forked from torvalds/linux
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge tag 'kvm-riscv-fixes-5.19-1' of https://github.com/kvm-riscv/linux
into HEAD KVM/riscv fixes for 5.19, take #1 - Typo fix in arch/riscv/kvm/vmid.c - Remove broken reference pattern from MAINTAINERS entry
- Loading branch information
Showing
12,794 changed files
with
1,060,441 additions
and
277,743 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
There are no files selected for viewing
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -45,6 +45,7 @@ | |
*.symversions | ||
*.tab.[ch] | ||
*.tar | ||
*.usyms | ||
*.xz | ||
*.zst | ||
Module.symvers | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -19,3 +19,13 @@ Description: The file holds the OEM PK Hash value of the endpoint device | |
read without having the device power on at least once, the file | ||
will read all 0's. | ||
Users: Any userspace application or clients interested in device info. | ||
|
||
What: /sys/bus/mhi/devices/.../soc_reset | ||
Date: April 2022 | ||
KernelVersion: 5.19 | ||
Contact: [email protected] | ||
Description: Initiates a SoC reset on the MHI controller. A SoC reset is | ||
a reset of last resort, and will require a complete re-init. | ||
This can be useful as a method of recovery if the device is | ||
non-responsive, or as a means of loading new firmware as a | ||
system administration task. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -170,6 +170,20 @@ KernelVersion: 5.1 | |
Contact: [email protected] | ||
Description: Sets the state of the third S/W led on the device | ||
|
||
What: /sys/kernel/debug/habanalabs/hl<n>/memory_scrub | ||
Date: May 2022 | ||
KernelVersion: 5.19 | ||
Contact: [email protected] | ||
Description: Allows the root user to scrub the dram memory. The scrubbing | ||
value can be set using the debugfs file memory_scrub_val. | ||
|
||
What: /sys/kernel/debug/habanalabs/hl<n>/memory_scrub_val | ||
Date: May 2022 | ||
KernelVersion: 5.19 | ||
Contact: [email protected] | ||
Description: The value to which the dram will be set to when the user | ||
scrubs the dram using 'memory_scrub' debugfs file | ||
|
||
What: /sys/kernel/debug/habanalabs/hl<n>/mmu | ||
Date: Jan 2019 | ||
KernelVersion: 5.1 | ||
|
@@ -190,6 +204,30 @@ Description: Check and display page fault or access violation mmu errors for | |
echo "0x200" > /sys/kernel/debug/habanalabs/hl0/mmu_error | ||
cat /sys/kernel/debug/habanalabs/hl0/mmu_error | ||
|
||
What: /sys/kernel/debug/habanalabs/hl<n>/monitor_dump | ||
Date: Mar 2022 | ||
KernelVersion: 5.19 | ||
Contact: [email protected] | ||
Description: Allows the root user to dump monitors status from the device's | ||
protected config space. | ||
This property is a binary blob that contains the result of the | ||
monitors registers dump. | ||
This custom interface is needed (instead of using the generic | ||
Linux user-space PCI mapping) because this space is protected | ||
and cannot be accessed using PCI read. | ||
This interface doesn't support concurrency in the same device. | ||
Only supported on GAUDI. | ||
|
||
What: /sys/kernel/debug/habanalabs/hl<n>/monitor_dump_trig | ||
Date: Mar 2022 | ||
KernelVersion: 5.19 | ||
Contact: [email protected] | ||
Description: Triggers dump of monitor data. The value to trigger the operation | ||
must be 1. Triggering the monitor dump operation initiates dump of | ||
current registers values of all monitors. | ||
When the write is finished, the user can read the "monitor_dump" | ||
blob | ||
|
||
What: /sys/kernel/debug/habanalabs/hl<n>/set_power_state | ||
Date: Jan 2019 | ||
KernelVersion: 5.1 | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -104,6 +104,20 @@ Description: Dump the status of the QM. | |
Four states: initiated, started, stopped and closed. | ||
Available for both PF and VF, and take no other effect on HPRE. | ||
|
||
What: /sys/kernel/debug/hisi_hpre/<bdf>/qm/diff_regs | ||
Date: Mar 2022 | ||
Contact: [email protected] | ||
Description: QM debug registers(regs) read hardware register value. This | ||
node is used to show the change of the qm register values. This | ||
node can be help users to check the change of register values. | ||
|
||
What: /sys/kernel/debug/hisi_hpre/<bdf>/hpre_dfx/diff_regs | ||
Date: Mar 2022 | ||
Contact: [email protected] | ||
Description: HPRE debug registers(regs) read hardware register value. This | ||
node is used to show the change of the register values. This | ||
node can be help users to check the change of register values. | ||
|
||
What: /sys/kernel/debug/hisi_hpre/<bdf>/hpre_dfx/send_cnt | ||
Date: Apr 2020 | ||
Contact: [email protected] | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -84,6 +84,20 @@ Description: Dump the status of the QM. | |
Four states: initiated, started, stopped and closed. | ||
Available for both PF and VF, and take no other effect on SEC. | ||
|
||
What: /sys/kernel/debug/hisi_sec2/<bdf>/qm/diff_regs | ||
Date: Mar 2022 | ||
Contact: [email protected] | ||
Description: QM debug registers(regs) read hardware register value. This | ||
node is used to show the change of the qm register values. This | ||
node can be help users to check the change of register values. | ||
|
||
What: /sys/kernel/debug/hisi_sec2/<bdf>/sec_dfx/diff_regs | ||
Date: Mar 2022 | ||
Contact: [email protected] | ||
Description: SEC debug registers(regs) read hardware register value. This | ||
node is used to show the change of the register values. This | ||
node can be help users to check the change of register values. | ||
|
||
What: /sys/kernel/debug/hisi_sec2/<bdf>/sec_dfx/send_cnt | ||
Date: Apr 2020 | ||
Contact: [email protected] | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -97,6 +97,20 @@ Description: Dump the status of the QM. | |
Four states: initiated, started, stopped and closed. | ||
Available for both PF and VF, and take no other effect on ZIP. | ||
|
||
What: /sys/kernel/debug/hisi_zip/<bdf>/qm/diff_regs | ||
Date: Mar 2022 | ||
Contact: [email protected] | ||
Description: QM debug registers(regs) read hardware register value. This | ||
node is used to show the change of the qm registers value. This | ||
node can be help users to check the change of register values. | ||
|
||
What: /sys/kernel/debug/hisi_zip/<bdf>/zip_dfx/diff_regs | ||
Date: Mar 2022 | ||
Contact: [email protected] | ||
Description: ZIP debug registers(regs) read hardware register value. This | ||
node is used to show the change of the registers value. this | ||
node can be help users to check the change of register values. | ||
|
||
What: /sys/kernel/debug/hisi_zip/<bdf>/zip_dfx/send_cnt | ||
Date: Apr 2020 | ||
Contact: [email protected] | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,51 @@ | ||
What: security/secrets/coco | ||
Date: February 2022 | ||
Contact: Dov Murik <[email protected]> | ||
Description: | ||
Exposes confidential computing (coco) EFI secrets to | ||
userspace via securityfs. | ||
|
||
EFI can declare memory area used by confidential computing | ||
platforms (such as AMD SEV and SEV-ES) for secret injection by | ||
the Guest Owner during VM's launch. The secrets are encrypted | ||
by the Guest Owner and decrypted inside the trusted enclave, | ||
and therefore are not readable by the untrusted host. | ||
|
||
The efi_secret module exposes the secrets to userspace. Each | ||
secret appears as a file under <securityfs>/secrets/coco, | ||
where the filename is the GUID of the entry in the secrets | ||
table. This module is loaded automatically by the EFI driver | ||
if the EFI secret area is populated. | ||
|
||
Two operations are supported for the files: read and unlink. | ||
Reading the file returns the content of secret entry. | ||
Unlinking the file overwrites the secret data with zeroes and | ||
removes the entry from the filesystem. A secret cannot be read | ||
after it has been unlinked. | ||
|
||
For example, listing the available secrets:: | ||
|
||
# modprobe efi_secret | ||
# ls -l /sys/kernel/security/secrets/coco | ||
-r--r----- 1 root root 0 Jun 28 11:54 736870e5-84f0-4973-92ec-06879ce3da0b | ||
-r--r----- 1 root root 0 Jun 28 11:54 83c83f7f-1356-4975-8b7e-d3a0b54312c6 | ||
-r--r----- 1 root root 0 Jun 28 11:54 9553f55d-3da2-43ee-ab5d-ff17f78864d2 | ||
-r--r----- 1 root root 0 Jun 28 11:54 e6f5a162-d67f-4750-a67c-5d065f2a9910 | ||
|
||
Reading the secret data by reading a file:: | ||
|
||
# cat /sys/kernel/security/secrets/coco/e6f5a162-d67f-4750-a67c-5d065f2a9910 | ||
the-content-of-the-secret-data | ||
|
||
Wiping a secret by unlinking a file:: | ||
|
||
# rm /sys/kernel/security/secrets/coco/e6f5a162-d67f-4750-a67c-5d065f2a9910 | ||
# ls -l /sys/kernel/security/secrets/coco | ||
-r--r----- 1 root root 0 Jun 28 11:54 736870e5-84f0-4973-92ec-06879ce3da0b | ||
-r--r----- 1 root root 0 Jun 28 11:54 83c83f7f-1356-4975-8b7e-d3a0b54312c6 | ||
-r--r----- 1 root root 0 Jun 28 11:54 9553f55d-3da2-43ee-ab5d-ff17f78864d2 | ||
|
||
Note: The binary format of the secrets table injected by the | ||
Guest Owner is described in | ||
drivers/virt/coco/efi_secret/efi_secret.c under "Structure of | ||
the EFI secret area". |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -293,6 +293,16 @@ Contact: [email protected] | |
Description: This contains XDomain service specific settings as | ||
bitmask. Format: %x | ||
|
||
What: /sys/bus/thunderbolt/devices/usb4_portX/connector | ||
Date: April 2022 | ||
Contact: Heikki Krogerus <[email protected]> | ||
Description: | ||
Symlink to the USB Type-C connector. This link is only | ||
created when USB Type-C Connector Class is enabled, | ||
and only if the system firmware is capable of | ||
describing the connection between a port and its | ||
connector. | ||
|
||
What: /sys/bus/thunderbolt/devices/usb4_portX/link | ||
Date: Sep 2021 | ||
KernelVersion: v5.14 | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -103,8 +103,8 @@ What: /sys/class/cxl/<afu>/api_version_compatible | |
Date: September 2014 | ||
Contact: [email protected] | ||
Description: read only | ||
Decimal value of the the lowest version of the userspace API | ||
this this kernel supports. | ||
Decimal value of the lowest version of the userspace API | ||
this kernel supports. | ||
Users: https://github.com/ibm-capi/libcxl | ||
|
||
|
||
|
Oops, something went wrong.