public inbox for linux-coco@lists.linux.dev
 help / color / mirror / Atom feed
 messages from 2022-03-07 21:34:49 to 2022-05-17 15:34:57 UTC [more...]

[PATCHv6 00/15] mm, x86/cc: Implement support for unaccepted memory
 2022-05-17 15:34 UTC  (3+ messages)
` [PATCHv6 01/15] x86/boot: Centralize __pa()/__va() definitions
` [PATCHv6 03/15] efi/x86: Get full memory map in allocate_e820()

[PATCHv5 00/12] mm, x86/cc: Implement support for unaccepted memory
 2022-05-16  6:46 UTC  (47+ messages)
` [PATCHv5 01/12] x86/boot/: Centralize __pa()/__va() definitions
` [PATCHv5 02/12] mm: Add support for unaccepted memory
` [PATCHv5 03/12] efi/x86: Get full memory map in allocate_e820()
` [PATCHv5 04/12] x86/boot: Add infrastructure required for unaccepted memory support
` [PATCHv5 05/12] efi/x86: Implement support for unaccepted memory
` [PATCHv5 06/12] x86/boot/compressed: Handle "
` [PATCHv5 07/12] x86/mm: Reserve unaccepted memory bitmap
` [PATCHv5 08/12] x86/mm: Provide helpers for unaccepted memory
` [PATCHv5 09/12] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
` [PATCHv5 10/12] x86/tdx: Unaccepted memory support
` [PATCHv5 11/12] mm/vmstat: Add counter for memory accepting
` [PATCHv5 12/12] x86/mm: Report unaccepted memory in /proc/meminfo

[PATCH v3 00/10] x86/sev: KEXEC/KDUMP support for SEV-ES guests
 2022-04-29 13:08 UTC  (3+ messages)

[PATCHv4 0/8] mm, x86/cc: Implement support for unaccepted memory
 2022-04-22 13:26 UTC  (67+ messages)
` [PATCHv4 1/8] mm: Add "
` [PATCHv4 2/8] efi/x86: Get full memory map in allocate_e820()
` [PATCHv4 3/8] efi/x86: Implement support for unaccepted memory
` [PATCHv4 4/8] x86/boot/compressed: Handle "
` [PATCHv4 5/8] x86/mm: Reserve unaccepted memory bitmap
` [PATCHv4 6/8] x86/mm: Provide helpers for unaccepted memory
` [PATCHv4 7/8] x86/tdx: Unaccepted memory support
` [PATCHv4 8/8] mm/vmstat: Add counter for memory accepting

[PATCH 01/12] kexec: Allow architecture code to opt-out at runtime
 2022-04-21 13:20 UTC  (2+ messages)

[PATCH v10 0/4] Allow guest access to EFI confidential computing secret area
 2022-04-13 16:48 UTC  (6+ messages)
` [PATCH v10 1/4] efi: Save location of EFI confidential computing area
` [PATCH v10 2/4] virt: Add efi_secret module to expose confidential computing secrets
` [PATCH v10 3/4] efi: Register efi_secret platform device if EFI secret area is declared
` [PATCH v10 4/4] docs: security: Add secrets/coco documentation

[PATCH v8 0/4] Allow guest access to EFI confidential computing secret area
 2022-04-12 13:18 UTC  (15+ messages)
` [PATCH v8 3/4] efi: Load efi_secret module if EFI secret area is populated

[PATCH v9 0/4] Allow guest access to EFI confidential computing secret area
 2022-04-12 11:18 UTC  (11+ messages)
` [PATCH v9 1/4] efi: Save location of EFI confidential computing area
` [PATCH v9 2/4] virt: Add efi_secret module to expose confidential computing secrets
` [PATCH v9 3/4] efi: Register efi_secret platform device if EFI secret area is declared
` [PATCH v9 4/4] docs: security: Add secrets/coco documentation

x86/coco MAINTAINERS mailing list
 2022-04-07 18:05 UTC 

[PATCH v12 00/46] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
 2022-04-07 14:57 UTC  (51+ messages)
` [PATCH v12 12/46] x86/sev: Check SEV-SNP features support
` [PATCH v12 13/46] x86/sev: Add a helper for the PVALIDATE instruction
` [PATCH v12 14/46] x86/sev: Check the vmpl level
` [PATCH v12 15/46] x86/compressed: Add helper for validating pages in the decompression stage
` [PATCH v12 16/46] x86/compressed: Register GHCB memory when SEV-SNP is active
` [PATCH v12 17/46] x86/sev: "
` [PATCH v12 18/46] x86/sev: Add helper for validating pages in early enc attribute changes
` [PATCH v12 19/46] x86/kernel: Make the .bss..decrypted section shared in RMP table
` [PATCH v12 20/46] x86/kernel: Validate ROM memory before accessing when SEV-SNP is active
` [PATCH v12 21/46] x86/mm: Validate memory when changing the C-bit
` [PATCH v12 22/46] x86/sev: Use SEV-SNP AP creation to start secondary CPUs
` [PATCH v12 23/46] x86/head/64: Re-enable stack protection
` [PATCH v12 24/46] x86/compressed/acpi: Move EFI detection to helper
` [PATCH v12 25/46] x86/compressed/acpi: Move EFI system table lookup "
` [PATCH v12 26/46] x86/compressed/acpi: Move EFI config "
` [PATCH v12 27/46] x86/compressed/acpi: Move EFI vendor "
` [PATCH v12 28/46] x86/compressed/acpi: Move EFI kexec handling into common code
` [PATCH v12 29/46] x86/boot: Add Confidential Computing type to setup_data
` [PATCH v12 30/46] KVM: x86: Move lookup of indexed CPUID leafs to helper
` [PATCH v12 31/46] x86/sev: Move MSR-based VMGEXITs for CPUID "
` [PATCH v12 32/46] x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers
` [PATCH v12 33/46] x86/boot: Add a pointer to Confidential Computing blob in bootparams
` [PATCH v12 34/46] x86/compressed: Add SEV-SNP feature detection/setup
` [PATCH v12 35/46] x86/compressed: Use firmware-validated CPUID leaves for SEV-SNP guests
` [PATCH v12 36/46] x86/compressed: Export and rename add_identity_map()
` [PATCH v12 37/46] x86/compressed/64: Add identity mapping for Confidential Computing blob
` [PATCH v12 38/46] x86/sev: Add SEV-SNP feature detection/setup
` [PATCH v12 39/46] x86/sev: Use firmware-validated CPUID for SEV-SNP guests
` [PATCH v12 40/46] x86/sev: add sev=debug cmdline option to dump SNP CPUID table
` [PATCH v12 41/46] x86/sev: Provide support for SNP guest request NAEs
` [PATCH v12 42/46] x86/sev: Register SEV-SNP guest request platform device
` [PATCH v12 43/46] virt: Add SEV-SNP guest driver
` [PATCH v12 44/46] virt: sevguest: Add support to derive key
` [PATCH v12 45/46] virt: sevguest: Add support to get extended report
` [PATCH v12 46/46] virt: sevguest: Add documentation for SEV-SNP CPUID Enforcement
` [PATCH v12 43.1/46] virt: Add SEV-SNP guest driver

[PATCH v12 02/46] KVM: SVM: Create a separate mapping for the SEV-ES save area
 2022-04-05 18:55 UTC  (3+ messages)
` [PATCH v12 2.1/46] "

[PATCH v11 00/45] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
 2022-04-03 22:36 UTC  (5+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox