linux-coco.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
 messages from 2024-07-17 23:18:03 to 2024-08-19 11:50:53 UTC [more...]

[PATCH v1 0/4] x86/tdx: Allow MMIO instructions from userspace
 2024-08-19 11:50 UTC  (48+ messages)
` [PATCH v1 1/4] x86/tdx: Split MMIO read and write operations
` [PATCH v1 2/4] x86/tdx: Add validation of userspace MMIO instructions
` [PATCH v1 3/4] x86/tdx: Allow MMIO from userspace
` [PATCH v1 4/4] x86/tdx: Implement movs for MMIO
` [PATCH v2 0/5] x86/tdx: Allow MMIO instructions from userspace
  ` [PATCH v2 1/5] x86/tdx: Split MMIO read and write operations
  ` [PATCH v2 2/5] x86/tdx: Add validation of userspace MMIO instructions
    ` [PATCH v3 6/7] x86/tdx: Add a restriction on access to MMIO address
    ` [PATCH v3 7/7] x86/tdx: Avoid crossing the page boundary
  ` [PATCH v2 3/5] x86/tdx: Allow MMIO from userspace
  ` [PATCH v2 4/5] x86/tdx: Move MMIO helpers to common library
  ` [PATCH v2 5/5] x86/tdx: Implement movs for MMIO
  ` [PATCH v3 00/10] x86/tdx: Allow MMIO instructions from userspace
    ` [PATCH v3 01/10] x86/tdx: Split MMIO read and write operations
    ` [PATCH v3 02/10] x86/tdx: Add validation of userspace MMIO instructions
    ` [PATCH v3 03/10] x86/tdx: Allow MMIO from userspace
    ` [PATCH v3 04/10] x86/insn: Read and decode insn without crossing the page boundary
    ` [PATCH v3 05/10] x86/tdx: Avoid "
    ` [PATCH v3 06/10] x86/sev: "
    ` [PATCH v3 07/10] x86/umip: "
    ` [PATCH v3 08/10] x86/tdx: Add a restriction on access to MMIO address
    ` [PATCH v3 09/10] x86/tdx: Move MMIO helpers to common library
    ` [PATCH v3 10/10] x86/tdx: Implement movs for MMIO

[PATCH RFC 0/4] mm: Introduce guest_memfd library
 2024-08-19 10:09 UTC  (39+ messages)
` [PATCH RFC 1/4] mm: Introduce guest_memfd
` [PATCH RFC 2/4] kvm: Convert to use mm/guest_memfd
` [PATCH RFC 3/4] mm: guest_memfd: Add option to remove guest private memory from direct map
` [PATCH RFC 4/4] mm: guest_memfd: Add ability for mmap'ing pages

question on vTPM interface in coconut-svsm
 2024-08-19  5:54 UTC  (29+ messages)
            ` Coconut-SVSM - vTPM support for Intel TD Partitioning

[PATCH v15 19/20] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
 2024-08-16 21:58 UTC  (4+ messages)
` [PATCH] KVM: SEV: Replace KVM_EXIT_VMGEXIT with KVM_EXIT_SNP_REQ_CERTS

[PATCH v4 00/15] arm64: Support for running as a guest in Arm CCA
 2024-08-16 21:13 UTC  (21+ messages)
` [PATCH v4 01/15] arm64: rsi: Add RSI definitions
` [PATCH v4 03/15] arm64: Detect if in a realm and set RIPAS RAM
` [PATCH v4 05/15] arm64: Mark all I/O as non-secure shared

SVSM Development Call August 14th, 2024
 2024-08-16 14:46 UTC  (2+ messages)
` [svsm-devel] "

Reminder KernelSIG / Devsec call for August 15th
 2024-08-15 23:25 UTC 

[PATCHv5, REBASED 0/4] x86/tdx: Adjust TD settings on boot
 2024-08-09 13:09 UTC  (5+ messages)
` [PATCHv5, REBASED 1/4] x86/tdx: Introduce wrappers to read and write TD metadata
` [PATCHv5, REBASED 2/4] x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup()
` [PATCHv5, REBASED 3/4] x86/tdx: Dynamically disable SEPT violations from causing #VEs
` [PATCHv5, REBASED 4/4] x86/tdx: Enable CPU topology enumeration

[PATCH 0/6] Support for running as a pKVM protected guest
 2024-08-07 12:43 UTC  (19+ messages)
` [PATCH 1/6] firmware/smccc: Call arch-specific hook on discovering KVM services
` [PATCH 2/6] drivers/virt: pkvm: Add initial support for running as a protected guest
` [PATCH 3/6] arm64: mm: Add top-level dispatcher for internal mem_encrypt API
` [PATCH 4/6] drivers/virt: pkvm: Hook up mem_encrypt API using pKVM hypercalls
` [PATCH 5/6] arm64: mm: Add confidential computing hook to ioremap_prot()
` [PATCH 6/6] drivers/virt: pkvm: Intercept ioremap using pKVM MMIO_GUARD hypercall

KernelSIG/Devsec Call for August 1st
 2024-08-02 17:20 UTC 

[PATCH v2 0/2] Support userspace hypercalls for TDX
 2024-08-02 12:47 UTC  (6+ messages)
` [PATCH v2 1/2] Add prctl to allow userlevel TDX hypercalls
` [PATCH v2 2/2] x86/vmware: VMware support for TDX userspace hypercalls

SVSM Development Call July 31st, 2024
 2024-08-02 12:44 UTC  (3+ messages)
` [svsm-devel] "

[PATCHv12 00/19] x86/tdx: Add kexec support
 2024-08-01 19:14 UTC  (9+ messages)
` [PATCH v12 0/3] x86/snp: "
  ` [PATCH v12 1/3] x86/boot: Skip video memory access in the decompressor for SEV-ES/SNP
  ` [PATCH v12 2/3] x86/mm: refactor __set_clr_pte_enc()
  ` [PATCH v12 3/3] x86/snp: Convert shared memory back to private on kexec
` [PATCH v13 0/3] x86/snp: Add kexec support
  ` [PATCH v13 1/3] x86/boot: Skip video memory access in the decompressor for SEV-ES/SNP
  ` [PATCH v13 2/3] x86/mm: refactor __set_clr_pte_enc()
  ` [PATCH v13 3/3] x86/snp: Convert shared memory back to private on kexec

[PATCH v15 02/20] KVM: x86: Add hook for determining max NPT mapping level
 2024-08-01 18:15 UTC  (5+ messages)
` [PATCH] Fixes: f32fb32820b1 ("KVM: x86: Add hook for determining max NPT mapping level")

[PATCH v2 00/18] PCI device authentication
 2024-07-29 14:27 UTC  (32+ messages)
` [PATCH v2 03/18] X.509: Move certificate length retrieval into new helper
` [PATCH v2 06/18] crypto: ecdsa - Support P1363 signature encoding
` [PATCH v2 07/18] spdm: Introduce library to authenticate devices
` [PATCH v2 10/18] PCI/CMA: Reauthenticate devices on reset and resume
` [PATCH v2 11/18] PCI/CMA: Expose in sysfs whether devices are authenticated
` [PATCH v2 12/18] PCI/CMA: Expose certificates in sysfs
` [PATCH v2 13/18] sysfs: Allow bin_attributes to be added to groups
` [PATCH v2 14/18] sysfs: Allow symlinks to be added between sibling groups
` [PATCH v2 15/18] PCI/CMA: Expose a log of received signatures in sysfs
` [PATCH v2 16/18] spdm: Limit memory consumed by log of received signatures
` [PATCH v2 17/18] spdm: Authenticate devices despite invalid certificate chain
` [PATCH v2 18/18] spdm: Allow control of next requester nonce through sysfs

[PATCH v1 0/5] SEV-SNP: Add KVM support for attestation and KVM_EXIT_COCO
 2024-07-26  7:15 UTC  (7+ messages)
` [PATCH v1 4/5] KVM: Introduce KVM_EXIT_COCO exit type

[PATCH v2 08/18] PCI/CMA: Authenticate devices on enumeration
 2024-07-23 12:58 UTC  (15+ messages)

SVSM Development Call July 17th, 2024
 2024-07-23  9:29 UTC  (2+ messages)
` [svsm-devel] "

[PATCH 0/2] Support userspace hypercalls for TDX
 2024-07-23  9:10 UTC  (5+ messages)
` [PATCH 1/2] x86/tdx: Add prctl to allow userlevel TDX hypercalls

[PATCH] x86/virt/tdx: accurately distinguishes TDX module loading situations
 2024-07-19  1:31 UTC  (2+ messages)

Reminder KernelSIG / Devsec call for July 18th
 2024-07-18 22:59 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).