linux-coco.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
 messages from 2024-02-21 17:20:00 to 2024-03-18 11:22:44 UTC [more...]

[RFC] Support for Arm CCA VMs on Linux
 2024-03-18 11:22 UTC  (12+ messages)
` [RFC PATCH 00/28] arm64: Support for Arm CCA in KVM
  ` [RFC PATCH 03/28] arm64: RME: Add wrappers for RMI calls
  ` [RFC PATCH 04/28] arm64: RME: Check for RME support at KVM init
  ` [RFC PATCH 06/28] arm64: RME: ioctls to create and configure realms
  ` [RFC PATCH 09/28] arm64: RME: RTT handling

[PATCHv8 00/17, CORRECTED] x86/tdx: Add kexec support
 2024-03-18  7:02 UTC  (32+ messages)
` [PATCHv8 01/17] x86/acpi: Extract ACPI MADT wakeup code into a separate file
` [PATCHv8 02/17] x86/apic: Mark acpi_mp_wake_* variables as __ro_after_init
` [PATCHv8 03/17] cpu/hotplug: Add support for declaring CPU offlining not supported
` [PATCHv8 04/17] cpu/hotplug, x86/acpi: Disable CPU offlining for ACPI MADT wakeup
` [PATCHv8 05/17] x86/kexec: Keep CR4.MCE set during kexec for TDX guest
` [PATCHv8 06/17] x86/mm: Make x86_platform.guest.enc_status_change_*() return errno
` [PATCHv8 07/17] x86/mm: Return correct level from lookup_address() if pte is none
` [PATCHv8 08/17] x86/tdx: Account shared memory
` [PATCHv8 09/17] x86/mm: Adding callbacks to prepare encrypted memory for kexec
` [PATCHv8 10/17] x86/tdx: Convert shared memory back to private on kexec
` [PATCHv8 11/17] x86/mm: Make e820_end_ram_pfn() cover E820_TYPE_ACPI ranges
` [PATCHv8 12/17] x86/acpi: Rename fields in acpi_madt_multiproc_wakeup structure
` [PATCHv8 13/17] x86/acpi: Do not attempt to bring up secondary CPUs in kexec case
` [PATCHv8 14/17] x86/smp: Add smp_ops.stop_this_cpu() callback
` [PATCHv8 15/17] x86/mm: Introduce kernel_ident_mapping_free()
` [PATCHv8 16/17] x86/acpi: Add support for CPU offlining for ACPI MADT wakeup method
` [PATCHv8 17/17] ACPI: tables: Print MULTIPROC_WAKEUP when MADT is parsed
` [PATCH v2 0/3] x86/snp: Add kexec support
  ` [PATCH v2 1/3] efi/x86: skip efi_arch_mem_reserve() in case of kexec
  ` [PATCH v2 2/3] x86/mm: Do not zap page table entries mapping unaccepted memory table during kdump
  ` [PATCH v2 3/3] x86/snp: Convert shared memory back to private on kexec

Unmapping KVM Guest Memory from Host Kernel
 2024-03-14 21:45 UTC  (10+ messages)

SVSM vTPM state
 2024-03-14 14:44 UTC 

[PATCH 0/5] Handle set_memory_XXcrypted() errors in Hyper-V
 2024-03-14 13:56 UTC  (16+ messages)
` [PATCH v2 1/5] Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails
` [PATCH v2 2/5] Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl
` [PATCH v2 3/5] hv_netvsc: Don't free decrypted memory
` [PATCH v2 4/5] uio_hv_generic: "
` [PATCH v2 5/5] Drivers: hv: vmbus: Don't free ring buffers that couldn't be re-encrypted

[PATCH v3] x86/coco: Require seeding RNG with RDRAND on CoCo systems
 2024-03-14 11:14 UTC  (13+ messages)
          ` [PATCH v4] "
                ` [PATCH v5] "

[PATCH RFC gmem v1 0/8] KVM: gmem hooks/changes needed for x86 (other archs?)
 2024-03-13 17:11 UTC  (9+ messages)
` [PATCH RFC gmem v1 4/8] KVM: x86: Add gmem hook for invalidating memory

[PATCH v4 0/9] x86/sev: KEXEC/KDUMP support for SEV-ES guests
 2024-03-12 16:13 UTC  (14+ messages)
` [PATCH v4 1/9] x86/kexec/64: Disable kexec when SEV-ES is active
` [PATCH v4 2/9] x86/sev: Save and print negotiated GHCB protocol version
` [PATCH v4 3/9] x86/sev: Set GHCB data structure version
` [PATCH v4 4/9] x86/sev: Setup code to park APs in the AP Jump Table
` [PATCH v4 5/9] x86/sev: Park APs on AP Jump Table with GHCB protocol version 2
` [PATCH v4 6/9] x86/sev: Use AP Jump Table blob to stop CPU
` [PATCH v4 7/9] x86/sev: Add MMIO handling support to boot/compressed/ code
` [PATCH v4 8/9] x86/sev: Handle CLFLUSH MMIO events
` [PATCH v4 9/9] x86/kexec/64: Support kexec under SEV-ES with AP Jump Table Blob

Unmapping KVM Guest Memory from Host Kernel
 2024-03-11  9:29 UTC  (3+ messages)

[PATCH v11 00/35] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
 2024-03-11  5:50 UTC  (3+ messages)
` [PATCH v11 28/35] KVM: SEV: Implement gmem hook for initializing private pages

[RFC RFT PATCH 0/4] Handle set_memory_XXcrypted() errors in hyperv
 2024-03-07 20:25 UTC  (18+ messages)
` [RFC RFT PATCH 1/4] hv: Leak pages if set_memory_encrypted() fails
` [RFC RFT PATCH 2/4] hv: Track decrypted status in vmbus_gpadl
` [RFC RFT PATCH 3/4] hv_nstvsc: Don't free decrypted memory
` [RFC RFT PATCH 4/4] uio_hv_generic: "

[RFC PATCH 0/5] Towards a shared TSM sysfs-ABI for Confidential Computing
 2024-03-07 19:51 UTC  (24+ messages)
` [RFC PATCH 2/5] coco/tsm: Establish a new coco/tsm subdirectory
` [RFC PATCH 3/5] coco/tsm: Introduce a shared class device for TSMs
` [RFC PATCH 4/5] sysfs: Introduce a mechanism to hide static attribute_groups
` [RFC PATCH 5/5] PCI/TSM: Authenticate devices via platform TSM

SVSM Devel Call March 6th, 2024
 2024-03-07  8:31 UTC  (2+ messages)
` [svsm-devel] "

Attestation evidence collection "standard package(s)" effort
 2024-03-06  9:50 UTC  (2+ messages)

[RFC V1 0/5] x86: CVMs: Align memory conversions to 2M granularity
 2024-03-05 17:19 UTC  (9+ messages)
` [RFC V1 1/5] swiotlb: Support allocating DMA memory from SWIOTLB

[RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI
 2024-03-05  1:19 UTC  (15+ messages)

[PATCH 00/12] PCI device authentication
 2024-03-04 19:19 UTC  (5+ messages)
` [PATCH 03/12] X.509: Move certificate length retrieval into new helper

[PATCH v4 0/3] x86/hyperv: Mark CoCo VM pages not present when changing encrypted state
 2024-03-01  9:26 UTC  (2+ messages)

Meeting Minutes and Governance Repository
 2024-02-29 13:53 UTC 

[PATCHv8 00/16] x86/tdx: Add kexec support
 2024-02-27 21:21 UTC  (18+ messages)
` [PATCHv8 01/16] x86/acpi: Extract ACPI MADT wakeup code into a separate file
` [PATCHv8 02/16] x86/apic: Mark acpi_mp_wake_* variables as __ro_after_init
` [PATCHv8 03/16] cpu/hotplug: Add support for declaring CPU offlining not supported
` [PATCHv8 04/16] cpu/hotplug, x86/acpi: Disable CPU offlining for ACPI MADT wakeup
` [PATCHv8 05/16] x86/kexec: Keep CR4.MCE set during kexec for TDX guest
` [PATCHv8 06/16] x86/mm: Make x86_platform.guest.enc_status_change_*() return errno
` [PATCHv8 07/16] x86/mm: Return correct level from lookup_address() if pte is none
` [PATCHv8 08/16] x86/tdx: Account shared memory
` [PATCHv8 09/16] x86/mm: Adding callbacks to prepare encrypted memory for kexec
` [PATCHv8 10/16] x86/tdx: Convert shared memory back to private on kexec
` [PATCHv8 11/16] x86/mm: Make e820_end_ram_pfn() cover E820_TYPE_ACPI ranges
` [PATCHv8 12/16] x86/acpi: Rename fields in acpi_madt_multiproc_wakeup structure
` [PATCHv8 13/16] x86/acpi: Do not attempt to bring up secondary CPUs in kexec case
` [PATCHv8 14/16] x86/smp: Add smp_ops.stop_this_cpu() callback
` [PATCHv8 15/16] x86/mm: Introduce kernel_ident_mapping_free()
` [PATCHv8 16/16] x86/acpi: Add support for CPU offlining for ACPI MADT wakeup method

SVSM Devel Call Feb. 28th, 2024
 2024-02-27 21:13 UTC 

[PATCH v3] virt: tdx-guest: Handle GetQuote request error code
 2024-02-27  2:24 UTC  (3+ messages)

[PATCHv7 00/16] x86/tdx: Add kexec support
 2024-02-26 13:58 UTC  (45+ messages)
` [PATCHv7 01/16] x86/acpi: Extract ACPI MADT wakeup code into a separate file
` [PATCHv7 02/16] x86/apic: Mark acpi_mp_wake_* variables as __ro_after_init
` [PATCHv7 05/16] x86/kexec: Keep CR4.MCE set during kexec for TDX guest
` [PATCHv7 06/16] x86/mm: Make x86_platform.guest.enc_status_change_*() return errno
` [PATCHv7 07/16] x86/mm: Return correct level from lookup_address() if pte is none
` [PATCHv7 08/16] x86/tdx: Account shared memory
` [PATCHv7 10/16] x86/tdx: Convert shared memory back to private on kexec
` [PATCHv7 11/16] x86/mm: Make e820_end_ram_pfn() cover E820_TYPE_ACPI ranges
` [PATCHv7 12/16] x86/acpi: Rename fields in acpi_madt_multiproc_wakeup structure
` [PATCHv7 13/16] x86/acpi: Do not attempt to bring up secondary CPUs in kexec case
` [PATCHv7 14/16] x86/smp: Add smp_ops.stop_this_cpu() callback
` [PATCHv7 16/16] x86/acpi: Add support for CPU offlining for ACPI MADT wakeup method
` [PATCH 0/2] x86/snp: Add kexec support
  ` [PATCH 2/2] x86/snp: Convert shared memory back to private on kexec

[PATCH] x86/coco: Require seeding RNG with RDRAND on CoCo systems
 2024-02-23 19:33 UTC  (2+ messages)

[PATCH 0/3] sysfs: Group visibility fixups
 2024-02-23  6:33 UTC  (8+ messages)
` [PATCH 1/3] sysfs: Fix crash on empty group attributes array
` [PATCH 2/3] sysfs: Document new "group visible" helpers
` [PATCH 3/3] sysfs: Introduce DEFINE_SIMPLE_SYSFS_GROUP_VISIBLE()

[PATCH v2] virt: tdx-guest: Handle GetQuote request error code
 2024-02-23  6:18 UTC  (4+ messages)

[RFC PATCH v4 00/10] KVM: guest_memfd(), X86: Common base for SNP and TDX (was KVM: guest memory: Misc enhancement)
 2024-02-22  2:05 UTC  (5+ messages)
` [RFC PATCH v4 04/10] KVM: x86: Introduce PFERR_GUEST_ENC_MASK to indicate fault is private


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).