messages from 2025-12-01 22:14:29 to 2025-12-17 10:14:54 UTC [more...]
[PATCH v12 00/46] arm64: Support for Arm CCA in KVM
2025-12-17 10:11 UTC (40+ messages)
` [PATCH v12 01/46] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h
` [PATCH v12 02/46] arm64: RME: Handle Granule Protection Faults (GPFs)
` [PATCH v12 03/46] arm64: RMI: Add SMC definitions for calling the RMM
` [PATCH v12 04/46] arm64: RMI: Add wrappers for RMI calls
` [PATCH v12 05/46] arm64: RMI: Check for RMI support at KVM init
` [PATCH v12 06/46] arm64: RMI: Define the user ABI
` [PATCH v12 07/46] arm64: RMI: Basic infrastructure for creating a realm
` [PATCH v12 08/46] kvm: arm64: Don't expose unsupported capabilities for realm guests
` [PATCH v12 09/46] KVM: arm64: Allow passing machine type in KVM creation
` [PATCH v12 10/46] arm64: RMI: RTT tear down
` [PATCH v12 11/46] arm64: RMI: Activate realm on first VCPU run
` [PATCH v12 12/46] arm64: RMI: Allocate/free RECs to match vCPUs
` [PATCH v12 13/46] KVM: arm64: vgic: Provide helper for number of list registers
` [PATCH v12 14/46] arm64: RMI: Support for the VGIC in realms
` [PATCH v12 15/46] KVM: arm64: Support timers in realm RECs
` [PATCH v12 16/46] arm64: RMI: Handle realm enter/exit
` [PATCH v12 17/46] arm64: RMI: Handle RMI_EXIT_RIPAS_CHANGE
` [PATCH v12 18/46] KVM: arm64: Handle realm MMIO emulation
` [PATCH v12 19/46] KVM: arm64: Expose support for private memory
` [PATCH v12 20/46] arm64: RMI: Allow populating initial contents
` [PATCH v12 21/46] arm64: RMI: Set RIPAS of initial memslots
` [PATCH v12 22/46] arm64: RMI: Create the realm descriptor
` [PATCH v12 23/46] arm64: RMI: Add a VMID allocator for realms
` [PATCH v12 24/46] arm64: RMI: Runtime faulting of memory
` [PATCH v12 25/46] KVM: arm64: Handle realm VCPU load
` [PATCH v12 26/46] KVM: arm64: Validate register access for a Realm VM
` [PATCH v12 27/46] KVM: arm64: Handle Realm PSCI requests
` [PATCH v12 28/46] KVM: arm64: WARN on injected undef exceptions
` [PATCH v12 29/46] arm64: Don't expose stolen time for realm guests
` [PATCH v12 30/46] arm64: RMI: allow userspace to inject aborts
` [PATCH v12 31/46] arm64: RMI: support RSI_HOST_CALL
` [PATCH v12 32/46] arm64: RMI: Allow checking SVE on VM instance
` [PATCH v12 33/46] arm64: RMI: Always use 4k pages for realms
` [PATCH v12 34/46] arm64: RMI: Prevent Device mappings for Realms
` [PATCH v12 35/46] HACK: Restore per-CPU cpu_armpmu pointer
` [PATCH v12 36/46] arm_pmu: Provide a mechanism for disabling the physical IRQ
` [PATCH v12 37/46] arm64: RMI: Enable PMU support with a realm guest
` [PATCH v12 38/46] arm64: RMI: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v12 39/46] arm64: RMI: Set breakpoint parameters through SET_ONE_REG
[PATCH v2 0/7] KVM: x86/tdx: Have TDX handle VMXON during bringup
2025-12-17 6:57 UTC (28+ messages)
` [PATCH v2 1/7] KVM: x86: Move kvm_rebooting to x86
` [PATCH v2 2/7] KVM: x86: Extract VMXON and EFER.SVME enablement to kernel
` [PATCH v2 3/7] KVM: x86/tdx: Do VMXON and TDX-Module initialization during subsys init
` [PATCH v2 4/7] x86/virt/tdx: Tag a pile of functions as __init, and globals as __ro_after_init
` [PATCH v2 5/7] x86/virt/tdx: KVM: Consolidate TDX CPU hotplug handling
` [PATCH v2 6/7] x86/virt/tdx: Use ida_is_empty() to detect if any TDs may be running
` [PATCH v2 7/7] KVM: Bury kvm_{en,dis}able_virtualization() in kvm_main.c once more
SVSM Development Call December 17th, 2025
2025-12-16 17:17 UTC
[PATCH v2 0/5] KVM: guest_memfd: Rework preparation/population flows in prep for in-place conversion
2025-12-16 3:29 UTC (13+ messages)
` [PATCH v2 1/5] KVM: guest_memfd: Remove partial hugepage handling from kvm_gmem_populate()
` [PATCH v2 2/5] KVM: guest_memfd: Remove preparation tracking
` [PATCH v2 3/5] KVM: SEV: Document/enforce page-alignment for KVM_SEV_SNP_LAUNCH_UPDATE
` [PATCH v2 4/5] KVM: TDX: Document alignment requirements for KVM_TDX_INIT_MEM_REGION
` [PATCH v2 5/5] KVM: guest_memfd: GUP source pages prior to populating guest memory
[PATCH] coco/guest: Constify struct configfs_item_operations and configfs_group_operations
2025-12-14 9:39 UTC
Reminder: COCONUT-SVSM BoF at LPC on Sat, 3pm
2025-12-13 1:02 UTC
[RFC PATCH 0/5] Arm LFA: Improvements and interrupt support
2025-12-12 15:37 UTC (11+ messages)
` [RFC PATCH 1/5] firmware: smccc: LFA: use smcc 1.2
` [RFC PATCH 2/5] firmware: smccc: LFA: refactor
` [RFC PATCH 3/5] firmware: smccc: add timeout, touch wdt
` [RFC PATCH 4/5] firmware: smccc: register as platform driver
` [RFC PATCH 5/5] firmware: smccc: lfa: refresh fw details
[RFC PATCH 0/4] SEV-SNP Unaccepted Memory Hotplug
2025-12-11 22:07 UTC (25+ messages)
` [RFC PATCH 2/4] mm: Add support for unaccepted memory hotplug
[PATCH v4 00/16] TDX: Enable Dynamic PAMT
2025-12-11 0:07 UTC (28+ messages)
` [PATCH v4 06/16] x86/virt/tdx: Improve PAMT refcounts allocation for sparse memory
` [PATCH v4 07/16] x86/virt/tdx: Add tdx_alloc/free_page() helpers
[PATCH RFC 0/3] KVM: guest_memfd: Rework preparation/population flows in prep for in-place conversion
2025-12-10 1:30 UTC (29+ messages)
` [PATCH 1/3] KVM: guest_memfd: Remove preparation tracking
` [PATCH 3/3] KVM: guest_memfd: GUP source pages prior to populating guest memory
[PATCH kvm-next V11 0/7] Add NUMA mempolicy support for KVM guest-memfd
2025-12-09 17:18 UTC (2+ messages)
` [f2fs-dev] "
[PATCH v1 00/26] PCI/TSM: TDX Connect: SPDM Session and IDE Establishment
2025-12-08 10:02 UTC (10+ messages)
` [PATCH v1 08/26] x86/virt/tdx: Add tdx_enable_ext() to enable of TDX Module Extensions
[GIT PULL] PCIe Link Encryption and Device Authentication
2025-12-08 0:56 UTC (6+ messages)
[PATCH 00/10] KVM: Avoid literal numbers as return values
2025-12-05 15:47 UTC (5+ messages)
` [PATCH 02/10] KVM/x86: Use bool for the err parameter of kvm_complete_insn_gp()
` [PATCH 08/10] KVM/x86: Use defines for VMX related MSR emulation
[PATCH] crypto/ccp: Fix CONFIG_PCI=n build
2025-12-05 14:31 UTC (3+ messages)
[PATCH] virt: Fix Kconfig warning when selecting TSM without VIRT_DRIVERS
2025-12-05 1:33 UTC (2+ messages)
[PATCH v5] virt: tdx-guest: Handle GetQuote request error code
2025-12-05 0:20 UTC (7+ messages)
CCC Kernel Sig Thursday night (PST) calls cancelled through New Years
2025-12-04 21:42 UTC
[PATCH 0/3] x86/sev: Carve out the SVSM support code
2025-12-04 15:06 UTC (8+ messages)
` [PATCH 1/3] x86/sev: Move the internal header
` [PATCH 2/3] x86/sev: Add internal header guards
` [PATCH 3/3] x86/sev: Carve out the SVSM code into a separate compilation unit
SVSM Development Call December 3rd, 2025
2025-12-04 8:42 UTC
[PATCH] coco/guest: Remove unneeded selection of CRYPTO
2025-12-04 5:55 UTC
[PATCH v4] page_alloc: allow migration of smaller hugepages during contig_alloc
2025-12-03 21:50 UTC (9+ messages)
[PATCH v2 00/21] Runtime TDX Module update support
2025-12-03 7:41 UTC (16+ messages)
` [PATCH v2 04/21] x86/virt/tdx: Prepare to support P-SEAMLDR SEAMCALLs
` [PATCH v2 08/21] coco/tdx-host: Implement FW_UPLOAD sysfs ABI for TDX Module updates
` [PATCH v2 11/21] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v2 14/21] x86/virt/seamldr: Shut down the current TDX module
` [PATCH v2 19/21] x86/virt/tdx: Establish contexts for the new TDX Module
` [PATCH v2 20/21] x86/virt/tdx: Update tdx_sysinfo and check features post-update
[PATCH v2 0/8] PCI/TSM: Finalize "Link" TSM infrastructure
2025-12-03 1:51 UTC (4+ messages)
` [PATCH v2 1/8] drivers/virt: Drop VIRT_DRIVERS build dependency
Subscribe
2025-12-02 23:52 UTC
[PATCH kernel v3 0/4] PCI/TSM: Enabling core infrastructure on AMD SEV TIO
2025-12-02 22:39 UTC (11+ messages)
` [PATCH kernel v3 1/4] ccp: Make snp_reclaim_pages and __sev_do_cmd_locked public
` [PATCH kernel v3 2/4] psp-sev: Assign numbers to all status codes and add new
` [PATCH kernel v3 3/4] iommu/amd: Report SEV-TIO support
` [PATCH kernel v3 4/4] crypto/ccp: Implement SEV-TIO PCIe IDE (phase1)
[Invitation] bi-weekly guest_memfd upstream call on 2025-12-04
2025-12-02 10:22 UTC
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox