messages from 2023-08-03 08:44:16 to 2023-09-08 04:50:16 UTC [more...]
[PATCH v1] virt: tdx-guest: Add Quote generation support using TSM_REPORTS
2023-09-08 4:50 UTC (6+ messages)
[PATCH] x86/tdx: Mark TSC reliable
2023-09-07 17:25 UTC (16+ messages)
[PATCH] iommu/amd: remove amd_iommu_snp_enable
2023-09-07 16:10 UTC (5+ messages)
[PATCH 0/3] Do not map unaccepted memory
2023-09-07 15:51 UTC (15+ messages)
` [PATCH 1/3] proc/vmcore: "
` [PATCH 2/3] proc/kcore: "
` [PATCH 3/3] /dev/mem: "
[PATCH RFC v9 00/51] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
2023-09-07 10:31 UTC (9+ messages)
` [PATCH RFC v9 07/51] x86/sev: Add the host SEV-SNP initialization support
` [PATCH RFC v9 19/51] x86/sev: Introduce snp leaked pages list
` [PATCH RFC v9 42/51] KVM: SVM: Support SEV-SNP AP Creation NAE event
` [PATCH RFC v9 47/51] iommu/amd: Add IOMMU_SNP_SHUTDOWN support
[PATCH v3 0/5] configfs-tsm: Attestation Report ABI
2023-09-07 8:59 UTC (26+ messages)
` [PATCH v3 1/5] virt: coco: Add a coco/Makefile and coco/Kconfig
` [PATCH v3 2/5] configfs-tsm: Introduce a shared ABI for attestation reports
` [PATCH v3 3/5] virt: sevguest: Prep for kernel internal {get, get_ext}_report()
` [PATCH v3 4/5] mm/slab: Add __free() support for kvfree
` [PATCH v3 5/5] virt: sevguest: Add TSM_REPORTS support for SNP_{GET, GET_EXT}_REPORT
[PATCH v4] docs: security: Confidential computing intro and threat model for x86 virtualization
2023-09-06 13:42 UTC (5+ messages)
[PATCH 0/8] KVM: gmem: Adding hooks for SEV and TDX
2023-08-31 16:50 UTC (25+ messages)
` [PATCH 1/8] KVM: gmem: Make kvm_gmem_bind return EBADF on wrong fd
` [PATCH 2/8] KVM: gmem: removed duplicated kvm_gmem_init()
` [PATCH 3/8] KVM: gmem: Fix kvm_gmem_issue_arch_invalidate()
` [PATCH 4/8] KVM: gmem: protect kvm_mmu_invalidate_end()
` [PATCH 5/8] KVM: gmem, x86: Add gmem hook for initializing private memory
` [PATCH 6/8] KVM: gmem, x86: Add gmem hook for invalidating "
` [PATCH 7/8] KVM: gmem: Avoid race with kvm_gmem_release and mmu notifier
` [PATCH 8/8] RFC: KVM: gmem: Guarantee the order of destruction
[RFC PATCH v4 00/10] KVM: guest_memfd(), X86: Common base for SNP and TDX (was KVM: guest memory: Misc enhancement)
2023-08-29 13:27 UTC (7+ messages)
` [RFC PATCH v4 07/10] KVM: x86: Add gmem hook for initializing private memory
[PATCH v2 0/5] tsm: Attestation Report ABI
2023-08-28 10:46 UTC (45+ messages)
` [PATCH v2 1/5] virt: coco: Add a coco/Makefile and coco/Kconfig
` [PATCH v2 2/5] tsm: Introduce a shared ABI for attestation reports
` [PATCH v2 3/5] virt: sevguest: Prep for kernel internal {get, get_ext}_report()
` [PATCH v2 4/5] mm/slab: Add __free() support for kvfree
` [PATCH v2 5/5] virt: sevguest: Add TSM_REPORTS support for SNP_{GET, GET_EXT}_REPORT
[CfP] Confidential Computing Microconference @ LPC 2023
2023-08-25 13:16 UTC (2+ messages)
[PATCHv2] x86/tdx: Mark TSC reliable
2023-08-23 18:50 UTC (5+ messages)
[ANNOUNCE] SVSM development mailing list
2023-08-23 9:22 UTC (2+ messages)
Mail delivery failed: returning message to sender
2023-08-16 11:05 UTC
Mail delivery failed: returning message to sender
2023-08-14 9:27 UTC
[PATCH 0/4] keys: Introduce a keys frontend for attestation reports
2023-08-10 14:50 UTC (47+ messages)
` [PATCH 1/4] keys: Introduce tsm keys
[Question] int3 instruction generates a #UD in SEV VM
2023-08-04 2:33 UTC (13+ messages)
[PATCH RFC v8 00/56] Add AMD Secure Nested Paging (SEV-SNP) Hypervisor Support
2023-08-04 1:01 UTC (3+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).