Patch Series

Subject arm64: Support for Arm CCA in KVM
Author steven.price@arm.com
Date 2025-12-17 10:10:38 +0000 UTC
Version 12
Cc alexandru.elisei@arm.com alpergun@google.com aneesh.kumar@kernel.org catalin.marinas@arm.com christoffer.dall@arm.com fj0570is@fujitsu.com gankulkarni@os.amperecomputing.com gshan@redhat.com james.morse@arm.com jean-philippe@linaro.org joey.gouly@arm.com kvm@vger.kernel.org kvmarm@lists.linux.dev linux-arm-kernel@lists.infradead.org linux-coco@lists.linux.dev linux-kernel@vger.kernel.org maz@kernel.org oliver.upton@linux.dev sdonthineni@nvidia.com steven.price@arm.com suzuki.poulose@arm.com tabba@google.com vannapurve@google.com will@kernel.org yuzenghui@huawei.com

Patches (46)

Name Content [All]
[PATCH v12 01/46] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h [Body]
[PATCH v12 02/46] arm64: RME: Handle Granule Protection Faults (GPFs) [Body]
[PATCH v12 03/46] arm64: RMI: Add SMC definitions for calling the RMM [Body]
[PATCH v12 04/46] arm64: RMI: Add wrappers for RMI calls [Body]
[PATCH v12 05/46] arm64: RMI: Check for RMI support at KVM init [Body]
[PATCH v12 06/46] arm64: RMI: Define the user ABI [Body]
[PATCH v12 07/46] arm64: RMI: Basic infrastructure for creating a realm. [Body]
[PATCH v12 08/46] kvm: arm64: Don't expose unsupported capabilities for realm guests [Body]
[PATCH v12 09/46] KVM: arm64: Allow passing machine type in KVM creation [Body]
[PATCH v12 10/46] arm64: RMI: RTT tear down [Body]
[PATCH v12 11/46] arm64: RMI: Activate realm on first VCPU run [Body]
[PATCH v12 12/46] arm64: RMI: Allocate/free RECs to match vCPUs [Body]
[PATCH v12 13/46] KVM: arm64: vgic: Provide helper for number of list registers [Body]
[PATCH v12 14/46] arm64: RMI: Support for the VGIC in realms [Body]
[PATCH v12 15/46] KVM: arm64: Support timers in realm RECs [Body]
[PATCH v12 16/46] arm64: RMI: Handle realm enter/exit [Body]
[PATCH v12 17/46] arm64: RMI: Handle RMI_EXIT_RIPAS_CHANGE [Body]
[PATCH v12 18/46] KVM: arm64: Handle realm MMIO emulation [Body]
[PATCH v12 19/46] KVM: arm64: Expose support for private memory [Body]
[PATCH v12 20/46] arm64: RMI: Allow populating initial contents [Body]
[PATCH v12 21/46] arm64: RMI: Set RIPAS of initial memslots [Body]
[PATCH v12 22/46] arm64: RMI: Create the realm descriptor [Body]
[PATCH v12 23/46] arm64: RMI: Add a VMID allocator for realms [Body]
[PATCH v12 24/46] arm64: RMI: Runtime faulting of memory [Body]
[PATCH v12 25/46] KVM: arm64: Handle realm VCPU load [Body]
[PATCH v12 26/46] KVM: arm64: Validate register access for a Realm VM [Body]
[PATCH v12 27/46] KVM: arm64: Handle Realm PSCI requests [Body]
[PATCH v12 28/46] KVM: arm64: WARN on injected undef exceptions [Body]
[PATCH v12 29/46] arm64: Don't expose stolen time for realm guests [Body]
[PATCH v12 30/46] arm64: RMI: allow userspace to inject aborts [Body]
[PATCH v12 31/46] arm64: RMI: support RSI_HOST_CALL [Body]
[PATCH v12 32/46] arm64: RMI: Allow checking SVE on VM instance [Body]
[PATCH v12 33/46] arm64: RMI: Always use 4k pages for realms [Body]
[PATCH v12 34/46] arm64: RMI: Prevent Device mappings for Realms [Body]
[PATCH v12 35/46] HACK: Restore per-CPU cpu_armpmu pointer [Body]
[PATCH v12 36/46] arm_pmu: Provide a mechanism for disabling the physical IRQ [Body]
[PATCH v12 37/46] arm64: RMI: Enable PMU support with a realm guest [Body]
[PATCH v12 38/46] arm64: RMI: Propagate number of breakpoints and watchpoints to userspace [Body]
[PATCH v12 39/46] arm64: RMI: Set breakpoint parameters through SET_ONE_REG [Body]
[PATCH v12 40/46] arm64: RMI: Initialize PMCR.N with number counter supported by RMM [Body]
[PATCH v12 41/46] arm64: RMI: Propagate max SVE vector length from RMM [Body]
[PATCH v12 42/46] arm64: RMI: Configure max SVE vector length for a Realm [Body]
[PATCH v12 43/46] arm64: RMI: Provide register list for unfinalized RMI RECs [Body]
[PATCH v12 44/46] arm64: RMI: Provide accurate register list [Body]
[PATCH v12 45/46] KVM: arm64: Expose KVM_ARM_VCPU_REC to user space [Body]
[PATCH v12 46/46] arm64: RMI: Enable realms to be created [Body]

Session 2025-12-17

ID (for dev) 010ae34d-357e-4cc5-afcf-cb1807b0c8a6
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base d358e5254674b70f34c847715ca509e46eb81e6f [Config] passed [Log]
[KASAN] Boot test: Base d358e5254674b70f34c847715ca509e46eb81e6f [Config] passed [Log]
[KASAN] Build Patched d358e5254674b70f34c847715ca509e46eb81e6f [Config] [patched] passed [Log]
[KASAN] Boot test: Patched d358e5254674b70f34c847715ca509e46eb81e6f [Config] [patched] passed [Log]
[KASAN] Fuzzing d358e5254674b70f34c847715ca509e46eb81e6f [Config] d358e5254674b70f34c847715ca509e46eb81e6f [Config] [patched] skipped [Log] [Artifacts]