[PATCH v15 00/20] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
2024-05-02 23:11 UTC (22+ messages)
` [PATCH v15 01/20] Revert "KVM: x86: Add gmem hook for determining max NPT mapping level"
` [PATCH v15 02/20] KVM: x86: Add hook for determining max NPT mapping level
` [PATCH v15 03/20] KVM: SEV: Select KVM_GENERIC_PRIVATE_MEM when CONFIG_KVM_AMD_SEV=y
` [PATCH v15 04/20] KVM: SEV: Add initial SEV-SNP support
` [PATCH v15 05/20] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
` [PATCH v15 06/20] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
` [PATCH v15 07/20] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command
` [PATCH v15 08/20] KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
` [PATCH v15 09/20] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
` [PATCH v15 10/20] KVM: SEV: Add support to handle "
` [PATCH v15 11/20] KVM: SEV: Add support to handle RMP nested page faults
` [PATCH v15 12/20] KVM: SEV: Support SEV-SNP AP Creation NAE event
` [PATCH v15 13/20] KVM: SEV: Implement gmem hook for initializing private pages
` [PATCH v15 14/20] KVM: SEV: Implement gmem hook for invalidating "
` [PATCH v15 15/20] KVM: x86: Implement hook for determining max NPT mapping level
` [PATCH v15 16/20] KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP
` [PATCH v15 17/20] KVM: SVM: Add module parameter to enable SEV-SNP
` [PATCH v15 18/20] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
` [PATCH v15 19/20] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST "
` [PATCH v15 20/20] crypto: ccp: Add the SNP_VLEK_LOAD command
[PATCHv10 00/18] x86/tdx: Add kexec support
2024-05-02 21:54 UTC (52+ messages)
` [PATCHv10 03/18] cpu/hotplug: Add support for declaring CPU offlining not supported
` [PATCHv10 04/18] cpu/hotplug, x86/acpi: Disable CPU offlining for ACPI MADT wakeup
` [PATCHv10.1 "
` [PATCHv10 05/18] x86/kexec: Keep CR4.MCE set during kexec for TDX guest
` [PATCHv10 06/18] x86/mm: Make x86_platform.guest.enc_status_change_*() return errno
` [PATCHv10 09/18] x86/mm: Adding callbacks to prepare encrypted memory for kexec
` [PATCHv10.1 "
` [PATCH v4 0/4] x86/snp: Add kexec support
` [PATCH v5 0/3] "
` [PATCH v5 1/3] efi/x86: skip efi_arch_mem_reserve() in case of kexec
` [PATCH v6 0/3] x86/snp: Add kexec support
` [PATCH v6 1/3] efi/x86: Fix EFI memory map corruption with kexec
` [PATCH v6 2/3] x86/boot/compressed: Skip Video Memory access in Decompressor for SEV-ES/SNP
` [PATCH v6 3/3] x86/snp: Convert shared memory back to private on kexec
[PATCH v4 00/15] Provide SEV-SNP support for running under an SVSM
2024-05-02 17:29 UTC (32+ messages)
` [PATCH v4 01/15] x86/sev: Shorten snp_secrets_page_layout to snp_secrets_page
` [PATCH v4 02/15] x86/sev: Rename snp_init() in the boot/compressed/sev.c file
` [PATCH v4 03/15] x86/sev: Make the VMPL0 checking more straight forward
` [PATCH v4 04/15] x86/sev: Check for the presence of an SVSM in the SNP Secrets page
` [PATCH v4 05/15] x86/sev: Use kernel provided SVSM Calling Areas
` [PATCH v4 06/15] x86/sev: Perform PVALIDATE using the SVSM when not at VMPL0
` [PATCH v4 07/15] x86/sev: Use the SVSM to create a vCPU when not in VMPL0
` [PATCH v4 08/15] x86/sev: Provide SVSM discovery support
` [PATCH v4 09/15] x86/sev: Provide guest VMPL level to userspace
` [PATCH v4 10/15] virt: sev-guest: Choose the VMPCK key based on executing VMPL
` [svsm-devel] "
` [PATCH v4 11/15] configfs-tsm: Allow the privlevel_floor attribute to be updated
` [PATCH v4 12/15] fs/configfs: Add a callback to determine attribute visibility
` [PATCH v4 13/15] x86/sev: Take advantage of configfs visibility support in TSM
` [PATCH v4 14/15] x86/sev: Extend the config-fs attestation support for an SVSM
` [PATCH v4 15/15] x86/sev: Allow non-VMPL0 execution when an SVSM is present
[v2] Support for Arm CCA VMs on Linux
2024-05-02 10:16 UTC (31+ messages)
` [PATCH v2 00/14] arm64: Support for running as a guest in Arm CCA
` [PATCH v2 14/14] virt: arm-cca-guest: TSM_REPORT support for realms
` [PATCH v2 00/43] arm64: Support for Arm CCA in KVM
` [PATCH v2 01/43] KVM: Prepare for handling only shared mappings in mmu_notifier events
` [PATCH v2 07/43] arm64: RME: Check for RME support at KVM init
` [PATCH v2 09/43] arm64: RME: ioctls to create and configure realms
` [PATCH v2 13/43] arm64: RME: RTT handling
` [PATCH v2 17/43] arm64: RME: Allow VMM to set RIPAS
` [PATCH v2 21/43] arm64: RME: Runtime faulting of memory
` [PATCH v2 42/43] arm64: kvm: Expose support for private memory
[PATCH 0/4] Add SEV-ES hypervisor support for GHCB protocol version 2
2024-05-01 7:10 UTC (5+ messages)
` [PATCH 1/4] KVM: SEV: Add support to handle AP reset MSR protocol
` [PATCH 2/4] KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests
` [PATCH 3/4] KVM: SEV: Add GHCB handling for termination requests
` [PATCH 4/4] KVM: SEV: Allow per-guest configuration of GHCB protocol version
[PATCH 0/3] sysfs: Group visibility fixups
2024-04-29 17:47 UTC (13+ messages)
` [PATCH 1/3] sysfs: Fix crash on empty group attributes array
[PATCH v14 00/22] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
2024-04-29 14:27 UTC (50+ messages)
` [PATCH v14 01/22] KVM: SEV: Select KVM_GENERIC_PRIVATE_MEM when CONFIG_KVM_AMD_SEV=y
` [PATCH v14 02/22] KVM: SEV: Add support to handle AP reset MSR protocol
` [PATCH v14 03/22] KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests
` [PATCH v14 04/22] KVM: SEV: Add initial SEV-SNP support
` [PATCH v14 05/22] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
` [PATCH v14 06/22] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
` [PATCH v14 07/22] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command
` [PATCH v14 08/22] KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
` [PATCH v14 09/22] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
` [PATCH v14 16/22] KVM: x86: Implement gmem hook for determining max NPT mapping level
` [PATCH v14 17/22] KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP
` [PATCH v14 18/22] KVM: SVM: Add module parameter to enable SEV-SNP
` [PATCH v14 19/22] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
` [PATCH v14 20/22] crypto: ccp: Add the SNP_VLEK_LOAD command
` [PATCH v14 21/22] crypto: ccp: Add the SNP_{PAUSE,RESUME}_ATTESTATION commands
` [PATCH v14 22/22] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
` [PATCH v14 23/22] [SQUASH] KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
` [PATCH v14 24/22] [SQUASH] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
` [PATCH v14 25/22] [SQUASH] KVM: SEV: Add support to handle "
` [PATCH v14 26/22] [SQUASH] KVM: SEV: Add support for GHCB-based termination requests
` [PATCH v14 27/22] [SQUASH] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
` [PATCH v14 28/22] [SQUASH] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST "
` [PATCH v14 29/22] [SQUASH] KVM: SEV: Support SEV-SNP AP Creation "
[RFC PATCH v2 0/6] Towards a shared TSM sysfs-ABI for Confidential Computing
2024-04-27 2:58 UTC (6+ messages)
` [RFC PATCH v2 5/6] PCI/TSM: Authenticate devices via platform TSM
[kvm-unit-tests PATCH 00/33] Support for Arm Confidential Compute Architecture
2024-04-26 13:51 UTC (14+ messages)
` [kvm-unit-tests PATCH 08/33] arm: realm: Make uart available before MMU is enabled
` [kvm-unit-tests PATCH 14/33] arm: selftest: realm: skip pabt test when running in a realm
[PATCH v3 0/2] Apply RMP table fixups for kexec
2024-04-26 0:43 UTC (3+ messages)
` [PATCH v3 1/2] x86/e820: Expose API to update e820 kexec and firmware tables externally
` [PATCH v3 2/2] x86/sev: Add callback to apply RMP table fixups for kexec
[PATCH v2 09/14] arm64: Enable memory encrypt for Realms
2024-04-25 18:16 UTC (6+ messages)
No SVSM Development Call on May 1st, 2024
2024-04-25 9:33 UTC
SVSM Development Call April 24th, 2024
2024-04-25 9:28 UTC (2+ messages)
` [svsm-devel] "
[PATCH v13 00/26] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
2024-04-24 21:40 UTC (3+ messages)
` [PATCH v13 09/26] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
[PATCH v4 43/71] x86/virt/tdx: Switch to new Intel CPU model defines
2024-04-24 18:15 UTC
[PATCH v3 00/14] Provide SEV-SNP support for running under an SVSM
2024-04-22 22:07 UTC (5+ messages)
` [PATCH v3 03/14] x86/sev: Check for the presence of an SVSM in the SNP Secrets page
page: next (older)
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).