messages from 2026-03-09 15:45:42 to 2026-03-16 12:41:30 UTC [more...]
[PATCH v5 00/22] Runtime TDX module update support
2026-03-16 12:41 UTC (25+ messages)
` [PATCH v5 01/22] x86/virt/tdx: Move low level SEAMCALL helpers out of <asm/tdx.h>
` [PATCH v5 02/22] coco/tdx-host: Introduce a "tdx_host" device
` [PATCH v5 03/22] coco/tdx-host: Expose TDX module version
` [PATCH v5 04/22] x86/virt/seamldr: Introduce a wrapper for P-SEAMLDR SEAMCALLs
` [PATCH v5 05/22] x86/virt/seamldr: Retrieve P-SEAMLDR information
` [PATCH v5 06/22] coco/tdx-host: Expose P-SEAMLDR information via sysfs
` [PATCH v5 07/22] coco/tdx-host: Implement firmware upload sysfs ABI for TDX module updates
` [PATCH v5 08/22] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v5 09/22] x86/virt/seamldr: Introduce skeleton for TDX module updates
` [PATCH v5 10/22] x86/virt/seamldr: Abort updates if errors occurred midway
` [PATCH v5 11/22] x86/virt/seamldr: Shut down the current TDX module
` [PATCH v5 12/22] x86/virt/tdx: Reset software states during TDX module shutdown
` [PATCH v5 13/22] x86/virt/seamldr: Install a new TDX module
` [PATCH v5 14/22] x86/virt/seamldr: Do TDX per-CPU initialization after updates
` [PATCH v5 15/22] x86/virt/tdx: Restore TDX module state
` [PATCH v5 16/22] x86/virt/tdx: Update tdx_sysinfo and check features post-update
` [PATCH v5 17/22] x86/virt/tdx: Avoid updates during update-sensitive operations
` [PATCH v5 18/22] coco/tdx-host: Don't expose P-SEAMLDR features on CPUs with erratum
` [PATCH v5 19/22] x86/virt/tdx: Enable TDX module runtime updates
` [PATCH v5 20/22] coco/tdx-host: Document TDX module update compatibility criteria
` [PATCH v5 21/22] x86/virt/tdx: Document TDX module update
` [PATCH v5 22/22] x86/virt/seamldr: Log TDX module update failures
[PATCH 0/4] Fuller TDX kexec support
2026-03-16 11:51 UTC (12+ messages)
` [PATCH 1/4] x86/tdx: Move all TDX error defines into <asm/shared/tdx_errno.h>
` [PATCH 2/4] x86/virt/tdx: Pull kexec cache flush logic into arch/x86
` [PATCH 3/4] x86/virt/tdx: Add SEAMCALL wrapper for TDH.SYS.DISABLE
` [PATCH 4/4] KVM: x86: Disable the TDX module during kexec and kdump
[PATCH v2 00/19] PCI/TSM: TEE I/O infrastructure
2026-03-16 5:19 UTC (34+ messages)
` [PATCH v2 01/19] PCI/TSM: Report active IDE streams per host bridge
` [PATCH v2 02/19] device core: Fix kernel-doc warnings in base.h
` [PATCH v2 03/19] device core: Introduce confidential device acceptance
` [PATCH v2 05/19] device core: Autoprobe considered harmful?
` [PATCH v2 08/19] PCI/TSM: Add "evidence" support
` [PATCH v2 09/19] PCI/TSM: Support creating encrypted MMIO descriptors via TDISP Report
` [PATCH v2 10/19] x86, swiotlb: Teach swiotlb to skip "accepted" devices
[PATCH] coco/guest: Remove unneeded selection of CRYPTO
2026-03-15 17:15 UTC (5+ messages)
[PATCH v2 0/3] KVM: SEV: Add support for BTB Isolation
2026-03-13 20:04 UTC (8+ messages)
` [PATCH v2 1/3] cpu/bugs: Allow forcing Automatic IBRS with SNP enabled using spectre_v2=eibrs
` [PATCH v2 2/3] cpu/bugs: Allow spectre_v2=ibrs on x86 vendors other than Intel
` [PATCH v2 3/3] KVM: SEV: Add support for SNP BTB Isolation
[PATCH v4 00/24] Runtime TDX Module update support
2026-03-13 17:43 UTC (51+ messages)
` [PATCH v4 04/24] x86/virt/seamldr: Introduce a wrapper for P-SEAMLDR SEAMCALLs
` [PATCH v4 07/24] coco/tdx-host: Implement firmware upload sysfs ABI for TDX Module updates
` [PATCH v4 08/24] x86/virt/seamldr: Block TDX Module updates if any CPU is offline
` [PATCH v4 09/24] x86/virt/seamldr: Check update limit before TDX Module updates
` [PATCH v4 10/24] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v4 11/24] x86/virt/seamldr: Introduce skeleton for TDX Module updates
` [PATCH v4 13/24] x86/virt/seamldr: Shut down the current TDX module
` [PATCH v4 19/24] x86/virt/tdx: Update tdx_sysinfo and check features post-update
` [PATCH v4 23/24] x86/virt/tdx: Document TDX Module updates
` [PATCH v4 24/24] [NOT-FOR-REVIEW] x86/virt/seamldr: Save and restore current VMCS
[PATCH 0/1] Arm Live Firmware Activation (LFA) support
2026-03-13 14:39 UTC (4+ messages)
` [PATCH 1/1] firmware: smccc: add support for Live Firmware Activation (LFA)
SVSM Development Call March 11, 2026
2026-03-13 10:49 UTC (2+ messages)
[PATCH 0/7] KVM: x86: APX reg prep work
2026-03-13 0:38 UTC (20+ messages)
` [PATCH 1/7] KVM: x86: Add dedicated storage for guest RIP
` [PATCH 2/7] KVM: x86: Drop the "EX" part of "EXREG" to avoid collision with APX
` [PATCH 3/7] KVM: nVMX: Do a bitwise-AND of regs_avail when switching active VMCS
` [PATCH 4/7] KVM: x86: Add wrapper APIs to reset dirty/available register masks
` [PATCH 5/7] KVM: x86: Track available/dirty register masks as "unsigned long" values
` [PATCH 6/7] KVM: x86: Use a proper bitmap for tracking available/dirty registers
` [PATCH 7/7] *** DO NOT MERGE *** KVM: x86: Pretend that APX is supported on 64-bit kernels
[PATCH v2 00/16] fs,x86/resctrl: Add kernel-mode (e.g., PLZA) support to the resctrl subsystem
2026-03-12 20:37 UTC (17+ messages)
` [PATCH v2 01/16] fs/resctrl: Add kernel mode (kmode) data structures and arch hook
` [PATCH v2 02/16] fs, x86/resctrl: Add architecture routines for kernel mode initialization
` [PATCH v2 03/16] fs/resctrl: Add info/kernel_mode file to show kernel mode options
` [PATCH v2 04/16] x86/resctrl: Support Privilege-Level Zero Association (PLZA)
` [PATCH v2 05/16] x86/resctrl: Initialize supported kernel modes when CPUID reports PLZA
` [PATCH v2 06/16] resctrl: Introduce kmode static key enable/disable helpers
` [PATCH v2 07/16] x86/resctrl: Add data structures and definitions for PLZA configuration
` [PATCH v2 08/16] x86/resctrl: Add per-CPU and per-task kernel mode state
` [PATCH v2 09/16] x86,fs/resctrl: Add the functionality to configure PLZA
` [PATCH v2 10/16] x86/resctrl: Add PLZA state tracking and context switch handling
` [PATCH v2 11/16] fs/resctrl: Add write handler for info/kernel_mode
` [PATCH v2 12/16] fs/resctrl: Add info/kernel_mode_assignment to show kernel-mode rdtgroup
` [PATCH v2 13/16] fs/resctrl: Add write interface for kernel_mode_assignment
` [PATCH v2 14/16] fs/resctrl: Update kmode configuration when cpu_mask changes
` [PATCH v2 15/16] x86/resctrl: Refactor show_rdt_tasks() to support PLZA tasks
` [PATCH v2 16/16] fs/resctrl: Add per-task kmode enable support via rdtgroup
[PATCH net-next v3 0/2] dma-buf: heaps: system: add an option to allocate explicitly decrypted memory
2026-03-12 13:27 UTC (17+ messages)
` [PATCH net-next v3 1/2] dma-mapping: introduce DMA_ATTR_CC_DECRYPTED for pre-decrypted memory
` [PATCH net-next v3 2/2] dma-buf: heaps: system: add system_cc_decrypted heap for explicitly decrypted memory
[PATCH v12 00/46] arm64: Support for Arm CCA in KVM
2026-03-12 10:45 UTC (8+ messages)
` [PATCH v12 06/46] arm64: RMI: Define the user ABI
[RFC PATCH v3 00/12] coco/TSM: Implement host-side support for Arm CCA TDISP setup
2026-03-12 8:07 UTC (13+ messages)
` [RFC PATCH v3 01/12] coco: host: arm64: Add support for virtual device communication
` [RFC PATCH v3 02/12] coco: host: arm64: Add support for RMM vdev objects
` [RFC PATCH v3 03/12] coco: host: arm64: Add helpers to unlock and destroy RMM vdev
` [RFC PATCH v3 04/12] coco: host: arm64: Add support for da object read RHI handling
` [RFC PATCH v3 05/12] coco: host: arm64: Add helper for cached object fetches
` [RFC PATCH v3 06/12] coco: host: arm64: Fetch interface report via RMI
` [RFC PATCH v3 07/12] coco: host: arm64: Fetch device measurements "
` [RFC PATCH v3 08/12] coco: host: KVM: arm64: Handle vdev request exits and completion
` [RFC PATCH v3 09/12] coco: host: KVM: arm64: Handle vdev map/validation exits
` [RFC PATCH v3 10/12] KVM: arm64: Unmap device mappings when a private granule is destroyed
` [RFC PATCH v3 11/12] coco: host: arm64: Transition vdevs to TDISP RUN state
` [RFC PATCH v3 12/12] KVM: arm64: CCA: enable DA in realm create parameters
[RFC PATCH v3 00/11] coco/TSM: Arm CCA guest TDISP lock/accept flow with verification and DMA enable
2026-03-12 8:04 UTC (12+ messages)
` [RFC PATCH v3 01/11] coco: guest: arm64: Guest TSM callback and realm device lock support
` [RFC PATCH v3 02/11] coco: guest: arm64: Fix a typo in the ARM_CCA_GUEST Kconfig help string ("and" -> "an")
` [RFC PATCH v3 03/11] coco: guest: arm64: Add Realm Host Interface and guest DA helper
` [RFC PATCH v3 04/11] coco: guest: arm64: Support guest-initiated TDI lock/unlock transitions
` [RFC PATCH v3 05/11] coco: guest: arm64: Refresh interface-report cache during device lock
` [RFC PATCH v3 06/11] coco: guest: arm64: Add measurement refresh via RHI_DA_VDEV_GET_MEASUREMENTS
` [RFC PATCH v3 07/11] coco: guest: arm64: Add guest APIs to read host-cached DA objects
` [RFC PATCH v3 08/11] coco: guest: arm64: Verify DA evidence with RSI_VDEV_GET_INFO digests
` [RFC PATCH v3 09/11] coco: guest: arm64: Hook TSM accept to Realm TDISP RUN transition
` [RFC PATCH v3 10/11] coco: arm64: dma: Update force_dma_unencrypted for accepted devices
` [RFC PATCH v3 11/11] coco: guest: arm64: Enable vdev DMA after attestation
[RFC PATCH v3 00/10] coco/TSM: Host-side Arm CCA IDE setup via connect/disconnect callbacks
2026-03-12 8:01 UTC (11+ messages)
` [RFC PATCH v3 01/10] KVM: arm64: RMI: Add and export kvm_has_da_feature helper
` [RFC PATCH v3 02/10] coco: host: arm64: Add host TSM callback and IDE stream allocation support
` [RFC PATCH v3 03/10] coco: host: arm64: Build and register RMM pdev descriptors
` [RFC PATCH v3 04/10] coco: host: arm64: Add RMM device communication helpers
` [RFC PATCH v3 05/10] coco: host: arm64: Add helper to stop and tear down an RMM pdev
` [RFC PATCH v3 06/10] coco: host: arm64: Instantiate RMM pdev during device connect
` [RFC PATCH v3 07/10] X.509: Make certificate parser public
` [RFC PATCH v3 08/10] X.509: Parse Subject Alternative Name in certificates
` [RFC PATCH v3 09/10] X.509: Move certificate length retrieval into new helper
` [RFC PATCH v3 10/10] coco: host: arm64: Register device public key with RMM
[PATCH v2 0/7] Add RMPOPT support
2026-03-11 22:20 UTC (14+ messages)
` [PATCH v2 3/7] x86/sev: add support for RMPOPT instruction
` [PATCH v2 5/7] KVM: guest_memfd: Add cleanup interface for guest teardown
[PATCH v2 0/4] Enforce host page-size alignment for shared buffers
2026-03-11 12:24 UTC (6+ messages)
` [PATCH v2 4/4] dma: direct: set decrypted flag for remapped dma allocations
[PATCH 0/1] [Test Report] get qutoe time via tdvmcall
2026-03-10 18:58 UTC (5+ messages)
` [PATCH 1/1] virt: tdx-guest: Optimize the get-quote polling interval time
[PATCH 0/4] x86/vmware: Hypercall refactoring and improved guest support
2026-03-09 23:52 UTC (6+ messages)
` [PATCH v2 "
` [PATCH v2 1/4] x86/vmware: Introduce common vmware_hypercall()
` [PATCH v2 2/4] x86/vmware: Log kmsg dump on panic
` [PATCH v2 3/4] x86/vmware: Report guest crash to the hypervisor
` [PATCH v2 4/4] x86/vmware: Support steal time clock for encrypted guests
[PATCH v3 2/3] swiotlb: dma: its: Enforce host page-size alignment for shared buffers
2026-03-09 15:55 UTC (3+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox