messages from 2024-05-28 09:55:35 to 2024-06-10 10:21:45 UTC [more...]
[PATCH v6 00/10] x86/sev: KEXEC/KDUMP support for SEV-ES guests
2024-06-10 10:21 UTC (11+ messages)
` [PATCH v6 01/10] x86/kexec/64: Disable kexec when SEV-ES is active
` [PATCH v6 02/10] x86/sev: Save and print negotiated GHCB protocol version
` [PATCH v6 03/10] x86/sev: Set GHCB data structure version
` [PATCH v6 04/10] x86/sev: Setup code to park APs in the AP Jump Table
` [PATCH v6 05/10] x86/sev: Park APs on AP Jump Table with GHCB protocol version 2
` [PATCH v6 06/10] x86/sev: Use AP Jump Table blob to stop CPU
` [PATCH v6 07/10] x86/sev: Add MMIO handling support to boot/compressed/ code
` [PATCH v6 08/10] x86/sev: Handle CLFLUSH MMIO events
` [PATCH v6 09/10] x86/kexec/64: Support kexec under SEV-ES with AP Jump Table Blob
` [PATCH v6 10/10] x86/sev: Exclude AP jump table related code for SEV-SNP guests
Confidential Computing call May 10: RTMR ABI & TEE I/O
2024-06-08 14:41 UTC (5+ messages)
[PATCH v3 00/14] arm64: Support for running as a guest in Arm CCA
2024-06-07 17:55 UTC (27+ messages)
` [PATCH v3 01/14] arm64: rsi: Add RSI definitions
` [PATCH v3 02/14] arm64: Detect if in a realm and set RIPAS RAM
` [PATCH v3 03/14] arm64: realm: Query IPA size from the RMM
` [PATCH v3 04/14] arm64: Mark all I/O as non-secure shared
` [PATCH v3 05/14] fixmap: Allow architecture overriding set_fixmap_io
` [PATCH v3 06/14] arm64: Override set_fixmap_io
` [PATCH v3 07/14] arm64: Make the PHYS_MASK_SHIFT dynamic
` [PATCH v3 08/14] arm64: Enforce bounce buffers for realm DMA
` [PATCH v3 09/14] arm64: Enable memory encrypt for Realms
` [PATCH v3 10/14] arm64: Force device mappings to be non-secure shared
` [PATCH v3 11/14] efi: arm64: Map Device with Prot Shared
` [PATCH v3 12/14] arm64: realm: Support nonsecure ITS emulation shared
` [PATCH v3 13/14] arm64: rsi: Interfaces to query attestation token
` [PATCH v3 14/14] virt: arm-cca-guest: TSM_REPORT support for realms
[PATCHv11 00/19] x86/tdx: Add kexec support
2024-06-07 15:14 UTC (99+ messages)
` [PATCHv11 01/19] x86/acpi: Extract ACPI MADT wakeup code into a separate file
` [PATCHv11 02/19] x86/apic: Mark acpi_mp_wake_* variables as __ro_after_init
` [PATCHv11 03/19] cpu/hotplug: Add support for declaring CPU offlining not supported
` [PATCHv11 04/19] cpu/hotplug, x86/acpi: Disable CPU offlining for ACPI MADT wakeup
` [PATCHv11 05/19] x86/relocate_kernel: Use named labels for less confusion
` [PATCHv11 06/19] x86/kexec: Keep CR4.MCE set during kexec for TDX guest
` [PATCHv11 07/19] x86/mm: Make x86_platform.guest.enc_status_change_*() return errno
` [PATCHv11 08/19] x86/mm: Return correct level from lookup_address() if pte is none
` [PATCHv11 09/19] x86/tdx: Account shared memory
` [PATCHv11 10/19] x86/mm: Add callbacks to prepare encrypted memory for kexec
` [PATCHv11.1 "
` [PATCHv11.2 "
` [PATCHv11 11/19] x86/tdx: Convert shared memory back to private on kexec
` [PATCHv11.1 "
` [PATCHv11 12/19] x86/mm: Make e820__end_ram_pfn() cover E820_TYPE_ACPI ranges
` [PATCHv11 13/19] x86/mm: Do not zap page table entries mapping unaccepted memory table during kdump
` [PATCHv11 14/19] x86/acpi: Rename fields in acpi_madt_multiproc_wakeup structure
` [PATCHv11 15/19] x86/acpi: Do not attempt to bring up secondary CPUs in kexec case
` [PATCHv11 16/19] x86/smp: Add smp_ops.stop_this_cpu() callback
` [PATCHv11 17/19] x86/mm: Introduce kernel_ident_mapping_free()
` [PATCHv11 18/19] x86/acpi: Add support for CPU offlining for ACPI MADT wakeup method
` [PATCHv11 19/19] ACPI: tables: Print MULTIPROC_WAKEUP when MADT is parsed
` [PATCH v7 0/3] x86/snp: Add kexec support
` [PATCH v7 1/3] efi/x86: Fix EFI memory map corruption with kexec
` [PATCH v7 2/3] x86/boot/compressed: Skip Video Memory access in Decompressor for SEV-ES/SNP
` [PATCH v7 3/3] x86/snp: Convert shared memory back to private on kexec
CCC Kernel SIG / Device Security call today 2024/06/07
2024-06-07 14:03 UTC
[PATCH v5 00/13] Provide SEV-SNP support for running under an SVSM
2024-06-06 19:15 UTC (19+ messages)
` [PATCH v5 01/13] x86/irqflags: Provide native versions of the local_irq_save()/restore()
` [PATCH v5 02/13] x86/sev: Check for the presence of an SVSM in the SNP Secrets page
` [PATCH v5 03/13] x86/sev: Use kernel provided SVSM Calling Areas
` [PATCH v5 04/13] x86/sev: Perform PVALIDATE using the SVSM when not at VMPL0
` [PATCH v5 05/13] x86/sev: Use the SVSM to create a vCPU when not in VMPL0
` [PATCH v5 06/13] x86/sev: Provide SVSM discovery support
` [PATCH v5 07/13] x86/sev: Provide guest VMPL level to userspace
` [PATCH v5 08/13] virt: sev-guest: Choose the VMPCK key based on executing VMPL
` [PATCH v5 09/13] configfs-tsm: Allow the privlevel_floor attribute to be updated
` [PATCH v5 10/13] fs/configfs: Add a callback to determine attribute visibility
` [PATCH v5 11/13] x86/sev: Take advantage of configfs visibility support in TSM
` [PATCH v5 12/13] x86/sev: Extend the config-fs attestation support for an SVSM
` [PATCH v5 13/13] x86/sev: Allow non-VMPL0 execution when an SVSM is present
SVSM Development Call June 5th, 2024
2024-06-06 7:24 UTC (2+ messages)
` [svsm-devel] "
[PATCH] x86/tdx: Enhance code generation for TDCALL and SEAMCALL wrappers
2024-06-04 19:34 UTC (4+ messages)
[CfP] Confidential Computing Microconference @ LPC 2024
2024-06-04 14:50 UTC
Call for Registration - Confidential Computing Microconference @ LPC 2024
2024-06-04 14:48 UTC
[PULL 00/19] KVM: Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
2024-06-03 16:44 UTC (3+ messages)
[kvm-unit-tests PATCH 00/33] Support for Arm Confidential Compute Architecture
2024-06-03 12:50 UTC (2+ messages)
[v2] Support for Arm CCA VMs on Linux
2024-06-01 20:40 UTC (8+ messages)
` [PATCH v2 00/43] arm64: Support for Arm CCA in KVM
` [PATCH v2 21/43] arm64: RME: Runtime faulting of memory
[PATCH v4 00/15] Provide SEV-SNP support for running under an SVSM
2024-05-31 19:38 UTC (25+ messages)
` [PATCH v4 07/15] x86/sev: Use the SVSM to create a vCPU when not in VMPL0
` [PATCH v4 08/15] x86/sev: Provide SVSM discovery support
` [PATCH v4 09/15] x86/sev: Provide guest VMPL level to userspace
` [PATCH v4 10/15] virt: sev-guest: Choose the VMPCK key based on executing VMPL
` [PATCH v4 14/15] x86/sev: Extend the config-fs attestation support for an SVSM
` [PATCH v4 15/15] x86/sev: Allow non-VMPL0 execution when an SVSM is present
[PATCH v2 00/14] arm64: Support for running as a guest in Arm CCA
2024-05-31 16:29 UTC (5+ messages)
` [PATCH v2 13/14] arm64: rsi: Interfaces to query attestation token
[PATCH v15 00/20] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
2024-05-31 13:10 UTC (12+ messages)
` [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
SVSM Development Call May 29th, 2024
2024-05-30 8:47 UTC (4+ messages)
` [svsm-devel] "
[RFC PATCH] clocksource: hyper-v: Enable the tsc_page for a TDX VM in TD mode
2024-05-28 14:15 UTC (5+ messages)
[PATCH] x86/tdx: Generate SIGBUS on userspace MMIO
2024-05-28 10:09 UTC
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).