Linux Confidential Computing Development
 help / color / mirror / Atom feed
 messages from 2024-01-12 20:08:36 to 2024-01-28 21:27:23 UTC [more...]

[RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
 2024-01-28 21:25 UTC  (3+ messages)
` [RFC PATCH v2 1/4] tsm: Runtime measurement register support
` [RFC PATCH v2 2/4] tsm: Add RTMRs to the configfs-tsm hierarchy

Attestation evidence collection "standard package(s)" effort
 2024-01-27 22:39 UTC  (3+ messages)

[PATCHv6 00/16] x86/tdx: Add kexec support
 2024-01-27 19:35 UTC  (23+ messages)
` [PATCHv6 01/16] x86/acpi: Extract ACPI MADT wakeup code into a separate file
` [PATCHv6 02/16] x86/apic: Mark acpi_mp_wake_* variables as __ro_after_init
` [PATCHv6 03/16] cpu/hotplug: Add support for declaring CPU offlining not supported
` [PATCHv6 04/16] cpu/hotplug, x86/acpi: Disable CPU offlining for ACPI MADT wakeup
` [PATCHv6 05/16] x86/kexec: Keep CR4.MCE set during kexec for TDX guest
` [PATCHv6 06/16] x86/mm: Make x86_platform.guest.enc_status_change_*() return errno
` [PATCHv6 07/16] x86/mm: Return correct level from lookup_address() if pte is none
` [PATCHv6 08/16] x86/tdx: Account shared memory
` [PATCHv6 09/16] x86/mm: Adding callbacks to prepare encrypted memory for kexec
` [PATCHv6 10/16] x86/tdx: Convert shared memory back to private on kexec
` [PATCHv6 11/16] x86/mm: Make e820_end_ram_pfn() cover E820_TYPE_ACPI ranges
` [PATCHv6 12/16] x86/acpi: Rename fields in acpi_madt_multiproc_wakeup structure
` [PATCHv6 13/16] x86/acpi: Do not attempt to bring up secondary CPUs in kexec case
` [PATCHv6 14/16] x86/smp: Add smp_ops.stop_this_cpu() callback
` [PATCHv6 15/16] x86/mm: Introduce kernel_ident_mapping_free()
` [PATCHv6 16/16] x86/acpi: Add support for CPU offlining for ACPI MADT wakeup method

[PATCH v2 00/25] Add AMD Secure Nested Paging (SEV-SNP) Initialization Support
 2024-01-27 16:02 UTC  (34+ messages)
` [PATCH v2 01/25] x86/cpufeatures: Add SEV-SNP CPU feature
` [PATCH v2 02/25] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
` [PATCH v2 03/25] iommu/amd: Don't rely on external callers to enable IOMMU SNP support
` [PATCH v2 04/25] x86/sev: Add the host SEV-SNP initialization support
` [PATCH v2 05/25] x86/mtrr: Don't print errors if MtrrFixDramModEn is set when SNP enabled
` [PATCH v2 06/25] x86/sev: Add RMP entry lookup helpers
` [PATCH v2 07/25] x86/fault: Add helper for dumping RMP entries
` [PATCH v2 08/25] x86/traps: Define RMP violation #PF error code
` [PATCH v2 09/25] x86/fault: Dump RMP table information when RMP page faults occur
` [PATCH v2 10/25] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
` [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
` [PATCH v2 12/25] crypto: ccp: Define the SEV-SNP commands
` [PATCH v2 13/25] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH v2 14/25] crypto: ccp: Provide API to issue SEV and SNP commands
` [PATCH v2 15/25] x86/sev: Introduce snp leaked pages list
` [PATCH v2 16/25] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
` [PATCH v2 17/25] crypto: ccp: Handle non-volatile INIT_EX data "
` [PATCH v2 18/25] crypto: ccp: Handle legacy SEV commands "
` [PATCH v2 19/25] iommu/amd: Clean up RMP entries for IOMMU pages during SNP shutdown
` [PATCH v2 20/25] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
` [PATCH v2 21/25] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
` [PATCH v2 22/25] x86/cpufeatures: Enable/unmask SEV-SNP CPU feature
` [PATCH v2 23/25] crypto: ccp: Add the SNP_PLATFORM_STATUS command
` [PATCH v2 24/25] crypto: ccp: Add the SNP_COMMIT command
` [PATCH v2 25/25] crypto: ccp: Add the SNP_SET_CONFIG command

[RFC PATCH v1 0/4] tsm: Runtime measurement registers ABI
 2024-01-26 16:55 UTC  (30+ messages)
` [RFC PATCH v1 1/4] tsm: Runtime measurement register support
` [RFC PATCH v1 2/4] tsm: Add RTMRs to the configfs-tsm hierarchy
` [RFC PATCH v1 3/4] tsm: Allow for mapping RTMRs to TCG TPM PCRs
` [RFC PATCH v1 4/4] tsm: Allow for extending and reading configured RTMRs

[RFC] Randomness on confidential computing platforms
 2024-01-26 16:35 UTC  (6+ messages)

SVSM Development Call Jan 17th, 2024
 2024-01-26 13:40 UTC  (3+ messages)

[PATCH v1 00/26] Add AMD Secure Nested Paging (SEV-SNP) Initialization Support
 2024-01-26 13:38 UTC  (54+ messages)
` [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
` [PATCH v1 12/26] crypto: ccp: Define the SEV-SNP commands
` [PATCH v1 13/26] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH v1 14/26] crypto: ccp: Provide API to issue SEV and SNP commands
` [PATCH v1 17/26] crypto: ccp: Handle non-volatile INIT_EX data when SNP is enabled
` [PATCH v1 18/26] crypto: ccp: Handle legacy SEV commands "
` [PATCH v1 21/26] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
` [PATCH v1 22/26] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
` [PATCH v1 24/26] crypto: ccp: Add the SNP_PLATFORM_STATUS command
` [PATCH v1 25/26] crypto: ccp: Add the SNP_COMMIT command
` [PATCH v1 26/26] crypto: ccp: Add the SNP_SET_CONFIG command

[RFC PATCH] virt: tdx-guest: Remove quote generation via ioctl
 2024-01-24 23:44 UTC  (11+ messages)

[PATCH] virt: tdx-guest: Deprecate legacy IOCTL-based interface for quote generation
 2024-01-24  9:38 UTC 

No SVSM Call this week
 2024-01-23 13:54 UTC 

[RFC PATCH] x86/sev: x86/sev: enforce PC-relative addressing in clang
 2024-01-21 18:20 UTC  (20+ messages)
` [RFC PATCH v2] x86/sev: enforce RIP-relative accesses in early SEV/SME code

[RFC] Support for Arm CCA VMs on Linux
 2024-01-19  1:26 UTC  (6+ messages)

[RFC PATCH] x86/virt/tdx: Disable KEXEC in the presence of TDX
 2024-01-19  0:55 UTC  (5+ messages)

[PATCH v4 0/3] x86/hyperv: Mark CoCo VM pages not present when changing encrypted state
 2024-01-17 13:37 UTC  (9+ messages)
` [PATCH v4 1/3] x86/hyperv: Use slow_virt_to_phys() in page transition hypervisor callback
` [PATCH v4 2/3] x86/mm: Regularize set_memory_p() parameters and make non-static
` [PATCH v4 3/3] x86/hyperv: Make encrypted/decrypted changes safe for load_unaligned_zeropad()

[PATCHv2] x86/mm: Fix memory encryption features advertisement
 2024-01-16 21:16 UTC  (4+ messages)

[PATCHv5 00/16] x86/tdx: Add kexec support
 2024-01-16 10:53 UTC  (10+ messages)
` [PATCHv5 10/16] x86/tdx: Convert shared memory back to private on kexec
` [PATCHv5 16/16] x86/acpi: Add support for CPU offlining for ACPI MADT wakeup method

[PATCH v11 00/35] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2024-01-16  4:14 UTC  (4+ messages)
` [PATCH v11 18/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command

[PATCH v3 0/3] x86/hyperv: Mark CoCo VM pages not present when changing encrypted state
 2024-01-15 10:00 UTC  (7+ messages)
` [PATCH v3 1/3] x86/hyperv: Use slow_virt_to_phys() in page transition hypervisor callback

[PATCH v2] virt: tdx-guest: Handle GetQuote request error code
 2024-01-15  5:14 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).