On Mon, Mar 06, 2017 at 11:35 PM +0800, Jarkko Sakkinen wrote:
> On Fri, Mar 03, 2017 at 06:27:19PM -0700, Jerry Snitselaar wrote:
> >
> > Jarkko Sakkinen @ 2017-02-08 11:11 GMT:
> >
> > > The tpm_crb driver should follow the policy of reserving and
> > > relinquishing the locality it uses when
On Mon, Mar 06, 2017 at 11:35 PM +0800, Jarkko Sakkinen wrote:
> On Fri, Mar 03, 2017 at 06:27:19PM -0700, Jerry Snitselaar wrote:
> >
> > Jarkko Sakkinen @ 2017-02-08 11:11 GMT:
> >
> > > The tpm_crb driver should follow the policy of reserving and
> > > relinquishing the locality it uses when
Commit-ID: 74b18e1750201530ce285a5cd1269a9fb592d905
Gitweb: http://git.kernel.org/tip/74b18e1750201530ce285a5cd1269a9fb592d905
Author: Wei, Gang
AuthorDate: Wed, 2 Dec 2015 07:07:20 +
Committer: Ingo Molnar
CommitDate: Fri, 4 Dec 2015 09:25:52 +0100
x86/tboot: Update maintainer
Commit-ID: 74b18e1750201530ce285a5cd1269a9fb592d905
Gitweb: http://git.kernel.org/tip/74b18e1750201530ce285a5cd1269a9fb592d905
Author: Wei, Gang <gang@intel.com>
AuthorDate: Wed, 2 Dec 2015 07:07:20 +
Committer: Ingo Molnar <mi...@kernel.org>
CommitDate: Fri, 4 Dec 2
Update maintainer list for Intel TXT
Signed-off-by: Gang Wei
diff --git a/MAINTAINERS b/MAINTAINERS
index cba790b..84c8fe7 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -5621,9 +5621,7 @@ F:Documentation/trace/intel_th.txt
F: drivers/hwtracing/intel_th/
INTEL(R) TRUSTED EXECUTION
Update maintainer list for Intel TXT
Signed-off-by: Gang Wei <gang@intel.com>
diff --git a/MAINTAINERS b/MAINTAINERS
index cba790b..84c8fe7 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -5621,9 +5621,7 @@ F:Documentation/trace/intel_th.txt
F: drivers/hwtracing/intel_th/
Ren, Qiaowei wrote on 2013-12-10:
> Documentation/x86 is a more fitting place for intel_txt.txt.
>
> Signed-off-by: Qiaowei Ren
> ---
> Documentation/intel_txt.txt | 210
> --- Documentation/x86/intel_txt.txt
> | 210
Ren, Qiaowei wrote on 2013-12-10:
Documentation/x86 is a more fitting place for intel_txt.txt.
Signed-off-by: Qiaowei Ren qiaowei@intel.com
---
Documentation/intel_txt.txt | 210
--- Documentation/x86/intel_txt.txt
| 210
Oh, the question should be in what states all the AP CPU registers are. Do you
think we need to define the case like what Intel SDM defined for
getsec[SENTER]?
Jimmy
H. Peter Anvin wrote on 2013-05-15:
> No, this does not really answer the question of what the CPU state looks
> like.
>
>
Oh, the question should be in what states all the AP CPU registers are. Do you
think we need to define the case like what Intel SDM defined for
getsec[SENTER]?
Jimmy
H. Peter Anvin wrote on 2013-05-15:
No, this does not really answer the question of what the CPU state looks
like.
Ren,
Any comments on this patch?
Jimmy
Ren, Qiaowei wrote on 2012-10-11:
> tboot provides a better AP wakeup mechanism based on cpu MWAIT feature
> for OS/VMM. With this mechanism, system will boot faster and will NOT
> require VT to be enabled. But it requires that OS/VMM must have support
> it,
the monitored memory
(tboot-ap_wake_trigger) to bring APs out of MWAIT loops. The sipi
vector should be written in tboot-ap_wake_addr before waking up APs.
Signed-off-by: Qiaowei Ren qiaowei@intel.com
Signed-off-by: Xiaoyan Zhang xiaoyan.zh...@intel.com
Signed-off-by: Gang Wei gang@intel.com
Kent Yoder wrote on 2012-10-10:
> On Tue, Oct 09, 2012 at 05:35:22PM +0800, gang@intel.com wrote:
>> @@ -1476,7 +1477,7 @@ struct tpm_chip *tpm_register_hardware(struct
> device *dev,
>> goto put_device;
>> }
>> -if (sys_add_ppi(>kobj)) {
>> +if (tpm_add_ppi(>kobj)) {
Kent Yoder wrote on 2012-10-10:
On Tue, Oct 09, 2012 at 05:35:22PM +0800, gang@intel.com wrote:
@@ -1476,7 +1477,7 @@ struct tpm_chip *tpm_register_hardware(struct
device *dev,
goto put_device;
}
-if (sys_add_ppi(dev-kobj)) {
+if (tpm_add_ppi(dev-kobj)) {
Kent Yoder wrote on 2012-10-06:
> On Fri, Oct 05, 2012 at 11:16:06AM -0700, Eric W. Biederman wrote:
>> Ben Guthro writes:
>>
>>> I am seeing a regression in today's (Oct 5) kernel - 2 WARNINGS, and a
>>> BUG below that seems to occur upon resuming from S3.
>>>
>>> I can start a bisection with
Kent Yoder wrote on 2012-10-06:
On Fri, Oct 05, 2012 at 11:16:06AM -0700, Eric W. Biederman wrote:
Ben Guthro b...@guthro.net writes:
I am seeing a regression in today's (Oct 5) kernel - 2 WARNINGS, and a
BUG below that seems to occur upon resuming from S3.
I can start a bisection with
Acked-by: Gang Wei
> From: Xiaoyan Zhang
>
> For TXT boot, while Linux kernel trys to shutdown/S3/S4/reboot, it need to
> jump back to tboot code and do TXT teardown work. Previously kernel zapped
> all mem page identity mapping (va=pa) after booting, so tboot code mem
> address
> was mapped
Thanks for pointing it out.
Jimmy
On Thu, 2012-08-30 at 16:34 +0800, j...@perches.com wrote:
> On Thu, 2012-08-30 at 13:19 +0800, gang@intel.com wrote:
> > diff --git a/MAINTAINERS b/MAINTAINERS
> []
> > INTEL(R) TRUSTED EXECUTION TECHNOLOGY (TXT)
> []
> > -T: Mercurial
Thanks for pointing it out.
Jimmy
On Thu, 2012-08-30 at 16:34 +0800, j...@perches.com wrote:
On Thu, 2012-08-30 at 13:19 +0800, gang@intel.com wrote:
diff --git a/MAINTAINERS b/MAINTAINERS
[]
INTEL(R) TRUSTED EXECUTION TECHNOLOGY (TXT)
[]
-T: Mercurial
Acked-by: Gang Wei gang@intel.com
From: Xiaoyan Zhang xiaoyan.zh...@intel.com
For TXT boot, while Linux kernel trys to shutdown/S3/S4/reboot, it need to
jump back to tboot code and do TXT teardown work. Previously kernel zapped
all mem page identity mapping (va=pa) after booting, so
20 matches
Mail list logo