Linux Confidential Computing Development
 help / color / mirror / Atom feed
 messages from 2024-04-12 16:04:56 to 2024-04-24 16:00:12 UTC [more...]

[PATCH v4 00/15] Provide SEV-SNP support for running under an SVSM
 2024-04-24 15:58 UTC  (15+ messages)
` [PATCH v4 01/15] x86/sev: Shorten snp_secrets_page_layout to snp_secrets_page
` [PATCH v4 02/15] x86/sev: Rename snp_init() in the boot/compressed/sev.c file
` [PATCH v4 03/15] x86/sev: Make the VMPL0 checking more straight forward
` [PATCH v4 04/15] x86/sev: Check for the presence of an SVSM in the SNP Secrets page
` [PATCH v4 05/15] x86/sev: Use kernel provided SVSM Calling Areas
` [PATCH v4 06/15] x86/sev: Perform PVALIDATE using the SVSM when not at VMPL0
` [PATCH v4 07/15] x86/sev: Use the SVSM to create a vCPU when not in VMPL0
` [PATCH v4 08/15] x86/sev: Provide SVSM discovery support
` [PATCH v4 09/15] x86/sev: Provide guest VMPL level to userspace
` [PATCH v4 10/15] virt: sev-guest: Choose the VMPCK key based on executing VMPL
` [PATCH v4 11/15] configfs-tsm: Allow the privlevel_floor attribute to be updated
` [PATCH v4 12/15] fs/configfs: Add a callback to determine attribute visibility
` [PATCH v4 13/15] x86/sev: Take advantage of configfs visibility support in TSM
` [PATCH v4 14/15] x86/sev: Extend the config-fs attestation support for an SVSM

[PATCHv10 00/18] x86/tdx: Add kexec support
 2024-04-24 14:51 UTC  (15+ messages)
` [PATCHv10 01/18] x86/acpi: Extract ACPI MADT wakeup code into a separate file
` [PATCHv10 03/18] cpu/hotplug: Add support for declaring CPU offlining not supported
` [PATCHv10 04/18] cpu/hotplug, x86/acpi: Disable CPU offlining for ACPI MADT wakeup

[PATCH v4 0/4] x86/snp: Add kexec support
 2024-04-24 14:48 UTC  (6+ messages)
` [PATCH v5 0/3] "
  ` [PATCH v5 1/3] efi/x86: skip efi_arch_mem_reserve() in case of kexec
  ` [PATCH v5 2/3] x86/boot/compressed: Skip Video Memory access in Decompressor for SEV-ES/SNP
  ` [PATCH v5 3/3] x86/snp: Convert shared memory back to private on kexec

[v2] Support for Arm CCA VMs on Linux
 2024-04-24 13:27 UTC  (44+ messages)
` [PATCH v2 00/14] arm64: Support for running as a guest in Arm CCA
  ` [PATCH v2 14/14] virt: arm-cca-guest: TSM_REPORT support for realms
` [PATCH v2 00/43] arm64: Support for Arm CCA in KVM
  ` [PATCH v2 04/43] arm64: RME: Handle Granule Protection Faults (GPFs)
  ` [PATCH v2 05/43] arm64: RME: Add SMC definitions for calling the RMM
  ` [PATCH v2 06/43] arm64: RME: Add wrappers for RMI calls
  ` [PATCH v2 07/43] arm64: RME: Check for RME support at KVM init
  ` [PATCH v2 09/43] arm64: RME: ioctls to create and configure realms
  ` [PATCH v2 11/43] arm64: kvm: Allow passing machine type in KVM creation
  ` [PATCH v2 12/43] arm64: RME: Keep a spare page delegated to the RMM
  ` [PATCH v2 13/43] arm64: RME: RTT handling
  ` [PATCH v2 14/43] arm64: RME: Allocate/free RECs to match vCPUs
  ` [PATCH v2 16/43] KVM: arm64: Support timers in realm RECs
  ` [PATCH v2 17/43] arm64: RME: Allow VMM to set RIPAS
  ` [PATCH v2 18/43] arm64: RME: Handle realm enter/exit
  ` [PATCH v2 20/43] arm64: RME: Allow populating initial contents

[PATCH v14 00/22] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2024-04-23 21:36 UTC  (32+ messages)
` [PATCH v14 01/22] KVM: SEV: Select KVM_GENERIC_PRIVATE_MEM when CONFIG_KVM_AMD_SEV=y
` [PATCH v14 02/22] KVM: SEV: Add support to handle AP reset MSR protocol
` [PATCH v14 03/22] KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests
` [PATCH v14 04/22] KVM: SEV: Add initial SEV-SNP support
` [PATCH v14 05/22] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
` [PATCH v14 06/22] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
` [PATCH v14 07/22] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command
` [PATCH v14 08/22] KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
` [PATCH v14 09/22] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
` [PATCH v14 10/22] KVM: SEV: Add support to handle "
` [PATCH v14 11/22] KVM: SEV: Add support to handle RMP nested page faults
` [PATCH v14 12/22] KVM: SEV: Support SEV-SNP AP Creation NAE event
` [PATCH v14 13/22] KVM: SEV: Add support for GHCB-based termination requests
` [PATCH v14 14/22] KVM: SEV: Implement gmem hook for initializing private pages
` [PATCH v14 15/22] KVM: SEV: Implement gmem hook for invalidating "
` [PATCH v14 16/22] KVM: x86: Implement gmem hook for determining max NPT mapping level
` [PATCH v14 17/22] KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP
` [PATCH v14 18/22] KVM: SVM: Add module parameter to enable SEV-SNP
` [PATCH v14 19/22] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
` [PATCH v14 20/22] crypto: ccp: Add the SNP_VLEK_LOAD command
` [PATCH v14 21/22] crypto: ccp: Add the SNP_{PAUSE,RESUME}_ATTESTATION commands
` [PATCH v14 22/22] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
` [PATCH v14 23/22] [SQUASH] KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
  ` [PATCH v14 24/22] [SQUASH] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
  ` [PATCH v14 25/22] [SQUASH] KVM: SEV: Add support to handle "
  ` [PATCH v14 26/22] [SQUASH] KVM: SEV: Add support for GHCB-based termination requests
  ` [PATCH v14 27/22] [SQUASH] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
  ` [PATCH v14 28/22] [SQUASH] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST "
  ` [PATCH v14 29/22] [SQUASH] KVM: SEV: Support SEV-SNP AP Creation "

SVSM Development Call April 24th, 2024
 2024-04-23 15:52 UTC 

[PATCH v3 00/14] Provide SEV-SNP support for running under an SVSM
 2024-04-22 22:07 UTC  (53+ messages)
` [PATCH v3 01/14] x86/sev: Rename snp_init() in the boot/compressed/sev.c file
` [PATCH v3 02/14] x86/sev: Make the VMPL0 checking function more generic
` [PATCH v3 03/14] x86/sev: Check for the presence of an SVSM in the SNP Secrets page
` [PATCH v3 04/14] x86/sev: Use kernel provided SVSM Calling Areas
` [PATCH v3 07/14] x86/sev: Provide SVSM discovery support
` [PATCH v3 09/14] virt: sev-guest: Choose the VMPCK key based on executing VMPL
` [PATCH v3 10/14] configfs-tsm: Allow the privlevel_floor attribute to be updated
` [PATCH v3 11/14] x86/sev: Extend the config-fs attestation support for an SVSM
` [PATCH v3 12/14] fs/configfs: Add a callback to determine attribute visibility
` [PATCH v3 13/14] x86/sev: Hide SVSM attestation entries if not running under an SVSM

[kvm-unit-tests PATCH 00/33] Support for Arm Confidential Compute Architecture
 2024-04-22 16:15 UTC  (15+ messages)
` [kvm-unit-tests PATCH 08/33] arm: realm: Make uart available before MMU is enabled
` [kvm-unit-tests PATCH 14/33] arm: selftest: realm: skip pabt test when running in a realm

[PATCH 0/3] sysfs: Group visibility fixups
 2024-04-22  9:20 UTC  (3+ messages)
` [PATCH 1/3] sysfs: Fix crash on empty group attributes array

[RFC PATCH v2 0/6] Towards a shared TSM sysfs-ABI for Confidential Computing
 2024-04-22  2:21 UTC  (4+ messages)
` [RFC PATCH v2 5/6] PCI/TSM: Authenticate devices via platform TSM

[PATCH v13 00/26] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2024-04-21 18:00 UTC  (40+ messages)
` [PATCH v13 01/26] [TEMP] x86/kvm/Kconfig: Have KVM_AMD_SEV select ARCH_HAS_CC_PLATFORM
` [PATCH v13 02/26] [TEMP] x86/cc: Add cc_platform_set/_clear() helpers
` [PATCH v13 03/26] [TEMP] x86/CPU/AMD: Track SNP host status with cc_platform_*()
` [PATCH v13 04/26] KVM: guest_memfd: Fix PTR_ERR() handling in __kvm_gmem_get_pfn()
` [PATCH v13 05/26] KVM: SEV: Select KVM_GENERIC_PRIVATE_MEM when CONFIG_KVM_AMD_SEV=y
` [PATCH v13 06/26] KVM: SEV: Add support to handle AP reset MSR protocol
` [PATCH v13 07/26] KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests
` [PATCH v13 08/26] KVM: SEV: Add initial SEV-SNP support
` [PATCH v13 09/26] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
` [PATCH v13 10/26] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
` [PATCH v13 11/26] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command
` [PATCH v13 12/26] KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
` [PATCH v13 13/26] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
` [PATCH v13 14/26] KVM: SEV: Add support to handle "
` [PATCH v13 15/26] KVM: SEV: Add support to handle RMP nested page faults
` [PATCH v13 16/26] KVM: SEV: Support SEV-SNP AP Creation NAE event
` [PATCH v13 17/26] KVM: SEV: Add support for GHCB-based termination requests
` [PATCH v13 18/26] KVM: SEV: Implement gmem hook for initializing private pages
` [PATCH v13 19/26] KVM: SEV: Implement gmem hook for invalidating "
` [PATCH v13 20/26] KVM: x86: Implement gmem hook for determining max NPT mapping level
` [PATCH v13 21/26] KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP
` [PATCH v13 22/26] KVM: SVM: Add module parameter to enable SEV-SNP
` [PATCH v13 23/26] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
` [PATCH v13 24/26] crypto: ccp: Add the SNP_VLEK_LOAD command
` [PATCH v13 25/26] crypto: ccp: Add the SNP_{PAUSE,RESUME}_ATTESTATION commands
` [PATCH v13 26/26] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event

[PATCH v12 00/29] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2024-04-18 19:57 UTC  (10+ messages)
` [PATCH v12 18/29] KVM: SEV: Use a VMSA physical address variable for populating VMCB
` [PATCH v12 22/29] KVM: SEV: Implement gmem hook for invalidating private pages

[PATCH v2 33/43] arm64: rme: Enable PMU support with a realm guest
 2024-04-18 16:06 UTC  (3+ messages)

[RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
 2024-04-17 20:23 UTC  (15+ messages)

[RFC PATCH] OvmfPkg/SecurityPkg: Add build option for coexistance of vTPM and RTMR
 2024-04-15 14:42 UTC  (11+ messages)
              ` [edk2-devel] "

[PATCH gmem 0/6] gmem fix-ups and interfaces for populating gmem pages
 2024-04-15 13:36 UTC  (7+ messages)
` [PATCH gmem 4/6] mm: Introduce AS_INACCESSIBLE for encrypted/confidential memory
` [PATCH gmem 5/6] KVM: guest_memfd: Use AS_INACCESSIBLE when creating guest_memfd inode
` [PATCH gmem 6/6] KVM: guest_memfd: Add interface for populating gmem pages with user data

[PATCH v2 09/14] arm64: Enable memory encrypt for Realms
 2024-04-15  3:13 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).