linux-coco.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
 messages from 2023-01-10 22:15:08 to 2023-01-27 11:28:47 UTC [more...]

[RFC] Support for Arm CCA VMs on Linux
 2023-01-27 11:27 UTC  (16+ messages)
` [RFC PATCH 00/14] arm64: Support for running as a guest in Arm CCA
  ` [RFC PATCH 01/14] arm64: remove redundant 'extern'
  ` [RFC PATCH 02/14] arm64: rsi: Add RSI definitions
  ` [RFC PATCH 03/14] arm64: Detect if in a realm and set RIPAS RAM
  ` [RFC PATCH 04/14] arm64: realm: Query IPA size from the RMM
  ` [RFC PATCH 05/14] arm64: Mark all I/O as non-secure shared
  ` [RFC PATCH 06/14] fixmap: Allow architecture overriding set_fixmap_io
  ` [RFC PATCH 07/14] arm64: Override set_fixmap_io
  ` [RFC PATCH 08/14] arm64: Make the PHYS_MASK_SHIFT dynamic
  ` [RFC PATCH 09/14] arm64: Enforce bounce buffers for realm DMA
  ` [RFC PATCH 10/14] arm64: Enable memory encrypt for Realms
  ` [RFC PATCH 11/14] arm64: Force device mappings to be non-secure shared
  ` [RFC PATCH 12/14] efi: arm64: Map Device with Prot Shared
  ` [RFC PATCH 13/14] arm64: realm: Support nonsecure ITS emulation shared
  ` [RFC PATCH 14/14] HACK: Accept prototype RSI version

Linux guest kernel threat model for Confidential Computing
 2023-01-27 11:23 UTC  (53+ messages)

SVSM Attestation and vTPM specification additions - v0.60
 2023-01-27  8:35 UTC  (36+ messages)
    ` [EXTERNAL] "

[PATCHv2, RESEND 0/7] x86/tdx: Changes for TDX guest initialization
 2023-01-26 22:11 UTC  (8+ messages)
` [PATCHv2, RESEND 1/7] x86/tdx: Fix typo in comment in __tdx_hypercall()
` [PATCHv2, RESEND 2/7] x86/tdx: Add more registers to struct tdx_hypercall_args
` [PATCHv2, RESEND 3/7] x86/tdx: Refactor __tdx_hypercall() to allow pass down more arguments
` [PATCHv2, RESEND 4/7] x86/tdx: Expand __tdx_hypercall() to handle "
` [PATCHv2, RESEND 5/7] x86/tdx: Use ReportFatalError to report missing SEPT_VE_DISABLE
` [PATCHv2, RESEND 6/7] x86/tdx: Relax SEPT_VE_DISABLE check for debug TD
` [PATCHv2, RESEND 7/7] x86/tdx: Disable NOTIFY_ENABLES

[PATCH RFC v7 00/64] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2023-01-26 21:25 UTC  (108+ messages)
` [PATCH RFC v7 02/64] KVM: x86: Add KVM_CAP_UNMAPPED_PRIVATE_MEMORY
` [PATCH RFC v7 03/64] KVM: SVM: Advertise private memory support to KVM
` [PATCH RFC v7 04/64] KVM: x86: Add 'fault_is_private' x86 op
` [PATCH RFC v7 06/64] KVM: x86: Add platform hooks for private memory invalidations
` [PATCH RFC v7 07/64] KVM: SEV: Handle KVM_HC_MAP_GPA_RANGE hypercall
` [PATCH RFC v7 08/64] KVM: Move kvm_for_each_memslot_in_hva_range() to be used in SVM
` [PATCH RFC v7 10/64] KVM: SEV: Populate private memory fd during LAUNCH_UPDATE_DATA
` [PATCH RFC v7 11/64] KVM: SEV: Support private pages in LAUNCH_UPDATE_DATA
` [PATCH RFC v7 14/64] x86/sev: Add the host SEV-SNP initialization support
` [PATCH RFC v7 20/64] x86/fault: Add support to handle the RMP fault for user address
` [PATCH RFC v7 23/64] x86/fault: Add support to dump RMP entry on fault
` [PATCH RFC v7 24/64] crypto:ccp: Define the SEV-SNP commands
` [PATCH RFC v7 25/64] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH RFC v7 29/64] crypto: ccp: Handle the legacy SEV command when SNP is enabled
` [PATCH RFC v7 31/64] crypto: ccp: Add the SNP_{SET,GET}_EXT_CONFIG command
` [PATCH RFC v7 37/64] KVM: SVM: Add KVM_SNP_INIT command
` [PATCH RFC v7 39/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_UPDATE command
` [PATCH RFC v7 40/64] KVM: SVM: Add KVM_SEV_SNP_LAUNCH_FINISH command
` [PATCH RFC v7 44/64] KVM: SVM: Remove the long-lived GHCB host map
` [PATCH RFC v7 47/64] KVM: SVM: Add support to handle MSR based Page State Change VMGEXIT
` [PATCH RFC v7 49/64] KVM: SVM: Introduce ops for the post gfn map and unmap
` [PATCH RFC v7 52/64] KVM: SVM: Provide support for SNP_GUEST_REQUEST NAE event
` [PATCH RFC v7 62/64] x86/sev: Add KVM commands for instance certs

SVSM initiated early attestation / guest secrets injection
 2023-01-20 17:10 UTC  (24+ messages)

[PATCHv8 00/14] mm, x86/cc: Implement support for unaccepted memory
 2023-01-16 13:04 UTC  (8+ messages)
` [PATCHv8 02/14] mm: Add "

[PATCHv2 0/7] x86/tdx: Changes for TDX guest initialization
 2023-01-12 10:14 UTC  (8+ messages)
` [PATCHv2 1/7] x86/tdx: Fix typo in comment in __tdx_hypercall()
` [PATCHv2 2/7] x86/tdx: Add more registers to struct tdx_hypercall_args
` [PATCHv2 3/7] x86/tdx: Refactor __tdx_hypercall() to allow pass down more arguments
` [PATCHv2 4/7] x86/tdx: Expand __tdx_hypercall() to handle "
` [PATCHv2 5/7] x86/tdx: Use ReportFatalError to report missing SEPT_VE_DISABLE
` [PATCHv2 6/7] x86/tdx: Relax SEPT_VE_DISABLE check for debug TD
` [PATCHv2 7/7] x86/tdx: Disable NOTIFY_ENABLES


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).