messages from 2025-05-09 09:52:33 to 2025-05-27 11:48:09 UTC [more...]
[PATCH v3 00/13] PCI/TSM: Core infrastructure for PCI device security (TDISP)
2025-05-27 11:48 UTC (39+ messages)
` [PATCH v3 01/13] coco/tsm: Introduce a core device for TEE Security Managers
` [PATCH v3 02/13] PCI/IDE: Enumerate Selective Stream IDE capabilities
` [PATCH v3 03/13] PCI/TSM: Authenticate devices via platform TSM
` [PATCH v3 04/13] PCI: Enable host-bridge emulation for PCI_DOMAINS_GENERIC platforms
` [PATCH v3 05/13] PCI: vmd: Switch to pci_bus_find_emul_domain_nr()
` [PATCH v3 06/13] samples/devsec: Introduce a PCI device-security bus + endpoint sample
` [PATCH v3 07/13] PCI: Add PCIe Device 3 Extended Capability enumeration
` [PATCH v3 08/13] PCI/IDE: Add IDE establishment helpers
` [PATCH v3 09/13] PCI/IDE: Report available IDE streams
` [PATCH v3 10/13] PCI/TSM: Report active "
` [PATCH v3 11/13] samples/devsec: Add sample IDE establishment
` [PATCH v3 12/13] PCI/TSM: support TDI related operations for host TSM driver
` [PATCH v3 13/13] PCI/TSM: Add Guest TSM Support
[RFC PATCH 00/12] Private MMIO support for private assigned dev
2025-05-26 7:18 UTC (33+ messages)
[RFC, PATCH 00/12] TDX: Enable Dynamic PAMT
2025-05-23 12:00 UTC (43+ messages)
` [RFC, PATCH 02/12] x86/virt/tdx: Allocate reference counters for PAMT memory
` [RFC, PATCH 03/12] x86/virt/tdx: Add wrappers for TDH.PHYMEM.PAMT.ADD/REMOVE
` [RFC, PATCH 05/12] KVM: TDX: Add tdx_pamt_get()/put() helpers
` [RFC, PATCH 08/12] KVM: x86/tdp_mmu: Add phys_prepare() and phys_cleanup() to kvm_x86_ops
` [RFC, PATCH 09/12] KVM: TDX: Preallocate PAMT pages to be used in page fault path
` [RFC, PATCH 11/12] KVM: TDX: Reclaim PAMT memory
[RFC PATCH 00/20] TD-Preserving updates
2025-05-23 9:52 UTC (21+ messages)
` [RFC PATCH 01/20] x86/virt/tdx: Print SEAMCALL leaf numbers in decimal
` [RFC PATCH 02/20] x86/virt/tdx: Prepare to support P-SEAMLDR SEAMCALLs
` [RFC PATCH 03/20] x86/virt/seamldr: Introduce a wrapper for "
` [RFC PATCH 04/20] x86/virt/tdx: Introduce a "tdx" subsystem and "tsm" device
` [RFC PATCH 05/20] x86/virt/tdx: Export tdx module attributes via sysfs
` [RFC PATCH 06/20] x86/virt/seamldr: Add a helper to read P-SEAMLDR information
` [RFC PATCH 07/20] x86/virt/tdx: Expose SEAMLDR information via sysfs
` [RFC PATCH 08/20] x86/virt/seamldr: Implement FW_UPLOAD sysfs ABI for TD-Preserving Updates
` [RFC PATCH 09/20] x86/virt/seamldr: Allocate and populate a module update request
` [RFC PATCH 10/20] x86/virt/seamldr: Introduce skeleton for TD-Preserving updates
` [RFC PATCH 11/20] x86/virt/seamldr: Abort updates if errors occurred midway
` [RFC PATCH 12/20] x86/virt/seamldr: Shut down the current TDX module
` [RFC PATCH 13/20] x86/virt/tdx: Reset software states after TDX module shutdown
` [RFC PATCH 14/20] x86/virt/seamldr: Install a new TDX module
` [RFC PATCH 15/20] x86/virt/seamldr: Handle TD-Preserving update failures
` [RFC PATCH 16/20] x86/virt/seamldr: Do TDX cpu init after updates
` [RFC PATCH 17/20] x86/virt/tdx: Establish contexts for the new module
` [RFC PATCH 18/20] x86/virt/tdx: Update tdx_sysinfo and check features post-update
` [RFC PATCH 19/20] x86/virt/seamldr: Verify availability of slots for TD-Preserving updates
` [RFC PATCH 20/20] x86/virt/seamldr: Enable TD-Preserving Updates
[PATCH v5 0/2] kvm: sev: Add SNP guest request throttling
2025-05-21 18:19 UTC (7+ messages)
` [PATCH v5 1/2] kvm: sev: Add SEV-SNP "
` [PATCH v5 2/2] kvm: sev: If ccp is busy, report busy to guest
[PATCH v6 0/2] SEV-SNP: Add KVM support for SNP certificate fetching
2025-05-21 14:45 UTC (3+ messages)
` [PATCH v6 1/2] KVM: Introduce KVM_EXIT_SNP_REQ_CERTS for SNP certificate-fetching
[PATCH v8 00/43] arm64: Support for Arm CCA in KVM
2025-05-21 10:21 UTC (58+ messages)
` [PATCH v8 13/43] arm64: RME: Support for the VGIC in realms
` [PATCH v8 15/43] arm64: RME: Allow VMM to set RIPAS
` [PATCH v8 16/43] arm64: RME: Handle realm enter/exit
` [PATCH v8 17/43] arm64: RME: Handle RMI_EXIT_RIPAS_CHANGE
` [PATCH v8 18/43] KVM: arm64: Handle realm MMIO emulation
` [PATCH v8 20/43] arm64: RME: Runtime faulting of memory
` [PATCH v8 21/43] KVM: arm64: Handle realm VCPU load
` [PATCH v8 22/43] KVM: arm64: Validate register access for a Realm VM
` [PATCH v8 29/43] arm64: RME: Always use 4k pages for realms
` [PATCH v8 30/43] arm64: RME: Prevent Device mappings for Realms
` [PATCH v8 33/43] arm64: RME: Hide KVM_CAP_READONLY_MEM for realm guests
` [PATCH v8 34/43] arm64: RME: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v8 35/43] arm64: RME: Set breakpoint parameters through SET_ONE_REG
` [PATCH v8 36/43] arm64: RME: Initialize PMCR.N with number counter supported by RMM
` [PATCH v8 37/43] arm64: RME: Propagate max SVE vector length from RMM
` [PATCH v8 38/43] arm64: RME: Configure max SVE vector length for a Realm
` [PATCH v8 40/43] arm64: RME: Provide accurate register list
` [PATCH v8 43/43] KVM: arm64: Allow activating realms
[PATCH 3/5] KVM: gmem: Hold filemap invalidate lock while allocating/preparing folios
2025-05-21 6:46 UTC (3+ messages)
Linux kernel SIG meeting for vwfwupdate discussion
2025-05-20 14:41 UTC (7+ messages)
[PATCH v2 00/18] PCI device authentication
2025-05-20 8:35 UTC (6+ messages)
[PATCH v3] KVM: SEV: Disable SEV-SNP support on initialization failure
2025-05-19 19:10 UTC (4+ messages)
[PATCH v4 0/2] kvm: sev: Add SNP guest request throttling
2025-05-15 18:21 UTC (7+ messages)
` [PATCH v4 1/2] kvm: sev: Add SEV-SNP "
` [PATCH v4 2/2] kvm: sev: If ccp is busy, report busy to guest
` [PATCH v4 2/2] The ccp driver can be overloaded even with guest request rate limits. The return value of -EBUSY means that there is no firmware error to report back to user space, so the guest VM would see this as exitinfo2 = 0. The false success can trick the guest to update its message sequence number when it shouldn't have
SVSM Development Call May 14th, 2025
2025-05-15 10:08 UTC (2+ messages)
[Overview] guest_memfd extensions and dependencies 2025-05-15
2025-05-15 9:58 UTC
[PATCH v6 0/7] tsm-mr: Unified Measurement Register ABI for TVMs
2025-05-15 8:39 UTC (2+ messages)
[RFC PATCH v2 00/22] TSM: Secure VFIO, TDISP, SEV TIO
2025-05-15 8:18 UTC (5+ messages)
` [RFC PATCH v2 07/22] coco/tsm: Add tsm and tsm-host modules
` [RFC PATCH v2 15/22] KVM: X86: Handle private MMIO as shared
[Invitation] bi-weekly guest_memfd upstream call on 2025-05-15
2025-05-14 13:12 UTC
[PATCH 0/2] Allow individual features to be locked down
2025-05-13 23:07 UTC (7+ messages)
[PATCH] MAINTAINERS: rectify file entries in TRUSTED SECURITY MODULE (TSM) INFRASTRUCTURE
2025-05-13 18:48 UTC (2+ messages)
[PATCH] sample/tsm-mr: Fix missing static for sample_report
2025-05-13 18:38 UTC (2+ messages)
[PATCH v5] x86/sev: Fix making shared pages private during kdump
2025-05-13 12:02 UTC (3+ messages)
[PATCH v2 00/11] PCI/TSM: Core infrastructure for PCI device security (TDISP)
2025-05-13 10:18 UTC (3+ messages)
` [PATCH v2 06/11] samples/devsec: Introduce a PCI device-security bus + endpoint sample
[PATCH v2] KVM: SEV: Disable SEV-SNP support on initialization failure
2025-05-12 21:55 UTC (2+ messages)
[PATCH 0/6] x86/msr: let paravirt inline rdmsr/wrmsr instructions
2025-05-10 16:03 UTC (2+ messages)
[PATCH] KVM: SEV: Disable SEV-SNP support on initialization failure
2025-05-09 17:57 UTC (5+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).