[PATCH v2 0/7] Support for running as a pKVM protected guest
Will Deacon
will at kernel.org
Fri Aug 30 09:12:15 PDT 2024
On Fri, 30 Aug 2024 14:01:43 +0100, Will Deacon wrote:
> This is version two of the series previously posted here:
>
> https://lore.kernel.org/r/20240730151113.1497-1-will@kernel.org
>
> Changes since v1:
> * New patch allocating additional hypercalls for future pKVM usage
>
> [...]
Applied to arm64 (for-next/pkvm-guest), thanks!
[1/7] firmware/smccc: Call arch-specific hook on discovering KVM services
https://git.kernel.org/arm64/c/0ba5b4ba6178
[2/7] drivers/virt: pkvm: Add initial support for running as a protected guest
https://git.kernel.org/arm64/c/a06c3fad49a5
[3/7] arm64: mm: Add top-level dispatcher for internal mem_encrypt API
https://git.kernel.org/arm64/c/e7bafbf71777
[4/7] drivers/virt: pkvm: Hook up mem_encrypt API using pKVM hypercalls
https://git.kernel.org/arm64/c/ebc59b120c58
[5/7] arm64: mm: Add confidential computing hook to ioremap_prot()
https://git.kernel.org/arm64/c/c86fa3470c10
[6/7] drivers/virt: pkvm: Intercept ioremap using pKVM MMIO_GUARD hypercall
https://git.kernel.org/arm64/c/0f1269495800
[7/7] arm64: smccc: Reserve block of KVM "vendor" services for pKVM hypercalls
https://git.kernel.org/arm64/c/21be9f7110d4
Cheers,
--
Will
https://fixes.arm64.dev
https://next.arm64.dev
https://will.arm64.dev
More information about the linux-arm-kernel
mailing list