messages from 2026-03-19 03:20:55 to 2026-03-27 07:43:13 UTC [more...]
[PATCH 0/2] struct page to PFN conversion for TDX guest private memory
2026-03-27 7:03 UTC (22+ messages)
` [PATCH 1/2] x86/virt/tdx: Use PFN directly for mapping "
` [PATCH 2/2] x86/virt/tdx: Use PFN directly for unmapping "
[PATCH 0/2] x86/tdx: Fix memory hotplug in TDX guests
2026-03-27 3:05 UTC (10+ messages)
` [PATCH 1/2] x86/tdx: Handle TDG.MEM.PAGE.ACCEPT success-with-warning returns
` [PATCH 2/2] x86/tdx: Accept hotplugged memory before online
[PATCH v2 00/19] PCI/TSM: TEE I/O infrastructure
2026-03-26 23:38 UTC (38+ messages)
` [PATCH v2 03/19] device core: Introduce confidential device acceptance
` [PATCH v2 08/19] PCI/TSM: Add "evidence" support
` [PATCH v2 09/19] PCI/TSM: Support creating encrypted MMIO descriptors via TDISP Report
` [PATCH v2 12/19] x86, ioremap, resource: Support IORES_DESC_ENCRYPTED for encrypted PCI MMIO
[PATCH v2 00/16] fs,x86/resctrl: Add kernel-mode (e.g., PLZA) support to the resctrl subsystem
2026-03-26 19:10 UTC (10+ messages)
` [PATCH v2 01/16] fs/resctrl: Add kernel mode (kmode) data structures and arch hook
` [PATCH v2 02/16] fs, x86/resctrl: Add architecture routines for kernel mode initialization
[PATCH v6 00/22] Runtime TDX module update support
2026-03-26 13:03 UTC (27+ messages)
` [PATCH v6 01/22] x86/virt/tdx: Move low level SEAMCALL helpers out of <asm/tdx.h>
` [PATCH v6 02/22] coco/tdx-host: Introduce a "tdx_host" device
` [PATCH v6 03/22] coco/tdx-host: Expose TDX module version
` [PATCH v6 04/22] x86/virt/seamldr: Introduce a wrapper for P-SEAMLDR SEAMCALLs
` [PATCH v6 05/22] x86/virt/seamldr: Add a helper to retrieve P-SEAMLDR information
` [PATCH v6 06/22] coco/tdx-host: Expose P-SEAMLDR information via sysfs
` [PATCH v6 07/22] coco/tdx-host: Implement firmware upload sysfs ABI for TDX module updates
` [PATCH v6 08/22] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v6 09/22] x86/virt/seamldr: Introduce skeleton for TDX module updates
` [PATCH v6 10/22] x86/virt/seamldr: Abort updates if errors occurred midway
` [PATCH v6 11/22] x86/virt/seamldr: Shut down the current TDX module
` [PATCH v6 12/22] x86/virt/tdx: Reset software states during TDX module shutdown
` [PATCH v6 13/22] x86/virt/seamldr: Install a new TDX module
` [PATCH v6 14/22] x86/virt/seamldr: Do TDX per-CPU initialization after updates
` [PATCH v6 15/22] x86/virt/tdx: Restore TDX module state
` [PATCH v6 16/22] x86/virt/tdx: Update tdx_sysinfo and check features post-update
` [PATCH v6 17/22] x86/virt/tdx: Avoid updates during update-sensitive operations
` [PATCH v6 18/22] coco/tdx-host: Don't expose P-SEAMLDR features on CPUs with erratum
` [PATCH v6 19/22] x86/virt/tdx: Enable TDX module runtime updates
` [PATCH v6 20/22] coco/tdx-host: Document TDX module update compatibility criteria
` [PATCH v6 21/22] x86/virt/tdx: Document TDX module update
` [PATCH v6 22/22] x86/virt/seamldr: Log TDX module update failures
[PATCH v13 00/48] arm64: Support for Arm CCA in KVM
2026-03-26 11:22 UTC (78+ messages)
` [PATCH v13 05/48] arm64: RMI: Temporarily add SMCs from RMM v1.0 spec
` [PATCH v13 07/48] arm64: RMI: Check for RMI support at KVM init
` [PATCH v13 10/48] arm64: RMI: Ensure that the RMM has GPT entries for memory
` [PATCH v13 12/48] arm64: RMI: Basic infrastructure for creating a realm
` [PATCH v13 13/48] kvm: arm64: Don't expose unsupported capabilities for realm guests
` [PATCH v13 15/48] arm64: RMI: RTT tear down
` [PATCH v13 17/48] arm64: RMI: Allocate/free RECs to match vCPUs
` [PATCH v13 20/48] arm64: RMI: Handle realm enter/exit
` [PATCH v13 21/48] arm64: RMI: Handle RMI_EXIT_RIPAS_CHANGE
` [PATCH v13 23/48] KVM: arm64: Expose support for private memory
` [PATCH v13 24/48] arm64: RMI: Allow populating initial contents
` [PATCH v13 26/48] arm64: RMI: Create the realm descriptor
` [PATCH v13 27/48] arm64: RMI: Runtime faulting of memory
` [PATCH v13 36/48] arm64: RMI: Always use 4k pages for realms
` [PATCH v13 37/48] arm64: RMI: Prevent Device mappings for Realms
` [PATCH v13 39/48] arm64: RMI: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v13 45/48] arm64: RMI: Provide accurate register list
` [PATCH v13 46/48] KVM: arm64: Expose KVM_ARM_VCPU_REC to user space
[PATCH v2 3/7] x86/sev: add support for RMPOPT instruction
2026-03-26 2:14 UTC (6+ messages)
[PATCH v5 0/2] dma-buf: heaps: system: add an option to allocate explicitly shared/decrypted memory
2026-03-25 19:23 UTC (3+ messages)
` [PATCH v5 1/2] dma-mapping: introduce DMA_ATTR_CC_SHARED for shared memory
` [PATCH v5 2/2] dma-buf: heaps: system: add system_cc_shared heap for explicitly "
[PATCH 0/7] KVM: x86: APX reg prep work
2026-03-25 18:28 UTC (5+ messages)
[PATCH kernel 0/9] PCI/TSM: coco/sev-guest: Implement SEV-TIO PCIe TDISP (phase2)
2026-03-25 10:42 UTC (12+ messages)
` [PATCH kernel 4/9] dma/swiotlb: Stop forcing SWIOTLB for TDISP devices
SVSM Development Call March 25, 2026
2026-03-24 19:14 UTC
[PATCH v4 0/2] dma-buf: heaps: system: add an option to allocate explicitly decrypted memory
2026-03-24 19:11 UTC (8+ messages)
` [PATCH v4 1/2] dma-mapping: introduce DMA_ATTR_CC_DECRYPTED for pre-decrypted memory
` [PATCH v4 2/2] dma-buf: heaps: system: add system_cc_decrypted heap for explicitly decrypted memory
[PATCH net-next v3 0/2] dma-buf: heaps: system: add an option to allocate explicitly decrypted memory
2026-03-24 18:32 UTC (8+ messages)
[PATCH v2 0/5] Fuller TDX kexec support
2026-03-24 10:18 UTC (13+ messages)
` [PATCH v2 1/5] x86/tdx: Move all TDX error defines into <asm/shared/tdx_errno.h>
` [PATCH v2 2/5] x86/virt/tdx: Pull kexec cache flush logic into arch/x86
` [PATCH v2 3/5] x86/virt/tdx: Add SEAMCALL wrapper for TDH.SYS.DISABLE
` [PATCH v2 4/5] x86/tdx: Disable the TDX module during kexec and kdump
` [PATCH v2 5/5] x86/virt/tdx: Remove kexec docs
[PATCH v3 2/3] swiotlb: dma: its: Enforce host page-size alignment for shared buffers
2026-03-23 13:52 UTC (3+ messages)
[PATCH v5 00/22] Runtime TDX module update support
2026-03-23 2:14 UTC (45+ messages)
` [PATCH v5 04/22] x86/virt/seamldr: Introduce a wrapper for P-SEAMLDR SEAMCALLs
` [PATCH v5 08/22] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v5 09/22] x86/virt/seamldr: Introduce skeleton for TDX module updates
` [PATCH v5 10/22] x86/virt/seamldr: Abort updates if errors occurred midway
` [PATCH v5 11/22] x86/virt/seamldr: Shut down the current TDX module
` [PATCH v5 13/22] x86/virt/seamldr: Install a new "
` [PATCH v5 14/22] x86/virt/seamldr: Do TDX per-CPU initialization after updates
` [PATCH v5 15/22] x86/virt/tdx: Restore TDX module state
` [PATCH v5 16/22] x86/virt/tdx: Update tdx_sysinfo and check features post-update
` [PATCH v5 17/22] x86/virt/tdx: Avoid updates during update-sensitive operations
` [PATCH v5 18/22] coco/tdx-host: Don't expose P-SEAMLDR features on CPUs with erratum
` [PATCH v5 19/22] x86/virt/tdx: Enable TDX module runtime updates
` [PATCH v5 20/22] coco/tdx-host: Document TDX module update compatibility criteria
` [PATCH v5 21/22] x86/virt/tdx: Document TDX module update
` [PATCH v5 22/22] x86/virt/seamldr: Log TDX module update failures
[PATCH] KVM: TDX: Fix APIC MSR ranges in tdx_has_emulated_msr()
2026-03-19 19:33 UTC (6+ messages)
[PATCH] sample/tsm-mr: Use SHA-2 library APIs
2026-03-19 17:51 UTC (4+ messages)
[Invitation] bi-weekly guest_memfd upstream call on 2026-03-19
2026-03-19 6:05 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox