messages from 2025-02-05 19:31:57 to 2025-02-18 11:17:51 UTC [more...]
[RFC PATCH v2 00/22] TSM: Secure VFIO, TDISP, SEV TIO
2025-02-18 11:10 UTC (22+ messages)
` [RFC PATCH v2 01/22] pci/doe: Define protocol types and make those public
` [RFC PATCH v2 02/22] PCI/IDE: Fixes to make it work on AMD SNP-SEV
` [RFC PATCH v2 03/22] PCI/IDE: Init IDs on all IDE streams beforehand
` [RFC PATCH v2 04/22] iommu/amd: Report SEV-TIO support
` [RFC PATCH v2 05/22] crypto: ccp: Enable SEV-TIO feature in the PSP when supported
` [RFC PATCH v2 06/22] KVM: X86: Define tsm_get_vmid
` [RFC PATCH v2 07/22] coco/tsm: Add tsm and tsm-host modules
` [RFC PATCH v2 08/22] pci/tsm: Add PCI driver for TSM
` [RFC PATCH v2 09/22] crypto/ccp: Implement SEV TIO firmware interface
` [RFC PATCH v2 10/22] KVM: SVM: Add uAPI to change RMP for MMIO
` [RFC PATCH v2 11/22] KVM: SEV: Add TIO VMGEXIT
` [RFC PATCH v2 12/22] iommufd: Allow mapping from guest_memfd
` [RFC PATCH v2 13/22] iommufd: amd-iommu: Add vdevice support
` [RFC PATCH v2 14/22] iommufd: Add TIO calls
` [RFC PATCH v2 15/22] KVM: X86: Handle private MMIO as shared
` [RFC PATCH v2 16/22] coco/tsm: Add tsm-guest module
` [RFC PATCH v2 17/22] resource: Mark encrypted MMIO resource on validation
` [RFC PATCH v2 18/22] coco/sev-guest: Implement the guest support for SEV TIO
` [RFC PATCH v2 19/22] RFC: pci: Add BUS_NOTIFY_PCI_BUS_MASTER event
` [RFC PATCH v2 20/22] sev-guest: Stop changing encrypted page state for TDISP devices
` [RFC PATCH v2 21/22] pci: Allow encrypted MMIO mapping via sysfs
[PATCH 0/4] tsm: Unified Measurement Register ABI for TVMs
2025-02-18 9:14 UTC (23+ messages)
` [PATCH 1/4] tsm: Add TVM Measurement Register support
` [PATCH 2/4] tsm: Add TSM measurement sample code
` [PATCH 3/4] x86/tdx: Add tdx_mcall_rtmr_extend() interface
` [PATCH 4/4] x86/tdx: Expose TDX MRs through TSM sysfs interface
[Invitation] bi-weekly guest_memfd upstream call on 2025-02-20
2025-02-18 8:39 UTC
[RFC PATCH v4 0/3] Add NUMA mempolicy support for KVM guest-memfd
2025-02-17 19:52 UTC (12+ messages)
` [RFC PATCH v4 1/3] mm/filemap: add mempolicy support to the filemap layer
` [RFC PATCH v4 2/3] mm/mempolicy: export memory policy symbols
` [RFC PATCH v4 3/3] KVM: guest_memfd: Enforce NUMA mempolicy using shared policy
[PATCH v4 0/3] Fix broken SNP support with KVM module built-in
2025-02-14 23:38 UTC (7+ messages)
` [PATCH v4 1/3] crypto: ccp: Add external API interface for PSP module initialization
` [PATCH v4 2/3] KVM: SVM: Ensure PSP module is initialized if KVM module is built-in
` [PATCH v4 3/3] x86/sev: Fix broken SNP support with KVM module built-in
[PATCH v2 0/1] Accept unaccepted kexec segments' destination addresses
2025-02-14 16:20 UTC (10+ messages)
` [PATCH v2 1/1] kexec_core: "
Collecting Open Questions from the Linux Kernel SIG Call
2025-02-14 13:54 UTC (2+ messages)
[PATCH v7 00/45] arm64: Support for Arm CCA in KVM
2025-02-14 13:09 UTC (47+ messages)
` [PATCH v7 01/45] KVM: Prepare for handling only shared mappings in mmu_notifier events
` [PATCH v7 02/45] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h
` [PATCH v7 03/45] arm64: RME: Handle Granule Protection Faults (GPFs)
` [PATCH v7 04/45] arm64: RME: Add SMC definitions for calling the RMM
` [PATCH v7 05/45] arm64: RME: Add wrappers for RMI calls
` [PATCH v7 06/45] arm64: RME: Check for RME support at KVM init
` [PATCH v7 07/45] arm64: RME: Define the user ABI
` [PATCH v7 08/45] arm64: RME: ioctls to create and configure realms
` [PATCH v7 09/45] kvm: arm64: Expose debug HW register numbers for Realm
` [PATCH v7 10/45] arm64: kvm: Allow passing machine type in KVM creation
` [PATCH v7 11/45] arm64: RME: RTT tear down
` [PATCH v7 12/45] arm64: RME: Allocate/free RECs to match vCPUs
` [PATCH v7 13/45] KVM: arm64: vgic: Provide helper for number of list registers
` [PATCH v7 14/45] arm64: RME: Support for the VGIC in realms
` [PATCH v7 15/45] KVM: arm64: Support timers in realm RECs
` [PATCH v7 16/45] arm64: RME: Allow VMM to set RIPAS
` [PATCH v7 17/45] arm64: RME: Handle realm enter/exit
` [PATCH v7 18/45] arm64: RME: Handle RMI_EXIT_RIPAS_CHANGE
` [PATCH v7 19/45] KVM: arm64: Handle realm MMIO emulation
` [PATCH v7 20/45] arm64: RME: Allow populating initial contents
` [PATCH v7 21/45] arm64: RME: Runtime faulting of memory
` [PATCH v7 22/45] KVM: arm64: Handle realm VCPU load
` [PATCH v7 23/45] KVM: arm64: Validate register access for a Realm VM
` [PATCH v7 24/45] KVM: arm64: Handle Realm PSCI requests
` [PATCH v7 25/45] KVM: arm64: WARN on injected undef exceptions
` [PATCH v7 26/45] arm64: Don't expose stolen time for realm guests
` [PATCH v7 27/45] arm64: rme: allow userspace to inject aborts
` [PATCH v7 28/45] arm64: rme: support RSI_HOST_CALL
` [PATCH v7 29/45] arm64: rme: Allow checking SVE on VM instance
` [PATCH v7 30/45] arm64: RME: Always use 4k pages for realms
` [PATCH v7 31/45] arm64: rme: Prevent Device mappings for Realms
` [PATCH v7 32/45] arm_pmu: Provide a mechanism for disabling the physical IRQ
` [PATCH v7 33/45] arm64: rme: Enable PMU support with a realm guest
` [PATCH v7 34/45] kvm: rme: Hide KVM_CAP_READONLY_MEM for realm guests
` [PATCH v7 35/45] arm64: RME: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v7 36/45] arm64: RME: Set breakpoint parameters through SET_ONE_REG
` [PATCH v7 37/45] arm64: RME: Initialize PMCR.N with number counter supported by RMM
` [PATCH v7 38/45] arm64: RME: Propagate max SVE vector length from RMM
` [PATCH v7 39/45] arm64: RME: Configure max SVE vector length for a Realm
` [PATCH v7 40/45] arm64: RME: Provide register list for unfinalized RME RECs
` [PATCH v7 41/45] arm64: RME: Provide accurate register list
` [PATCH v7 42/45] arm64: kvm: Expose support for private memory
` [PATCH v7 43/45] KVM: arm64: Expose KVM_ARM_VCPU_REC to user space
` [PATCH v7 44/45] KVM: arm64: Allow activating realms
` [PATCH v7 45/45] WIP: Enable support for PAGE_SIZE>4k
[PATCH V4 0/4] x86/tdx: Route safe halt execution via tdx_safe_halt()
2025-02-13 17:40 UTC (9+ messages)
` [PATCH V4 1/4] x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT
` [PATCH V4 2/4] x86/tdx: Route safe halt execution via tdx_safe_halt()
` [PATCH V4 3/4] x86/tdx: Emit warning if IRQs are enabled during HLT #VE handling
` [PATCH V4 4/4] x86/tdx: Remove TDX specific idle routine
Confidential Computing MC-like workshop in May?
2025-02-13 9:12 UTC (2+ messages)
` [svsm-devel] "
SVSM Development Call February 12th, 2025
2025-02-13 9:00 UTC (2+ messages)
` [svsm-devel] "
CCC Kernel SIG Meeting February 13th, 9am PST
2025-02-13 8:03 UTC
[PATCH v2] x86/virt/tdx: Correct the errors in the comments
2025-02-13 5:56 UTC
[PATCH 00/10] Annotate arguments of memtostr/strtomem with __nonstring
2025-02-13 3:04 UTC (17+ messages)
` [PATCH 01/10] scsi: mptfusion: Mark device strings as nonstring
` [PATCH 02/10] scsi: mpi3mr: "
` [PATCH 03/10] scsi: mpt3sas: "
` [PATCH 04/10] scsi: qla2xxx: "
` [PATCH 05/10] string: kunit: Mark nonstring test strings as __nonstring
` [PATCH 06/10] x86/tdx: Mark message.str as nonstring
` [PATCH 07/10] uapi: stddef.h: Introduce __kernel_nonstring
` [PATCH 08/10] nilfs2: Mark on-disk strings as nonstring
` [PATCH 09/10] compiler.h: Introduce __must_be_noncstr()
` [PATCH 10/10] string.h: Validate memtostr*()/strtomem*() arguments more carefully
[PATCH 00/16] x86/tsc: Try to wrangle PV clocks vs. TSC
2025-02-12 22:55 UTC (20+ messages)
` [PATCH 01/16] x86/tsc: Add a standalone helpers for getting TSC info from CPUID.0x15
` [PATCH 03/16] x86/tsc: Add helper to register CPU and TSC freq calibration routines
` [PATCH 16/16] x86/kvmclock: Use TSC for sched_clock if it's constant and non-stop
[PATCH] x86/virt/tdx: Correct the errors in the comments
2025-02-12 22:09 UTC (3+ messages)
Kernel SIG meeting 2/13 - Agenda: Guest to SVSM, Other items
2025-02-12 19:37 UTC
[PATCH v2 00/18] PCI device authentication
2025-02-12 16:36 UTC (5+ messages)
[PATCH V3 1/2] x86/tdx: Route safe halt execution via tdx_safe_halt()
2025-02-12 0:22 UTC (8+ messages)
` [PATCH V3 2/2] x86/tdx: Emit warning if IRQs are enabled during HLT #VE handling
[PATCH 00/11] PCI/TSM: Core infrastructure for PCI device security (TDISP)
2025-02-11 6:10 UTC (3+ messages)
` [PATCH 09/11] PCI/IDE: Report available IDE streams
[PATCH RFC v1 0/5] KVM: gmem: 2MB THP support and preparedness tracking changes
2025-02-11 1:16 UTC (2+ messages)
[PATCH v6 00/43] arm64: Support for Arm CCA in KVM
2025-02-10 11:58 UTC (26+ messages)
` [PATCH v6 20/43] arm64: RME: Runtime faulting of memory
` [PATCH v6 22/43] KVM: arm64: Validate register access for a Realm VM
` [PATCH v6 25/43] arm64: Don't expose stolen time for realm guests
` [PATCH v6 27/43] arm64: rme: support RSI_HOST_CALL
` [PATCH v6 28/43] arm64: rme: Allow checking SVE on VM instance
` [PATCH v6 29/43] arm64: RME: Always use 4k pages for realms
` [PATCH v6 30/43] arm64: rme: Prevent Device mappings for Realms
` [PATCH v6 32/43] arm64: rme: Enable PMU support with a realm guest
[PATCH v3 0/3] Fix broken SNP support with KVM module built-in
2025-02-08 4:52 UTC (15+ messages)
` [PATCH v3 1/3] crypto: ccp: Add external API interface for PSP module initialization
` [PATCH v3 2/3] KVM: SVM: Ensure PSP module is initialized if KVM module is built-in
` [PATCH v3 3/3] x86/sev: Fix broken SNP support with KVM module built-in
SVSM Development Call February 5th, 2025
2025-02-06 8:26 UTC (2+ messages)
` [svsm-devel] "
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).