messages from 2025-04-17 09:05:36 to 2025-05-06 12:44:07 UTC [more...]
[PATCH 0/2] mm/page_alloc: Fix couple of unaccepted memory issues
2025-05-06 12:43 UTC (4+ messages)
` [PATCH 1/2] mm/page_alloc: Ensure try_alloc_pages() plays well with unaccepted memory
` [PATCH 2/2] mm/page_alloc: Fix race condition in unaccepted memory handling
[RFC, PATCH 00/12] TDX: Enable Dynamic PAMT
2025-05-06 11:55 UTC (18+ messages)
` [RFC, PATCH 01/12] x86/virt/tdx: Allocate page bitmap for "
` [RFC, PATCH 02/12] x86/virt/tdx: Allocate reference counters for PAMT memory
` [RFC, PATCH 03/12] x86/virt/tdx: Add wrappers for TDH.PHYMEM.PAMT.ADD/REMOVE
` [RFC, PATCH 04/12] x86/virt/tdx: Account PAMT memory and print if in /proc/meminfo
` [RFC, PATCH 05/12] KVM: TDX: Add tdx_pamt_get()/put() helpers
` [RFC, PATCH 06/12] KVM: TDX: Allocate PAMT memory in __tdx_td_init()
` [RFC, PATCH 07/12] KVM: TDX: Allocate PAMT memory in tdx_td_vcpu_init()
` [RFC, PATCH 08/12] KVM: x86/tdp_mmu: Add phys_prepare() and phys_cleanup() to kvm_x86_ops
` [RFC, PATCH 09/12] KVM: TDX: Preallocate PAMT pages to be used in page fault path
` [RFC, PATCH 10/12] KVM: TDX: Hookup phys_prepare() and phys_cleanup() kvm_x86_ops
` [RFC, PATCH 11/12] KVM: TDX: Reclaim PAMT memory
` [RFC, PATCH 12/12] x86/virt/tdx: Enable Dynamic PAMT
[PATCH 0/6] x86/msr: let paravirt inline rdmsr/wrmsr instructions
2025-05-06 11:26 UTC (3+ messages)
` [PATCH 1/6] coco/tdx: Rename MSR access helpers
[PATCH AUTOSEL 6.14 083/642] x86/headers: Replace __ASSEMBLY__ with __ASSEMBLER__ in non-UAPI headers
2025-05-05 22:04 UTC
[PATCH v4] x86/sev: Fix making shared pages private during kdump
2025-05-05 21:49 UTC (3+ messages)
[PATCH v4.1] x86/sev: Fix making shared pages private during kdump
2025-05-04 6:26 UTC
[PATCH v3] x86/sev: Fix making shared pages private during kdump
2025-05-02 19:40 UTC (5+ messages)
[PATCH v4] x86/sev: Don't touch VMSA pages during kdump of SNP guest memory
2025-05-02 13:42 UTC (3+ messages)
[PATCH v8 00/43] arm64: Support for Arm CCA in KVM
2025-05-02 12:22 UTC (72+ messages)
` [PATCH v8 03/43] arm64: RME: Add SMC definitions for calling the RMM
` [PATCH v8 04/43] arm64: RME: Add wrappers for RMI calls
` [PATCH v8 05/43] arm64: RME: Check for RME support at KVM init
` [PATCH v8 06/43] arm64: RME: Define the user ABI
` [PATCH v8 07/43] arm64: RME: ioctls to create and configure realms
` [PATCH v8 08/43] kvm: arm64: Don't expose debug capabilities for realm guests
` [PATCH v8 09/43] KVM: arm64: Allow passing machine type in KVM creation
` [PATCH v8 11/43] arm64: RME: Allocate/free RECs to match vCPUs
` [PATCH v8 12/43] KVM: arm64: vgic: Provide helper for number of list registers
` [PATCH v8 13/43] arm64: RME: Support for the VGIC in realms
` [PATCH v8 14/43] KVM: arm64: Support timers in realm RECs
` [PATCH v8 15/43] arm64: RME: Allow VMM to set RIPAS
` [PATCH v8 16/43] arm64: RME: Handle realm enter/exit
` [PATCH v8 17/43] arm64: RME: Handle RMI_EXIT_RIPAS_CHANGE
` [PATCH v8 20/43] arm64: RME: Runtime faulting of memory
` [PATCH v8 22/43] KVM: arm64: Validate register access for a Realm VM
` [PATCH v8 27/43] arm64: RME: support RSI_HOST_CALL
` [PATCH v8 29/43] arm64: RME: Always use 4k pages for realms
` [PATCH v8 33/43] arm64: RME: Hide KVM_CAP_READONLY_MEM for realm guests
` [PATCH v8 34/43] arm64: RME: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v8 36/43] arm64: RME: Initialize PMCR.N with number counter supported by RMM
` [PATCH v8 37/43] arm64: RME: Propagate max SVE vector length from RMM
` [PATCH v8 38/43] arm64: RME: Configure max SVE vector length for a Realm
` [PATCH v8 39/43] arm64: RME: Provide register list for unfinalized RME RECs
` [PATCH v8 40/43] arm64: RME: Provide accurate register list
` [PATCH v8 41/43] KVM: arm64: Expose support for private memory
` [PATCH v8 42/43] KVM: arm64: Expose KVM_ARM_VCPU_REC to user space
` [PATCH v8 43/43] KVM: arm64: Allow activating realms
SVSM Development Call April 30th, 2025
2025-05-02 6:31 UTC (2+ messages)
` [svsm-devel] "
[PATCH 0/4] tsm: Unified Measurement Register ABI for TVMs
2025-05-02 1:45 UTC (11+ messages)
[PATCH v5 0/5] tsm-mr: Unified Measurement Register ABI for TVMs
2025-05-01 21:56 UTC (12+ messages)
` [PATCH v5 1/5] tsm-mr: Add TVM Measurement Register support
` [PATCH v5 2/5] tsm-mr: Add tsm-mr sample code
` [PATCH v5 3/5] x86/tdx: Add tdx_mcall_extend_rtmr() interface
` [PATCH v5 4/5] x86/tdx: tdx_mcall_get_report0: Return -EBUSY on TDCALL_OPERAND_BUSY error
` [PATCH v5 5/5] virt: tdx-guest: Expose TDX MRs as sysfs attributes
[PATCH v5] Restrict devmem for confidential VMs
2025-05-01 20:18 UTC (11+ messages)
` [PATCH v5] x86/devmem: Remove duplicate range_is_allowed() definition
` [PATCH v5] x86/devmem: Drop /dev/mem access for confidential guests
[PATCH] configfs-tsm-report: Fix NULL dereference of tsm_ops
2025-04-30 20:33 UTC (7+ messages)
` [PATCH v2] "
[PATCH v3 0/2] Restrict devmem for confidential VMs
2025-04-30 15:41 UTC (20+ messages)
` [PATCH v3 1/2] x86/devmem: Remove duplicate range_is_allowed() definition
` [PATCH v3 2/2] x86/devmem: Drop /dev/mem access for confidential guests
` [PATCH v4 "
[V2 PATCH 0/1][Bug Report] and Fix TDX cpuid0x2 #VE causing segment
2025-04-30 15:09 UTC (11+ messages)
` [V2 PATCH] x86/tdx: add VIRT_CPUID2 virtualization if REDUCE_VE was not successful
SNP guest crash in memblock with unaccepted memory
2025-04-30 14:39 UTC (8+ messages)
[PATCH v2] x86/sev: Fix making shared pages private during kdump
2025-04-30 13:31 UTC (3+ messages)
[PATCH v3] x86/sev: Do not touch VMSA pages during kdump of SNP guest memory
2025-04-30 12:47 UTC (4+ messages)
[PATCH v6 0/2] SEV-SNP: Add KVM support for SNP certificate fetching
2025-04-29 13:16 UTC (4+ messages)
` [PATCH v6 1/2] KVM: Introduce KVM_EXIT_SNP_REQ_CERTS for SNP certificate-fetching
` [PATCH v6 2/2] KVM: SEV: Add KVM_SEV_SNP_ENABLE_REQ_CERTS command
[Invitation] bi-weekly guest_memfd upstream call on 2025-05-01
2025-04-29 12:07 UTC
[RFC PATCH 00/12] Private MMIO support for private assigned dev
2025-04-29 7:50 UTC (3+ messages)
[PATCH 0/1][Bug Report] and fix TDX cpuid0x2 #VE causing segfault
2025-04-29 13:29 UTC (2+ messages)
` [PATCH 1/1] x86/tdx: add VIRT_CPUID2 virtualization if REDUCE_VE was not successful
Add devsec/tsm.git 'next' and 'fixes' branches to linux-next
2025-04-27 21:54 UTC (2+ messages)
[PATCH v2 00/11] PCI/TSM: Core infrastructure for PCI device security (TDISP)
2025-04-27 9:33 UTC (23+ messages)
` [PATCH v2 02/11] coco/guest: Move shared guest CC infrastructure to drivers/virt/coco/guest/
` [PATCH v2 04/11] PCI/IDE: Enumerate Selective Stream IDE capabilities
` [PATCH v2 05/11] PCI/TSM: Authenticate devices via platform TSM
` [PATCH v2 08/11] PCI/IDE: Add IDE establishment helpers
` [PATCH v2 09/11] PCI/IDE: Report available IDE streams
[PATCH v5 0/2] KVM: SEV: Add support for the ALLOWED_SEV_FEATURES feature
2025-04-25 23:23 UTC (2+ messages)
[PATCH v2] x86/sev: Fix SNP guest kdump hang/softlockup/panic
2025-04-24 20:23 UTC (5+ messages)
[PATCH] x86/sev: Fix making shared pages private during kdump
2025-04-24 19:27 UTC (3+ messages)
[RFC PATCH v2 00/22] TSM: Secure VFIO, TDISP, SEV TIO
2025-04-24 3:37 UTC (7+ messages)
` [RFC PATCH v2 06/22] KVM: X86: Define tsm_get_vmid
[PATCH RFC v1 0/5] KVM: gmem: 2MB THP support and preparedness tracking changes
2025-04-23 20:30 UTC (5+ messages)
` [PATCH 3/5] KVM: gmem: Hold filemap invalidate lock while allocating/preparing folios
[PATCH RFC v7 0/8] Add NUMA mempolicy support for KVM guest-memfd
2025-04-22 17:25 UTC (7+ messages)
` [PATCH RFC v7 3/8] security: Export security_inode_init_security_anon for KVM guest_memfd
[PATCH v2 06/11] samples/devsec: Introduce a PCI device-security
2025-04-22 15:45 UTC (5+ messages)
` [RESEND RFC PATCH 1/3] pci: ide: Fix build failure
` [RESEND RFC PATCH 3/3] samples: devsec: Add support for PCI_DOMAINS_GENERIC
[PATCH] x86/sev: Fix SNP guest kdump hang/softlockup/panic
2025-04-22 14:53 UTC (3+ messages)
SVSM Development Call April 16th, 2025
2025-04-17 9:05 UTC (2+ messages)
` [svsm-devel] "
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox