messages from 2025-11-19 00:02:24 to 2025-12-02 20:47:45 UTC [more...]
[PATCH kernel v3 0/4] PCI/TSM: Enabling core infrastructure on AMD SEV TIO
2025-12-02 20:47 UTC (8+ messages)
` [PATCH kernel v3 1/4] ccp: Make snp_reclaim_pages and __sev_do_cmd_locked public
` [PATCH kernel v3 2/4] psp-sev: Assign numbers to all status codes and add new
` [PATCH kernel v3 3/4] iommu/amd: Report SEV-TIO support
` [PATCH kernel v3 4/4] crypto/ccp: Implement SEV-TIO PCIe IDE (phase1)
[PATCH v4 00/16] TDX: Enable Dynamic PAMT
2025-12-02 20:02 UTC (62+ messages)
` [PATCH v4 01/16] x86/tdx: Move all TDX error defines into <asm/shared/tdx_errno.h>
` [PATCH v4 02/16] x86/tdx: Add helpers to check return status codes
` [PATCH v4 03/16] x86/virt/tdx: Simplify tdmr_get_pamt_sz()
` [PATCH v4 04/16] x86/virt/tdx: Allocate page bitmap for Dynamic PAMT
` [PATCH v4 05/16] x86/virt/tdx: Allocate reference counters for PAMT memory
` [PATCH v4 06/16] x86/virt/tdx: Improve PAMT refcounts allocation for sparse memory
` [PATCH v4 07/16] x86/virt/tdx: Add tdx_alloc/free_page() helpers
` [PATCH v4 08/16] x86/virt/tdx: Optimize "
` [PATCH v4 09/16] KVM: TDX: Allocate PAMT memory for TD control structures
` [PATCH v4 10/16] KVM: TDX: Allocate PAMT memory for vCPU "
` [PATCH v4 11/16] KVM: TDX: Add x86 ops for external spt cache
` [PATCH v4 12/16] x86/virt/tdx: Add helpers to allow for pre-allocating pages
` [PATCH v4 13/16] KVM: TDX: Handle PAMT allocation in fault path
` [PATCH v4 14/16] KVM: TDX: Reclaim PAMT memory
` [PATCH v4 15/16] x86/virt/tdx: Enable Dynamic PAMT
` [PATCH v4 16/16] Documentation/x86: Add documentation for TDX's "
[Invitation] bi-weekly guest_memfd upstream call on 2025-12-04
2025-12-02 10:22 UTC
[PATCH RFC 0/3] KVM: guest_memfd: Rework preparation/population flows in prep for in-place conversion
2025-12-02 9:17 UTC (24+ messages)
` [PATCH 1/3] KVM: guest_memfd: Remove preparation tracking
` [PATCH 3/3] KVM: guest_memfd: GUP source pages prior to populating guest memory
[PATCH v2 00/21] Runtime TDX Module update support
2025-12-02 7:23 UTC (13+ messages)
` [PATCH v2 04/21] x86/virt/tdx: Prepare to support P-SEAMLDR SEAMCALLs
` [PATCH v2 05/21] x86/virt/seamldr: Introduce a wrapper for "
` [PATCH v2 08/21] coco/tdx-host: Implement FW_UPLOAD sysfs ABI for TDX Module updates
` [PATCH v2 11/21] x86/virt/seamldr: Allocate and populate a module update request
[RFC PATCH 0/4] SEV-SNP Unaccepted Memory Hotplug
2025-12-01 20:36 UTC (34+ messages)
` [RFC PATCH 1/4] efi/libstub: Decouple memory bitmap from the unaccepted table
` [RFC PATCH 2/4] mm: Add support for unaccepted memory hotplug
` [RFC PATCH 3/4] x86/sev: Introduce hotplug-aware SNP page state validation
` [RFC PATCH 4/4] mm: Add support for unaccepted memory hot-remove
[PATCH kernel] crypto/ccp: Fix no-TSM build in SEV-TIO PCIe IDE
2025-12-01 8:09 UTC (2+ messages)
[PATCH 0/2] x86/split_lock: Fix and enhancement for TDX guest
2025-11-28 2:40 UTC (11+ messages)
` [PATCH 1/2] x86/split_lock: Don't try to handle user split lock in "
` [PATCH 2/2] x86/split_lock: Describe #AC handling in TDX guest kernel log
COCONUT-SVSM Development Release v2025.11-devel
2025-11-27 10:56 UTC
SVSM Development Call November 26th, 2025
2025-11-27 8:42 UTC (2+ messages)
[PATCH kernel v2 0/5] PCI/TSM: Enabling core infrastructure on
2025-11-25 14:17 UTC (2+ messages)
[PATCH v3 0/3] arm64: realm: Add support for encrypted data from firmware
2025-11-24 13:14 UTC (6+ messages)
` [PATCH v3 3/3] arm64: acpi: Enable ACPI CCEL support
` [REGRESSION] GHES firmware can't be readonly - Was: "
[PATCH v1 00/26] PCI/TSM: TDX Connect: SPDM Session and IDE Establishment
2025-11-24 10:52 UTC (23+ messages)
` [PATCH v1 06/26] x86/virt/tdx: Add tdx_page_array helpers for new TDX Module objects
` [PATCH v1 08/26] x86/virt/tdx: Add tdx_enable_ext() to enable of TDX Module Extensions
[PATCH v2 00/11] TSM: Implement ->lock()/->accept() callbacks for ARM CCA TDISP setup
2025-11-24 8:28 UTC (29+ messages)
` [PATCH v2 01/11] coco: guest: arm64: Guest TSM callback and realm device lock support
` [PATCH v2 02/11] coco: guest: arm64: Add Realm Host Interface and guest DA helper
` [PATCH v2 03/11] coco: guest: arm64: Add support for guest initiated TDI bind/unbind
` [PATCH v2 04/11] coco: guest: arm64: Add support for updating interface reports from device
` [PATCH v2 05/11] coco: guest: arm64: Add support for updating measurements "
` [PATCH v2 06/11] coco: guest: arm64: Add support for reading cached objects from host
` [PATCH v2 07/11] coco: guest: arm64: Validate Realm MMIO mappings from TDISP report
` [PATCH v2 08/11] coco: guest: arm64: Add support for fetching and verifying device info
` [PATCH v2 09/11] coco: guest: arm64: Wire Realm TDISP RUN/STOP transitions into guest driver
` [PATCH v2 10/11] coco: arm64: dma: Update force_dma_unencrypted for accepted devices
` [PATCH v2 11/11] coco: guest: arm64: Enable vdev DMA after attestation
[PATCH v2 0/4] KVM: x86: Cleanup #MC and XCR0/XSS/PKRU handling
2025-11-21 18:58 UTC (6+ messages)
` [PATCH v2 2/4] KVM: VMX: Handle #MCs on VM-Enter/TD-Enter outside of the fastpath
[PATCH kernel 0/6] PCI/TSM: Enabling core infrastructure on AMD SEV TIO
2025-11-21 1:40 UTC (6+ messages)
` [PATCH kernel 6/6] crypto/ccp: Implement SEV-TIO PCIe IDE (phase1)
[PATCH v2 00/21] Runtime TDX Module update support
2025-11-20 23:38 UTC (14+ messages)
SVSM Development Call November 19th, 2025
2025-11-20 8:43 UTC (2+ messages)
[PATCH v3 24/25] KVM: TDX: Guard VM state transitions with "all" the locks
2025-11-19 0:02 UTC (5+ messages)
` [PATCH] KVM: TDX: Take MMU lock around tdh_vp_init()
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).