On Wed, Jul 10, 2019 at 11:28 AM Matthias Brugger
wrote:
>
>
>
> On 09/07/2019 20:20, Pavel Tatashin wrote:
> > Changelog
> > v1 - v2
> > - No changes to patches, addressed suggestion from James Morse
> > to add "arm64" tag to c
From: thiruan
add shutdown call back to close existing session with fTPM TA
to support kexec scenario.
Signed-off-by: Thirupathaiah Annapureddy
Signed-off-by: Pavel Tatashin
---
drivers/char/tpm/tpm_ftpm_tee.c | 22 ++
1 file changed, 22 insertions(+)
diff --git a
On Mon, Oct 14, 2019 at 4:03 PM Jarkko Sakkinen
wrote:
>
> On Fri, Oct 11, 2019 at 10:57:21AM -0400, Pavel Tatashin wrote:
> > From: thiruan
> >
> > add shutdown call back to close existing session with fTPM TA
> > to support kexec scenario.
> >
> >
add shutdown call back to close existing session with fTPM TA
to support kexec scenario.
Signed-off-by: Thirupathaiah Annapureddy
Signed-off-by: Pavel Tatashin
---
drivers/char/tpm/tpm_ftpm_tee.c | 14 ++
1 file changed, 14 insertions(+)
diff --git a/drivers/char/tpm
Add shutdown call back to close existing session with fTPM TA
to support kexec scenario.
Add parentheses to function names in comments as specified in kdoc.
Signed-off-by: Thirupathaiah Annapureddy
Signed-off-by: Pavel Tatashin
---
drivers/char/tpm/tpm_ftpm_tee.c | 22
On Wed, Oct 16, 2019 at 11:12 AM Jarkko Sakkinen
wrote:
>
> On Mon, Oct 14, 2019 at 04:21:35PM -0400, Pavel Tatashin wrote:
> > add shutdown call back to close existing session with fTPM TA
> > to support kexec scenario.
>
> Sentences start in English with a
On 18-11-13 02:13:44, Timofey Titovets wrote:
> From: Timofey Titovets
>
> ksm by default working only on memory that added by
> madvise().
>
> And only way get that work on other applications:
> * Use LD_PRELOAD and libraries
> * Patch kernel
>
> Lets use kernel task list and add logic to
On 18-11-13 15:23:50, Oleksandr Natalenko wrote:
> Hi.
>
> > Yep. However, so far, it requires an application to explicitly opt in
> > to this behavior, so it's not all that bad. Your patch would remove
> > the requirement for application opt-in, which, in my opinion, makes
> > this way worse and
On 18-11-13 21:17:42, Timofey Titovets wrote:
> вт, 13 нояб. 2018 г. в 20:59, Pavel Tatashin :
> >
> > On 18-11-13 15:23:50, Oleksandr Natalenko wrote:
> > > Hi.
> > >
> > > > Yep. However, so far, it requires an application to explicitly opt in
>
> > Is it really necessary to have an extra thread in ksm just to add vma's
> > for scanning? Can we do it right from the scanner thread? Also, may be
> > it is better to add vma's at their creation time when KSM_MODE_ALWAYS is
> > enabled?
> >
> > Thank you,
> > Pasha
>
> Oh, thats a long story, a
On 18-11-13 21:54:13, Timofey Titovets wrote:
> вт, 13 нояб. 2018 г. в 21:35, Pavel Tatashin :
> >
> > On 18-11-13 21:17:42, Timofey Titovets wrote:
> > > вт, 13 нояб. 2018 г. в 20:59, Pavel Tatashin :
> > > >
> > > > On 18-11-13 1
> Wait, what? Can you name specific ones? Nowadays, enabling KSM for
> untrusted VMs seems like a terrible idea to me, security-wise.
Of course it is not used to share data among different
customers/tenants, as far as I know it is used by Oracle Cloud to
merge the same pages in clear containers.
> > > That must work, but we out of bit space in vm_flags [1].
> > > i.e. first 32 bits already defined, and other only accessible only on
> > > 64-bit machines.
> >
> > So, grow vm_flags_t to 64-bit, or enable this feature on 64-bit only.
>
> With all due respect to you, for that type of things w
Hi Dou,
Have you tested tsc=unstable with your DR setup? Is it working as
expected? I mean instead of previous "notsc"?
Reviewed-by: Pavel Tatashin
Thank you,
Pavel
On Mon, Oct 9, 2017 at 5:03 AM, Dou Liyang wrote:
> Commit 8309f86cd41e ("x86/tsc: Provide 'tsc=unstable
14 matches
Mail list logo