Confidential Computing (CoCo) guests encrypt private memory by default.
DAX memory regions allow a guest to bypass its own (private) page cache
and instead use host memory, which is not private to the guest.
Commit 867400af90f1 ("mm/memremap.c: map FS_DAX device memory as
decrypted") only ensures
On 8/26/2024 11:35 PM, Kevin Loughlin wrote:
How can I test this? Can I test it with virtio-pmem device?
Correct. Assuming the CoCo guest accesses some virtio-pmem device in
devdax mode, mmapping() this virtio-pmem device's memory region
results in the guest and host reading the same (plaintext
On 9/10/2024 3:00 PM, Gupta, Pankaj wrote:
On 8/26/2024 11:35 PM, Kevin Loughlin wrote:
How can I test this? Can I test it with virtio-pmem device?
Correct. Assuming the CoCo guest accesses some virtio-pmem device in
devdax mode, mmapping() this virtio-pmem device's memory region
resul
+Cc [MST, virtualization-list]
Hi Dan, MST,
This patch is reviewed and tested. Is there anything that needs to be
done from my side (e.g. sync with mainline)?
If there are no further comments, Can we please merge this patch?
Thank You,
Pankaj
(Adding my alternative email address to this t
I'll take a look. Generally if you want my attention you
should CC me on the patch.
Sorry for that! Did not notice the entire Cc list earlier.
Best regards,
Pankaj
virtio_transport_send_pkt in now called on transport fast path,
under RCU read lock. In that case, we have a bug: virtio_add_sgs
is called with GFP_KERNEL, and might sleep.
Pass the gfp flags as an argument, and use GFP_ATOMIC on
the fast path.
Link:
https://lore.kernel.org/all/hfcr2aget2zojmqp
On 3/5/2025 11:59 PM, Pratik R. Sampat wrote:
Abstract rep vmmcall coded into the vmgexit helper for the sev
library.
No functional change intended.
Signed-off-by: Pratik R. Sampat
Reviewed-by: Pankaj Gupta
---
tools/testing/selftests/kvm/include/x86/sev.h| 5 +
tools/testing/s
On 3/19/2025 12:32 PM, Robert Richter wrote:
If a CXL memory device returns a broken zero LSA size in its memory
device information (Identify Memory Device (Opcode 4000h), CXL
spec. 3.1, 8.2.9.9.1.1), a divide error occurs in the libnvdimm
driver:
Oops: divide error: [#1] PREEMPT SMP NOPT
simplified goto out in cpufreq_register_driver for increasing
code readability
Signed-off-by: Pankaj Gupta
Signed-off-by: Sanjeev Yadav
---
diff --git a/drivers/cpufreq/cpufreq.c b/drivers/cpufreq/cpufreq.c
index b87596b..0bc23f6 100644
--- a/drivers/cpufreq/cpufreq.c
+++ b/drivers/cpufreq/cpufr
9 matches
Mail list logo