messages from 2023-04-26 18:02:54 to 2023-06-12 04:36:28 UTC [more...]
[PATCH RFC v9 00/51] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
2023-06-12 4:25 UTC (19+ messages)
` [PATCH RFC v9 01/51] KVM: x86: Add gmem hook for initializing private memory
` [PATCH RFC v9 09/51] x86/sev: Add RMP entry lookup helpers
` [PATCH RFC v9 10/51] x86/fault: Add helper for dumping RMP entries
` [PATCH RFC v9 11/51] x86/traps: Define RMP violation #PF error code
` [PATCH RFC v9 12/51] x86/fault: Report RMP page faults for kernel addresses
` [PATCH RFC v9 13/51] x86/fault: Handle RMP page faults for user addresses
` [PATCH RFC v9 14/51] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
` [PATCH RFC v9 15/51] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
` [PATCH RFC v9 16/51] crypto: ccp: Define the SEV-SNP commands
` [PATCH RFC v9 17/51] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH RFC v9 18/51] crypto: ccp: Provide API to issue SEV and SNP commands
` [PATCH RFC v9 19/51] x86/sev: Introduce snp leaked pages list
` [PATCH RFC v9 20/51] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
` [PATCH RFC v9 21/51] crypto: ccp: Handle the legacy SEV command "
` [PATCH RFC v9 22/51] crypto: ccp: Add the SNP_PLATFORM_STATUS command
` [PATCH RFC v9 23/51] KVM: SEV: Select CONFIG_KVM_PROTECTED_VM when CONFIG_KVM_AMD_SEV=y
` [PATCH RFC v9 24/51] KVM: SVM: Add support to handle AP reset MSR protocol
` [PATCH RFC v9 25/51] KVM: SVM: Add GHCB handling for Hypervisor Feature Support requests
(no subject)
2023-06-09 7:05 UTC
KVM Forum BoF on I/O + secure virtualization
2023-06-08 14:32 UTC (5+ messages)
` "
[RFC PATCH 0/3] Retrieve SNP attestation from SVSM
2023-06-07 17:05 UTC (6+ messages)
` [RFC PATCH 1/3] x86/sev: Add __svsm_msr_protocol_2() which returns register values
` [RFC PATCH 2/3] x86/sev: Add snp_svsm_attest_services()
` [RFC PATCH 3/3] virt: sevguest: Add support to get attestation report from SVSM
[PATCHv14 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
2023-06-06 18:14 UTC (13+ messages)
` [PATCHv14 1/9] mm: Add "
` [PATCHv14 2/9] efi/x86: Get full memory map in allocate_e820()
` [PATCHv14 3/9] efi/libstub: Implement support for unaccepted memory
` [PATCHv14 4/9] x86/boot/compressed: Handle "
` [PATCHv14 5/9] efi: Add unaccepted memory support
` [PATCHv14 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
` [PATCHv14 7/9] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
` [PATCHv14 8/9] x86/tdx: Refactor try_accept_one()
` [PATCHv14 9/9] x86/tdx: Add unaccepted memory support
[PATCHv13 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
2023-06-06 12:29 UTC (31+ messages)
` [PATCHv13 1/9] mm: Add "
` [PATCHv13 2/9] efi/x86: Get full memory map in allocate_e820()
` [PATCHv13 3/9] efi/libstub: Implement support for unaccepted memory
` [PATCHv13 4/9] x86/boot/compressed: Handle "
` [PATCHv13 5/9] efi: Add unaccepted memory support
` [PATCHv13 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
` [PATCHv13 7/9] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
` [PATCHv13 8/9] x86/tdx: Refactor try_accept_one()
` [PATCHv13 9/9] x86/tdx: Add unaccepted memory support
[PATCH v3 00/10] x86/sev: KEXEC/KDUMP support for SEV-ES guests
2023-06-04 13:07 UTC (2+ messages)
[PATCHv12 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
2023-05-31 18:10 UTC (20+ messages)
` [PATCHv12 1/9] mm: Add "
` [PATCHv12.1 "
` [PATCHv12 2/9] efi/x86: Get full memory map in allocate_e820()
` [PATCHv12 3/9] efi/libstub: Implement support for unaccepted memory
` [PATCHv12 4/9] x86/boot/compressed: Handle "
` [PATCHv12 5/9] efi: Add unaccepted memory support
` [PATCHv12 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
` [PATCHv12 7/9] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
` [PATCHv12 8/9] x86/tdx: Refactor try_accept_one()
` [PATCHv12 9/9] x86/tdx: Add unaccepted memory support
[RFD] COCONUT-SVSM project governance
2023-05-24 10:49 UTC (5+ messages)
[PATCHv11 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
2023-05-17 18:50 UTC (38+ messages)
` [PATCHv11 1/9] mm: Add "
` [PATCHv11 2/9] efi/x86: Get full memory map in allocate_e820()
` [PATCHv11 3/9] efi/libstub: Implement support for unaccepted memory
` [PATCHv11 4/9] x86/boot/compressed: Handle "
` [PATCHv11 5/9] efi: Provide helpers for "
` [PATCHv11.1 5/9] efi: Add unaccepted memory support
` [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
` [PATCHv11 7/9] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
` [PATCHv11 8/9] x86/tdx: Refactor try_accept_one()
` [PATCHv11 9/9] x86/tdx: Add unaccepted memory support
[PATCH RFC v7 00/64] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
2023-05-15 16:45 UTC (17+ messages)
` [PATCH RFC v7 52/64] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
[PATCHv10 00/11] mm, x86/cc: Implement support for unaccepted memory
2023-05-12 11:01 UTC (23+ messages)
` [PATCHv10 01/11] mm: Add "
` [PATCHv10 02/11] efi/x86: Get full memory map in allocate_e820()
` [PATCHv10 03/11] x86/boot: Add infrastructure required for unaccepted memory support
` [PATCHv10 04/11] efi/x86: Implement support for unaccepted memory
` [PATCHv10 05/11] x86/boot/compressed: Handle "
` [PATCHv10 06/11] x86/mm: Reserve unaccepted memory bitmap
` [PATCHv10 07/11] x86/mm: Provide helpers for unaccepted memory
` [PATCHv10 08/11] x86/mm: Avoid load_unaligned_zeropad() stepping into "
` [PATCHv10 09/11] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
` [PATCHv10 10/11] x86/tdx: Refactor try_accept_one()
` [PATCHv10 11/11] x86/tdx: Add unaccepted memory support
[ANNOUNCEMENT] COCONUT Secure VM Service Module for SEV-SNP
2023-05-08 5:16 UTC (15+ messages)
[PATCH] docs: security: Confidential computing intro and threat model
2023-04-27 19:06 UTC (29+ messages)
[PATCH RFC v8 00/56] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
2023-04-26 18:02 UTC (4+ messages)
` [PATCH RFC v8 34/56] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).