messages from 2026-03-31 12:43:32 to 2026-04-07 17:48:24 UTC [more...]
[PATCH v2 00/16] fs,x86/resctrl: Add kernel-mode (e.g., PLZA) support to the resctrl subsystem
2026-04-07 17:48 UTC (8+ messages)
SVSM Development Call April 8th, 2026
2026-04-07 16:36 UTC
[PATCH v2 00/19] PCI/TSM: TEE I/O infrastructure
2026-04-07 16:02 UTC (16+ messages)
` [PATCH v2 01/19] PCI/TSM: Report active IDE streams per host bridge
` [PATCH v2 09/19] PCI/TSM: Support creating encrypted MMIO descriptors via TDISP Report
[PATCH v7 00/22] Runtime TDX module update support
2026-04-07 15:55 UTC (35+ messages)
` [PATCH v7 06/22] coco/tdx-host: Expose P-SEAMLDR information via sysfs
` [PATCH v7 07/22] coco/tdx-host: Implement firmware upload sysfs ABI for TDX module updates
` [PATCH v7 08/22] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v7 09/22] x86/virt/seamldr: Introduce skeleton for TDX module updates
` [PATCH v7 11/22] x86/virt/seamldr: Shut down the current TDX module
` [PATCH v7 12/22] x86/virt/tdx: Reset software states during TDX module shutdown
` [PATCH v7 13/22] x86/virt/seamldr: Install a new TDX module
` [PATCH v7 14/22] x86/virt/seamldr: Do TDX per-CPU initialization after updates
` [PATCH v7 15/22] x86/virt/tdx: Restore TDX module state
` [PATCH v7 16/22] x86/virt/tdx: Update tdx_sysinfo and check features post-update
` [PATCH v7 17/22] x86/virt/tdx: Avoid updates during update-sensitive operations
` [PATCH v7 18/22] coco/tdx-host: Don't expose P-SEAMLDR features on CPUs with erratum
` [PATCH v7 19/22] x86/virt/tdx: Enable TDX module runtime updates
` [PATCH v7 20/22] coco/tdx-host: Document TDX module update compatibility criteria
` [PATCH v7 21/22] x86/virt/tdx: Document TDX module update
` [PATCH v7 22/22] x86/virt/seamldr: Log TDX module update failures
[PATCH 0/7] KVM: x86: APX reg prep work
2026-04-07 13:20 UTC (18+ messages)
[PATCH v2] dma-buf: heaps: system: document system_cc_shared heap
2026-04-07 9:26 UTC
[PATCH] dma-buf: heaps: system: document system_cc_shared heap
2026-04-07 9:25 UTC (3+ messages)
[PATCH 0/2] struct page to PFN conversion for TDX guest private memory
2026-04-07 0:44 UTC (22+ messages)
` [PATCH 1/2] x86/virt/tdx: Use PFN directly for mapping "
` [PATCH 2/2] x86/virt/tdx: Use PFN directly for unmapping "
[PATCH] KVM: TDX: Fix APIC MSR ranges in tdx_has_emulated_msr()
2026-04-06 23:07 UTC (13+ messages)
[PATCH 0/2] x86/tdx: Fix memory hotplug in TDX guests
2026-04-03 19:41 UTC (14+ messages)
` [PATCH 2/2] x86/tdx: Accept hotplugged memory before online
[PATCH] x86/tdx: Use pg_level in TDX APIs, not the TDX-Module's 0-based level
2026-04-03 15:22 UTC (2+ messages)
[PATCH kernel 0/9] PCI/TSM: coco/sev-guest: Implement SEV-TIO PCIe TDISP (phase2)
2026-04-03 12:40 UTC (12+ messages)
` [PATCH kernel 4/9] dma/swiotlb: Stop forcing SWIOTLB for TDISP devices
[PATCH v3 0/6] KVM: SEV: Add support for IBPB-on-Entry and BTB Isolation
2026-04-02 20:25 UTC (7+ messages)
` [PATCH v3 1/6] cpu/bugs: Allow forcing Automatic IBRS with SNP active using spectre_v2=eibrs
` [PATCH v3 2/6] cpu/bugs: Allow spectre_v2=ibrs on x86 vendors other than Intel
` [PATCH v3 3/6] KVM: SEV: Disallow setting SNP-only features for non-SNP guests via a single mask
` [PATCH v3 4/6] KVM: SEV: Advertise SVM_SEV_FEAT_SNP_ACTIVE
` [PATCH v3 5/6] KVM: SEV: Add support for IBPB-on-Entry
` [PATCH v3 6/6] KVM: SEV: Add support for SNP BTB Isolation
[PATCH v3 0/5] Fuller TDX kexec support
2026-04-02 18:18 UTC (8+ messages)
` [PATCH v3 1/5] x86/tdx: Move TDX architectural error codes into <asm/shared/tdx_errno.h>
` [PATCH v3 2/5] x86/virt/tdx: Pull kexec cache flush logic into arch/x86
` [PATCH v3 3/5] x86/virt/tdx: Add SEAMCALL wrapper for TDH.SYS.DISABLE
` [PATCH v3 4/5] x86/tdx: Disable the TDX module during kexec and kdump
` [PATCH v3 5/5] x86/virt/tdx: Remove kexec docs
[PATCH v5 0/2] dma-buf: heaps: system: add an option to allocate explicitly shared/decrypted memory
2026-04-02 12:58 UTC (12+ messages)
` [PATCH v5 1/2] dma-mapping: introduce DMA_ATTR_CC_SHARED for shared memory
` [PATCH v5 2/2] dma-buf: heaps: system: add system_cc_shared heap for explicitly "
[Invitation] bi-weekly guest_memfd upstream call on 2026-04-02
2026-04-02 12:11 UTC
[PATCH v2 00/31] PCI/TSM: PCIe Link Encryption Establishment via TDX platform services
2026-04-02 11:29 UTC (33+ messages)
` [PATCH v2 03/31] x86/virt/tdx: Add tdx_page_array helpers for new TDX Module objects
` [PATCH v2 04/31] x86/virt/tdx: Support allocating contiguous pages for tdx_page_array
` [PATCH v2 05/31] x86/virt/tdx: Extend tdx_page_array to support IOMMU_MT
` [PATCH v2 06/31] x86/virt/tdx: Read global metadata for TDX Module Extensions/Connect
` [PATCH v2 08/31] x86/virt/tdx: Configure TDX Module with optional TDX Connect feature
` [PATCH v2 11/31] x86/virt/tdx: Make TDX Module initialize Extensions
` [PATCH v2 27/31] coco/tdx-host: Implement SPDM session setup
SVSM Development Call April 1st, 2026
2026-04-02 7:54 UTC (2+ messages)
[PATCH v2 0/5] Fuller TDX kexec support
2026-04-01 18:30 UTC (21+ messages)
` [PATCH v2 1/5] x86/tdx: Move all TDX error defines into <asm/shared/tdx_errno.h>
` [PATCH v2 2/5] x86/virt/tdx: Pull kexec cache flush logic into arch/x86
` [PATCH v2 3/5] x86/virt/tdx: Add SEAMCALL wrapper for TDH.SYS.DISABLE
[PATCH v3 3/6] x86/sev: Add support to perform RMP optimizations asynchronously
2026-04-01 16:10 UTC (5+ messages)
[PATCH v13 00/48] arm64: Support for Arm CCA in KVM
2026-04-01 10:54 UTC (8+ messages)
` [PATCH v13 10/48] arm64: RMI: Ensure that the RMM has GPT entries for memory
` [PATCH v13 12/48] arm64: RMI: Basic infrastructure for creating a realm
[PATCH 0/2] x86/tdx: Port I/O emulation fixes
2026-04-01 8:34 UTC (8+ messages)
` [PATCH 1/2] x86/tdx: Fix off-by-one in port I/O handling
` [PATCH 2/2] x86/tdx: Fix zero-extension for 32-bit port I/O
page: | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox