Linux Confidential Computing Development
 help / color / mirror / Atom feed
 messages from 2024-02-02 07:25:52 to 2024-02-22 15:54:56 UTC [more...]

[RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
 2024-02-22 15:45 UTC  (23+ messages)
` [RFC PATCH v2 2/4] tsm: Add RTMRs to the configfs-tsm hierarchy

[PATCHv7 00/16] x86/tdx: Add kexec support
 2024-02-22 15:37 UTC  (38+ messages)
` [PATCHv7 01/16] x86/acpi: Extract ACPI MADT wakeup code into a separate file
` [PATCHv7 02/16] x86/apic: Mark acpi_mp_wake_* variables as __ro_after_init
` [PATCHv7 03/16] cpu/hotplug: Add support for declaring CPU offlining not supported
` [PATCHv7 04/16] cpu/hotplug, x86/acpi: Disable CPU offlining for ACPI MADT wakeup
` [PATCHv7 05/16] x86/kexec: Keep CR4.MCE set during kexec for TDX guest
` [PATCHv7 06/16] x86/mm: Make x86_platform.guest.enc_status_change_*() return errno
` [PATCHv7 07/16] x86/mm: Return correct level from lookup_address() if pte is none
` [PATCHv7 08/16] x86/tdx: Account shared memory
` [PATCHv7 09/16] x86/mm: Adding callbacks to prepare encrypted memory for kexec
` [PATCHv7 10/16] x86/tdx: Convert shared memory back to private on kexec
` [PATCHv7 11/16] x86/mm: Make e820_end_ram_pfn() cover E820_TYPE_ACPI ranges
` [PATCHv7 12/16] x86/acpi: Rename fields in acpi_madt_multiproc_wakeup structure
` [PATCHv7 13/16] x86/acpi: Do not attempt to bring up secondary CPUs in kexec case
` [PATCHv7 14/16] x86/smp: Add smp_ops.stop_this_cpu() callback
` [PATCHv7 15/16] x86/mm: Introduce kernel_ident_mapping_free()
` [PATCHv7 16/16] x86/acpi: Add support for CPU offlining for ACPI MADT wakeup method
` [PATCH 0/2] x86/snp: Add kexec support
  ` [PATCH 1/2] x86/mm: Do not zap PMD entry mapping unaccepted memory table during kdump
  ` [PATCH 2/2] x86/snp: Convert shared memory back to private on kexec

[RFC PATCH 0/5] Towards a shared TSM sysfs-ABI for Confidential Computing
 2024-02-22 13:22 UTC  (15+ messages)
` [RFC PATCH 2/5] coco/tsm: Establish a new coco/tsm subdirectory
` [RFC PATCH 3/5] coco/tsm: Introduce a shared class device for TSMs
` [RFC PATCH 4/5] sysfs: Introduce a mechanism to hide static attribute_groups
` [RFC PATCH 5/5] PCI/TSM: Authenticate devices via platform TSM

[PATCH v3] x86/coco: Require seeding RNG with RDRAND on CoCo systems
 2024-02-22  7:35 UTC  (12+ messages)
          ` [PATCH v4] "

[RFC RFT PATCH 0/4] Handle set_memory_XXcrypted() errors in hyperv
 2024-02-22  2:10 UTC  (5+ messages)
` [RFC RFT PATCH 1/4] hv: Leak pages if set_memory_encrypted() fails
` [RFC RFT PATCH 2/4] hv: Track decrypted status in vmbus_gpadl
` [RFC RFT PATCH 3/4] hv_nstvsc: Don't free decrypted memory
` [RFC RFT PATCH 4/4] uio_hv_generic: "

[RFC PATCH v4 00/10] KVM: guest_memfd(), X86: Common base for SNP and TDX (was KVM: guest memory: Misc enhancement)
 2024-02-22  2:05 UTC  (5+ messages)
` [RFC PATCH v4 04/10] KVM: x86: Introduce PFERR_GUEST_ENC_MASK to indicate fault is private

[PATCH v2 0/2] CoCo/RDRAND brokenness fixes
 2024-02-21 12:24 UTC  (9+ messages)
` [PATCH v2 1/2] x86/archrandom: WARN if RDRAND fails and don't retry
` [PATCH v2 2/2] x86/coco: Require seeding RNG with RDRAND on CoCo systems

[PATCH v2] efi/x86: skip efi_arch_mem_reserve() in case of kexec
 2024-02-19 22:54 UTC 

[PATCH] efi/x86: skip efi_arch_mem_reserve() in case of kexec
 2024-02-19 21:11 UTC 

[RFC V1 0/5] x86: CVMs: Align memory conversions to 2M granularity
 2024-02-15 20:26 UTC  (15+ messages)
` [RFC V1 1/5] swiotlb: Support allocating DMA memory from SWIOTLB
` [RFC V1 5/5] x86: CVMs: Ensure that memory conversions happen at 2M alignment

[PATCH 1/2] x86/random: Retry on RDSEED failure
 2024-02-15 13:01 UTC  (43+ messages)

[PATCH v1 00/26] Add AMD Secure Nested Paging (SEV-SNP) Initialization Support
 2024-02-14 16:56 UTC  (11+ messages)
` [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support

SVSM Devel Call Feb. 14th, 2024
 2024-02-14  7:15 UTC 

[PATCH] virt: tdx-guest: Deprecate legacy IOCTL-based interface for quote generation
 2024-02-12 23:12 UTC  (8+ messages)

[PATCH v11 00/35] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2024-02-12 17:03 UTC  (23+ messages)
` [PATCH v11 06/35] KVM: x86/mmu: Pass around full 64-bit error code for KVM page faults
` [PATCH v11 09/35] KVM: x86: Determine shared/private faults based on vm_type
` [PATCH v11 15/35] KVM: SEV: Add KVM_SNP_INIT command
` [PATCH v11 18/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
` [PATCH v11 30/35] KVM: x86: Add gmem hook for determining max NPT mapping level

[PATCH 00/12] PCI device authentication
 2024-02-12 11:47 UTC  (8+ messages)
` [PATCH 07/12] spdm: Introduce library to authenticate devices

[PATCH] x86/coco: Require seeding RNG with RDRAND on CoCo systems
 2024-02-10  5:09 UTC  (2+ messages)

[PATCH 1/2] x86/random: Retry on RDSEED failure
 2024-02-09 21:45 UTC  (29+ messages)
` [PATCH 2/2] x86/random: Issue a warning if RDRAND or RDSEED fails

[PATCH v4 0/3] x86/hyperv: Mark CoCo VM pages not present when changing encrypted state
 2024-02-09 15:51 UTC  (2+ messages)

[PATCH RFC gmem v1 0/8] KVM: gmem hooks/changes needed for x86 (other archs?)
 2024-02-09 15:13 UTC  (14+ messages)
` [PATCH RFC gmem v1 3/8] KVM: x86: Add gmem hook for initializing memory
` [PATCH RFC gmem v1 4/8] KVM: x86: Add gmem hook for invalidating memory
` [PATCH RFC gmem v1 8/8] KVM: x86: Determine shared/private faults based on vm_type

[RFC PATCH 1/5] PCI/CMA: Prepare to interoperate with TSM authentication
 2024-02-08 22:09 UTC  (2+ messages)

COCONUT-SVSM now uses cargo workspace
 2024-02-08 13:14 UTC 

SVSM Development Call Feb. 7th, 2024 (and Cargo workspace transition)
 2024-02-06 18:10 UTC  (3+ messages)
` [EXTERNAL] [svsm-devel] "

[ANNOUNCE] CFP: Linux Security Summit Europe 2024
 2024-02-05  7:45 UTC 

[RFC PATCH v2] x86/sev: enforce RIP-relative accesses in early SEV/SME code
 2024-02-03 11:25 UTC  (17+ messages)
` [PATCH v3 0/2] x86: enforce and cleanup RIP-relative accesses in early boot code
` [PATCH v3 1/2] x86/sev: enforce RIP-relative accesses in early SEV/SME code


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).