messages from 2023-05-14 05:08:26 to 2023-06-17 18:15:33 UTC [more...]
[PATCH v2] docs: security: Confidential computing intro and threat model for x86 virtualization
2023-06-17 18:15 UTC (19+ messages)
[RFC PATCH 0/6] KVM: guest memory: Misc enhacnement
2023-06-15 20:12 UTC (7+ messages)
` [RFC PATCH 1/6] KVM: selftests: Fix test_add_overlapping_private_memory_regions()
` [RFC PATCH 2/6] KVM: selftests: Fix guest_memfd()
` [RFC PATCH 3/6] KVM: x86/mmu: Pass round full 64-bit error code for the KVM page fault
` [RFC PATCH 4/6] KVM: x86: Introduce PFERR_GUEST_ENC_MASK to indicate fault is private
` [RFC PATCH 5/6] KVM: Add flags to struct kvm_gfn_range
` [RFC PATCH 6/6] KVM: x86: Add is_vm_type_supported callback
[PATCH RFC v9 00/51] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
2023-06-14 16:47 UTC (66+ messages)
` [PATCH RFC v9 01/51] KVM: x86: Add gmem hook for initializing private memory
` [PATCH RFC v9 02/51] KVM: x86: Add gmem hook for invalidating "
` [PATCH RFC v9 03/51] KVM: x86: Use full 64-bit error code for kvm_mmu_do_page_fault
` [PATCH RFC v9 04/51] KVM: x86: Determine shared/private faults using a configurable mask
` [PATCH RFC v9 05/51] x86/coco: move CONFIG_HAS_CC_PLATFORM check down into coco/Makefile
` [PATCH RFC v9 06/51] x86/cpufeatures: Add SEV-SNP CPU feature
` [PATCH RFC v9 07/51] x86/sev: Add the host SEV-SNP initialization support
` [PATCH RFC v9 08/51] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
` [PATCH RFC v9 09/51] x86/sev: Add RMP entry lookup helpers
` [PATCH RFC v9 10/51] x86/fault: Add helper for dumping RMP entries
` [PATCH RFC v9 11/51] x86/traps: Define RMP violation #PF error code
` [PATCH RFC v9 12/51] x86/fault: Report RMP page faults for kernel addresses
` [PATCH RFC v9 13/51] x86/fault: Handle RMP page faults for user addresses
` [PATCH RFC v9 14/51] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
` [PATCH RFC v9 15/51] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
` [PATCH RFC v9 16/51] crypto: ccp: Define the SEV-SNP commands
` [PATCH RFC v9 17/51] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH RFC v9 18/51] crypto: ccp: Provide API to issue SEV and SNP commands
` [PATCH RFC v9 19/51] x86/sev: Introduce snp leaked pages list
` [PATCH RFC v9 20/51] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
` [PATCH RFC v9 21/51] crypto: ccp: Handle the legacy SEV command "
` [PATCH RFC v9 22/51] crypto: ccp: Add the SNP_PLATFORM_STATUS command
` [PATCH RFC v9 23/51] KVM: SEV: Select CONFIG_KVM_PROTECTED_VM when CONFIG_KVM_AMD_SEV=y
` [PATCH RFC v9 24/51] KVM: SVM: Add support to handle AP reset MSR protocol
` [PATCH RFC v9 25/51] KVM: SVM: Add GHCB handling for Hypervisor Feature Support requests
` [PATCH RFC v9 26/51] KVM: SVM: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
` [PATCH RFC v9 27/51] KVM: SVM: Add initial SEV-SNP support
` [PATCH RFC v9 28/51] KVM: SVM: Add KVM_SNP_INIT command
` [PATCH RFC v9 29/51] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_START command
` [PATCH RFC v9 30/51] KVM: Add HVA range operator
` [PATCH RFC v9 31/51] KVM: Split out memory attribute xarray updates to helper function
` [PATCH RFC v9 32/51] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
` [PATCH RFC v9 33/51] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
` [PATCH RFC v9 34/51] KVM: SVM: Add support to handle GHCB GPA register VMGEXIT
` [PATCH RFC v9 35/51] KVM: SVM: Add KVM_EXIT_VMGEXIT
` [PATCH RFC v9 36/51] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
` [PATCH RFC v9 37/51] KVM: SVM: Add support to handle "
` [PATCH RFC v9 38/51] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use
` [PATCH RFC v9 39/51] KVM: x86: Define RMP page fault error bits for #NPF
` [PATCH RFC v9 40/51] KVM: SVM: Add support to handle RMP nested page faults
` [PATCH RFC v9 41/51] KVM: SVM: Use a VMSA physical address variable for populating VMCB
` [PATCH RFC v9 42/51] KVM: SVM: Support SEV-SNP AP Creation NAE event
` [PATCH RFC v9 43/51] KVM: SEV: Configure MMU to check for private fault flags
` [PATCH RFC v9 44/51] KVM: SEV: Implement gmem hook for initializing private pages
` [PATCH RFC v9 45/51] KVM: SEV: Implement gmem hook for invalidating "
` [PATCH RFC v9 46/51] KVM: SVM: Add module parameter to enable the SEV-SNP
` [PATCH RFC v9 47/51] iommu/amd: Add IOMMU_SNP_SHUTDOWN support
` [PATCH RFC v9 48/51] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
` [PATCH RFC v9 49/51] x86/sev: Add KVM commands for per-instance certs
` [PATCH RFC v9 50/51] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
` [PATCH RFC v9 51/51] crypto: ccp: Add debug support for decrypting pages
(no subject)
2023-06-09 7:05 UTC
KVM Forum BoF on I/O + secure virtualization
2023-06-08 14:32 UTC (5+ messages)
` "
[RFC PATCH 0/3] Retrieve SNP attestation from SVSM
2023-06-07 17:05 UTC (6+ messages)
` [RFC PATCH 1/3] x86/sev: Add __svsm_msr_protocol_2() which returns register values
` [RFC PATCH 2/3] x86/sev: Add snp_svsm_attest_services()
` [RFC PATCH 3/3] virt: sevguest: Add support to get attestation report from SVSM
[PATCHv14 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
2023-06-06 18:14 UTC (13+ messages)
` [PATCHv14 1/9] mm: Add "
` [PATCHv14 2/9] efi/x86: Get full memory map in allocate_e820()
` [PATCHv14 3/9] efi/libstub: Implement support for unaccepted memory
` [PATCHv14 4/9] x86/boot/compressed: Handle "
` [PATCHv14 5/9] efi: Add unaccepted memory support
` [PATCHv14 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
` [PATCHv14 7/9] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
` [PATCHv14 8/9] x86/tdx: Refactor try_accept_one()
` [PATCHv14 9/9] x86/tdx: Add unaccepted memory support
[PATCHv13 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
2023-06-06 12:29 UTC (31+ messages)
` [PATCHv13 1/9] mm: Add "
` [PATCHv13 2/9] efi/x86: Get full memory map in allocate_e820()
` [PATCHv13 3/9] efi/libstub: Implement support for unaccepted memory
` [PATCHv13 4/9] x86/boot/compressed: Handle "
` [PATCHv13 5/9] efi: Add unaccepted memory support
` [PATCHv13 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
` [PATCHv13 7/9] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
` [PATCHv13 8/9] x86/tdx: Refactor try_accept_one()
` [PATCHv13 9/9] x86/tdx: Add unaccepted memory support
[PATCH v3 00/10] x86/sev: KEXEC/KDUMP support for SEV-ES guests
2023-06-04 13:07 UTC (2+ messages)
[PATCHv12 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
2023-05-31 18:10 UTC (20+ messages)
` [PATCHv12 1/9] mm: Add "
` [PATCHv12.1 "
` [PATCHv12 2/9] efi/x86: Get full memory map in allocate_e820()
` [PATCHv12 3/9] efi/libstub: Implement support for unaccepted memory
` [PATCHv12 4/9] x86/boot/compressed: Handle "
` [PATCHv12 5/9] efi: Add unaccepted memory support
` [PATCHv12 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory
` [PATCHv12 7/9] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub
` [PATCHv12 8/9] x86/tdx: Refactor try_accept_one()
` [PATCHv12 9/9] x86/tdx: Add unaccepted memory support
[RFD] COCONUT-SVSM project governance
2023-05-24 10:49 UTC (5+ messages)
[PATCHv11 0/9] mm, x86/cc, efi: Implement support for unaccepted memory
2023-05-17 18:50 UTC (31+ messages)
` [PATCHv11 1/9] mm: Add "
` [PATCHv11 2/9] efi/x86: Get full memory map in allocate_e820()
` [PATCHv11 3/9] efi/libstub: Implement support for unaccepted memory
` [PATCHv11 4/9] x86/boot/compressed: Handle "
` [PATCHv11 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into "
[PATCHv11 5/9] efi: Provide helpers for unaccepted memory
2023-05-17 15:58 UTC (4+ messages)
` [PATCHv11.1 5/9] efi: Add unaccepted memory support
[PATCH RFC v7 52/64] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
2023-05-15 16:45 UTC (12+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).