ONGOING DEVELOPMENT
Confidential Compute patches continue to hit the kernel mailing lists, and in particular those targeting x86 (both Intel and AMD). Intel’s Trusted Domain eXtensions (TDX) and AMD’s Secure Encrypted Virtualization (SEV) achieve much of the same thing, but through slightly different mechanisms, thus requiring different enablement. However, this month has focused on similar areas, including (encrypted) guest support for interrupt handling in a manner that isolates the guest from a malicious host hypervisor attempting to inject bad interrupts.