linux-coco.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
 messages from 2023-10-16 13:29:11 to 2023-11-08 06:15:05 UTC [more...]

[PATCH v10 00/50] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2023-11-08  6:14 UTC  (87+ messages)
` [PATCH v10 01/50] KVM: SVM: INTERCEPT_RDTSCP is never intercepted anyway
` [PATCH v10 02/50] KVM: SVM: Fix TSC_AUX virtualization setup
` [PATCH v10 03/50] KVM: SEV: Do not intercept accesses to MSR_IA32_XSS for SEV-ES guests
` [PATCH v10 04/50] x86/cpufeatures: Add SEV-SNP CPU feature
` [PATCH v10 05/50] x86/speculation: Do not enable Automatic IBRS if SEV SNP is enabled
` [PATCH v10 06/50] x86/sev: Add the host SEV-SNP initialization support
` [PATCH v10 07/50] x86/sev: Add RMP entry lookup helpers
` [PATCH v10 08/50] x86/fault: Add helper for dumping RMP entries
` [PATCH v10 09/50] x86/traps: Define RMP violation #PF error code
` [PATCH v10 10/50] x86/fault: Report RMP page faults for kernel addresses
` [PATCH v10 11/50] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
` [PATCH v10 12/50] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
` [PATCH v10 13/50] crypto: ccp: Define the SEV-SNP commands
` [PATCH v10 14/50] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH v10 15/50] crypto: ccp: Provide API to issue SEV and SNP commands
` [PATCH v10 16/50] x86/sev: Introduce snp leaked pages list
` [PATCH v10 17/50] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
` [PATCH v10 18/50] crypto: ccp: Handle the legacy SEV command "
` [PATCH v10 19/50] crypto: ccp: Add the SNP_PLATFORM_STATUS command
` [PATCH v10 20/50] KVM: SEV: Select CONFIG_KVM_SW_PROTECTED_VM when CONFIG_KVM_AMD_SEV=y
` [PATCH v10 21/50] KVM: SEV: Add support to handle AP reset MSR protocol
` [PATCH v10 22/50] KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests
` [PATCH v10 23/50] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
` [PATCH v10 24/50] KVM: SEV: Add initial SEV-SNP support
` [PATCH v10 25/50] KVM: SEV: Add KVM_SNP_INIT command
` [PATCH v10 26/50] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
` [PATCH v10 27/50] KVM: Add HVA range operator
` [PATCH v10 28/50] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
` [PATCH v10 29/50] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command
` [PATCH v10 30/50] KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
` [PATCH v10 31/50] KVM: SEV: Add KVM_EXIT_VMGEXIT
` [PATCH v10 32/50] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
` [PATCH v10 33/50] KVM: SEV: Add support to handle "
` [PATCH v10 34/50] KVM: x86: Export the kvm_zap_gfn_range() for the SNP use
` [PATCH v10 35/50] KVM: SEV: Add support to handle RMP nested page faults
` [PATCH v10 36/50] KVM: SEV: Use a VMSA physical address variable for populating VMCB
` [PATCH v10 37/50] KVM: SEV: Support SEV-SNP AP Creation NAE event
` [PATCH v10 38/50] KVM: SEV: Add support for GHCB-based termination requests
` [PATCH v10 39/50] KVM: SEV: Implement gmem hook for initializing private pages
` [PATCH v10 40/50] KVM: SEV: Implement gmem hook for invalidating "
` [PATCH v10 41/50] KVM: x86: Add gmem hook for determining max NPT mapping level
` [PATCH v10 42/50] KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP
` [PATCH v10 43/50] KVM: SVM: Add module parameter to enable the SEV-SNP
` [PATCH v10 44/50] iommu/amd: Add IOMMU_SNP_SHUTDOWN support
` [PATCH v10 45/50] iommu/amd: Report all cases inhibiting SNP enablement
` [PATCH v10 46/50] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
` [PATCH v10 47/50] x86/sev: Add KVM commands for per-instance certs
` [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
` [PATCH v10 49/50] crypto: ccp: Add debug support for decrypting pages
` [PATCH v10 50/50] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump

RFC: CCC Linux Kernel SIG
 2023-11-08  1:24 UTC 

[GIT PULL] configs-tsm: Unified attestation report ABI for v6.7
 2023-11-05  3:02 UTC  (2+ messages)

TDISP enablement
 2023-11-03 16:44 UTC  (8+ messages)

[PATCH v2] efi/unaccepted: Fix off-by-one when checking for overlapping ranges
 2023-11-03 15:30 UTC  (2+ messages)

[PATCH] efi/unaccepted: Fix off-by-one when checking for overlapping ranges
 2023-11-03 15:15 UTC  (3+ messages)

[PATCHv2] efi/unaccepted: Fix soft lockups caused by parallel memory acceptance
 2023-11-03  0:01 UTC  (14+ messages)

[PATCHv2 00/13] x86/tdx: Add kexec support
 2023-11-01 13:26 UTC  (36+ messages)
` [PATCHv2 01/13] x86/acpi: Extract ACPI MADT wakeup code into a separate file
` [PATCHv2 02/13] kernel/cpu: Add support for declaring CPU offlining not supported
` [PATCHv2 03/13] cpu/hotplug, x86/acpi: Disable CPU offlining for ACPI MADT wakeup
` [PATCHv2 04/13] x86/kvm: Do not try to disable kvmclock if it was not enabled
` [PATCHv2 05/13] x86/kexec: Keep CR4.MCE set during kexec for TDX guest
` [PATCHv2 06/13] x86/mm: Make x86_platform.guest.enc_status_change_*() return errno
` [PATCHv2 07/13] x86/mm: Return correct level from lookup_address() if pte is none
` [PATCHv2 08/13] x86/tdx: Account shared memory
` [PATCHv2 09/13] x86/tdx: Convert shared memory back to private on kexec
` [PATCHv2 10/13] x86/mm: Make e820_end_ram_pfn() cover E820_TYPE_ACPI ranges
` [PATCHv2 11/13] x86/acpi: Do not attempt to bring up secondary CPUs in kexec case
` [PATCHv2 12/13] x86/acpi: Rename fields in acpi_madt_multiproc_wakeup structure
` [PATCHv2 13/13] x86/acpi: Add support for CPU offlining for ACPI MADT wakeup method

[PATCH v7 0/7] configfs-tsm: Attestation Report ABI
 2023-10-27  1:30 UTC  (13+ messages)
` [PATCH v7 1/7] virt: sevguest: Fix passing a stack buffer as a scatterlist target
` [PATCH v7 2/7] virt: coco: Add a coco/Makefile and coco/Kconfig
` [PATCH v7 3/7] configfs-tsm: Introduce a shared ABI for attestation reports
` [PATCH v7 4/7] virt: sevguest: Prep for kernel internal get_ext_report()
` [PATCH v7 5/7] mm/slab: Add __free() support for kvfree
` [PATCH v7 6/7] virt: sevguest: Add TSM_REPORTS support for SNP_GET_EXT_REPORT
` [PATCH v7 7/7] virt: tdx-guest: Add Quote generation support using TSM_REPORTS

Add 'tsm-next' to linux-next
 2023-10-24 22:03 UTC  (3+ messages)

[PATCH 00/12] PCI device authentication
 2023-10-24 17:04 UTC  (8+ messages)
` [PATCH 12/12] PCI/CMA: Grant guests exclusive control of authentication

[PATCH 00/13] x86/tdx: Add kexec support
 2023-10-20 12:42 UTC  (21+ messages)
` [PATCH 03/13] cpu/hotplug, x86/acpi: Disable CPU hotplug for ACPI MADT wakeup
` [PATCH 10/13] x86/tdx: Convert shared memory back to private on kexec
` [PATCH 12/13] x86/acpi: Do not attempt to bring up secondary CPUs in kexec case
` [PATCH 13/13] x86/acpi: Add support for CPU offlining for ACPI MADT wakeup method

[PATCH 00/12] x86/mce, KVM: X86: KVM memory poison and MCE injector support
 2023-10-20  0:38 UTC  (3+ messages)
` [PATCH 09/12] KVM: X86: Add debugfs to inject machine check on VM exit

[PATCH v6 0/7] configfs-tsm: Attestation Report ABI
 2023-10-19 20:24 UTC  (21+ messages)
` [PATCH v6 3/7] configfs-tsm: Introduce a shared ABI for attestation reports
` [PATCH v6 6/7] virt: sevguest: Add TSM_REPORTS support for SNP_GET_EXT_REPORT
` [PATCH v6 7/7] virt: tdx-guest: Add Quote generation support using TSM_REPORTS

[PATCHv2] efi/unaccepted: Fix soft lockups caused by parallel memory acceptance
 2023-10-18 18:56 UTC 

[PATCH] efi/unaccepted: Fix soft lockups caused by parallel memory acceptance
 2023-10-16 16:11 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).