]> www.infradead.org Git - users/jedix/linux-maple.git/log
users/jedix/linux-maple.git
4 years agomm-introduce-memfd_secret-system-call-to-create-secret-memory-areas-fix
Andrew Morton [Wed, 2 Jun 2021 03:53:26 +0000 (13:53 +1000)]
mm-introduce-memfd_secret-system-call-to-create-secret-memory-areas-fix

suppress Kconfig whine

Cc: Mike Rapoport <rppt@linux.ibm.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Stephen Rothwell <sfr@canb.auug.org.au>
4 years agomm: introduce memfd_secret system call to create "secret" memory areas
Mike Rapoport [Wed, 2 Jun 2021 03:53:26 +0000 (13:53 +1000)]
mm: introduce memfd_secret system call to create "secret" memory areas

Introduce "memfd_secret" system call with the ability to create memory
areas visible only in the context of the owning process and not mapped not
only to other processes but in the kernel page tables as well.

The secretmem feature is off by default and the user must explicitly
enable it at the boot time.

Once secretmem is enabled, the user will be able to create a file
descriptor using the memfd_secret() system call.  The memory areas created
by mmap() calls from this file descriptor will be unmapped from the kernel
direct map and they will be only mapped in the page table of the processes
that have access to the file descriptor.

Secretmem is designed to provide the following protections:

* Enhanced protection (in conjunction with all the other in-kernel
  attack prevention systems) against ROP attacks.  Seceretmem makes
  "simple" ROP insufficient to perform exfiltration, which increases the
  required complexity of the attack.  Along with other protections like
  the kernel stack size limit and address space layout randomization which
  make finding gadgets is really hard, absence of any in-kernel primitive
  for accessing secret memory means the one gadget ROP attack can't work.
  Since the only way to access secret memory is to reconstruct the missing
  mapping entry, the attacker has to recover the physical page and insert
  a PTE pointing to it in the kernel and then retrieve the contents.  That
  takes at least three gadgets which is a level of difficulty beyond most
  standard attacks.

* Prevent cross-process secret userspace memory exposures.  Once the
  secret memory is allocated, the user can't accidentally pass it into the
  kernel to be transmitted somewhere.  The secreremem pages cannot be
  accessed via the direct map and they are disallowed in GUP.

* Harden against exploited kernel flaws.  In order to access secretmem,
  a kernel-side attack would need to either walk the page tables and
  create new ones, or spawn a new privileged uiserspace process to perform
  secrets exfiltration using ptrace.

The file descriptor based memory has several advantages over the
"traditional" mm interfaces, such as mlock(), mprotect(), madvise().  File
descriptor approach allows explicit and controlled sharing of the memory
areas, it allows to seal the operations.  Besides, file descriptor based
memory paves the way for VMMs to remove the secret memory range from the
userspace hipervisor process, for instance QEMU.  Andy Lutomirski says:

  "Getting fd-backed memory into a guest will take some possibly major
  work in the kernel, but getting vma-backed memory into a guest without
  mapping it in the host user address space seems much, much worse."

memfd_secret() is made a dedicated system call rather than an extension to
memfd_create() because it's purpose is to allow the user to create more
secure memory mappings rather than to simply allow file based access to
the memory.  Nowadays a new system call cost is negligible while it is way
simpler for userspace to deal with a clear-cut system calls than with a
multiplexer or an overloaded syscall.  Moreover, the initial
implementation of memfd_secret() is completely distinct from
memfd_create() so there is no much sense in overloading memfd_create() to
begin with.  If there will be a need for code sharing between these
implementation it can be easily achieved without a need to adjust user
visible APIs.

The secret memory remains accessible in the process context using uaccess
primitives, but it is not exposed to the kernel otherwise; secret memory
areas are removed from the direct map and functions in the
follow_page()/get_user_page() family will refuse to return a page that
belongs to the secret memory area.

Once there will be a use case that will require exposing secretmem to the
kernel it will be an opt-in request in the system call flags so that user
would have to decide what data can be exposed to the kernel.

Removing of the pages from the direct map may cause its fragmentation on
architectures that use large pages to map the physical memory which
affects the system performance.  However, the original Kconfig text for
CONFIG_DIRECT_GBPAGES said that gigabyte pages in the direct map "...  can
improve the kernel's performance a tiny bit ..." (commit 00d1c5e05736
("x86: add gbpages switches")) and the recent report [1] showed that "...
although 1G mappings are a good default choice, there is no compelling
evidence that it must be the only choice".  Hence, it is sufficient to
have secretmem disabled by default with the ability of a system
administrator to enable it at boot time.

Pages in the secretmem regions are unevictable and unmovable to avoid
accidental exposure of the sensitive data via swap or during page
migration.

Since the secretmem mappings are locked in memory they cannot exceed
RLIMIT_MEMLOCK.  Since these mappings are already locked independently
from mlock(), an attempt to mlock()/munlock() secretmem range would fail
and mlockall()/munlockall() will ignore secretmem mappings.

However, unlike mlock()ed memory, secretmem currently behaves more like
long-term GUP: secretmem mappings are unmovable mappings directly consumed
by user space.  With default limits, there is no excessive use of
secretmem and it poses no real problem in combination with
ZONE_MOVABLE/CMA, but in the future this should be addressed to allow
balanced use of large amounts of secretmem along with ZONE_MOVABLE/CMA.

A page that was a part of the secret memory area is cleared when it is
freed to ensure the data is not exposed to the next user of that page.

The following example demonstrates creation of a secret mapping (error
handling is omitted):

fd = memfd_secret(0);
ftruncate(fd, MAP_SIZE);
ptr = mmap(NULL, MAP_SIZE, PROT_READ | PROT_WRITE,
   MAP_SHARED, fd, 0);

[1] https://lore.kernel.org/linux-mm/213b4567-46ce-f116-9cdf-bbd0c884eb3c@linux.intel.com/

Link: https://lkml.kernel.org/r/20210518072034.31572-5-rppt@kernel.org
Signed-off-by: Mike Rapoport <rppt@linux.ibm.com>
Acked-by: Hagen Paul Pfeifer <hagen@jauu.net>
Acked-by: James Bottomley <James.Bottomley@HansenPartnership.com>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Arnd Bergmann <arnd@arndb.de>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Catalin Marinas <catalin.marinas@arm.com>
Cc: Christopher Lameter <cl@linux.com>
Cc: Dan Williams <dan.j.williams@intel.com>
Cc: Dave Hansen <dave.hansen@linux.intel.com>
Cc: Elena Reshetova <elena.reshetova@intel.com>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: James Bottomley <jejb@linux.ibm.com>
Cc: "Kirill A. Shutemov" <kirill@shutemov.name>
Cc: Matthew Wilcox <willy@infradead.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Michael Kerrisk <mtk.manpages@gmail.com>
Cc: Palmer Dabbelt <palmer@dabbelt.com>
Cc: Palmer Dabbelt <palmerdabbelt@google.com>
Cc: Paul Walmsley <paul.walmsley@sifive.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Rick Edgecombe <rick.p.edgecombe@intel.com>
Cc: Roman Gushchin <guro@fb.com>
Cc: Shakeel Butt <shakeelb@google.com>
Cc: Shuah Khan <shuah@kernel.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Tycho Andersen <tycho@tycho.ws>
Cc: Will Deacon <will@kernel.org>
Cc: David Hildenbrand <david@redhat.com>
Cc: kernel test robot <lkp@intel.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Stephen Rothwell <sfr@canb.auug.org.au>
4 years agoset_memory: allow querying whether set_direct_map_*() is actually enabled
Mike Rapoport [Wed, 2 Jun 2021 03:53:26 +0000 (13:53 +1000)]
set_memory: allow querying whether set_direct_map_*() is actually enabled

On arm64, set_direct_map_*() functions may return 0 without actually
changing the linear map.  This behaviour can be controlled using kernel
parameters, so we need a way to determine at runtime whether calls to
set_direct_map_invalid_noflush() and set_direct_map_default_noflush() have
any effect.

Extend set_memory API with can_set_direct_map() function that allows
checking if calling set_direct_map_*() will actually change the page
table, replace several occurrences of open coded checks in arm64 with the
new function and provide a generic stub for architectures that always
modify page tables upon calls to set_direct_map APIs.

[arnd@arndb.de: arm64: kfence: fix header inclusion ]
Link: https://lkml.kernel.org/r/20210518072034.31572-4-rppt@kernel.org
Signed-off-by: Mike Rapoport <rppt@linux.ibm.com>
Reviewed-by: Catalin Marinas <catalin.marinas@arm.com>
Reviewed-by: David Hildenbrand <david@redhat.com>
Acked-by: James Bottomley <James.Bottomley@HansenPartnership.com>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Arnd Bergmann <arnd@arndb.de>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Christopher Lameter <cl@linux.com>
Cc: Dan Williams <dan.j.williams@intel.com>
Cc: Dave Hansen <dave.hansen@linux.intel.com>
Cc: Elena Reshetova <elena.reshetova@intel.com>
Cc: Hagen Paul Pfeifer <hagen@jauu.net>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: James Bottomley <jejb@linux.ibm.com>
Cc: "Kirill A. Shutemov" <kirill@shutemov.name>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Matthew Wilcox <willy@infradead.org>
Cc: Michael Kerrisk <mtk.manpages@gmail.com>
Cc: Palmer Dabbelt <palmer@dabbelt.com>
Cc: Palmer Dabbelt <palmerdabbelt@google.com>
Cc: Paul Walmsley <paul.walmsley@sifive.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Rick Edgecombe <rick.p.edgecombe@intel.com>
Cc: Roman Gushchin <guro@fb.com>
Cc: Shakeel Butt <shakeelb@google.com>
Cc: Shuah Khan <shuah@kernel.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Tycho Andersen <tycho@tycho.ws>
Cc: Will Deacon <will@kernel.org>
Cc: kernel test robot <lkp@intel.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Stephen Rothwell <sfr@canb.auug.org.au>
4 years agoriscv/Kconfig: make direct map manipulation options depend on MMU
Mike Rapoport [Wed, 2 Jun 2021 03:53:25 +0000 (13:53 +1000)]
riscv/Kconfig: make direct map manipulation options depend on MMU

ARCH_HAS_SET_DIRECT_MAP and ARCH_HAS_SET_MEMORY configuration options have
no meaning when CONFIG_MMU is disabled and there is no point to enable
them for the nommu case.

Add an explicit dependency on MMU for these options.

Link: https://lkml.kernel.org/r/20210518072034.31572-3-rppt@kernel.org
Signed-off-by: Mike Rapoport <rppt@linux.ibm.com>
Reported-by: kernel test robot <lkp@intel.com>
Reviewed-by: David Hildenbrand <david@redhat.com>
Acked-by: James Bottomley <James.Bottomley@HansenPartnership.com>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Arnd Bergmann <arnd@arndb.de>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Catalin Marinas <catalin.marinas@arm.com>
Cc: Christopher Lameter <cl@linux.com>
Cc: Dan Williams <dan.j.williams@intel.com>
Cc: Dave Hansen <dave.hansen@linux.intel.com>
Cc: Elena Reshetova <elena.reshetova@intel.com>
Cc: Hagen Paul Pfeifer <hagen@jauu.net>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: James Bottomley <jejb@linux.ibm.com>
Cc: "Kirill A. Shutemov" <kirill@shutemov.name>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Matthew Wilcox <willy@infradead.org>
Cc: Michael Kerrisk <mtk.manpages@gmail.com>
Cc: Palmer Dabbelt <palmer@dabbelt.com>
Cc: Palmer Dabbelt <palmerdabbelt@google.com>
Cc: Paul Walmsley <paul.walmsley@sifive.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Rick Edgecombe <rick.p.edgecombe@intel.com>
Cc: Roman Gushchin <guro@fb.com>
Cc: Shakeel Butt <shakeelb@google.com>
Cc: Shuah Khan <shuah@kernel.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Tycho Andersen <tycho@tycho.ws>
Cc: Will Deacon <will@kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Stephen Rothwell <sfr@canb.auug.org.au>
4 years agommap: make mlock_future_check() global
Mike Rapoport [Wed, 2 Jun 2021 03:53:25 +0000 (13:53 +1000)]
mmap: make mlock_future_check() global

Patch series "mm: introduce memfd_secret system call to create "secret" memory areas", v20.

This is an implementation of "secret" mappings backed by a file
descriptor.

The file descriptor backing secret memory mappings is created using a
dedicated memfd_secret system call The desired protection mode for the
memory is configured using flags parameter of the system call.  The mmap()
of the file descriptor created with memfd_secret() will create a "secret"
memory mapping.  The pages in that mapping will be marked as not present
in the direct map and will be present only in the page table of the owning
mm.

Although normally Linux userspace mappings are protected from other users,
such secret mappings are useful for environments where a hostile tenant is
trying to trick the kernel into giving them access to other tenants
mappings.

It's designed to provide the following protections:

* Enhanced protection (in conjunction with all the other in-kernel
  attack prevention systems) against ROP attacks.  Seceretmem makes
  "simple" ROP insufficient to perform exfiltration, which increases the
  required complexity of the attack.  Along with other protections like
  the kernel stack size limit and address space layout randomization which
  make finding gadgets is really hard, absence of any in-kernel primitive
  for accessing secret memory means the one gadget ROP attack can't work.
  Since the only way to access secret memory is to reconstruct the missing
  mapping entry, the attacker has to recover the physical page and insert
  a PTE pointing to it in the kernel and then retrieve the contents.  That
  takes at least three gadgets which is a level of difficulty beyond most
  standard attacks.

* Prevent cross-process secret userspace memory exposures.  Once the
  secret memory is allocated, the user can't accidentally pass it into the
  kernel to be transmitted somewhere.  The secreremem pages cannot be
  accessed via the direct map and they are disallowed in GUP.

* Harden against exploited kernel flaws.  In order to access secretmem,
  a kernel-side attack would need to either walk the page tables and
  create new ones, or spawn a new privileged uiserspace process to perform
  secrets exfiltration using ptrace.

In the future the secret mappings may be used as a mean to protect guest
memory in a virtual machine host.

For demonstration of secret memory usage we've created a userspace library

https://git.kernel.org/pub/scm/linux/kernel/git/jejb/secret-memory-preloader.git

that does two things: the first is act as a preloader for openssl to
redirect all the OPENSSL_malloc calls to secret memory meaning any secret
keys get automatically protected this way and the other thing it does is
expose the API to the user who needs it.  We anticipate that a lot of the
use cases would be like the openssl one: many toolkits that deal with
secret keys already have special handling for the memory to try to give
them greater protection, so this would simply be pluggable into the
toolkits without any need for user application modification.

Hiding secret memory mappings behind an anonymous file allows usage of the
page cache for tracking pages allocated for the "secret" mappings as well
as using address_space_operations for e.g.  page migration callbacks.

The anonymous file may be also used implicitly, like hugetlb files, to
implement mmap(MAP_SECRET) and use the secret memory areas with "native"
mm ABIs in the future.

Removing of the pages from the direct map may cause its fragmentation on
architectures that use large pages to map the physical memory which
affects the system performance.  However, the original Kconfig text for
CONFIG_DIRECT_GBPAGES said that gigabyte pages in the direct map "...  can
improve the kernel's performance a tiny bit ..." (commit 00d1c5e05736
("x86: add gbpages switches")) and the recent report [1] showed that "...
although 1G mappings are a good default choice, there is no compelling
evidence that it must be the only choice".  Hence, it is sufficient to
have secretmem disabled by default with the ability of a system
administrator to enable it at boot time.

In addition, there is also a long term goal to improve management of the
direct map.

[1] https://lore.kernel.org/linux-mm/213b4567-46ce-f116-9cdf-bbd0c884eb3c@linux.intel.com/

This patch (of 7):

It will be used by the upcoming secret memory implementation.

Link: https://lkml.kernel.org/r/20210518072034.31572-1-rppt@kernel.org
Link: https://lkml.kernel.org/r/20210518072034.31572-2-rppt@kernel.org
Signed-off-by: Mike Rapoport <rppt@linux.ibm.com>
Reviewed-by: David Hildenbrand <david@redhat.com>
Acked-by: James Bottomley <James.Bottomley@HansenPartnership.com>
Cc: Alexander Viro <viro@zeniv.linux.org.uk>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Arnd Bergmann <arnd@arndb.de>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Catalin Marinas <catalin.marinas@arm.com>
Cc: Christopher Lameter <cl@linux.com>
Cc: Dan Williams <dan.j.williams@intel.com>
Cc: Dave Hansen <dave.hansen@linux.intel.com>
Cc: David Hildenbrand <david@redhat.com>
Cc: Elena Reshetova <elena.reshetova@intel.com>
Cc: Hagen Paul Pfeifer <hagen@jauu.net>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: James Bottomley <jejb@linux.ibm.com>
Cc: "Kirill A. Shutemov" <kirill@shutemov.name>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Matthew Wilcox <willy@infradead.org>
Cc: Michael Kerrisk <mtk.manpages@gmail.com>
Cc: Palmer Dabbelt <palmer@dabbelt.com>
Cc: Palmer Dabbelt <palmerdabbelt@google.com>
Cc: Paul Walmsley <paul.walmsley@sifive.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Rick Edgecombe <rick.p.edgecombe@intel.com>
Cc: Roman Gushchin <guro@fb.com>
Cc: Shakeel Butt <shakeelb@google.com>
Cc: Shuah Khan <shuah@kernel.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Tycho Andersen <tycho@tycho.ws>
Cc: Will Deacon <will@kernel.org>
Cc: kernel test robot <lkp@intel.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Stephen Rothwell <sfr@canb.auug.org.au>
4 years agomm/slub: use stackdepot to save stack trace in objects-fix
Vlastimil Babka [Wed, 2 Jun 2021 03:53:25 +0000 (13:53 +1000)]
mm/slub: use stackdepot to save stack trace in objects-fix

Paul reports [1] lockdep splat HARDIRQ-safe -> HARDIRQ-unsafe lock order
detected.  Kernel test robot reports [2]
BUG:sleeping_function_called_from_invalid_context_at_mm/page_alloc.c

The stack trace might be saved from contexts where we can't block so GFP_KERNEL
is unsafe. So use GFP_NOWAIT. Under memory pressure we might thus fail to save
some new unique stack, but that should be extremely rare.

[1] https://lore.kernel.org/linux-mm/20210515204622.GA2672367@paulmck-ThinkPad-P17-Gen-1/
[2] https://lore.kernel.org/linux-mm/20210516144152.GA25903@xsang-OptiPlex-9020/

Link: https://lkml.kernel.org/r/20210516195150.26740-1-vbabka@suse.cz
Signed-off-by: Vlastimil Babka <vbabka@suse.cz>
Reported-by: Paul E. McKenney <paulmck@kernel.org>
Tested-by: Paul E. McKenney <paulmck@kernel.org>
Reported-by: kernel test robot <oliver.sang@intel.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Stephen Rothwell <sfr@canb.auug.org.au>
4 years agoslub: STACKDEPOT: rename save_stack_trace()
Randy Dunlap [Wed, 2 Jun 2021 03:53:25 +0000 (13:53 +1000)]
slub: STACKDEPOT: rename save_stack_trace()

save_stack_trace() already exists, so change the one in
CONFIG_STACKDEPOT to be save_stack_depot_trace().

Fixes this build error:

../mm/slub.c:607:29: error: conflicting types for `save_stack_trace'
 static depot_stack_handle_t save_stack_trace(gfp_t flags)
                             ^~~~~~~~~~~~~~~~
In file included from ../include/linux/page_ext.h:6:0,
                 from ../include/linux/mm.h:25,
                 from ../mm/slub.c:13:
../include/linux/stacktrace.h:86:13: note: previous declaration of `save_stack_trace' was here
 extern void save_stack_trace(struct stack_trace *trace);
             ^~~~~~~~~~~~~~~~

from this patch in mmotm:
  Subject: mm/slub: use stackdepot to save stack trace in objects

Link: https://lkml.kernel.org/r/20210513051920.29320-1-rdunlap@infradead.org
Signed-off-by: Randy Dunlap <rdunlap@infradead.org>
Acked-by: Oliver Glitta <glittao@gmail.com>
Cc: Stephen Rothwell <sfr@canb.auug.org.au>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Stephen Rothwell <sfr@canb.auug.org.au>
4 years agomm/slub: use stackdepot to save stack trace in objects
Oliver Glitta [Wed, 2 Jun 2021 03:53:25 +0000 (13:53 +1000)]
mm/slub: use stackdepot to save stack trace in objects

Many stack traces are similar so there are many similar arrays.
Stackdepot saves each unique stack only once.

Replace field addrs in struct track with depot_stack_handle_t handle.  Use
stackdepot to save stack trace.

The benefits are smaller memory overhead and possibility to aggregate
per-cache statistics in the future using the stackdepot handle instead of
matching stacks manually.

Link: https://lkml.kernel.org/r/20210414163434.4376-1-glittao@gmail.com
Signed-off-by: Oliver Glitta <glittao@gmail.com>
Reviewed-by: Vlastimil Babka <vbabka@suse.cz>
Acked-by: David Rientjes <rientjes@google.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Pekka Enberg <penberg@kernel.org>
Cc: Joonsoo Kim <iamjoonsoo.kim@lge.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Stephen Rothwell <sfr@canb.auug.org.au>
4 years agoMerge branch 'akpm-current/current'
Stephen Rothwell [Thu, 3 Jun 2021 08:01:30 +0000 (18:01 +1000)]
Merge branch 'akpm-current/current'

4 years agoMerge remote-tracking branch 'tpmdd-jejb/tpmdd-for-next'
Stephen Rothwell [Thu, 3 Jun 2021 07:37:35 +0000 (17:37 +1000)]
Merge remote-tracking branch 'tpmdd-jejb/tpmdd-for-next'

4 years agoMerge remote-tracking branch 'cxl/next'
Stephen Rothwell [Thu, 3 Jun 2021 07:35:53 +0000 (17:35 +1000)]
Merge remote-tracking branch 'cxl/next'

4 years agoMerge remote-tracking branch 'rust/rust-next'
Stephen Rothwell [Thu, 3 Jun 2021 07:20:52 +0000 (17:20 +1000)]
Merge remote-tracking branch 'rust/rust-next'

# Conflicts:
# Makefile
# include/uapi/linux/android/binder.h
# kernel/printk/printk.c

4 years agoMerge remote-tracking branch 'memblock/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 07:18:42 +0000 (17:18 +1000)]
Merge remote-tracking branch 'memblock/for-next'

4 years agoMerge remote-tracking branch 'mhi/mhi-next'
Stephen Rothwell [Thu, 3 Jun 2021 07:17:03 +0000 (17:17 +1000)]
Merge remote-tracking branch 'mhi/mhi-next'

4 years agoMerge remote-tracking branch 'fpga/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 07:15:20 +0000 (17:15 +1000)]
Merge remote-tracking branch 'fpga/for-next'

4 years agoMerge remote-tracking branch 'auxdisplay/auxdisplay'
Stephen Rothwell [Thu, 3 Jun 2021 07:14:00 +0000 (17:14 +1000)]
Merge remote-tracking branch 'auxdisplay/auxdisplay'

4 years agoMerge remote-tracking branch 'hyperv/hyperv-next'
Stephen Rothwell [Thu, 3 Jun 2021 07:11:46 +0000 (17:11 +1000)]
Merge remote-tracking branch 'hyperv/hyperv-next'

4 years agoMerge remote-tracking branch 'nvmem/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 07:09:40 +0000 (17:09 +1000)]
Merge remote-tracking branch 'nvmem/for-next'

4 years agoMerge remote-tracking branch 'slimbus/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 07:08:01 +0000 (17:08 +1000)]
Merge remote-tracking branch 'slimbus/for-next'

# Conflicts:
# drivers/nvmem/Kconfig
# drivers/nvmem/Makefile

4 years agoMerge remote-tracking branch 'gnss/gnss-next'
Stephen Rothwell [Thu, 3 Jun 2021 07:06:18 +0000 (17:06 +1000)]
Merge remote-tracking branch 'gnss/gnss-next'

4 years agoMerge remote-tracking branch 'kspp/for-next/kspp'
Stephen Rothwell [Thu, 3 Jun 2021 06:51:13 +0000 (16:51 +1000)]
Merge remote-tracking branch 'kspp/for-next/kspp'

4 years agoMerge remote-tracking branch 'seccomp/for-next/seccomp'
Stephen Rothwell [Thu, 3 Jun 2021 06:37:40 +0000 (16:37 +1000)]
Merge remote-tracking branch 'seccomp/for-next/seccomp'

# Conflicts:
# kernel/seccomp.c

4 years agoMerge remote-tracking branch 'nvdimm/libnvdimm-for-next'
Stephen Rothwell [Thu, 3 Jun 2021 06:37:37 +0000 (16:37 +1000)]
Merge remote-tracking branch 'nvdimm/libnvdimm-for-next'

4 years agoMerge remote-tracking branch 'rtc/rtc-next'
Stephen Rothwell [Thu, 3 Jun 2021 06:35:27 +0000 (16:35 +1000)]
Merge remote-tracking branch 'rtc/rtc-next'

4 years agoMerge remote-tracking branch 'coresight/next'
Stephen Rothwell [Thu, 3 Jun 2021 06:35:23 +0000 (16:35 +1000)]
Merge remote-tracking branch 'coresight/next'

4 years agoMerge remote-tracking branch 'livepatching/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 06:35:23 +0000 (16:35 +1000)]
Merge remote-tracking branch 'livepatching/for-next'

4 years agoMerge remote-tracking branch 'userns/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 06:20:30 +0000 (16:20 +1000)]
Merge remote-tracking branch 'userns/for-next'

# Conflicts:
# include/linux/sched/user.h
# include/linux/user_namespace.h
# kernel/signal.c
# kernel/ucount.c

4 years agoMerge remote-tracking branch 'pwm/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 06:18:23 +0000 (16:18 +1000)]
Merge remote-tracking branch 'pwm/for-next'

4 years agoMerge remote-tracking branch 'pinctrl-renesas/renesas-pinctrl'
Stephen Rothwell [Thu, 3 Jun 2021 06:16:18 +0000 (16:16 +1000)]
Merge remote-tracking branch 'pinctrl-renesas/renesas-pinctrl'

4 years agoMerge remote-tracking branch 'pinctrl-intel/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 06:14:39 +0000 (16:14 +1000)]
Merge remote-tracking branch 'pinctrl-intel/for-next'

4 years agoMerge remote-tracking branch 'pinctrl/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 06:12:14 +0000 (16:12 +1000)]
Merge remote-tracking branch 'pinctrl/for-next'

# Conflicts:
# include/linux/pinctrl/pinconf-generic.h

4 years agoMerge remote-tracking branch 'gpio-intel/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 06:10:36 +0000 (16:10 +1000)]
Merge remote-tracking branch 'gpio-intel/for-next'

4 years agoMerge remote-tracking branch 'gpio-brgl/gpio/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 06:08:30 +0000 (16:08 +1000)]
Merge remote-tracking branch 'gpio-brgl/gpio/for-next'

4 years agoMerge remote-tracking branch 'rpmsg/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 06:06:16 +0000 (16:06 +1000)]
Merge remote-tracking branch 'rpmsg/for-next'

4 years agoMerge remote-tracking branch 'vhost/linux-next'
Stephen Rothwell [Thu, 3 Jun 2021 06:04:08 +0000 (16:04 +1000)]
Merge remote-tracking branch 'vhost/linux-next'

4 years agoMerge remote-tracking branch 'scsi-mkp/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 06:01:33 +0000 (16:01 +1000)]
Merge remote-tracking branch 'scsi-mkp/for-next'

4 years agoMerge remote-tracking branch 'scsi/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 05:58:58 +0000 (15:58 +1000)]
Merge remote-tracking branch 'scsi/for-next'

4 years agoMerge remote-tracking branch 'cgroup/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 05:49:06 +0000 (15:49 +1000)]
Merge remote-tracking branch 'cgroup/for-next'

4 years agoMerge remote-tracking branch 'dmaengine/next'
Stephen Rothwell [Thu, 3 Jun 2021 05:46:51 +0000 (15:46 +1000)]
Merge remote-tracking branch 'dmaengine/next'

4 years agoMerge remote-tracking branch 'icc/icc-next'
Stephen Rothwell [Thu, 3 Jun 2021 05:45:04 +0000 (15:45 +1000)]
Merge remote-tracking branch 'icc/icc-next'

4 years agoMerge remote-tracking branch 'iio/togreg'
Stephen Rothwell [Thu, 3 Jun 2021 05:43:06 +0000 (15:43 +1000)]
Merge remote-tracking branch 'iio/togreg'

4 years agoMerge remote-tracking branch 'staging/staging-next'
Stephen Rothwell [Thu, 3 Jun 2021 05:40:58 +0000 (15:40 +1000)]
Merge remote-tracking branch 'staging/staging-next'

4 years agoMerge remote-tracking branch 'thunderbolt/next'
Stephen Rothwell [Thu, 3 Jun 2021 05:39:21 +0000 (15:39 +1000)]
Merge remote-tracking branch 'thunderbolt/next'

4 years agoMerge remote-tracking branch 'soundwire/next'
Stephen Rothwell [Thu, 3 Jun 2021 05:37:38 +0000 (15:37 +1000)]
Merge remote-tracking branch 'soundwire/next'

4 years agoMerge remote-tracking branch 'phy-next/next'
Stephen Rothwell [Thu, 3 Jun 2021 05:35:29 +0000 (15:35 +1000)]
Merge remote-tracking branch 'phy-next/next'

4 years agoMerge remote-tracking branch 'extcon/extcon-next'
Stephen Rothwell [Thu, 3 Jun 2021 05:33:51 +0000 (15:33 +1000)]
Merge remote-tracking branch 'extcon/extcon-next'

4 years agoMerge remote-tracking branch 'char-misc/char-misc-next'
Stephen Rothwell [Thu, 3 Jun 2021 05:19:05 +0000 (15:19 +1000)]
Merge remote-tracking branch 'char-misc/char-misc-next'

4 years agoMerge remote-tracking branch 'tty/tty-next'
Stephen Rothwell [Thu, 3 Jun 2021 05:16:41 +0000 (15:16 +1000)]
Merge remote-tracking branch 'tty/tty-next'

4 years agoMerge remote-tracking branch 'usb-chipidea-next/for-usb-next'
Stephen Rothwell [Thu, 3 Jun 2021 05:15:02 +0000 (15:15 +1000)]
Merge remote-tracking branch 'usb-chipidea-next/for-usb-next'

4 years agoMerge remote-tracking branch 'usb-serial/usb-next'
Stephen Rothwell [Thu, 3 Jun 2021 05:13:18 +0000 (15:13 +1000)]
Merge remote-tracking branch 'usb-serial/usb-next'

4 years agoMerge remote-tracking branch 'usb/usb-next'
Stephen Rothwell [Thu, 3 Jun 2021 04:58:58 +0000 (14:58 +1000)]
Merge remote-tracking branch 'usb/usb-next'

4 years agoMerge remote-tracking branch 'driver-core/driver-core-next'
Stephen Rothwell [Thu, 3 Jun 2021 04:43:55 +0000 (14:43 +1000)]
Merge remote-tracking branch 'driver-core/driver-core-next'

4 years agoMerge remote-tracking branch 'ipmi/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 04:42:17 +0000 (14:42 +1000)]
Merge remote-tracking branch 'ipmi/for-next'

4 years agoMerge remote-tracking branch 'leds/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 04:40:07 +0000 (14:40 +1000)]
Merge remote-tracking branch 'leds/for-next'

4 years agoMerge remote-tracking branch 'drivers-x86/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 04:38:25 +0000 (14:38 +1000)]
Merge remote-tracking branch 'drivers-x86/for-next'

# Conflicts:
# drivers/platform/surface/surface_aggregator_registry.c

4 years agoMerge remote-tracking branch 'percpu/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 04:36:18 +0000 (14:36 +1000)]
Merge remote-tracking branch 'percpu/for-next'

4 years agoMerge remote-tracking branch 'kvm-arm/next'
Stephen Rothwell [Thu, 3 Jun 2021 04:34:35 +0000 (14:34 +1000)]
Merge remote-tracking branch 'kvm-arm/next'

4 years agoMerge remote-tracking branch 'rcu/rcu/next'
Stephen Rothwell [Thu, 3 Jun 2021 04:19:40 +0000 (14:19 +1000)]
Merge remote-tracking branch 'rcu/rcu/next'

4 years agoMerge remote-tracking branch 'edac/edac-for-next'
Stephen Rothwell [Thu, 3 Jun 2021 04:18:21 +0000 (14:18 +1000)]
Merge remote-tracking branch 'edac/edac-for-next'

4 years agoMerge remote-tracking branch 'tip/auto-latest'
Stephen Rothwell [Thu, 3 Jun 2021 04:03:31 +0000 (14:03 +1000)]
Merge remote-tracking branch 'tip/auto-latest'

# Conflicts:
# samples/kprobes/kprobe_example.c

4 years agoMerge remote-tracking branch 'spi/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 03:57:48 +0000 (13:57 +1000)]
Merge remote-tracking branch 'spi/for-next'

4 years agoMerge remote-tracking branch 'devicetree/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 03:52:49 +0000 (13:52 +1000)]
Merge remote-tracking branch 'devicetree/for-next'

4 years agoMerge remote-tracking branch 'audit/next'
Stephen Rothwell [Thu, 3 Jun 2021 03:50:43 +0000 (13:50 +1000)]
Merge remote-tracking branch 'audit/next'

4 years agoMerge remote-tracking branch 'iommu/next'
Stephen Rothwell [Thu, 3 Jun 2021 03:50:42 +0000 (13:50 +1000)]
Merge remote-tracking branch 'iommu/next'

4 years agoMerge remote-tracking branch 'smack/next'
Stephen Rothwell [Thu, 3 Jun 2021 03:48:36 +0000 (13:48 +1000)]
Merge remote-tracking branch 'smack/next'

4 years agoMerge remote-tracking branch 'selinux/next'
Stephen Rothwell [Thu, 3 Jun 2021 03:41:45 +0000 (13:41 +1000)]
Merge remote-tracking branch 'selinux/next'

4 years agoMerge remote-tracking branch 'keys/keys-next'
Stephen Rothwell [Thu, 3 Jun 2021 03:41:44 +0000 (13:41 +1000)]
Merge remote-tracking branch 'keys/keys-next'

# Conflicts:
# certs/system_keyring.c

4 years agoMerge remote-tracking branch 'integrity/next-integrity'
Stephen Rothwell [Thu, 3 Jun 2021 03:39:30 +0000 (13:39 +1000)]
Merge remote-tracking branch 'integrity/next-integrity'

4 years agoMerge remote-tracking branch 'apparmor/apparmor-next'
Stephen Rothwell [Thu, 3 Jun 2021 03:36:58 +0000 (13:36 +1000)]
Merge remote-tracking branch 'apparmor/apparmor-next'

4 years agoMerge remote-tracking branch 'security/next-testing'
Stephen Rothwell [Thu, 3 Jun 2021 03:36:57 +0000 (13:36 +1000)]
Merge remote-tracking branch 'security/next-testing'

4 years agoMerge remote-tracking branch 'regulator/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 03:34:49 +0000 (13:34 +1000)]
Merge remote-tracking branch 'regulator/for-next'

4 years agoMerge remote-tracking branch 'battery/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 03:33:11 +0000 (13:33 +1000)]
Merge remote-tracking branch 'battery/for-next'

4 years agoMerge remote-tracking branch 'backlight/for-backlight-next'
Stephen Rothwell [Thu, 3 Jun 2021 03:31:30 +0000 (13:31 +1000)]
Merge remote-tracking branch 'backlight/for-backlight-next'

4 years agoMerge remote-tracking branch 'mfd/for-mfd-next'
Stephen Rothwell [Thu, 3 Jun 2021 03:29:14 +0000 (13:29 +1000)]
Merge remote-tracking branch 'mfd/for-mfd-next'

4 years agoMerge remote-tracking branch 'mmc/next'
Stephen Rothwell [Thu, 3 Jun 2021 03:27:01 +0000 (13:27 +1000)]
Merge remote-tracking branch 'mmc/next'

4 years agoMerge remote-tracking branch 'device-mapper/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 03:24:47 +0000 (13:24 +1000)]
Merge remote-tracking branch 'device-mapper/for-next'

4 years agoMerge remote-tracking branch 'block/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 03:14:06 +0000 (13:14 +1000)]
Merge remote-tracking branch 'block/for-next'

4 years agoMerge remote-tracking branch 'input/next'
Stephen Rothwell [Thu, 3 Jun 2021 03:12:21 +0000 (13:12 +1000)]
Merge remote-tracking branch 'input/next'

4 years agoMerge remote-tracking branch 'modules/modules-next'
Stephen Rothwell [Thu, 3 Jun 2021 03:10:15 +0000 (13:10 +1000)]
Merge remote-tracking branch 'modules/modules-next'

4 years agoMerge remote-tracking branch 'sound-asoc/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 03:07:54 +0000 (13:07 +1000)]
Merge remote-tracking branch 'sound-asoc/for-next'

4 years agoMerge remote-tracking branch 'sound/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 03:05:22 +0000 (13:05 +1000)]
Merge remote-tracking branch 'sound/for-next'

4 years agoMerge remote-tracking branch 'regmap/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 03:01:53 +0000 (13:01 +1000)]
Merge remote-tracking branch 'regmap/for-next'

4 years agoMerge remote-tracking branch 'etnaviv/etnaviv/next'
Stephen Rothwell [Thu, 3 Jun 2021 02:59:15 +0000 (12:59 +1000)]
Merge remote-tracking branch 'etnaviv/etnaviv/next'

4 years agoMerge remote-tracking branch 'drm-msm/msm-next'
Stephen Rothwell [Thu, 3 Jun 2021 02:59:14 +0000 (12:59 +1000)]
Merge remote-tracking branch 'drm-msm/msm-next'

4 years agoMerge remote-tracking branch 'drm-tegra/drm/tegra/for-next'
Stephen Rothwell [Thu, 3 Jun 2021 02:59:13 +0000 (12:59 +1000)]
Merge remote-tracking branch 'drm-tegra/drm/tegra/for-next'

4 years agoMerge remote-tracking branch 'drm-intel/for-linux-next'
Stephen Rothwell [Thu, 3 Jun 2021 02:59:12 +0000 (12:59 +1000)]
Merge remote-tracking branch 'drm-intel/for-linux-next'

4 years agoMerge remote-tracking branch 'amdgpu/drm-next'
Stephen Rothwell [Thu, 3 Jun 2021 02:59:12 +0000 (12:59 +1000)]
Merge remote-tracking branch 'amdgpu/drm-next'

# Conflicts:
# drivers/gpu/drm/amd/amdgpu/amdgpu_ttm.c
# drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c

4 years agoMerge remote-tracking branch 'drm-misc/for-linux-next'
Stephen Rothwell [Thu, 3 Jun 2021 02:19:49 +0000 (12:19 +1000)]
Merge remote-tracking branch 'drm-misc/for-linux-next'

4 years agoMerge remote-tracking branch 'drm/drm-next'
Stephen Rothwell [Thu, 3 Jun 2021 02:19:47 +0000 (12:19 +1000)]
Merge remote-tracking branch 'drm/drm-next'

# Conflicts:
# drivers/gpu/drm/i915/selftests/i915_gem.c

4 years agoMerge remote-tracking branch 'crypto/master'
Stephen Rothwell [Thu, 3 Jun 2021 02:14:04 +0000 (12:14 +1000)]
Merge remote-tracking branch 'crypto/master'

4 years agoMerge remote-tracking branch 'spi-nor/spi-nor/next'
Stephen Rothwell [Thu, 3 Jun 2021 02:12:28 +0000 (12:12 +1000)]
Merge remote-tracking branch 'spi-nor/spi-nor/next'

4 years agoMerge remote-tracking branch 'nand/nand/next'
Stephen Rothwell [Thu, 3 Jun 2021 02:10:43 +0000 (12:10 +1000)]
Merge remote-tracking branch 'nand/nand/next'

4 years agoMerge remote-tracking branch 'mtd/mtd/next'
Stephen Rothwell [Thu, 3 Jun 2021 02:08:19 +0000 (12:08 +1000)]
Merge remote-tracking branch 'mtd/mtd/next'

4 years agoof: Merge of_address_to_resource() and of_pci_address_to_resource() implementations
Rob Herring [Thu, 27 May 2021 19:45:47 +0000 (14:45 -0500)]
of: Merge of_address_to_resource() and of_pci_address_to_resource() implementations

of_address_to_resource() and of_pci_address_to_resource() are almost the
same except the former takes an index and the latter takes a BAR number.
Now that __of_get_address() can take either one, refactor the functions
to use a common implementation.

Cc: Frank Rowand <frowand.list@gmail.com>
Signed-off-by: Rob Herring <robh@kernel.org>
Link: https://lore.kernel.org/r/20210527194547.1287934-5-robh@kernel.org
4 years agoof: address: Use IS_ENABLED() for !CONFIG_PCI
Rob Herring [Thu, 27 May 2021 19:45:46 +0000 (14:45 -0500)]
of: address: Use IS_ENABLED() for !CONFIG_PCI

Convert address.c to use IS_ENABLED() instead of ifdefs for the
public PCI functions. This simplifies the ifdefs in of_address.h.

Cc: Frank Rowand <frowand.list@gmail.com>
Signed-off-by: Rob Herring <robh@kernel.org>
Link: https://lore.kernel.org/r/20210527194547.1287934-4-robh@kernel.org
4 years agoof: Merge of_get_address() and of_get_pci_address() implementations
Rob Herring [Thu, 27 May 2021 19:45:45 +0000 (14:45 -0500)]
of: Merge of_get_address() and of_get_pci_address() implementations

of_get_address() and of_get_pci_address() are the same implementation
except of_get_pci_address() takes the PCI BAR number rather than an
index. Modify the of_get_address() implementation to work on either
index or BAR and provide wrapper functions for the existing functions.

Cc: Frank Rowand <frowand.list@gmail.com>
Signed-off-by: Rob Herring <robh@kernel.org>
Link: https://lore.kernel.org/r/20210527194547.1287934-3-robh@kernel.org
4 years agoPCI: Add empty stub for pci_register_io_range()
Rob Herring [Thu, 27 May 2021 19:45:44 +0000 (14:45 -0500)]
PCI: Add empty stub for pci_register_io_range()

Add an empty stub for pci_register_io_range() when !CONFIG_PCI. It's needed
to convert of_pci_range_to_resource() to use IS_ENABLED(CONFIG_PCI).

Cc: Bjorn Helgaas <bhelgaas@google.com>
Cc: linux-pci@vger.kernel.org
Signed-off-by: Rob Herring <robh@kernel.org>
Acked-by: Bjorn Helgaas <bhelgaas@google.com>
Link: https://lore.kernel.org/r/20210527194547.1287934-2-robh@kernel.org
4 years agoof: Move reserved memory private function declarations
Rob Herring [Thu, 27 May 2021 19:38:41 +0000 (14:38 -0500)]
of: Move reserved memory private function declarations

fdt_init_reserved_mem() and fdt_reserved_mem_save_node() are private to
the DT code, so move there declarations to of_private.h. There's no need
for the dummy functions as CONFIG_OF_RESERVED_MEM is always enabled for
CONFIG_OF_EARLY_FLATTREE.

Cc: Frank Rowand <frowand.list@gmail.com>
Signed-off-by: Rob Herring <robh@kernel.org>
Link: https://lore.kernel.org/r/20210527193841.1284169-1-robh@kernel.org
4 years agoof: Drop reserved mem dependency on DMA_DECLARE_COHERENT and DMA_CMA
Rob Herring [Thu, 27 May 2021 22:32:17 +0000 (17:32 -0500)]
of: Drop reserved mem dependency on DMA_DECLARE_COHERENT and DMA_CMA

Reserved memory regions can be used for more than just DMA regions, so
only enabling on DMA_DECLARE_COHERENT (via HAS_DMA) or DMA_CMA is wrong.
This effectively doesn't matter except for the few cases arches select
NO_DMA.

At least, these users of RESERVEDMEM_OF_DECLARE depend on reserved memory
support:

arch/riscv/mm/init.c:RESERVEDMEM_OF_DECLARE(elfcorehdr, "linux,elfcorehdr", elfcore_hdr_setup);
drivers/memory/tegra/tegra210-emc-table.c:RESERVEDMEM_OF_DECLARE(tegra210_emc_table, "nvidia,tegra210-emc-table",
drivers/soc/fsl/qbman/bman_ccsr.c:RESERVEDMEM_OF_DECLARE(bman_fbpr, "fsl,bman-fbpr", bman_fbpr);
drivers/soc/fsl/qbman/qman_ccsr.c:RESERVEDMEM_OF_DECLARE(qman_fqd, "fsl,qman-fqd", qman_fqd);
drivers/soc/fsl/qbman/qman_ccsr.c:RESERVEDMEM_OF_DECLARE(qman_pfdr, "fsl,qman-pfdr", qman_pfdr);

Let's simplify things and enable OF_RESERVED_MEM when OF_EARLY_FLATTREE is
enabled.

Cc: Christoph Hellwig <hch@lst.de>
Signed-off-by: Rob Herring <robh@kernel.org>
Link: https://lore.kernel.org/r/20210527223217.1572631-1-robh@kernel.org
4 years agodt-bindings: reset: update ti,sci-reset.yaml references
Mauro Carvalho Chehab [Wed, 2 Jun 2021 15:43:11 +0000 (17:43 +0200)]
dt-bindings: reset: update ti,sci-reset.yaml references

Changeset 9a81b8cbc245 ("dt-bindings: reset: Convert ti,sci-reset to json schema")
renamed: Documentation/devicetree/bindings/reset/ti,sci-reset.txt
to: Documentation/devicetree/bindings/reset/ti,sci-reset.yaml.

Update the cross-references accordingly.

Fixes: 9a81b8cbc245 ("dt-bindings: reset: Convert ti,sci-reset to json schema")
Signed-off-by: Mauro Carvalho Chehab <mchehab+huawei@kernel.org>
Link: https://lore.kernel.org/r/e9b505d900d898c0d030deb168ab291206c203ee.1622648507.git.mchehab+huawei@kernel.org
Signed-off-by: Rob Herring <robh@kernel.org>