<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in Makefile</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2015</copyright>
    <generator>Java</generator><item>
        <title>ec51ffcf - virt: coco: Add a coco/Makefile and coco/Kconfig</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/virt/Makefile#ec51ffcf</link>
        <description>virt: coco: Add a coco/Makefile and coco/KconfigIn preparation for adding another coco build target, relievedrivers/virt/Makefile of the responsibility to track new compilationunit additions to drivers/virt/coco/, and do the same fordrivers/virt/Kconfig.Reviewed-by: Kuppuswamy Sathyanarayanan &lt;sathyanarayanan.kuppuswamy@linux.intel.com&gt;Tested-by: Kuppuswamy Sathyanarayanan &lt;sathyanarayanan.kuppuswamy@linux.intel.com&gt;Reviewed-by: Tom Lendacky &lt;thomas.lendacky@amd.com&gt;Signed-off-by: Dan Williams &lt;dan.j.williams@intel.com&gt;

            List of files:
            /linux-6.15/drivers/virt/Makefile</description>
        <pubDate>Sun, 13 Aug 2023 00:21:00 +0000</pubDate>
        <dc:creator>Dan Williams &lt;dan.j.williams@intel.com&gt;</dc:creator>
    </item>
<item>
        <title>6c8c1406 - virt: Add TDX guest driver</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/virt/Makefile#6c8c1406</link>
        <description>virt: Add TDX guest driverTDX guest driver exposes IOCTL interfaces to service TDX guestuser-specific requests. Currently, it is only used to allow the user toget the TDREPORT to support TDX attestation.Details about the TDX attestation process are documented inDocumentation/x86/tdx.rst, and the IOCTL details are documented inDocumentation/virt/coco/tdx-guest.rst.Operations like getting TDREPORT involves sending a blob of data asinput and getting another blob of data as output. It was consideredto use a sysfs interface for this, but it doesn&apos;t fit well into thestandard sysfs model for configuring values. It would be possible todo read/write on files, but it would need multiple file descriptors,which would be somewhat messy. IOCTLs seem to be the best fittingand simplest model for this use case. The AMD sev-guest driver alsouses the IOCTL interface to support attestation.[Bagas Sanjaya: Ack is for documentation portion]Signed-off-by: Kuppuswamy Sathyanarayanan &lt;sathyanarayanan.kuppuswamy@linux.intel.com&gt;Signed-off-by: Dave Hansen &lt;dave.hansen@linux.intel.com&gt;Reviewed-by: Bagas Sanjaya &lt;bagasdotme@gmail.com&gt;Reviewed-by: Tony Luck &lt;tony.luck@intel.com&gt;Reviewed-by: Mika Westerberg &lt;mika.westerberg@linux.intel.com&gt;Acked-by: Kai Huang &lt;kai.huang@intel.com&gt;Acked-by: Kirill A. Shutemov &lt;kirill.shutemov@linux.intel.com&gt;Acked-by: Wander Lairson Costa &lt;wander@redhat.com&gt;Link: https://lore.kernel.org/all/20221116223820.819090-3-sathyanarayanan.kuppuswamy%40linux.intel.com

            List of files:
            /linux-6.15/drivers/virt/Makefile</description>
        <pubDate>Wed, 16 Nov 2022 22:38:19 +0000</pubDate>
        <dc:creator>Kuppuswamy Sathyanarayanan &lt;sathyanarayanan.kuppuswamy@linux.intel.com&gt;</dc:creator>
    </item>
<item>
        <title>d63670d2 - virt: sevguest: Rename the sevguest dir and files to sev-guest</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/virt/Makefile#d63670d2</link>
        <description>virt: sevguest: Rename the sevguest dir and files to sev-guestRename the drivers/virt/coco/sevguest directory and files to sev-guestso as to match the driver name.  [ bp: Rename Documentation/virt/coco/sevguest.rst too, as reported by sfr:    https://lore.kernel.org/r/20220427101059.3bf55262@canb.auug.org.au ]Signed-off-by: Tom Lendacky &lt;thomas.lendacky@amd.com&gt;Signed-off-by: Borislav Petkov &lt;bp@suse.de&gt;Link: https://lore.kernel.org/r/2f5c9cb16e3a67599c8e3170f6c72c8712c47d53.1650464054.git.thomas.lendacky@amd.com

            List of files:
            /linux-6.15/drivers/virt/Makefile</description>
        <pubDate>Wed, 20 Apr 2022 14:14:14 +0000</pubDate>
        <dc:creator>Tom Lendacky &lt;thomas.lendacky@amd.com&gt;</dc:creator>
    </item>
<item>
        <title>cbabf03c - virt: Add efi_secret module to expose confidential computing secrets</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/virt/Makefile#cbabf03c</link>
        <description>virt: Add efi_secret module to expose confidential computing secretsThe new efi_secret module exposes the confidential computing (coco)EFI secret area via securityfs interface.When the module is loaded (and securityfs is mounted, typically under/sys/kernel/security), a &quot;secrets/coco&quot; directory is created insecurityfs.  In it, a file is created for each secret entry.  The nameof each such file is the GUID of the secret entry, and its content isthe secret data.This allows applications running in a confidential computing setting toread secrets provided by the guest owner via a secure secret injectionmechanism (such as AMD SEV&apos;s LAUNCH_SECRET command).Removing (unlinking) files in the &quot;secrets/coco&quot; directory will zero outthe secret in memory, and remove the filesystem entry.  If the module isremoved and loaded again, that secret will not appear in the filesystem.Signed-off-by: Dov Murik &lt;dovmurik@linux.ibm.com&gt;Reviewed-by: Gerd Hoffmann &lt;kraxel@redhat.com&gt;Link: https://lore.kernel.org/r/20220412212127.154182-3-dovmurik@linux.ibm.comSigned-off-by: Ard Biesheuvel &lt;ardb@kernel.org&gt;

            List of files:
            /linux-6.15/drivers/virt/Makefile</description>
        <pubDate>Tue, 12 Apr 2022 21:21:25 +0000</pubDate>
        <dc:creator>Dov Murik &lt;dovmurik@linux.ibm.com&gt;</dc:creator>
    </item>
<item>
        <title>fce96cf0 - virt: Add SEV-SNP guest driver</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/virt/Makefile#fce96cf0</link>
        <description>virt: Add SEV-SNP guest driverThe SEV-SNP specification provides the guest a mechanism to communicatewith the PSP without risk from a malicious hypervisor who wishes toread, alter, drop or replay the messages sent. The driver usessnp_issue_guest_request() to issue GHCB SNP_GUEST_REQUEST orSNP_EXT_GUEST_REQUEST NAE events to submit the request to PSP.The PSP requires that all communication should be encrypted using keyspecified through a struct snp_guest_platform_data descriptor.Userspace can use SNP_GET_REPORT ioctl() to query the guest attestationreport.See SEV-SNP spec section Guest Messages for more details.  [ bp: Remove the &quot;what&quot; from the commit message, massage. ]Signed-off-by: Brijesh Singh &lt;brijesh.singh@amd.com&gt;Signed-off-by: Borislav Petkov &lt;bp@suse.de&gt;Link: https://lore.kernel.org/r/20220307213356.2797205-44-brijesh.singh@amd.com

            List of files:
            /linux-6.15/drivers/virt/Makefile</description>
        <pubDate>Mon, 07 Mar 2022 21:33:53 +0000</pubDate>
        <dc:creator>Brijesh Singh &lt;brijesh.singh@amd.com&gt;</dc:creator>
    </item>
<item>
        <title>af6b54e2 - virt: vmgenid: notify RNG of VM fork and supply generation ID</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/virt/Makefile#af6b54e2</link>
        <description>virt: vmgenid: notify RNG of VM fork and supply generation IDVM Generation ID is a feature from Microsoft, described at&lt;https://go.microsoft.com/fwlink/?LinkId=260709&gt;, and supported byHyper-V and QEMU. Its usage is described in Microsoft&apos;s RNG whitepaper,&lt;https://aka.ms/win10rng&gt;, as:    If the OS is running in a VM, there is a problem that most    hypervisors can snapshot the state of the machine and later rewind    the VM state to the saved state. This results in the machine running    a second time with the exact same RNG state, which leads to serious    security problems.  To reduce the window of vulnerability, Windows    10 on a Hyper-V VM will detect when the VM state is reset, retrieve    a unique (not random) value from the hypervisor, and reseed the root    RNG with that unique value.  This does not eliminate the    vulnerability, but it greatly reduces the time during which the RNG    system will produce the same outputs as it did during a previous    instantiation of the same VM state.Linux has the same issue, and given that vmgenid is supported already bymultiple hypervisors, we can implement more or less the same solution.So this commit wires up the vmgenid ACPI notification to the RNG&apos;s newlyadded add_vmfork_randomness() function.It can be used from qemu via the `-device vmgenid,guid=auto` parameter.After setting that, use `savevm` in the monitor to save the VM state,then quit QEMU, start it again, and use `loadvm`. That will trigger thisdriver&apos;s notify function, which hands the new UUID to the RNG. This isdescribed in &lt;https://git.qemu.org/?p=qemu.git;a=blob;f=docs/specs/vmgenid.txt&gt;.And there are hooks for this in libvirt as well, described in&lt;https://libvirt.org/formatdomain.html#general-metadata&gt;.Note, however, that the treatment of this as a UUID is considered to bean accidental QEMU nuance, per&lt;https://github.com/libguestfs/virt-v2v/blob/master/docs/vm-generation-id-across-hypervisors.txt&gt;,so this driver simply treats these bytes as an opaque 128-bit binaryblob, as per the spec. This doesn&apos;t really make a difference anyway,considering that&apos;s how it ends up when handed to the RNG in the end.Cc: Alexander Graf &lt;graf@amazon.com&gt;Cc: Adrian Catangiu &lt;adrian@parity.io&gt;Cc: Daniel P. Berrang&#233; &lt;berrange@redhat.com&gt;Cc: Dominik Brodowski &lt;linux@dominikbrodowski.net&gt;Cc: Wei Yongjun &lt;weiyongjun1@huawei.com&gt;Tested-by: Souradeep Chakrabarti &lt;souradch.linux@gmail.com&gt; # With Hyper-V&apos;s virtual hardwareReviewed-by: Ard Biesheuvel &lt;ardb@kernel.org&gt;Reviewed-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;Reviewed-by: Laszlo Ersek &lt;lersek@redhat.com&gt;Signed-off-by: Jason A. Donenfeld &lt;Jason@zx2c4.com&gt;

            List of files:
            /linux-6.15/drivers/virt/Makefile</description>
        <pubDate>Wed, 23 Feb 2022 12:46:24 +0000</pubDate>
        <dc:creator>Jason A. Donenfeld &lt;Jason@zx2c4.com&gt;</dc:creator>
    </item>
<item>
        <title>666834c4 - virt: acrn: Introduce ACRN HSM basic driver</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/virt/Makefile#666834c4</link>
        <description>virt: acrn: Introduce ACRN HSM basic driverACRN Hypervisor Service Module (HSM) is a kernel module in Service VMwhich communicates with ACRN userspace through ioctls and talks to ACRNHypervisor through hypercalls.Add a basic HSM driver which allows Service VM userspace to communicatewith ACRN. The following patches will add more ioctls, guest VM memorymapping caching, I/O request processing, ioeventfd and irqfd into thismodule. HSM exports a char device interface (/dev/acrn_hsm) to userspace.Cc: Dave Hansen &lt;dave.hansen@intel.com&gt;Cc: Zhi Wang &lt;zhi.a.wang@intel.com&gt;Cc: Zhenyu Wang &lt;zhenyuw@linux.intel.com&gt;Cc: Yu Wang &lt;yu1.wang@intel.com&gt;Cc: Reinette Chatre &lt;reinette.chatre@intel.com&gt;Cc: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;Reviewed-by: Reinette Chatre &lt;reinette.chatre@intel.com&gt;Signed-off-by: Shuo Liu &lt;shuo.a.liu@intel.com&gt;Link: https://lore.kernel.org/r/20210207031040.49576-6-shuo.a.liu@intel.comSigned-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

            List of files:
            /linux-6.15/drivers/virt/Makefile</description>
        <pubDate>Sun, 07 Feb 2021 03:10:27 +0000</pubDate>
        <dc:creator>Shuo Liu &lt;shuo.a.liu@intel.com&gt;</dc:creator>
    </item>
<item>
        <title>0f5c7b74 - nitro_enclaves: Add Makefile for the Nitro Enclaves driver</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/virt/Makefile#0f5c7b74</link>
        <description>nitro_enclaves: Add Makefile for the Nitro Enclaves driverAdd Makefile for the Nitro Enclaves driver, considering the option setin the kernel config.Changelogv9 -&gt; v10* Update commit message to include the changelog before the SoB tag(s).v8 -&gt; v9* Remove -Wall flags, could use W=1 as an option for this.v7 -&gt; v8* No changes.v6 -&gt; v7* No changes.v5 -&gt; v6* No changes.v4 -&gt; v5* No changes.v3 -&gt; v4* No changes.v2 -&gt; v3* Remove the GPL additional wording as SPDX-License-Identifier is  already in place.v1 -&gt; v2* Update path to Makefile to match the drivers/virt/nitro_enclaves  directory.Reviewed-by: Alexander Graf &lt;graf@amazon.com&gt;Signed-off-by: Andra Paraschiv &lt;andraprs@amazon.com&gt;Link: https://lore.kernel.org/r/20200921121732.44291-16-andraprs@amazon.comSigned-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

            List of files:
            /linux-6.15/drivers/virt/Makefile</description>
        <pubDate>Mon, 21 Sep 2020 12:17:29 +0000</pubDate>
        <dc:creator>Andra Paraschiv &lt;andraprs@amazon.com&gt;</dc:creator>
    </item>
<item>
        <title>ec8f24b7 - treewide: Add SPDX license identifier - Makefile/Kconfig</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/virt/Makefile#ec8f24b7</link>
        <description>treewide: Add SPDX license identifier - Makefile/KconfigAdd SPDX license identifiers to all Make/Kconfig files which: - Have no license information of any formThese files fall under the project license, GPL v2 only. The resulting SPDXlicense identifier is:  GPL-2.0-onlySigned-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

            List of files:
            /linux-6.15/drivers/virt/Makefile</description>
        <pubDate>Sun, 19 May 2019 12:07:45 +0000</pubDate>
        <dc:creator>Thomas Gleixner &lt;tglx@linutronix.de&gt;</dc:creator>
    </item>
<item>
        <title>0ba002bc - virt: Add vboxguest driver for Virtual Box Guest integration</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/virt/Makefile#0ba002bc</link>
        <description>virt: Add vboxguest driver for Virtual Box Guest integrationThis commit adds a driver for the Virtual Box Guest PCI device used inVirtual Box virtual machines. Enabling this driver will add support forVirtual Box Guest integration features such as copy-and-paste, seamlessmode and OpenGL pass-through.This driver also offers vboxguest IPC functionality which is neededfor the vboxfs driver which offers folder sharing support.Signed-off-by: Hans de Goede &lt;hdegoede@redhat.com&gt;Reviewed-by: Larry Finger &lt;Larry.Finger@lwfinger.net&gt;Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

            List of files:
            /linux-6.15/drivers/virt/Makefile</description>
        <pubDate>Thu, 30 Nov 2017 16:01:27 +0000</pubDate>
        <dc:creator>Hans de Goede &lt;hdegoede@redhat.com&gt;</dc:creator>
    </item>
<item>
        <title>6db71994 - drivers/virt: introduce Freescale hypervisor management driver</title>
        <link>http://172.16.0.5:8080/history/linux-6.15/drivers/virt/Makefile#6db71994</link>
        <description>drivers/virt: introduce Freescale hypervisor management driverAdd the drivers/virt directory, which houses drivers that supportvirtualization environments, and add the Freescale hypervisor managementdriver.The Freescale hypervisor management driver provides several services todrivers and applications related to the Freescale hypervisor:1. An ioctl interface for querying and managing partitions2. A file interface to reading incoming doorbells3. An interrupt handler for shutting down the partition upon receiving the   shutdown doorbell from a manager partition4. A kernel interface for receiving callbacks when a managed partition   shuts down.Signed-off-by: Timur Tabi &lt;timur@freescale.com&gt;Acked-by: Arnd Bergmann &lt;arnd@arndb.de&gt;Signed-off-by: Kumar Gala &lt;galak@kernel.crashing.org&gt;

            List of files:
            /linux-6.15/drivers/virt/Makefile</description>
        <pubDate>Thu, 09 Jun 2011 20:52:06 +0000</pubDate>
        <dc:creator>Timur Tabi &lt;timur@freescale.com&gt;</dc:creator>
    </item>
</channel>
</rss>
