* [PATCH 0/3] rSTify ppc-spapr-uv-hcalls.txt.
@ 2022-01-17 19:19 lagarcia
2022-01-17 19:19 ` [PATCH 1/3] " lagarcia
` (3 more replies)
0 siblings, 4 replies; 9+ messages in thread
From: lagarcia @ 2022-01-17 19:19 UTC (permalink / raw)
To: qemu-ppc; +Cc: Leonardo Garcia, danielhb413, qemu-devel, clg
From: Leonardo Garcia <lagarcia@br.ibm.com>
Leonardo Garcia (3):
rSTify ppc-spapr-uv-hcalls.txt.
Rename ppc-spapr-uv-hcalls.txt to ppc-spapr-uv-hcalls.rst.
Link new ppc-spapr-uv-hcalls.rst to pseries.rst.
docs/specs/ppc-spapr-uv-hcalls.rst | 89 ++++++++++++++++++++++++++++++
docs/specs/ppc-spapr-uv-hcalls.txt | 76 -------------------------
docs/system/ppc/pseries.rst | 6 +-
3 files changed, 90 insertions(+), 81 deletions(-)
create mode 100644 docs/specs/ppc-spapr-uv-hcalls.rst
delete mode 100644 docs/specs/ppc-spapr-uv-hcalls.txt
--
2.34.1
^ permalink raw reply [flat|nested] 9+ messages in thread* [PATCH 1/3] rSTify ppc-spapr-uv-hcalls.txt. 2022-01-17 19:19 [PATCH 0/3] rSTify ppc-spapr-uv-hcalls.txt lagarcia @ 2022-01-17 19:19 ` lagarcia 2022-01-17 20:50 ` Daniel Henrique Barboza 2022-01-17 19:19 ` [PATCH 2/3] Rename ppc-spapr-uv-hcalls.txt to ppc-spapr-uv-hcalls.rst lagarcia ` (2 subsequent siblings) 3 siblings, 1 reply; 9+ messages in thread From: lagarcia @ 2022-01-17 19:19 UTC (permalink / raw) To: qemu-ppc; +Cc: Leonardo Garcia, danielhb413, qemu-devel, clg From: Leonardo Garcia <lagarcia@br.ibm.com> Signed-off-by: Leonardo Garcia <lagarcia@br.ibm.com> --- docs/specs/ppc-spapr-uv-hcalls.txt | 165 ++++++++++++++++------------- 1 file changed, 89 insertions(+), 76 deletions(-) diff --git a/docs/specs/ppc-spapr-uv-hcalls.txt b/docs/specs/ppc-spapr-uv-hcalls.txt index 389c2740d7..a00288deb3 100644 --- a/docs/specs/ppc-spapr-uv-hcalls.txt +++ b/docs/specs/ppc-spapr-uv-hcalls.txt @@ -1,76 +1,89 @@ -On PPC64 systems supporting Protected Execution Facility (PEF), system -memory can be placed in a secured region where only an "ultravisor" -running in firmware can provide to access it. pseries guests on such -systems can communicate with the ultravisor (via ultracalls) to switch to a -secure VM mode (SVM) where the guest's memory is relocated to this secured -region, making its memory inaccessible to normal processes/guests running on -the host. - -The various ultracalls/hypercalls relating to SVM mode are currently -only documented internally, but are planned for direct inclusion into the -public OpenPOWER version of the PAPR specification (LoPAPR/LoPAR). An internal -ACR has been filed to reserve a hypercall number range specific to this -use-case to avoid any future conflicts with the internally-maintained PAPR -specification. This document summarizes some of these details as they relate -to QEMU. - -== hypercalls needed by the ultravisor == - -Switching to SVM mode involves a number of hcalls issued by the ultravisor -to the hypervisor to orchestrate the movement of guest memory to secure -memory and various other aspects SVM mode. Numbers are assigned for these -hcalls within the reserved range 0xEF00-0xEF80. The below documents the -hcalls relevant to QEMU. - -- H_TPM_COMM (0xef10) - - For TPM_COMM_OP_EXECUTE operation: - Send a request to a TPM and receive a response, opening a new TPM session - if one has not already been opened. - - For TPM_COMM_OP_CLOSE_SESSION operation: - Close the existing TPM session, if any. - - Arguments: - - r3 : H_TPM_COMM (0xef10) - r4 : TPM operation, one of: - TPM_COMM_OP_EXECUTE (0x1) - TPM_COMM_OP_CLOSE_SESSION (0x2) - r5 : in_buffer, guest physical address of buffer containing the request - - Caller may use the same address for both request and response - r6 : in_size, size of the in buffer - - Must be less than or equal to 4KB - r7 : out_buffer, guest physical address of buffer to store the response - - Caller may use the same address for both request and response - r8 : out_size, size of the out buffer - - Must be at least 4KB, as this is the maximum request/response size - supported by most TPM implementations, including the TPM Resource - Manager in the linux kernel. - - Return values: - - r3 : H_Success request processed successfully - H_PARAMETER invalid TPM operation - H_P2 in_buffer is invalid - H_P3 in_size is invalid - H_P4 out_buffer is invalid - H_P5 out_size is invalid - H_RESOURCE problem communicating with TPM - H_FUNCTION TPM access is not currently allowed/configured - r4 : For TPM_COMM_OP_EXECUTE, the size of the response will be stored here - upon success. - - Use-case/notes: - - SVM filesystems are encrypted using a symmetric key. This key is then - wrapped/encrypted using the public key of a trusted system which has the - private key stored in the system's TPM. An Ultravisor will use this - hcall to unwrap/unseal the symmetric key using the system's TPM device - or a TPM Resource Manager associated with the device. - - The Ultravisor sets up a separate session key with the TPM in advance - during host system boot. All sensitive in and out values will be - encrypted using the session key. Though the hypervisor will see the 'in' - and 'out' buffers in raw form, any sensitive contents will generally be - encrypted using this session key. +=================================== +Hypervisor calls and the Ultravisor +=================================== + +On PPC64 systems supporting Protected Execution Facility (PEF), system memory +can be placed in a secured region where only an ultravisor running in firmware +can provide access to. pSeries guests on such systems can communicate with +the ultravisor (via ultracalls) to switch to a secure virtual machine (SVM) mode +where the guest's memory is relocated to this secured region, making its memory +inaccessible to normal processes/guests running on the host. + +The various ultracalls/hypercalls relating to SVM mode are currently only +documented internally, but are planned for direct inclusion into the Linux on +Power Architecture Reference document ([LoPAR]_). An internal ACR has been filed +to reserve a hypercall number range specific to this use case to avoid any +future conflicts with the IBM internally maintained Power Architecture Platform +Reference (PAPR+) documentation specification. This document summarizes some of +these details as they relate to QEMU. + +Hypercalls needed by the ultravisor +=================================== + +Switching to SVM mode involves a number of hcalls issued by the ultravisor to +the hypervisor to orchestrate the movement of guest memory to secure memory and +various other aspects of the SVM mode. Numbers are assigned for these hcalls +within the reserved range ``0xEF00-0xEF80``. The below documents the hcalls +relevant to QEMU. + +``H_TPM_COMM`` (``0xef10``) +--------------------------- + +SVM file systems are encrypted using a symmetric key. This key is then +wrapped/encrypted using the public key of a trusted system which has the private +key stored in the system's TPM. An Ultravisor will use this hcall to +unwrap/unseal the symmetric key using the system's TPM device or a TPM Resource +Manager associated with the device. + +The Ultravisor sets up a separate session key with the TPM in advance during +host system boot. All sensitive in and out values will be encrypted using the +session key. Though the hypervisor will see the in and out buffers in raw form, +any sensitive contents will generally be encrypted using this session key. + +Arguments: + + ``r3``: ``H_TPM_COMM`` (``0xef10``) + + ``r4``: ``TPM`` operation, one of: + + ``TPM_COMM_OP_EXECUTE`` (``0x1``): send a request to a TPM and receive a + response, opening a new TPM session if one has not already been opened. + + ``TPM_COMM_OP_CLOSE_SESSION`` (``0x2``): close the existing TPM session, if + any. + + ``r5``: ``in_buffer``, guest physical address of buffer containing the + request. Caller may use the same address for both request and response. + + ``r6``: ``in_size``, size of the in buffer. Must be less than or equal to + 4 KB. + + ``r7``: ``out_buffer``, guest physical address of buffer to store the + response. Caller may use the same address for both request and response. + + ``r8``: ``out_size``, size of the out buffer. Must be at least 4 KB, as this + is the maximum request/response size supported by most TPM implementations, + including the TPM Resource Manager in the linux kernel. + +Return values: + + ``r3``: one of the following values: + + ``H_Success``: request processed successfully. + + ``H_PARAMETER``: invalid TPM operation. + + ``H_P2``: ``in_buffer`` is invalid. + + ``H_P3``: ``in_size`` is invalid. + + ``H_P4``: ``out_buffer`` is invalid. + + ``H_P5``: ``out_size`` is invalid. + + ``H_RESOURCE``: problem communicating with TPM. + + ``H_FUNCTION``: TPM access is not currently allowed/configured. + + ``r4``: For ``TPM_COMM_OP_EXECUTE``, the size of the response will be stored + here upon success. -- 2.34.1 ^ permalink raw reply related [flat|nested] 9+ messages in thread
* Re: [PATCH 1/3] rSTify ppc-spapr-uv-hcalls.txt. 2022-01-17 19:19 ` [PATCH 1/3] " lagarcia @ 2022-01-17 20:50 ` Daniel Henrique Barboza 0 siblings, 0 replies; 9+ messages in thread From: Daniel Henrique Barboza @ 2022-01-17 20:50 UTC (permalink / raw) To: lagarcia, qemu-ppc; +Cc: Leonardo Garcia, qemu-devel, clg On 1/17/22 16:19, lagarcia@linux.ibm.com wrote: > From: Leonardo Garcia <lagarcia@br.ibm.com> > > Signed-off-by: Leonardo Garcia <lagarcia@br.ibm.com> > --- Reviewed-by: Daniel Henrique Barboza <danielhb413@gmail.com> > docs/specs/ppc-spapr-uv-hcalls.txt | 165 ++++++++++++++++------------- > 1 file changed, 89 insertions(+), 76 deletions(-) > > diff --git a/docs/specs/ppc-spapr-uv-hcalls.txt b/docs/specs/ppc-spapr-uv-hcalls.txt > index 389c2740d7..a00288deb3 100644 > --- a/docs/specs/ppc-spapr-uv-hcalls.txt > +++ b/docs/specs/ppc-spapr-uv-hcalls.txt > @@ -1,76 +1,89 @@ > -On PPC64 systems supporting Protected Execution Facility (PEF), system > -memory can be placed in a secured region where only an "ultravisor" > -running in firmware can provide to access it. pseries guests on such > -systems can communicate with the ultravisor (via ultracalls) to switch to a > -secure VM mode (SVM) where the guest's memory is relocated to this secured > -region, making its memory inaccessible to normal processes/guests running on > -the host. > - > -The various ultracalls/hypercalls relating to SVM mode are currently > -only documented internally, but are planned for direct inclusion into the > -public OpenPOWER version of the PAPR specification (LoPAPR/LoPAR). An internal > -ACR has been filed to reserve a hypercall number range specific to this > -use-case to avoid any future conflicts with the internally-maintained PAPR > -specification. This document summarizes some of these details as they relate > -to QEMU. > - > -== hypercalls needed by the ultravisor == > - > -Switching to SVM mode involves a number of hcalls issued by the ultravisor > -to the hypervisor to orchestrate the movement of guest memory to secure > -memory and various other aspects SVM mode. Numbers are assigned for these > -hcalls within the reserved range 0xEF00-0xEF80. The below documents the > -hcalls relevant to QEMU. > - > -- H_TPM_COMM (0xef10) > - > - For TPM_COMM_OP_EXECUTE operation: > - Send a request to a TPM and receive a response, opening a new TPM session > - if one has not already been opened. > - > - For TPM_COMM_OP_CLOSE_SESSION operation: > - Close the existing TPM session, if any. > - > - Arguments: > - > - r3 : H_TPM_COMM (0xef10) > - r4 : TPM operation, one of: > - TPM_COMM_OP_EXECUTE (0x1) > - TPM_COMM_OP_CLOSE_SESSION (0x2) > - r5 : in_buffer, guest physical address of buffer containing the request > - - Caller may use the same address for both request and response > - r6 : in_size, size of the in buffer > - - Must be less than or equal to 4KB > - r7 : out_buffer, guest physical address of buffer to store the response > - - Caller may use the same address for both request and response > - r8 : out_size, size of the out buffer > - - Must be at least 4KB, as this is the maximum request/response size > - supported by most TPM implementations, including the TPM Resource > - Manager in the linux kernel. > - > - Return values: > - > - r3 : H_Success request processed successfully > - H_PARAMETER invalid TPM operation > - H_P2 in_buffer is invalid > - H_P3 in_size is invalid > - H_P4 out_buffer is invalid > - H_P5 out_size is invalid > - H_RESOURCE problem communicating with TPM > - H_FUNCTION TPM access is not currently allowed/configured > - r4 : For TPM_COMM_OP_EXECUTE, the size of the response will be stored here > - upon success. > - > - Use-case/notes: > - > - SVM filesystems are encrypted using a symmetric key. This key is then > - wrapped/encrypted using the public key of a trusted system which has the > - private key stored in the system's TPM. An Ultravisor will use this > - hcall to unwrap/unseal the symmetric key using the system's TPM device > - or a TPM Resource Manager associated with the device. > - > - The Ultravisor sets up a separate session key with the TPM in advance > - during host system boot. All sensitive in and out values will be > - encrypted using the session key. Though the hypervisor will see the 'in' > - and 'out' buffers in raw form, any sensitive contents will generally be > - encrypted using this session key. > +=================================== > +Hypervisor calls and the Ultravisor > +=================================== > + > +On PPC64 systems supporting Protected Execution Facility (PEF), system memory > +can be placed in a secured region where only an ultravisor running in firmware > +can provide access to. pSeries guests on such systems can communicate with > +the ultravisor (via ultracalls) to switch to a secure virtual machine (SVM) mode > +where the guest's memory is relocated to this secured region, making its memory > +inaccessible to normal processes/guests running on the host. > + > +The various ultracalls/hypercalls relating to SVM mode are currently only > +documented internally, but are planned for direct inclusion into the Linux on > +Power Architecture Reference document ([LoPAR]_). An internal ACR has been filed > +to reserve a hypercall number range specific to this use case to avoid any > +future conflicts with the IBM internally maintained Power Architecture Platform > +Reference (PAPR+) documentation specification. This document summarizes some of > +these details as they relate to QEMU. > + > +Hypercalls needed by the ultravisor > +=================================== > + > +Switching to SVM mode involves a number of hcalls issued by the ultravisor to > +the hypervisor to orchestrate the movement of guest memory to secure memory and > +various other aspects of the SVM mode. Numbers are assigned for these hcalls > +within the reserved range ``0xEF00-0xEF80``. The below documents the hcalls > +relevant to QEMU. > + > +``H_TPM_COMM`` (``0xef10``) > +--------------------------- > + > +SVM file systems are encrypted using a symmetric key. This key is then > +wrapped/encrypted using the public key of a trusted system which has the private > +key stored in the system's TPM. An Ultravisor will use this hcall to > +unwrap/unseal the symmetric key using the system's TPM device or a TPM Resource > +Manager associated with the device. > + > +The Ultravisor sets up a separate session key with the TPM in advance during > +host system boot. All sensitive in and out values will be encrypted using the > +session key. Though the hypervisor will see the in and out buffers in raw form, > +any sensitive contents will generally be encrypted using this session key. > + > +Arguments: > + > + ``r3``: ``H_TPM_COMM`` (``0xef10``) > + > + ``r4``: ``TPM`` operation, one of: > + > + ``TPM_COMM_OP_EXECUTE`` (``0x1``): send a request to a TPM and receive a > + response, opening a new TPM session if one has not already been opened. > + > + ``TPM_COMM_OP_CLOSE_SESSION`` (``0x2``): close the existing TPM session, if > + any. > + > + ``r5``: ``in_buffer``, guest physical address of buffer containing the > + request. Caller may use the same address for both request and response. > + > + ``r6``: ``in_size``, size of the in buffer. Must be less than or equal to > + 4 KB. > + > + ``r7``: ``out_buffer``, guest physical address of buffer to store the > + response. Caller may use the same address for both request and response. > + > + ``r8``: ``out_size``, size of the out buffer. Must be at least 4 KB, as this > + is the maximum request/response size supported by most TPM implementations, > + including the TPM Resource Manager in the linux kernel. > + > +Return values: > + > + ``r3``: one of the following values: > + > + ``H_Success``: request processed successfully. > + > + ``H_PARAMETER``: invalid TPM operation. > + > + ``H_P2``: ``in_buffer`` is invalid. > + > + ``H_P3``: ``in_size`` is invalid. > + > + ``H_P4``: ``out_buffer`` is invalid. > + > + ``H_P5``: ``out_size`` is invalid. > + > + ``H_RESOURCE``: problem communicating with TPM. > + > + ``H_FUNCTION``: TPM access is not currently allowed/configured. > + > + ``r4``: For ``TPM_COMM_OP_EXECUTE``, the size of the response will be stored > + here upon success. ^ permalink raw reply [flat|nested] 9+ messages in thread
* [PATCH 2/3] Rename ppc-spapr-uv-hcalls.txt to ppc-spapr-uv-hcalls.rst. 2022-01-17 19:19 [PATCH 0/3] rSTify ppc-spapr-uv-hcalls.txt lagarcia 2022-01-17 19:19 ` [PATCH 1/3] " lagarcia @ 2022-01-17 19:19 ` lagarcia 2022-01-17 20:50 ` Daniel Henrique Barboza 2022-01-17 19:19 ` [PATCH 3/3] Link new ppc-spapr-uv-hcalls.rst to pseries.rst lagarcia 2022-01-18 12:02 ` [PATCH 0/3] rSTify ppc-spapr-uv-hcalls.txt Cédric Le Goater 3 siblings, 1 reply; 9+ messages in thread From: lagarcia @ 2022-01-17 19:19 UTC (permalink / raw) To: qemu-ppc; +Cc: Leonardo Garcia, danielhb413, qemu-devel, clg From: Leonardo Garcia <lagarcia@br.ibm.com> Signed-off-by: Leonardo Garcia <lagarcia@br.ibm.com> --- docs/specs/{ppc-spapr-uv-hcalls.txt => ppc-spapr-uv-hcalls.rst} | 0 1 file changed, 0 insertions(+), 0 deletions(-) rename docs/specs/{ppc-spapr-uv-hcalls.txt => ppc-spapr-uv-hcalls.rst} (100%) diff --git a/docs/specs/ppc-spapr-uv-hcalls.txt b/docs/specs/ppc-spapr-uv-hcalls.rst similarity index 100% rename from docs/specs/ppc-spapr-uv-hcalls.txt rename to docs/specs/ppc-spapr-uv-hcalls.rst -- 2.34.1 ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCH 2/3] Rename ppc-spapr-uv-hcalls.txt to ppc-spapr-uv-hcalls.rst. 2022-01-17 19:19 ` [PATCH 2/3] Rename ppc-spapr-uv-hcalls.txt to ppc-spapr-uv-hcalls.rst lagarcia @ 2022-01-17 20:50 ` Daniel Henrique Barboza 0 siblings, 0 replies; 9+ messages in thread From: Daniel Henrique Barboza @ 2022-01-17 20:50 UTC (permalink / raw) To: lagarcia, qemu-ppc; +Cc: Leonardo Garcia, qemu-devel, clg On 1/17/22 16:19, lagarcia@linux.ibm.com wrote: > From: Leonardo Garcia <lagarcia@br.ibm.com> > > Signed-off-by: Leonardo Garcia <lagarcia@br.ibm.com> > --- Reviewed-by: Daniel Henrique Barboza <danielhb413@gmail.com> > docs/specs/{ppc-spapr-uv-hcalls.txt => ppc-spapr-uv-hcalls.rst} | 0 > 1 file changed, 0 insertions(+), 0 deletions(-) > rename docs/specs/{ppc-spapr-uv-hcalls.txt => ppc-spapr-uv-hcalls.rst} (100%) > > diff --git a/docs/specs/ppc-spapr-uv-hcalls.txt b/docs/specs/ppc-spapr-uv-hcalls.rst > similarity index 100% > rename from docs/specs/ppc-spapr-uv-hcalls.txt > rename to docs/specs/ppc-spapr-uv-hcalls.rst ^ permalink raw reply [flat|nested] 9+ messages in thread
* [PATCH 3/3] Link new ppc-spapr-uv-hcalls.rst to pseries.rst. 2022-01-17 19:19 [PATCH 0/3] rSTify ppc-spapr-uv-hcalls.txt lagarcia 2022-01-17 19:19 ` [PATCH 1/3] " lagarcia 2022-01-17 19:19 ` [PATCH 2/3] Rename ppc-spapr-uv-hcalls.txt to ppc-spapr-uv-hcalls.rst lagarcia @ 2022-01-17 19:19 ` lagarcia 2022-01-17 20:53 ` Daniel Henrique Barboza 2022-01-18 12:02 ` [PATCH 0/3] rSTify ppc-spapr-uv-hcalls.txt Cédric Le Goater 3 siblings, 1 reply; 9+ messages in thread From: lagarcia @ 2022-01-17 19:19 UTC (permalink / raw) To: qemu-ppc; +Cc: Leonardo Garcia, danielhb413, qemu-devel, clg From: Leonardo Garcia <lagarcia@br.ibm.com> Signed-off-by: Leonardo Garcia <lagarcia@br.ibm.com> --- docs/system/ppc/pseries.rst | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/docs/system/ppc/pseries.rst b/docs/system/ppc/pseries.rst index d0aade3a31..569237dc0c 100644 --- a/docs/system/ppc/pseries.rst +++ b/docs/system/ppc/pseries.rst @@ -113,13 +113,9 @@ can also be found in QEMU documentation: ../../specs/ppc-spapr-hotplug.rst ../../specs/ppc-spapr-hcalls.rst ../../specs/ppc-spapr-numa.rst + ../../specs/ppc-spapr-uv-hcalls.rst ../../specs/ppc-spapr-xive.rst -Other documentation available in QEMU docs directory: - -* Hypervisor calls needed by the Ultravisor - (``/docs/specs/ppc-spapr-uv-hcalls.txt``). - Switching between the KVM-PR and KVM-HV kernel module ===================================================== -- 2.34.1 ^ permalink raw reply related [flat|nested] 9+ messages in thread
* Re: [PATCH 3/3] Link new ppc-spapr-uv-hcalls.rst to pseries.rst. 2022-01-17 19:19 ` [PATCH 3/3] Link new ppc-spapr-uv-hcalls.rst to pseries.rst lagarcia @ 2022-01-17 20:53 ` Daniel Henrique Barboza 2022-01-18 7:01 ` Cédric Le Goater 0 siblings, 1 reply; 9+ messages in thread From: Daniel Henrique Barboza @ 2022-01-17 20:53 UTC (permalink / raw) To: lagarcia, qemu-ppc; +Cc: Leonardo Garcia, qemu-devel, clg On 1/17/22 16:19, lagarcia@linux.ibm.com wrote: > From: Leonardo Garcia <lagarcia@br.ibm.com> > > Signed-off-by: Leonardo Garcia <lagarcia@br.ibm.com> > --- It is worth noticing that this patch applies cleanly only if the "[PATCH 0/3] rSTify ppc-spapr-hotplug.txt" [1] series is applied first. The reason is that docs/system/ppc/pseries.rst being changed here already has the ppc-spapr-hotplug.rst link. Reviewed-by: Daniel Henrique Barboza <danielhb413@gmail.com> [1] https://lists.gnu.org/archive/html/qemu-devel/2022-01/msg02701.html > docs/system/ppc/pseries.rst | 6 +----- > 1 file changed, 1 insertion(+), 5 deletions(-) > > diff --git a/docs/system/ppc/pseries.rst b/docs/system/ppc/pseries.rst > index d0aade3a31..569237dc0c 100644 > --- a/docs/system/ppc/pseries.rst > +++ b/docs/system/ppc/pseries.rst > @@ -113,13 +113,9 @@ can also be found in QEMU documentation: > ../../specs/ppc-spapr-hotplug.rst > ../../specs/ppc-spapr-hcalls.rst > ../../specs/ppc-spapr-numa.rst > + ../../specs/ppc-spapr-uv-hcalls.rst > ../../specs/ppc-spapr-xive.rst > > -Other documentation available in QEMU docs directory: > - > -* Hypervisor calls needed by the Ultravisor > - (``/docs/specs/ppc-spapr-uv-hcalls.txt``). > - > Switching between the KVM-PR and KVM-HV kernel module > ===================================================== > ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCH 3/3] Link new ppc-spapr-uv-hcalls.rst to pseries.rst. 2022-01-17 20:53 ` Daniel Henrique Barboza @ 2022-01-18 7:01 ` Cédric Le Goater 0 siblings, 0 replies; 9+ messages in thread From: Cédric Le Goater @ 2022-01-18 7:01 UTC (permalink / raw) To: Daniel Henrique Barboza, lagarcia, qemu-ppc; +Cc: Leonardo Garcia, qemu-devel On 1/17/22 21:53, Daniel Henrique Barboza wrote: > > > On 1/17/22 16:19, lagarcia@linux.ibm.com wrote: >> From: Leonardo Garcia <lagarcia@br.ibm.com> >> >> Signed-off-by: Leonardo Garcia <lagarcia@br.ibm.com> >> --- > > It is worth noticing that this patch applies cleanly only if the > > "[PATCH 0/3] rSTify ppc-spapr-hotplug.txt" [1] > > series is applied first. The reason is that docs/system/ppc/pseries.rst being changed > here already has the ppc-spapr-hotplug.rst link. yes. That's fine. I have queued the first series already. Thanks, C. ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [PATCH 0/3] rSTify ppc-spapr-uv-hcalls.txt. 2022-01-17 19:19 [PATCH 0/3] rSTify ppc-spapr-uv-hcalls.txt lagarcia ` (2 preceding siblings ...) 2022-01-17 19:19 ` [PATCH 3/3] Link new ppc-spapr-uv-hcalls.rst to pseries.rst lagarcia @ 2022-01-18 12:02 ` Cédric Le Goater 3 siblings, 0 replies; 9+ messages in thread From: Cédric Le Goater @ 2022-01-18 12:02 UTC (permalink / raw) To: lagarcia, qemu-ppc; +Cc: Leonardo Garcia, danielhb413, qemu-devel On 1/17/22 20:19, lagarcia@linux.ibm.com wrote: > From: Leonardo Garcia <lagarcia@br.ibm.com> > > Leonardo Garcia (3): > rSTify ppc-spapr-uv-hcalls.txt. > Rename ppc-spapr-uv-hcalls.txt to ppc-spapr-uv-hcalls.rst. > Link new ppc-spapr-uv-hcalls.rst to pseries.rst. > > docs/specs/ppc-spapr-uv-hcalls.rst | 89 ++++++++++++++++++++++++++++++ > docs/specs/ppc-spapr-uv-hcalls.txt | 76 ------------------------- > docs/system/ppc/pseries.rst | 6 +- > 3 files changed, 90 insertions(+), 81 deletions(-) > create mode 100644 docs/specs/ppc-spapr-uv-hcalls.rst > delete mode 100644 docs/specs/ppc-spapr-uv-hcalls.txt > Applied to ppc-7.0 Thanks, C. ^ permalink raw reply [flat|nested] 9+ messages in thread
end of thread, other threads:[~2022-01-18 12:21 UTC | newest] Thread overview: 9+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2022-01-17 19:19 [PATCH 0/3] rSTify ppc-spapr-uv-hcalls.txt lagarcia 2022-01-17 19:19 ` [PATCH 1/3] " lagarcia 2022-01-17 20:50 ` Daniel Henrique Barboza 2022-01-17 19:19 ` [PATCH 2/3] Rename ppc-spapr-uv-hcalls.txt to ppc-spapr-uv-hcalls.rst lagarcia 2022-01-17 20:50 ` Daniel Henrique Barboza 2022-01-17 19:19 ` [PATCH 3/3] Link new ppc-spapr-uv-hcalls.rst to pseries.rst lagarcia 2022-01-17 20:53 ` Daniel Henrique Barboza 2022-01-18 7:01 ` Cédric Le Goater 2022-01-18 12:02 ` [PATCH 0/3] rSTify ppc-spapr-uv-hcalls.txt Cédric Le Goater
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).