messages from 2025-02-27 10:45:53 to 2025-03-07 15:43:58 UTC [more...]
[PATCH v7 00/45] arm64: Support for Arm CCA in KVM
2025-03-07 15:43 UTC (70+ messages)
` [PATCH v7 01/45] KVM: Prepare for handling only shared mappings in mmu_notifier events
` [PATCH v7 02/45] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h
` [PATCH v7 03/45] arm64: RME: Handle Granule Protection Faults (GPFs)
` [PATCH v7 05/45] arm64: RME: Add wrappers for RMI calls
` [PATCH v7 06/45] arm64: RME: Check for RME support at KVM init
` [PATCH v7 07/45] arm64: RME: Define the user ABI
` [PATCH v7 08/45] arm64: RME: ioctls to create and configure realms
` [PATCH v7 09/45] kvm: arm64: Expose debug HW register numbers for Realm
` [PATCH v7 10/45] arm64: kvm: Allow passing machine type in KVM creation
` [PATCH v7 11/45] arm64: RME: RTT tear down
` [PATCH v7 12/45] arm64: RME: Allocate/free RECs to match vCPUs
` [PATCH v7 14/45] arm64: RME: Support for the VGIC in realms
` [PATCH v7 15/45] KVM: arm64: Support timers in realm RECs
` [PATCH v7 16/45] arm64: RME: Allow VMM to set RIPAS
` [PATCH v7 17/45] arm64: RME: Handle realm enter/exit
` [PATCH v7 18/45] arm64: RME: Handle RMI_EXIT_RIPAS_CHANGE
` [PATCH v7 19/45] KVM: arm64: Handle realm MMIO emulation
` [PATCH v7 20/45] arm64: RME: Allow populating initial contents
` [PATCH v7 22/45] KVM: arm64: Handle realm VCPU load
` [PATCH v7 23/45] KVM: arm64: Validate register access for a Realm VM
` [PATCH v7 24/45] KVM: arm64: Handle Realm PSCI requests
` [PATCH v7 25/45] KVM: arm64: WARN on injected undef exceptions
` [PATCH v7 26/45] arm64: Don't expose stolen time for realm guests
` [PATCH v7 27/45] arm64: rme: allow userspace to inject aborts
` [PATCH v7 28/45] arm64: rme: support RSI_HOST_CALL
` [PATCH v7 29/45] arm64: rme: Allow checking SVE on VM instance
` [PATCH v7 30/45] arm64: RME: Always use 4k pages for realms
` [PATCH v7 31/45] arm64: rme: Prevent Device mappings for Realms
` [PATCH v7 34/45] kvm: rme: Hide KVM_CAP_READONLY_MEM for realm guests
` [PATCH v7 35/45] arm64: RME: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v7 36/45] arm64: RME: Set breakpoint parameters through SET_ONE_REG
[RFC PATCH v2 0/6] Enlightened vTPM support for SVSM on SEV-SNP
2025-03-07 15:37 UTC (34+ messages)
` [RFC PATCH v2 1/6] x86/sev: add SVSM call macros for the vTPM protocol
` [RFC PATCH v2 2/6] x86/sev: add SVSM vTPM probe/send_command functions
` [RFC PATCH v2 3/6] tpm: add send_recv() ops in tpm_class_ops
` [RFC PATCH v2 4/6] tpm: add interface to interact with devices based on TCG Simulator
` [RFC PATCH v2 6/6] x86/sev: register tpm-svsm platform device
` [RFC PATCH v2 5/6] tpm: add SNP SVSM vTPM driver
[RFC PATCH v2 00/22] TSM: Secure VFIO, TDISP, SEV TIO
2025-03-07 15:17 UTC (22+ messages)
` [RFC PATCH v2 14/22] iommufd: Add TIO calls
` [RFC PATCH v2 20/22] sev-guest: Stop changing encrypted page state for TDISP devices
[PATCHv3] kexec_core: Accept unaccepted kexec segments' destination addresses
2025-03-07 8:44 UTC
[PATCH 00/11] PCI/TSM: Core infrastructure for PCI device security (TDISP)
2025-03-07 3:07 UTC (47+ messages)
` [PATCH 04/11] PCI/IDE: Selective Stream IDE enumeration
` [PATCH 05/11] PCI/TSM: Authenticate devices via platform TSM
` [PATCH 08/11] PCI/IDE: Add IDE establishment helpers
` [PATCH 09/11] PCI/IDE: Report available IDE streams
` [PATCH 11/11] samples/devsec: Add sample IDE establishment
[PATCH v6 0/8] Move initializing SEV/SNP functionality to KVM
2025-03-06 23:11 UTC (9+ messages)
` [PATCH v6 1/8] crypto: ccp: Abort doing SEV INIT if SNP INIT fails
` [PATCH v6 2/8] crypto: ccp: Move dev_info/err messages for SEV/SNP init and shutdown
` [PATCH v6 3/8] crypto: ccp: Ensure implicit SEV/SNP init and shutdown in ioctls
` [PATCH v6 4/8] crypto: ccp: Reset TMR size at SNP Shutdown
` [PATCH v6 5/8] crypto: ccp: Register SNP panic notifier only if SNP is enabled
` [PATCH v6 6/8] crypto: ccp: Add new SEV/SNP platform shutdown API
` [PATCH v6 7/8] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
` [PATCH v6 8/8] crypto: ccp: Move SEV/SNP Platform initialization to KVM
[PATCH v4 0/2] KVM: SEV: Add support for the ALLOWED_SEV_FEATURES feature
2025-03-06 23:04 UTC (9+ messages)
` [PATCH v4 1/2] x86/cpufeatures: Add "Allowed SEV Features" Feature
` [PATCH v4 2/2] KVM: SEV: Configure "ALLOWED_SEV_FEATURES" VMCB Field
SVSM Development Call March 5th, 2025
2025-03-06 8:55 UTC (2+ messages)
` [svsm-devel] "
[PATCH v2 0/4] tsm: Unified Measurement Register ABI for TVMs
2025-03-06 1:20 UTC (4+ messages)
` [PATCH v2 1/4] tsm: Add TVM Measurement Register support
[PATCH v5 0/7] Move initializing SEV/SNP functionality to KVM
2025-03-05 22:17 UTC (20+ messages)
` [PATCH v5 1/7] crypto: ccp: Move dev_info/err messages for SEV/SNP init and shutdown
` [PATCH v5 2/7] crypto: ccp: Ensure implicit SEV/SNP init and shutdown in ioctls
` [PATCH v5 4/7] crypto: ccp: Register SNP panic notifier only if SNP is enabled
` [PATCH v5 6/7] KVM: SVM: Add support to initialize SEV/SNP functionality in KVM
` [PATCH v5 7/7] crypto: ccp: Move SEV/SNP Platform initialization to KVM
[PATCH v2 00/11] PCI/TSM: Core infrastructure for PCI device security (TDISP)
2025-03-05 12:32 UTC (17+ messages)
` [PATCH v2 01/11] configfs-tsm: Namespace TSM report symbols
` [PATCH v2 02/11] coco/guest: Move shared guest CC infrastructure to drivers/virt/coco/guest/
` [PATCH v2 03/11] coco/tsm: Introduce a core device for TEE Security Managers
` [PATCH v2 04/11] PCI/IDE: Enumerate Selective Stream IDE capabilities
` [PATCH v2 05/11] PCI/TSM: Authenticate devices via platform TSM
` [PATCH v2 06/11] samples/devsec: Introduce a PCI device-security bus + endpoint sample
` [PATCH v2 07/11] PCI: Add PCIe Device 3 Extended Capability enumeration
` [PATCH v2 08/11] PCI/IDE: Add IDE establishment helpers
` [PATCH v2 09/11] PCI/IDE: Report available IDE streams
` [PATCH v2 10/11] PCI/TSM: Report active "
` [PATCH v2 11/11] samples/devsec: Add sample IDE establishment
[PATCH v6 0/5] Add NUMA mempolicy support for KVM guest-memfd
2025-03-05 6:10 UTC (5+ messages)
` [PATCH v6 1/5] mm/filemap: add mempolicy support to the filemap layer
[PATCH v6 4/5] KVM: guest_memfd: Enforce NUMA mempolicy using shared policy
2025-03-05 6:02 UTC (8+ messages)
[PATCH v2 0/1] Accept unaccepted kexec segments' destination addresses
2025-03-04 23:54 UTC (13+ messages)
SVSM_VTPM_CMD Call question
2025-03-04 18:25 UTC (2+ messages)
[PATCH v2 00/38] x86: Try to wrangle PV clocks vs. TSC
2025-03-04 17:39 UTC (18+ messages)
` [PATCH v2 03/38] x86/tsc: Add helper to register CPU and TSC freq calibration routines
` [PATCH v2 06/38] x86/tdx: Override PV calibration routines with CPUID-based calibration
` [PATCH v2 08/38] clocksource: hyper-v: Register sched_clock save/restore iff it's necessary
` [PATCH v2 09/38] clocksource: hyper-v: Drop wrappers to sched_clock save/restore helpers
` [PATCH v2 10/38] clocksource: hyper-v: Don't save/restore TSC offset when using HV sched_clock
` [PATCH v2 30/38] x86/paravirt: Don't use a PV sched_clock in CoCo guests with trusted TSC
` [PATCH v2 31/38] x86/tsc: Pass KNOWN_FREQ and RELIABLE as params to registration
[Invitation] bi-weekly guest_memfd upstream call on 2025-03-06
2025-03-04 11:58 UTC
[PATCH V5 0/4] x86/tdx: Fix HLT logic execution for TDX VMs
2025-03-03 9:54 UTC (4+ messages)
` [PATCH V5 1/4] x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT
[PATCH v7 0/3] x86/tdx: Fix HLT logic execution for TDX VMs
2025-02-28 1:44 UTC (4+ messages)
` [PATCH v7 1/3] x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT
` [PATCH v7 2/3] x86/tdx: Fix arch_safe_halt() execution for TDX VMs
` [PATCH v7 3/3] x86/tdx: Emit warning if IRQs are enabled during HLT #VE handling
[PATCH 07/11] PCI: Add PCIe Device 3 Extended Capability enumeration
2025-02-28 0:29 UTC (5+ messages)
[PATCH v7 00/11] arm64: Support for running as a guest in Arm CCA
2025-02-27 21:21 UTC (9+ messages)
` [PATCH v7 09/11] arm64: Enable memory encrypt for Realms
[PATCH v6 0/3] x86/tdx: Fix HLT logic execution for TDX VMs
2025-02-27 19:30 UTC (6+ messages)
` [PATCH v6 2/3] x86/tdx: Fix arch_safe_halt() "
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).