messages from 2026-01-23 15:00:25 to 2026-01-29 19:12:46 UTC [more...]
[PATCH v4 00/16] TDX: Enable Dynamic PAMT
2026-01-29 19:12 UTC (8+ messages)
` [PATCH v4 07/16] x86/virt/tdx: Add tdx_alloc/free_page() helpers
[RFC PATCH v5 00/45] TDX: Dynamic PAMT + S-EPT Hugepage
2026-01-29 18:58 UTC (53+ messages)
` [RFC PATCH v5 01/45] x86/tdx: Use pg_level in TDX APIs, not the TDX-Module's 0-based level
` [RFC PATCH v5 02/45] KVM: x86/mmu: Update iter->old_spte if cmpxchg64 on mirror SPTE "fails"
` [RFC PATCH v5 03/45] KVM: TDX: Account all non-transient page allocations for per-TD structures
` [RFC PATCH v5 04/45] KVM: x86: Make "external SPTE" ops that can fail RET0 static calls
` [RFC PATCH v5 05/45] KVM: TDX: Drop kvm_x86_ops.link_external_spt(), use .set_external_spte() for all
` [RFC PATCH v5 06/45] KVM: x86/mmu: Fold set_external_spte_present() into its sole caller
` [RFC PATCH v5 07/45] KVM: x86/mmu: Plumb the SPTE _pointer_ into the TDP MMU's handle_changed_spte()
` [RFC PATCH v5 08/45] KVM: x86/mmu: Propagate mirror SPTE removal to S-EPT in handle_changed_spte()
` [RFC PATCH v5 09/45] KVM: x86: Rework .free_external_spt() into .reclaim_external_sp()
` [RFC PATCH v5 10/45] x86/tdx: Move all TDX error defines into <asm/shared/tdx_errno.h>
` [RFC PATCH v5 11/45] x86/tdx: Add helpers to check return status codes
` [RFC PATCH v5 12/45] x86/virt/tdx: Simplify tdmr_get_pamt_sz()
` [RFC PATCH v5 13/45] x86/virt/tdx: Allocate page bitmap for Dynamic PAMT
` [RFC PATCH v5 14/45] x86/virt/tdx: Allocate reference counters for PAMT memory
` [RFC PATCH v5 15/45] x86/virt/tdx: Improve PAMT refcounts allocation for sparse memory
` [RFC PATCH v5 16/45] x86/virt/tdx: Add tdx_alloc/free_control_page() helpers
` [RFC PATCH v5 17/45] x86/virt/tdx: Optimize "
` [RFC PATCH v5 18/45] KVM: TDX: Allocate PAMT memory for TD and vCPU control structures
` [RFC PATCH v5 19/45] KVM: Allow owner of kvm_mmu_memory_cache to provide a custom page allocator
` [RFC PATCH v5 20/45] KVM: x86/mmu: Allocate/free S-EPT pages using tdx_{alloc,free}_control_page()
` [RFC PATCH v5 21/45] x86/tdx: Add APIs to support get/put of DPAMT entries from KVM, under spinlock
` [RFC PATCH v5 22/45] KVM: TDX: Get/put PAMT pages when (un)mapping private memory
` [RFC PATCH v5 23/45] x86/virt/tdx: Enable Dynamic PAMT
` [RFC PATCH v5 24/45] Documentation/x86: Add documentation for TDX's "
` [RFC PATCH v5 25/45] *** DO NOT MERGE *** x86/virt/tdx: Don't assume guest memory is backed by struct page
` [RFC PATCH v5 26/45] x86/virt/tdx: Enhance tdh_mem_page_aug() to support huge pages
` [RFC PATCH v5 27/45] x86/virt/tdx: Enhance tdh_phymem_page_wbinvd_hkid() to invalidate "
` [RFC PATCH v5 28/45] x86/virt/tdx: Extend "reset page" quirk to support "
` [RFC PATCH v5 29/45] x86/virt/tdx: Get/Put DPAMT page pair if and only if mapping size is 4KB
` [RFC PATCH v5 30/45] x86/virt/tdx: Add API to demote a 2MB mapping to 512 4KB mappings
` [RFC PATCH v5 31/45] KVM: x86/mmu: Prevent hugepage promotion for mirror roots in fault path
` [RFC PATCH v5 32/45] KVM: x86/mmu: Plumb the old_spte into kvm_x86_ops.set_external_spte()
` [RFC PATCH v5 33/45] KVM: TDX: Hoist tdx_sept_remove_private_spte() above set_private_spte()
` [RFC PATCH v5 34/45] KVM: TDX: Handle removal of leaf SPTEs in .set_private_spte()
` [RFC PATCH v5 35/45] KVM: TDX: Add helper to handle mapping leaf SPTE into S-EPT
` [RFC PATCH v5 36/45] KVM: TDX: Move S-EPT page demotion TODO to tdx_sept_set_private_spte()
` [RFC PATCH v5 37/45] KVM: x86/tdp_mmu: Alloc external_spt page for mirror page table splitting
` [RFC PATCH v5 38/45] KVM: x86/mmu: Add Dynamic PAMT support in TDP MMU for vCPU-induced page split
` [RFC PATCH v5 39/45] KVM: TDX: Add core support for splitting/demoting 2MiB S-EPT to 4KiB
` [RFC PATCH v5 40/45] KVM: x86: Introduce hugepage_set_guest_inhibit()
` [RFC PATCH v5 41/45] KVM: TDX: Honor the guest's accept level contained in an EPT violation
` [RFC PATCH v5 42/45] KVM: guest_memfd: Add helpers to get start/end gfns give gmem+slot+pgoff
` [RFC PATCH v5 43/45] *** DO NOT MERGE *** KVM: guest_memfd: Add pre-zap arch hook for shared<=>private conversion
` [RFC PATCH v5 44/45] KVM: x86/mmu: Add support for splitting S-EPT hugepages on conversion
` [RFC PATCH v5 45/45] KVM: TDX: Turn on PG_LEVEL_2M
[PATCH v3 0/2] SEV-SNP Unaccepted Memory Hotplug
2026-01-29 17:39 UTC (11+ messages)
` [PATCH v3 1/2] mm/memory_hotplug: Add support to accept memory during hot-add
` [PATCH v3 2/2] x86/sev: Add support to unaccept memory after hot-remove
[PATCH 0/1] Arm Live Firmware Activation (LFA) support
2026-01-29 17:26 UTC (4+ messages)
` [PATCH 1/1] firmware: smccc: add support for Live Firmware Activation (LFA)
[PATCH v3 00/26] Runtime TDX Module update support
2026-01-29 16:59 UTC (99+ messages)
` [PATCH v3 01/26] x86/virt/tdx: Print SEAMCALL leaf numbers in decimal
` [PATCH v3 02/26] x86/virt/tdx: Use %# prefix for hex values in SEAMCALL error messages
` [PATCH v3 03/26] x86/virt/tdx: Move low level SEAMCALL helpers out of <asm/tdx.h>
` [PATCH v3 04/26] coco/tdx-host: Introduce a "tdx_host" device
` [PATCH v3 05/26] coco/tdx-host: Expose TDX Module version
` [PATCH v3 06/26] x86/virt/tdx: Prepare to support P-SEAMLDR SEAMCALLs
` [PATCH v3 07/26] x86/virt/seamldr: Introduce a wrapper for "
` [PATCH v3 08/26] x86/virt/seamldr: Retrieve P-SEAMLDR information
` [PATCH v3 09/26] coco/tdx-host: Expose P-SEAMLDR information via sysfs
` [PATCH v3 10/26] coco/tdx-host: Implement FW_UPLOAD sysfs ABI for TDX Module updates
` [PATCH v3 11/26] x86/virt/seamldr: Block TDX Module updates if any CPU is offline
` [PATCH v3 12/26] x86/virt/seamldr: Verify availability of slots for TDX Module updates
` [PATCH v3 13/26] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v3 14/26] x86/virt/seamldr: Introduce skeleton for TDX Module updates
` [PATCH v3 15/26] x86/virt/seamldr: Abort updates if errors occurred midway
` [PATCH v3 16/26] x86/virt/seamldr: Shut down the current TDX module
` [PATCH v3 17/26] x86/virt/tdx: Reset software states after TDX module shutdown
` [PATCH v3 18/26] x86/virt/seamldr: Log TDX Module update failures
` [PATCH v3 19/26] x86/virt/seamldr: Install a new TDX Module
` [PATCH v3 20/26] x86/virt/seamldr: Do TDX per-CPU initialization after updates
` [PATCH v3 21/26] x86/virt/tdx: Establish contexts for the new TDX Module
` [PATCH v3 22/26] x86/virt/tdx: Update tdx_sysinfo and check features post-update
` [PATCH v3 23/26] x86/virt/tdx: Enable TDX Module runtime updates
` [PATCH v3 24/26] x86/virt/seamldr: Extend sigstruct to 16KB
` [PATCH v3 25/26] x86/virt/tdx: Avoid updates during update-sensitive operations
` [PATCH v3 26/26] coco/tdx-host: Set and document TDX Module update expectations
[PATCH 0/2] KVM: SEV: Add support for IBPB-on-Entry
2026-01-29 10:51 UTC (11+ messages)
` [PATCH 1/2] KVM: SEV: IBPB-on-Entry guest support
` [PATCH 2/2] KVM: SEV: Add support for IBPB-on-Entry
COCONUT-SVSM Development Release v2026.01-devel
2026-01-29 10:12 UTC
SVSM Development Call January 28, 2026
2026-01-29 9:40 UTC (2+ messages)
6.18 CVM guest kernel boot issues with non-UEFI bootloader
2026-01-29 3:57 UTC
[PATCH v1 00/14] x86 boot code cleanups, batch 1
2026-01-28 17:01 UTC (10+ messages)
` [PATCH v1 01/14] x86/realmode: remove I/O port paravirtualization
` [PATCH v1 12/14] x86/boot: tweak a20.c for better code generation
[PATCH kernel 0/2] crypto/ccp: Fixes for PCI IDE
2026-01-27 6:59 UTC (8+ messages)
` [PATCH kernel 1/2] crypto/ccp: Use PCI bridge defaults for IDE
` [PATCH kernel 2/2] crypto/ccp: Allow multiple streams on the same root bridge
[PATCH v1 11/14] x86/boot: use __seg_fs and __seg_gs in the real-mode boot code
2026-01-27 3:21 UTC (10+ messages)
` [PATCH v1 08/14] x86: make CONFIG_EFI_STUB unconditional
[PATCH v2 0/7] KVM: x86/tdx: Have TDX handle VMXON during bringup
2026-01-27 2:46 UTC (8+ messages)
` [PATCH v2 2/7] KVM: x86: Extract VMXON and EFER.SVME enablement to kernel
[PATCH v2 00/21] Runtime TDX Module update support
2026-01-26 21:22 UTC (5+ messages)
` [PATCH v2 20/21] x86/virt/tdx: Update tdx_sysinfo and check features post-update
[PATCH v12 00/46] arm64: Support for Arm CCA in KVM
2026-01-26 9:50 UTC (7+ messages)
` [PATCH v12 06/46] arm64: RMI: Define the user ABI
` [PATCH v12 22/46] arm64: RMI: Create the realm descriptor
[PATCH v2] KVM: TDX: Allow userspace to return errors to guest for MAPGPA
2026-01-23 17:42 UTC (2+ messages)
[PATCH v7 0/2] SEV-SNP: Add KVM support for SNP certificate fetching
2026-01-23 17:17 UTC (3+ messages)
` [PATCH v7 1/2] KVM: Introduce KVM_EXIT_SNP_REQ_CERTS for SNP certificate-fetching
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox