Linux Confidential Computing Development
 help / color / mirror / Atom feed
 messages from 2026-05-20 22:54:48 to 2026-05-21 13:10:29 UTC [more...]

[PATCH v3 00/41] x86: Try to wrangle PV clocks vs. TSC
 2026-05-21 13:10 UTC  (34+ messages)
` [PATCH v3 15/41] x86/xen/time: Nullify x86_platform's sched_clock save/restore hooks
` [PATCH v3 25/41] x86/kvmclock: Hook clocksource.suspend/resume when kvmclock isn't sched_clock
` [PATCH v3 26/41] x86/kvmclock: WARN if wall clock is read while kvmclock is suspended
` [PATCH v3 27/41] x86/kvmclock: Enable kvmclock on APs during onlining if kvmclock isn't sched_clock
` [PATCH v3 28/41] x86/paravirt: Mark __paravirt_set_sched_clock() as __init
` [PATCH v3 29/41] x86/paravirt: Plumb a return code into __paravirt_set_sched_clock()
` [PATCH v3 30/41] x86/paravirt: Don't use a PV sched_clock in CoCo guests with trusted TSC
` [PATCH v3 31/41] x86/tsc: Pass KNOWN_FREQ and RELIABLE as params to registration
` [PATCH v3 32/41] x86/tsc: Rejects attempts to override TSC calibration with lesser routine
` [PATCH v3 33/41] x86/kvmclock: Mark TSC as reliable when it's constant and nonstop
` [PATCH v3 36/41] x86/kvmclock: Get local APIC bus frequency from PV CPUID Timing Info
` [PATCH v3 37/41] x86/kvmclock: Use TSC for sched_clock if it's constant and non-stop
` [PATCH v3 38/41] x86/paravirt: kvmclock: Setup kvmclock early iff it's sched_clock
` [PATCH v3 39/41] x86/paravirt: Move using_native_sched_clock() stub into timer.h

[PATCH v14 00/44] arm64: Support for Arm CCA in KVM
 2026-05-21 13:02 UTC  (21+ messages)
` [PATCH v14 01/44] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h
` [PATCH v14 02/44] kvm: arm64: Avoid including linux/kvm_host.h in kvm_pgtable.h
` [PATCH v14 03/44] arm64: RME: Handle Granule Protection Faults (GPFs)
` [PATCH v14 04/44] arm64: RMI: Add SMC definitions for calling the RMM
` [PATCH v14 05/44] arm64: RMI: Add wrappers for RMI calls
` [PATCH v14 06/44] arm64: RMI: Check for RMI support at init
` [PATCH v14 07/44] arm64: RMI: Configure the RMM with the host's page size
` [PATCH v14 08/44] arm64: RMI: Ensure that the RMM has GPT entries for memory
` [PATCH v14 10/44] arm64: RMI: Add support for SRO

[PATCH v6 00/43] guest_memfd: In-place conversion support
 2026-05-21 12:59 UTC  (26+ messages)
` [PATCH v6 05/43] KVM: guest_memfd: Wire up kvm_get_memory_attributes() to per-gmem attributes
` [PATCH v6 11/43] KVM: guest_memfd: Ensure pages are not in use before conversion
` [PATCH v6 15/43] KVM: guest_memfd: Handle lru_add fbatch refcounts during conversion safety check
` [PATCH v6 16/43] KVM: guest_memfd: Use actual size for invalidation in kvm_gmem_release()
` [PATCH v6 17/43] KVM: guest_memfd: Determine invalidation filter from memory attributes
` [PATCH v6 18/43] KVM: Move KVM_VM_MEMORY_ATTRIBUTES config definition to x86
` [PATCH v6 19/43] KVM: Let userspace disable per-VM mem attributes, enable per-gmem attributes
` [PATCH v6 20/43] KVM: guest_memfd: Enable INIT_SHARED on guest_memfd for x86 Coco VMs
` [PATCH v6 21/43] KVM: SEV: Make 'uaddr' parameter optional for KVM_SEV_SNP_LAUNCH_UPDATE
` [PATCH v6 23/43] KVM: selftests: Create gmem fd before "regular" fd when adding memslot
` [PATCH v6 24/43] KVM: selftests: Rename guest_memfd{,_offset} to gmem_{fd,offset}

[PATCH v10 00/25] Runtime TDX module update support
 2026-05-21 12:04 UTC  (12+ messages)
` [PATCH v10 01/25] x86/virt/tdx: Clarify try_init_module_global() result caching
` [PATCH v10 02/25] x86/virt/tdx: Move TDX global initialization states to file scope
` [PATCH v10 03/25] x86/virt/tdx: Consolidate TDX global initialization states
` [PATCH v10 04/25] x86/virt/tdx: Move TDX_FEATURES0 bits to asm/tdx.h
` [PATCH v10 22/25] x86/virt/tdx: Reject updates during compatibility-sensitive operations

[PATCH v4 00/13] dma-mapping: Use DMA_ATTR_CC_SHARED through direct, pool and swiotlb paths
 2026-05-21 11:54 UTC  (3+ messages)
` [PATCH v4 13/13] x86/amd-gart: preserve the direct DMA address until GART mapping succeeds

[PATCH kernel] crypto/ccp/tsm: Enable the root port after the endpoint
 2026-05-21  7:43 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox