messages from 2026-01-28 23:04:57 to 2026-02-05 15:53:10 UTC [more...]
[RFC PATCH v5 00/45] TDX: Dynamic PAMT + S-EPT Hugepage
2026-02-05 15:53 UTC (95+ messages)
` [RFC PATCH v5 01/45] x86/tdx: Use pg_level in TDX APIs, not the TDX-Module's 0-based level
` [RFC PATCH v5 02/45] KVM: x86/mmu: Update iter->old_spte if cmpxchg64 on mirror SPTE "fails"
` [RFC PATCH v5 03/45] KVM: TDX: Account all non-transient page allocations for per-TD structures
` [RFC PATCH v5 04/45] KVM: x86: Make "external SPTE" ops that can fail RET0 static calls
` [RFC PATCH v5 05/45] KVM: TDX: Drop kvm_x86_ops.link_external_spt(), use .set_external_spte() for all
` [RFC PATCH v5 06/45] KVM: x86/mmu: Fold set_external_spte_present() into its sole caller
` [RFC PATCH v5 07/45] KVM: x86/mmu: Plumb the SPTE _pointer_ into the TDP MMU's handle_changed_spte()
` [RFC PATCH v5 08/45] KVM: x86/mmu: Propagate mirror SPTE removal to S-EPT in handle_changed_spte()
` [RFC PATCH v5 09/45] KVM: x86: Rework .free_external_spt() into .reclaim_external_sp()
` [RFC PATCH v5 10/45] x86/tdx: Move all TDX error defines into <asm/shared/tdx_errno.h>
` [RFC PATCH v5 11/45] x86/tdx: Add helpers to check return status codes
` [RFC PATCH v5 12/45] x86/virt/tdx: Simplify tdmr_get_pamt_sz()
` [RFC PATCH v5 13/45] x86/virt/tdx: Allocate page bitmap for Dynamic PAMT
` [RFC PATCH v5 14/45] x86/virt/tdx: Allocate reference counters for PAMT memory
` [RFC PATCH v5 15/45] x86/virt/tdx: Improve PAMT refcounts allocation for sparse memory
` [RFC PATCH v5 16/45] x86/virt/tdx: Add tdx_alloc/free_control_page() helpers
` [RFC PATCH v5 17/45] x86/virt/tdx: Optimize "
` [RFC PATCH v5 18/45] KVM: TDX: Allocate PAMT memory for TD and vCPU control structures
` [RFC PATCH v5 19/45] KVM: Allow owner of kvm_mmu_memory_cache to provide a custom page allocator
` [RFC PATCH v5 20/45] KVM: x86/mmu: Allocate/free S-EPT pages using tdx_{alloc,free}_control_page()
` [RFC PATCH v5 21/45] x86/tdx: Add APIs to support get/put of DPAMT entries from KVM, under spinlock
` [RFC PATCH v5 22/45] KVM: TDX: Get/put PAMT pages when (un)mapping private memory
` [RFC PATCH v5 23/45] x86/virt/tdx: Enable Dynamic PAMT
` [RFC PATCH v5 24/45] Documentation/x86: Add documentation for TDX's "
` [RFC PATCH v5 25/45] *** DO NOT MERGE *** x86/virt/tdx: Don't assume guest memory is backed by struct page
` [RFC PATCH v5 26/45] x86/virt/tdx: Enhance tdh_mem_page_aug() to support huge pages
` [RFC PATCH v5 27/45] x86/virt/tdx: Enhance tdh_phymem_page_wbinvd_hkid() to invalidate "
` [RFC PATCH v5 28/45] x86/virt/tdx: Extend "reset page" quirk to support "
` [RFC PATCH v5 29/45] x86/virt/tdx: Get/Put DPAMT page pair if and only if mapping size is 4KB
` [RFC PATCH v5 30/45] x86/virt/tdx: Add API to demote a 2MB mapping to 512 4KB mappings
` [RFC PATCH v5 31/45] KVM: x86/mmu: Prevent hugepage promotion for mirror roots in fault path
` [RFC PATCH v5 32/45] KVM: x86/mmu: Plumb the old_spte into kvm_x86_ops.set_external_spte()
` [RFC PATCH v5 33/45] KVM: TDX: Hoist tdx_sept_remove_private_spte() above set_private_spte()
` [RFC PATCH v5 34/45] KVM: TDX: Handle removal of leaf SPTEs in .set_private_spte()
` [RFC PATCH v5 35/45] KVM: TDX: Add helper to handle mapping leaf SPTE into S-EPT
` [RFC PATCH v5 36/45] KVM: TDX: Move S-EPT page demotion TODO to tdx_sept_set_private_spte()
` [RFC PATCH v5 37/45] KVM: x86/tdp_mmu: Alloc external_spt page for mirror page table splitting
` [RFC PATCH v5 38/45] KVM: x86/mmu: Add Dynamic PAMT support in TDP MMU for vCPU-induced page split
` [RFC PATCH v5 39/45] KVM: TDX: Add core support for splitting/demoting 2MiB S-EPT to 4KiB
` [RFC PATCH v5 40/45] KVM: x86: Introduce hugepage_set_guest_inhibit()
` [RFC PATCH v5 41/45] KVM: TDX: Honor the guest's accept level contained in an EPT violation
` [RFC PATCH v5 42/45] KVM: guest_memfd: Add helpers to get start/end gfns give gmem+slot+pgoff
` [RFC PATCH v5 43/45] *** DO NOT MERGE *** KVM: guest_memfd: Add pre-zap arch hook for shared<=>private conversion
` [RFC PATCH v5 44/45] KVM: x86/mmu: Add support for splitting S-EPT hugepages on conversion
` [RFC PATCH v5 45/45] KVM: TDX: Turn on PG_LEVEL_2M
[PATCH v4 0/2] SEV-SNP Unaccepted Memory Hotplug
2026-02-05 15:48 UTC (11+ messages)
` [PATCH v4 1/2] mm/memory_hotplug: Add support to accept memory during hot-add
` [PATCH v4 2/2] x86/sev: Add support to unaccept memory after hot-remove
[GIT PULL] PCIe Link Encryption fixes for 6.19
2026-02-04 23:25 UTC (2+ messages)
SVSM Development Call February 4, 2026
2026-02-04 21:50 UTC (2+ messages)
[Invitation] bi-weekly guest_memfd upstream call on 2026-02-05
2026-02-04 11:17 UTC
[PATCH v3 00/26] Runtime TDX Module update support
2026-02-04 10:03 UTC (79+ messages)
` [PATCH v3 01/26] x86/virt/tdx: Print SEAMCALL leaf numbers in decimal
` [PATCH v3 03/26] x86/virt/tdx: Move low level SEAMCALL helpers out of <asm/tdx.h>
` [PATCH v3 04/26] coco/tdx-host: Introduce a "tdx_host" device
` [PATCH v3 05/26] coco/tdx-host: Expose TDX Module version
` [PATCH v3 06/26] x86/virt/tdx: Prepare to support P-SEAMLDR SEAMCALLs
` [PATCH v3 07/26] x86/virt/seamldr: Introduce a wrapper for "
` [PATCH v3 08/26] x86/virt/seamldr: Retrieve P-SEAMLDR information
` [PATCH v3 09/26] coco/tdx-host: Expose P-SEAMLDR information via sysfs
` [PATCH v3 10/26] coco/tdx-host: Implement FW_UPLOAD sysfs ABI for TDX Module updates
` [PATCH v3 11/26] x86/virt/seamldr: Block TDX Module updates if any CPU is offline
` [PATCH v3 13/26] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v3 14/26] x86/virt/seamldr: Introduce skeleton for TDX Module updates
` [PATCH v3 15/26] x86/virt/seamldr: Abort updates if errors occurred midway
` [PATCH v3 16/26] x86/virt/seamldr: Shut down the current TDX module
` [PATCH v3 18/26] x86/virt/seamldr: Log TDX Module update failures
` [PATCH v3 20/26] x86/virt/seamldr: Do TDX per-CPU initialization after updates
` [PATCH v3 22/26] x86/virt/tdx: Update tdx_sysinfo and check features post-update
` [PATCH v3 23/26] x86/virt/tdx: Enable TDX Module runtime updates
` [PATCH v3 24/26] x86/virt/seamldr: Extend sigstruct to 16KB
[PATCH v7 0/2] SEV-SNP: Add KVM support for SNP certificate fetching
2026-02-04 0:10 UTC (2+ messages)
[PATCH v2 0/3] KVM: SEV: Add support for IBPB-on-Entry
2026-02-03 22:24 UTC (4+ messages)
` [PATCH v2 1/3] x86/sev: Allow IBPB-on-Entry feature for SNP guests
` [PATCH v2 2/3] KVM: SEV: Add support for IBPB-on-Entry
` [PATCH v2 3/3] x86/sev: Rename SNP_FEATURES_PRESENT->SNP_FEATURES_IMPL
[PATCH 0/2] KVM: SEV: Add support for IBPB-on-Entry
2026-02-02 17:12 UTC (13+ messages)
` [PATCH 1/2] KVM: SEV: IBPB-on-Entry guest support
[PATCH 0/1] Arm Live Firmware Activation (LFA) support
2026-02-02 15:52 UTC (8+ messages)
` [PATCH 1/1] firmware: smccc: add support for Live Firmware Activation (LFA)
[PATCH RESEND] KVM: SEV: Enable SNP AP CPU hotplug
2026-02-02 10:12 UTC
[PATCH RESEND] KVM: SEV: Track SNP launch state and disallow invalid userspace interactions
2026-02-02 10:11 UTC
6.18 CVM guest kernel boot issues with non-UEFI bootloader
2026-01-30 22:12 UTC (5+ messages)
[PATCH kernel 0/2] crypto/ccp: Fixes for PCI IDE
2026-01-29 22:29 UTC (6+ messages)
` [PATCH kernel 2/2] crypto/ccp: Allow multiple streams on the same root bridge
[PATCH v1 11/14] x86/boot: use __seg_fs and __seg_gs in the real-mode boot code
2026-01-29 22:22 UTC (11+ messages)
` [PATCH v1 08/14] x86: make CONFIG_EFI_STUB unconditional
[PATCH v3 0/2] SEV-SNP Unaccepted Memory Hotplug
2026-01-29 19:32 UTC (10+ messages)
` [PATCH v3 1/2] mm/memory_hotplug: Add support to accept memory during hot-add
` [PATCH v3 2/2] x86/sev: Add support to unaccept memory after hot-remove
[PATCH v4 00/16] TDX: Enable Dynamic PAMT
2026-01-29 19:12 UTC (8+ messages)
` [PATCH v4 07/16] x86/virt/tdx: Add tdx_alloc/free_page() helpers
COCONUT-SVSM Development Release v2026.01-devel
2026-01-29 10:12 UTC
SVSM Development Call January 28, 2026
2026-01-29 9:40 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox