messages from 2023-12-30 17:33:27 to 2024-01-21 11:49:55 UTC [more...]
[PATCH v1 00/26] Add AMD Secure Nested Paging (SEV-SNP) Initialization Support
2024-01-21 11:49 UTC (75+ messages)
` [PATCH v1 01/26] x86/cpufeatures: Add SEV-SNP CPU feature
` [PATCH v1 03/26] iommu/amd: Don't rely on external callers to enable IOMMU SNP support
` [PATCH v1 04/26] x86/sev: Add the host SEV-SNP initialization support
` [PATCH v1 07/26] x86/fault: Add helper for dumping RMP entries
` [PATCH v1 10/26] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
` [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
` [PATCH v1 12/26] crypto: ccp: Define the SEV-SNP commands
` [PATCH v1 13/26] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH v1 14/26] crypto: ccp: Provide API to issue SEV and SNP commands
` [PATCH v1 15/26] x86/sev: Introduce snp leaked pages list
` [PATCH v1 17/26] crypto: ccp: Handle non-volatile INIT_EX data when SNP is enabled
` [PATCH v1 18/26] crypto: ccp: Handle legacy SEV commands "
` [PATCH v1 20/26] crypto: ccp: Add debug support for decrypting pages
` [PATCH v1 21/26] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
[RFC] Support for Arm CCA VMs on Linux
2024-01-19 1:26 UTC (7+ messages)
[RFC PATCH] x86/virt/tdx: Disable KEXEC in the presence of TDX
2024-01-19 0:55 UTC (5+ messages)
[RFC PATCH v1 0/4] tsm: Runtime measurement registers ABI
2024-01-18 19:20 UTC (12+ messages)
` [RFC PATCH v1 1/4] tsm: Runtime measurement register support
` [RFC PATCH v1 2/4] tsm: Add RTMRs to the configfs-tsm hierarchy
` [RFC PATCH v1 3/4] tsm: Allow for mapping RTMRs to TCG TPM PCRs
` [RFC PATCH v1 4/4] tsm: Allow for extending and reading configured RTMRs
SVSM Development Call Jan 17th, 2024
2024-01-17 17:46 UTC (2+ messages)
[RFC PATCH] x86/sev: x86/sev: enforce PC-relative addressing in clang
2024-01-17 13:38 UTC (21+ messages)
` [RFC PATCH v2] x86/sev: enforce RIP-relative accesses in early SEV/SME code
[PATCH v4 0/3] x86/hyperv: Mark CoCo VM pages not present when changing encrypted state
2024-01-17 13:37 UTC (9+ messages)
` [PATCH v4 1/3] x86/hyperv: Use slow_virt_to_phys() in page transition hypervisor callback
` [PATCH v4 2/3] x86/mm: Regularize set_memory_p() parameters and make non-static
` [PATCH v4 3/3] x86/hyperv: Make encrypted/decrypted changes safe for load_unaligned_zeropad()
[PATCHv2] x86/mm: Fix memory encryption features advertisement
2024-01-16 21:16 UTC (8+ messages)
[PATCHv5 00/16] x86/tdx: Add kexec support
2024-01-16 10:53 UTC (19+ messages)
` [PATCHv5 10/16] x86/tdx: Convert shared memory back to private on kexec
` [PATCHv5 15/16] x86/mm: Introduce kernel_ident_mapping_free()
` [PATCHv5 16/16] x86/acpi: Add support for CPU offlining for ACPI MADT wakeup method
[PATCH v11 00/35] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
2024-01-16 4:14 UTC (17+ messages)
` [PATCH v11 03/35] KVM: Use AS_INACCESSIBLE when creating guest_memfd inode
` [PATCH v11 04/35] KVM: x86: Add gmem hook for initializing memory
` [PATCH v11 05/35] KVM: x86: Add gmem hook for invalidating memory
` [PATCH v11 06/35] KVM: x86/mmu: Pass around full 64-bit error code for KVM page faults
` [PATCH v11 07/35] KVM: x86: Add KVM_X86_SNP_VM vm_type
` [PATCH v11 08/35] KVM: x86: Define RMP page fault error bits for #NPF
` [PATCH v11 18/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
` [PATCH v11 26/35] KVM: SEV: Support SEV-SNP AP Creation NAE event
` [PATCH v11 32/35] KVM: SVM: Add module parameter to enable the SEV-SNP
` [PATCH v11 33/35] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
` [PATCH v11 34/35] crypto: ccp: Add the SNP_SET_CONFIG_{START,END} commands
` [PATCH v11 35/35] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
[PATCH v3 0/3] x86/hyperv: Mark CoCo VM pages not present when changing encrypted state
2024-01-15 10:00 UTC (18+ messages)
` [PATCH v3 1/3] x86/hyperv: Use slow_virt_to_phys() in page transition hypervisor callback
` [PATCH v3 2/3] x86/mm: Regularize set_memory_p() parameters and make non-static
` [PATCH v3 3/3] x86/hyperv: Make encrypted/decrypted changes safe for load_unaligned_zeropad()
[PATCH v2] virt: tdx-guest: Handle GetQuote request error code
2024-01-15 5:14 UTC (4+ messages)
[RFC V1 0/5] x86: CVMs: Align memory conversions to 2M granularity
2024-01-12 5:52 UTC (6+ messages)
` [RFC V1 1/5] swiotlb: Support allocating DMA memory from SWIOTLB
` [RFC V1 2/5] swiotlb: Allow setting up default alignment of SWIOTLB region
` [RFC V1 3/5] x86: CVMs: Enable dynamic swiotlb by default for CVMs
` [RFC V1 4/5] x86: CVMs: Allow allocating all DMA memory from SWIOTLB
` [RFC V1 5/5] x86: CVMs: Ensure that memory conversions happen at 2M alignment
[PATCH v1] virt: tdx-guest: Handle GetQuote request error code
2024-01-10 12:54 UTC (4+ messages)
SVSM Development Call Jan 10th, 2024
2024-01-10 9:27 UTC
[PATCH] x86/tdx: Optimize try_accept_memory() to reduce 1GB page accepted failed times
2024-01-09 23:47 UTC (4+ messages)
[PATCH v10 00/50] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
2024-01-09 22:07 UTC (5+ messages)
` [PATCH v10 07/50] x86/sev: Add RMP entry lookup helpers
[PATCHv4 00/14] x86/tdx: Add kexec support
2024-01-09 14:59 UTC (6+ messages)
` [PATCHv4 05/14] x86/kvm: Do not try to disable kvmclock if it was not enabled
[PATCHv5 14/16] x86/smp: Add smp_ops.stop_this_cpu() callback
2024-01-09 3:04 UTC (5+ messages)
` [PATCHv5.1 "
[PATCH v7 0/7] configfs-tsm: Attestation Report ABI
2024-01-09 2:13 UTC (5+ messages)
` [PATCH v7 7/7] virt: tdx-guest: Add Quote generation support using TSM_REPORTS
[PATCH v2 0/5] tsm: Attestation Report ABI
2024-01-04 18:29 UTC (6+ messages)
` [PATCH v2 4/5] mm/slab: Add __free() support for kvfree
[PATCH] x86/coco, x86/sev: Use cpu_feature_enabled() to detect SEV guest flavor
2024-01-02 12:30 UTC (12+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).