Commit-ID: 03b2a320b19f1424e9ac9c21696be9c60b6d0d93
Gitweb: https://git.kernel.org/tip/03b2a320b19f1424e9ac9c21696be9c60b6d0d93
Author: Juergen Gross
AuthorDate: Thu, 9 Nov 2017 14:27:36 +0100
Committer: Ingo Molnar
CommitDate: Fri, 10 Nov 2017 10:03:12 +0100
x86/virt: Add enum for hyp
Commit-ID: f72e38e8ec8869ac0ba5a75d7d2f897d98a1454e
Gitweb: https://git.kernel.org/tip/f72e38e8ec8869ac0ba5a75d7d2f897d98a1454e
Author: Juergen Gross
AuthorDate: Thu, 9 Nov 2017 14:27:35 +0100
Committer: Ingo Molnar
CommitDate: Fri, 10 Nov 2017 10:03:12 +0100
x86/virt, x86/platform: Me
Commit-ID: 6d7305254ea947d575a066711c3349fafbebaffa
Gitweb: https://git.kernel.org/tip/6d7305254ea947d575a066711c3349fafbebaffa
Author: Juergen Gross
AuthorDate: Thu, 9 Nov 2017 14:27:37 +0100
Committer: Ingo Molnar
CommitDate: Fri, 10 Nov 2017 10:03:13 +0100
x86/virt, x86/acpi: Add te
Commit-ID: f3614646005a1b59f836ff54351c9bd2224b6005
Gitweb: https://git.kernel.org/tip/f3614646005a1b59f836ff54351c9bd2224b6005
Author: Juergen Gross
AuthorDate: Thu, 9 Nov 2017 14:27:38 +0100
Committer: Ingo Molnar
CommitDate: Fri, 10 Nov 2017 10:03:13 +0100
x86/virt, x86/platform: Ad
Commit-ID: 5374b516af79988163a16ee5afb508dfe39348b0
Gitweb: https://git.kernel.org/tip/5374b516af79988163a16ee5afb508dfe39348b0
Author: Michael S. Tsirkin
AuthorDate: Fri, 27 Oct 2017 19:14:31 +0300
Committer: Ingo Molnar
CommitDate: Fri, 10 Nov 2017 08:03:21 +0100
locking/x86: Use LOC
Commit-ID: b8347c2196492f4e1cccde3d92fda1cc2cc7de7e
Gitweb: https://git.kernel.org/tip/b8347c2196492f4e1cccde3d92fda1cc2cc7de7e
Author: Alexander Shishkin
AuthorDate: Mon, 24 Jul 2017 13:04:28 +0300
Committer: Ingo Molnar
CommitDate: Fri, 10 Nov 2017 08:04:19 +0100
x86/debug: Handle wa
Commit-ID: 418492ba40b2c2bbdaf1a169aac5b1673bde8189
Gitweb: https://git.kernel.org/tip/418492ba40b2c2bbdaf1a169aac5b1673bde8189
Author: Juergen Gross
AuthorDate: Thu, 9 Nov 2017 14:27:39 +0100
Committer: Ingo Molnar
CommitDate: Fri, 10 Nov 2017 10:03:14 +0100
x86/virt/xen: Use guest_la
Sometimes, a processor might execute an instruction while another
processor is updating the page tables for that instruction's code page,
but before the TLB shootdown completes. The interesting case happens
if the page is in the TLB.
In general, the processor will succeed in executing the instruc
Remote flushing api's does a busy wait which is fine in bare-metal
scenario. But with-in the guest, the vcpus might have been pre-empted
or blocked. In this scenario, the initator vcpu would end up
busy-waiting for a long amount of time.
This patch set implements para-virt flush tlbs making sure t
From: Wanpeng Li
Introduce a new bool invalidate_gpa argument to kvm_x86_ops->tlb_flush,
it will be used by later patches to just flush guest tlb.
Cc: Paolo Bonzini
Cc: Radim Krčmář
Cc: Peter Zijlstra
Signed-off-by: Wanpeng Li
---
arch/x86/include/asm/kvm_host.h | 2 +-
arch/x86/kvm/svm.c
From: Wanpeng Li
PV-Flush guest would indicate to flush on enter, flush the TLB before
entering and exiting the guest.
Cc: Paolo Bonzini
Cc: Radim Krčmář
Cc: Peter Zijlstra
Signed-off-by: Wanpeng Li
---
arch/x86/kvm/cpuid.c | 3 ++-
arch/x86/kvm/x86.c | 22 ++
2 files
On 11/09/2017 12:45 PM, Jiri Kosina wrote:
> On Thu, 2 Nov 2017, Sébastien Szymanski wrote:
>
>> Signed-off-by: Sébastien Szymanski
>> ---
>> drivers/hid/hid-cp2112.c | 2 +-
>> 1 file changed, 1 insertion(+), 1 deletion(-)
>>
>> diff --git a/drivers/hid/hid-cp2112.c b/drivers/hid/hid-cp2112.c
>
From: Wanpeng Li
This patch reuses the preempted field in kvm_steal_time, and will export
the vcpu running/pre-empted information to the guest from host. This will
enable guest to intelligently send ipi to running vcpus and set flag for
pre-empted vcpus. This will prevent waiting for vcpus that a
From: Wanpeng Li
Remote flushing api's does a busy wait which is fine in bare-metal
scenario. But with-in the guest, the vcpus might have been pre-empted
or blocked. In this scenario, the initator vcpu would end up
busy-waiting for a long amount of time.
This patch set implements para-virt flush
On Fri, Nov 10, 2017 at 10:14:53AM +0100, Ingo Molnar wrote:
> I'm wondering, how did you test it if no current bootloader puts the kernel
> to
> above addresses of 4G?
I didn't test it directly.
I've checked with debugger that there's no memory accesses above 1M
between disabling paging in the
On Fri, Nov 10, 2017 at 10:28:12AM +0100, Ingo Molnar wrote:
>
> * Ingo Molnar wrote:
>
> > > --- a/arch/x86/boot/compressed/head_64.S
> > > +++ b/arch/x86/boot/compressed/head_64.S
> > > @@ -315,6 +315,18 @@ ENTRY(startup_64)
> > >* The first step is go into compatibility mode.
> > >*/
On Fri, Nov 10, 2017 at 10:29:33AM +0100, Ingo Molnar wrote:
>
> * Kirill A. Shutemov wrote:
>
> > --- a/arch/x86/boot/compressed/head_64.S
> > +++ b/arch/x86/boot/compressed/head_64.S
> > @@ -315,6 +315,18 @@ ENTRY(startup_64)
> > * The first step is go into compatibility mode.
> > */
The platforms which support only IOAPIC mode and whose SCI INT is
greater than 16, passes SCI INT via FADT and not via MADT int src override
structure. In such cases current logic fails to handle it and throws error
"Invalid bus_irq %u for legacy override". This patch handles the above
mentioned c
On Fri, 10 Nov 2017, Sébastien Szymanski wrote:
> >> Signed-off-by: Sébastien Szymanski
> >> ---
> >> drivers/hid/hid-cp2112.c | 2 +-
> >> 1 file changed, 1 insertion(+), 1 deletion(-)
> >>
> >> diff --git a/drivers/hid/hid-cp2112.c b/drivers/hid/hid-cp2112.c
> >> index 078026f..28e3c18 100644
On Fri, Nov 10, 2017 at 01:49:45AM -0800, Wanpeng Li wrote:
> +static DEFINE_PER_CPU(cpumask_var_t, __pv_tlb_mask);
> +
> +static void kvm_flush_tlb_others(const struct cpumask *cpumask,
> + const struct flush_tlb_info *info)
> +{
> + u8 state;
> + int cpu;
> + struc
Jiri Kosina wrote:
> > This prevents crypto data theft by analysis of execution patterns, and, if
> > in future ftrace also logs the register contents at the time, will prevent
> > data theft by that mechanism also.
>
> I fail to see how this fits into the secure boot security model, could you
On Fri, Nov 10, 2017 at 01:49:47AM -0800, Wanpeng Li wrote:
> @@ -2116,7 +2122,13 @@ static void record_steal_time(struct kvm_vcpu *vcpu)
> &vcpu->arch.st.steal, sizeof(struct kvm_steal_time
> return;
>
> + if (xchg(&vcpu->arch.st.steal.preempted, KVM_VCPU_NOT_
On Fri, Nov 10, 2017 at 01:49:47AM -0800, Wanpeng Li wrote:
> @@ -2887,7 +2899,7 @@ static void kvm_steal_time_set_preempted(struct
> kvm_vcpu *vcpu)
> if (!(vcpu->arch.st.msr_val & KVM_MSR_ENABLED))
> return;
>
> - vcpu->arch.st.steal.preempted = KVM_VCPU_PREEMPTED;
> +
On Thu, 9 Nov 2017, David Howells wrote:
> Disallow the use of ftrace when the kernel is locked down. This patch
> turns off ftrace_enabled late in the kernel boot so that the selftest can
> still be potentially be run.
>
> The sysctl that controls ftrace_enables is also disallowed when the kern
On Fri 10-11-17 09:19:33, Minchan Kim wrote:
> On Tue, Nov 07, 2017 at 09:54:53AM +, Wang Nan wrote:
> > tlb_gather_mmu(&tlb, mm, 0, -1) means gathering the whole virtual memory
> > space. In this case, tlb->fullmm is true. Some archs like arm64 doesn't
> > flush TLB when tlb->fullmm is true:
>
On 10/11/2017 11:08, Peter Zijlstra wrote:
> On Fri, Nov 10, 2017 at 01:49:47AM -0800, Wanpeng Li wrote:
>> @@ -2887,7 +2899,7 @@ static void kvm_steal_time_set_preempted(struct
>> kvm_vcpu *vcpu)
>> if (!(vcpu->arch.st.msr_val & KVM_MSR_ENABLED))
>> return;
>>
>> -vcpu->ar
On Fri, 10 Nov 2017, David Howells wrote:
> > I fail to see how this fits into the secure boot security model, could you
> > please explain?
>
> The idea is to prevent cryptographic data for filesystems and other things
> from being read out of the kernel memory as well as to prevent unauthorise
Following up on this:
On Thu, Nov 9, 2017 at 4:52 PM, Linus Walleij wrote:
>> No one has ever suggested that the legacy API will remain. Once blk-mq is
>> ready the old code gets deleted.
>
> The block layer maintainers most definately think MQ is ready
> but you seem to disagree. Why?
>
> In t
On Nov 10 2017 or thereabouts, Sébastien Szymanski wrote:
> When everything goes smoothly, ret is set to 0 which makes the function
> to return EIO error.
>
> Fixes: 8e9faa15469e ("HID: cp2112: fix gpio-callback error handling")
> Signed-off-by: Sébastien Szymanski
> ---
> Changes in v2:
> - rew
Jiri Kosina wrote:
> > The idea is to prevent cryptographic data for filesystems and other things
> > from being read out of the kernel memory as well as to prevent unauthorised
> > modification of kernel memory.
>
> Then it would make sense to actually lock down dumping of registers /
> functi
On Fri, 10 Nov 2017, David Howells wrote:
> That would be fine by me. I have a patch that locks down kprobes in this
> series.
Which AFAICS renders locking down ftrace as-is unnecessary ...
> Steven says that ftrace might acquire the ability to dump registers in
> the future.
... and even i
Hi Shanker,
On 09/11/17 15:22, Shanker Donthineni wrote:
> On 11/09/2017 05:08 AM, James Morse wrote:
>> On 04/11/17 21:43, Shanker Donthineni wrote:
>>> On 11/03/2017 10:11 AM, Robin Murphy wrote:
On 03/11/17 03:27, Shanker Donthineni wrote:
> The ARM architecture defines the memory loca
On 11/9/17, Djalal Harouni wrote:
> +struct proc_fs_info {
> + struct pid_namespace *pid_ns;
> +};
> +static inline struct proc_fs_info *proc_sb(struct super_block *sb)
> +{
> + return sb->s_fs_info;
> +}
Can you rename this to "struct proc_super_block *" then?
That "info" suffix all ov
The Dell Canvas 27 has a tool that can be put on the surface and acts
as a dial. The firmware processes the detection of the tool and forward
regular HID reports with X, Y, Azimuth, rotation, width/height.
The firmware also exports Contact ID, Countact Count which may hint that
several totems can
On Fri, Nov 10, 2017 at 11:15:06AM +0100, Paolo Bonzini wrote:
> On 10/11/2017 11:08, Peter Zijlstra wrote:
> > On Fri, Nov 10, 2017 at 01:49:47AM -0800, Wanpeng Li wrote:
> >> @@ -2887,7 +2899,7 @@ static void kvm_steal_time_set_preempted(struct
> >> kvm_vcpu *vcpu)
> >>if (!(vcpu->arch.st.ms
On 11/9/17, Djalal Harouni wrote:
> struct proc_fs_info {
> struct pid_namespace *pid_ns;
> + struct dentry *proc_self; /* For /proc/self/ */
> + struct dentry *proc_thread_self; /* For /proc/thread-self/ */
These are redundant comments.
On Fri, Nov 10, 2017 at 11:26 AM, Alexey Dobriyan wrote:
> On 11/9/17, Djalal Harouni wrote:
>
>> +struct proc_fs_info {
>> + struct pid_namespace *pid_ns;
>> +};
>
>> +static inline struct proc_fs_info *proc_sb(struct super_block *sb)
>> +{
>> + return sb->s_fs_info;
>> +}
>
> Can you re
On Fri, Nov 10, 2017 at 3:53 AM, James Morris wrote:
> On Thu, 9 Nov 2017, Djalal Harouni wrote:
>
>> This should allow later after real testing to have a smooth transition
>> to a procfs with default private instances.
>>
>> [1]
>> https://lists.linuxfoundation.org/pipermail/ksummit-discuss/2017
On 11/9/17, Djalal Harouni wrote:
> --- a/fs/proc/base.c
> +++ b/fs/proc/base.c
> -static bool has_pid_permissions(struct pid_namespace *pid,
> +static bool has_pid_permissions(struct proc_fs_info *fs_info,
More "const".
> diff --git a/fs/proc/inode.c b/fs/proc/inode.c
> index 9abc370..bdd808d
On Fri, Nov 10, 2017 at 3:38 AM, Andy Lutomirski wrote:
> On Thu, Nov 9, 2017 at 8:14 AM, Djalal Harouni wrote:
>> This patch introduces the new 'pids' mount option, as it was discussed
>> and suggested by Andy Lutomirski [1].
>>
>> * If 'pids=' is passed without 'newinstance' then it has no effe
On Fri, Nov 10, 2017 at 04:28:37PM +0800, Mengting Zhang wrote:
SNIP
> diff --git a/tools/perf/util/parse-events.c b/tools/perf/util/parse-events.c
> index 39b1596..25225f4 100644
> --- a/tools/perf/util/parse-events.c
> +++ b/tools/perf/util/parse-events.c
> @@ -1369,6 +1369,32 @@ struct event_m
This adds basic support for BQ27521 battery monitor, used in Nokia N9
and N950. In particular, battery voltage is important to be able to
tell when the battery is almost empty. Emptying battery on N950 is
pretty painful, as flasher needs to be used to recover phone in such case.
Signed-off-by: P
On Fri, Nov 10, 2017 at 08:46:29AM +0800, Shawn Lin wrote:
> Hi Bjorn,
>
> On 2017/11/9 23:05, Bjorn Helgaas wrote:
> >On Thu, Nov 09, 2017 at 11:28:36AM +0530, Kishon Vijay Abraham I wrote:
> >>Hi Bjorn,
> >>
> >>On Thursday 09 November 2017 01:56 AM, Bjorn Helgaas wrote:
> >>>On Wed, Nov 08, 201
As far as I know, the vDSO specs (both Documentation/ABI/stable/vdso and
`man 7 vdso`) make no mention of how much stack the vDSO functions are
allowed to use. They just say "the usual C ABI", which makes no guarantees.
It turns out that Go has been assuming that those functions use less
than 104
On Fri, Nov 10, 2017 at 11:36 AM, Alexey Dobriyan wrote:
> On 11/9/17, Djalal Harouni wrote:
>> --- a/fs/proc/base.c
>> +++ b/fs/proc/base.c
>
>> -static bool has_pid_permissions(struct pid_namespace *pid,
>> +static bool has_pid_permissions(struct proc_fs_info *fs_info,
>
> More "const".
>
>> di
On Tue, Nov 7, 2017 at 3:12 PM, Arnd Bergmann wrote:
> The driver fails to build without CONFIG_OF:
>
> drivers/pinctrl/samsung/pinctrl-samsung.c: In function
> 'samsung_gpiolib_register':
> drivers/pinctrl/samsung/pinctrl-samsung.c:936:5: error: 'struct gpio_chip'
> has no member named 'of_nod
Hi,
John Keeping writes:
> This check has gone through several incompatible variations in commits
> 53642399aa71 ("usb: gadget: f_fs: Fix wrong check on reserved1 of
> OS_DESC_EXT_COMPAT"), 354bc45bf329 ("usb: gadget: f_fs: Fix ExtCompat
> descriptor validation") and 3ba534df815f ("Revert "usb:
On 10/11/17 04:59, Vinod Koul wrote:
On Thu, Nov 09, 2017 at 09:14:07PM +, Srinivas Kandagatla wrote:
On 19/10/17 04:03, Vinod Koul wrote:
This adds the base SoundWire bus type, bus and driver registration.
along with changes to module device table for new SoundWire
device type.
Signed
Stephen Hemminger writes:
> Several types of control operations require that the underlying RNDIS
> infrastructure be restarted. This patch changes the ordering of the
> shutdown to avoid race conditions.
> Stop all transmits before doing RNDIS halt. This involves stopping the
> network device tr
On 11/10/17, Andrew Morton wrote:
> On Thu, 9 Nov 2017 17:07:14 +0300 Yury Norov
> wrote:
>
>> find_bit functions are widely used in the kernel, including hot paths.
>> This module tests performance of that functions in 2 typical scenarios:
>> randomly filled bitmap with relatively equal distrib
On Fri, Nov 10, 2017 at 11:31 AM, Alexey Dobriyan wrote:
> On 11/9/17, Djalal Harouni wrote:
>
>> struct proc_fs_info {
>> struct pid_namespace *pid_ns;
>> + struct dentry *proc_self; /* For /proc/self/ */
>> + struct dentry *proc_thread_self; /* For /proc/thread-self/ */
>
> These
On 11/09/2017 06:09 PM, Niklas Cassel wrote:
There are two different combined signal for various interrupt events:
In EQOS-CORE and EQOS-MTL configurations, mci_intr_o is the interrupt
signal.
In EQOS-DMA, EQOS-AHB and EQOS-AXI configurations, these interrupt events
are combined with the events
On 10/11/17 08:55, Vinod Koul wrote:
+
+/**
+ * sdw_get_device_id: find the matching SoundWire device id
+ *
function name should end with () - according to kernel doc.
ah thanks for pointing will add
I ran the kernel-doc script, seems to not complain about this.
Looking at it closely scrip
Commit-ID: 7fb934f84fd8883bfbf9d6241a6dc82818b572f8
Gitweb: https://git.kernel.org/tip/7fb934f84fd8883bfbf9d6241a6dc82818b572f8
Author: Michael S. Tsirkin
AuthorDate: Fri, 27 Oct 2017 19:14:31 +0300
Committer: Ingo Molnar
CommitDate: Fri, 10 Nov 2017 11:40:37 +0100
locking/x86: Use LOC
.
2) next-20171103: I get past kernel boot, but there's kernel panic
(probably) while X is starting. (I can see the capslock led
blinking.). This still happens on next-20171110, if I boot the machine
"cold". This is new.
On Fri, Nov 10, 2017 at 10:42:06AM +, Srinivas Kandagatla wrote:
>
>
> On 10/11/17 04:59, Vinod Koul wrote:
> >On Thu, Nov 09, 2017 at 09:14:07PM +, Srinivas Kandagatla wrote:
> >>
> >>
> >>On 19/10/17 04:03, Vinod Koul wrote:
> >>>This adds the base SoundWire bus type, bus and driver reg
Masahiro-san
On 11/09/2017 11:41 PM, Masahiro Yamada wrote:
> The previous commit largely optimized the object directory creation.
> We can optimize it more for incremental build.
>
> There are already *.cmd files in the output directory. The existing
> *.cmd files have been picked up by $(wildc
Okay, I've dropped the ftrace lockdown patch for the moment from my git
branch.
David
From: "J, KEERTHY"
As per the re-design assign the first bank regs for unbanked
irq case. This was missed out in the original patch.
Signed-off-by: Keerthy
Fixes: b5cf3fd827d2e1 ("gpio: davinci: Redesign driver to accommodate ngpios in
one gpio chip")
---
drivers/gpio/gpio-davinci.c | 2 +-
1
On Friday 10 November 2017 04:37 PM, Keerthy wrote:
> From: "J, KEERTHY"
Linus,
The $Author field is somehow messed up. Please ignore. I will send v2
with this fixed.
Regards,
Keerthy
>
> As per the re-design assign the first bank regs for unbanked
> irq case. This was missed out in the ori
On Fri, 10 Nov 2017 17:28:33 +0800
JianKang Chen wrote:
> From: Chen Jiankang
>
> When there are two same struct kretprobe rp, the INIT_HLIST_HEAD()
> will result in a empty list table rp->free_instances. The memory leak
> will happen. So it needs to add re-register safe check by
> __get_valid_
As per the re-design assign the first bank regs for unbanked
irq case. This was missed out in the original patch.
Signed-off-by: Keerthy
Fixes: b5cf3fd827d2e1 ("gpio: davinci: Redesign driver to accommodate ngpios in
one gpio chip")
---
Changes in v2:
* Fixed $Author
drivers/gpio/gpio-davi
On Wed, Nov 8, 2017 at 4:38 PM, Takashi Iwai wrote:
> On Tue, 07 Nov 2017 03:01:20 +0100,
> Ruslan Bilovol wrote:
>>
>> Recently released USB Audio Class 3.0 specification
>> introduces many significant changes comparing to
>> previous versions, like
>> - new Power Domains, support for LPM/L1
>>
Hi all,
On 08/11/17 11:48, Daniel Thompson wrote:
> On 26/10/17 13:49, Lothar Waßmann wrote:
>> These patches implement some measures to prevent backlight flicker
>> when the backlight is being switched on for a display with an active
>> low brightness control pin.
>> GIT: [PATCH 1/2] backlight: p
Referring TRM Am335X series:
http://www.ti.com/lit/ug/spruh73p/spruh73p.pdf
The LastPowerStateEntered bitfield is present only for PM_CEFUSE
domain. This is not present in any of the other power domains. Hence
remove the generic am33xx_pwrdm_read_prev_pwrst hook which wrongly
reads the reserved bi
On 9 November 2017 at 08:28, Daniel Vetter wrote:
> On Wed, Nov 08, 2017 at 11:34:41AM -0800, Eric Anholt wrote:
>> I wanted to update the vc4 header so that I could land some igt
>> testcases (though I'd much rather just be importing the header into
>> igt and ditching libdrm). In the process, I
Hi,
On 09-11-17 22:07, Jeremy Cline wrote:
Replace the sst_acpi_check_hid helper function added in
commit 915ae2b9f0fe ("ASoC: Intel: Create a helper to search for
matching machine") with the generic acpi_dev_present helper function
and remove the now unused sst_acpi_check_hid function. This sho
Hi Ram,
On Thu, Nov 09, 2017 at 03:37:46PM -0800, Ram Pai wrote:
> On Thu, Nov 09, 2017 at 04:47:15PM -0200, Breno Leitao wrote:
> > On Mon, Nov 06, 2017 at 12:57:36AM -0800, Ram Pai wrote:
> > > @@ -206,12 +209,14 @@ void signal_handler(int signum, siginfo_t *si, void
> > > *vucontext)
> > >
>
On Mon, Nov 06, 2017 at 11:41:52PM +0100, lionel.debi...@st.com wrote:
> From: Lionel Debieve
>
> When data append reached the threshold for processing,
> we must inform that processing is on going to wait before
> managing the next request.
>
> Signed-off-by: Lionel Debieve
Patch applied. Th
On Mon, Nov 06, 2017 at 10:19:51PM -0800, Eric Biggers wrote:
> From: Eric Biggers
>
> On a non-preemptible kernel, if KEYCTL_DH_COMPUTE is called with the
> largest permitted inputs (16384 bits), the kernel spends 10+ seconds
> doing modular exponentiation in mpi_powm() without rescheduling. If
On Wed, Nov 01, 2017 at 04:20:04PM -0700, Florian Fainelli wrote:
> Hi,
>
> This patch series adds support for the RNG200 block found on the BCM7278 SoC.
> This requires us to update the compatible string (and associated binding
> document) as well as the Kconfig option to make that driver selecta
This patch series adds a new SoundWire subsystem which implements a
new MIPI bus protocol 'SoundWire'.
The SoundWire protocol is a robust, scalable, low complexity, low
power, low latency, two-pin (clock and data) multi-drop bus that
allows for the transfer of multiple audio streams and embedded
c
SoundWire bus provides sdw_read() and sdw_write() APIs for Slave
devices to program the registers. Provide support in regmap for
SoundWire bus.
Signed-off-by: Hardik T Shah
Signed-off-by: Sanyog Kale
Signed-off-by: Vinod Koul
---
drivers/base/regmap/Kconfig | 4 ++
drivers/base/regmap/M
From: Sanyog Kale
SoundWire Slaves report status to bus. Add helpers to handle
the status changes.
Signed-off-by: Hardik T Shah
Signed-off-by: Sanyog Kale
Signed-off-by: Vinod Koul
---
drivers/soundwire/bus.c | 213 ++
include/linux/soundwire/sdw
From: Sanyog Kale
SoundWire is a new Linux bus which implements a new MIPI bus protocol
'SoundWire'. The summary of SoundWire bus and API is documented in the
'summary' file.
Signed-off-by: Sanyog Kale
Signed-off-by: Hardik T Shah
Signed-off-by: Pierre-Louis Bossart
Signed-off-by: Vinod Koul
This adds the base SoundWire bus type, bus and driver registration.
along with changes to module device table for new SoundWire
device type.
Signed-off-by: Sanyog Kale
Signed-off-by: Vinod Koul
---
drivers/Kconfig | 2 +
drivers/Makefile | 1 +
drivers/sou
From: Sanyog Kale
MIPI SoundWire spec defines standard SoundWire registers mandatory for
SoundWire Slave devices, so add them.
Signed-off-by: Sanyog Kale
Signed-off-by: Vinod Koul
---
include/linux/soundwire/sdw.h | 1 +
include/linux/soundwire/sdw_registers.h | 242 ++
Cadence IP implements SoundWire Master. Add base cadence library
initialization and interrupt handling
Signed-off-by: Hardik T Shah
Signed-off-by: Sanyog Kale
Signed-off-by: Vinod Koul
---
drivers/soundwire/Kconfig | 3 +
drivers/soundwire/Makefile | 4 +
drivers/soundwire
The SoundWire Master is implemented as part of Audio controller in
Intel platforms. Add a init module which creates SoundWire Master
platform devices based on the links supported in the hardware.
Signed-off-by: Sanyog Kale
Signed-off-by: Vinod Koul
---
drivers/soundwire/Makefile | 3
Some Intel platforms have SoundWire Master, so add Intel SoundWire
Master driver which uses Cadence module. This patch adds probe and
initialization routines for Intel Master driver.
Signed-off-by: Hardik T Shah
Signed-off-by: Sanyog Kale
Signed-off-by: Vinod Koul
---
drivers/soundwire/Kconfig
Add status handling API sdw_handle_slave_status() to handle
Slave status changes.
Signed-off-by: Hardik T Shah
Signed-off-by: Sanyog Kale
Signed-off-by: Vinod Koul
---
drivers/soundwire/bus.c | 348 ++
drivers/soundwire/bus.h | 2 +
include
It helps to read the properties for understanding and debugging
systems, so add sysfs files for SoundWire DisCo properties.
TODO: Add ABI files for sysfs
Signed-off-by: Sanyog Kale
Signed-off-by: Vinod Koul
---
drivers/soundwire/Makefile| 2 +-
drivers/soundwire/bus.c | 3 +
driv
From: Sanyog Kale
Implement sdw_master_ops with support for xfer_msg, xfer_msg_defer
and reset_page_addr. Since Cadence module doesn't know the systems
it will be used, set the read_prop to the bus helper.
Signed-off-by: Hardik T Shah
Signed-off-by: Sanyog Kale
Signed-off-by: Vinod Koul
---
MIPI Discovery And Configuration (DisCo) Specification for SoundWire
specifies properties to be implemented for SoundWire Masters and
Slaves. The DisCo spec doesn't mandate these properties. However,
SDW bus cannot work without knowing these values.
The helper functions read the Master and Slave p
A Master registers with SoundWire bus and scans the firmware provided
for device description. In this patch we scan the ACPI namespaces and
create the SoundWire Slave devices based on the ACPI description
Signed-off-by: Sanyog Kale
Signed-off-by: Vinod Koul
---
drivers/soundwire/Makefile|
SoundWire bus supports read or write register(s) for SoundWire Slave
device. sdw_read() and sdw_write() APIs are provided for single
register read/write. sdw_nread() and sdw_nwrite() for operations on
contiguous registers.
Signed-off-by: Sanyog Kale
Signed-off-by: Vinod Koul
---
drivers/soundwi
If it is not RAS SError, directly inject virtual SError,
which will keep the old way. If it is RAS SError, firstly
let host ACPI module to handle it. For the ACPI handling,
if the error address is invalid, APEI driver will not
identify the address to hwpoison memory and can not notify
guest to do t
The ARM64 RAS SError Interrupt(SEI) syndrome value is specific to the
guest and user space needs a way to tell KVM this value. So we add a
new ioctl. Before user space specifies the Exception Syndrome Register
ESR(ESR), it firstly checks that whether KVM has the capability to
set the guest ESR, If
RAS Extension add a VSESR_EL2 register which can provides
the syndrome value reported to software on taking a virtual
SError interrupt exception. This patch supports to specify
this Syndrome.
In the RAS Extensions we can not set all-zero syndrome value
for SError, which means 'RAS error: Uncategor
From: Xie XiuQi
ARM's v8.2 Extentions add support for Reliability, Availability and
Serviceability (RAS). On CPUs with these extensions system software
can use additional barriers to isolate errors and determine if faults
are pending.
Add cpufeature detection and a barrier in the context-switch
This series patches mainly do below things:
1. Trap RAS ERR* registers Accesses to EL2 from Non-secure EL1,
KVM will will do a minimum simulation, there registers are simulated
to RAZ/WI in KVM.
2. Route synchronous External Abort exceptions from Non-secure EL0
and EL1 to EL2. When except
ARMv8.2 requires implementation of the RAS extension, in
this extension it adds SEI(SError Interrupt) notification
type, this patch adds new GHES error source SEI handling
functions. This error source parsing and handling method
is similar with the SEA.
Expose API ghes_notify_sei() to external use
ARMv8.2 adds a new bit HCR_EL2.TEA which routes synchronous external
aborts to EL2, and adds a trap control bit HCR_EL2.TERR which traps
all Non-secure EL1&0 error record accesses to EL2.
This patch enables the two bits for the guest OS, guaranteeing that
KVM takes external aborts and traps attemp
From: James Morse
When we exit a guest due to an SError the vcpu fault info isn't updated
with the ESR. Today this is only done for traps.
The v8.2 RAS Extensions define ISS values for SError. Update the vcpu's
fault_info with the ESR on SError so that handle_exit() can determine
if this was a R
Currentlly tps_info structure is no longer used. So use the
strobes parameter in tps65218 structure to capture the info.
Fixes: 2dc4940360d4c0c (regulator: tps65218: Remove all the compatibles)
Signed-off-by: Keerthy
---
drivers/regulator/tps65218-regulator.c | 2 +-
1 file changed, 1 insertion(
remove unused tps_info structure.
Signed-off-by: Keerthy
---
include/linux/mfd/tps65218.h | 19 ---
1 file changed, 19 deletions(-)
diff --git a/include/linux/mfd/tps65218.h b/include/linux/mfd/tps65218.h
index bccd2d6..f069c51 100644
--- a/include/linux/mfd/tps65218.h
+++ b/inc
Set up the HW switch to trap IGMP packets to CPU port.
And make sure skb->offload_fwd_mark is cleared for incoming IGMP packets.
skb->offload_fwd_mark calculation is a candidate for consolidation into the
DSA core. The calculation can probably be more polished when done at a point
where DSA has u
IGMP packets should be trapped to the CPU port. The SW bridge knows
whether to forward to other ports.
With "IGMP snooping for local traffic" merged, IGMP trapping is also
required for stable IGMPv2 operation.
LAN9303 does not trap IGMP packets by default.
Enable IGMP trapping in lan9303_setup.
Now that IGMP packets no longer is flooded in HW, we want the SW bridge to
forward packets based on bridge configuration. To make that happen,
IGMP packets must have skb->offload_fwd_mark = 0.
Signed-off-by: Egil Hjelmeland
---
net/dsa/tag_lan9303.c | 13 +
1 file changed, 13 inserti
unsubscribe linux-mtd
101 - 200 of 634 matches
Mail list logo