messages from 2024-08-21 15:40:09 to 2024-08-29 12:45:01 UTC [more...]
[PATCH v3 00/10] x86/tdx: Allow MMIO instructions from userspace
2024-08-29 12:44 UTC (22+ messages)
` [PATCH v4 0/6] "
` [PATCH v4 2/6] x86/tdx: Add validation of userspace MMIO instructions
` [PATCH v4 3/6] x86/tdx: Allow MMIO from userspace
` [PATCH v4 4/6] x86/tdx: Add a restriction on access to MMIO address
` [PATCH v4 5/6] x86/tdx: Move MMIO helpers to common library
` [PATCH v4 6/6] x86/tdx: Implement movs for MMIO
` [PATCH v5 0/6] x86/tdx: Allow MMIO instructions from userspace
` [PATCH v5 1/6] x86/tdx: Split MMIO read and write operations
` [PATCH v5 2/6] x86/tdx: Add validation of userspace MMIO instructions
` [PATCH v5 3/6] x86/tdx: Allow MMIO from userspace
` [PATCH v5 4/6] x86/tdx: Add a restriction on access to MMIO address
` [PATCH v5 5/6] x86/tdx: Move MMIO helpers to common library
` [PATCH v5 6/6] x86/tdx: Implement MOVS for MMIO
[RFC PATCH 00/21] Secure VFIO, TDISP, SEV TIO
2024-08-29 12:15 UTC (52+ messages)
` [RFC PATCH 01/21] tsm-report: Rename module to reflect what it does
` [RFC PATCH 02/21] pci/doe: Define protocol types and make those public
` [RFC PATCH 03/21] pci: Define TEE-IO bit in PCIe device capabilities
` [RFC PATCH 04/21] PCI/IDE: Define Integrity and Data Encryption (IDE) extended capability
` [RFC PATCH 05/21] crypto/ccp: Make some SEV helpers public
` [RFC PATCH 06/21] crypto: ccp: Enable SEV-TIO feature in the PSP when supported
` [RFC PATCH 07/21] pci/tdisp: Introduce tsm module
` [RFC PATCH 08/21] crypto/ccp: Implement SEV TIO firmware interface
` [RFC PATCH 09/21] kvm: Export kvm_vm_set_mem_attributes
` [RFC PATCH 10/21] vfio: Export helper to get vfio_device from fd
` [RFC PATCH 11/21] KVM: SEV: Add TIO VMGEXIT and bind TDI
` [RFC PATCH 12/21] KVM: IOMMUFD: MEMFD: Map private pages
` [RFC PATCH 13/21] KVM: X86: Handle private MMIO as shared
` [RFC PATCH 14/21] RFC: iommu/iommufd/amd: Add IOMMU_HWPT_TRUSTED flag, tweak DTE's DomainID, IOTLB
` [RFC PATCH 15/21] coco/sev-guest: Allow multiple source files in the driver
` [RFC PATCH 16/21] coco/sev-guest: Make SEV-to-PSP request helpers public
` [RFC PATCH 17/21] coco/sev-guest: Implement the guest side of things
` [RFC PATCH 18/21] RFC: pci: Add BUS_NOTIFY_PCI_BUS_MASTER event
` [RFC PATCH 19/21] sev-guest: Stop changing encrypted page state for TDISP devices
` [RFC PATCH 20/21] pci: Allow encrypted MMIO mapping via sysfs
` [RFC PATCH 21/21] pci: Define pci_iomap_range_encrypted
[PATCH] x86/sev: Fix host kdump support for SNP
2024-08-29 8:34 UTC (2+ messages)
SVSM Development Call August 28th, 2024
2024-08-29 6:57 UTC (2+ messages)
` [svsm-devel] "
[RFC 0/7] Introduce swiotlb throttling
2024-08-28 19:50 UTC (42+ messages)
` [RFC 1/7] swiotlb: "
` [RFC 2/7] dma: Handle swiotlb throttling for SGLs
` [RFC 3/7] dma: Add function for drivers to know if allowing blocking is useful
` [RFC 4/7] scsi_lib_dma: Add _attrs variant of scsi_dma_map()
` [RFC 5/7] scsi: storvsc: Enable swiotlb throttling
` [RFC 6/7] nvme: Move BLK_MQ_F_BLOCKING indicator to struct nvme_ctrl
` [RFC 7/7] nvme: Enable swiotlb throttling for NVMe PCI devices
[PATCHv6 0/4] x86/tdx: Adjust TD settings on boot
2024-08-28 14:28 UTC (8+ messages)
` [PATCHv6 1/4] x86/tdx: Introduce wrappers to read and write TD metadata
` [PATCHv6 2/4] x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup()
` [PATCHv6 3/4] x86/tdx: Dynamically disable SEPT violations from causing #VEs
` [PATCHv6 4/4] x86/tdx: Enable CPU topology enumeration
[PATCH] x86/tdx: Enhance code generation for TDCALL and SEAMCALL wrappers
2024-08-28 13:34 UTC (5+ messages)
[PATCHv5, REBASED 0/4] x86/tdx: Adjust TD settings on boot
2024-08-28 0:44 UTC (5+ messages)
` [PATCHv5, REBASED 3/4] x86/tdx: Dynamically disable SEPT violations from causing #VEs
[RFC PATCH 0/7] KVM: SEV-SNP support for running an SVSM
2024-08-27 21:59 UTC (8+ messages)
` [RFC PATCH 1/7] KVM: SVM: Implement GET_AP_APIC_IDS NAE event
` [RFC PATCH 2/7] KVM: SEV: Allow for VMPL level specification in AP create
` [RFC PATCH 3/7] KVM: SVM: Invoke a specified VMPL level VMSA for the vCPU
` [RFC PATCH 4/7] KVM: SVM: Maintain per-VMPL SEV features in kvm_sev_info
` [RFC PATCH 5/7] KVM: SVM: Prevent injection when restricted injection is active
` [RFC PATCH 6/7] KVM: SVM: Support launching an SVSM with Restricted Injection set
` [RFC PATCH 7/7] KVM: SVM: Support initialization of an SVSM
SVSM Development Call August 21st, 2024
2024-08-27 7:21 UTC (2+ messages)
` [svsm-devel] "
[PATCH] x86/tdx: Fix data leak in mmio_read()
2024-08-26 19:44 UTC (3+ messages)
[PATCH v5 00/19] arm64: Support for running as a guest in Arm CCA
2024-08-26 10:46 UTC (28+ messages)
` [PATCH v5 01/19] arm64: mm: Add top-level dispatcher for internal mem_encrypt API
` [PATCH v5 02/19] arm64: mm: Add confidential computing hook to ioremap_prot()
` [PATCH v5 03/19] arm64: rsi: Add RSI definitions
` [PATCH v5 04/19] firmware/psci: Add psci_early_test_conduit()
` [PATCH v5 05/19] arm64: Detect if in a realm and set RIPAS RAM
` [PATCH v5 06/19] arm64: realm: Query IPA size from the RMM
` [PATCH v5 07/19] arm64: rsi: Add support for checking whether an MMIO is protected
` [PATCH v5 09/19] fixmap: Pass down the full phys address for set_fixmap_io
` [PATCH v5 12/19] efi: arm64: Map Device with Prot Shared
` [PATCH v5 13/19] arm64: Make the PHYS_MASK_SHIFT dynamic
` [PATCH v5 14/19] arm64: Enforce bounce buffers for realm DMA
` [PATCH v5 15/19] arm64: mm: Avoid TLBI when marking pages as valid
` [PATCH v5 16/19] arm64: Enable memory encrypt for Realms
[PATCH v2 0/2] KVM: SEV: Add support for the ALLOWED_SEV_FEATURES feature
2024-08-25 12:35 UTC (5+ messages)
` [PATCH v2 1/2] x86/cpufeatures: Add "Allowed SEV Features" Feature
` [PATCH v2 2/2] KVM: SEV: Configure "ALLOWED_SEV_FEATURES" VMCB Field
[PATCH 0/6] Support for running as a pKVM protected guest
2024-08-23 16:53 UTC (10+ messages)
` [PATCH 1/6] firmware/smccc: Call arch-specific hook on discovering KVM services
` [PATCH 4/6] drivers/virt: pkvm: Hook up mem_encrypt API using pKVM hypercalls
[PATCH v4 00/43] arm64: Support for Arm CCA in KVM
2024-08-23 4:30 UTC (44+ messages)
` [PATCH v4 05/43] arm64: RME: Add SMC definitions for calling the RMM
` [PATCH v4 06/43] arm64: RME: Add wrappers for RMI calls
` [PATCH v4 17/43] arm64: RME: Allow VMM to set RIPAS
` [PATCH v4 18/43] arm64: RME: Handle realm enter/exit
` [PATCH v4 19/43] KVM: arm64: Handle realm MMIO emulation
` [PATCH v4 20/43] arm64: RME: Allow populating initial contents
` [PATCH v4 21/43] arm64: RME: Runtime faulting of memory
` [PATCH v4 22/43] KVM: arm64: Handle realm VCPU load
` [PATCH v4 23/43] KVM: arm64: Validate register access for a Realm VM
` [PATCH v4 24/43] KVM: arm64: Handle Realm PSCI requests
` [PATCH v4 25/43] KVM: arm64: WARN on injected undef exceptions
` [PATCH v4 26/43] arm64: Don't expose stolen time for realm guests
` [PATCH v4 27/43] arm64: rme: allow userspace to inject aborts
` [PATCH v4 28/43] arm64: rme: support RSI_HOST_CALL
` [PATCH v4 29/43] arm64: rme: Allow checking SVE on VM instance
` [PATCH v4 30/43] arm64: RME: Always use 4k pages for realms
` [PATCH v4 31/43] arm64: rme: Prevent Device mappings for Realms
` [PATCH v4 32/43] arm_pmu: Provide a mechanism for disabling the physical IRQ
` [PATCH v4 33/43] arm64: rme: Enable PMU support with a realm guest
` [PATCH v4 34/43] kvm: rme: Hide KVM_CAP_READONLY_MEM for realm guests
` [PATCH v4 35/43] arm64: RME: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v4 36/43] arm64: RME: Set breakpoint parameters through SET_ONE_REG
` [PATCH v4 37/43] arm64: RME: Initialize PMCR.N with number counter supported by RMM
` [PATCH v4 38/43] arm64: RME: Propagate max SVE vector length from RMM
` [PATCH v4 39/43] arm64: RME: Configure max SVE vector length for a Realm
` [PATCH v4 40/43] arm64: RME: Provide register list for unfinalized RME RECs
` [PATCH v4 41/43] arm64: RME: Provide accurate register list
` [PATCH v4 42/43] arm64: kvm: Expose support for private memory
` [PATCH v4 43/43] KVM: arm64: Allow activating realms
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).