On Wed Nov 13, 2024 at 6:34 AM EET, Mimi Zohar wrote:
> The module_param variable documentation needs to be updated to reflect the
> actual module_param variable 'disable_pcr_integrity'.
>
> Otherwise,
> Tested-by: Mimi Zohar
Thanks for catching that glitch. Here's updated version:
https://git.k
On Wed, 2024-11-13 at 02:24 +0200, Jarkko Sakkinen wrote:
> The initial HMAC session feature added TPM bus encryption and/or integrity
> protection to various in-kernel TPM operations. This can cause performance
> bottlenecks with IMA, as it heavily utilizes PCR extend operations.
>
> In order to
The initial HMAC session feature added TPM bus encryption and/or integrity
protection to various in-kernel TPM operations. This can cause performance
bottlenecks with IMA, as it heavily utilizes PCR extend operations.
In order to mitigate this performance issue, introduce a kernel
command-line par
On 11/12/24 12:21, Daniel Vetter wrote:
On Mon, 11 Nov 2024 at 17:39, Shuah Khan wrote:
The Code of Conduct committee's goal first and foremost is to bring about
change to ensure our community continues to foster respectful discussions.
In the interest of transparency, the CoC enforcement poli
From: Frank Rowand
Prepare KTAP Specification for the process of creating version 2.
The version will remain "2-rc" until the final commit to complete
Version 2. Adding the "-rc" ensures that none of the development
versions will be mistaken for the completed version 2.
After this commit, Sphi
Fix formatting of bulleted lists on KTAP specification for new version.
Signed-off-by: Rae Moar
---
Documentation/dev-tools/ktap.rst | 3 +++
1 file changed, 3 insertions(+)
diff --git a/Documentation/dev-tools/ktap.rst b/Documentation/dev-tools/ktap.rst
index d4529f4e38c7..496799e7b87a 100644
On Tue, Nov 05, 2024 at 12:05:08PM -0800, Nicolin Chen wrote:
> Jason Gunthorpe (1):
> iommu: Add iommu_copy_struct_from_full_user_array helper
>
> Nicolin Chen (9):
> iommufd/viommu: Add IOMMUFD_OBJ_VDEVICE and IOMMU_VDEVICE_ALLOC ioctl
> iommufd/selftest: Add IOMMU_VDEVICE_ALLOC test cover
Il lun 11 nov 2024, 21:55 Doug Covelli ha scritto:
>
> BDOOR_CMD_VCPU_MMIO_HONORS_PAT and BDOOR_CMD_VCPU_LEGACY_X2APIC_OK are not
> actually backdoor calls - they are flags returned by BDOOR_CMD_GET_VCPU_INFO.
>
> BDOOR_CMD_VCPU_MMIO_HONORS_PAT is only ever set to 1 on ESX as it is only
> relevant
On Tue, 2024-11-12 at 19:57 +0200, Jarkko Sakkinen wrote:
> On Mon Nov 11, 2024 at 9:53 PM EET, Mimi Zohar wrote:
> > > The original open coded the empty auth append with struct
> > > tpm2_null_auth since it's the only user. However, since we do have
> > > another user in trusted keys, it might ma
On Tue, Nov 12, 2024 at 12:44 PM Paolo Bonzini wrote:
>
> Il lun 11 nov 2024, 21:55 Doug Covelli ha scritto:
> >
> > BDOOR_CMD_VCPU_MMIO_HONORS_PAT and BDOOR_CMD_VCPU_LEGACY_X2APIC_OK are not
> > actually backdoor calls - they are flags returned by
> > BDOOR_CMD_GET_VCPU_INFO.
> >
> > BDOOR_CMD_
Add specification for test metadata to the KTAP v2 spec.
KTAP v1 only specifies the output format of very basic test information:
test result and test name. Any additional test information either gets
added to general diagnostic data or is not included in the output at all.
The purpose of KTAP me
Abhinav Saxena writes:
> - Fix repeated word "when" in backporting documentation
> - Remove trailing whitespace after '$' character
>
> These issues were reported by checkpatch.pl. No functional changes.
>
> Signed-off-by: Abhinav Saxena
> ---
> Documentation/process/backporting.rst | 6 +++---
I sent the following patch for review:
https://lkml.org/lkml/2024/11/12/1565
Thanks!
-Rong
On Mon, Nov 11, 2024 at 11:45 PM Klara Modin wrote:
>
> On 2024-11-12 06:38, Rong Xu wrote:
> > I compared the System.map files from Klara Modin. The linker script is
> > doing what I expected: relocating
anish kumar writes:
> Added a note to the rproc_add description regarding
> the availability of the resource-managed variant of the API.
>
> Signed-off-by: anish kumar
> ---
> Documentation/staging/remoteproc.rst | 8
> 1 file changed, 8 insertions(+)
>
> diff --git a/Documentation/sta
Prepare KTAP specification for the final release of version 2 by
removing "-rc" in the title. This would previously cause a Sphinx
warning.
This series represents the final version of KTAP version 2 that includes
the major addition of test metadata.
Signed-off-by: Rae Moar
---
Documentation/dev
From: Frank Rowand
Change the "version line" in example output from
"KTAP version 1" to "KTAP version 2".
Change version that should be used by compliant tests from 1 to 2.
Reviewed-by: Rae Moar
Signed-off-by: Frank Rowand
Signed-off-by: Rae Moar
---
Documentation/dev-tools/ktap.rst | 23 ++
This patch series represents the final release of KTAP version 2.
There have been having open discussions on version 2 for just over 2
years. This patch series marks the end of KTAP version 2 development
and beginning of the KTAP version 3 development.
The largest component of KTAP version 2 rele
On 11/12/24 11:21, Daniel Vetter wrote:
> Also, if a maintainer refuses to implement an enforcement decision,
> will they be sanctioned too? Since this is all an entirely new section
> and does not touch any of the existing sections I'm also not clear on
> when one or the other rules apply, and how
On Mon, 11 Nov 2024 at 17:39, Shuah Khan wrote:
> The Code of Conduct committee's goal first and foremost is to bring about
> change to ensure our community continues to foster respectful discussions.
>
> In the interest of transparency, the CoC enforcement policy is formalized
> for unacceptable
On Mon Nov 11, 2024 at 9:53 PM EET, Mimi Zohar wrote:
> > The original open coded the empty auth append with struct
> > tpm2_null_auth since it's the only user. However, since we do have
> > another user in trusted keys, it might make sense to consolidate.
>
> Instead of delaying the current patch
On Tue, Nov 12, 2024 at 10:12:26AM +0800, h1k0n wrote:
This message is entirely empty FYI
signature.asc
Description: PGP signature
On Tue, Nov 05, 2024 at 12:04:18PM -0800, Nicolin Chen wrote:
> --- a/drivers/iommu/iommufd/Makefile
> +++ b/drivers/iommu/iommufd/Makefile
> @@ -13,3 +13,4 @@ iommufd-$(CONFIG_IOMMUFD_TEST) += selftest.o
>
> obj-$(CONFIG_IOMMUFD) += iommufd.o
> obj-$(CONFIG_IOMMUFD_DRIVER) += iova_bitmap.o
>
On 2024/11/6 04:04, Nicolin Chen wrote:
The diagrams below show relationships between user-visible objects and kernel
@@ -101,6 +132,28 @@ creating the objects and links::
|>|iommu_domain|<|iommu_domain|<|device|
||
23 matches
Mail list logo