messages from 2025-10-30 20:10:31 to 2025-11-13 12:10:44 UTC [more...]
[PATCH 0/6] PCI/TSM: Finalize "Link" TSM infrastructure
2025-11-13 12:10 UTC (23+ messages)
` [PATCH 1/6] resource: Introduce resource_assigned() for discerning active resources
` [PATCH 2/6] PCI/IDE: Add Address Association Register setup for downstream MMIO
` [PATCH 3/6] PCI/IDE: Initialize an ID for all IDE streams
` [PATCH 4/6] PCI/TSM: Add pci_tsm_bind() helper for instantiating TDIs
` [PATCH 5/6] PCI/TSM: Add pci_tsm_guest_req() for managing TDIs
` [PATCH 6/6] PCI/TSM: Add 'dsm' and 'bound' attributes for dependent functions
[PATCH v2 0/8] PCI/TSM: Finalize "Link" TSM infrastructure
2025-11-13 12:04 UTC (16+ messages)
` [PATCH v2 1/8] drivers/virt: Drop VIRT_DRIVERS build dependency
` [PATCH v2 2/8] PCI/TSM: Drop stub for pci_tsm_doe_transfer()
` [PATCH v2 3/8] resource: Introduce resource_assigned() for discerning active resources
` [PATCH v2 4/8] PCI/IDE: Add Address Association Register setup for downstream MMIO
` [PATCH v2 5/8] PCI/IDE: Initialize an ID for all IDE streams
` [PATCH v2 6/8] PCI/TSM: Add pci_tsm_bind() helper for instantiating TDIs
` [PATCH v2 7/8] PCI/TSM: Add pci_tsm_guest_req() for managing TDIs
` [PATCH v2 8/8] PCI/TSM: Add 'dsm' and 'bound' attributes for dependent functions
[RFC PATCH 00/27] PCI/TSM: TDX Connect: SPDM Session and IDE Establishment
2025-11-13 2:51 UTC (32+ messages)
` [RFC PATCH 01/27] coco/tdx-host: Introduce a "tdx_host" device
` [RFC PATCH 03/27] coco/tdx-host: Support Link TSM for TDX host
` [RFC PATCH 05/27] x86/virt/tdx: Add tdx_page_array helpers for new TDX Module objects
` [RFC PATCH 08/27] x86/virt/tdx: Add tdx_enable_ext() to enable of TDX Module Extensions
` [RFC PATCH 11/27] acpi: Add KEYP Key Configuration Unit parsing
` [RFC PATCH 20/27] coco/tdx-host: Add connect()/disconnect() handlers prototype
` [RFC PATCH 21/27] x86/virt/tdx: Add SEAMCALL wrappers for SPDM management
` [RFC PATCH 22/27] coco/tdx-host: Implement SPDM session setup
` [RFC PATCH 27/27] coco/tdx-host: Implement IDE stream setup/teardown
[PATCH 0/2] Expose TDX Module version
2025-11-13 1:24 UTC (5+ messages)
` [PATCH 1/2] x86/virt/tdx: Retrieve TDX module version
[PATCH RESEND] KVM: TDX: Use struct_size and simplify tdx_get_capabilities
2025-11-13 0:41 UTC (5+ messages)
SVSM Development Call November 12th, 2025
2025-11-12 22:03 UTC (2+ messages)
SVSM draft specification (v1.01 draft #3)
2025-11-12 17:52 UTC (6+ messages)
` [EXTERNAL] "
[PATCH 0/4] x86: Restrict KVM-induced symbol exports to KVM
2025-11-12 17:39 UTC (5+ messages)
` [PATCH 1/4] x86/bugs: Drop unnecessary export of "x86_spec_ctrl_base"
` [PATCH 2/4] x86/mtrr: Drop unnecessary export of "mtrr_state"
` [PATCH 3/4] x86/mm: Drop unnecessary export of "ptdump_walk_pgd_level_debugfs"
` [PATCH 4/4] x86: Restrict KVM-induced symbol exports to KVM modules where obvious/possible
[PATCH v2 00/21] Runtime TDX Module update support
2025-11-12 14:09 UTC (10+ messages)
` [PATCH v2 07/21] coco/tdx-host: Expose P-SEAMLDR information via sysfs
[Invitation] bi-weekly guest_memfd upstream call on 2025-11-13
2025-11-12 14:05 UTC
One pager on SVSM_REBOOT_EXECUTE
2025-11-12 13:55 UTC (3+ messages)
[PATCH kernel 0/6] PCI/TSM: Enabling core infrastructure on AMD SEV TIO
2025-11-12 2:05 UTC (9+ messages)
` [PATCH kernel 1/6] PCI/TSM: Add secure SPDM DOE mailbox
` [PATCH kernel 2/6] ccp: Make snp_reclaim_pages and __sev_do_cmd_locked public
` [PATCH kernel 3/6] psp-sev: Assign numbers to all status codes and add new
` [PATCH kernel 4/6] iommu/amd: Report SEV-TIO support
` [PATCH kernel 5/6] crypto: ccp: Enable SEV-TIO feature in the PSP when supported
` [PATCH kernel 6/6] crypto/ccp: Implement SEV-TIO PCIe IDE (phase1)
[PATCH v8 0/9] PCI/TSM: Core infrastructure for PCI device security (TDISP)
2025-11-10 23:49 UTC (21+ messages)
` [PATCH v8 1/9] coco/tsm: Introduce a core device for TEE Security Managers
` [PATCH v8 2/9] PCI/IDE: Enumerate Selective Stream IDE capabilities
` [PATCH v8 3/9] PCI: Introduce pci_walk_bus_reverse(), for_each_pci_dev_reverse()
` [PATCH v8 4/9] PCI/TSM: Establish Secure Sessions and Link Encryption
` [PATCH v8 5/9] PCI: Add PCIe Device 3 Extended Capability enumeration
` [PATCH v8 6/9] PCI: Establish document for PCI host bridge sysfs attributes
` [PATCH v8 7/9] PCI/IDE: Add IDE establishment helpers
` [PATCH v8 8/9] PCI/IDE: Report available IDE streams
` [PATCH v8 9/9] PCI/TSM: Report active "
[PATCH v4 00/28] KVM: x86/mmu: TDX post-populate cleanups
2025-11-10 15:37 UTC (61+ messages)
` [PATCH v4 04/28] KVM: x86/mmu: Add dedicated API to map guest_memfd pfn into TDP MMU
` [PATCH v4 05/28] KVM: x86/mmu: WARN if KVM attempts to map into an invalid TDP MMU root
` [PATCH v4 08/28] KVM: TDX: Drop superfluous page pinning in S-EPT management
` [PATCH v4 09/28] KVM: TDX: Return -EIO, not -EINVAL, on a KVM_BUG_ON() condition
` [PATCH v4 10/28] KVM: TDX: Fold tdx_sept_drop_private_spte() into tdx_sept_remove_private_spte()
` [PATCH v4 11/28] KVM: x86/mmu: Drop the return code from kvm_x86_ops.remove_external_spte()
` [PATCH v4 12/28] KVM: TDX: WARN if mirror SPTE doesn't have full RWX when creating S-EPT mapping
` [PATCH v4 13/28] KVM: TDX: Avoid a double-KVM_BUG_ON() in tdx_sept_zap_private_spte()
` [PATCH v4 14/28] KVM: TDX: Use atomic64_dec_return() instead of a poor equivalent
` [PATCH v4 15/28] KVM: TDX: Fold tdx_mem_page_record_premap_cnt() into its sole caller
` [PATCH v4 16/28] KVM: TDX: ADD pages to the TD image while populating mirror EPT entries
` [PATCH v4 17/28] KVM: TDX: Fold tdx_sept_zap_private_spte() into tdx_sept_remove_private_spte()
` [PATCH v4 18/28] KVM: TDX: Combine KVM_BUG_ON + pr_tdx_error() into TDX_BUG_ON()
` [PATCH v4 19/28] KVM: TDX: Derive error argument names from the local variable names
` [PATCH v4 20/28] KVM: TDX: Assert that mmu_lock is held for write when removing S-EPT entries
` [PATCH v4 21/28] KVM: TDX: Add macro to retry SEAMCALLs when forcing vCPUs out of guest
` [PATCH v4 22/28] KVM: TDX: Add tdx_get_cmd() helper to get and validate sub-ioctl command
` [PATCH v4 23/28] KVM: TDX: Convert INIT_MEM_REGION and INIT_VCPU to "unlocked" vCPU ioctl
` [PATCH v4 24/28] KVM: TDX: Use guard() to acquire kvm->lock in tdx_vm_ioctl()
` [PATCH v4 25/28] KVM: TDX: Don't copy "cmd" back to userspace for KVM_TDX_CAPABILITIES
` [PATCH v4 26/28] KVM: TDX: Guard VM state transitions with "all" the locks
` [PATCH v4 27/28] KVM: TDX: Bug the VM if extending the initial measurement fails
` [PATCH v4 28/28] KVM: TDX: Fix list_add corruption during vcpu_load()
[PATCH v5 0/4] KVM: x86: User-return MSR fix+cleanups
2025-11-10 15:37 UTC (17+ messages)
` [PATCH v5 1/4] KVM: TDX: Explicitly set user-return MSRs that *may* be clobbered by the TDX-Module
` [PATCH v5 3/4] KVM: x86: Leave user-return notifier registered on reboot/shutdown
` [PATCH v5 4/4] KVM: x86: Don't disable IRQs when unregistering user-return notifier
[PATCH RFC v1 0/5] KVM: guest_memfd: Support in-place conversion for CoCo VMs
2025-11-07 13:05 UTC (3+ messages)
` [PATCH RFC v1 1/5] KVM: guest_memfd: Remove preparation tracking
SVSM Development Call November 5th, 2025
2025-11-05 22:02 UTC (2+ messages)
[PATCH RFC] KVM: TDX: Allow in place TDX.PAGE.ADD
2025-11-05 15:44 UTC
[PATCH v3 00/25] KVM: x86/mmu: TDX post-populate cleanups
2025-11-05 15:26 UTC (8+ messages)
` [PATCH v3 04/25] KVM: x86/mmu: Add dedicated API to map guest_memfd pfn into TDP MMU
[PATCH AUTOSEL 6.17] x86/kexec: Disable kexec/kdump on platforms with TDX partial write erratum
2025-11-04 21:27 UTC (5+ messages)
[PATCH RESEND v2 00/12] coc: tsm: Implement ->connect()/->disconnect() callbacks for ARM CCA IDE setup
2025-10-31 12:07 UTC (7+ messages)
` [PATCH RESEND v2 06/12] coco: host: arm64: Add RMM device communication helpers
[PATCH v2 00/21] Runtime TDX Module update support
2025-10-31 2:53 UTC (11+ messages)
[PATCH v7 0/9] PCI/TSM: Core infrastructure for PCI device security (TDISP)
2025-10-31 1:20 UTC (17+ messages)
` [PATCH v7 1/9] coco/tsm: Introduce a core device for TEE Security Managers
` [PATCH v7 2/9] PCI/IDE: Enumerate Selective Stream IDE capabilities
` [PATCH v7 8/9] PCI/IDE: Report available IDE streams
` [PATCH v7 9/9] PCI/TSM: Report active "
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).