Linux Confidential Computing Development
 help / color / mirror / Atom feed
 messages from 2026-05-15 19:21:24 to 2026-05-20 20:01:31 UTC [more...]

[PATCH v3 00/41] x86: Try to wrangle PV clocks vs. TSC
 2026-05-20 20:01 UTC  (25+ messages)
` [PATCH v3 01/41] x86/tsc: Add a standalone helpers for getting TSC info from CPUID.0x15
` [PATCH v3 02/41] x86/tsc: Add helper to register CPU and TSC freq calibration routines
` [PATCH v3 03/41] x86/sev: Mark TSC as reliable when configuring Secure TSC
` [PATCH v3 04/41] x86/sev: Move check for SNP Secure TSC support to tsc_early_init()
` [PATCH v3 05/41] x86/tdx: Override PV calibration routines with CPUID-based calibration
` [PATCH v3 06/41] x86/acrn: Mark TSC frequency as known when using ACRN for calibration
` [PATCH v3 40/41] x86/tsc: Add standalone helper for getting CPU frequency from CPUID
` [PATCH v3 41/41] x86/kvmclock: Get CPU base frequency from CPUID when it's available

[PATCH v10 00/25] Runtime TDX module update support
 2026-05-20 19:42 UTC  (31+ messages)
` [PATCH v10 01/25] x86/virt/tdx: Clarify try_init_module_global() result caching
` [PATCH v10 02/25] x86/virt/tdx: Move TDX global initialization states to file scope
` [PATCH v10 03/25] x86/virt/tdx: Consolidate TDX global initialization states
` [PATCH v10 04/25] x86/virt/tdx: Move TDX_FEATURES0 bits to asm/tdx.h
` [PATCH v10 05/25] x86/virt/tdx: Move low level SEAMCALL helpers out of <asm/tdx.h>
` [PATCH v10 06/25] coco/tdx-host: Introduce a "tdx_host" device
` [PATCH v10 07/25] coco/tdx-host: Expose TDX module version
` [PATCH v10 08/25] x86/virt/seamldr: Introduce a wrapper for P-SEAMLDR SEAMCALLs
` [PATCH v10 09/25] x86/virt/seamldr: Add a helper to retrieve P-SEAMLDR information
` [PATCH v10 10/25] coco/tdx-host: Expose P-SEAMLDR information via sysfs
` [PATCH v10 11/25] coco/tdx-host: Don't expose P-SEAMLDR information on CPUs with erratum
` [PATCH v10 12/25] coco/tdx-host: Implement firmware upload sysfs ABI for TDX module updates
` [PATCH v10 13/25] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v10 14/25] x86/virt/seamldr: Introduce skeleton for TDX module updates
` [PATCH v10 15/25] x86/virt/seamldr: Abort updates after a failed step
` [PATCH v10 16/25] x86/virt/seamldr: Shut down the current TDX module
` [PATCH v10 17/25] x86/virt/tdx: Reset software states during TDX module shutdown
` [PATCH v10 18/25] x86/virt/seamldr: Install a new TDX module
` [PATCH v10 19/25] x86/virt/seamldr: Do TDX global and per-CPU init after module installation
` [PATCH v10 20/25] x86/virt/tdx: Restore TDX module state
` [PATCH v10 21/25] x86/virt/tdx: Refresh TDX module version after update
` [PATCH v10 22/25] x86/virt/tdx: Reject updates during compatibility-sensitive operations
` [PATCH v10 23/25] x86/virt/tdx: Enable TDX module runtime updates
` [PATCH v10 24/25] coco/tdx-host: Document TDX module update compatibility criteria
` [PATCH v10 25/25] x86/virt/tdx: Document TDX module update

[PATCH v6 00/43] guest_memfd: In-place conversion support
 2026-05-20 18:59 UTC  (29+ messages)
` [PATCH v6 02/43] KVM: Rename KVM_GENERIC_MEMORY_ATTRIBUTES to KVM_VM_MEMORY_ATTRIBUTES
` [PATCH v6 03/43] KVM: Enumerate support for PRIVATE memory iff kvm_arch_has_private_mem is defined
` [PATCH v6 04/43] KVM: Stub in ability to disable per-VM memory attribute tracking
` [PATCH v6 05/43] KVM: guest_memfd: Wire up kvm_get_memory_attributes() to per-gmem attributes
` [PATCH v6 06/43] KVM: x86/mmu: Bug the VM if gmem attributes are queried to determine max mapping level
` [PATCH v6 07/43] KVM: guest_memfd: Update kvm_gmem_populate() to use gmem attributes
` [PATCH v6 08/43] KVM: guest_memfd: Only prepare folios for private pages
` [PATCH v6 09/43] KVM: Move kvm_supported_mem_attributes() to kvm_host.h
` [PATCH v6 10/43] KVM: guest_memfd: Add base support for KVM_SET_MEMORY_ATTRIBUTES2
` [PATCH v6 11/43] KVM: guest_memfd: Ensure pages are not in use before conversion
` [PATCH v6 12/43] KVM: guest_memfd: Call arch invalidate hooks on conversion
` [PATCH v6 13/43] KVM: guest_memfd: Return early if range already has requested attributes
` [PATCH v6 14/43] KVM: guest_memfd: Advertise KVM_SET_MEMORY_ATTRIBUTES2 ioctl

SVSM Development Call May 20th, 2026
 2026-05-20 18:44 UTC  (2+ messages)

[PATCH v2 00/15] KVM: x86: Clean up kvm_<reg>_{read,write}() mess
 2026-05-20 18:11 UTC  (24+ messages)
` [PATCH v2 03/15] KVM: x86/xen: Don't truncate RAX when handling hypercall from protected guest
` [PATCH v2 08/15] KVM: x86: Add mode-aware versions of kvm_<reg>_{read,write}() helpers
` [PATCH v2 15/15] KVM: x86: Move the bulk of register specific code from x86.c to regs.c

[PATCH v14 00/44] arm64: Support for Arm CCA in KVM
 2026-05-20 16:01 UTC  (23+ messages)
` [PATCH v14 04/44] arm64: RMI: Add SMC definitions for calling the RMM
` [PATCH v14 05/44] arm64: RMI: Add wrappers for RMI calls
` [PATCH v14 08/44] arm64: RMI: Ensure that the RMM has GPT entries for memory
` [PATCH v14 10/44] arm64: RMI: Add support for SRO
` [PATCH v14 14/44] arm64: RMI: Basic infrastructure for creating a realm
` [PATCH v14 17/44] arm64: RMI: RTT tear down
` [PATCH v14 23/44] arm64: RMI: Handle RMI_EXIT_RIPAS_CHANGE
` [PATCH v14 27/44] arm64: RMI: Set RIPAS of initial memslots
` [PATCH v14 37/44] arm64: RMI: Prevent Device mappings for Realms

[PATCH v4 00/13] dma-mapping: Use DMA_ATTR_CC_SHARED through direct, pool and swiotlb paths
 2026-05-20 13:40 UTC  (43+ messages)
` [PATCH v4 03/13] dma-pool: track decrypted atomic pools and select them via attrs
` [PATCH v4 04/13] dma: swiotlb: track pool encryption state and honor DMA_ATTR_CC_SHARED
` [PATCH v4 07/13] dma-direct: make dma_direct_map_phys() "

[PATCH v9 00/23] Runtime TDX module update support
 2026-05-20 11:23 UTC  (50+ messages)
` [PATCH v9 01/23] x86/virt/tdx: Consolidate TDX global initialization states
` [PATCH v9 02/23] x86/virt/tdx: Move TDX_FEATURES0 bits to asm/tdx.h
` [PATCH v9 04/23] coco/tdx-host: Introduce a "tdx_host" device
` [PATCH v9 05/23] coco/tdx-host: Expose TDX module version
` [PATCH v9 07/23] x86/virt/seamldr: Add a helper to retrieve P-SEAMLDR information
` [PATCH v9 08/23] coco/tdx-host: Expose P-SEAMLDR information via sysfs
` [PATCH v9 09/23] coco/tdx-host: Don't expose P-SEAMLDR information on CPUs with erratum
` [PATCH v9 10/23] coco/tdx-host: Implement firmware upload sysfs ABI for TDX module updates
` [PATCH v9 11/23] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v9 12/23] x86/virt/seamldr: Introduce skeleton for TDX module updates
` [PATCH v9 13/23] x86/virt/seamldr: Abort updates after a failed step
` [PATCH v9 14/23] x86/virt/seamldr: Shut down the current TDX module
` [PATCH v9 19/23] x86/virt/tdx: Refresh TDX module version after update

[PATCH v5 0/3] Switch Arm CCA to use an auxiliary device instead of a platform device
 2026-05-20  8:11 UTC  (8+ messages)
` [PATCH v5 1/3] firmware: smccc: coco: Manage arm-smccc platform device and CCA auxiliary drivers

[RFC PATCH v4 00/14] coco/TSM: Host-side Arm CCA IDE setup via connect/disconnect callbacks
 2026-05-19  9:46 UTC  (5+ messages)

[PATCH v2] KVM: TDX: Fix x2APIC MSR handling in tdx_has_emulated_msr()
 2026-05-19  0:41 UTC  (2+ messages)

[RFC PATCH v5 00/45] TDX: Dynamic PAMT + S-EPT Hugepage
 2026-05-19  0:40 UTC  (2+ messages)

[PATCH 0/4] x86/vmware: Hypercall refactoring and improved guest support
 2026-05-18 22:52 UTC  (3+ messages)
` [PATCH v2 "

[PATCH v5 0/7] Add RMPOPT support
 2026-05-18 22:38 UTC  (11+ messages)
` [PATCH v5 1/7] x86/cpufeatures: Add X86_FEATURE_AMD_RMPOPT feature flag
` [PATCH v5 2/7] x86/msr: add wrmsrq_on_cpus helper
` [PATCH v5 3/7] x86/sev: Initialize RMPOPT configuration MSRs
` [PATCH v5 4/7] x86/sev: Add support to perform RMP optimizations asynchronously
` [PATCH v5 5/7] x86/sev: Add interface to re-enable RMP optimizations
` [PATCH v5 6/7] KVM: SEV: Perform RMP optimizations on SNP guest shutdown
` [PATCH v5 7/7] x86/sev: Add debugfs support for RMPOPT


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox