messages from 2025-04-14 21:54:54 to 2025-05-01 13:31:19 UTC [more...]
[PATCH v8 00/43] arm64: Support for Arm CCA in KVM
2025-05-01 13:31 UTC (73+ messages)
` [PATCH v8 01/43] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h
` [PATCH v8 02/43] arm64: RME: Handle Granule Protection Faults (GPFs)
` [PATCH v8 03/43] arm64: RME: Add SMC definitions for calling the RMM
` [PATCH v8 04/43] arm64: RME: Add wrappers for RMI calls
` [PATCH v8 05/43] arm64: RME: Check for RME support at KVM init
` [PATCH v8 06/43] arm64: RME: Define the user ABI
` [PATCH v8 07/43] arm64: RME: ioctls to create and configure realms
` [PATCH v8 08/43] kvm: arm64: Don't expose debug capabilities for realm guests
` [PATCH v8 09/43] KVM: arm64: Allow passing machine type in KVM creation
` [PATCH v8 10/43] arm64: RME: RTT tear down
` [PATCH v8 11/43] arm64: RME: Allocate/free RECs to match vCPUs
` [PATCH v8 12/43] KVM: arm64: vgic: Provide helper for number of list registers
` [PATCH v8 13/43] arm64: RME: Support for the VGIC in realms
` [PATCH v8 14/43] KVM: arm64: Support timers in realm RECs
` [PATCH v8 15/43] arm64: RME: Allow VMM to set RIPAS
` [PATCH v8 16/43] arm64: RME: Handle realm enter/exit
` [PATCH v8 17/43] arm64: RME: Handle RMI_EXIT_RIPAS_CHANGE
` [PATCH v8 18/43] KVM: arm64: Handle realm MMIO emulation
` [PATCH v8 19/43] arm64: RME: Allow populating initial contents
` [PATCH v8 20/43] arm64: RME: Runtime faulting of memory
` [PATCH v8 21/43] KVM: arm64: Handle realm VCPU load
` [PATCH v8 22/43] KVM: arm64: Validate register access for a Realm VM
` [PATCH v8 23/43] KVM: arm64: Handle Realm PSCI requests
` [PATCH v8 24/43] KVM: arm64: WARN on injected undef exceptions
` [PATCH v8 25/43] arm64: Don't expose stolen time for realm guests
` [PATCH v8 26/43] arm64: RME: allow userspace to inject aborts
` [PATCH v8 27/43] arm64: RME: support RSI_HOST_CALL
` [PATCH v8 28/43] arm64: RME: Allow checking SVE on VM instance
` [PATCH v8 29/43] arm64: RME: Always use 4k pages for realms
` [PATCH v8 30/43] arm64: RME: Prevent Device mappings for Realms
` [PATCH v8 31/43] arm_pmu: Provide a mechanism for disabling the physical IRQ
` [PATCH v8 32/43] arm64: RME: Enable PMU support with a realm guest
` [PATCH v8 33/43] arm64: RME: Hide KVM_CAP_READONLY_MEM for realm guests
` [PATCH v8 34/43] arm64: RME: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v8 35/43] arm64: RME: Set breakpoint parameters through SET_ONE_REG
` [PATCH v8 36/43] arm64: RME: Initialize PMCR.N with number counter supported by RMM
` [PATCH v8 37/43] arm64: RME: Propagate max SVE vector length from RMM
` [PATCH v8 38/43] arm64: RME: Configure max SVE vector length for a Realm
` [PATCH v8 39/43] arm64: RME: Provide register list for unfinalized RME RECs
` [PATCH v8 40/43] arm64: RME: Provide accurate register list
` [PATCH v8 41/43] KVM: arm64: Expose support for private memory
` [PATCH v8 42/43] KVM: arm64: Expose KVM_ARM_VCPU_REC to user space
` [PATCH v8 43/43] KVM: arm64: Allow activating realms
[PATCH v4] x86/sev: Don't touch VMSA pages during kdump of SNP guest memory
2025-05-01 13:29 UTC (2+ messages)
[PATCH v5] Restrict devmem for confidential VMs
2025-05-01 8:12 UTC (9+ messages)
` [PATCH v5] x86/devmem: Remove duplicate range_is_allowed() definition
` [PATCH v5] x86/devmem: Drop /dev/mem access for confidential guests
[PATCH v3] x86/sev: Fix making shared pages private during kdump
2025-04-30 23:17 UTC
[PATCH] configfs-tsm-report: Fix NULL dereference of tsm_ops
2025-04-30 20:33 UTC (7+ messages)
` [PATCH v2] "
[PATCH v3 0/2] Restrict devmem for confidential VMs
2025-04-30 15:41 UTC (20+ messages)
` [PATCH v3 1/2] x86/devmem: Remove duplicate range_is_allowed() definition
` [PATCH v3 2/2] x86/devmem: Drop /dev/mem access for confidential guests
` [PATCH v4 "
[V2 PATCH 0/1][Bug Report] and Fix TDX cpuid0x2 #VE causing segment
2025-04-30 15:09 UTC (11+ messages)
` [V2 PATCH] x86/tdx: add VIRT_CPUID2 virtualization if REDUCE_VE was not successful
SNP guest crash in memblock with unaccepted memory
2025-04-30 14:39 UTC (8+ messages)
[PATCH v2] x86/sev: Fix making shared pages private during kdump
2025-04-30 13:31 UTC (3+ messages)
[PATCH v3] x86/sev: Do not touch VMSA pages during kdump of SNP guest memory
2025-04-30 12:47 UTC (4+ messages)
SVSM Development Call April 30th, 2025
2025-04-29 15:43 UTC
[PATCH v6 0/2] SEV-SNP: Add KVM support for SNP certificate fetching
2025-04-29 13:16 UTC (4+ messages)
` [PATCH v6 1/2] KVM: Introduce KVM_EXIT_SNP_REQ_CERTS for SNP certificate-fetching
` [PATCH v6 2/2] KVM: SEV: Add KVM_SEV_SNP_ENABLE_REQ_CERTS command
[Invitation] bi-weekly guest_memfd upstream call on 2025-05-01
2025-04-29 12:07 UTC
[RFC PATCH 00/12] Private MMIO support for private assigned dev
2025-04-29 7:50 UTC (3+ messages)
[PATCH 0/1][Bug Report] and fix TDX cpuid0x2 #VE causing segfault
2025-04-29 13:29 UTC (2+ messages)
` [PATCH 1/1] x86/tdx: add VIRT_CPUID2 virtualization if REDUCE_VE was not successful
Add devsec/tsm.git 'next' and 'fixes' branches to linux-next
2025-04-27 21:54 UTC (2+ messages)
[PATCH v2 00/11] PCI/TSM: Core infrastructure for PCI device security (TDISP)
2025-04-27 9:33 UTC (23+ messages)
` [PATCH v2 02/11] coco/guest: Move shared guest CC infrastructure to drivers/virt/coco/guest/
` [PATCH v2 04/11] PCI/IDE: Enumerate Selective Stream IDE capabilities
` [PATCH v2 05/11] PCI/TSM: Authenticate devices via platform TSM
` [PATCH v2 08/11] PCI/IDE: Add IDE establishment helpers
` [PATCH v2 09/11] PCI/IDE: Report available IDE streams
[PATCH v5 0/2] KVM: SEV: Add support for the ALLOWED_SEV_FEATURES feature
2025-04-25 23:23 UTC (2+ messages)
[PATCH v2] x86/sev: Fix SNP guest kdump hang/softlockup/panic
2025-04-24 20:23 UTC (5+ messages)
[PATCH v5 0/5] tsm-mr: Unified Measurement Register ABI for TVMs
2025-04-24 20:12 UTC (6+ messages)
` [PATCH v5 1/5] tsm-mr: Add TVM Measurement Register support
` [PATCH v5 2/5] tsm-mr: Add tsm-mr sample code
` [PATCH v5 3/5] x86/tdx: Add tdx_mcall_extend_rtmr() interface
` [PATCH v5 4/5] x86/tdx: tdx_mcall_get_report0: Return -EBUSY on TDCALL_OPERAND_BUSY error
` [PATCH v5 5/5] virt: tdx-guest: Expose TDX MRs as sysfs attributes
[PATCH] x86/sev: Fix making shared pages private during kdump
2025-04-24 19:27 UTC (3+ messages)
[RFC PATCH v2 00/22] TSM: Secure VFIO, TDISP, SEV TIO
2025-04-24 3:37 UTC (7+ messages)
` [RFC PATCH v2 06/22] KVM: X86: Define tsm_get_vmid
[PATCH RFC v1 0/5] KVM: gmem: 2MB THP support and preparedness tracking changes
2025-04-23 20:30 UTC (5+ messages)
` [PATCH 3/5] KVM: gmem: Hold filemap invalidate lock while allocating/preparing folios
[PATCH RFC v7 0/8] Add NUMA mempolicy support for KVM guest-memfd
2025-04-22 17:25 UTC (7+ messages)
` [PATCH RFC v7 3/8] security: Export security_inode_init_security_anon for KVM guest_memfd
[PATCH v2 06/11] samples/devsec: Introduce a PCI device-security
2025-04-22 15:45 UTC (5+ messages)
` [RESEND RFC PATCH 1/3] pci: ide: Fix build failure
` [RESEND RFC PATCH 3/3] samples: devsec: Add support for PCI_DOMAINS_GENERIC
[PATCH] x86/sev: Fix SNP guest kdump hang/softlockup/panic
2025-04-22 14:53 UTC (3+ messages)
SVSM Development Call April 16th, 2025
2025-04-17 9:05 UTC (2+ messages)
` [svsm-devel] "
[Invitation] bi-weekly guest_memfd upstream call on 2025-04-17
2025-04-17 7:14 UTC (4+ messages)
[PATCH v4 2/5] tsm-mr: Add tsm-mr sample code
2025-04-16 22:43 UTC (2+ messages)
Matrix room for COCONUT-SVSM
2025-04-16 9:38 UTC
[RFC PATCH v2 22/22] pci: Define pci_iomap_range_encrypted
2025-04-15 20:30 UTC (2+ messages)
[RFC PATCH v2 21/22] pci: Allow encrypted MMIO mapping via sysfs
2025-04-15 20:28 UTC (2+ messages)
[RFC PATCH v2 19/22] RFC: pci: Add BUS_NOTIFY_PCI_BUS_MASTER event
2025-04-15 20:26 UTC (2+ messages)
[RFC PATCH v2 08/22] pci/tsm: Add PCI driver for TSM
2025-04-15 20:25 UTC (2+ messages)
[RFC PATCH v2 01/22] pci/doe: Define protocol types and make those public
2025-04-15 20:15 UTC (2+ messages)
[PATCH v4 0/5] tsm-mr: Unified Measurement Register ABI for TVMs
2025-04-15 0:29 UTC (3+ messages)
` [PATCH v4 5/5] virt: tdx-guest: Expose TDX MRs as sysfs attributes
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).