: Catalin Marinas
Cc: Will Deacon
Signed-off-by: Amit Daniel Kachhap
---
Changes in v2:
* Moved read/write sysfs functions from global to local functions.
tools/testing/selftests/arm64/mte/.gitignore | 1 +
.../selftests/arm64/mte/check_ksm_options.c | 159 ++
2 files changed
ed-by: Gabor Kertesz
Signed-off-by: Gabor Kertesz
Signed-off-by: Amit Daniel Kachhap
---
Changes in v2:
* Redefined MTE kernel header definitions to decouple kselftest compilations.
* Removed gmi masking instructions in mte_insert_random_tag assembly
function. This simplifies the tag inclusion
e and other similar interfaces
fails if a user memory with invalid tag is accessed in kernel. In async
mode no such failure occurs.
Cc: Shuah Khan
Cc: Catalin Marinas
Cc: Will Deacon
Signed-off-by: Amit Daniel Kachhap
---
Changes in v2:
* Updated the test to handle the error properly in case of fa
, mprotect,
sync/async error mode and private/shared mappings should work.
* mprotect should not be able to clear the PROT_MTE page property.
Cc: Shuah Khan
Cc: Catalin Marinas
Cc: Will Deacon
Co-developed-by: Gabor Kertesz
Signed-off-by: Gabor Kertesz
Signed-off-by: Amit Daniel Kachhap
: Catalin Marinas
Cc: Will Deacon
Co-developed-by: Gabor Kertesz
Signed-off-by: Gabor Kertesz
Signed-off-by: Amit Daniel Kachhap
---
tools/testing/selftests/arm64/mte/.gitignore | 1 +
.../selftests/arm64/mte/check_child_memory.c | 195 ++
2 files changed, 196 insertions
.
Thanks,
Amit Daniel
[1]: https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git
for-next/mte
[2]: https://patchwork.kernel.org/patch/11747791/
Amit Daniel Kachhap (6):
kselftest/arm64: Add utilities and a test to validate mte memory
kselftest/arm64: Verify mte tag inclusion via prctl
Cc: Will Deacon
Co-developed-by: Gabor Kertesz
Signed-off-by: Gabor Kertesz
Signed-off-by: Amit Daniel Kachhap
---
Changes in v2:
* Small fix to check all tags in check_multiple_included_tags function.
tools/testing/selftests/arm64/mte/.gitignore | 1 +
.../arm64/mte/check_tags_i
: Catalin Marinas
Cc: Will Deacon
Signed-off-by: Amit Daniel Kachhap
---
tools/testing/selftests/arm64/mte/.gitignore | 1 +
.../selftests/arm64/mte/check_ksm_options.c | 131 ++
2 files changed, 132 insertions(+)
create mode 100644 tools/testing/selftests/arm64/mte
if a user memory
with invalid tag is accessed in kernel. In async mode no such
fault occurs.
Cc: Shuah Khan
Cc: Catalin Marinas
Cc: Will Deacon
Signed-off-by: Amit Daniel Kachhap
---
tools/testing/selftests/arm64/mte/.gitignore | 1 +
.../selftests/arm64/mte/check_user_mem.c
, mprotect,
sync/async error mode and private/shared mappings should work.
* mprotect should not be able to clear the PROT_MTE page property.
Cc: Shuah Khan
Cc: Catalin Marinas
Cc: Will Deacon
Co-developed-by: Gabor Kertesz
Signed-off-by: Gabor Kertesz
Signed-off-by: Amit Daniel Kachhap
SUBTARGETS=mte CC='compiler'
Cc: Shuah Khan
Cc: Catalin Marinas
Cc: Will Deacon
Co-developed-by: Gabor Kertesz
Signed-off-by: Gabor Kertesz
Signed-off-by: Amit Daniel Kachhap
---
tools/testing/selftests/arm64/Makefile| 2 +-
tools/testing/selftests/arm64/mte/.gitig
: Catalin Marinas
Cc: Will Deacon
Co-developed-by: Gabor Kertesz
Signed-off-by: Gabor Kertesz
Signed-off-by: Amit Daniel Kachhap
---
tools/testing/selftests/arm64/mte/.gitignore | 1 +
.../selftests/arm64/mte/check_child_memory.c | 195 ++
2 files changed, 196 insertions
Cc: Will Deacon
Co-developed-by: Gabor Kertesz
Signed-off-by: Gabor Kertesz
Signed-off-by: Amit Daniel Kachhap
---
tools/testing/selftests/arm64/mte/.gitignore | 1 +
.../arm64/mte/check_tags_inclusion.c | 183 ++
2 files changed, 184 insertions(+)
create mode 10
patchset on top of a recent linux
tree can be found at [2].
Thanks,
Amit Daniel
[1]: https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git
for-next/mte
[2]:
http://linux-arm.org/git?p=linux-ak.git;a=shortlog;h=refs/heads/kselftest-mte-mainline-v1
Amit Daniel Kachhap (6):
kselftest
-off-by: Amit Daniel Kachhap
---
Documentation/admin-guide/kdump/vmcoreinfo.rst | 6 ++
1 file changed, 6 insertions(+)
diff --git a/Documentation/admin-guide/kdump/vmcoreinfo.rst
b/Documentation/admin-guide/kdump/vmcoreinfo.rst
index 007a6b8..e4ee8b2 100644
--- a/Documentation/admin-guide
entication feature may be missing at
runtime even though this config is present.
Cc: Catalin Marinas
Cc: Will Deacon
Cc: Mark Rutland
Signed-off-by: Amit Daniel Kachhap
---
Changes since v2:
* Removed CONFIG_ARM64_PTR_AUTH config guard as suggested by Will.
* A commit log change.
An implementati
Hi Dave,
On 5/28/19 3:41 PM, Dave Martin wrote:
On Wed, Apr 24, 2019 at 02:41:21PM +0100, Dave Martin wrote:
On Wed, Apr 24, 2019 at 12:32:22PM +0530, Amit Daniel Kachhap wrote:
Hi,
On 4/23/19 9:16 PM, Dave Martin wrote:
[...]
diff --git a/arm/kvm-cpu.c b/arm/kvm-cpu.c
index 7780251
Hi,
On 3/26/19 1:34 AM, Kristina Martsenko wrote:
On 19/03/2019 08:30, Amit Daniel Kachhap wrote:
From: Mark Rutland
When pointer authentication is supported, a guest may wish to use it.
This patch adds the necessary KVM infrastructure for this to work, with
a semi-lazy context switch of the
Hi Dave,
On 3/1/19 4:54 PM, Dave P Martin wrote:
On Fri, Mar 01, 2019 at 10:37:54AM +, Amit Daniel Kachhap wrote:
Hi,
On 2/21/19 9:24 PM, Dave Martin wrote:
On Tue, Feb 19, 2019 at 02:54:31PM +0530, Amit Daniel Kachhap wrote:
[...]
diff --git a/arm/aarch64/include/kvm/kvm-config
Hi James,
On 2/27/19 12:03 AM, James Morse wrote:
Hi Amit,
On 19/02/2019 09:24, Amit Daniel Kachhap wrote:
This feature will allow the KVM guest to allow the handling of
pointer authentication instructions or to treat them as undefined
if not set. It uses the existing vcpu API
Hi James,
On 2/27/19 12:01 AM, James Morse wrote:
Hi Amit,
On 19/02/2019 09:24, Amit Daniel Kachhap wrote:
From: Mark Rutland
When pointer authentication is supported, a guest may wish to use it.
This patch adds the necessary KVM infrastructure for this to work, with
a semi-lazy context
Hi,
On 2/25/19 11:09 PM, James Morse wrote:
Hi Amit,
On 19/02/2019 09:24, Amit Daniel Kachhap wrote:
From: Mark Rutland
When restoring HCR_EL2 for the host, KVM uses HCR_HOST_VHE_FLAGS, which
is a constant value. This works today, as the host HCR_EL2 value is
always the same, but this will
Hi,
On 2/21/19 9:24 PM, Dave Martin wrote:
On Tue, Feb 19, 2019 at 02:54:31PM +0530, Amit Daniel Kachhap wrote:
This is a runtime capabality for KVM tool to enable Armv8.3 Pointer
Authentication in guest kernel. A command line option --ptrauth is
required for this.
Signed-off-by: Amit Daniel
Hi,
On 2/21/19 9:23 PM, Dave Martin wrote:
On Tue, Feb 19, 2019 at 02:54:29PM +0530, Amit Daniel Kachhap wrote:
This feature will allow the KVM guest to allow the handling of
pointer authentication instructions or to treat them as undefined
if not set. It uses the existing vcpu API
Hi,
On 2/21/19 9:23 PM, Dave Martin wrote:
On Tue, Feb 19, 2019 at 02:54:28PM +0530, Amit Daniel Kachhap wrote:
From: Mark Rutland
When pointer authentication is supported, a guest may wish to use it.
This patch adds the necessary KVM infrastructure for this to work, with
a semi-lazy context
On 2/21/19 9:21 PM, Dave Martin wrote:
On Thu, Feb 21, 2019 at 12:29:42PM +, Mark Rutland wrote:
On Tue, Feb 19, 2019 at 02:54:28PM +0530, Amit Daniel Kachhap wrote:
From: Mark Rutland
When pointer authentication is supported, a guest may wish to use it.
This patch adds the necessary
Hi,
On 2/21/19 9:21 PM, Dave Martin wrote:
On Tue, Feb 19, 2019 at 02:54:27PM +0530, Amit Daniel Kachhap wrote:
Save host MDCR_EL2 value during kvm HYP initialisation and restore
after every switch from host to guest. There should not be any
change in functionality due to this.
The value of
Hi,
On 2/21/19 9:19 PM, Dave Martin wrote:
On Tue, Feb 19, 2019 at 02:54:26PM +0530, Amit Daniel Kachhap wrote:
From: Mark Rutland
When restoring HCR_EL2 for the host, KVM uses HCR_HOST_VHE_FLAGS, which
is a constant value. This works today, as the host HCR_EL2 value is
always the same, but
Hi,
On 2/21/19 6:04 PM, Mark Rutland wrote:
On Tue, Feb 19, 2019 at 02:54:29PM +0530, Amit Daniel Kachhap wrote:
This feature will allow the KVM guest to allow the handling of
pointer authentication instructions or to treat them as undefined
if not set. It uses the existing vcpu API
Hi Mark,
On 2/21/19 5:59 PM, Mark Rutland wrote:
On Tue, Feb 19, 2019 at 02:54:28PM +0530, Amit Daniel Kachhap wrote:
From: Mark Rutland
When pointer authentication is supported, a guest may wish to use it.
This patch adds the necessary KVM infrastructure for this to work, with
a semi-lazy
Hi,
On 2/21/19 5:20 PM, Mark Rutland wrote:
Hi,
On Tue, Feb 19, 2019 at 02:54:26PM +0530, Amit Daniel Kachhap wrote:
From: Mark Rutland
When restoring HCR_EL2 for the host, KVM uses HCR_HOST_VHE_FLAGS, which
is a constant value. This works today, as the host HCR_EL2 value is
always the same
8]:
https://lore.kernel.org/linux-arm-kernel/1547757219-19439-13-git-send-email-dave.mar...@arm.com/
Linux (5.0-rc6 based):
Amit Daniel Kachhap (5):
arm64/kvm: preserve host HCR_EL2 value
arm64/kvm: preserve host MDCR_EL2 value
arm64/kvm: context-switch ptrauth registers
arm64/kvm: add a userspace
physical CPU which
supports the relevant feature). Hence, this patch expects both type of
authentication to be present in a cpu.
Signed-off-by: Mark Rutland
[Only VHE, key switch from from assembly, kvm_supports_ptrauth
checks, save host key in vcpu_load]
Signed-off-by: Amit Daniel Kachhap
.
Signed-off-by: Amit Daniel Kachhap
Cc: Marc Zyngier
Cc: Mark Rutland
Cc: Christoffer Dall
Cc: kvm...@lists.cs.columbia.edu
---
arch/arm/include/asm/kvm_host.h | 1 -
arch/arm64/include/asm/kvm_host.h | 6 ++
arch/arm64/kvm/debug.c| 28 ++--
arch/arm64/kvm
via
SET/GET_ONE_REG interface as just a flag (KVM_ARM_VCPU_PTRAUTH)
supplied is enough to enable this feature.
Signed-off-by: Amit Daniel Kachhap
Cc: Mark Rutland
Cc: Marc Zyngier
Cc: Christoffer Dall
Cc: kvm...@lists.cs.columbia.edu
---
Documentation/arm64/pointer-authentication.txt | 9
).
Signed-off-by: Amit Daniel Kachhap
Cc: Mark Rutland
Cc: Marc Zyngier
Cc: Christoffer Dall
Cc: kvm...@lists.cs.columbia.edu
---
This patch needs patch [1] by Dave Martin and adds feature to manage
accessibility in a scalable way.
[1]:
https://lore.kernel.org/linux-arm-kernel/1547757219-19439
This is a runtime capabality for KVM tool to enable Armv8.3 Pointer
Authentication in guest kernel. A command line option --ptrauth is
required for this.
Signed-off-by: Amit Daniel Kachhap
---
arm/aarch32/include/kvm/kvm-cpu-arch.h| 1 +
arm/aarch64/include/asm/kvm.h | 1 +
arm
__tlb_switch_to_guest_vhe().
The value of hcr_el2 is now stored in struct kvm_cpu_context as both host
and guest can now use this field in a common way.
Signed-off-by: Mark Rutland
[Added __cpu_copy_hyp_conf, hcr_el2 field in struct kvm_cpu_context]
Signed-off-by: Amit Daniel Kachhap
Cc: Marc Zyngier
Cc: Christoffer
Hi,
On 2/13/19 11:24 PM, Dave P Martin wrote:
On Wed, Feb 13, 2019 at 05:35:46PM +, Kristina Martsenko wrote:
On 28/01/2019 06:58, Amit Daniel Kachhap wrote:
According to userspace settings, ptrauth key registers are conditionally
present in guest system register list based on user
Hi,
On 2/13/19 11:05 PM, Kristina Martsenko wrote:
On 28/01/2019 06:58, Amit Daniel Kachhap wrote:
This feature will allow the KVM guest to allow the handling of
pointer authentication instructions or to treat them as undefined
if not set. It uses the existing vcpu API KVM_ARM_VCPU_INIT to
Hi,
On 2/13/19 11:05 PM, Kristina Martsenko wrote:
On 31/01/2019 16:25, James Morse wrote:
Hi Amit,
On 28/01/2019 06:58, Amit Daniel Kachhap wrote:
When pointer authentication is supported, a guest may wish to use it.
This patch adds the necessary KVM infrastructure for this to work, with
a
Hi,
On 2/13/19 11:04 PM, Kristina Martsenko wrote:
Hi Amit,
(Please always Cc: everyone who commented on previous versions of the
series.)
On 28/01/2019 06:58, Amit Daniel Kachhap wrote:
When pointer authentication is supported, a guest may wish to use it.
This patch adds the necessary KVM
Hi,
On 2/13/19 11:04 PM, Kristina Martsenko wrote:
On 28/01/2019 06:58, Amit Daniel Kachhap wrote:
When restoring HCR_EL2 for the host, KVM uses HCR_HOST_VHE_FLAGS, which
is a constant value. This works today, as the host HCR_EL2 value is
always the same, but this will get in the way of
Hi,
On 2/13/19 11:02 PM, Kristina Martsenko wrote:
On 31/01/2019 16:20, James Morse wrote:
Hi Amit,
On 28/01/2019 06:58, Amit Daniel Kachhap wrote:
The keys can be switched either inside an assembly or such
functions which do not have pointer authentication checks, so a GCC
attribute is
Hi,
On 1/31/19 9:57 PM, James Morse wrote:
Hi Amit,
On 28/01/2019 06:58, Amit Daniel Kachhap wrote:
This feature will allow the KVM guest to allow the handling of
pointer authentication instructions or to treat them as undefined
if not set. It uses the existing vcpu API KVM_ARM_VCPU_INIT to
Hi James,
On 1/31/19 9:55 PM, James Morse wrote:
Hi Amit,
On 28/01/2019 06:58, Amit Daniel Kachhap wrote:
When pointer authentication is supported, a guest may wish to use it.
This patch adds the necessary KVM infrastructure for this to work, with
a semi-lazy context switch of the pointer
Hi James,
Little late in replying as some issue in my mail settings.
On 1/31/19 9:52 PM, James Morse wrote:
Hi Amit,
On 28/01/2019 06:58, Amit Daniel Kachhap wrote:
When restoring HCR_EL2 for the host, KVM uses HCR_HOST_VHE_FLAGS, which
is a constant value. This works today, as the host
Hi James,
On Fri, Jan 4, 2019 at 11:32 PM James Morse wrote:
>
> Hi Amit,
>
> On 18/12/2018 07:56, Amit Daniel Kachhap wrote:
> > According to userspace settings, pointer authentication cpufeature
> > is enabled/disabled from guests.
>
> This reads like the guest is
This is a runtime feature and can be enabled by --ptrauth option.
Signed-off-by: Amit Daniel Kachhap
Cc: Mark Rutland
Cc: Christoffer Dall
Cc: Marc Zyngier
Cc: Kristina Martsenko
Cc: kvm...@lists.cs.columbia.edu
Cc: Ramana Radhakrishnan
Cc: Will Deacon
---
arm/aarch32/include/kvm/kvm-cpu
According to userspace settings, ptrauth key registers are conditionally
present in guest system register list based on user specified flag
KVM_ARM_VCPU_PTRAUTH.
Signed-off-by: Amit Daniel Kachhap
Cc: Mark Rutland
Cc: Christoffer Dall
Cc: Marc Zyngier
Cc: Kristina Martsenko
Cc: kvm
attempts will result in an UNDEF
being taken by the guest.
Signed-off-by: Mark Rutland
Signed-off-by: Amit Daniel Kachhap
Cc: Marc Zyngier
Cc: Christoffer Dall
Cc: Kristina Martsenko
Cc: kvm...@lists.cs.columbia.edu
Cc: Ramana Radhakrishnan
Cc: Will Deacon
---
arch/arm/include/asm/kvm_host.h
via
SET/GET_ONE_REG interface as just a flag (KVM_ARM_VCPU_PTRAUTH)
supplied is enough to enable this feature.
Signed-off-by: Amit Daniel Kachhap
Cc: Mark Rutland
Cc: Marc Zyngier
Cc: Christoffer Dall
Cc: Kristina Martsenko
Cc: kvm...@lists.cs.columbia.edu
Cc: Ramana Radhakrishnan
Cc: Will
/lkml/2018/10/17/594
[6]: https://lkml.org/lkml/2018/12/18/80
Linux (5.0-rc3 based):
Amit Daniel Kachhap (5):
arm64: Add utilities to save restore pointer authentication keys
arm64/kvm: preserve host HCR_EL2/MDCR_EL2 value
arm64/kvm: context-switch ptrauth registers
arm64/kvm: add a
MDCR_EL2 value is fetched in a similar way and restored
after every switch from host to guest. There should not be any change in
functionality due to this.
Signed-off-by: Mark Rutland
Signed-off-by: Amit Daniel Kachhap
Cc: Marc Zyngier
Cc: Christoffer Dall
Cc: Kristina Martsenko
Cc: kvm
may be useful for save/restore scenarios when CPU changes
privilege levels, suspend/resume etc.
Signed-off-by: Amit Daniel Kachhap
Cc: Mark Rutland
Cc: Marc Zyngier
Cc: Christoffer Dall
Cc: Kristina Martsenko
Cc: kvm...@lists.cs.columbia.edu
Cc: Ramana Radhakrishnan
Cc: Will Deacon
Hi,
On Fri, Jan 4, 2019 at 11:32 PM James Morse wrote:
>
> Hi Amit,
>
> On 18/12/2018 07:56, Amit Daniel Kachhap wrote:
> > According to userspace settings, pointer authentication cpufeature
> > is enabled/disabled from guests.
>
> This reads like the guest is
Hi,
On Sat, Jan 5, 2019 at 12:05 AM James Morse wrote:
>
> Hi Amit,
>
> On 18/12/2018 07:56, Amit Daniel Kachhap wrote:
> > This feature will allow the KVM guest to allow the handling of
> > pointer authentication instructions or to treat them as undefined
> > if
Hi,
On Sat, Jan 5, 2019 at 12:05 AM James Morse wrote:
>
> Hi Amit,
>
> On 18/12/2018 07:56, Amit Daniel Kachhap wrote:
> > When pointer authentication is supported, a guest may wish to use it.
> > This patch adds the necessary KVM infrastructure for this to work, with
Hi,
On Sat, Jan 5, 2019 at 12:05 AM James Morse wrote:
>
> Hi Amit,
>
> On 18/12/2018 07:56, Amit Daniel Kachhap wrote:
> > When restoring HCR_EL2 for the host, KVM uses HCR_HOST_VHE_FLAGS, which
> > is a constant value. This works today, as the host HCR_EL2 value is
ince v5:
>
> * fix mentioned pc in x0 to hold the start address of the call site,
> not the return address or the branch address.
> This resolves the problem found by Amit.
Function graph tracer display works fine with this version. From my side,
Tested by: Amit Da
via
SET/GET_ONE_REG interface as just a flag (KVM_ARM_VCPU_PTRAUTH)
supplied is enough to select this feature.
Signed-off-by: Amit Daniel Kachhap
Cc: Mark Rutland
Cc: Marc Zyngier
Cc: Christoffer Dall
Cc: kvm...@lists.cs.columbia.edu
---
Documentation/arm64/pointer-authentication.txt | 9
Rutland
Signed-off-by: Amit Daniel Kachhap
Cc: Marc Zyngier
Cc: Christoffer Dall
Cc: kvm...@lists.cs.columbia.edu
---
arch/arm/include/asm/kvm_host.h | 2 ++
arch/arm64/include/asm/kvm_asm.h | 2 ++
arch/arm64/include/asm/kvm_host.h | 14 --
arch/arm64/kvm/hyp/switch.c
According to userspace settings, pointer authentication cpufeature
is enabled/disabled from guests.
Signed-off-by: Amit Daniel Kachhap
Cc: Mark Rutland
Cc: Christoffer Dall
Cc: Marc Zyngier
Cc: kvm...@lists.cs.columbia.edu
---
Documentation/arm64/pointer-authentication.txt | 3 +++
arch
According to userspace settings, ptrauth key registers are conditionally
present in guest system register list based on user specified flag
KVM_ARM_VCPU_PTRAUTH.
Signed-off-by: Amit Daniel Kachhap
Cc: Mark Rutland
Cc: Christoffer Dall
Cc: Marc Zyngier
Cc: kvm...@lists.cs.columbia.edu
This is a runtime feature and can be enabled by --ptrauth option.
Signed-off-by: Amit Daniel Kachhap
Cc: Mark Rutland
Cc: Christoffer Dall
Cc: Marc Zyngier
Cc: kvm...@lists.cs.columbia.edu
---
arm/aarch32/include/kvm/kvm-cpu-arch.h| 2 ++
arm/aarch64/include/asm/kvm.h | 3
attemts will result in an UNDEF
being taken by the guest.
Signed-off-by: Mark Rutland
Signed-off-by: Amit Daniel Kachhap
Cc: Marc Zyngier
Cc: Christoffer Dall
Cc: kvm...@lists.cs.columbia.edu
---
arch/arm/include/asm/kvm_host.h | 1 +
arch/arm64/include/asm/cpufeature.h | 6 +++
arch/arm64
https://lkml.org/lkml/2018/10/17/594
Linux (4.20-rc5 based):
Amit Daniel Kachhap (5):
arm64/kvm: preserve host HCR_EL2 value
arm64/kvm: context-switch ptrauth registers
arm64/kvm: add a userspace option to enable pointer authentication
arm64/kvm: enable pointer authentication cpufe
Hi,
On Sat, Dec 15, 2018 at 6:14 PM Torsten Duwe wrote:
>
> On Fri, 14 Dec 2018 21:45:03 +0530
> Amit Daniel Kachhap wrote:
>
> > Sorry I didn't mention my environment. I am using 4.20-rc3 and it has
> > all the above 8 extra patches
> > mentioned by you.
&g
Hi,
On Fri, Dec 14, 2018 at 3:18 PM Torsten Duwe wrote:
>
> On Thu, Dec 13, 2018 at 11:01:38PM +0530, Amit Daniel Kachhap wrote:
> > On Fri, Nov 30, 2018 at 9:53 PM Torsten Duwe wrote:
> >
> > Hi Torsten,
> >
> > I was testing your patch and it seems to work f
On Fri, Nov 30, 2018 at 9:53 PM Torsten Duwe wrote:
>
> Use -fpatchable-function-entry (gcc8) to add 2 NOPs at the beginning
> of each function. Replace the first NOP thus generated with a quick LR
> saver (move it to scratch reg x9), so the 2nd replacement insn, the call
> to ftrace, does not clo
This fix rounds the clock rate properly by using quotient and not
remainder in the calculation. This issue was found while testing HDMI
in the Juno platform.
Fixes: 6d6a1d82eaef7 ("clk: add support for clocks provided by SCMI")
Acked-by: Sudeep Holla
Signed-off-by: Amit Dani
On Mon, Jul 30, 2018 at 5:10 PM, Sudeep Holla wrote:
> On Mon, Jul 30, 2018 at 11:03:51AM +0530, Amit Daniel Kachhap wrote:
>> Hi,
>>
>> On Fri, Jul 27, 2018 at 10:07 PM, Stephen Boyd wrote:
>> > Quoting Amit Daniel Kachhap (2018-07-27 07:01:52)
>> >>
Hi,
On Fri, Jul 27, 2018 at 10:07 PM, Stephen Boyd wrote:
> Quoting Amit Daniel Kachhap (2018-07-27 07:01:52)
>> This fix rounds the clock rate properly by using quotient and not
>> remainder in the calculation. This issue was found while testing HDMI
>> in the Juno platform
This fix rounds the clock rate properly by using quotient and not
remainder in the calculation. This issue was found while testing HDMI
in the Juno platform.
Signed-off-by: Amit Daniel Kachhap
---
drivers/clk/clk-scmi.c | 5 ++---
1 file changed, 2 insertions(+), 3 deletions(-)
diff --git a
On Fri, Aug 21, 2015 at 2:58 PM, Alim Akhtar wrote:
> From: Seungwon Jeon
>
> This patch introduces Exynos UFS host controller driver,
> which mainly handles vendor-specific operations including
> link startup, power mode change and hibernation/unhibernation.
>
> Signed-off-by: Seungwon Jeon
> S
On Fri, Aug 21, 2015 at 2:58 PM, Alim Akhtar wrote:
> From: Seungwon Jeon
>
> Behavior of the "powwer mode change" contains vendor specific
s/powwer/power
> operation known as pwr_change_notify. This change adds return
> for pwr_change_notify to find success or failure.
>
> Signed-off-by: Seungwo
On Fri, Aug 21, 2015 at 2:57 PM, Alim Akhtar wrote:
> From: Seungwon Jeon
>
> It can be used in the vendor's driver for the specific purpose.
more description of this log will be useful.
>
> Signed-off-by: Seungwon Jeon
> Signed-off-by: Alim Akhtar
> ---
> drivers/scsi/ufs/ufshcd.c |5 ++--
On Fri, Aug 21, 2015 at 2:57 PM, Alim Akhtar wrote:
> From: Seungwon Jeon
>
> Some host controller needs specific handling before/after
> (un)hibernation, This change adds specific callback function
> to support vendor's implementation.
>
> Signed-off-by: Seungwon Jeon
> Signed-off-by: Alim Akht
Few comments below,
On Fri, Aug 21, 2015 at 2:57 PM, Alim Akhtar wrote:
> From: Seungwon Jeon
>
> Some host controller supports interrupt aggregation, but doesn't
> allow to reset counter and timer by s/w.
>
> Signed-off-by: Seungwon Jeon
> Signed-off-by: Alim Akhtar
> ---
> drivers/scsi/ufs/
Few minor comments below,
On Fri, Aug 21, 2015 at 2:57 PM, Alim Akhtar wrote:
> From: Seungwon Jeon
>
> UTRD(UTP Transfer Request Descriptor)'s field such as offset/length,
> especially response's has DWORD expression. This quirk can be specified
> for host controller not to conform standard.
>
Hi,
Few minor comments,
On Fri, Aug 21, 2015 at 2:57 PM, Alim Akhtar wrote:
> From: Seungwon Jeon
>
> This patch introduces Exynos UFS PHY driver. This driver
> supports to deal with phy calibration and power control
> according to UFS host driver's behavior.
>
> Signed-off-by: Seungwon Jeon
>
Hi Sascha,
On Thu, Mar 26, 2015 at 9:23 PM, Sascha Hauer wrote:
> commit e6e238c38 (thermal: sysfs: Add a new sysfs node emul_temp for
> thermal emulation) promised not to emulate critical temperatures,
> but the check for critical temperatures is broken in multiple ways:
>
> - The code should o
Hi Alan,
On Mon, Feb 9, 2015 at 9:28 PM, Alan Stern wrote:
> On Mon, 9 Feb 2015, Amit Daniel Kachhap wrote:
>
>> This API creates a pm runtime slave type device which does not itself
>> participates in pm runtime but depends on the master devices to power
>> manage them.
Based on the runtime request of the active device, the callbacks of
the passive pm runtime devices will be invoked.
Signed-off-by: Amit Daniel Kachhap
---
drivers/base/power/domain.c | 28
1 file changed, 28 insertions(+)
diff --git a/drivers/base/power/domain.c b
device with the power domain.
Signed-off-by: Amit Daniel Kachhap
---
drivers/clk/samsung/clk.c | 93 +++
drivers/clk/samsung/clk.h | 11 ++
2 files changed, 104 insertions(+)
diff --git a/drivers/clk/samsung/clk.c b/drivers/clk/samsung/clk.c
index
/pm_runtime_put due to subsystems interaction
behaviour or any other reason.
Signed-off-by: Amit Daniel Kachhap
---
drivers/base/power/runtime.c | 18 ++
include/linux/pm.h | 1 +
include/linux/pm_runtime.h | 2 ++
3 files changed, 21 insertions(+)
diff --git a/drivers
(http://www.spinics.net/lists/linux-samsung-soc/msg38442.html)
This work may also assist exynos iommu pm runtime posted earlier by Marek
http://lists.linaro.org/pipermail/linaro-mm-sig/2014-August/004099.html
Amit Daniel Kachhap (3):
PM / Runtime: Add an API pm_runtime_set_slave
PM / Domains: Save re
Hi Karol,
I guess this patch series is not complete and use case implementation
will be more helpful for clarity. Also I can think of another way in
which this complete implementation can be done with pd name as
something "pd-virt". This pd can be handled differently inside the
platform specific e
On Wed, Dec 17, 2014 at 6:38 PM, Marek Szyprowski
wrote:
> Hello,
>
>
> On 2014-12-17 03:43, amit daniel kachhap wrote:
>>
>> On Tue, Dec 16, 2014 at 4:40 PM, Marek Szyprowski
>> wrote:
>>>
>>> Hello,
>>>
>>> On 2014-12-13 17
On Wed, Dec 17, 2014 at 3:40 AM, Kevin Hilman wrote:
> Marek Szyprowski writes:
>
>> Hello,
>>
>> On 2014-12-13 17:51, Amit Daniel Kachhap wrote:
>>> Instead of using bool to restore suspended devices initially, use flags
>>> like GPD_
On Tue, Dec 16, 2014 at 4:40 PM, Marek Szyprowski
wrote:
> Hello,
>
> On 2014-12-13 17:51, Amit Daniel Kachhap wrote:
>>
>> Instead of using bool to restore suspended devices initially, use flags
>> like GPD_DEV_SUSPEND_INIT, GPD_DEV_RESTORE_INIT and GPD_DEV_RESTORE_FO
: Amit Daniel Kachhap
---
Changes from v1:
* Added Ulf Hansson Reviewed by.
* Cc'd to linux-pm
This patch may solve the same purpose which is done by earlier posts
1) https://lkml.org/lkml/2014/11/24/319 - In this there were comments
for not using the PM domain name.
2) Ulf Hansson posted a
-off-by: Amit Daniel Kachhap
---
This work is continuation of earlier work,
In V2: Completely removed notfiers and add support for huge clock list to be
suspended and restored. There was some issue in this as some clocks are
not exposed and are just initialised by bootloaders. This
device with the power domain.
Signed-off-by: Amit Daniel Kachhap
---
drivers/clk/samsung/clk.c | 95 +++
drivers/clk/samsung/clk.h | 11 ++
2 files changed, 106 insertions(+)
diff --git a/drivers/clk/samsung/clk.c b/drivers/clk/samsung/clk.c
index
On Thu, Dec 4, 2014 at 9:09 PM, Ulf Hansson wrote:
> On 1 December 2014 at 12:41, Amit Daniel Kachhap
> wrote:
>> This function looks up a PM domain form the provider. This will be
>> useful to add parent/child domain relationship from the SoC specific
>> code. The cal
On Wed, Dec 3, 2014 at 6:03 PM, Marek Szyprowski
wrote:
> This patch adds support for making one power domain a sub-domain of
> other domain. This is useful for modeling power dependences for devices
> like TV Mixer or Camera ISP, which needs to have more than one power
> domain enabled to be oper
This function looks up a PM domain form the provider. This will be
useful to add parent/child domain relationship from the SoC specific
code. The caller of the function must make sure that PM domain provider
is already registered.
Signed-off-by: Amit Daniel Kachhap
---
This patch may solve the
On Thu, Nov 27, 2014 at 7:50 PM, Ulf Hansson wrote:
> On 25 November 2014 at 09:48, amit daniel kachhap
> wrote:
>> On Tue, Nov 25, 2014 at 1:05 PM, Ulf Hansson wrote:
>>> On 24 November 2014 at 14:04, Amit Daniel Kachhap
>>> wrote:
>>>> This API ma
On Tue, Nov 25, 2014 at 1:29 PM, Ulf Hansson wrote:
> On 24 November 2014 at 14:04, Amit Daniel Kachhap
> wrote:
>> This patch adds supports for parent power domain. This will ensure
>> invoking of parent/child power domain on/off in a correct sequence.
>> In exy
On Tue, Nov 25, 2014 at 1:05 PM, Ulf Hansson wrote:
> On 24 November 2014 at 14:04, Amit Daniel Kachhap
> wrote:
>> This API may be needed to set the power domain parent/child relationship
>> in the power domain platform driver. The parent relationship is
>> generally s
1 - 100 of 532 matches
Mail list logo