messages from 2025-05-02 13:08:43 to 2025-05-19 08:38:37 UTC [more...]
Linux kernel SIG meeting for vwfwupdate discussion
2025-05-19 8:37 UTC (5+ messages)
[RFC, PATCH 00/12] TDX: Enable Dynamic PAMT
2025-05-19 5:06 UTC (56+ messages)
` [RFC, PATCH 01/12] x86/virt/tdx: Allocate page bitmap for "
` [RFC, PATCH 02/12] x86/virt/tdx: Allocate reference counters for PAMT memory
` [RFC, PATCH 03/12] x86/virt/tdx: Add wrappers for TDH.PHYMEM.PAMT.ADD/REMOVE
` [RFC, PATCH 04/12] x86/virt/tdx: Account PAMT memory and print if in /proc/meminfo
` [RFC, PATCH 05/12] KVM: TDX: Add tdx_pamt_get()/put() helpers
` [RFC, PATCH 06/12] KVM: TDX: Allocate PAMT memory in __tdx_td_init()
` [RFC, PATCH 07/12] KVM: TDX: Allocate PAMT memory in tdx_td_vcpu_init()
` [RFC, PATCH 08/12] KVM: x86/tdp_mmu: Add phys_prepare() and phys_cleanup() to kvm_x86_ops
` [RFC, PATCH 09/12] KVM: TDX: Preallocate PAMT pages to be used in page fault path
` [RFC, PATCH 10/12] KVM: TDX: Hookup phys_prepare() and phys_cleanup() kvm_x86_ops
` [RFC, PATCH 11/12] KVM: TDX: Reclaim PAMT memory
` [RFC, PATCH 12/12] x86/virt/tdx: Enable Dynamic PAMT
[PATCH v3 00/13] PCI/TSM: Core infrastructure for PCI device security (TDISP)
2025-05-18 12:48 UTC (16+ messages)
` [PATCH v3 01/13] coco/tsm: Introduce a core device for TEE Security Managers
` [PATCH v3 02/13] PCI/IDE: Enumerate Selective Stream IDE capabilities
` [PATCH v3 03/13] PCI/TSM: Authenticate devices via platform TSM
` [PATCH v3 04/13] PCI: Enable host-bridge emulation for PCI_DOMAINS_GENERIC platforms
` [PATCH v3 05/13] PCI: vmd: Switch to pci_bus_find_emul_domain_nr()
` [PATCH v3 06/13] samples/devsec: Introduce a PCI device-security bus + endpoint sample
` [PATCH v3 07/13] PCI: Add PCIe Device 3 Extended Capability enumeration
` [PATCH v3 08/13] PCI/IDE: Add IDE establishment helpers
` [PATCH v3 09/13] PCI/IDE: Report available IDE streams
` [PATCH v3 10/13] PCI/TSM: Report active "
` [PATCH v3 11/13] samples/devsec: Add sample IDE establishment
` [PATCH v3 12/13] PCI/TSM: support TDI related operations for host TSM driver
` [PATCH v3 13/13] PCI/TSM: Add Guest TSM Support
[RFC PATCH 00/12] Private MMIO support for private assigned dev
2025-05-17 2:33 UTC (27+ messages)
[PATCH v5 0/2] kvm: sev: Add SNP guest request throttling
2025-05-17 0:37 UTC (6+ messages)
` [PATCH v5 1/2] kvm: sev: Add SEV-SNP "
` [PATCH v5 2/2] kvm: sev: If ccp is busy, report busy to guest
[PATCH v8 00/43] arm64: Support for Arm CCA in KVM
2025-05-16 16:00 UTC (26+ messages)
` [PATCH v8 13/43] arm64: RME: Support for the VGIC in realms
` [PATCH v8 15/43] arm64: RME: Allow VMM to set RIPAS
` [PATCH v8 16/43] arm64: RME: Handle realm enter/exit
` [PATCH v8 17/43] arm64: RME: Handle RMI_EXIT_RIPAS_CHANGE
` [PATCH v8 20/43] arm64: RME: Runtime faulting of memory
[PATCH v4 0/2] kvm: sev: Add SNP guest request throttling
2025-05-15 18:21 UTC (7+ messages)
` [PATCH v4 1/2] kvm: sev: Add SEV-SNP "
` [PATCH v4 2/2] kvm: sev: If ccp is busy, report busy to guest
` [PATCH v4 2/2] The ccp driver can be overloaded even with guest request rate limits. The return value of -EBUSY means that there is no firmware error to report back to user space, so the guest VM would see this as exitinfo2 = 0. The false success can trick the guest to update its message sequence number when it shouldn't have
SVSM Development Call May 14th, 2025
2025-05-15 10:08 UTC (2+ messages)
[Overview] guest_memfd extensions and dependencies 2025-05-15
2025-05-15 9:58 UTC
[PATCH v6 0/7] tsm-mr: Unified Measurement Register ABI for TVMs
2025-05-15 8:39 UTC (13+ messages)
` [PATCH v6 1/7] tsm-mr: Add TVM Measurement Register support
` [PATCH v7 "
` [PATCH v8 "
` [PATCH v6 2/7] tsm-mr: Add tsm-mr sample code
` [PATCH v6 3/7] x86/tdx: Add tdx_mcall_extend_rtmr() interface
` [PATCH v6 4/7] x86/tdx: tdx_mcall_get_report0: Return -EBUSY on TDCALL_OPERAND_BUSY error
` [PATCH v6 5/7] virt: tdx-guest: Expose TDX MRs as sysfs attributes
` [PATCH v7 "
` [PATCH v6 6/7] virt: tdx-guest: Refactor and streamline TDREPORT generation
` [PATCH v6 7/7] virt: tdx-guest: Transition to scoped_cond_guard for mutex operations
[RFC PATCH v2 00/22] TSM: Secure VFIO, TDISP, SEV TIO
2025-05-15 8:18 UTC (5+ messages)
` [RFC PATCH v2 07/22] coco/tsm: Add tsm and tsm-host modules
` [RFC PATCH v2 15/22] KVM: X86: Handle private MMIO as shared
[Invitation] bi-weekly guest_memfd upstream call on 2025-05-15
2025-05-14 13:12 UTC
[PATCH 0/2] Allow individual features to be locked down
2025-05-13 23:07 UTC (7+ messages)
[PATCH] MAINTAINERS: rectify file entries in TRUSTED SECURITY MODULE (TSM) INFRASTRUCTURE
2025-05-13 18:48 UTC (2+ messages)
[PATCH] sample/tsm-mr: Fix missing static for sample_report
2025-05-13 18:38 UTC (2+ messages)
[PATCH v5] x86/sev: Fix making shared pages private during kdump
2025-05-13 12:02 UTC (4+ messages)
[PATCH v2 00/11] PCI/TSM: Core infrastructure for PCI device security (TDISP)
2025-05-13 10:18 UTC (4+ messages)
` [PATCH v2 06/11] samples/devsec: Introduce a PCI device-security bus + endpoint sample
[PATCH v3] KVM: SEV: Disable SEV-SNP support on initialization failure
2025-05-13 4:46 UTC (3+ messages)
[PATCH v2] KVM: SEV: Disable SEV-SNP support on initialization failure
2025-05-12 21:55 UTC (2+ messages)
[PATCH 0/6] x86/msr: let paravirt inline rdmsr/wrmsr instructions
2025-05-10 16:03 UTC (4+ messages)
` [PATCH 1/6] coco/tdx: Rename MSR access helpers
[PATCH] KVM: SEV: Disable SEV-SNP support on initialization failure
2025-05-09 17:57 UTC (5+ messages)
SVSM Development Call May 7th, 2025
2025-05-08 8:33 UTC (2+ messages)
` [svsm-devel] "
[PATCH RFC v7 0/8] Add NUMA mempolicy support for KVM guest-memfd
2025-05-08 6:37 UTC (5+ messages)
` [PATCH RFC v7 3/8] security: Export security_inode_init_security_anon for KVM guest_memfd
CCC Kernel SIG Tomorrow, May 8th - vmfwupdate
2025-05-07 23:12 UTC
[PATCH 0/2] mm/page_alloc: Fix couple of unaccepted memory issues
2025-05-07 15:27 UTC (14+ messages)
` [PATCH 1/2] mm/page_alloc: Ensure try_alloc_pages() plays well with unaccepted memory
` [PATCH 2/2] mm/page_alloc: Fix race condition in unaccepted memory handling
` [PATCHv2] "
[PATCH v3 2/2] x86/devmem: Drop /dev/mem access for confidential guests
2025-05-07 5:44 UTC (2+ messages)
[PATCH AUTOSEL 6.14 083/642] x86/headers: Replace __ASSEMBLY__ with __ASSEMBLER__ in non-UAPI headers
2025-05-05 22:04 UTC
[PATCH v4] x86/sev: Fix making shared pages private during kdump
2025-05-05 21:49 UTC (3+ messages)
[PATCH v4.1] x86/sev: Fix making shared pages private during kdump
2025-05-04 6:26 UTC
[PATCH v3] x86/sev: Fix making shared pages private during kdump
2025-05-02 19:40 UTC (5+ messages)
[PATCH v4] x86/sev: Don't touch VMSA pages during kdump of SNP guest memory
2025-05-02 13:42 UTC (3+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).