Displaying 15 results from an estimated 15 matches for "irq_mask".
2016 Mar 09
1
[PATCH 1/2] secboot: don't use hardcoded mask to enable falcon
The IRQ mask of the PMU falcon was left - replace it with the proper
irq_mask variable.
Signed-off-by: Alexandre Courbot <acourbot at nvidia.com>
---
drm/nouveau/nvkm/subdev/secboot/base.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drm/nouveau/nvkm/subdev/secboot/base.c b/drm/nouveau/nvkm/subdev/secboot/base.c
index b718ba79177c..05c62549...
2016 Jan 18
0
[PATCH v2 2/5] core: add support for secure boot
...OOT_FALCON_RESERVED = 1,
+ NVKM_SECBOOT_FALCON_FECS = 2,
+ NVKM_SECBOOT_FALCON_GPCCS = 3,
+ NVKM_SECBOOT_FALCON_END = 4,
+ NVKM_SECBOOT_FALCON_INVALID = 0xffffffff,
+};
+
+/**
+ * @falcon_id: falcon that will perform secure boot
+ * @base: base IO address of the falcon performing secure boot
+ * @irq_mask: IRQ mask of the falcon performing secure boot
+ * @enable_mask: enable mask of the falcon performing secure boot
+*/
+struct nvkm_secboot {
+ const struct nvkm_secboot_func *func;
+ struct nvkm_subdev subdev;
+
+ u32 base;
+ u32 irq_mask;
+ u32 enable_mask;
+};
+#define nvkm_secboot(p) container...
2016 Jan 21
2
[PATCH v2 2/5] core: add support for secure boot
...nc = func;
> +
Move these two after the switch statement ?
> + /* setup the performing falcon's base address and masks */
> + switch (func->boot_falcon) {
> + case NVKM_SECBOOT_FALCON_PMU:
> + sb->base = 0x10a000;
> + sb->irq_mask = 0x1000000;
> + sb->enable_mask = 0x2000;
> + break;
> + default:
> + nvdev_error(device, "invalid secure boot falcon\n");
> + return -EINVAL;
> + };
> +
> + nvkm_info(&sb->subdev,...
2011 May 20
8
2.6.39 dom0 xen power management test
Hi Konrad / Yu Ke,
I have tried konrad''s master tree:
commit 329408d788f62629131ea28c112e973878d52c9e
Merge: e370fe2 773f8cf
Author: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Date: Thu May 19 14:37:32 2011 -0400
Merge branch ''linux-next''
With a xen-4.1.0 hypervisor, on my AMD x6 phenom.
Curious if Xen Power Management would work...
Output of all xenpm
2016 Jan 21
0
[PATCH v2 2/5] core: add support for secure boot
...rrectly, so it's correct as-is.
>
>> + /* setup the performing falcon's base address and masks */
>> + switch (func->boot_falcon) {
>> + case NVKM_SECBOOT_FALCON_PMU:
>> + sb->base = 0x10a000;
>> + sb->irq_mask = 0x1000000;
>> + sb->enable_mask = 0x2000;
>> + break;
>> + default:
>> + nvdev_error(device, "invalid secure boot falcon\n");
>> + return -EINVAL;
>> + };
>> +
>> +...
2016 Jan 18
6
[PATCH v2 0/5] nouveau: add secure boot support for dGPU and Tegra
This is a highly changed revision of the first patch series that adds secure
boot support to Nouveau. This code still depends on NVIDIA releasing official
firmware files, but the files released with SHIELD TV and Pixel C can already
be used on a Jetson TX1.
As you know we are working hard to release the official firmware files, however
in the meantime it doesn't hurt to review the code so it
2016 Feb 24
11
[PATCH v3 00/11] nouveau: add secure boot support for dGPU and Tegra
New version of the secure boot code that works with the blobs just merged into
linux-firmware. Since the required Mesa patches are also merged, this set is
the last piece of the puzzle to get out-of-the-box accelerated Maxwell 2.
The basic code remains the same, with a few improvements with respect to how
secure falcons are started. Hopefully the patchset is better split too.
I have a
2008 Mar 27
21
[PATCH 0/5] Add MSI support to XEN
Hi, Keir,
These patches are rebased version of Yunhong''s original patches,
which were sent out before XEN 3.2 was released. These patches enable
MSI support and limited MSI-X support in XEN. Here is the original
description of the patches from Yunhong''s mail.
The basic idea including:
1) Keep vector global resource owned by xen, while split pirq into
per-domain
2016 Oct 11
10
[PATCH 0/8] Secure Boot refactoring
Hi everyone,
Apologies for the big patchset. This is a rework of the secure boot code that
moves the building of the blob into its own set of source files (and own hooks),
making the code more flexible and (hopefully) easier to understand as well.
This rework is needed to support more signed firmware for existing and new
chips. Since the firmwares in question are not available yet I cannot send
2016 Dec 14
18
[PATCH v5 0/18] Secure Boot refactoring
Sending things in a smaller chunks since it makes their reviewing
easier.
This part part 2/3 of the secboot refactoring/PMU command support
patch series. Part 1 was the new falcon library which should be
merged soon now.
This series is mainly a refactoring/sanitization of the existing
secure boot code. It does not add new features (part 3 will).
Secure boot handling is now separated by NVIDIA
2016 Oct 27
15
[PATCH v2 00/14] Secure Boot refactoring
This is a rework of the secure boot code that moves the building of the blob
into its own set of source files (and own hooks), making the code more flexible
and (hopefully) easier to understand as well.
This rework is needed to support more signed firmware for existing and new
chips. Since the firmwares in question are not available yet I cannot send the
code to manage then, but hopefully the
2016 Nov 02
15
[PATCH v3 00/15] Secure Boot refactoring
This is a rework of the secure boot code that moves the building of the blob
into its own set of source files (and own hooks), making the code more flexible
and (hopefully) easier to understand as well.
This rework is needed to support more signed firmware for existing and new
chips. Since the firmwares in question are not available yet I cannot send the
code to manage then, but hopefully the
2016 Nov 21
33
[PATCH v4 0/33] Secure Boot refactoring / signed PMU firmware support for GM20B
This revision includes initial signed PMU firmware support for GM20B
(Tegra X1). This PMU code will also be used as a basis for dGPU signed
PMU firmware support.
With the PMU code, the refactoring of secure boot should also make
more sense.
ACR (secure boot) support is now separated by the driver version it
originates from. This separation allows to run any version of the ACR
on any chip,
2017 Apr 07
34
[RFC 0/3] virtio-iommu: a paravirtualized IOMMU
This is the initial proposal for a paravirtualized IOMMU device using
virtio transport. It contains a description of the device, a Linux driver,
and a toy implementation in kvmtool. With this prototype, you can
translate DMA to guest memory from emulated (virtio), or passed-through
(VFIO) devices.
In its simplest form, implemented here, the device handles map/unmap
requests from the guest. Future
2017 Apr 07
34
[RFC 0/3] virtio-iommu: a paravirtualized IOMMU
This is the initial proposal for a paravirtualized IOMMU device using
virtio transport. It contains a description of the device, a Linux driver,
and a toy implementation in kvmtool. With this prototype, you can
translate DMA to guest memory from emulated (virtio), or passed-through
(VFIO) devices.
In its simplest form, implemented here, the device handles map/unmap
requests from the guest. Future