linux-coco.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
 messages from 2024-04-12 08:44:10 to 2024-04-21 18:06:16 UTC [more...]

[PATCH v14 00/22] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2024-04-21 18:01 UTC  (9+ messages)
` [PATCH v14 09/22] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
` [PATCH v14 10/22] KVM: SEV: Add support to handle "
` [PATCH v14 11/22] KVM: SEV: Add support to handle RMP nested page faults
` [PATCH v14 12/22] KVM: SEV: Support SEV-SNP AP Creation NAE event
` [PATCH v14 13/22] KVM: SEV: Add support for GHCB-based termination requests
` [PATCH v14 14/22] KVM: SEV: Implement gmem hook for initializing private pages
` [PATCH v14 15/22] KVM: SEV: Implement gmem hook for invalidating "
` [PATCH v14 16/22] KVM: x86: Implement gmem hook for determining max NPT mapping level

[PATCH v13 00/26] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2024-04-21 18:00 UTC  (40+ messages)
` [PATCH v13 01/26] [TEMP] x86/kvm/Kconfig: Have KVM_AMD_SEV select ARCH_HAS_CC_PLATFORM
` [PATCH v13 02/26] [TEMP] x86/cc: Add cc_platform_set/_clear() helpers
` [PATCH v13 03/26] [TEMP] x86/CPU/AMD: Track SNP host status with cc_platform_*()
` [PATCH v13 04/26] KVM: guest_memfd: Fix PTR_ERR() handling in __kvm_gmem_get_pfn()
` [PATCH v13 05/26] KVM: SEV: Select KVM_GENERIC_PRIVATE_MEM when CONFIG_KVM_AMD_SEV=y
` [PATCH v13 06/26] KVM: SEV: Add support to handle AP reset MSR protocol
` [PATCH v13 07/26] KVM: SEV: Add GHCB handling for Hypervisor Feature Support requests
` [PATCH v13 08/26] KVM: SEV: Add initial SEV-SNP support
` [PATCH v13 09/26] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_START command
` [PATCH v13 10/26] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
` [PATCH v13 11/26] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_FINISH command
` [PATCH v13 12/26] KVM: SEV: Add support to handle GHCB GPA register VMGEXIT
` [PATCH v13 13/26] KVM: SEV: Add support to handle MSR based Page State Change VMGEXIT
` [PATCH v13 14/26] KVM: SEV: Add support to handle "
` [PATCH v13 15/26] KVM: SEV: Add support to handle RMP nested page faults
` [PATCH v13 16/26] KVM: SEV: Support SEV-SNP AP Creation NAE event
` [PATCH v13 17/26] KVM: SEV: Add support for GHCB-based termination requests
` [PATCH v13 18/26] KVM: SEV: Implement gmem hook for initializing private pages
` [PATCH v13 19/26] KVM: SEV: Implement gmem hook for invalidating "
` [PATCH v13 20/26] KVM: x86: Implement gmem hook for determining max NPT mapping level
` [PATCH v13 21/26] KVM: SEV: Avoid WBINVD for HVA-based MMU notifications for SNP
` [PATCH v13 22/26] KVM: SVM: Add module parameter to enable SEV-SNP
` [PATCH v13 23/26] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
` [PATCH v13 24/26] crypto: ccp: Add the SNP_VLEK_LOAD command
` [PATCH v13 25/26] crypto: ccp: Add the SNP_{PAUSE,RESUME}_ATTESTATION commands
` [PATCH v13 26/26] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event

[PATCH v3 00/14] Provide SEV-SNP support for running under an SVSM
 2024-04-21  7:12 UTC  (54+ messages)
` [PATCH v3 01/14] x86/sev: Rename snp_init() in the boot/compressed/sev.c file
` [PATCH v3 02/14] x86/sev: Make the VMPL0 checking function more generic
` [PATCH v3 03/14] x86/sev: Check for the presence of an SVSM in the SNP Secrets page
` [PATCH v3 04/14] x86/sev: Use kernel provided SVSM Calling Areas
` [PATCH v3 06/14] x86/sev: Use the SVSM to create a vCPU when not in VMPL0
` [PATCH v3 07/14] x86/sev: Provide SVSM discovery support
` [PATCH v3 09/14] virt: sev-guest: Choose the VMPCK key based on executing VMPL
` [PATCH v3 10/14] configfs-tsm: Allow the privlevel_floor attribute to be updated
` [PATCH v3 11/14] x86/sev: Extend the config-fs attestation support for an SVSM
` [PATCH v3 12/14] fs/configfs: Add a callback to determine attribute visibility
` [PATCH v3 13/14] x86/sev: Hide SVSM attestation entries if not running under an SVSM

[RFC PATCH v2 0/6] Towards a shared TSM sysfs-ABI for Confidential Computing
 2024-04-19 22:07 UTC  (8+ messages)
` [RFC PATCH v2 1/6] configfs-tsm: Namespace TSM report symbols
` [RFC PATCH v2 2/6] coco/guest: Move shared guest CC infrastructure to drivers/virt/coco/guest/
` [RFC PATCH v2 3/6] x86/tdx: Introduce a "tdx" subsystem and "tsm" device
` [RFC PATCH v2 4/6] coco/tsm: Introduce a class device for TEE Security Managers
` [RFC PATCH v2 5/6] PCI/TSM: Authenticate devices via platform TSM
` [RFC PATCH v2 6/6] tdx_tsm: TEE Security Manager driver for TDX

[PATCHv10 00/18] x86/tdx: Add kexec support
 2024-04-19 13:31 UTC  (7+ messages)
` [PATCHv10 01/18] x86/acpi: Extract ACPI MADT wakeup code into a separate file
` [PATCHv10 03/18] cpu/hotplug: Add support for declaring CPU offlining not supported

[v2] Support for Arm CCA VMs on Linux
 2024-04-19 13:17 UTC  (60+ messages)
` [PATCH v2 00/43] arm64: Support for Arm CCA in KVM
  ` [PATCH v2 04/43] arm64: RME: Handle Granule Protection Faults (GPFs)
  ` [PATCH v2 05/43] arm64: RME: Add SMC definitions for calling the RMM
  ` [PATCH v2 06/43] arm64: RME: Add wrappers for RMI calls
  ` [PATCH v2 07/43] arm64: RME: Check for RME support at KVM init
  ` [PATCH v2 09/43] arm64: RME: ioctls to create and configure realms
  ` [PATCH v2 11/43] arm64: kvm: Allow passing machine type in KVM creation
  ` [PATCH v2 12/43] arm64: RME: Keep a spare page delegated to the RMM
  ` [PATCH v2 13/43] arm64: RME: RTT handling
  ` [PATCH v2 14/43] arm64: RME: Allocate/free RECs to match vCPUs
  ` [PATCH v2 16/43] KVM: arm64: Support timers in realm RECs
  ` [PATCH v2 17/43] arm64: RME: Allow VMM to set RIPAS
  ` [PATCH v2 18/43] arm64: RME: Handle realm enter/exit
  ` [PATCH v2 20/43] arm64: RME: Allow populating initial contents
  ` [PATCH v2 22/43] KVM: arm64: Handle realm VCPU load
  ` [PATCH v2 23/43] KVM: arm64: Validate register access for a Realm VM
  ` [PATCH v2 24/43] KVM: arm64: Handle Realm PSCI requests
  ` [PATCH v2 25/43] KVM: arm64: WARN on injected undef exceptions
  ` [PATCH v2 26/43] arm64: Don't expose stolen time for realm guests
  ` [PATCH v2 27/43] arm64: rme: allow userspace to inject aborts
  ` [PATCH v2 28/43] arm64: rme: support RSI_HOST_CALL
  ` [PATCH v2 29/43] arm64: rme: Allow checking SVE on VM instance
  ` [PATCH v2 30/43] arm64: RME: Always use 4k pages for realms
  ` [PATCH v2 31/43] arm64: rme: Prevent Device mappings for Realms
  ` [PATCH v2 32/43] arm_pmu: Provide a mechanism for disabling the physical IRQ
  ` [PATCH v2 33/43] arm64: rme: Enable PMU support with a realm guest
  ` [PATCH v2 34/43] kvm: rme: Hide KVM_CAP_READONLY_MEM for realm guests
  ` [PATCH v2 35/43] arm64: RME: Propagate number of breakpoints and watchpoints to userspace
  ` [PATCH v2 36/43] arm64: RME: Set breakpoint parameters through SET_ONE_REG
  ` [PATCH v2 37/43] arm64: RME: Initialize PMCR.N with number counter supported by RMM
  ` [PATCH v2 38/43] arm64: RME: Propagate max SVE vector length from RMM
  ` [PATCH v2 39/43] arm64: RME: Configure max SVE vector length for a Realm
  ` [PATCH v2 40/43] arm64: RME: Provide register list for unfinalized RME RECs
  ` [PATCH v2 41/43] arm64: RME: Provide accurate register list
  ` [PATCH v2 42/43] arm64: kvm: Expose support for private memory
  ` [PATCH v2 43/43] KVM: arm64: Allow activating realms

[PATCH v12 00/29] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2024-04-18 19:57 UTC  (10+ messages)
` [PATCH v12 18/29] KVM: SEV: Use a VMSA physical address variable for populating VMCB
` [PATCH v12 22/29] KVM: SEV: Implement gmem hook for invalidating private pages

[RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
 2024-04-17 20:23 UTC  (15+ messages)

[kvm-unit-tests PATCH 00/33] Support for Arm Confidential Compute Architecture
 2024-04-16 14:28 UTC  (37+ messages)
` [kvm-unit-tests PATCH 01/33] arm: Add necessary header files in asm/pgtable.h
` [kvm-unit-tests PATCH 02/33] arm: Detect FDT overlap with uninitialised data
` [kvm-unit-tests PATCH 03/33] arm64: Expand SMCCC arguments and return values
` [kvm-unit-tests PATCH 04/33] arm: Make physical address mask dynamic
` [kvm-unit-tests PATCH 05/33] arm64: Introduce NS_SHARED PTE attribute
` [kvm-unit-tests PATCH 06/33] arm: Move io_init after vm initialization
` [kvm-unit-tests PATCH 07/33] arm: realm: Add RSI interface header
` [kvm-unit-tests PATCH 08/33] arm: realm: Make uart available before MMU is enabled
` [kvm-unit-tests PATCH 09/33] arm: realm: Realm initialisation
` [kvm-unit-tests PATCH 10/33] arm: realm: Add support for changing the state of memory
` [kvm-unit-tests PATCH 11/33] arm: realm: Set RIPAS state for RAM
` [kvm-unit-tests PATCH 12/33] arm: realm: Early memory setup
` [kvm-unit-tests PATCH 13/33] arm: realm: Add RSI version test
` [kvm-unit-tests PATCH 14/33] arm: selftest: realm: skip pabt test when running in a realm
` [kvm-unit-tests PATCH 15/33] arm: realm: add hvc and RSI_HOST_CALL tests
` [kvm-unit-tests PATCH 16/33] arm64: add ESR_ELx EC.SVE
` [kvm-unit-tests PATCH 17/33] arm64: enable SVE at startup
` [kvm-unit-tests PATCH 18/33] arm: realm: Add test for FPU/SIMD context save/restore
` [kvm-unit-tests PATCH 19/33] arm64: selftest: add realm SVE VL test
` [kvm-unit-tests PATCH 20/33] arm: realm: Add tests for in realm SEA
` [kvm-unit-tests PATCH 21/33] lib/alloc_page: Add shared page allocation support
` [kvm-unit-tests PATCH 22/33] arm: gic-v3-its: Use shared pages wherever needed
` [kvm-unit-tests PATCH 23/33] arm: realm: Enable memory encryption
` [kvm-unit-tests PATCH 24/33] qcbor: Add QCBOR as a submodule
` [kvm-unit-tests PATCH 25/33] arm: Add build steps for QCBOR library
` [kvm-unit-tests PATCH 26/33] arm: Add a library to verify tokens using the "
` [kvm-unit-tests PATCH 27/33] arm: realm: add RSI interface for attestation measurements
` [kvm-unit-tests PATCH 28/33] arm: realm: Add helpers to decode RSI return codes
` [kvm-unit-tests PATCH 29/33] arm: realm: Add Realm attestation tests
` [kvm-unit-tests PATCH 30/33] "
` [kvm-unit-tests PATCH 31/33] arm: realm: Add a test for shared memory
` [kvm-unit-tests PATCH 32/33] arm: Add memtest support
` [kvm-unit-tests PATCH 33/33] NOT-FOR-MERGING: add run-realm-tests

[PATCH v4 0/4] x86/snp: Add kexec support
 2024-04-15 23:23 UTC  (5+ messages)
` [PATCH v5 0/3] "
  ` [PATCH v5 1/3] efi/x86: skip efi_arch_mem_reserve() in case of kexec
  ` [PATCH v5 2/3] x86/boot/compressed: Skip Video Memory access in Decompressor for SEV-ES/SNP
  ` [PATCH v5 3/3] x86/snp: Convert shared memory back to private on kexec

[RFC PATCH] OvmfPkg/SecurityPkg: Add build option for coexistance of vTPM and RTMR
 2024-04-15 14:42 UTC  (11+ messages)
              ` [edk2-devel] "

[PATCH gmem 0/6] gmem fix-ups and interfaces for populating gmem pages
 2024-04-15 13:36 UTC  (7+ messages)
` [PATCH gmem 4/6] mm: Introduce AS_INACCESSIBLE for encrypted/confidential memory
` [PATCH gmem 5/6] KVM: guest_memfd: Use AS_INACCESSIBLE when creating guest_memfd inode
` [PATCH gmem 6/6] KVM: guest_memfd: Add interface for populating gmem pages with user data

[PATCH v2 09/14] arm64: Enable memory encrypt for Realms
 2024-04-15  3:13 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).