On 22/07/17 02:11, Stefano Stabellini wrote:
> Implement the probe function for the pvcalls frontend. Read the
> supported versions, max-page-order and function-calls nodes from
> xenstore.
>
> Introduce a data structure named pvcalls_bedata. It contains pointers to
> the command ring, the event
On Mon, 24 Jul 2017, Lyude Paul wrote:
> > > So, call hid_hw_open() in rmi_post_resume() so we make sure that
> > > the
> > > device is alive before we try talking to it.
> > >
> > > This fixes RMI device suspend/resume over HID.
> > > - int ret;
> > > + int ret = 0;
> >
> > What's
On Mon, Jul 24, 2017 at 09:15:48PM +0200, Pavel Machek wrote:
> >
> > Am 24.07.2017 um 20:57 schrieb Pavel Machek:
> > >Would it be feasible to run bcache (write-through) with existing ext4
> > >filesystem?
> > >
> > >I have 400GB of data I'd rather not move, and SSD I could use for
> > >caching.
Am 24.07.2017 um 20:57 schrieb Pavel Machek:
Would it be feasible to run bcache (write-through) with existing ext4
filesystem?
I have 400GB of data I'd rather not move, and SSD I could use for
caching. Ok, SSD is connecte over USB2, but I guess it is still way
faster then seeking harddrive on
On Mon, Jul 24, 2017 at 9:23 AM, Rob Herring wrote:
> On Mon, Jul 24, 2017 at 08:09:15AM -0700, Andrey Smirnov wrote:
>> Cc: cphe...@gmail.com
>> Cc: Lucas Stach
>> Cc: Nikita Yushchenko
>> Cc: Rob Herring
On 22/07/17 02:11, Stefano Stabellini wrote:
> Send PVCALLS_CONNECT to the backend. Allocate a new ring and evtchn for
> the active socket.
>
> Introduce a data structure to keep track of sockets. Introduce a
> waitqueue to allow the frontend to wait on data coming from the backend
> on the
On 22/07/17 02:11, Stefano Stabellini wrote:
> Send PVCALLS_ACCEPT to the backend. Allocate a new active socket. Make
> sure that only one accept command is executed at any given time by
> setting PVCALLS_FLAG_ACCEPT_INFLIGHT and waiting on the
> inflight_accept_req waitqueue.
>
>
On Wed, Jul 19, 2017 at 06:36:53PM -0500, Franklin S Cooper Jr wrote:
> Add information regarding fixed transceiver binding. This is especially
> important for MCAN since the IP allows CAN FD mode to run significantly
> faster than what most transceivers are capable of.
>
> Signed-off-by:
Commit 0afef45654ae908536278ecb143ded5bbc713391 (staging: fsl-mc: add
support for device table matching) added kerneldoc comments for two
nonexistent structure fields, leading to these warnings in the docs build:
./include/linux/mod_devicetable.h:687: warning: Excess
struct/union/enum/typedef
A couple of kerneldoc comments in had incorrect names for
macro parameters, with this unsightly result:
./include/linux/wait.h:555: warning: No description found for parameter 'wq'
./include/linux/wait.h:555: warning: Excess function parameter 'wq_head'
description in
AMDs new Secure Encrypted Virtualization (SEV) feature allows the memory
contents of a virtual machine to be transparently encrypted with a key
unique to the guest VM. The programming and management of the encryption
keys are handled by the AMD Secure Processor (AMD-SP), which exposes the
commands
From: Tom Lendacky
Currently the nested_ctl variable in the vmcb_control_area structure is
used to indicate nested paging support. The nested paging support field
is actually defined as bit 0 of the field. In order to support a new
feature flag the usage of the
SEV-enabled guest must use ASIDs from the defined subset, while non-SEV
guests can use the remaining ASID range. The range of ASID allowed for
SEV-enabled guest is from 1 to a maximum value defined via CPUID
Fn8000_001f[ECX].
Signed-off-by: Brijesh Singh
---
In current implementation, asid allocation starts from 1, this patch
adds a min_asid variable in svm_vcpu structure to allow starting asid
from something other than 1.
Signed-off-by: Brijesh Singh
Reviewed-by: Paolo Bonzini
---
arch/x86/kvm/svm.c | 4
The SEV memory encryption engine uses a tweak such that two identical
plaintexts at different location will have a different ciphertexts.
So swapping or moving ciphertexts of two pages will not result in
plaintexts being swapped. Relocating (or migrating) a physical backing
pages for SEV guest
Extend kvm_x86_ops to add memory_encyption_enabled() ops. It returns a
boolean indicating whether memory encryption is enabled on the VCPU.
Signed-off-by: Brijesh Singh
---
arch/x86/include/asm/kvm_host.h | 1 +
arch/x86/kvm/svm.c | 8
2 files
When SEV is active, on #NPF the page fault address will contain C-bit.
We must clear the C-bit before handling the fault.
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/x86/kvm/svm.c
On 22/07/17 02:12, Stefano Stabellini wrote:
> Also add pvcalls-front to the Makefile.
>
> Signed-off-by: Stefano Stabellini
> CC: boris.ostrov...@oracle.com
> CC: jgr...@suse.com
> ---
> drivers/xen/Kconfig | 9 +
> drivers/xen/Makefile | 1 +
> 2 files changed,
amd_powerplay_display_configuration_change is never called.
Signed-off-by: Ricardo Ribalda Delgado
---
drivers/gpu/drm/amd/powerplay/amd_powerplay.c | 21 -
drivers/gpu/drm/amd/powerplay/inc/amd_powerplay.h | 3 ---
2 files changed, 24
Remove unused structure definition amd_pp_display_configuration.
Signed-off-by: Ricardo Ribalda Delgado
---
drivers/gpu/drm/amd/powerplay/inc/amd_powerplay.h | 40 ---
1 file changed, 40 deletions(-)
diff --git
display_config is never set, therefore we can assume it is zero.
Without this fix, the user will get the following invalid warning on its
dmesg:
amdgpu: [powerplay] min_core_set_clock not set.
Signed-off-by: Ricardo Ribalda Delgado
---
phm_store_dal_configuration_data is not used anymore.
Remove also reference on comments to the function
Signed-off-by: Ricardo Ribalda Delgado
---
.../gpu/drm/amd/powerplay/eventmgr/eventtasks.c| 1 -
.../gpu/drm/amd/powerplay/hwmgr/hardwaremanager.c | 25
On 2017-07-24 09:35 AM, Ricardo Ribalda Delgado wrote:
> amd_powerplay_display_configuration_change is never called.
>
> Signed-off-by: Ricardo Ribalda Delgado
> ---
> drivers/gpu/drm/amd/powerplay/amd_powerplay.c | 21 -
>
The A83T has 3 MMC controllers. The third one is a bit special, as it
supports a wider 8-bit bus, and a "new timing mode".
Signed-off-by: Chen-Yu Tsai
---
arch/arm/boot/dts/sun8i-a83t.dtsi | 59 +++
1 file changed, 59 insertions(+)
diff --git
On 07/24/2017 03:13 PM, Kirill A. Shutemov wrote:
> On Thu, Jul 13, 2017 at 05:19:22PM +0300, Andrey Ryabinin wrote:
https://git.kernel.org/pub/scm/linux/kernel/git/kas/linux.git/commit/?h=la57/boot-switching/v2=13327fec85ffe95d9c8a3f57ba174bf5d5c1fb01
> As for KASAN, I think it
From: Thierry Reding
of_device_get_match_data() can never return NULL, therefore the check
for NULL values is unnecessary.
Signed-off-by: Thierry Reding
---
drivers/gpio/gpio-tegra.c | 11 ++-
1 file changed, 2 insertions(+), 9 deletions(-)
From: Thierry Reding
Fix a couple of checkpatch warnings, such as complaints about bare
unsigned being used (instead of unsigned int) and missing blank lines
after declarations.
Signed-off-by: Thierry Reding
---
drivers/gpio/gpio-tegra.c | 32
From: Thierry Reding
Rather than manually compute the size of an array, pass the number and
element size to kcalloc().
Signed-off-by: Thierry Reding
---
drivers/gpio/gpio-tegra.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git
On Mon, 24 Jul 2017 10:16:00 +0200
Fabrice Gasnier wrote:
> On 07/23/2017 01:00 PM, Jonathan Cameron wrote:
> > On Tue, 18 Jul 2017 14:35:32 +0200
> > Fabrice Gasnier wrote:
> >
> >> STM32 ADC allows each channel to be sampled with a different
On Mon, Jul 24, 2017 at 01:25:30PM +0200, Jan Kara wrote:
> > @@ -1658,14 +1658,28 @@ static int insert_pfn(struct vm_area_struct *vma,
> > unsigned long addr,
> > if (!pte)
> > goto out;
> > retval = -EBUSY;
> > - if (!pte_none(*pte))
> > - goto out_unlock;
> > +
Hi Linus,
On mer., juil. 12 2017, Gregory CLEMENT
wrote:
> When switching to regmap, the way to compute the irq cause was
> reorganized. However while doing it, a typo was introduced: a 'xor'
> replaced a 'and'.
>
> This lead to wrong behavior in the
Hi,
On Wed, Jul 12, 2017 at 05:13:22PM +0530, Arvind Yadav wrote:
> attribute_groups are not supposed to change at runtime. All functions
> working with attribute_groups provided by work
> with const attribute_group. So mark the non-const structs as const.
>
> File size before:
>text
On Wed, Jul 19, 2017 at 07:31:14AM +0200, Jan Kiszka wrote:
> The device-specific property should be prefixed with the vendor name,
> not "linux,", as Linus Walleij pointed out. Change this and document the
> bindings of this platform device.
>
> We didn't ship the old binding in a release yet.
On 22/07/17 02:11, Stefano Stabellini wrote:
> Introduce a xenbus frontend for the pvcalls protocol, as defined by
> https://xenbits.xen.org/docs/unstable/misc/pvcalls.html.
>
> This patch only adds the stubs, the code will be added by the following
> patches.
>
> Signed-off-by: Stefano
On Mon, 24 Jul 2017 18:23:20 +0100
Robin Murphy wrote:
> On 24/07/17 18:16, Alex Williamson wrote:
> > On Thu, 20 Jul 2017 12:17:12 +0100
> > Robin Murphy wrote:
> >
> >> On 20/07/17 10:10, Will Deacon wrote:
> >>> On Thu, Jul 20, 2017 at
Andi Kleen [a...@firstfloor.org] wrote:
> On Mon, Jul 24, 2017 at 02:42:09PM -0300, Arnaldo Carvalho de Melo wrote:
> > Em Mon, Jul 24, 2017 at 04:16:49PM +0200, Jiri Olsa escreveu:
> > > On Fri, Jul 21, 2017 at 05:31:59PM -0700, Sukadev Bhattiprolu wrote:
> > > > Andi Kleen [a...@firstfloor.org]
This part of Secure Encrypted Virtualization (SEV) series focuses on the
changes required in a guest OS for SEV support.
When SEV is active, the memory content of guest OS will be transparently
encrypted
with a key unique to the guest VM.
SEV guests have concept of private and shared memory.
Update amd-memory-encryption document describing the AMD Secure Encrypted
Virtualization (SEV) feature.
Signed-off-by: Brijesh Singh
---
Documentation/x86/amd-memory-encryption.txt | 29 ++---
1 file changed, 26 insertions(+), 3 deletions(-)
diff
From: Tom Lendacky
Provide support for Secure Encyrpted Virtualization (SEV). This initial
support defines a flag that is used by the kernel to determine if it is
running with SEV active.
Signed-off-by: Tom Lendacky
Signed-off-by: Brijesh Singh
This patch set adds open source FPGA image headers. This allows FPGA
FPGA image specific information to be added to the images themselves.
The header format is a simplified form of u-boot FIT images and can be
expanded as real use cases are raised. As all the FPGA kernel
frameworks are intended
Add a document for the open source fdt FPGA header.
Signed-off-by: Alan Tull
---
Documentation/fpga/fpga-header.txt | 103 +
1 file changed, 103 insertions(+)
create mode 100644 Documentation/fpga/fpga-header.txt
diff --git
On 22/07/17 02:11, Stefano Stabellini wrote:
> Send data to an active socket by copying data to the "out" ring. Take
> the active socket out_mutex so that only one function can access the
> ring at any given time.
>
> If not enough room is available on the ring, rather than returning
>
On Mon, Jul 24, 2017 at 10:25 AM, Andy Shevchenko
wrote:
> On Mon, Jul 24, 2017 at 6:09 PM, Andrey Smirnov
> wrote:
>> Add a driver for RAVE Supervisory Processor, an MCU implementing
>> varoius bits of housekeeping functionality (watchdoging,
On Thu, Jul 20, 2017 at 10:43:53AM +0800, Mark Yao wrote:
> Signed-off-by: Mark Yao
> ---
> Changes in v5:
> - clean document commit title
> - move changes description out of docummit commit msg
>
> Changes in v2:
> - rename rk322x to rk3228
> - correct some vop
Platform Security Processor (PSP) is part of AMD Secure Processor (AMD-SP),
PSP is a dedicated processor that provides the support for key management
commands in a Secure Encrypted Virtualiztion (SEV) mode, along with
software-based Tursted Executation Environment (TEE) to enable the
third-party
Create a Documentation entry to describe the AMD Secure Encrypted
Virtualization (SEV) feature.
Signed-off-by: Brijesh Singh
---
.../virtual/kvm/amd-memory-encryption.txt | 328 +
1 file changed, 328 insertions(+)
create mode 100644
The command is used for querying the SEV guest status.
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 38 ++
1 file changed, 38 insertions(+)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index 7a77197..21f85e1 100644
---
The command is used for finializing the SEV guest launch process.
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 23 +++
1 file changed, 23 insertions(+)
diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
index 9b672eb..7a77197 100644
---
The command is used to retrieve the measurement of memory encrypted
through the LAUNCH_UPDATE_DATA command. This measurement can be used
for attestation purposes.
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 52
Hi Tejun,
On Mon, Jul 17, 2017 at 03:10:09PM -0400, Tejun Heo wrote:
> > /*
> > +* Initialize first chunk.
> > +* pcpu_first_chunk will always manage the dynamic region of the
> > +* first chunk. The static region is dropped as those addresses
>
> Would "not covered by any
Original Lustre ea_inode feature did not have ref counts on xattr inodes
because there was always one parent that referenced it. New
implementation expects ref count to be initialized which is not true for
Lustre case. Handle this by detecting Lustre created xattr inode and set
its ref count to 1.
On Mon, Jul 17, 2017 at 03:26:02PM -0400, Tejun Heo wrote:
> > This patch changes the allocator to only mark allocated pages for the
> > region the population bitmap is used for. Prior, the bitmap was marked
> > completely used as the first chunk was allocated and immutable. This is
> > misleading
On 22/07/17 02:12, Stefano Stabellini wrote:
> Implement pvcalls frontend removal function. Go through the list of
> active and passive sockets and free them all, one at a time.
>
> Signed-off-by: Stefano Stabellini
> CC: boris.ostrov...@oracle.com
> CC: jgr...@suse.com
On Wed, 19 Jul 2017 14:08:47 +0200
Jan Glauber wrote:
> Document Cavium SoC PMUs.
>
> Signed-off-by: Jan Glauber
And just to finish - the utterly trivial ;)
> ---
> Documentation/perf/cavium-pmu.txt | 74
> +++
> 1
Instead of the callsites choosing between of_cpu_device_node_get if the
CPUs are registered as of_node is populated by then and of_get_cpu_node
when the CPUs are not yet registered as CPU of_nodes are not yet stashed
thereby needing to parse the device tree, we can call of_get_cpu_node
in case the
On 24/07/2017 13:40, Claudio Imbrenda wrote:
> Simplify and improve the code so that the PID is always available in
> the uevent even when debugfs is not available.
>
> This adds a userspace_pid field to struct kvm, as per Radim's
> suggestion, so that the PID can be retrieved on destruction too.
2017-07-24 22:20 GMT+08:00 Paolo Bonzini :
> There are three issues in nested_vmx_check_exception:
>
> 1) it is not taking PFEC_MATCH/PFEC_MASK into account, as reported
> by Wanpeng Li;
>
> 2) it should rebuild the interruption info and exit qualification fields
> from
On Sat, 22 Jul 2017 12:19:38 +0800
Ding Tianhong wrote:
> Hi Sinan, Bjorn:
>
> On 2017/7/14 21:54, Sinan Kaya wrote:
> > On 7/13/2017 9:26 PM, Ding Tianhong wrote:
> >> There is no code to enable the PCIe Relaxed Ordering bit in the
> >> configuration space,
> >> it
On 24/07/17 16:16, Joe Perches wrote:
On Mon, 2017-07-24 at 16:19 +0100, Bryan O'Donoghue wrote:
On 24/07/17 12:27, Johan Hovold wrote:
On Mon, Jul 24, 2017 at 11:05:49AM +0100, Bryan O'Donoghue wrote:
commit bdfb95c4baab ("staging: greybus: remove timesync protocol support")
commit
On Wed, Jul 19, 2017 at 02:30:46PM +0800, fengl...@codeaurora.org wrote:
> From: Fenglin Wu
>
> Add property "qcom,dtest-buffer" to specify which dtest rail to feed
> when the pin is configured as a digital input.
>
> Signed-off-by: Fenglin Wu
On Wed, Jul 19, 2017 at 03:42:42PM +0530, Viresh Kumar wrote:
> The policy->transition_delay_us field is used only by the schedutil
> governor currently, and this field describes how fast the driver wants
> the cpufreq governor to change CPUs frequency. It should rather be a
> common thing across
Hi Namhyung,
On Mon, 2017-07-24 at 00:12 +0900, Namhyung Kim wrote:
> On Mon, Jun 26, 2017 at 05:49:24PM -0500, Tom Zanussi wrote:
> > Add an 'onmatch(matching.event).(param list)'
> > hist trigger action which is invoked with the set of variables or
> > event fields named in the 'param list'.
From: Tom Lendacky
When SEV is active the trampoline area will need to be in encrypted
memory so only mark the area decrypted if SME is active.
Signed-off-by: Tom Lendacky
Signed-off-by: Brijesh Singh
---
From: Tom Lendacky
When Secure Encrypted Virtualization (SEV) is active, boot data (such as
EFI related data, setup data) is encrypted and needs to be accessed as
such when mapped. Update the architecture override in early_memremap to
keep the encryption attribute when
From: Tom Lendacky
The current code checks only for sme_active() when determining whether
to perform the encryption attribute change. Include sev_active() in this
check so that memory attribute changes can occur under SME and SEV.
Signed-off-by: Tom Lendacky
From: Tom Lendacky
DMA access to memory mapped as encrypted while SEV is active can not be
encrypted during device write or decrypted during device read. In order
for DMA to properly work when SEV is active, the SWIOTLB bounce buffers
must be used.
Signed-off-by: Tom
The following changes since commit 5771a8c08880cdca3bfb4a3fc6d309d6bba20877:
Linux v4.13-rc1 (2017-07-15 15:22:10 -0700)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/krzk/linux.git
tags/samsung-soc-4.14
for you to fetch changes up to
From: Tom Lendacky
The walk_iomem_res_desc(), walk_system_ram_res() and walk_system_ram_range()
functions each have much of the same code. Create a new function that
consolidates the common code from these functions in one place to reduce
the amount of duplicated code.
The following changes since commit 5771a8c08880cdca3bfb4a3fc6d309d6bba20877:
Linux v4.13-rc1 (2017-07-15 15:22:10 -0700)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/krzk/linux.git
tags/samsung-dt-4.14
for you to fetch changes up to
From: Tom Lendacky
In prep for a new function that will need additional resource information
during the resource walk, update the resource walk callback to pass the
resource structure. Since the current callback start and end arguments
are pulled from the resource
From: Tom Lendacky
In order for memory pages to be properly mapped when SEV is active, we
need to use the PAGE_KERNEL protection attribute as the base protection.
This will insure that memory mapping of, e.g. ACPI tables, receives the
proper mapping attributes.
Linus Torvalds writes:
> On Sat, Jul 22, 2017 at 1:25 PM, Eric W. Biederman
> wrote:
>> I played with some clever changes such as limiting the copy to 48 bytes,
>> disabling the memset and the like but I could not get a strong enough
>>
The guest physical memory area holding the struct pvclock_wall_clock and
struct pvclock_vcpu_time_info are shared with the hypervisor. Hypervisor
periodically updates the contents of the memory. When SEV is active, we
must clear the encryption attributes from the shared memory pages so that
both
On Wed, Jul 19, 2017 at 05:17:54PM +0530, Abhishek Sahu wrote:
> Currently the compatible “qcom,nandcs” is being used for each
> connected NAND device to support for multiple NAND devices in the
> same bus. The same thing can be achieved by looking reg property
> for each sub nodes which contains
On Wed, Jul 19, 2017 at 05:17:52PM +0530, Abhishek Sahu wrote:
> The current compatible string “qcom,ipq806x-nand" implies that
> the driver is specific to IPQ806x. This driver can be used by
> any chip which uses EBI2 NAND controller so changed the
> compatible string to “qcom,ebi2-nandc” to give
Hi!
> > > > include/linux/mfd/madera/registers.h | 8832
> > > >
> > >
> > > So I've pulled everything but this, because honestly, that file looks
> > > like utter garbage.
> > >
> > > Why are there all those _hundreds_ of odd defines for
> > >
> > >
On Mon 2017-07-24 16:21:44, Daniel Thompson wrote:
> On 21/07/17 11:48, Enric Balletbo i Serra wrote:
> >Hardware needs a delay between setting an initial (non-zero) PWM and
> >enabling the backlight using GPIO. The post-pwm-on-delay-ms specifies
> >this delay in milli seconds. Hardware also needs
On Wed, Jul 19, 2017 at 03:11:41PM -0400, Al Cooper wrote:
> Add Device Tree binding document for Broadcom USB Device
> Controller (BDC).
>
> Signed-off-by: Al Cooper
> ---
> Documentation/devicetree/bindings/usb/brcm,bdc.txt | 29
> ++
> 1 file
On 22/07/17 02:11, Stefano Stabellini wrote:
> Send PVCALLS_BIND to the backend. Introduce a new structure, part of
> struct sock_mapping, to store information specific to passive sockets.
>
> Introduce a status field to keep track of the status of the passive
> socket.
>
> Introduce a waitqueue
On 22/07/17 02:11, Stefano Stabellini wrote:
> Send PVCALLS_LISTEN to the backend.
>
> Signed-off-by: Stefano Stabellini
> CC: boris.ostrov...@oracle.com
> CC: jgr...@suse.com
> ---
> drivers/xen/pvcalls-front.c | 49
> +
>
Yeah I noticed that, sorry if my response wasn't very clear! Should
probably wait to have my morning coffee before responding to these
messages :P
On Mon, 2017-07-24 at 21:28 +0200, Jiri Kosina wrote:
> On Mon, 24 Jul 2017, Lyude Paul wrote:
>
> > > > So, call hid_hw_open() in rmi_post_resume()
Support a FDT header for FPGA images. Header format is a simplified
FIT containing at most one FPGA image and one DT overlay.
The FPGA image section includes FPGA image info properties needed for
programming.
If present, the DT overlay image is applied after the FPGA is
programmed.
Both images
Add FPGA region API function fpga_region_free() that
undoes some of what fpga_region_program_fpga() does
to free up a region to be reprogrammed.
Signed-off-by: Alan Tull
---
drivers/fpga/fpga-region.c | 20
drivers/fpga/of-fpga-region.c| 5 +
This patch should be rolled into the next version of my
"non-dt support for FPGA regions" patchset.
Add a pointer to the device that owns the fpga_image_info to
fpga_image_info. That way the fpga_image_info_free can
drop the 'dev' parameter and we are left with:
struct fpga_image_info
Document the firmware_name attribute added for each
region.
Signed-off-by: Alan Tull
---
Documentation/ABI/testing/sysfs-class-fpga-region | 7 +++
1 file changed, 7 insertions(+)
create mode 100644 Documentation/ABI/testing/sysfs-class-fpga-region
diff --git
On Thu, Jul 20, 2017 at 12:22:44PM +0200, Matthias Brugger wrote:
> From: Matthias Brugger
>
> This patch cleans up the binding documentation stating explicitly
> the binding and it's fallback for every SoC.
>
> Signed-off-by: Matthias Brugger
> ---
>
The kerneldoc comments for try_to_wake_up_local() were out of date, leading
to these documentation build warnings:
./kernel/sched/core.c:2080: warning: No description found for parameter 'rf'
./kernel/sched/core.c:2080: warning: Excess function parameter 'cookie'
description in
On Thu, Jul 20, 2017 at 12:22:45PM +0200, Matthias Brugger wrote:
> From: Matthias Brugger
>
> This patch adds the binding for the MT6797 SoC.
>
> Signed-off-by: Matthias Brugger
> ---
> Documentation/devicetree/bindings/watchdog/mtk-wdt.txt | 1 +
>
Hi!
On thinkpad x220, USB mouse stopped working in v4.13-rc2. v4.12 was
ok, iirc.
Now, USB mouse is so common hw that I may have something wrong in my
config...? But I did not change anything there.
In v4.9:
[ 87.064408] input: Logitech USB Optical Mouse as
From: Tom Lendacky
Define the SEV enable bit for the VMCB control structure. The hypervisor
will use this bit to enable SEV in the guest.
Signed-off-by: Tom Lendacky
Signed-off-by: Brijesh Singh
---
If hardware supports encrypting then KVM_MEMORY_ENCRYPT_OP ioctl can
be used by qemu to issue platform specific memory encryption commands.
Signed-off-by: Brijesh Singh
Reviewed-by: Paolo Bonzini
---
arch/x86/include/asm/kvm_host.h | 2 ++
This CPUID provides the memory encryption support information on
AMD Platform. The complete description for CPUID leaf is available
in APM volume 2, Section 15.34
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/cpuid.c | 2 +-
arch/x86/kvm/svm.c | 6 ++
2 files
SEV hardware uses ASIDs to associate memory encryption key with the
guest VMs. During the guest creation time, we use SEV_CMD_ACTIVATE
command to bind a particular ASID to the guest. Lets make sure that
VMCB is programmed with the binded ASID before a VMRUN.
Signed-off-by: Brijesh Singh
The command is used to bootstrap SEV guest from unencrypted boot images.
The command creates a new VM encryption key (VEK) using the guest owner's
policy, public DH certificates, and session information.
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 165
On Mon, 24 Jul 2017, Pavel Machek wrote:
> On thinkpad x220, USB mouse stopped working in v4.13-rc2. v4.12 was
> ok, iirc.
>
> Now, USB mouse is so common hw that I may have something wrong in my
> config...? But I did not change anything there.
Well, your particular USB mouse requires an
The command initializes the SEV firmware and allocate a new ASID for
this guest from SEV ASID pool. The firmware must be initialized before
we issue guest launch command to create a new encryption context.
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 188
The command is used for encrypting the guest memory region using the VM
encryption key (VEK) created during LAUNCH_START.
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 165 +
1 file changed, 165 insertions(+)
The patch adds a new member (sev_info) in 'struct kvm_arch', and
setter/getter functions for the sev_info field.
Signed-off-by: Brijesh Singh
---
arch/x86/include/asm/kvm_host.h | 9 +
arch/x86/kvm/svm.c | 45 +
The command copies a plain text into guest memory and encrypts it using
the VM encryption key. The command will be used for debug purposes
(e.g setting breakpoint through gdbserver)
Signed-off-by: Brijesh Singh
---
arch/x86/kvm/svm.c | 174
On 22/07/17 02:12, Stefano Stabellini wrote:
> For active sockets, check the indexes and use the inflight_conn_req
> waitqueue to wait.
>
> For passive sockets, send PVCALLS_POLL to the backend. Use the
> inflight_accept_req waitqueue if an accept is outstanding. Otherwise use
> the inflight_req
201 - 300 of 2050 matches
Mail list logo