messages from 2024-07-18 15:20:01 to 2024-08-19 13:19:55 UTC [more...]
[PATCH v5 00/19] arm64: Support for running as a guest in Arm CCA
2024-08-19 13:19 UTC (4+ messages)
` [PATCH v5 01/19] arm64: mm: Add top-level dispatcher for internal mem_encrypt API
` [PATCH v5 02/19] arm64: mm: Add confidential computing hook to ioremap_prot()
` [PATCH v5 03/19] arm64: rsi: Add RSI definitions
[PATCH v1 0/4] x86/tdx: Allow MMIO instructions from userspace
2024-08-19 12:39 UTC (52+ messages)
` [PATCH v1 1/4] x86/tdx: Split MMIO read and write operations
` [PATCH v1 2/4] x86/tdx: Add validation of userspace MMIO instructions
` [PATCH v1 3/4] x86/tdx: Allow MMIO from userspace
` [PATCH v1 4/4] x86/tdx: Implement movs for MMIO
` [PATCH v2 0/5] x86/tdx: Allow MMIO instructions from userspace
` [PATCH v2 1/5] x86/tdx: Split MMIO read and write operations
` [PATCH v2 2/5] x86/tdx: Add validation of userspace MMIO instructions
` [PATCH v3 6/7] x86/tdx: Add a restriction on access to MMIO address
` [PATCH v3 7/7] x86/tdx: Avoid crossing the page boundary
` [PATCH v2 3/5] x86/tdx: Allow MMIO from userspace
` [PATCH v2 4/5] x86/tdx: Move MMIO helpers to common library
` [PATCH v2 5/5] x86/tdx: Implement movs for MMIO
` [PATCH v3 00/10] x86/tdx: Allow MMIO instructions from userspace
` [PATCH v3 01/10] x86/tdx: Split MMIO read and write operations
` [PATCH v3 02/10] x86/tdx: Add validation of userspace MMIO instructions
` [PATCH v3 03/10] x86/tdx: Allow MMIO from userspace
` [PATCH v3 04/10] x86/insn: Read and decode insn without crossing the page boundary
` [PATCH v3 05/10] x86/tdx: Avoid "
` [PATCH v3 06/10] x86/sev: "
` [PATCH v3 07/10] x86/umip: "
` [PATCH v3 08/10] x86/tdx: Add a restriction on access to MMIO address
` [PATCH v3 09/10] x86/tdx: Move MMIO helpers to common library
` [PATCH v3 10/10] x86/tdx: Implement movs for MMIO
[PATCH RFC 0/4] mm: Introduce guest_memfd library
2024-08-19 10:09 UTC (39+ messages)
` [PATCH RFC 1/4] mm: Introduce guest_memfd
` [PATCH RFC 2/4] kvm: Convert to use mm/guest_memfd
` [PATCH RFC 3/4] mm: guest_memfd: Add option to remove guest private memory from direct map
` [PATCH RFC 4/4] mm: guest_memfd: Add ability for mmap'ing pages
question on vTPM interface in coconut-svsm
2024-08-19 5:54 UTC (29+ messages)
` Coconut-SVSM - vTPM support for Intel TD Partitioning
[PATCH v15 19/20] KVM: SEV: Provide support for SNP_EXTENDED_GUEST_REQUEST NAE event
2024-08-16 21:58 UTC (4+ messages)
` [PATCH] KVM: SEV: Replace KVM_EXIT_VMGEXIT with KVM_EXIT_SNP_REQ_CERTS
[PATCH v4 00/15] arm64: Support for running as a guest in Arm CCA
2024-08-16 21:13 UTC (21+ messages)
` [PATCH v4 01/15] arm64: rsi: Add RSI definitions
` [PATCH v4 03/15] arm64: Detect if in a realm and set RIPAS RAM
` [PATCH v4 05/15] arm64: Mark all I/O as non-secure shared
SVSM Development Call August 14th, 2024
2024-08-16 14:46 UTC (2+ messages)
` [svsm-devel] "
Reminder KernelSIG / Devsec call for August 15th
2024-08-15 23:25 UTC
[PATCHv5, REBASED 0/4] x86/tdx: Adjust TD settings on boot
2024-08-09 13:09 UTC (5+ messages)
` [PATCHv5, REBASED 1/4] x86/tdx: Introduce wrappers to read and write TD metadata
` [PATCHv5, REBASED 2/4] x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup()
` [PATCHv5, REBASED 3/4] x86/tdx: Dynamically disable SEPT violations from causing #VEs
` [PATCHv5, REBASED 4/4] x86/tdx: Enable CPU topology enumeration
[PATCH 0/6] Support for running as a pKVM protected guest
2024-08-07 12:43 UTC (19+ messages)
` [PATCH 1/6] firmware/smccc: Call arch-specific hook on discovering KVM services
` [PATCH 2/6] drivers/virt: pkvm: Add initial support for running as a protected guest
` [PATCH 3/6] arm64: mm: Add top-level dispatcher for internal mem_encrypt API
` [PATCH 4/6] drivers/virt: pkvm: Hook up mem_encrypt API using pKVM hypercalls
` [PATCH 5/6] arm64: mm: Add confidential computing hook to ioremap_prot()
` [PATCH 6/6] drivers/virt: pkvm: Intercept ioremap using pKVM MMIO_GUARD hypercall
KernelSIG/Devsec Call for August 1st
2024-08-02 17:20 UTC
[PATCH v2 0/2] Support userspace hypercalls for TDX
2024-08-02 12:47 UTC (6+ messages)
` [PATCH v2 1/2] Add prctl to allow userlevel TDX hypercalls
` [PATCH v2 2/2] x86/vmware: VMware support for TDX userspace hypercalls
SVSM Development Call July 31st, 2024
2024-08-02 12:44 UTC (3+ messages)
` [svsm-devel] "
[PATCHv12 00/19] x86/tdx: Add kexec support
2024-08-01 19:14 UTC (9+ messages)
` [PATCH v12 0/3] x86/snp: "
` [PATCH v12 1/3] x86/boot: Skip video memory access in the decompressor for SEV-ES/SNP
` [PATCH v12 2/3] x86/mm: refactor __set_clr_pte_enc()
` [PATCH v12 3/3] x86/snp: Convert shared memory back to private on kexec
` [PATCH v13 0/3] x86/snp: Add kexec support
` [PATCH v13 1/3] x86/boot: Skip video memory access in the decompressor for SEV-ES/SNP
` [PATCH v13 2/3] x86/mm: refactor __set_clr_pte_enc()
` [PATCH v13 3/3] x86/snp: Convert shared memory back to private on kexec
[PATCH v15 02/20] KVM: x86: Add hook for determining max NPT mapping level
2024-08-01 18:15 UTC (5+ messages)
` [PATCH] Fixes: f32fb32820b1 ("KVM: x86: Add hook for determining max NPT mapping level")
[PATCH v2 00/18] PCI device authentication
2024-07-29 14:27 UTC (18+ messages)
` [PATCH v2 06/18] crypto: ecdsa - Support P1363 signature encoding
` [PATCH v2 12/18] PCI/CMA: Expose certificates in sysfs
` [PATCH v2 13/18] sysfs: Allow bin_attributes to be added to groups
` [PATCH v2 14/18] sysfs: Allow symlinks to be added between sibling groups
` [PATCH v2 15/18] PCI/CMA: Expose a log of received signatures in sysfs
` [PATCH v2 16/18] spdm: Limit memory consumed by log of received signatures
` [PATCH v2 17/18] spdm: Authenticate devices despite invalid certificate chain
` [PATCH v2 18/18] spdm: Allow control of next requester nonce through sysfs
[PATCH v1 0/5] SEV-SNP: Add KVM support for attestation and KVM_EXIT_COCO
2024-07-26 7:15 UTC (7+ messages)
` [PATCH v1 4/5] KVM: Introduce KVM_EXIT_COCO exit type
[PATCH v2 08/18] PCI/CMA: Authenticate devices on enumeration
2024-07-23 12:58 UTC (15+ messages)
SVSM Development Call July 17th, 2024
2024-07-23 9:29 UTC (2+ messages)
` [svsm-devel] "
[PATCH 0/2] Support userspace hypercalls for TDX
2024-07-23 9:10 UTC (5+ messages)
` [PATCH 1/2] x86/tdx: Add prctl to allow userlevel TDX hypercalls
[PATCH] x86/virt/tdx: accurately distinguishes TDX module loading situations
2024-07-19 1:31 UTC (2+ messages)
Reminder KernelSIG / Devsec call for July 18th
2024-07-18 22:59 UTC
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).