[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20230127025922.270463-1-jarkko@profian.com>
Date: Fri, 27 Jan 2023 02:59:22 +0000
From: Jarkko Sakkinen <jarkko@...fian.com>
To: unlisted-recipients:; (no To-header on input)
Cc: Harald Hoyer <harald@...fian.com>, Tom Dohrmann <erbse.13@....de>,
Ashish Kalra <ashish.kalra@....com>,
Michael Roth <michael.roth@....com>,
Tom Lendacky <thomas.lendacky@....com>,
linux-kernel@...r.kernel.org, kvm@...r.kernel.org,
Jarkko Sakkinen <jarkko@...fian.com>,
Sean Christopherson <seanjc@...gle.com>,
Paolo Bonzini <pbonzini@...hat.com>,
Thomas Gleixner <tglx@...utronix.de>,
Ingo Molnar <mingo@...hat.com>, Borislav Petkov <bp@...en8.de>,
Dave Hansen <dave.hansen@...ux.intel.com>,
x86@...nel.org (maintainer:X86 ARCHITECTURE (32-BIT AND 64-BIT)),
"H. Peter Anvin" <hpa@...or.com>
Subject: [PATCH RFC 0/8] Enarx fixes for AMD SEV-SNP hypervisor v7
A set of fixes that we've applied on top of SNP v7 patches for running Enarx.
References:
* https://github.com/enarx/linux/releases/tag/v6.1-enarx-upm-1
* https://hackmd.io/@enarx/HJKSlW2Lo
Jarkko Sakkinen (3):
KVM: SVM: KVM_SEV_SNP_LAUNCH_RESET_VECTOR
crypto: ccp: Prevent a spurious SEV_CMD_SNP_INIT triggered by
sev_guest_init()
crypto: ccp: Move __sev_snp_init_locked() call inside
__sev_platform_init_locked()
Tom Dohrmann (5):
KVM: SVM: fix: calculate end instead of passing size
KVM: SVM: fix: initialize `npinned`
KVM: SVM: write back corrected CPUID page
KVM: SVM: fix: add separate error for missing slot
KVM: SVM: fix: Don't return an error for `GHCB_MSR_PSC_REQ`
arch/x86/include/asm/svm.h | 15 ++++--
arch/x86/kvm/svm/sev.c | 89 +++++++++++++++++++++++++++++-------
arch/x86/kvm/svm/svm.h | 1 +
drivers/crypto/ccp/sev-dev.c | 63 ++++++++++---------------
include/linux/psp-sev.h | 15 ------
include/uapi/linux/kvm.h | 5 ++
6 files changed, 113 insertions(+), 75 deletions(-)
--
2.38.1
Powered by blists - more mailing lists