Commit graph

153 commits

Author SHA1 Message Date
Jake Weinstein
e35a1fbdcf Kconfig: Disable KALLSYMS_ALL
We do not need to load all symbols into the kernel image.
This takes a significant amount of compile time.

Signed-off-by: TogoFire <togofire@mailfence.com>
Change-Id: I0250ae96c752f244d0a48e127516513e6d711930
2025-01-19 19:50:55 +01:00
Ksawlii
1210b31ce5 configs: Nuke CONFIG_BLK_SEC_STATS 2025-01-19 19:49:07 +01:00
Ksawlii
ff5088010f configs: Nuke CONFIG_DEBUG_KINFO 2025-01-19 17:15:52 +01:00
Ksawlii
6e318661f7 dts: Nuke abox-dbg and abox-debug stuff 2025-01-19 16:55:51 +01:00
Yu-Ting Tseng
8e9a3808d7 BACKPORT: FROMGIT: binder: frozen notification
Frozen processes present a significant challenge in binder transactions.
When a process is frozen, it cannot, by design, accept and/or respond to
binder transactions. As a result, the sender needs to adjust its
behavior, such as postponing transactions until the peer process
unfreezes. However, there is currently no way to subscribe to these
state change events, making it impossible to implement frozen-aware
behaviors efficiently.

Introduce a binder API for subscribing to frozen state change events.
This allows programs to react to changes in peer process state,
mitigating issues related to binder transactions sent to frozen
processes.

Implementation details:
For a given binder_ref, the state of frozen notification can be one of
the followings:
1. Userspace doesn't want a notification. binder_ref->freeze is null.
2. Userspace wants a notification but none is in flight.
   list_empty(&binder_ref->freeze->work.entry) = true
3. A notification is in flight and waiting to be read by userspace.
   binder_ref_freeze.sent is false.
4. A notification was read by userspace and kernel is waiting for an ack.
   binder_ref_freeze.sent is true.

When a notification is in flight, new state change events are coalesced into
the existing binder_ref_freeze struct. If userspace hasn't picked up the
notification yet, the driver simply rewrites the state. Otherwise, the
notification is flagged as requiring a resend, which will be performed
once userspace acks the original notification that's inflight.

See https://r.android.com/3070045 for how userspace is going to use this
feature.

Signed-off-by: Yu-Ting Tseng <yutingtseng@google.com>
Acked-by: Carlos Llamas <cmllamas@google.com>
Link: https://lore.kernel.org/r/20240709070047.4055369-4-yutingtseng@google.com
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

Bug: 363013421
(cherry picked from commit d579b04a52a183db47dfcb7a44304d7747d551e1
 git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/char-misc.git
 char-misc-next)
Change-Id: I5dd32abba932ca7d03ae58660143e075ed778b81
[cmllamas: fix merge conflicts due to missing 0567461a7a6e]
Signed-off-by: Carlos Llamas <cmllamas@google.com>
2025-01-19 14:57:12 +01:00
zhujingpeng
ec5d36aa56 ANDROID: GKI: export sys_exit tracepoint
This patch export a sys_exit tracepoint for
task state-tracking and performance tuning.

Bug: 339912146

Change-Id: I951ac6034e80691f092c0ba41b6af1fdaf8be49c
Signed-off-by: zhujingpeng <zhujingpeng@vivo.com>
(cherry picked from commit 53c7feb8b4829376b678b7cb8d501f48b2b47286)
(cherry picked from commit 17e523360e373b219c3a24ffed52bf773e0009df)
2025-01-19 14:56:08 +01:00
Jonathan Cameron
8ccfca2782 arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry
[ Upstream commit 2488444274c70038eb6b686cba5f1ce48ebb9cdd ]

In a review discussion of the changes to support vCPU hotplug where
a check was added on the GICC being enabled if was online, it was
noted that there is need to map back to the cpu and use that to index
into a cpumask. As such, a valid ID is needed.

If an MPIDR check fails in acpi_map_gic_cpu_interface() it is possible
for the entry in cpu_madt_gicc[cpu] == NULL.  This function would
then cause a NULL pointer dereference.   Whilst a path to trigger
this has not been established, harden this caller against the
possibility.

Reviewed-by: Gavin Shan <gshan@redhat.com>
Signed-off-by: Jonathan Cameron <Jonathan.Cameron@huawei.com>
Link: https://lore.kernel.org/r/20240529133446.28446-13-Jonathan.Cameron@huawei.com
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2025-01-19 00:09:58 +01:00
James Morse
a88e7cba28 arm64: acpi: Move get_cpu_for_acpi_id() to a header
[ Upstream commit 8d34b6f17b9ac93faa2791eb037dcb08bdf755de ]

ACPI identifies CPUs by UID. get_cpu_for_acpi_id() maps the ACPI UID
to the Linux CPU number.

The helper to retrieve this mapping is only available in arm64's NUMA
code.

Move it to live next to get_acpi_id_for_cpu().

Signed-off-by: James Morse <james.morse@arm.com>
Reviewed-by: Jonathan Cameron <Jonathan.Cameron@huawei.com>
Reviewed-by: Gavin Shan <gshan@redhat.com>
Tested-by: Miguel Luis <miguel.luis@oracle.com>
Tested-by: Vishnu Pajjuri <vishnu@os.amperecomputing.com>
Tested-by: Jianyong Wu <jianyong.wu@arm.com>
Signed-off-by: Russell King (Oracle) <rmk+kernel@armlinux.org.uk>
Acked-by: Hanjun Guo <guohanjun@huawei.com>
Signed-off-by: Jonathan Cameron <Jonathan.Cameron@huawei.com>
Reviewed-by: Lorenzo Pieralisi <lpieralisi@kernel.org>
Link: https://lore.kernel.org/r/20240529133446.28446-12-Jonathan.Cameron@huawei.com
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2025-01-19 00:09:58 +01:00
Ksawlii
33a4759f21 defconfigs: Regenerate with regen.sh 2025-01-18 22:53:46 +01:00
Ksawlii
46ef9e7f51 defconfigs: Regenerate with regen.sh 2025-01-17 00:03:07 +01:00
Ksawlii
046f1b47c2 defconfigs: Regenerate with regen.sh 2025-01-16 23:53:44 +01:00
Tim Zimmermann
50596b1299 configs: s5e8825: Rename AP interface from swlan0 to wlan1
* Needed to get STA/AP concurrency working
* See https://source.android.com/devices/tech/connect/wifi-sta-ap-concurrency?hl=en

Change-Id: I9c3331d14e12325e12ac5af41590ad83ee37ec95
Signed-off-by: Nahuel Gómez <nahuelgomez329@gmail.com>
2025-01-16 23:08:04 +01:00
Ksawlii
bea7ef974b defconfigs: Increase log buffer to 1MB 2025-01-16 21:56:54 +01:00
Ksawlii
09fb15e899 defconfig: Disable CONFIG_KSU on vanilla builds 2025-01-15 16:49:21 +01:00
Ksawlii
552619876d defconfigs: Regenerate with regenerate.sh
regenerate.sh: Best work frfr
2025-01-15 16:47:28 +01:00
Nahuel Gómez
1c7179186b configs: turn down undervolt to a safe value
We need to investigate reports of random reboots.

Signed-off-by: Nahuel Gómez <nahuelgomez329@gmail.com>
2025-01-15 16:40:13 +01:00
Nahuel Gómez
f4634f8802 fvmap: move undervolting settings to Kconfig
Signed-off-by: Nahuel Gómez <nahuelgomez329@gmail.com>
2025-01-15 16:40:04 +01:00
Nahuel Gómez
e89716836f configs: disable EFI support
We don't use it.

Signed-off-by: Nahuel Gómez <nahuelgomez329@gmail.com>
2025-01-15 16:39:25 +01:00
Ksawlii
98564339fe defconfigs: enable CONFIG_CC_OPTIMIZE_FOR_PERFORMANCE_O3 2025-01-15 16:39:12 +01:00
Catalin Marinas
e720f4eea6 arm64: Ensure bits ASID[15:8] are masked out when the kernel uses 8-bit ASIDs
[ Upstream commit c0900d15d31c2597dd9f634c8be2b71762199890 ]

Linux currently sets the TCR_EL1.AS bit unconditionally during CPU
bring-up. On an 8-bit ASID CPU, this is RES0 and ignored, otherwise
16-bit ASIDs are enabled. However, if running in a VM and the hypervisor
reports 8-bit ASIDs (ID_AA64MMFR0_EL1.ASIDBits == 0) on a 16-bit ASIDs
CPU, Linux uses bits 8 to 63 as a generation number for tracking old
process ASIDs. The bottom 8 bits of this generation end up being written
to TTBR1_EL1 and also used for the ASID-based TLBI operations as the
upper 8 bits of the ASID. Following an ASID roll-over event we can have
threads of the same application with the same 8-bit ASID but different
generation numbers running on separate CPUs. Both TLB caching and the
TLBI operations will end up using different actual 16-bit ASIDs for the
same process.

A similar scenario can happen in a big.LITTLE configuration if the boot
CPU only uses 8-bit ASIDs while secondary CPUs have 16-bit ASIDs.

Ensure that the ASID generation is only tracked by bits 16 and up,
leaving bits 15:8 as 0 if the kernel uses 8-bit ASIDs. Note that
clearing TCR_EL1.AS is not sufficient since the architecture requires
that the top 8 bits of the ASID passed to TLBI instructions are 0 rather
than ignored in such configuration.

Cc: stable@vger.kernel.org
Cc: Will Deacon <will@kernel.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Marc Zyngier <maz@kernel.org>
Cc: James Morse <james.morse@arm.com>
Acked-by: Mark Rutland <mark.rutland@arm.com>
Acked-by: Marc Zyngier <maz@kernel.org>
Link: https://lore.kernel.org/r/20241203151941.353796-1-catalin.marinas@arm.com
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2025-01-15 16:29:51 +01:00
Yunfeng Ye
91be5d2232 arm64: mm: Rename asid2idx() to ctxid2asid()
[ Upstream commit a3a5b763410c7bceacf41a52071134d9dc26202a ]

The commit 0c8ea531b774 ("arm64: mm: Allocate ASIDs in pairs") introduce
the asid2idx and idx2asid macro, but these macros are not really useful
after the commit f88f42f853a8 ("arm64: context: Free up kernel ASIDs if
KPTI is not in use").

The code "(asid & ~ASID_MASK)" can be instead by a macro, which is the
same code with asid2idx(). So rename it to ctxid2asid() for a better
understanding.

Also we add asid2ctxid() macro, the contextid can be generated based on
the asid and generation through this macro.

Signed-off-by: Yunfeng Ye <yeyunfeng@huawei.com>
Reviewed-by: Kefeng Wang <wangkefeng.wang@huawei.com>
Link: https://lore.kernel.org/r/c31516eb-6d15-94e0-421c-305fc010ea79@huawei.com
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
Stable-dep-of: c0900d15d31c ("arm64: Ensure bits ASID[15:8] are masked out when the kernel uses 8-bit ASIDs")
Signed-off-by: Sasha Levin <sashal@kernel.org>
2025-01-15 16:29:51 +01:00
Sami Tolvanen
95be6620aa BACKPORT: FROMLIST: arm64: vdso: disable Shadow Call Stack
Shadow stacks are only available in the kernel, so disable SCS
instrumentation for the vDSO.

Bug: 145210207
Change-Id: I6e01b2c7788ba52d3b754b1fbd5bfb908b45741b
(am from https://lore.kernel.org/patchwork/patch/1149061/)
Reviewed-by: Nick Desaulniers <ndesaulniers@google.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Mark Rutland <mark.rutland@arm.com>
Signed-off-by: Sami Tolvanen <samitolvanen@google.com>
2024-12-18 19:47:08 +01:00
75d1ed86e7 Revert "defconfig: a53x*: Nuked a lot (commit history broke a little)"
This reverts commit 0029c23ea7.
2024-12-18 18:44:49 +01:00
cb12fcb606 Revert "defconfig: a53x*: Readd CONFIG_EXYNOS_DEBUG_INFO"
This reverts commit 3296330133.
2024-12-18 18:24:47 +01:00
3296330133 defconfig: a53x*: Readd CONFIG_EXYNOS_DEBUG_INFO 2024-12-18 18:15:48 +01:00
0029c23ea7 defconfig: a53x*: Nuked a lot (commit history broke a little) 2024-12-18 17:57:28 +01:00
Nahuel Gómez
958fb60b40 configs: use bbr as default tcp cong. algorithm
We already have the BBRv3 patches merged.

Signed-off-by: Nahuel Gómez <nahuelgomez329@gmail.com>
2024-12-18 15:14:17 +01:00
Nahuel Gómez
375f7e1318 ARM64: dts/s5e8825: GPU undervolt to 790mV
This is a base value only though, I'm not sure if it actually works.

Signed-off-by: Nahuel Gómez <nahuelgomez329@gmail.com>
2024-12-18 15:01:20 +01:00
b6b17fef92 Revert "defconfig: a53x_defconfig: Nuke KPROBE"
This reverts commit d30b19e276.
2024-12-18 14:59:29 +01:00
d30b19e276 defconfig: a53x_defconfig: Nuke KPROBE 2024-12-18 14:14:56 +01:00
Ksawlii
d1a6ca7818 defconfigs: a53x*: Regenerated with newer clang (19) and Linux 5.10.231 2024-12-18 12:27:51 +01:00
Nahuel Gómez
633af00caf configs: drop HICCUP_CC_DISABLE
Match a33x defconfig

Signed-off-by: Nahuel Gómez <nahuelgomez329@gmail.com>
2024-12-18 12:15:20 +01:00
53464baf85 Reapply "configs: kill SCHEDSTATS and SCHED_DEBUG"
This reverts commit 326c808f5c.
2024-12-18 11:25:40 +01:00
f656b91682 Reapply "configs: drop KZEROD"
This reverts commit 0cb16ca2c7.
2024-12-18 11:25:29 +01:00
55d2e44b8e Reapply "ARM64: dts/s5e8825: disable more unused stuff"
This reverts commit 30bd5b7761.
2024-12-18 11:24:33 +01:00
178633ff08 Reapply "configs: disable some unnecessary DSS stuff"
This reverts commit 47e32f67d1.
2024-12-18 11:24:28 +01:00
52028ebf99 Reapply "ARM64: dts/s5e8825: drop more reserved memory"
This reverts commit 46ca369f57.
2024-12-18 11:24:24 +01:00
0147ae88b9 Revert "ARM64: dts: s5e8825: disable some debug stuff"
This reverts commit 554d5fd356.
2024-12-18 11:05:39 +01:00
46ca369f57 Revert "ARM64: dts/s5e8825: drop more reserved memory"
This reverts commit 9632f64cde.
2024-12-18 09:37:47 +01:00
47e32f67d1 Revert "configs: disable some unnecessary DSS stuff"
This reverts commit b8c6547f74.
2024-12-18 00:32:45 +01:00
30bd5b7761 Revert "ARM64: dts/s5e8825: disable more unused stuff"
This reverts commit 171825cf94.
2024-12-18 00:32:35 +01:00
0cb16ca2c7 Revert "configs: drop KZEROD"
This reverts commit cb9bb6b647.
2024-12-17 23:30:37 +01:00
08513bfea7 defconfig: a53x_defconfig: Set FRAME_WARN to 0 2024-12-17 23:22:38 +01:00
Ksawlii
326c808f5c Revert "configs: kill SCHEDSTATS and SCHED_DEBUG"
This reverts commit a0e697bdf0.
2024-12-17 22:26:44 +01:00
Nahuel Gómez
b8c6547f74 configs: disable some unnecessary DSS stuff
We can't disable the whole driver because it handles last_kmsg.

Signed-off-by: Nahuel Gómez <nahuelgomez329@gmail.com>
2024-12-17 20:36:22 +01:00
Nahuel Gómez
cb9bb6b647 configs: drop KZEROD
Signed-off-by: Nahuel Gómez <nahuelgomez329@gmail.com>
2024-12-17 20:35:27 +01:00
Nahuel Gómez
9632f64cde ARM64: dts/s5e8825: drop more reserved memory
Signed-off-by: Nahuel Gómez <nahuelgomez329@gmail.com>
2024-12-17 20:35:06 +01:00
Nahuel Gómez
171825cf94 ARM64: dts/s5e8825: disable more unused stuff
Signed-off-by: Nahuel Gómez <nahuelgomez329@gmail.com>
2024-12-17 20:32:57 +01:00
Nahuel Gómez
554d5fd356 ARM64: dts: s5e8825: disable some debug stuff
These are disabled in the kernel already, so it's pointless to have them here.

This time we keep dss on, because otherwise last_kmsg stops working.

Signed-off-by: Nahuel Gómez <nahuelgomez329@gmail.com>
2024-12-17 20:32:54 +01:00
Nahuel Gómez
a0e697bdf0 configs: kill SCHEDSTATS and SCHED_DEBUG
Signed-off-by: Nahuel Gómez <nahuelgomez329@gmail.com>
2024-12-17 20:24:33 +01:00