Patch Series

Subject arm64: Support for Arm CCA in KVM
Author steven.price@arm.com
Date 2025-08-20 14:55:21 +0000 UTC
Version 10
Cc alexandru.elisei@arm.com alpergun@google.com aneesh.kumar@kernel.org catalin.marinas@arm.com christoffer.dall@arm.com fj0570is@fujitsu.com gankulkarni@os.amperecomputing.com gshan@redhat.com james.morse@arm.com jean-philippe@linaro.org joey.gouly@arm.com kvm@vger.kernel.org kvmarm@lists.linux.dev linux-arm-kernel@lists.infradead.org linux-coco@lists.linux.dev linux-kernel@vger.kernel.org maz@kernel.org oliver.upton@linux.dev sdonthineni@nvidia.com steven.price@arm.com suzuki.poulose@arm.com tabba@google.com vannapurve@google.com will@kernel.org yuzenghui@huawei.com

Patches (43)

Name Content
[PATCH v10 01/43] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h [Body]
[PATCH v10 02/43] arm64: RME: Handle Granule Protection Faults (GPFs) [Body]
[PATCH v10 03/43] arm64: RME: Add SMC definitions for calling the RMM [Body]
[PATCH v10 04/43] arm64: RME: Add wrappers for RMI calls [Body]
[PATCH v10 05/43] arm64: RME: Check for RME support at KVM init [Body]
[PATCH v10 06/43] arm64: RME: Define the user ABI [Body]
[PATCH v10 07/43] arm64: RME: ioctls to create and configure realms [Body]
[PATCH v10 08/43] kvm: arm64: Don't expose debug capabilities for realm guests [Body]
[PATCH v10 09/43] KVM: arm64: Allow passing machine type in KVM creation [Body]
[PATCH v10 10/43] arm64: RME: RTT tear down [Body]
[PATCH v10 11/43] arm64: RME: Allocate/free RECs to match vCPUs [Body]
[PATCH v10 12/43] KVM: arm64: vgic: Provide helper for number of list registers [Body]
[PATCH v10 13/43] arm64: RME: Support for the VGIC in realms [Body]
[PATCH v10 14/43] KVM: arm64: Support timers in realm RECs [Body]
[PATCH v10 15/43] arm64: RME: Allow VMM to set RIPAS [Body]
[PATCH v10 16/43] arm64: RME: Handle realm enter/exit [Body]
[PATCH v10 17/43] arm64: RME: Handle RMI_EXIT_RIPAS_CHANGE [Body]
[PATCH v10 18/43] KVM: arm64: Handle realm MMIO emulation [Body]
[PATCH v10 19/43] arm64: RME: Allow populating initial contents [Body]
[PATCH v10 20/43] arm64: RME: Runtime faulting of memory [Body]
[PATCH v10 21/43] KVM: arm64: Handle realm VCPU load [Body]
[PATCH v10 22/43] KVM: arm64: Validate register access for a Realm VM [Body]
[PATCH v10 23/43] KVM: arm64: Handle Realm PSCI requests [Body]
[PATCH v10 24/43] KVM: arm64: WARN on injected undef exceptions [Body]
[PATCH v10 25/43] arm64: Don't expose stolen time for realm guests [Body]
[PATCH v10 26/43] arm64: RME: allow userspace to inject aborts [Body]
[PATCH v10 27/43] arm64: RME: support RSI_HOST_CALL [Body]
[PATCH v10 28/43] arm64: RME: Allow checking SVE on VM instance [Body]
[PATCH v10 29/43] arm64: RME: Always use 4k pages for realms [Body]
[PATCH v10 30/43] arm64: RME: Prevent Device mappings for Realms [Body]
[PATCH v10 31/43] arm_pmu: Provide a mechanism for disabling the physical IRQ [Body]
[PATCH v10 32/43] arm64: RME: Enable PMU support with a realm guest [Body]
[PATCH v10 33/43] arm64: RME: Hide KVM_CAP_READONLY_MEM for realm guests [Body]
[PATCH v10 34/43] arm64: RME: Propagate number of breakpoints and watchpoints to userspace [Body]
[PATCH v10 35/43] arm64: RME: Set breakpoint parameters through SET_ONE_REG [Body]
[PATCH v10 36/43] arm64: RME: Initialize PMCR.N with number counter supported by RMM [Body]
[PATCH v10 37/43] arm64: RME: Propagate max SVE vector length from RMM [Body]
[PATCH v10 38/43] arm64: RME: Configure max SVE vector length for a Realm [Body]
[PATCH v10 39/43] arm64: RME: Provide register list for unfinalized RME RECs [Body]
[PATCH v10 40/43] arm64: RME: Provide accurate register list [Body]
[PATCH v10 41/43] KVM: arm64: Expose support for private memory [Body]
[PATCH v10 42/43] KVM: arm64: Expose KVM_ARM_VCPU_REC to user space [Body]
[PATCH v10 43/43] KVM: arm64: Allow activating realms [Body]

Session 2025-08-20

ID (for dev) fec61323-6c84-4c21-b303-301b238314ac
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
Build Base dfc0f6373094dd88e1eaf76c44f2ff01b65db851 [Config] passed [Log]
Build Patched dfc0f6373094dd88e1eaf76c44f2ff01b65db851 [Config] [patched] passed [Log]
Boot test: Patched dfc0f6373094dd88e1eaf76c44f2ff01b65db851 [Config] [patched] passed
Boot test: Base dfc0f6373094dd88e1eaf76c44f2ff01b65db851 [Config] passed
Fuzzing dfc0f6373094dd88e1eaf76c44f2ff01b65db851 [Config] dfc0f6373094dd88e1eaf76c44f2ff01b65db851 [Config] [patched] skipped [Log] [Artifacts]