messages from 2024-01-10 13:44:52 to 2024-01-26 04:45:04 UTC [more...]
[PATCH v2 00/25] Add AMD Secure Nested Paging (SEV-SNP) Initialization Support
2024-01-26 4:11 UTC (14+ messages)
` [PATCH v2 01/25] x86/cpufeatures: Add SEV-SNP CPU feature
` [PATCH v2 09/25] x86/fault: Dump RMP table information when RMP page faults occur
` [PATCH v2 10/25] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
` [PATCH v2 11/25] x86/sev: Adjust directmap to avoid inadvertant RMP faults
` [PATCH v2 12/25] crypto: ccp: Define the SEV-SNP commands
` [PATCH v2 13/25] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH v2 14/25] crypto: ccp: Provide API to issue SEV and SNP commands
` [PATCH v2 15/25] x86/sev: Introduce snp leaked pages list
` [PATCH v2 16/25] crypto: ccp: Handle the legacy TMR allocation when SNP is enabled
` [PATCH v2 17/25] crypto: ccp: Handle non-volatile INIT_EX data "
` [PATCH v2 18/25] crypto: ccp: Handle legacy SEV commands "
` [PATCH v2 19/25] iommu/amd: Clean up RMP entries for IOMMU pages during SNP shutdown
` [PATCH v2 20/25] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
[PATCH v1 00/26] Add AMD Secure Nested Paging (SEV-SNP) Initialization Support
2024-01-26 3:44 UTC (67+ messages)
` [PATCH v1 07/26] x86/fault: Add helper for dumping RMP entries
` [PATCH v1 10/26] x86/sev: Add helper functions for RMPUPDATE and PSMASH instruction
` [PATCH v1 11/26] x86/sev: Invalidate pages from the direct map when adding them to the RMP table
` [PATCH v1 12/26] crypto: ccp: Define the SEV-SNP commands
` [PATCH v1 13/26] crypto: ccp: Add support to initialize the AMD-SP for SEV-SNP
` [PATCH v1 14/26] crypto: ccp: Provide API to issue SEV and SNP commands
` [PATCH v1 17/26] crypto: ccp: Handle non-volatile INIT_EX data when SNP is enabled
` [PATCH v1 18/26] crypto: ccp: Handle legacy SEV commands "
` [PATCH v1 20/26] crypto: ccp: Add debug support for decrypting pages
` [PATCH v1 21/26] crypto: ccp: Add panic notifier for SEV/SNP firmware shutdown on kdump
` [PATCH v1 22/26] KVM: SEV: Make AVIC backing, VMSA and VMCB memory allocation SNP safe
` [PATCH v1 24/26] crypto: ccp: Add the SNP_PLATFORM_STATUS command
` [PATCH v1 25/26] crypto: ccp: Add the SNP_COMMIT command
` [PATCH v1 26/26] crypto: ccp: Add the SNP_SET_CONFIG command
[RFC PATCH] virt: tdx-guest: Remove quote generation via ioctl
2024-01-24 23:44 UTC (11+ messages)
[PATCHv6 00/16] x86/tdx: Add kexec support
2024-01-24 12:55 UTC (17+ messages)
` [PATCHv6 01/16] x86/acpi: Extract ACPI MADT wakeup code into a separate file
` [PATCHv6 02/16] x86/apic: Mark acpi_mp_wake_* variables as __ro_after_init
` [PATCHv6 03/16] cpu/hotplug: Add support for declaring CPU offlining not supported
` [PATCHv6 04/16] cpu/hotplug, x86/acpi: Disable CPU offlining for ACPI MADT wakeup
` [PATCHv6 05/16] x86/kexec: Keep CR4.MCE set during kexec for TDX guest
` [PATCHv6 06/16] x86/mm: Make x86_platform.guest.enc_status_change_*() return errno
` [PATCHv6 07/16] x86/mm: Return correct level from lookup_address() if pte is none
` [PATCHv6 08/16] x86/tdx: Account shared memory
` [PATCHv6 09/16] x86/mm: Adding callbacks to prepare encrypted memory for kexec
` [PATCHv6 10/16] x86/tdx: Convert shared memory back to private on kexec
` [PATCHv6 11/16] x86/mm: Make e820_end_ram_pfn() cover E820_TYPE_ACPI ranges
` [PATCHv6 12/16] x86/acpi: Rename fields in acpi_madt_multiproc_wakeup structure
` [PATCHv6 13/16] x86/acpi: Do not attempt to bring up secondary CPUs in kexec case
` [PATCHv6 14/16] x86/smp: Add smp_ops.stop_this_cpu() callback
` [PATCHv6 15/16] x86/mm: Introduce kernel_ident_mapping_free()
` [PATCHv6 16/16] x86/acpi: Add support for CPU offlining for ACPI MADT wakeup method
[PATCH] virt: tdx-guest: Deprecate legacy IOCTL-based interface for quote generation
2024-01-24 9:38 UTC
[RFC PATCH v1 0/4] tsm: Runtime measurement registers ABI
2024-01-23 20:59 UTC (29+ messages)
` [RFC PATCH v1 1/4] tsm: Runtime measurement register support
` [RFC PATCH v1 2/4] tsm: Add RTMRs to the configfs-tsm hierarchy
` [RFC PATCH v1 3/4] tsm: Allow for mapping RTMRs to TCG TPM PCRs
` [RFC PATCH v1 4/4] tsm: Allow for extending and reading configured RTMRs
Attestation evidence collection "standard package(s)" effort
2024-01-23 18:44 UTC
No SVSM Call this week
2024-01-23 13:54 UTC
[RFC PATCH] x86/sev: x86/sev: enforce PC-relative addressing in clang
2024-01-21 18:20 UTC (25+ messages)
` [RFC PATCH v2] x86/sev: enforce RIP-relative accesses in early SEV/SME code
[RFC] Support for Arm CCA VMs on Linux
2024-01-19 1:26 UTC (7+ messages)
[RFC PATCH] x86/virt/tdx: Disable KEXEC in the presence of TDX
2024-01-19 0:55 UTC (5+ messages)
SVSM Development Call Jan 17th, 2024
2024-01-17 17:46 UTC (2+ messages)
[PATCH v4 0/3] x86/hyperv: Mark CoCo VM pages not present when changing encrypted state
2024-01-17 13:37 UTC (9+ messages)
` [PATCH v4 1/3] x86/hyperv: Use slow_virt_to_phys() in page transition hypervisor callback
` [PATCH v4 2/3] x86/mm: Regularize set_memory_p() parameters and make non-static
` [PATCH v4 3/3] x86/hyperv: Make encrypted/decrypted changes safe for load_unaligned_zeropad()
[PATCHv2] x86/mm: Fix memory encryption features advertisement
2024-01-16 21:16 UTC (8+ messages)
[PATCHv5 00/16] x86/tdx: Add kexec support
2024-01-16 10:53 UTC (10+ messages)
` [PATCHv5 10/16] x86/tdx: Convert shared memory back to private on kexec
` [PATCHv5 16/16] x86/acpi: Add support for CPU offlining for ACPI MADT wakeup method
[PATCH v11 00/35] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
2024-01-16 4:14 UTC (4+ messages)
` [PATCH v11 18/35] KVM: SEV: Add KVM_SEV_SNP_LAUNCH_UPDATE command
[PATCH v3 0/3] x86/hyperv: Mark CoCo VM pages not present when changing encrypted state
2024-01-15 10:00 UTC (12+ messages)
` [PATCH v3 1/3] x86/hyperv: Use slow_virt_to_phys() in page transition hypervisor callback
` [PATCH v3 2/3] x86/mm: Regularize set_memory_p() parameters and make non-static
` [PATCH v3 3/3] x86/hyperv: Make encrypted/decrypted changes safe for load_unaligned_zeropad()
[PATCH v2] virt: tdx-guest: Handle GetQuote request error code
2024-01-15 5:14 UTC (4+ messages)
[RFC V1 0/5] x86: CVMs: Align memory conversions to 2M granularity
2024-01-12 5:52 UTC (6+ messages)
` [RFC V1 1/5] swiotlb: Support allocating DMA memory from SWIOTLB
` [RFC V1 2/5] swiotlb: Allow setting up default alignment of SWIOTLB region
` [RFC V1 3/5] x86: CVMs: Enable dynamic swiotlb by default for CVMs
` [RFC V1 4/5] x86: CVMs: Allow allocating all DMA memory from SWIOTLB
` [RFC V1 5/5] x86: CVMs: Ensure that memory conversions happen at 2M alignment
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).