linux-coco.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
 messages from 2024-05-17 14:20:03 to 2024-06-04 14:50:05 UTC [more...]

[CfP] Confidential Computing Microconference @ LPC 2024
 2024-06-04 14:50 UTC 

Call for Registration - Confidential Computing Microconference @ LPC 2024
 2024-06-04 14:48 UTC 

[PATCH] x86/tdx: Enhance code generation for TDCALL and SEAMCALL wrappers
 2024-06-04 11:37 UTC  (3+ messages)

[PATCHv11 00/19] x86/tdx: Add kexec support
 2024-06-04 11:09 UTC  (67+ messages)
` [PATCHv11 01/19] x86/acpi: Extract ACPI MADT wakeup code into a separate file
` [PATCHv11 02/19] x86/apic: Mark acpi_mp_wake_* variables as __ro_after_init
` [PATCHv11 03/19] cpu/hotplug: Add support for declaring CPU offlining not supported
` [PATCHv11 04/19] cpu/hotplug, x86/acpi: Disable CPU offlining for ACPI MADT wakeup
` [PATCHv11 05/19] x86/relocate_kernel: Use named labels for less confusion
` [PATCHv11 06/19] x86/kexec: Keep CR4.MCE set during kexec for TDX guest
` [PATCHv11 07/19] x86/mm: Make x86_platform.guest.enc_status_change_*() return errno
` [PATCHv11 08/19] x86/mm: Return correct level from lookup_address() if pte is none
` [PATCHv11 09/19] x86/tdx: Account shared memory
` [PATCHv11 10/19] x86/mm: Add callbacks to prepare encrypted memory for kexec
    ` [PATCHv11.1 "
    ` [PATCHv11.2 "
` [PATCHv11 11/19] x86/tdx: Convert shared memory back to private on kexec
    ` [PATCHv11.1 "
` [PATCHv11 12/19] x86/mm: Make e820__end_ram_pfn() cover E820_TYPE_ACPI ranges
` [PATCHv11 13/19] x86/mm: Do not zap page table entries mapping unaccepted memory table during kdump
` [PATCHv11 14/19] x86/acpi: Rename fields in acpi_madt_multiproc_wakeup structure
` [PATCHv11 15/19] x86/acpi: Do not attempt to bring up secondary CPUs in kexec case
` [PATCHv11 16/19] x86/smp: Add smp_ops.stop_this_cpu() callback
` [PATCHv11 17/19] x86/mm: Introduce kernel_ident_mapping_free()
` [PATCHv11 18/19] x86/acpi: Add support for CPU offlining for ACPI MADT wakeup method
` [PATCHv11 19/19] ACPI: tables: Print MULTIPROC_WAKEUP when MADT is parsed
` [PATCH v7 0/3] x86/snp: Add kexec support
  ` [PATCH v7 1/3] efi/x86: Fix EFI memory map corruption with kexec
  ` [PATCH v7 2/3] x86/boot/compressed: Skip Video Memory access in Decompressor for SEV-ES/SNP
  ` [PATCH v7 3/3] x86/snp: Convert shared memory back to private on kexec

[PULL 00/19] KVM: Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2024-06-03 16:44 UTC  (3+ messages)

[kvm-unit-tests PATCH 00/33] Support for Arm Confidential Compute Architecture
 2024-06-03 12:50 UTC  (2+ messages)

[v2] Support for Arm CCA VMs on Linux
 2024-06-01 20:40 UTC  (8+ messages)
` [PATCH v2 00/43] arm64: Support for Arm CCA in KVM
  ` [PATCH v2 21/43] arm64: RME: Runtime faulting of memory

[PATCH v4 00/15] Provide SEV-SNP support for running under an SVSM
 2024-05-31 19:38 UTC  (43+ messages)
` [PATCH v4 04/15] x86/sev: Check for the presence of an SVSM in the SNP Secrets page
` [PATCH v4 05/15] x86/sev: Use kernel provided SVSM Calling Areas
` [PATCH v4 06/15] x86/sev: Perform PVALIDATE using the SVSM when not at VMPL0
` [PATCH v4 07/15] x86/sev: Use the SVSM to create a vCPU when not in VMPL0
` [PATCH v4 08/15] x86/sev: Provide SVSM discovery support
` [PATCH v4 09/15] x86/sev: Provide guest VMPL level to userspace
` [PATCH v4 10/15] virt: sev-guest: Choose the VMPCK key based on executing VMPL
` [PATCH v4 14/15] x86/sev: Extend the config-fs attestation support for an SVSM
` [PATCH v4 15/15] x86/sev: Allow non-VMPL0 execution when an SVSM is present

[PATCH v2 00/14] arm64: Support for running as a guest in Arm CCA
 2024-05-31 16:29 UTC  (17+ messages)
` [PATCH v2 09/14] arm64: Enable memory encrypt for Realms
` [PATCH v2 12/14] arm64: realm: Support nonsecure ITS emulation shared
` [PATCH v2 13/14] arm64: rsi: Interfaces to query attestation token

[PATCH v15 00/20] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2024-05-31 13:10 UTC  (20+ messages)
` [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
` [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages

SVSM Development Call May 29th, 2024
 2024-05-30  8:47 UTC  (4+ messages)
` [svsm-devel] "

[RFC PATCH] clocksource: hyper-v: Enable the tsc_page for a TDX VM in TD mode
 2024-05-28 14:15 UTC  (8+ messages)

[PATCH] x86/tdx: Generate SIGBUS on userspace MMIO
 2024-05-28 10:09 UTC 

[PATCH 00/20] x86/tdx: Rewrite TDCALL wrappers
 2024-05-28  5:33 UTC  (33+ messages)
` [PATCH 01/20] x86/tdx: Introduce tdvmcall_trampoline()
` [PATCH 02/20] x86/tdx: Add macros to generate TDVMCALL wrappers
` [PATCH 03/20] x86/tdx: Convert port I/O handling to use new TDVMCALL macros
` [PATCH 05/20] x86/tdx: Convert MSR read handling to use new TDVMCALL_1()
` [PATCH 06/20] x86/tdx: Convert MSR write handling to use new TDVMCALL_0()
` [PATCH 08/20] x86/tdx: Convert MMIO handling to use new TDVMCALL macros
` [PATCH 09/20] x86/tdx: Convert MAP_GPA hypercall "
` [PATCH 12/20] x86/tdx: Rewrite tdx_kvm_hypercall() without __tdx_hypercall()
` [PATCH 14/20] x86/tdx: Add macros to generate TDCALL wrappers
` [PATCH 15/20] x86/tdx: Convert PAGE_ACCEPT tdcall to use new TDCALL_0() macro
` [PATCH 16/20] x86/tdx: Convert VP_INFO tdcall to use new TDCALL_5() macro
` [PATCH 17/20] x86/tdx: Convert VM_RD/VM_WR tdcalls to use new TDCALL macros
` [PATCH 18/20] x86/tdx: Convert VP_VEINFO_GET tdcall to use new TDCALL_5() macro
` [PATCH 19/20] x86/tdx: Convert MR_REPORT tdcall to use new TDCALL_0() macro
` [PATCH 20/20] x86/tdx: Remove old TDCALL wrappers

[PATCH] x86/kvm/tdx: Save %rbp in TDX_MODULE_CALL
 2024-05-24  5:46 UTC  (24+ messages)

[PATCH] x86/tdx: Generate SIGBUS on userspace MMIO
 2024-05-23 17:08 UTC  (4+ messages)
    ` [EXTERNAL] "

Development Plan Document
 2024-05-23  9:52 UTC  (6+ messages)
` [svsm-devel] "

SVSM Development Call May 22th, 2024
 2024-05-23  8:28 UTC  (2+ messages)
` [svsm-devel] "

[PATCH] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
 2024-05-21  2:12 UTC 

[PATCH] KVM: SEV: Fix unused variable in guest request handling
 2024-05-20 14:16 UTC  (5+ messages)
    `  "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).