Linux Confidential Computing Development
 help / color / mirror / Atom feed
 messages from 2024-03-12 06:07:51 to 2024-04-03 11:59:35 UTC [more...]

SVSM Development Call April 3rd, 2024
 2024-04-03 11:59 UTC  (2+ messages)

[PATCH v12 00/29] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2024-04-02 22:58 UTC  (83+ messages)
` [PATCH v12 01/29] [TEMP] x86/kvm/Kconfig: Have KVM_AMD_SEV select ARCH_HAS_CC_PLATFORM
` [PATCH v12 02/29] [TEMP] x86/cc: Add cc_platform_set/_clear() helpers
` [PATCH v12 03/29] [TEMP] x86/CPU/AMD: Track SNP host status with cc_platform_*()
` [PATCH v12 04/29] [TEMP] fixup! KVM: SEV: sync FPU and AVX state at LAUNCH_UPDATE_VMSA time
` [PATCH v12 05/29] KVM: x86: Define RMP page fault error bits for #NPF
` [PATCH v12 06/29] KVM: SEV: Select KVM_GENERIC_PRIVATE_MEM when CONFIG_KVM_AMD_SEV=y
` [PATCH v12 07/29] KVM: SEV: Add support to handle AP reset MSR protocol
` [PATCH v12 08/29] KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests
` [PATCH v12 09/29] KVM: SEV: Add initial SEV-SNP support
` [PATCH v12 10/29] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
` [PATCH v12 11/29] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
` [PATCH v12 12/29] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command
` [PATCH v12 13/29] KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
` [PATCH v12 14/29] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
` [PATCH v12 15/29] KVM: SEV: Add support to handle "
` [PATCH v12 16/29] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use
` [PATCH v12 17/29] KVM: SEV: Add support to handle RMP nested page faults
` [PATCH v12 18/29] KVM: SEV: Use a VMSA physical address variable for populating VMCB
` [PATCH v12 19/29] KVM: SEV: Support SEV-SNP AP Creation NAE event
` [PATCH v12 20/29] KVM: SEV: Add support for GHCB-based termination requests
` [PATCH v12 21/29] KVM: SEV: Implement gmem hook for initializing private pages
` [PATCH v12 22/29] KVM: SEV: Implement gmem hook for invalidating "
` [PATCH v12 23/29] KVM: x86: Implement gmem hook for determining max NPT mapping level
` [PATCH v12 24/29] KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP
` [PATCH v12 25/29] KVM: SVM: Add module parameter to enable the SEV-SNP
` [PATCH v12 26/29] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
` [PATCH v12 27/29] crypto: ccp: Add the SNP_VLEK_LOAD command
` [PATCH v12 28/29] crypto: ccp: Add the SNP_{PAUSE,RESUME}_ATTESTATION commands
` [PATCH v12 29/29] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event

[PATCH gmem 0/6] gmem fix-ups and interfaces for populating gmem pages
 2024-04-02 21:50 UTC  (9+ messages)
` [PATCH gmem 1/6] KVM: guest_memfd: Fix stub for kvm_gmem_get_uninit_pfn()
` [PATCH gmem 2/6] KVM: guest_memfd: Only call kvm_arch_gmem_prepare hook if necessary
` [PATCH gmem 3/6] KVM: x86: Pass private/shared fault indicator to gmem_validate_fault
` [PATCH gmem 4/6] mm: Introduce AS_INACCESSIBLE for encrypted/confidential memory
` [PATCH gmem 5/6] KVM: guest_memfd: Use AS_INACCESSIBLE when creating guest_memfd inode
` [PATCH gmem 6/6] KVM: guest_memfd: Add interface for populating gmem pages with user data

[PATCHv9 00/17] x86/tdx: Add kexec support
 2024-04-02 15:42 UTC  (28+ messages)
` [PATCHv9 01/17] x86/acpi: Extract ACPI MADT wakeup code into a separate file
` [PATCHv9 02/17] x86/apic: Mark acpi_mp_wake_* variables as __ro_after_init
` [PATCHv9 03/17] cpu/hotplug: Add support for declaring CPU offlining not supported
` [PATCHv9 04/17] cpu/hotplug, x86/acpi: Disable CPU offlining for ACPI MADT wakeup
` [PATCHv9 05/17] x86/kexec: Keep CR4.MCE set during kexec for TDX guest
` [PATCHv9 06/17] x86/mm: Make x86_platform.guest.enc_status_change_*() return errno
  ` [PATCHv9.1 "
` [PATCHv9 07/17] x86/mm: Return correct level from lookup_address() if pte is none
` [PATCHv9 08/17] x86/tdx: Account shared memory
` [PATCHv9 09/17] x86/mm: Adding callbacks to prepare encrypted memory for kexec
` [PATCHv9 10/17] x86/tdx: Convert shared memory back to private on kexec
` [PATCHv9 11/17] x86/mm: Make e820_end_ram_pfn() cover E820_TYPE_ACPI ranges
` [PATCHv9 12/17] x86/acpi: Rename fields in acpi_madt_multiproc_wakeup structure
` [PATCHv9 13/17] x86/acpi: Do not attempt to bring up secondary CPUs in kexec case
` [PATCHv9 14/17] x86/smp: Add smp_ops.stop_this_cpu() callback
` [PATCHv9 15/17] x86/mm: Introduce kernel_ident_mapping_free()
` [PATCHv9 16/17] x86/acpi: Add support for CPU offlining for ACPI MADT wakeup method
` [PATCHv9 17/17] ACPI: tables: Print MULTIPROC_WAKEUP when MADT is parsed

[PATCH v4] x86/coco: Require seeding RNG with RDRAND on CoCo systems
 2024-03-28 15:13 UTC  (7+ messages)
` [PATCH v5] "
    ` [PATCH v6] "

question on vTPM interface in coconut-svsm
 2024-03-28 14:09 UTC  (9+ messages)

SVSM Development Call March 27th, 2024
 2024-03-28  8:54 UTC  (2+ messages)
` [svsm-devel] "

[PATCH v3 00/14] Provide SEV-SNP support for running under an SVSM
 2024-03-25 22:26 UTC  (15+ messages)
` [PATCH v3 01/14] x86/sev: Rename snp_init() in the boot/compressed/sev.c file
` [PATCH v3 02/14] x86/sev: Make the VMPL0 checking function more generic
` [PATCH v3 03/14] x86/sev: Check for the presence of an SVSM in the SNP Secrets page
` [PATCH v3 04/14] x86/sev: Use kernel provided SVSM Calling Areas
` [PATCH v3 05/14] x86/sev: Perform PVALIDATE using the SVSM when not at VMPL0
` [PATCH v3 06/14] x86/sev: Use the SVSM to create a vCPU when not in VMPL0
` [PATCH v3 07/14] x86/sev: Provide SVSM discovery support
` [PATCH v3 08/14] x86/sev: Provide guest VMPL level to userspace
` [PATCH v3 09/14] virt: sev-guest: Choose the VMPCK key based on executing VMPL
` [PATCH v3 10/14] configfs-tsm: Allow the privlevel_floor attribute to be updated
` [PATCH v3 11/14] x86/sev: Extend the config-fs attestation support for an SVSM
` [PATCH v3 12/14] fs/configfs: Add a callback to determine attribute visibility
` [PATCH v3 13/14] x86/sev: Hide SVSM attestation entries if not running under an SVSM
` [PATCH v3 14/14] x86/sev: Allow non-VMPL0 execution when an SVSM is present

[RFC PATCH] OvmfPkg/SecurityPkg: Add build option for coexistance of vTPM and RTMR
 2024-03-25 15:28 UTC  (8+ messages)

[PATCHv8 00/17, CORRECTED] x86/tdx: Add kexec support
 2024-03-24 22:32 UTC  (8+ messages)
` [PATCH v2 0/3] x86/snp: "
  ` [PATCH v2 1/3] efi/x86: skip efi_arch_mem_reserve() in case of kexec
  ` [PATCH v2 2/3] x86/mm: Do not zap page table entries mapping unaccepted memory table during kdump
  ` [PATCH v2 3/3] x86/snp: Convert shared memory back to private on kexec

[PATCH] x86/virt/tdx: Remove duplicate include
 2024-03-22  6:38 UTC  (2+ messages)

SVSM Development Call March 20th, 2024
 2024-03-21  9:03 UTC  (4+ messages)
` [svsm-devel] "

[PATCH v11 00/35] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2024-03-20 17:28 UTC  (5+ messages)
` [PATCH v11 15/35] KVM: SEV: Add KVM_SNP_INIT command
` [PATCH v11 18/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command

[PATCH 00/12] PCI device authentication
 2024-03-20  8:33 UTC  (5+ messages)
` [PATCH 07/12] spdm: Introduce library to authenticate devices

[RFC] Support for Arm CCA VMs on Linux
 2024-03-18 14:14 UTC  (17+ messages)
` [RFC PATCH 00/28] arm64: Support for Arm CCA in KVM
  ` [RFC PATCH 03/28] arm64: RME: Add wrappers for RMI calls
  ` [RFC PATCH 04/28] arm64: RME: Check for RME support at KVM init
  ` [RFC PATCH 06/28] arm64: RME: ioctls to create and configure realms
  ` [RFC PATCH 09/28] arm64: RME: RTT handling
  ` [RFC PATCH 12/28] KVM: arm64: Support timers in realm RECs

Unmapping KVM Guest Memory from Host Kernel
 2024-03-18 14:11 UTC  (7+ messages)

SVSM vTPM state
 2024-03-14 14:44 UTC 

[PATCH 0/5] Handle set_memory_XXcrypted() errors in Hyper-V
 2024-03-14 13:56 UTC  (9+ messages)
` [PATCH v2 2/5] Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl
` [PATCH v2 5/5] Drivers: hv: vmbus: Don't free ring buffers that couldn't be re-encrypted

[PATCH RFC gmem v1 0/8] KVM: gmem hooks/changes needed for x86 (other archs?)
 2024-03-13 17:11 UTC  (9+ messages)
` [PATCH RFC gmem v1 4/8] KVM: x86: Add gmem hook for invalidating memory

[PATCH v4 0/9] x86/sev: KEXEC/KDUMP support for SEV-ES guests
 2024-03-12 16:13 UTC  (5+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).