messages from 2024-06-10 13:44:20 to 2024-06-30 20:16:59 UTC [more...]
[PATCH v2 00/18] PCI device authentication
2024-06-30 19:42 UTC (8+ messages)
` [PATCH v2 01/18] X.509: Make certificate parser public
` [PATCH v2 02/18] X.509: Parse Subject Alternative Name in certificates
` [PATCH v2 03/18] X.509: Move certificate length retrieval into new helper
` [PATCH v2 04/18] certs: Create blacklist keyring earlier
` [PATCH v2 05/18] crypto: akcipher - Support more than one signature encoding
` [PATCH v2 06/18] crypto: ecdsa - Support P1363 "
` [PATCH v2 07/18] spdm: Introduce library to authenticate devices
[PATCH] x86/tdx: Fix crash on kexec
2024-06-29 19:41 UTC (5+ messages)
[PATCH] x86/mm: fix lookup_address() to handle physical memory holes in direct mapping
2024-06-29 16:50 UTC (9+ messages)
[PATCH v2 0/3] SEV-SNP: Add KVM support for attestation
2024-06-29 0:48 UTC (5+ messages)
` [PATCH v2 1/3] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
` [PATCH v2 2/3] x86/sev: Move sev_guest.h into common SEV header
` [PATCH v2 3/3] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
[PATCH v1 0/5] SEV-SNP: Add KVM support for attestation and KVM_EXIT_COCO
2024-06-29 0:36 UTC (32+ messages)
` [PATCH v1 1/5] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event
` [PATCH v1-revised "
` [PATCH v1 2/5] x86/sev: Move sev_guest.h into common SEV header
` [PATCH v1 3/5] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
` [PATCH v1 4/5] KVM: Introduce KVM_EXIT_COCO exit type
` [PATCH v1 5/5] KVM: SEV: Add certificate support for SNP_EXTENDED_GUEST_REQUEST events
[PATCHv12 00/19] x86/tdx: Add kexec support
2024-06-28 20:33 UTC (40+ messages)
` [PATCHv12 01/19] x86/acpi: Extract ACPI MADT wakeup code into a separate file
` [PATCHv12 02/19] x86/apic: Mark acpi_mp_wake_* variables as __ro_after_init
` [PATCHv12 03/19] cpu/hotplug: Add support for declaring CPU offlining not supported
` [PATCHv12 04/19] cpu/hotplug, x86/acpi: Disable CPU offlining for ACPI MADT wakeup
` [PATCHv12 05/19] x86/relocate_kernel: Use named labels for less confusion
` [PATCHv12 06/19] x86/kexec: Keep CR4.MCE set during kexec for TDX guest
` [PATCHv12 07/19] x86/mm: Make x86_platform.guest.enc_status_change_*() return errno
` [PATCHv12 08/19] x86/mm: Return correct level from lookup_address() if pte is none
` [PATCHv12 09/19] x86/tdx: Account shared memory
` [PATCHv12 10/19] x86/mm: Add callbacks to prepare encrypted memory for kexec
` [PATCHv12 11/19] x86/tdx: Convert shared memory back to private on kexec
` [PATCHv12 12/19] x86/mm: Make e820__end_ram_pfn() cover E820_TYPE_ACPI ranges
` [PATCHv12 13/19] x86/mm: Do not zap page table entries mapping unaccepted memory table during kdump
` [PATCHv12 14/19] x86/acpi: Rename fields in acpi_madt_multiproc_wakeup structure
` [PATCHv12 15/19] x86/acpi: Do not attempt to bring up secondary CPUs in kexec case
` [PATCHv12 16/19] x86/smp: Add smp_ops.stop_this_cpu() callback
` [PATCHv12 17/19] x86/mm: Introduce kernel_ident_mapping_free()
` [PATCHv12 18/19] x86/acpi: Add support for CPU offlining for ACPI MADT wakeup method
` [PATCHv12 19/19] ACPI: tables: Print MULTIPROC_WAKEUP when MADT is parsed
` [PATCH v8 0/2] x86/snp: Add kexec support
` [PATCH v8 1/2] x86/boot/compressed: Skip Video Memory access in Decompressor for SEV-ES/SNP
` [PATCH v8 2/2] x86/snp: Convert shared memory back to private on kexec
` [PATCH v9 0/3] x86/snp: Add kexec support
` [PATCH v9 1/3] x86/sev: Move SEV compilation units
` [PATCH v9 2/3] x86/boot: Skip video memory access in the decompressor for SEV-ES/SNP
` [PATCH v9 3/3] x86/snp: Convert shared memory back to private on kexec
` [PATCH v10 0/2] x86/snp: Add kexec support
` [PATCH v10 1/2] x86/boot: Skip video memory access in the decompressor for SEV-ES/SNP
` [PATCH v10 2/2] Subject: [PATCH v9 3/3] x86/snp: Convert shared memory back to private on kexec
[PATCH] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
2024-06-28 19:24 UTC (4+ messages)
[PATCH] x86/virt/tdx: accurately distinguishes TDX module loading situations
2024-06-28 17:17 UTC (3+ messages)
[PATCH v3 00/14] arm64: Support for running as a guest in Arm CCA
2024-06-28 9:59 UTC (42+ messages)
` [PATCH v3 01/14] arm64: rsi: Add RSI definitions
` [PATCH v3 02/14] arm64: Detect if in a realm and set RIPAS RAM
` [PATCH v3 06/14] arm64: Override set_fixmap_io
` [PATCH v3 09/14] arm64: Enable memory encrypt for Realms
` [PATCH v3 10/14] arm64: Force device mappings to be non-secure shared
` [PATCH v3 12/14] arm64: realm: Support nonsecure ITS emulation shared
SVSM Development Call June 26th, 2024
2024-06-27 9:59 UTC (2+ messages)
` [svsm-devel] "
[v2] Support for Arm CCA VMs on Linux
2024-06-26 13:39 UTC (3+ messages)
[PATCHv5 0/4] x86/tdx: Adjust TD settings on boot
2024-06-24 11:41 UTC (5+ messages)
` [PATCHv5 1/4] x86/tdx: Introduce wrappers to read and write TD metadata
` [PATCHv5 2/4] x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup()
` [PATCHv5 3/4] x86/tdx: Dynamically disable SEPT violations from causing #VEs
` [PATCHv5 4/4] x86/tdx: Enable CPU topology enumeration
[PATCH v2 1/1] Documentation: hyperv: Add overview of Confidential Computing VM support
2024-06-24 7:07 UTC (3+ messages)
[PATCHv11 00/19] x86/tdx: Add kexec support
2024-06-21 13:38 UTC (27+ messages)
` [PATCHv11 05/19] x86/relocate_kernel: Use named labels for less confusion
` [PATCHv11 18/19] x86/acpi: Add support for CPU offlining for ACPI MADT wakeup method
KernelSIG / Devsec call cancelled June 20th and July 5th
2024-06-20 17:25 UTC
[PATCH][v4] virt: tdx-guest: Don't free decrypted memory
2024-06-19 11:18 UTC
[PATCH][v3] virt: tdx-guest: Don't free decrypted memory
2024-06-19 10:37 UTC (2+ messages)
[PATCH v5 00/13] Provide SEV-SNP support for running under an SVSM
2024-06-17 17:50 UTC (5+ messages)
` [PATCH v5 04/13] x86/sev: Perform PVALIDATE using the SVSM when not at VMPL0
` [PATCH v5 09/13] configfs-tsm: Allow the privlevel_floor attribute to be updated
[PATCH][v2] virt: tdx-guest: Don't free decrypted memory
2024-06-17 10:03 UTC (3+ messages)
[PATCH] virt: tdx-guest: Fix the decrypted failure memory free
2024-06-14 4:48 UTC (5+ messages)
` [外部邮件] "
SVSM Development Call June 12th, 2024
2024-06-13 7:41 UTC (2+ messages)
` [svsm-devel] "
[PATCH 1/1] Documentation: hyperv: Add overview of Confidential Computing VM support
2024-06-13 1:01 UTC (3+ messages)
Confidential Computing call May 10: RTMR ABI & TEE I/O
2024-06-12 21:18 UTC (11+ messages)
SVSM Development Call - June 12th, 2024
2024-06-12 12:29 UTC (5+ messages)
` [svsm-devel] "
[PATCH] x86/tdx: Generate SIGBUS on userspace MMIO
2024-06-12 9:50 UTC (8+ messages)
` [EXTERNAL] "
[PATCH v3 00/43] arm64: Support for Arm CCA in KVM
2024-06-10 13:42 UTC (7+ messages)
` [PATCH v3 38/43] arm64: RME: Propagate max SVE vector length from RMM
` [PATCH v3 39/43] arm64: RME: Configure max SVE vector length for a Realm
` [PATCH v3 40/43] arm64: RME: Provide register list for unfinalized RME RECs
` [PATCH v3 41/43] arm64: RME: Provide accurate register list
` [PATCH v3 42/43] arm64: kvm: Expose support for private memory
` [PATCH v3 43/43] KVM: arm64: Allow activating realms
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).