Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

V4.9/rcar 3.5.3 #8

Closed
wants to merge 23 commits into from

Commits on May 17, 2017

  1. clk:shmobile: Hide clock for SCIF2

    On Renesas Salvaotor board with Xen SCIF2 is provided to hypervisor, so
    kernel should not manage SCIF2 clock.
    
    Signed-off-by: Iurii Konovalenko <[email protected]>
    Signed-off-by: Andrii Anisov <[email protected]>
    Iurii Konovalenko authored and otyshchenko1 committed May 17, 2017
    Configuration menu
    Copy the full SHA
    57b9ce0 View commit details
    Browse the repository at this point in the history
  2. swiotlb-xen: implement xen_swiotlb_dma_mmap callback

    This function creates userspace mapping for the DMA-coherent memory.
    
    Signed-off-by: Stefano Stabellini <[email protected]>
    Signed-off-by: Oleksandr Dmytryshyn <[email protected]>
    Signed-off-by: Andrii Anisov <[email protected]>
    Stefano Stabellini authored and otyshchenko1 committed May 17, 2017
    Configuration menu
    Copy the full SHA
    53279df View commit details
    Browse the repository at this point in the history
  3. swiotlb-xen: implement xen_swiotlb_get_sgtable callback

    Signed-off-by: Andrii Anisov <[email protected]>
    Andrii Anisov authored and otyshchenko1 committed May 17, 2017
    Configuration menu
    Copy the full SHA
    49ea50a View commit details
    Browse the repository at this point in the history
  4. salvator_x_dom0_defconfig: Introduce Salvator-X dom0 defconfig

    The defconfig was copied from here:
    path_to_yocto/build/tmp/work-shared/salvator-x/kernel-build-artifacts/.config
    
    I guess this .config is a result of following defconfigs:
    path_to_kernel/arch/arm64/configs/defconfig
    path_to_yocto/meta-renesas/meta-rcar-gen3/recipes-kernel/linux/linux-renesas/*
    
    Signed-off-by: Oleksandr Tyshchenko <[email protected]>
    otyshchenko1 committed May 17, 2017
    Configuration menu
    Copy the full SHA
    8028b7b View commit details
    Browse the repository at this point in the history
  5. salvator_x_dom0_defconfig: Enable some Xen specific configs

    Signed-off-by: Oleksandr Tyshchenko <[email protected]>
    otyshchenko1 committed May 17, 2017
    Configuration menu
    Copy the full SHA
    31ae966 View commit details
    Browse the repository at this point in the history
  6. r8a7795-salvator-x-dom0.dtb: Introduce Salvator-X dom0 device-tree

    The device-tree was copied from here:
    b/arch/arm64/boot/dts/renesas/r8a7795-salvator-x.dts
    
    Signed-off-by: Oleksandr Tyshchenko <[email protected]>
    otyshchenko1 committed May 17, 2017
    Configuration menu
    Copy the full SHA
    6b37383 View commit details
    Browse the repository at this point in the history
  7. r8a7795-salvator-x-dom0.dtb: Adjust device tree for Xen usage

    Signed-off-by: Oleksandr Tyshchenko <[email protected]>
    otyshchenko1 committed May 17, 2017
    Configuration menu
    Copy the full SHA
    b8447d2 View commit details
    Browse the repository at this point in the history
  8. r8a7795-salvator-x-dom0.dtb: Use NFS boot

    Signed-off-by: Oleksandr Tyshchenko <[email protected]>
    otyshchenko1 committed May 17, 2017
    Configuration menu
    Copy the full SHA
    f9c8c0a View commit details
    Browse the repository at this point in the history

Commits on May 22, 2017

  1. r8a7795-salvator-x-dom0.dtb: Enable IPMMUs and tie master devices to …

    …them
    
    The list of devices being connected to the IPMMU:
    - usb
    - sata
    - gsx
    - avb
    - sdhi
    
    Temporarily unconnect system dmacs from the IPMMUs.
    
    Signed-off-by: Oleksandr Tyshchenko <[email protected]>
    otyshchenko1 committed May 22, 2017
    Configuration menu
    Copy the full SHA
    be1898f View commit details
    Browse the repository at this point in the history
  2. r8a7795-salvator-x-domu.dtb: Introduce Salvator-X domu device-tree

    This simple dts contains only gsx node as we want it to be
    passthroughed to the guest domain.
    
    One important notice regarding gsx usage in domu.
    DEVPATH string in the 72-pvr-seat.rules file should be changed
    from
    "/devices/platform/soc/fd000000.gsx/drm/*"
    to
    "/devices/platform/passthrough/fd000000.gsx/drm/*"
    
    Signed-off-by: Oleksandr Tyshchenko <[email protected]>
    otyshchenko1 committed May 22, 2017
    Configuration menu
    Copy the full SHA
    58c29b9 View commit details
    Browse the repository at this point in the history
  3. drm: rcar-du: hack: Enable gsx clock too

    Retrieve gsx clock (3dge in our case) and enable it to
    make gsx happy.
    
    Signed-off-by: Oleksandr Tyshchenko <[email protected]>
    otyshchenko1 committed May 22, 2017
    Configuration menu
    Copy the full SHA
    5a1a1c1 View commit details
    Browse the repository at this point in the history
  4. r8a7795-salvator-x-dom0.dtb: PM hints for gsx passthrough to work

    With gsx being passthroughed to the guest domain there is nobody in the
    harware domain to care about gsx power resources.
    So, ask rcar-du to enable gsx clock and power domain for now.
    
    Following patch must be applied for rcar-du system for getting
    the appropriate clock configured and enabled (3dge in our case):
    drm: rcar-du: hack: Enable gsx clock too
    
    Signed-off-by: Oleksandr Tyshchenko <[email protected]>
    otyshchenko1 committed May 22, 2017
    Configuration menu
    Copy the full SHA
    7531293 View commit details
    Browse the repository at this point in the history
  5. r8a7795-salvator-x-dom0.dtb: Passthrough gsx

    Signed-off-by: Oleksandr Tyshchenko <[email protected]>
    otyshchenko1 committed May 22, 2017
    Configuration menu
    Copy the full SHA
    32f2f27 View commit details
    Browse the repository at this point in the history
  6. xen/kbdif: update protocol description

    The patch clarifies the protocol that is used by the PV keyboard
    drivers.
    
    Signed-off-by: Oleksandr Andrushchenko <[email protected]>
    Acked-by: Juergen Gross <[email protected]>
    Signed-off-by: Juergen Gross <[email protected]>
    Oleksandr Andrushchenko authored and otyshchenko1 committed May 22, 2017
    Configuration menu
    Copy the full SHA
    347d3e4 View commit details
    Browse the repository at this point in the history
  7. xen/kbdif: add multi-touch support

    Multi-touch fields re-use the page that is used by the other features
    which means that you can interleave multi-touch, motion, and key
    events.
    
    Signed-off-by: Oleksandr Andrushchenko <[email protected]>
    Acked-by: Juergen Gross <[email protected]>
    Signed-off-by: Juergen Gross <[email protected]>
    Oleksandr Andrushchenko authored and otyshchenko1 committed May 22, 2017
    Configuration menu
    Copy the full SHA
    c746457 View commit details
    Browse the repository at this point in the history
  8. xen/displif: add ABI for para-virtual display

    This is the ABI for the two halves of a para-virtualized
    display driver.
    
    This protocol aims to provide a unified protocol which fits more
    sophisticated use-cases than a framebuffer device can handle. At the
    moment basic functionality is supported with the intention to extend:
      o multiple dynamically allocated/destroyed framebuffers
      o buffers of arbitrary sizes
      o better configuration options including multiple display support
    
    Note: existing fbif can be used together with displif running at the
    same time, e.g. on Linux one provides framebuffer and another DRM/KMS
    
    Future extensions to the existing protocol may include:
      o allow display/connector cloning
      o allow allocating objects other than display buffers
      o add planes/overlays support
      o support scaling
      o support rotation
    
    Note, that this protocol doesn't use ring macros for
    bi-directional exchange (PV calls/9pfs) bacause:
      o it statically defines the use of a single page
        for the ring buffer
      o it uses direct memory access to ring's contents
        w/o memory copying
      o re-uses the same idea that kbdif/fbif use
        which for this use-case seems to be appropriate
    
    ==================================================
    Rationale for introducing this protocol instead of
    using the existing fbif:
    ==================================================
    
    1. In/out event sizes
      o fbif - 40 octets
      o displif - 40 octets
    This is only the initial version of the displif protocol
    which means that there could be requests which will not fit
    (WRT introducing some GPU related functionality
    later on). In that case we cannot alter fbif sizes as we need to
    be backward compatible an will be forced to handle those
    apart of fbif.
    
    2. Shared page
    Displif doesn't use anything like struct xenfb_page, but
    DEFINE_RING_TYPES(xen_displif, struct xendispl_req, struct
    xendispl_resp) which is a better and more common way.
    Output events use a shared page which only has in_cons and in_prod
    and all the rest is used for incoming events. Here struct xenfb_page
    could probably be used as is despite the fact that it only has a half
    of a page for incoming events which is only 50 events. (consider
    something like 60Hz display)
    
    3. Amount of changes.
    fbif only provides XENFB_TYPE_UPDATE and XENFB_TYPE_RESIZE
    events, so it looks like it is easier to get fb support into displif
    than vice versa. displif at the moment has 6 requests and 1 event,
    multiple connector support, etc.
    
    Signed-off-by: Oleksandr Grytsov <[email protected]>
    Signed-off-by: Oleksandr Andrushchenko <[email protected]>
    Acked-by: Juergen Gross <[email protected]>
    Signed-off-by: Juergen Gross <[email protected]>
    Oleksandr Andrushchenko authored and otyshchenko1 committed May 22, 2017
    Configuration menu
    Copy the full SHA
    3c7f6a9 View commit details
    Browse the repository at this point in the history
  9. xen: introduce xenbus_read_unsigned()

    There are multiple instances of code reading an optional unsigned
    parameter from Xenstore via xenbus_scanf(). Instead of repeating the
    same code over and over add a service function doing the job.
    
    Signed-off-by: Juergen Gross <[email protected]>
    Reviewed-by: David Vrabel <[email protected]>
    jgross1 authored and otyshchenko1 committed May 22, 2017
    Configuration menu
    Copy the full SHA
    7844b7e View commit details
    Browse the repository at this point in the history
  10. xen: make use of xenbus_read_unsigned() in xen-kbdfront

    Use xenbus_read_unsigned() instead of xenbus_scanf() when possible.
    This requires to change the type of the reads from int to unsigned,
    but these cases have been wrong before: negative values are not allowed
    for the modified cases.
    
    Cc: [email protected]
    Cc: [email protected]
    
    Signed-off-by: Juergen Gross <[email protected]>
    Acked-by: David Vrabel <[email protected]>
    jgross1 authored and otyshchenko1 committed May 22, 2017
    Configuration menu
    Copy the full SHA
    2722dc6 View commit details
    Browse the repository at this point in the history
  11. xen/drm: add para-virtual DRM front-end driver

    Signed-off-by: Oleksandr Andrushchenko <[email protected]>
    Oleksandr Andrushchenko authored and otyshchenko1 committed May 22, 2017
    Configuration menu
    Copy the full SHA
    dca55f4 View commit details
    Browse the repository at this point in the history
  12. xen,input: add xen-kbdfront module parameter for setting resolution

    Add a parameter for setting the resolution of xen-kbdfront in order to
    be able to cope with a (virtual) frame buffer of arbitrary resolution.
    
    While at it remove the pointless second reading of parameters from
    Xenstore in the device connection phase: all parameters are available
    during device probing already and that is where they should be read.
    
    Signed-off-by: Juergen Gross <[email protected]>
    jgross1 authored and otyshchenko1 committed May 22, 2017
    Configuration menu
    Copy the full SHA
    1427671 View commit details
    Browse the repository at this point in the history
  13. xen/input: use string constants from PV protocol

    Xen input para-virtual protocol defines string constants
    used by both back and frontend. Use those instead of
    explicit strings in the frontend driver.
    
    Signed-off-by: Oleksandr Andrushchenko <[email protected]>
    Oleksandr Andrushchenko authored and otyshchenko1 committed May 22, 2017
    Configuration menu
    Copy the full SHA
    09cdbb3 View commit details
    Browse the repository at this point in the history
  14. xen/input: add multi-touch support

    Extend xen_kbdfront to provide multi-touch support
    to unprivileged domains.
    
    Signed-off-by: Oleksandr Andrushchenko <[email protected]>
    Oleksandr Andrushchenko authored and otyshchenko1 committed May 22, 2017
    Configuration menu
    Copy the full SHA
    3109aa6 View commit details
    Browse the repository at this point in the history
  15. salvator_x_domu_defconfig: Introduce Salvator-X domu defconfig

    Actually it is a copy of salvator_x_dom0_defconfig but with
    following strings added:
    
    CONFIG_DRM_XEN=y
    CONFIG_DRM_XEN_FRONTEND=y
    CONFIG_INPUT_UINPUT=y
    
    Signed-off-by: Oleksandr Tyshchenko <[email protected]>
    otyshchenko1 committed May 22, 2017
    Configuration menu
    Copy the full SHA
    fbfee37 View commit details
    Browse the repository at this point in the history