messages from 2026-03-02 06:58:28 to 2026-03-11 00:33:56 UTC [more...]
[PATCH 0/7] KVM: x86: APX reg prep work
2026-03-11 0:33 UTC (2+ messages)
` [PATCH 1/7] KVM: x86: Add dedicated storage for guest RIP
[PATCH v2 0/7] Add RMPOPT support
2026-03-10 22:18 UTC (30+ messages)
` [PATCH v2 1/7] x86/cpufeatures: Add X86_FEATURE_AMD_RMPOPT feature flag
` [PATCH v2 2/7] x86/sev: add support for enabling RMPOPT
` [PATCH v2 3/7] x86/sev: add support for RMPOPT instruction
` [PATCH v2 4/7] x86/sev: Add interface to re-enable RMP optimizations
` [PATCH v2 5/7] KVM: guest_memfd: Add cleanup interface for guest teardown
` [PATCH v2 6/7] KVM: SEV: Implement SEV-SNP specific guest cleanup
` [PATCH v2 7/7] x86/sev: Add debugfs support for RMPOPT
[PATCH 0/1] [Test Report] get qutoe time via tdvmcall
2026-03-10 18:58 UTC (5+ messages)
` [PATCH 1/1] virt: tdx-guest: Optimize the get-quote polling interval time
SVSM Development Call March 11, 2026
2026-03-10 17:10 UTC
[PATCH v4 00/24] Runtime TDX Module update support
2026-03-10 2:31 UTC (46+ messages)
` [PATCH v4 01/24] x86/virt/tdx: Move low level SEAMCALL helpers out of <asm/tdx.h>
` [PATCH v4 02/24] coco/tdx-host: Introduce a "tdx_host" device
` [PATCH v4 04/24] x86/virt/seamldr: Introduce a wrapper for P-SEAMLDR SEAMCALLs
` [PATCH v4 06/24] coco/tdx-host: Expose P-SEAMLDR information via sysfs
` [PATCH v4 07/24] coco/tdx-host: Implement firmware upload sysfs ABI for TDX Module updates
` [PATCH v4 08/24] x86/virt/seamldr: Block TDX Module updates if any CPU is offline
` [PATCH v4 09/24] x86/virt/seamldr: Check update limit before TDX Module updates
` [PATCH v4 10/24] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v4 12/24] x86/virt/seamldr: Abort updates if errors occurred midway
` [PATCH v4 13/24] x86/virt/seamldr: Shut down the current TDX module
` [PATCH v4 14/24] x86/virt/tdx: Reset software states during TDX Module shutdown
` [PATCH v4 15/24] x86/virt/seamldr: Log TDX Module update failures
` [PATCH v4 16/24] x86/virt/seamldr: Install a new TDX Module
` [PATCH v4 17/24] x86/virt/seamldr: Do TDX per-CPU initialization after updates
` [PATCH v4 18/24] x86/virt/tdx: Restore TDX Module state
` [PATCH v4 19/24] x86/virt/tdx: Update tdx_sysinfo and check features post-update
` [PATCH v4 23/24] x86/virt/tdx: Document TDX Module updates
[PATCH 0/4] x86/vmware: Hypercall refactoring and improved guest support
2026-03-09 23:52 UTC (12+ messages)
` [PATCH 1/4] x86/vmware: Introduce common vmware_hypercall()
` [PATCH 2/4] x86/vmware: Log kmsg dump on panic
` [PATCH 3/4] x86/vmware: Report guest crash to the hypervisor
` [PATCH 4/4] x86/vmware: Support steal time clock for encrypted guests
` [PATCH v2 0/4] x86/vmware: Hypercall refactoring and improved guest support
` [PATCH v2 1/4] x86/vmware: Introduce common vmware_hypercall()
` [PATCH v2 2/4] x86/vmware: Log kmsg dump on panic
` [PATCH v2 3/4] x86/vmware: Report guest crash to the hypervisor
` [PATCH v2 4/4] x86/vmware: Support steal time clock for encrypted guests
[PATCH net-next v3 0/2] dma-buf: heaps: system: add an option to allocate explicitly decrypted memory
2026-03-09 17:51 UTC (15+ messages)
` [PATCH net-next v3 1/2] dma-mapping: introduce DMA_ATTR_CC_DECRYPTED for pre-decrypted memory
` [PATCH net-next v3 2/2] dma-buf: heaps: system: add system_cc_decrypted heap for explicitly decrypted memory
[PATCH v2 00/19] PCI/TSM: TEE I/O infrastructure
2026-03-09 16:58 UTC (34+ messages)
` [PATCH v2 01/19] PCI/TSM: Report active IDE streams per host bridge
` [PATCH v2 02/19] device core: Fix kernel-doc warnings in base.h
` [PATCH v2 03/19] device core: Introduce confidential device acceptance
` [PATCH v2 04/19] modules: Document the global async_probe parameter
` [PATCH v2 05/19] device core: Autoprobe considered harmful?
` [PATCH v2 06/19] PCI/TSM: Add Device Security (TVM Guest) LOCK operation support
` [PATCH v2 07/19] PCI/TSM: Add Device Security (TVM Guest) ACCEPT "
` [PATCH v2 08/19] PCI/TSM: Add "evidence" support
` [PATCH v2 09/19] PCI/TSM: Support creating encrypted MMIO descriptors via TDISP Report
` [PATCH v2 10/19] x86, swiotlb: Teach swiotlb to skip "accepted" devices
` [PATCH v2 11/19] x86, dma: Allow accepted devices to map private memory
` [PATCH v2 12/19] x86, ioremap, resource: Support IORES_DESC_ENCRYPTED for encrypted PCI MMIO
` [PATCH v2 13/19] samples/devsec: Introduce a PCI device-security bus + endpoint sample
` [PATCH v2 14/19] samples/devsec: Add sample IDE establishment
` [PATCH v2 15/19] samples/devsec: Add sample TSM bind and guest_request flows
` [PATCH v2 16/19] samples/devsec: Introduce a "Device Security TSM" sample driver
` [PATCH v2 17/19] tools/testing/devsec: Add a script to exercise samples/devsec/
` [PATCH v2 18/19] samples/devsec: Add evidence support
` [PATCH v2 19/19] tools/testing/devsec: Add basic evidence retrieval validation
[PATCH 0/4] Fuller TDX kexec support
2026-03-09 16:24 UTC (11+ messages)
` [PATCH 1/4] x86/tdx: Move all TDX error defines into <asm/shared/tdx_errno.h>
` [PATCH 2/4] x86/virt/tdx: Pull kexec cache flush logic into arch/x86
` [PATCH 3/4] x86/virt/tdx: Add SEAMCALL wrapper for TDH.SYS.DISABLE
` [PATCH 4/4] KVM: x86: Disable the TDX module during kexec and kdump
[PATCH v3 0/3] Enforce host page-size alignment for shared buffers
2026-03-09 15:55 UTC (9+ messages)
` [PATCH v3 1/3] dma-direct: swiotlb: handle swiotlb alloc/free outside __dma_direct_alloc_pages
` [PATCH v3 2/3] swiotlb: dma: its: Enforce host page-size alignment for shared buffers
` [PATCH v3 3/3] coco: guest: arm64: Add Realm Host Interface and hostconf RHI
[PATCH] KVM: SEV: Track SNP launch state and disallow invalid userspace interactions
2026-03-07 1:51 UTC (7+ messages)
SVSM Development Call March 4, 2026
2026-03-06 8:45 UTC (2+ messages)
[PATCH v3 0/2] Extend KVM_HC_MAP_GPA_RANGE api to allow retry
2026-03-05 22:27 UTC (7+ messages)
` [PATCH v3 1/2] KVM: TDX: Allow userspace to return errors to guest for MAPGPA
[PATCH v4 0/2] Extend KVM_HC_MAP_GPA_RANGE api to allow retry
2026-03-05 22:26 UTC (3+ messages)
` [PATCH v4 1/2] KVM: TDX: Allow userspace to return errors to guest for MAPGPA
` [PATCH v4 2/2] KVM: SEV: Restrict userspace return codes for KVM_HC_MAP_GPA_RANGE
[PATCH v3 00/16] KVM: x86/tdx: Have TDX handle VMXON during bringup
2026-03-05 19:08 UTC (8+ messages)
[PATCH 00/14] KVM: x86: Emulator MMIO fix and cleanups
2026-03-05 17:07 UTC (9+ messages)
` [PATCH 14/14] KVM: x86: Add helpers to prepare kvm_run for userspace MMIO exit
[PATCH v2] KVM: x86: synthesize CPUID bits only if CPU capability is set
2026-03-05 17:07 UTC (2+ messages)
[Invitation] bi-weekly guest_memfd upstream call on 2026-03-05
2026-03-04 20:11 UTC
[PATCH v4 0/4] x86/tdx: Clean up the definitions of TDX TD ATTRIBUTES
2026-03-04 15:02 UTC (6+ messages)
` [PATCH v4 1/4] x86/tdx: Fix the typo in TDX_ATTR_MIGRTABLE
` [PATCH v4 2/4] KVM: TDX: Remove redundant definitions of TDX_TD_ATTR_*
` [PATCH v4 3/4] x86/tdx: Rename TDX_ATTR_* to TDX_TD_ATTR_*
` [PATCH v4 4/4] KVM: TDX: Rename KVM_SUPPORTED_TD_ATTRS to KVM_SUPPORTED_TDX_TD_ATTRS
[PATCH kernel 0/9] PCI/TSM: coco/sev-guest: Implement SEV-TIO PCIe TDISP (phase2)
2026-03-04 12:43 UTC (28+ messages)
` [PATCH kernel 2/9] pci/tsm: Add tsm_tdi_status
` [PATCH kernel 4/9] dma/swiotlb: Stop forcing SWIOTLB for TDISP devices
` [PATCH kernel 6/9] x86/dma-direct: Stop changing encrypted page state "
` [PATCH kernel 9/9] pci: Allow encrypted MMIO mapping via sysfs
[PATCH v12 00/46] arm64: Support for Arm CCA in KVM
2026-03-04 12:08 UTC (21+ messages)
` [PATCH v12 06/46] arm64: RMI: Define the user ABI
` [PATCH v12 11/46] arm64: RMI: Activate realm on first VCPU run
` [PATCH v12 20/46] arm64: RMI: Allow populating initial contents
` [PATCH v12 27/46] KVM: arm64: Handle Realm PSCI requests
[PATCH v2 0/3] KVM: SEV: Add support for IBPB-on-Entry
2026-03-02 15:10 UTC (4+ messages)
` [PATCH v2 2/3] "
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox