Linux Confidential Computing Development
 help / color / mirror / Atom feed
 messages from 2024-01-22 22:12:41 to 2024-01-31 12:10:49 UTC [more...]

[PATCH 1/2] x86/random: Retry on RDSEED failure
 2024-01-31 11:59 UTC  (33+ messages)
` [PATCH 2/2] x86/random: Issue a warning if RDRAND or RDSEED fails

[RFC PATCH v2] x86/sev: enforce RIP-relative accesses in early SEV/SME code
 2024-01-31  8:22 UTC  (6+ messages)
` [PATCH v3 0/2] x86: enforce and cleanup RIP-relative accesses in early boot code
` [PATCH v3 1/2] x86/sev: enforce RIP-relative accesses in early SEV/SME code
` [PATCH v3 2/2] x86/head64: Replace pointer fixups with RIP_RELATIVE_ADDR()

[PATCH] virt: tdx-guest: Deprecate legacy IOCTL-based interface for quote generation
 2024-01-31  7:48 UTC  (3+ messages)

[PATCHv6 00/16] x86/tdx: Add kexec support
 2024-01-31  7:31 UTC  (34+ messages)
` [PATCHv6 01/16] x86/acpi: Extract ACPI MADT wakeup code into a separate file
` [PATCHv6 02/16] x86/apic: Mark acpi_mp_wake_* variables as __ro_after_init
` [PATCHv6 03/16] cpu/hotplug: Add support for declaring CPU offlining not supported
` [PATCHv6 04/16] cpu/hotplug, x86/acpi: Disable CPU offlining for ACPI MADT wakeup
` [PATCHv6 05/16] x86/kexec: Keep CR4.MCE set during kexec for TDX guest
` [PATCHv6 06/16] x86/mm: Make x86_platform.guest.enc_status_change_*() return errno
` [PATCHv6 07/16] x86/mm: Return correct level from lookup_address() if pte is none
` [PATCHv6 08/16] x86/tdx: Account shared memory
` [PATCHv6 09/16] x86/mm: Adding callbacks to prepare encrypted memory for kexec
` [PATCHv6 10/16] x86/tdx: Convert shared memory back to private on kexec
` [PATCHv6 11/16] x86/mm: Make e820_end_ram_pfn() cover E820_TYPE_ACPI ranges
` [PATCHv6 12/16] x86/acpi: Rename fields in acpi_madt_multiproc_wakeup structure
` [PATCHv6 13/16] x86/acpi: Do not attempt to bring up secondary CPUs in kexec case
` [PATCHv6 14/16] x86/smp: Add smp_ops.stop_this_cpu() callback
` [PATCHv6 15/16] x86/mm: Introduce kernel_ident_mapping_free()
` [PATCHv6 16/16] x86/acpi: Add support for CPU offlining for ACPI MADT wakeup method

[PATCH RFC gmem v1 0/8] KVM: gmem hooks/changes needed for x86 (other archs?)
 2024-01-31  1:13 UTC  (3+ messages)
` [PATCH RFC gmem v1 8/8] KVM: x86: Determine shared/private faults based on vm_type

[RFC PATCH 0/5] Towards a shared TSM sysfs-ABI for Confidential Computing
 2024-01-30 17:31 UTC  (9+ messages)
` [RFC PATCH 1/5] PCI/CMA: Prepare to interoperate with TSM authentication
` [RFC PATCH 2/5] coco/tsm: Establish a new coco/tsm subdirectory
` [RFC PATCH 3/5] coco/tsm: Introduce a shared class device for TSMs
` [RFC PATCH 4/5] sysfs: Introduce a mechanism to hide static attribute_groups
` [RFC PATCH 5/5] PCI/TSM: Authenticate devices via platform TSM

[RFC V1 0/5] x86: CVMs: Align memory conversions to 2M granularity
 2024-01-30 16:42 UTC  (2+ messages)

[PATCH v2 00/25] Add AMD Secure Nested Paging (SEV-SNP) Initialization Support
 2024-01-30 16:19 UTC  (47+ messages)
` [PATCH v2 01/25] x86/cpufeatures: Add SEV-SNP CPU feature
` [PATCH v2 02/25] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
` [PATCH v2 03/25] iommu/amd: Don't rely on external callers to enable IOMMU SNP support
` [PATCH v2 04/25] x86/sev: Add the host SEV-SNP initialization support
` [PATCH v2 05/25] x86/mtrr: Don't print errors if MtrrFixDramModEn is set when SNP enabled
` [PATCH v2 06/25] x86/sev: Add RMP entry lookup helpers
` [PATCH v2 07/25] x86/fault: Add helper for dumping RMP entries
` [PATCH v2 08/25] x86/traps: Define RMP violation #PF error code
` [PATCH v2 09/25] x86/fault: Dump RMP table information when RMP page faults occur
` [PATCH v2 10/25] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
` [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
` [PATCH v2 12/25] crypto: ccp: Define the SEV-SNP commands
` [PATCH v2 13/25] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH v2 14/25] crypto: ccp: Provide API to issue SEV and SNP commands
` [PATCH v2 15/25] x86/sev: Introduce snp leaked pages list
` [PATCH v2 16/25] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
` [PATCH v2 17/25] crypto: ccp: Handle non-volatile INIT_EX data "
` [PATCH v2 18/25] crypto: ccp: Handle legacy SEV commands "
` [PATCH v2 19/25] iommu/amd: Clean up RMP entries for IOMMU pages during SNP shutdown
` [PATCH v2 20/25] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
` [PATCH v2 21/25] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
` [PATCH v2 22/25] x86/cpufeatures: Enable/unmask SEV-SNP CPU feature
` [PATCH v2 23/25] crypto: ccp: Add the SNP_PLATFORM_STATUS command
` [PATCH v2 24/25] crypto: ccp: Add the SNP_COMMIT command
` [PATCH v2 25/25] crypto: ccp: Add the SNP_SET_CONFIG command

SVSM Development Call Jan. 31st
 2024-01-30 15:33 UTC 

[RFC] Randomness on confidential computing platforms
 2024-01-30  8:19 UTC  (23+ messages)

Attestation evidence collection "standard package(s)" effort
 2024-01-29 23:46 UTC  (5+ messages)

[RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
 2024-01-29 16:57 UTC  (8+ messages)
` [RFC PATCH v2 1/4] tsm: Runtime measurement register support
` [RFC PATCH v2 2/4] tsm: Add RTMRs to the configfs-tsm hierarchy
` [RFC PATCH v2 3/4] tsm: Map RTMRs to TCG TPM PCRs
` [RFC PATCH v2 4/4] tsm: Allow for extending and reading configured RTMRs

[RFC PATCH v1 0/4] tsm: Runtime measurement registers ABI
 2024-01-26 16:55 UTC  (20+ messages)
` [RFC PATCH v1 3/4] tsm: Allow for mapping RTMRs to TCG TPM PCRs

SVSM Development Call Jan 17th, 2024
 2024-01-26 13:40 UTC  (3+ messages)

[PATCH v1 00/26] Add AMD Secure Nested Paging (SEV-SNP) Initialization Support
 2024-01-26 13:38 UTC  (34+ messages)
` [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
` [PATCH v1 12/26] crypto: ccp: Define the SEV-SNP commands
` [PATCH v1 13/26] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH v1 18/26] crypto: ccp: Handle legacy SEV commands when SNP is enabled
` [PATCH v1 21/26] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
` [PATCH v1 22/26] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
` [PATCH v1 24/26] crypto: ccp: Add the SNP_PLATFORM_STATUS command
` [PATCH v1 26/26] crypto: ccp: Add the SNP_SET_CONFIG command

[RFC PATCH] virt: tdx-guest: Remove quote generation via ioctl
 2024-01-24 23:44 UTC  (11+ messages)

No SVSM Call this week
 2024-01-23 13:54 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).