodriguez wrote:
> Kees, please review 47e0bbb7fa98 below.
> Brian, please review be4a1326d12c below.
>
> On Thu, Jun 15, 2017 at 11:26:53PM +0530, Sumit Semwal wrote:
> > Hello Greg, Shuah,
> >
> > While testing 4.4.y and 4.9.y LTS kernels with l
In other error paths in probe, centralized exit point was used so make
this consistent.
Signed-off-by: Krzysztof Kozlowski
---
drivers/rtc/rtc-s3c.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/rtc/rtc-s3c.c b/drivers/rtc/rtc-s3c.c
index d44fb34df8fe..c5aa7a35d
clk_prepare_enable() can fail so handle such case.
Signed-off-by: Krzysztof Kozlowski
---
drivers/rtc/rtc-s3c.c | 8 ++--
1 file changed, 6 insertions(+), 2 deletions(-)
diff --git a/drivers/rtc/rtc-s3c.c b/drivers/rtc/rtc-s3c.c
index c666b95fb8d7..0cb2f27a30b4 100644
--- a/drivers/rtc/rtc-
Minor cleanups to make the code easier to read. No functional changes.
1. Remove one space before labels as this is nowadays mostly preferred.
2. Fix indentation of arguments in function calls.
3. Split structure member declaration.
Signed-off-by: Krzysztof Kozlowski
---
drivers/rtc/rtc-s3c.c |
clk_enable() can fail so handle such case.
Signed-off-by: Krzysztof Kozlowski
---
drivers/rtc/rtc-s3c.c | 72 ---
1 file changed, 57 insertions(+), 15 deletions(-)
diff --git a/drivers/rtc/rtc-s3c.c b/drivers/rtc/rtc-s3c.c
index 0cb2f27a30b4..a899
There is no need for casting to void pointer for of_device_id data.
Signed-off-by: Krzysztof Kozlowski
---
drivers/rtc/rtc-s3c.c | 10 +-
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/drivers/rtc/rtc-s3c.c b/drivers/rtc/rtc-s3c.c
index 2b503dab7957..bfc8660ff1e7 100644
--
All instances of struct s3c_rtc_data are in fact static const thus
put in rodata so we should not drop the const while getting the pointer
to them.
Signed-off-by: Krzysztof Kozlowski
---
drivers/rtc/rtc-s3c.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/drivers/rtc/r
On Fri, Jun 16, 2017 at 01:08:04PM +0530, Sumit Semwal wrote:
>
> Thanks, this was quite helpful, and so now bpf tests build on x86_64
> with current mainline for me. Perhaps we should document these
> somewhere, as dependencies?
>
There is already some documentation available[0], but something in
From: Arnaldo Carvalho de Melo
Since commit 18e7a45af91a ("perf/x86: Reject non sampling events with
precise_ip") returns -EINVAL for sys_perf_event_open() with an attribute
with (attr.precise_ip > 0 && attr.sample_period == 0), just like is done
in the routine used to probe the max precise level
From: Milian Wolff
The PC returned by dwfl_frame_pc() may map into a not-yet-reported
module. We have to report it before we continue unwinding. But when we
query for the isactivation flag in dwfl_frame_pc, libdw will actually do
one more unwinding step internally which can then break and lead to
From: Jiada Wang
With commit: 0a943cb10ce78 (tools build: Add HOSTARCH Makefile variable)
when building for ARCH=x86_64, ARCH=x86_64 is passed to perf instead of
ARCH=x86, so the perf build process searchs header files from
tools/arch/x86_64/include, which doesn't exist.
The following build fail
0900)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/acme/linux.git
tags/perf-urgent-for-mingo-4.12-20170616
for you to fetch changes up to 9126cbbacecb8917bd0418809ef1d26616b2061e:
perf unwind: Report module before querying isactivation in dwfl unwind
(201
From: Vivien Didelot
Date: Thu, 15 Jun 2017 16:14:48 -0400
> Similarly to how cross-chip VLAN works, define a bitmap of multicast
> group members for a switch, now including its DSA ports, so that
> multicast traffic can be sent to all switches of the fabric.
>
> A switch may drop the frames if
On 16/06/17 12:08 PM, Allen Hubbe wrote:
> Alright. I'll leave it to you to find and reconcile common functionalities
> of the drivers. What about making spad emulation optional?
Ok.
I don't see the point of making spad emulation optional. Who would want
to disable it and what would be the b
On Fri, Jun 16, 2017 at 08:33:01PM +1000, Benjamin Herrenschmidt wrote:
> On Fri, 2017-06-16 at 14:50 +0530, Anshuman Khandual wrote:
> > On 06/06/2017 06:35 AM, Ram Pai wrote:
> > > The value of the AMR register at the time of the exception
> > > is made available in gp_regs[PT_AMR] of the siginfo
On Fri, 16 Jun 2017 14:49:51 -0400 Johannes Weiner wrote:
> On Wed, Jun 14, 2017 at 12:26:46AM -0700, Guenter Roeck wrote:
> > Hi,
> >
> > I see the following build error in -next when building hexagon images.
> >
> > CC arch/hexagon/kernel/asm-offsets.s
> > In file included from ./inclu
On Fri, Jun 16, 2017 at 10:50 AM, Andi Kleen wrote:
>> > Yeah, I think it is easier and more portable, especially on hardware with a
>> > PEBS-like mechanism but no branch buffer (like LBR). FYI, I did do a test
>> > implementation yesterday to evaluate the difficulty.
>> >
>> A more generalized u
On Fri, Jun 16, 2017 at 02:50:13PM +0530, Anshuman Khandual wrote:
> On 06/06/2017 06:35 AM, Ram Pai wrote:
> > The value of the AMR register at the time of the exception
> > is made available in gp_regs[PT_AMR] of the siginfo.
>
> But its already available there in uctxt->uc_mcontext.regs->amr
>
This patch series provides support for AMD's new Secure Memory Encryption (SME)
feature.
SME can be used to mark individual pages of memory as encrypted through the
page tables. A page of memory that is marked encrypted will be automatically
decrypted when read from DRAM and will be automatically
The ioremap() function is intended for mapping MMIO. For RAM, the
memremap() function should be used. Convert calls from ioremap() to
memremap() when re-mapping RAM.
This will be used later by SME to control how the encryption mask is
applied to memory mappings, with certain memory locations being
When System Memory Encryption (SME) is enabled, the physical address
space is reduced. Adjust the x86_phys_bits value to reflect this
reduction.
Reviewed-by: Borislav Petkov
Signed-off-by: Tom Lendacky
---
arch/x86/kernel/cpu/amd.c | 10 +++---
1 file changed, 7 insertions(+), 3 deletions
Changes to the existing page table macros will allow the SME support to
be enabled in a simple fashion with minimal changes to files that use these
macros. Since the memory encryption mask will now be part of the regular
pagetable macros, we introduce two new macros (_PAGE_TABLE_NOENC and
_KERNPG_
Boot data (such as EFI related data) is not encrypted when the system is
booted because UEFI/BIOS does not run with SME active. In order to access
this data properly it needs to be mapped decrypted.
Update early_memremap() to provide an arch specific routine to modify the
pagetable protection attr
The SMP MP-table is built by UEFI and placed in memory in a decrypted
state. These tables are accessed using a mix of early_memremap(),
early_memunmap(), phys_to_virt() and virt_to_phys(). Change all accesses
to use early_memremap()/early_memunmap(). This allows for proper setting
of the encryption
When Secure Memory Encryption is enabled, the trampoline area must not
be encrypted. A CPU running in real mode will not be able to decrypt
memory that has been encrypted because it will not be able to use addresses
with the memory encryption mask.
Signed-off-by: Tom Lendacky
---
arch/x86/realmo
Update the KVM support to work with SME. The VMCB has a number of fields
where physical addresses are used and these addresses must contain the
memory encryption mask in order to properly access the encrypted memory.
Also, use the memory encryption mask when creating and using the nested
page table
Add support to check if SME has been enabled and if memory encryption
should be activated (checking of command line option based on the
configuration of the default state). If memory encryption is to be
activated, then the encryption mask is set and the kernel is encrypted
"in place."
Signed-off-
Add the support to encrypt the kernel in-place. This is done by creating
new page mappings for the kernel - a decrypted write-protected mapping
and an encrypted mapping. The kernel is encrypted by copying it through
a temporary buffer.
Signed-off-by: Tom Lendacky
---
arch/x86/include/asm/mem_enc
101 - 200 of 798 matches
Mail list logo