Linux Confidential Computing Development
 help / color / mirror / Atom feed
 messages from 2024-03-31 16:02:18 to 2024-04-12 08:52:08 UTC [more...]

[RFC PATCH v2 0/6] Towards a shared TSM sysfs-ABI for Confidential Computing
 2024-04-12  8:52 UTC  (5+ messages)
` [RFC PATCH v2 1/6] configfs-tsm: Namespace TSM report symbols
` [RFC PATCH v2 2/6] coco/guest: Move shared guest CC infrastructure to drivers/virt/coco/guest/
` [RFC PATCH v2 3/6] x86/tdx: Introduce a "tdx" subsystem and "tsm" device
` [RFC PATCH v2 4/6] coco/tsm: Introduce a class device for TEE Security Managers

[v2] Support for Arm CCA VMs on Linux
 2024-04-12  8:43 UTC  (60+ messages)
` [PATCH v2 00/14] arm64: Support for running as a guest in Arm CCA
  ` [PATCH v2 01/14] arm64: rsi: Add RSI definitions
  ` [PATCH v2 02/14] arm64: Detect if in a realm and set RIPAS RAM
  ` [PATCH v2 03/14] arm64: realm: Query IPA size from the RMM
  ` [PATCH v2 04/14] arm64: Mark all I/O as non-secure shared
  ` [PATCH v2 05/14] fixmap: Allow architecture overriding set_fixmap_io
  ` [PATCH v2 06/14] arm64: Override set_fixmap_io
  ` [PATCH v2 07/14] arm64: Make the PHYS_MASK_SHIFT dynamic
  ` [PATCH v2 08/14] arm64: Enforce bounce buffers for realm DMA
  ` [PATCH v2 09/14] arm64: Enable memory encrypt for Realms
  ` [PATCH v2 10/14] arm64: Force device mappings to be non-secure shared
  ` [PATCH v2 11/14] efi: arm64: Map Device with Prot Shared
  ` [PATCH v2 12/14] arm64: realm: Support nonsecure ITS emulation shared
  ` [PATCH v2 13/14] arm64: rsi: Interfaces to query attestation token
  ` [PATCH v2 14/14] virt: arm-cca-guest: TSM_REPORT support for realms
` [PATCH v2 00/43] arm64: Support for Arm CCA in KVM
  ` [PATCH v2 01/43] KVM: Prepare for handling only shared mappings in mmu_notifier events
  ` [PATCH v2 02/43] kvm: arm64: pgtable: Track the number of pages in the entry level
  ` [PATCH v2 03/43] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h
  ` [PATCH v2 04/43] arm64: RME: Handle Granule Protection Faults (GPFs)
  ` [PATCH v2 05/43] arm64: RME: Add SMC definitions for calling the RMM
  ` [PATCH v2 06/43] arm64: RME: Add wrappers for RMI calls
  ` [PATCH v2 07/43] arm64: RME: Check for RME support at KVM init
  ` [PATCH v2 08/43] arm64: RME: Define the user ABI
  ` [PATCH v2 09/43] arm64: RME: ioctls to create and configure realms
  ` [PATCH v2 10/43] kvm: arm64: Expose debug HW register numbers for Realm
  ` [PATCH v2 11/43] arm64: kvm: Allow passing machine type in KVM creation
  ` [PATCH v2 12/43] arm64: RME: Keep a spare page delegated to the RMM
  ` [PATCH v2 13/43] arm64: RME: RTT handling
  ` [PATCH v2 14/43] arm64: RME: Allocate/free RECs to match vCPUs
  ` [PATCH v2 15/43] arm64: RME: Support for the VGIC in realms
  ` [PATCH v2 16/43] KVM: arm64: Support timers in realm RECs
  ` [PATCH v2 17/43] arm64: RME: Allow VMM to set RIPAS
  ` [PATCH v2 18/43] arm64: RME: Handle realm enter/exit
  ` [PATCH v2 19/43] KVM: arm64: Handle realm MMIO emulation
  ` [PATCH v2 20/43] arm64: RME: Allow populating initial contents
  ` [PATCH v2 21/43] arm64: RME: Runtime faulting of memory
  ` [PATCH v2 22/43] KVM: arm64: Handle realm VCPU load
  ` [PATCH v2 23/43] KVM: arm64: Validate register access for a Realm VM
  ` [PATCH v2 24/43] KVM: arm64: Handle Realm PSCI requests
  ` [PATCH v2 25/43] KVM: arm64: WARN on injected undef exceptions
  ` [PATCH v2 26/43] arm64: Don't expose stolen time for realm guests
  ` [PATCH v2 27/43] arm64: rme: allow userspace to inject aborts
  ` [PATCH v2 28/43] arm64: rme: support RSI_HOST_CALL
  ` [PATCH v2 29/43] arm64: rme: Allow checking SVE on VM instance
  ` [PATCH v2 30/43] arm64: RME: Always use 4k pages for realms
  ` [PATCH v2 31/43] arm64: rme: Prevent Device mappings for Realms
  ` [PATCH v2 32/43] arm_pmu: Provide a mechanism for disabling the physical IRQ
  ` [PATCH v2 33/43] arm64: rme: Enable PMU support with a realm guest
  ` [PATCH v2 34/43] kvm: rme: Hide KVM_CAP_READONLY_MEM for realm guests
  ` [PATCH v2 35/43] arm64: RME: Propagate number of breakpoints and watchpoints to userspace
  ` [PATCH v2 36/43] arm64: RME: Set breakpoint parameters through SET_ONE_REG
  ` [PATCH v2 37/43] arm64: RME: Initialize PMCR.N with number counter supported by RMM
  ` [PATCH v2 38/43] arm64: RME: Propagate max SVE vector length from RMM
  ` [PATCH v2 39/43] arm64: RME: Configure max SVE vector length for a Realm
  ` [PATCH v2 40/43] arm64: RME: Provide register list for unfinalized RME RECs
  ` [PATCH v2 41/43] arm64: RME: Provide accurate register list
  ` [PATCH v2 42/43] arm64: kvm: Expose support for private memory
  ` [PATCH v2 43/43] KVM: arm64: Allow activating realms

[PATCH 0/5] Handle set_memory_XXcrypted() errors in Hyper-V
 2024-04-11 21:07 UTC  (3+ messages)

[RFC PATCH] OvmfPkg/SecurityPkg: Add build option for coexistance of vTPM and RTMR
 2024-04-11 17:10 UTC  (17+ messages)
              ` [edk2-devel] "
      ` Fwd: [External] Re: [linux-collab] [CCC][tac] "

[PATCH v12 00/29] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2024-04-11 13:33 UTC  (79+ messages)
` [PATCH v12 02/29] [TEMP] x86/cc: Add cc_platform_set/_clear() helpers
` [PATCH v12 03/29] [TEMP] x86/CPU/AMD: Track SNP host status with cc_platform_*()
` [PATCH v12 05/29] KVM: x86: Define RMP page fault error bits for #NPF
` [PATCH v12 07/29] KVM: SEV: Add support to handle AP reset MSR protocol
` [PATCH v12 08/29] KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests
` [PATCH v12 09/29] KVM: SEV: Add initial SEV-SNP support
` [PATCH v12 10/29] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
` [PATCH v12 11/29] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
` [PATCH v12 12/29] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command
` [PATCH v12 13/29] KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
` [PATCH v12 17/29] KVM: SEV: Add support to handle RMP nested page faults
` [PATCH v12 18/29] KVM: SEV: Use a VMSA physical address variable for populating VMCB
` [PATCH v12 19/29] KVM: SEV: Support SEV-SNP AP Creation NAE event
` [PATCH v12 20/29] KVM: SEV: Add support for GHCB-based termination requests
` [PATCH v12 21/29] KVM: SEV: Implement gmem hook for initializing private pages
` [PATCH v12 22/29] KVM: SEV: Implement gmem hook for invalidating "
` [PATCH v12 23/29] KVM: x86: Implement gmem hook for determining max NPT mapping level
` [PATCH v12 24/29] KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP
` [PATCH v12 25/29] KVM: SVM: Add module parameter to enable the SEV-SNP
` [PATCH v12 26/29] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
` [PATCH v12 27/29] crypto: ccp: Add the SNP_VLEK_LOAD command
` [PATCH v12 28/29] crypto: ccp: Add the SNP_{PAUSE,RESUME}_ATTESTATION commands
` [PATCH v12 29/29] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event

SVSM Development Call April 10th, 2024
 2024-04-11  7:20 UTC  (3+ messages)
` [svsm-devel] "

[PATCH v4] virt: tdx-guest: Handle GetQuote request error code
 2024-04-11  2:22 UTC 

[PATCHv10 00/18] x86/tdx: Add kexec support
 2024-04-10 14:17 UTC  (29+ messages)
` [PATCHv10 01/18] x86/acpi: Extract ACPI MADT wakeup code into a separate file
` [PATCHv10 02/18] x86/apic: Mark acpi_mp_wake_* variables as __ro_after_init
` [PATCHv10 03/18] cpu/hotplug: Add support for declaring CPU offlining not supported
` [PATCHv10 04/18] cpu/hotplug, x86/acpi: Disable CPU offlining for ACPI MADT wakeup
` [PATCHv10 05/18] x86/kexec: Keep CR4.MCE set during kexec for TDX guest
` [PATCHv10 06/18] x86/mm: Make x86_platform.guest.enc_status_change_*() return errno
` [PATCHv10 07/18] x86/mm: Return correct level from lookup_address() if pte is none
` [PATCHv10 08/18] x86/tdx: Account shared memory
` [PATCHv10 09/18] x86/mm: Adding callbacks to prepare encrypted memory for kexec
` [PATCHv10 10/18] x86/tdx: Convert shared memory back to private on kexec
` [PATCHv10 11/18] x86/mm: Make e820_end_ram_pfn() cover E820_TYPE_ACPI ranges
` [PATCHv10 12/18] x86/mm: Do not zap page table entries mapping unaccepted memory table during kdump
` [PATCHv10 13/18] x86/acpi: Rename fields in acpi_madt_multiproc_wakeup structure
` [PATCHv10 14/18] x86/acpi: Do not attempt to bring up secondary CPUs in kexec case
` [PATCHv10 15/18] x86/smp: Add smp_ops.stop_this_cpu() callback
` [PATCHv10 16/18] x86/mm: Introduce kernel_ident_mapping_free()
` [PATCHv10 17/18] x86/acpi: Add support for CPU offlining for ACPI MADT wakeup method
` [PATCHv10 18/18] ACPI: tables: Print MULTIPROC_WAKEUP when MADT is parsed
` [PATCH v4 0/4] x86/snp: Add kexec support
  ` [PATCH v4 1/4] efi/x86: skip efi_arch_mem_reserve() in case of kexec
  ` [PATCH v4 2/4] x86/sev: add sev_es_enabled() function
  ` [PATCH v4 3/4] x86/boot/compressed: Skip Video Memory access in Decompressor for SEV-ES/SNP
  ` [PATCH v4 4/4] x86/snp: Convert shared memory back to private on kexec

[PATCH v3 00/14] Provide SEV-SNP support for running under an SVSM
 2024-04-09 18:12 UTC  (7+ messages)
` [PATCH v3 01/14] x86/sev: Rename snp_init() in the boot/compressed/sev.c file
` [PATCH v3 13/14] x86/sev: Hide SVSM attestation entries if not running under an SVSM

question on vTPM interface in coconut-svsm
 2024-04-08 15:05 UTC  (3+ messages)

[PATCH v5 00/10] x86/sev: KEXEC/KDUMP support for SEV-ES guests
 2024-04-08  7:40 UTC  (11+ messages)
` [PATCH v5 01/10] x86/kexec/64: Disable kexec when SEV-ES is active
` [PATCH v5 02/10] x86/sev: Save and print negotiated GHCB protocol version
` [PATCH v5 03/10] x86/sev: Set GHCB data structure version
` [PATCH v5 04/10] x86/sev: Setup code to park APs in the AP Jump Table
` [PATCH v5 05/10] x86/sev: Park APs on AP Jump Table with GHCB protocol version 2
` [PATCH v5 06/10] x86/sev: Use AP Jump Table blob to stop CPU
` [PATCH v5 07/10] x86/sev: Add MMIO handling support to boot/compressed/ code
` [PATCH v5 08/10] x86/sev: Handle CLFLUSH MMIO events
` [PATCH v5 09/10] x86/kexec/64: Support kexec under SEV-ES with AP Jump Table Blob
` [PATCH v5 10/10] x86/sev: Exclude AP jump table related code for SEV-SNP guests

[PATCHv9 00/17] x86/tdx: Add kexec support
 2024-04-07 15:55 UTC  (23+ messages)
` [PATCHv9 05/17] x86/kexec: Keep CR4.MCE set during kexec for TDX guest
  ` [PATCHv9.1 "
` [PATCHv9 09/17] x86/mm: Adding callbacks to prepare encrypted memory for kexec
` [PATCH v3 0/4] x86/snp: Add kexec support
  ` [PATCH v3 1/4] efi/x86: skip efi_arch_mem_reserve() in case of kexec
  ` [PATCH v3 2/4] x86/sev: add sev_es_enabled() function
  ` [PATCH v3 3/4] x86/boot/compressed: Skip Video Memory access in Decompressor for SEV-ES/SNP
  ` [PATCH v3 4/4] x86/snp: Convert shared memory back to private on kexec

SVSM Development Call April 3rd, 2024
 2024-04-04  8:04 UTC  (6+ messages)
` [svsm-devel] "

[PATCH gmem 0/6] gmem fix-ups and interfaces for populating gmem pages
 2024-04-02 21:50 UTC  (4+ messages)
` [PATCH gmem 2/6] KVM: guest_memfd: Only call kvm_arch_gmem_prepare hook if necessary


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).