linux-coco.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
 messages from 2024-12-12 15:57:47 to 2025-01-16 08:21:28 UTC [more...]

SVSM Development Call January 15th, 2025
 2025-01-16  8:21 UTC  (2+ messages)
` [svsm-devel] "

[RFC PATCH 00/12] Private MMIO support for private assigned dev
 2025-01-16  5:33 UTC  (55+ messages)
` [RFC PATCH 01/12] dma-buf: Introduce dma_buf_get_pfn_unlocked() kAPI
` [RFC PATCH 02/12] vfio: Export vfio device get and put registration helpers
` [RFC PATCH 03/12] vfio/pci: Share the core device pointer while invoking feature functions
` [RFC PATCH 04/12] vfio/pci: Allow MMIO regions to be exported through dma-buf
` [RFC PATCH 05/12] vfio/pci: Support get_pfn() callback for dma-buf
` [RFC PATCH 06/12] KVM: Support vfio_dmabuf backed MMIO region
` [RFC PATCH 07/12] KVM: x86/mmu: Handle page fault for vfio_dmabuf backed MMIO
` [RFC PATCH 08/12] vfio/pci: Create host unaccessible dma-buf for private device
` [RFC PATCH 09/12] vfio/pci: Export vfio dma-buf specific info for importers
` [RFC PATCH 10/12] KVM: vfio_dmabuf: Fetch VFIO specific dma-buf data for sanity check
` [RFC PATCH 11/12] KVM: x86/mmu: Export kvm_is_mmio_pfn()
` [RFC PATCH 12/12] KVM: TDX: Implement TDX specific private MMIO map/unmap for SEPT

[PATCH v3 0/7] Move initializing SEV/SNP functionality to KVM
 2025-01-15 22:26 UTC  (31+ messages)
` [PATCH v3 1/7] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
` [PATCH v3 2/7] crypto: ccp: Fix implicit SEV/SNP init and shutdown in ioctls
` [PATCH v3 3/7] crypto: ccp: Reset TMR size at SNP Shutdown
` [PATCH v3 4/7] crypto: ccp: Register SNP panic notifier only if SNP is enabled
` [PATCH v3 5/7] crypto: ccp: Add new SEV/SNP platform shutdown API
` [PATCH v3 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
` [PATCH v3 7/7] crypto: ccp: Move SEV/SNP Platform initialization to KVM

[PATCH 00/11] PCI/TSM: Core infrastructure for PCI device security (TDISP)
 2025-01-15  0:20 UTC  (15+ messages)
` [PATCH 04/11] PCI/IDE: Selective Stream IDE enumeration
` [PATCH 08/11] PCI/IDE: Add IDE establishment helpers

[PATCH 0/3] Enlightened vTPM support for SVSM on SEV-SNP
 2025-01-14 23:12 UTC  (26+ messages)
` [PATCH 1/3] tpm: add generic platform device
` [PATCH 3/3] x86/sev: add a SVSM vTPM "

[PATCH v2 0/1] Accept unaccepted kexec segments' destination addresses
 2025-01-14 10:08 UTC  (8+ messages)
` [PATCH v2 1/1] kexec_core: "

[PATCH v3 0/2] SEV-SNP: Add KVM support for SNP certificate fetching
 2025-01-10  8:58 UTC  (5+ messages)
` [PATCH v3] KVM: Introduce KVM_EXIT_SNP_REQ_CERTS for SNP certificate-fetching

SVSM Development Call January 8th, 2025
 2025-01-09  7:58 UTC  (5+ messages)
` [svsm-devel] "

[Invitation] bi-weekly guest_memfd upstream call on 2024-11-14
 2025-01-08 10:45 UTC  (10+ messages)
` [Invitation] bi-weekly guest_memfd upstream call on 2024-12-05
  ` [Invitation] bi-weekly guest_memfd upstream call on 2024-12-12
    ` [Invitation] bi-weekly guest_memfd upstream call on 2025-01-09

[PATCH RFC v1 0/5] KVM: gmem: 2MB THP support and preparedness tracking changes
 2025-01-07 12:11 UTC  (3+ messages)

[PATCH v2 0/9] Move initializing SEV/SNP functionality to KVM
 2025-01-07  2:59 UTC  (32+ messages)
` [PATCH v2 1/9] crypto: ccp: Move dev_info/err messages for SEV/SNP initialization
` [PATCH v2 2/9] crypto: ccp: Fix implicit SEV/SNP init and shutdown in ioctls
` [PATCH v2 3/9] crypto: ccp: Reset TMR size at SNP Shutdown
` [PATCH v2 4/9] crypto: ccp: Register SNP panic notifier only if SNP is enabled
` [PATCH v2 5/9] crypto: ccp: Add new SEV platform shutdown API
` [PATCH v2 6/9] crypto: ccp: Add new SEV/SNP "
` [PATCH v2 7/9] crypto: ccp: Add new SEV/SNP platform initialization API
` [PATCH v2 8/9] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
` [PATCH v2 9/9] crypto: ccp: Move SEV/SNP Platform initialization to KVM

Confidential Computing - Kernel SIG meeting 2024/12/20 - Agenda items?
 2024-12-20 16:04 UTC  (2+ messages)

SVSM Development Call December 18th, 2024
 2024-12-19  8:46 UTC  (2+ messages)
` [svsm-devel] "

[PATCH v6 00/43] arm64: Support for Arm CCA in KVM
 2024-12-19  5:44 UTC  (36+ messages)
` [PATCH v6 03/43] arm64: RME: Handle Granule Protection Faults (GPFs)
` [PATCH v6 04/43] arm64: RME: Add SMC definitions for calling the RMM
` [PATCH v6 06/43] arm64: RME: Check for RME support at KVM init
` [PATCH v6 12/43] arm64: RME: Allocate/free RECs to match vCPUs
` [PATCH v6 18/43] KVM: arm64: Handle realm MMIO emulation
` [PATCH v6 19/43] arm64: RME: Allow populating initial contents
` [PATCH v6 20/43] arm64: RME: Runtime faulting of memory
` [PATCH v6 21/43] KVM: arm64: Handle realm VCPU load
` [PATCH v6 22/43] KVM: arm64: Validate register access for a Realm VM
` [PATCH v6 23/43] KVM: arm64: Handle Realm PSCI requests
` [PATCH v6 24/43] KVM: arm64: WARN on injected undef exceptions
` [PATCH v6 25/43] arm64: Don't expose stolen time for realm guests
` [PATCH v6 26/43] arm64: rme: allow userspace to inject aborts
` [PATCH v6 27/43] arm64: rme: support RSI_HOST_CALL
` [PATCH v6 28/43] arm64: rme: Allow checking SVE on VM instance
` [PATCH v6 29/43] arm64: RME: Always use 4k pages for realms
` [PATCH v6 30/43] arm64: rme: Prevent Device mappings for Realms
` [PATCH v6 31/43] arm_pmu: Provide a mechanism for disabling the physical IRQ
` [PATCH v6 32/43] arm64: rme: Enable PMU support with a realm guest
` [PATCH v6 33/43] kvm: rme: Hide KVM_CAP_READONLY_MEM for realm guests
` [PATCH v6 34/43] arm64: RME: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v6 35/43] arm64: RME: Set breakpoint parameters through SET_ONE_REG
` [PATCH v6 36/43] arm64: RME: Initialize PMCR.N with number counter supported by RMM
` [PATCH v6 37/43] arm64: RME: Propagate max SVE vector length from RMM
` [PATCH v6 38/43] arm64: RME: Configure max SVE vector length for a Realm
` [PATCH v6 39/43] arm64: RME: Provide register list for unfinalized RME RECs
` [PATCH v6 40/43] arm64: RME: Provide accurate register list
` [PATCH v6 41/43] arm64: kvm: Expose support for private memory
` [PATCH v6 42/43] KVM: arm64: Expose KVM_ARM_VCPU_REC to user space
` [PATCH v6 43/43] KVM: arm64: Allow activating realms


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).