messages from 2024-08-27 00:26:39 to 2024-09-08 23:56:33 UTC [more...]
[PATCH v4 00/43] arm64: Support for Arm CCA in KVM
2024-09-08 23:56 UTC (14+ messages)
` [PATCH v4 05/43] arm64: RME: Add SMC definitions for calling the RMM
` [PATCH v4 09/43] arm64: RME: ioctls to create and configure realms
` [PATCH v4 21/43] arm64: RME: Runtime faulting of memory
` [PATCH v4 43/43] KVM: arm64: Allow activating realms
[PATCH v5 00/19] arm64: Support for running as a guest in Arm CCA
2024-09-08 23:53 UTC (21+ messages)
` [PATCH v5 04/19] firmware/psci: Add psci_early_test_conduit()
` [PATCH v5 05/19] arm64: Detect if in a realm and set RIPAS RAM
` [PATCH v5 07/19] arm64: rsi: Add support for checking whether an MMIO is protected
` [PATCH v5 10/19] arm64: Override set_fixmap_io
` [PATCH v5 11/19] arm64: rsi: Map unprotected MMIO as decrypted
` [PATCH v5 19/19] virt: arm-cca-guest: TSM_REPORT support for realms
[PATCH RFC 0/3] tsm: Unified Measurement Register ABI for TVMs
2024-09-08 17:37 UTC (5+ messages)
` [PATCH RFC 1/3] tsm: Add TVM Measurement Register Support
` [PATCH RFC 2/3] tsm: Add RTMR event logging
` [PATCH RFC 3/3] tsm: Add TVM Measurement Sample Code
[PATCH v4 0/6] x86/tdx: Allow MMIO instructions from userspace
2024-09-06 21:13 UTC (20+ messages)
` [PATCH v5 "
` [PATCH v5 1/6] x86/tdx: Split MMIO read and write operations
` [PATCH v5 2/6] x86/tdx: Add validation of userspace MMIO instructions
` [PATCH v5 3/6] x86/tdx: Allow MMIO from userspace
` [PATCH v5 4/6] x86/tdx: Add a restriction on access to MMIO address
` [PATCH v5 5/6] x86/tdx: Move MMIO helpers to common library
` [PATCH v5 6/6] x86/tdx: Implement MOVS for MMIO
` [PATCH v6 0/6] x86/tdx: Allow MMIO instructions from userspace
` [PATCH v6 1/6] x86/tdx: Fix "in-kernel MMIO" check
` [PATCH v6 2/6] x86/tdx: Split MMIO read and write operations
` [PATCH v6 3/6] x86/tdx: Add validation of userspace MMIO instructions
` [PATCH v6 4/6] x86/tdx: Allow MMIO from userspace
` [PATCH v6 5/6] x86/tdx: Move MMIO helpers to common library
` [PATCH v6 6/6] x86/tdx: Implement MOVS for MMIO
[PATCH v2] x86/sev: Fix host kdump support for SNP
2024-09-06 20:27 UTC (11+ messages)
[RFC PATCH 00/21] Secure VFIO, TDISP, SEV TIO
2024-09-06 13:54 UTC (91+ messages)
` [RFC PATCH 01/21] tsm-report: Rename module to reflect what it does
` [RFC PATCH 02/21] pci/doe: Define protocol types and make those public
` [RFC PATCH 03/21] pci: Define TEE-IO bit in PCIe device capabilities
` [RFC PATCH 04/21] PCI/IDE: Define Integrity and Data Encryption (IDE) extended capability
` [RFC PATCH 05/21] crypto/ccp: Make some SEV helpers public
` [RFC PATCH 06/21] crypto: ccp: Enable SEV-TIO feature in the PSP when supported
` [RFC PATCH 07/21] pci/tdisp: Introduce tsm module
` [RFC PATCH 08/21] crypto/ccp: Implement SEV TIO firmware interface
` [RFC PATCH 11/21] KVM: SEV: Add TIO VMGEXIT and bind TDI
` [RFC PATCH 12/21] KVM: IOMMUFD: MEMFD: Map private pages
` [RFC PATCH 13/21] KVM: X86: Handle private MMIO as shared
` [RFC PATCH 14/21] RFC: iommu/iommufd/amd: Add IOMMU_HWPT_TRUSTED flag, tweak DTE's DomainID, IOTLB
` [RFC PATCH 17/21] coco/sev-guest: Implement the guest side of things
GHCB draft specification v2.04
2024-09-05 14:25 UTC
SVSM Development Call September 4th, 2024
2024-09-05 6:54 UTC (2+ messages)
` [svsm-devel] "
[PATCH v2 0/7] Support for running as a pKVM protected guest
2024-09-04 12:29 UTC (13+ messages)
` [PATCH v2 1/7] firmware/smccc: Call arch-specific hook on discovering KVM services
` [PATCH v2 2/7] drivers/virt: pkvm: Add initial support for running as a protected guest
` [PATCH v2 3/7] arm64: mm: Add top-level dispatcher for internal mem_encrypt API
` [PATCH v2 4/7] drivers/virt: pkvm: Hook up mem_encrypt API using pKVM hypercalls
` [PATCH v2 5/7] arm64: mm: Add confidential computing hook to ioremap_prot()
` [PATCH v2 6/7] drivers/virt: pkvm: Intercept ioremap using pKVM MMIO_GUARD hypercall
` [PATCH v2 7/7] arm64: smccc: Reserve block of KVM "vendor" services for pKVM hypercalls
[RFC PATCH 20/21] pci: Allow encrypted MMIO mapping via sysfs
2024-09-03 21:46 UTC (3+ messages)
[PATCH] x86/sev: Fix host kdump support for SNP
2024-09-03 16:54 UTC (12+ messages)
[RFC 0/7] Introduce swiotlb throttling
2024-08-30 3:58 UTC (24+ messages)
` [RFC 1/7] swiotlb: "
[PATCH RFC v2 0/5] mm: Introduce guest_memfd library
2024-08-29 22:24 UTC (6+ messages)
` [PATCH RFC v2 1/5] mm: Introduce guest_memfd
` [PATCH RFC v2 2/5] mm: guest_memfd: Allow folios to be accessible to host
` [PATCH RFC v2 3/5] kvm: Convert to use guest_memfd library
` [PATCH RFC v2 4/5] mm: guest_memfd: Add ability for userspace to mmap pages
` [PATCH RFC v2 5/5] mm: guest_memfd: Add option to remove inaccessible memory from direct map
SVSM Development Call August 28th, 2024
2024-08-29 6:57 UTC (2+ messages)
` [svsm-devel] "
[PATCHv6 0/4] x86/tdx: Adjust TD settings on boot
2024-08-28 14:28 UTC (8+ messages)
` [PATCHv6 1/4] x86/tdx: Introduce wrappers to read and write TD metadata
` [PATCHv6 2/4] x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup()
` [PATCHv6 3/4] x86/tdx: Dynamically disable SEPT violations from causing #VEs
` [PATCHv6 4/4] x86/tdx: Enable CPU topology enumeration
[PATCH] x86/tdx: Enhance code generation for TDCALL and SEAMCALL wrappers
2024-08-28 13:34 UTC (5+ messages)
[PATCHv5, REBASED 0/4] x86/tdx: Adjust TD settings on boot
2024-08-28 0:44 UTC (5+ messages)
` [PATCHv5, REBASED 3/4] x86/tdx: Dynamically disable SEPT violations from causing #VEs
[RFC PATCH 0/7] KVM: SEV-SNP support for running an SVSM
2024-08-27 21:59 UTC (8+ messages)
` [RFC PATCH 1/7] KVM: SVM: Implement GET_AP_APIC_IDS NAE event
` [RFC PATCH 2/7] KVM: SEV: Allow for VMPL level specification in AP create
` [RFC PATCH 3/7] KVM: SVM: Invoke a specified VMPL level VMSA for the vCPU
` [RFC PATCH 4/7] KVM: SVM: Maintain per-VMPL SEV features in kvm_sev_info
` [RFC PATCH 5/7] KVM: SVM: Prevent injection when restricted injection is active
` [RFC PATCH 6/7] KVM: SVM: Support launching an SVSM with Restricted Injection set
` [RFC PATCH 7/7] KVM: SVM: Support initialization of an SVSM
SVSM Development Call August 21st, 2024
2024-08-27 7:21 UTC (2+ messages)
` [svsm-devel] "
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).