QE tested this series of patches v2 with virtio-net regression tests,
everything works fine.
Tested-by: Lei Yang
On Sat, Mar 22, 2025 at 2:27 AM Michael S. Tsirkin wrote:
>
> On Fri, Mar 21, 2025 at 03:48:31PM +0900, Akihiko Odaki wrote:
> > Jason Wang recently proposed an improvement to struct
According to section 5.3.6.2 (Multiport Device Operation) of the virtio
spec(version 1.2) a control buffer with the event VIRTIO_CONSOLE_RESIZE
is followed by a virtio_console_resize struct containing cols then rows.
The kernel implements this the wrong way around (rows then cols) resulting
in the
From: Dapeng Mi
Define KVM_ONE_VCPU_PMU_TEST_SUITE macro which calls
vm_create_with_one_vcpu_with_pmu() to create mediated vPMU enabled VM.
Then vmx_pmu_caps_test can supported mediated vPMU's validation.
Signed-off-by: Dapeng Mi
Signed-off-by: Mingwei Zhang
---
.../selftests/kvm/include/kvm
From: Dapeng Mi
Expose enable_mediated_pmu parameter to user space, then users can
enable/disable mediated vPMU on demand.
Signed-off-by: Dapeng Mi
Signed-off-by: Mingwei Zhang
---
arch/x86/kvm/svm/svm.c | 2 ++
arch/x86/kvm/vmx/vmx.c | 2 ++
2 files changed, 4 insertions(+)
diff --git a/arc
From: Dapeng Mi
As previous patch commit 'f8905c638eb7 ("KVM: x86/pmu: Check PMU cpuid
configuration from user space")', KVM would check if user space configured
pmu version is larger than KVM supported maximum pmu version for
mediated vPMU, or if fixed counter bitmap is configured incorrectly,
i
From: Sandipan Das
Apply the PERF_PMU_CAP_MEDIATED_VPMU flag for version 2 and later
implementations of the core PMU. Aside from having Global Control and
Status registers, virtualizing the PMU using the passthrough model
requires an interface to set or clear the overflow bits in the Global
Statu
From: Dapeng Mi
Mediated vPMU needs to accumulate the emulated instructions into counter
and load the counter into HW at vm-entry.
Moreover, if the accumulation leads to counter overflow, KVM needs to
update GLOBAL_STATUS and inject PMI into guest as well.
Suggested-by: Sean Christopherson
Sig
From: Dapeng Mi
This patch supports to switch host/guest PMU context at
vm-exit/vm-entry for mediated vPMU.
In details, kvm_pmu_put_guest_context() is called to save guest PMU
context and load host PMU context at VM-exits and
kvm_pmu_load_guest_context() is called to save host PMU context and
lo
On 10/03/2025 10:45, Krzysztof Kozlowski wrote:
On Sat, Mar 08, 2025 at 03:08:37PM +0100, David Heidelberg wrote:
From: Caleb Connolly
This new property allows devices to specify some register values which
are missing on units with third party replacement displays. These
displays use unofficia
On Tue, Mar 18, 2025 at 06:20:36PM -0300, Filipe Xavier wrote:
> This new test makes sure that ftrace can trace a
> function that was introduced by a livepatch.
>
> Signed-off-by: Filipe Xavier
> ---
> tools/testing/selftests/livepatch/test-ftrace.sh | 34
>
> 1 file ch
Add nested virtualization support for mediated PMU by combining the MSR
interception bitmaps of vmcs01 and vmcs12. Readers may argue even without
this patch, nested virtualization works for mediated PMU because L1 will
see Perfmon v2 and will have to use legacy vPMU implementation if it is
Linux. H
On Mon, Mar 24, 2025 at 06:17:50PM +0530, Malaya Kumar Rout wrote:
> Static Analyis for bench_htab_mem.c with cppcheck:error
> tools/testing/selftests/x86/lam.c:585:3:
> error: Resource leak: file_fd [resourceLeak]
> tools/testing/selftests/x86/lam.c:593:3:
> error: Resource leak: file_fd [resource
On 13/02/2025 6:03 pm, Colton Lewis wrote:
If the PMU is partitioned, keep the driver out of the guest counter
partition and only use the host counter partition. Partitioning is
defined by the MDCR_EL2.HPMN register field and saved in
cpu_pmu->hpmn. The range 0..HPMN-1 is accessible by EL1 and
On Sat, 2025-03-22 at 01:29 +0100, Halil Pasic wrote:
> As per virtio spec the fields cols and rows are specified as little
> endian. Although there is no legacy interface requirement that would
> state that cols and rows need to be handled as native endian when
> legacy
> interface is used, unlike
On Mon, 24 Mar 2025 09:41:02 +0100, Luca Weiss wrote:
> From: Konrad Dybcio
>
> Add device tree bindings for video clock controller for SM6350 SoCs.
>
> Signed-off-by: Konrad Dybcio
> Co-developed-by: Luca Weiss
> Signed-off-by: Luca Weiss
> ---
> .../devicetree/bindings/clock/qcom,videocc
From: Dapeng Mi
Check if rdpmc can be intercepted for mediated vPMU. Simply speaking,
if guest own all PMU counters in mediated vPMU, then rdpmc interception
should be disabled to mitigate the performance impact, otherwise rdpmc
has to be intercepted to avoid guest obtain host counter's data via
On Tue, Mar 18, 2025 at 06:20:35PM -0300, Filipe Xavier wrote:
> Add new ftrace helpers functions cleanup_tracing, trace_function and
> check_traced_functions.
>
> Signed-off-by: Filipe Xavier
> ---
> tools/testing/selftests/livepatch/functions.sh | 49
> ++
> 1 file cha
Tested with the specjbb2015 benchmark. It has heavy lock contention which leads
to many halt calls. TDX VMs suffered a poor score before this patchset.
Verified the major performance improvement with this patchset applied.
Tested-by: Ryan Afranji
From: Kan Liang
When entering/exiting a guest, some contexts for a guest have to be
switched. For examples, there is a dedicated interrupt vector for
guests on Intel platforms.
When PMI switch into a new guest vector, guest_lvtpc value need to be
reflected onto HW, e,g., guest clear PMI mask bit
On 24/03/2025 12:02, Sabrina Dubroca wrote:
2025-03-18, 02:40:44 +0100, Antonio Quartulli wrote:
+int ovpn_crypto_state_reset(struct ovpn_crypto_state *cs,
+ const struct ovpn_peer_key_reset *pkr)
+{
+ struct ovpn_crypto_key_slot *old = NULL, *new;
+ u8 idx;
Add an option to skip sanity check of number of still idle pages,
and set it by default to skip, in case hypervisor or NUMA balancing
is detected.
Signed-off-by: Maxim Levitsky
---
.../selftests/kvm/access_tracking_perf_test.c | 33 ---
.../testing/selftests/kvm/include/test_util
Due to several issues which are unlikely to be fixed in the near future,
the access_tracking_perf_test sanity check for how many pages are still clean
after an iteration is not reliable when NUMA balancing is active.
This patch series refactors this test to skip this check by default
automaticall
Currently, the sbi_pmu_test continues if the exception type is illegal
instruction because access to hpmcounter will generate that. However, we
may get illegal for other reasons as well which should result in test
assertion.
Use the stval to decode the exact type of instructions and which csrs are
| 2 +
tools/testing/selftests/kvm/riscv/get-reg-list.c | 111 -
tools/testing/selftests/kvm/riscv/sbi_pmu_test.c | 32 ++
4 files changed, 145 insertions(+), 1 deletion(-)
---
base-commit: b3f263a98d30fe2e33eefea297598c590ee3560e
change-id: 20250324
The pull request you sent on Thu, 20 Mar 2025 14:06:42 +0100:
> git://git.kernel.org/pub/scm/linux/kernel/git/vbabka/slab.git
> tags/slab-for-6.15
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/05b00ffd7a0bf31f45b63242f30b3a8a0008fa78
Thank you!
--
Deet-doot-dot, I
Save stval during exception handling so that it can be decoded to
figure out the details of exception type.
Signed-off-by: Atish Patra
---
tools/testing/selftests/kvm/include/riscv/processor.h | 1 +
tools/testing/selftests/kvm/lib/riscv/handlers.S | 2 ++
2 files changed, 3 insertions(+)
From: Sean Christopherson
Extract the guts of thp_configured() and get_trans_hugepagesz() to
standalone helpers so that the core logic can be reused for other sysfs
files, e.g. to query numa_balancing.
Opportunistically assert that the initial fscanf() read at least one byte,
and add a comment e
Hi Antonio,
On Tue, 18 Mar 2025 02:40:44 +0100, Antonio Quartulli wrote:
>
> This change implements encryption/decryption and
> encapsulation/decapsulation of OpenVPN packets.
>
> Support for generic crypto state is added along with
> a wrapper for the AEAD crypto kernel API.
>
> Signed-off-by:
On Mon, Mar 24, 2025 at 03:03:17PM +0100, Thomas Weißschuh wrote:
> s390 does not provide a hwcap.h UAPI header.
>
> Add an inline definition for the constant HWCAP_S390_VXRS until a proper
> UAPI header is introduced.
>
> Fixes: 210860e7f733 ("selftests: vDSO: check cpu caps before running chach
Good day Iuliana,
On Tue, Mar 18, 2025 at 11:50:07PM +0200, Iuliana Prodan (OSS) wrote:
> From: Iuliana Prodan
>
> Some DSP firmware requires a FW_READY signal before proceeding, while
> others do not.
> Therefore, add support to handle i.MX DSP-specific features.
>
> Implement handle_rsc callb
Static Analyis for bench_htab_mem.c with cppcheck:error
tools/testing/selftests/x86/lam.c:585:3:
error: Resource leak: file_fd [resourceLeak]
tools/testing/selftests/x86/lam.c:593:3:
error: Resource leak: file_fd [resourceLeak]
tools/testing/selftests/x86/lam.c:600:3:
error: Memory leak: fi [memlea
With the goal of deprecating / removing VOLUNTARY preempt, live-patch
needs to stop relying on cond_resched() to make forward progress.
Instead, rely on schedule() with TASK_FREEZABLE set. Just like
live-patching, the freezer needs to be able to stop tasks in a safe /
known state.
Compile teste
> On Fri, Mar 21, 2025 at 02:34:42PM +0200, Elena Reshetova wrote:
> > Add error codes for ENCLS[EUPDATESVN], then SGX CPUSVN update
> > process can know the execution state of EUPDATESVN.
> >
>
> Enumerate the error codes.
You mean in the commit message or?
> Do we need all of the three ad
This is largely based on [1] by Suraj Jitindar Singh.
Test coverage:
- Passed manual tests with samples/livepatch.
- Passed all but test-kprobe.sh in selftests/livepatch.
test-kprobe.sh is expected to fail, because arm64 doesn't have
KPROBES_ON_FTRACE.
- Passed tests with kpatch-build [2]. (T
From: Kan Liang
Currently, the guest and host share the PMU resources when a guest is
running. KVM has to create an extra virtual event to simulate the
guest's event, which brings several issues, e.g., high overhead, not
accuracy and etc.
A new mediated PMU method is proposed to address the issu
Plumb mediated PMU capability to x86_pmu_cap in order to let any kernel
entity such as KVM know that host PMU support mediated PMU mode and has
the implementation.
Signed-off-by: Mingwei Zhang
---
arch/x86/events/core.c| 1 +
arch/x86/include/asm/perf_event.h | 1 +
2 files changed,
With joint effort from the upstream KVM community, we come up with the
4th version of mediated vPMU for x86. We have made the following changes
on top of the previous RFC v3.
v3 -> v4
- Rebase whole patchset on 6.14-rc3 base.
- Address Peter's comments on Perf part.
- Address Sean's comments on
From: Xiong Zhang
Create a new vector in the host IDT for kvm guest PMI handling within
mediated passthrough vPMU. In addition, guest PMI handler registration
is added into x86_set_kvm_irq_handler().
This is the preparation work to support mediated passthrough vPMU to
handle kvm guest PMIs witho
From: Kan Liang
Current perf doesn't explicitly schedule out all exclude_guest events
while the guest is running. There is no problem with the current
emulated vPMU. Because perf owns all the PMU counters. It can mask the
counter which is assigned to an exclude_guest event when a guest is
running
From: Kan Liang
Only KVM knows the exact time when a guest is entering/exiting. Expose
two interfaces to KVM to switch the ownership of the PMU resources.
All the pinned events must be scheduled in first. Extend the
perf_event_sched_in() helper to support extra flag, e.g., EVENT_GUEST.
Signed-o
If a guest PMI is delivered after VM-exit, the KVM maskable interrupt will
be held pending until EFLAGS.IF is set. In the meantime, if the logical
processor receives an NMI for any reason at all, perf_event_nmi_handler()
will be invoked. If there is any active perf event anywhere on the system,
x86
From: Arnd Bergmann
Every module should have a description, so add one for each of these modules.
Signed-off-by: Arnd Bergmann
---
samples/livepatch/livepatch-callbacks-busymod.c | 1 +
samples/livepatch/livepatch-callbacks-demo.c| 1 +
samples/livepatch/livepatch-callbacks-mod.c | 1 +
From: Kan Liang
Implement switch_guest_ctx interface for x86 PMU, switch PMI to dedicated
KVM_GUEST_PMI_VECTOR at perf guest enter, and switch PMI back to
NMI at perf guest exit.
Signed-off-by: Xiong Zhang
Signed-off-by: Kan Liang
Tested-by: Yongwei Ma
Signed-off-by: Mingwei Zhang
---
arch/
From: Sandipan Das
Not all x86 processors have fixed counters. It may also be the case that
a processor has only fixed counters and no general-purpose counters. Set
the bit widths corresponding to each counter type only if such counters
are available.
Fixes: b3d9468a8bd2 ("perf, x86: Expose perf
From: Dapeng Mi
Introduce enable_mediated_pmu global parameter to control if mediated
vPMU can be enabled on KVM level. Even enable_mediated_pmu is set to
true in KVM, user space hypervisor still need to enable mediated vPMU
explicitly by calling KVM_CAP_PMU_CAPABILITY ioctl. This gives
hyperviso
From: Dapeng Mi
Check user space's PMU cpuid configuration and filter the invalid
configuration.
Either legacy perf-based vPMU or mediated vPMU needs kernel to support
local APIC, otherwise PMI has no way to be injected into guest. If
kernel doesn't support local APIC, reject user space to enabl
From: Dapeng Mi
Rename the two helpers vmx_vmentry/vmexit_ctrl() to
vmx_get_initial_vmentry/vmexit_ctrl() to represent their real meaning.
No functional change intended.
Suggested-by: Sean Christopherson
Signed-off-by: Dapeng Mi
Signed-off-by: Mingwei Zhang
---
arch/x86/kvm/vmx/vmx.c | 8 ++
From: Dapeng Mi
Move PMU_CAP_{FW_WRITES,LBR_FMT} into msr-index.h and rename them with
PERF_CAP prefix to keep consistent with other perf capabilities macros.
No functional change intended.
Signed-off-by: Dapeng Mi
Signed-off-by: Mingwei Zhang
---
arch/x86/include/asm/msr-index.h | 15 ++
From: Dapeng Mi
Add macros around helpers that changes VMCS bits to simplify vmx exec ctrl
bits clearing and setting.
No function change intended.
Suggested-by: Sean Christopherson
Signed-off-by: Dapeng Mi
Signed-off-by: Mingwei Zhang
---
arch/x86/kvm/vmx/vmx.c | 20 +++-
ar
From: Dapeng Mi
Add helper intel_pmu_update_msr_intercepts() to configure the interception
of PMU MSRs.
For mediated vPMU, intercept all the guest owned GP counters EVENTSELx MSRs
and fixed counters FIX_CTR_CTRL MSR (Intel only). This is because KVM needs
to intercept the event configuration and
Reject PMU MSRs interception explicitly in
vmx_get_passthrough_msr_slot() since interception of PMU MSRs are
specially handled in intel_passthrough_pmu_msrs().
Signed-off-by: Mingwei Zhang
Co-developed-by: Dapeng Mi
Signed-off-by: Dapeng Mi
---
arch/x86/kvm/vmx/vmx.c | 12 +++-
1 file
Introduce eventsel_hw and fixed_ctr_ctrl_hw to store the actual HW value in
PMU event selector MSRs. In mediated PMU checks events before allowing the
event values written to the PMU MSRs. However, to match the HW behavior,
when PMU event checks fails, KVM should allow guest to read the value back.
From: Sandipan Das
On AMD platforms, there is no way to restore PerfCntrGlobalCtl at
VM-Entry or clear it at VM-Exit. Since the register states will be
restored before entering and saved after exiting guest context, the
counters can keep ticking and even overflow leading to chaos while
still in h
From: Sandipan Das
Add all PMU-related MSRs (including legacy K7 MSRs) to the list of
possible direct access MSRs. Most of them will not be intercepted when
using passthrough PMU.
Signed-off-by: Sandipan Das
Signed-off-by: Mingwei Zhang
---
arch/x86/kvm/svm/svm.c | 24 +++
From: Xiong Zhang
Add function to register/unregister guest KVM PMI handler at KVM module
initialization and destroy. This allows the host PMU with passthough
capability enabled can switch PMI handler at PMU context switch.
Signed-off-by: Xiong Zhang
Tested-by: Yongwei Ma
Signed-off-by: Mingwe
From: Kan Liang
Apply the PERF_PMU_CAP_MEDIATED_VPMU for Intel core PMU. It only
indicates that the perf side of core PMU is ready to support the
passthrough vPMU. Besides the capability, the hypervisor should still need
to check the PMU version and other capabilities to decide whether to enable
From: Dapeng Mi
Add macros nested_vmx_merge_msr_bitmaps_xxx() to simplify nested MSR
interception setting. No function change intended.
Suggested-by: Sean Christopherson
Signed-off-by: Dapeng Mi
Signed-off-by: Mingwei Zhang
---
arch/x86/kvm/vmx/nested.c | 35 +++--
The previous patch improved the rcu_seq_done_exact() function by adding
a meaningful constant for the guardband.
Ensure that this is working for the future by a quick check during
rcu_gp_init().
Signed-off-by: Joel Fernandes
---
kernel/rcu/tree.c | 5 +
1 file changed, 5 insertions(+)
diff
From: Frederic Weisbecker
The numbers used in rcu_seq_done_exact() lack some explanation behind
their magic. Especially after the commit:
85aad7cc4178 ("rcu: Fix get_state_synchronize_rcu_full() GP-start
detection")
which reported a subtle issue where a new GP sequence snapshot was taken
o
The rcu_seq_done_exact() function checks if a grace period has completed by
comparing sequence numbers. It includes a guard band to handle sequence number
wraparound, which was previously expressed using the magic number calculation
'3 * RCU_SEQ_STATE_MASK + 1'.
This magic number is not immediatel
QE tested this series of patches with virtio-net regression tests,
everything works fine.
Tested-by: Lei Yang
On Mon, Mar 24, 2025 at 1:45 PM Jason Wang wrote:
>
> Hello all:
>
> This sereis tries to implement the VIRTIO_F_IN_ORDER to
> virtio_ring. This is done by introducing virtqueue ops so
According to kselftest.h ksft_exit_skip() is not meant to be called when
a plan has already been printed.
Use the recommended function ksft_test_result_skip().
This fixes a bug, where the TAP output would be invalid when skipping:
TAP version 13
1..1
ok 2 # SKIP Not imple
The hwcap constants are not available unconditionally.
Include asm/hwcap.h to make them available.
Not all architectures provide this header, so gate the inclusion behind an
architecture-specific ifdef.
Fixes: 210860e7f733 ("selftests: vDSO: check cpu caps before running chacha
test")
Signed-of
HWCAP_S390_VXRS
tools/testing/selftests/vDSO/vdso_test_chacha.c | 7 ++-
1 file changed, 6 insertions(+), 1 deletion(-)
---
base-commit: 586de92313fcab8ed84ac5f78f4d2aae2db92c59
change-id: 20250324-s390-vdso-hwcap-0914c0f7c7f1
Best regards,
--
Thomas Weißschuh
s390 does not provide a hwcap.h UAPI header.
Add an inline definition for the constant HWCAP_S390_VXRS until a proper
UAPI header is introduced.
Fixes: 210860e7f733 ("selftests: vDSO: check cpu caps before running chacha
test")
Signed-off-by: Thomas Weißschuh
---
tools/testing/selftests/vDSO/v
On Fri, Mar 21, 2025 at 9:51 AM Mark Brown wrote:
>
> On Fri, Mar 21, 2025 at 09:01:35AM -0600, Nico Pache wrote:
> > On Fri, Mar 21, 2025 at 8:51 AM Mark Brown wrote:
>
> > > That user select should only be visible if KUnit is enabled though,
> > > it really is library code so shouldn't actually
On Sat, Mar 22, 2025 at 4:11 AM Richard Fitzgerald
wrote:
>
> On 20/3/25 17:35, Nico Pache wrote:
> > Sorry links got mangled
> >
> Thanks. I'm on vacation right now but I'll take a look through
> all those when I have time.
Ok thanks! no rush, enjoy your vacation!
If the links go stale (i'm not
On Tue, Mar 18, 2025 at 06:20:35PM -0300, Filipe Xavier wrote:
> [ ... snip ... ]
>
> + if [[ -n "$FTRACE_FILTER" ]]; then
> + echo "$FTRACE_FILTER" \
> + | sed -e "/ all functions enabled /d"
> + > "$SYSFS_TRACING_DIR/set_ftrace_filt
There is an assert which relies on "prio" to be signed.
GUEST_ASSERT(prio >= 0);
Change the type from uint32_t to int.
Fixes: 728fcc46d2c2 ("KVM: selftests: aarch64: Add test for restoring active
IRQs")
Fixes: 0ad3ff4a6adc ("KVM: selftests: aarch64: Add preemption tests in
vgic_irq")
S
The driver for the SM6350 videocc has been lying around in some branches
of my git tree for a long time, let's upstream it. It doesn't get any
better by letting it age!
Signed-off-by: Luca Weiss
---
Konrad Dybcio (2):
dt-bindings: clock: add SM6350 QCOM video clock bindings
clk: qcom:
DSP can be used with various frameworks (e.g audio firmware, rproc).
Currently 'dsp' configuration is intended for audio firmware but it
doesn't work well with board level DTs (e.g imx8mp-evk) because
board level DT enables audio related IPs (e.g SAI) while audio firmware
needs this IPs disabled (b
Add vector related tests with the ISA extension standard template.
However, the vector registers are bit tricky as the register length is
variable based on vlenb value of the system. That's why the macros are
defined with a default and overidden with actual value at runtime.
Signed-off-by: Atish P
From: Chen Hanxiao
[ Upstream commit cbd070a4ae62f119058973f6d2c984e325bce6e7 ]
Use pe directly to resolve sparse warning:
net/netfilter/ipvs/ip_vs_ctl.c:1471:27: warning: dereference of noderef
expression
Fixes: 39b972231536 ("ipvs: handle connections started by real-servers")
Signed-off-b
From: Chen Hanxiao
[ Upstream commit cbd070a4ae62f119058973f6d2c984e325bce6e7 ]
Use pe directly to resolve sparse warning:
net/netfilter/ipvs/ip_vs_ctl.c:1471:27: warning: dereference of noderef
expression
Fixes: 39b972231536 ("ipvs: handle connections started by real-servers")
Signed-off-b
Hello:
This series was applied to netdev/net-next.git (main)
by Jakub Kicinski :
On Mon, 17 Mar 2025 10:04:00 +0100 you wrote:
> Add strict buffer parsing index check to avoid the following Smatch
> warning:
>
> net/core/pktgen.c:877 get_imix_entries()
> warn: check that incremented offset '
Add new ftrace helpers functions cleanup_tracing, trace_function and
check_traced_functions.
Signed-off-by: Filipe Xavier
---
tools/testing/selftests/livepatch/functions.sh | 49 ++
1 file changed, 49 insertions(+)
diff --git a/tools/testing/selftests/livepatch/functions
On 24/03/2025 11:48, Sabrina Dubroca wrote:
Hello Antonio,
A few questions wrt the API:
2025-03-18, 02:40:53 +0100, Antonio Quartulli wrote:
+static bool ovpn_nl_attr_sockaddr_remote(struct nlattr **attrs,
+struct sockaddr_storage *ss)
+{
+ struct
a/tools/testing/selftests/nolibc/nolibc-test.c
+++ b/tools/testing/selftests/nolibc/nolibc-test.c
@@ -16,7 +16,6 @@
#ifndef _NOLIBC_STDIO_H
/* standard libcs need more includes */
#include
-#include
#include
#include
#include
---
base-commit: bceb73904c855c78402dca94c82915f078f259dd
chan
On Mon, Mar 24, 2025 at 7:43 AM Maximilian Immanuel Brandtner
wrote:
>
> According to section 5.3.6.2 (Multiport Device Operation) of the virtio
> spec(version 1.2) a control buffer with the event VIRTIO_CONSOLE_RESIZE
> is followed by a virtio_console_resize struct containing cols then rows.
> Th
From: Xiong Zhang
KVM will register irq handler for POSTED_INTR_WAKEUP_VECTOR and
KVM_GUEST_PMI_VECTOR, the existing kvm_set_posted_intr_wakeup_handler() is
renamed to x86_set_kvm_irq_handler(), and vector input parameter is used
to distinguish POSTED_INTR_WARKUP_VECTOR and KVM_GUEST_PMI_VECTOR.
On Thu, 20 Mar 2025 at 19:24, Miguel Ojeda
wrote:
>
> On Fri, Mar 7, 2025 at 10:01 AM David Gow wrote:
> >
> > This is v8 of the Rust/KUnit integration patch. I think all of the
> > suggestions have at least been responded to (even if there are a few I'm
> > leaving as either future projects or m
On 3/24/25 3:36 PM, Joe Lawrence wrote:
On Tue, Mar 18, 2025 at 06:20:35PM -0300, Filipe Xavier wrote:
[ ... snip ... ]
+ if [[ -n "$FTRACE_FILTER" ]]; then
+ echo "$FTRACE_FILTER" \
+ | sed -e "/ all functions enabled /d"
+
On Fri Mar 21, 2025 at 5:23 PM CET, Dmitry Baryshkov wrote:
> On 21/03/2025 18:15, Luca Weiss wrote:
>> Hi Dmitry,
>>
>> On Fri Mar 21, 2025 at 4:56 PM CET, Dmitry Baryshkov wrote:
>>> On Fri, Mar 21, 2025 at 03:45:01PM +0100, Luca Weiss wrote:
Add a node for the videocc found on the SM6350 S
While in the past the 'reg' properties were often written using decimal
'0' for #address-cells = <2> & #size-cells = <2>, nowadays the style is
to use hexadecimal '0x0' instead.
Align this dtsi file to the new style to make it consistent, and don't
use mixed 0x0 and 0 anymore.
Signed-off-by: Luca
The driver for the SM6350 videocc has been lying around in some branches
of my git tree for a long time, let's upstream it. It doesn't get any
better by letting it age!
Signed-off-by: Luca Weiss
---
Changes in v2:
- Fix an uppercase hex in driver (Dmitry)
- Use hex numbers for reg in dtsi (Dmitry
Add a node for the videocc found on the SM6350 SoC.
Signed-off-by: Luca Weiss
---
arch/arm64/boot/dts/qcom/sm6350.dtsi | 14 ++
1 file changed, 14 insertions(+)
diff --git a/arch/arm64/boot/dts/qcom/sm6350.dtsi
b/arch/arm64/boot/dts/qcom/sm6350.dtsi
index
42f9d16c2fa6da66a8bb524a3
From: Konrad Dybcio
Add support for the video clock controller found on SM6350 based
devices.
Reviewed-by: Dmitry Baryshkov
Signed-off-by: Konrad Dybcio
Co-developed-by: Luca Weiss
Signed-off-by: Luca Weiss
---
drivers/clk/qcom/Kconfig | 9 +
drivers/clk/qcom/Makefile |
From: Konrad Dybcio
Add device tree bindings for video clock controller for SM6350 SoCs.
Signed-off-by: Konrad Dybcio
Co-developed-by: Luca Weiss
Signed-off-by: Luca Weiss
---
.../devicetree/bindings/clock/qcom,videocc.yaml| 20
include/dt-bindings/clock/qcom,sm6350-vide
> On Fri, Mar 21, 2025 at 02:34:43PM +0200, Elena Reshetova wrote:
> > SGX architecture introduced a new instruction called EUPDATESVN [1]
> > to Ice Lake. It allows updating security SVN version, given that EPC
> > is completely empty. The latter is required for security reasons
> > in order to
> On Fri, Mar 21, 2025 at 02:34:40PM +0200, Elena Reshetova wrote:
> > In order to successfully execute ENCLS[EUPDATESVN], EPC must be empty.
> > SGX already has a variable sgx_nr_free_pages that tracks free
> > EPC pages. Add a new variable, sgx_nr_total_pages, that will keep
> > track of total nu
> On Fri, Mar 21, 2025 at 02:34:41PM +0200, Elena Reshetova wrote:
> > sgx_nr_free_pages is an atomic that is used to keep track of
> > free EPC pages and detect whenever page reclaiming should start.
> > Since successful execution of ENCLS[EUPDATESVN] requires empty
> > EPC and a fast way of che
On Mon, Mar 24, 2025 at 09:41:01AM +0100, Luca Weiss wrote:
> While in the past the 'reg' properties were often written using decimal
> '0' for #address-cells = <2> & #size-cells = <2>, nowadays the style is
> to use hexadecimal '0x0' instead.
>
> Align this dtsi file to the new style to make it c
On Mon, Mar 24, 2025 at 09:41:04AM +0100, Luca Weiss wrote:
> Add a node for the videocc found on the SM6350 SoC.
>
> Signed-off-by: Luca Weiss
> ---
> arch/arm64/boot/dts/qcom/sm6350.dtsi | 14 ++
> 1 file changed, 14 insertions(+)
>
Reviewed-by: Dmitry Baryshkov
--
With best w
2025-03-18, 02:40:44 +0100, Antonio Quartulli wrote:
> +int ovpn_crypto_state_reset(struct ovpn_crypto_state *cs,
> + const struct ovpn_peer_key_reset *pkr)
> +{
> + struct ovpn_crypto_key_slot *old = NULL, *new;
> + u8 idx;
> +
> + if (pkr->slot != OVPN_KEY_SLOT
Hello Antonio,
A few questions wrt the API:
2025-03-18, 02:40:53 +0100, Antonio Quartulli wrote:
> +static bool ovpn_nl_attr_sockaddr_remote(struct nlattr **attrs,
> + struct sockaddr_storage *ss)
> +{
> + struct sockaddr_in6 *sin6;
> + struct sockaddr
Factor out the split indirect descriptor detaching logic in order to
make it be reused by the in order support.
Signed-off-by: Jason Wang
---
drivers/virtio/virtio_ring.c | 63
1 file changed, 35 insertions(+), 28 deletions(-)
diff --git a/drivers/virtio/vir
The pull request you sent on Sat, 22 Mar 2025 19:21:24 -0700:
> git://git.kernel.org/pub/scm/linux/kernel/git/rcu/linux.git
> tags/rcu-next-v6.15
has been merged into torvalds/linux.git:
https://git.kernel.org/torvalds/c/3ba7dfb8da62c43ea02bc278863367c2b0427cc1
Thank you!
--
Deet-doot-dot, I
From: Dapeng Mi
Add perf_capabilities in kvm_host_values{} structure to record host perf
capabilities. KVM needs to know if host supports some PMU capabilities
and then decide if passthrough or intercept some PMU MSRs or instruction
like rdpmc, e.g. If host supports PERF_METRICES, but guest is co
On 3/22/2025 3:51 AM, Bjorn Andersson wrote:
On Mon, Mar 17, 2025 at 05:10:57PM +0530, Souradeep Chowdhury wrote:
Add device awake calls in case of rproc boot and rproc shutdown path.
Currently, device awake call is only present in the recovery path
of remoteproc. If a user stops and starts r
99 matches
Mail list logo