public inbox for linux-coco@lists.linux.dev
 help / color / mirror / Atom feed
 messages from 2025-04-17 09:05:36 to 2025-05-06 12:44:07 UTC [more...]

[PATCH 0/2] mm/page_alloc: Fix couple of unaccepted memory issues
 2025-05-06 12:43 UTC  (4+ messages)
` [PATCH 1/2] mm/page_alloc: Ensure try_alloc_pages() plays well with unaccepted memory
` [PATCH 2/2] mm/page_alloc: Fix race condition in unaccepted memory handling

[RFC, PATCH 00/12] TDX: Enable Dynamic PAMT
 2025-05-06 11:55 UTC  (18+ messages)
` [RFC, PATCH 01/12] x86/virt/tdx: Allocate page bitmap for "
` [RFC, PATCH 02/12] x86/virt/tdx: Allocate reference counters for PAMT memory
` [RFC, PATCH 03/12] x86/virt/tdx: Add wrappers for TDH.PHYMEM.PAMT.ADD/REMOVE
` [RFC, PATCH 04/12] x86/virt/tdx: Account PAMT memory and print if in /proc/meminfo
` [RFC, PATCH 05/12] KVM: TDX: Add tdx_pamt_get()/put() helpers
` [RFC, PATCH 06/12] KVM: TDX: Allocate PAMT memory in __tdx_td_init()
` [RFC, PATCH 07/12] KVM: TDX: Allocate PAMT memory in tdx_td_vcpu_init()
` [RFC, PATCH 08/12] KVM: x86/tdp_mmu: Add phys_prepare() and phys_cleanup() to kvm_x86_ops
` [RFC, PATCH 09/12] KVM: TDX: Preallocate PAMT pages to be used in page fault path
` [RFC, PATCH 10/12] KVM: TDX: Hookup phys_prepare() and phys_cleanup() kvm_x86_ops
` [RFC, PATCH 11/12] KVM: TDX: Reclaim PAMT memory
` [RFC, PATCH 12/12] x86/virt/tdx: Enable Dynamic PAMT

[PATCH 0/6] x86/msr: let paravirt inline rdmsr/wrmsr instructions
 2025-05-06 11:26 UTC  (3+ messages)
` [PATCH 1/6] coco/tdx: Rename MSR access helpers

[PATCH AUTOSEL 6.14 083/642] x86/headers: Replace __ASSEMBLY__ with __ASSEMBLER__ in non-UAPI headers
 2025-05-05 22:04 UTC 

[PATCH v4] x86/sev: Fix making shared pages private during kdump
 2025-05-05 21:49 UTC  (3+ messages)

[PATCH v4.1] x86/sev: Fix making shared pages private during kdump
 2025-05-04  6:26 UTC 

[PATCH v3] x86/sev: Fix making shared pages private during kdump
 2025-05-02 19:40 UTC  (5+ messages)

[PATCH v4] x86/sev: Don't touch VMSA pages during kdump of SNP guest memory
 2025-05-02 13:42 UTC  (3+ messages)

[PATCH v8 00/43] arm64: Support for Arm CCA in KVM
 2025-05-02 12:22 UTC  (72+ messages)
` [PATCH v8 03/43] arm64: RME: Add SMC definitions for calling the RMM
` [PATCH v8 04/43] arm64: RME: Add wrappers for RMI calls
` [PATCH v8 05/43] arm64: RME: Check for RME support at KVM init
` [PATCH v8 06/43] arm64: RME: Define the user ABI
` [PATCH v8 07/43] arm64: RME: ioctls to create and configure realms
` [PATCH v8 08/43] kvm: arm64: Don't expose debug capabilities for realm guests
` [PATCH v8 09/43] KVM: arm64: Allow passing machine type in KVM creation
` [PATCH v8 11/43] arm64: RME: Allocate/free RECs to match vCPUs
` [PATCH v8 12/43] KVM: arm64: vgic: Provide helper for number of list registers
` [PATCH v8 13/43] arm64: RME: Support for the VGIC in realms
` [PATCH v8 14/43] KVM: arm64: Support timers in realm RECs
` [PATCH v8 15/43] arm64: RME: Allow VMM to set RIPAS
` [PATCH v8 16/43] arm64: RME: Handle realm enter/exit
` [PATCH v8 17/43] arm64: RME: Handle RMI_EXIT_RIPAS_CHANGE
` [PATCH v8 20/43] arm64: RME: Runtime faulting of memory
` [PATCH v8 22/43] KVM: arm64: Validate register access for a Realm VM
` [PATCH v8 27/43] arm64: RME: support RSI_HOST_CALL
` [PATCH v8 29/43] arm64: RME: Always use 4k pages for realms
` [PATCH v8 33/43] arm64: RME: Hide KVM_CAP_READONLY_MEM for realm guests
` [PATCH v8 34/43] arm64: RME: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v8 36/43] arm64: RME: Initialize PMCR.N with number counter supported by RMM
` [PATCH v8 37/43] arm64: RME: Propagate max SVE vector length from RMM
` [PATCH v8 38/43] arm64: RME: Configure max SVE vector length for a Realm
` [PATCH v8 39/43] arm64: RME: Provide register list for unfinalized RME RECs
` [PATCH v8 40/43] arm64: RME: Provide accurate register list
` [PATCH v8 41/43] KVM: arm64: Expose support for private memory
` [PATCH v8 42/43] KVM: arm64: Expose KVM_ARM_VCPU_REC to user space
` [PATCH v8 43/43] KVM: arm64: Allow activating realms

SVSM Development Call April 30th, 2025
 2025-05-02  6:31 UTC  (2+ messages)
` [svsm-devel] "

[PATCH 0/4] tsm: Unified Measurement Register ABI for TVMs
 2025-05-02  1:45 UTC  (11+ messages)

[PATCH v5 0/5] tsm-mr: Unified Measurement Register ABI for TVMs
 2025-05-01 21:56 UTC  (12+ messages)
` [PATCH v5 1/5] tsm-mr: Add TVM Measurement Register support
` [PATCH v5 2/5] tsm-mr: Add tsm-mr sample code
` [PATCH v5 3/5] x86/tdx: Add tdx_mcall_extend_rtmr() interface
` [PATCH v5 4/5] x86/tdx: tdx_mcall_get_report0: Return -EBUSY on TDCALL_OPERAND_BUSY error
` [PATCH v5 5/5] virt: tdx-guest: Expose TDX MRs as sysfs attributes

[PATCH v5] Restrict devmem for confidential VMs
 2025-05-01 20:18 UTC  (11+ messages)
` [PATCH v5] x86/devmem: Remove duplicate range_is_allowed() definition
` [PATCH v5] x86/devmem: Drop /dev/mem access for confidential guests

[PATCH] configfs-tsm-report: Fix NULL dereference of tsm_ops
 2025-04-30 20:33 UTC  (7+ messages)
` [PATCH v2] "

[PATCH v3 0/2] Restrict devmem for confidential VMs
 2025-04-30 15:41 UTC  (20+ messages)
` [PATCH v3 1/2] x86/devmem: Remove duplicate range_is_allowed() definition
` [PATCH v3 2/2] x86/devmem: Drop /dev/mem access for confidential guests
  ` [PATCH v4 "

[V2 PATCH 0/1][Bug Report] and Fix TDX cpuid0x2 #VE causing segment
 2025-04-30 15:09 UTC  (11+ messages)
` [V2 PATCH] x86/tdx: add VIRT_CPUID2 virtualization if REDUCE_VE was not successful

SNP guest crash in memblock with unaccepted memory
 2025-04-30 14:39 UTC  (8+ messages)

[PATCH v2] x86/sev: Fix making shared pages private during kdump
 2025-04-30 13:31 UTC  (3+ messages)

[PATCH v3] x86/sev: Do not touch VMSA pages during kdump of SNP guest memory
 2025-04-30 12:47 UTC  (4+ messages)

[PATCH v6 0/2] SEV-SNP: Add KVM support for SNP certificate fetching
 2025-04-29 13:16 UTC  (4+ messages)
` [PATCH v6 1/2] KVM: Introduce KVM_EXIT_SNP_REQ_CERTS for SNP certificate-fetching
` [PATCH v6 2/2] KVM: SEV: Add KVM_SEV_SNP_ENABLE_REQ_CERTS command

[Invitation] bi-weekly guest_memfd upstream call on 2025-05-01
 2025-04-29 12:07 UTC 

[RFC PATCH 00/12] Private MMIO support for private assigned dev
 2025-04-29  7:50 UTC  (3+ messages)

[PATCH 0/1][Bug Report] and fix TDX cpuid0x2 #VE causing segfault
 2025-04-29 13:29 UTC  (2+ messages)
` [PATCH 1/1] x86/tdx: add VIRT_CPUID2 virtualization if REDUCE_VE was not successful

Add devsec/tsm.git 'next' and 'fixes' branches to linux-next
 2025-04-27 21:54 UTC  (2+ messages)

[PATCH v2 00/11] PCI/TSM: Core infrastructure for PCI device security (TDISP)
 2025-04-27  9:33 UTC  (23+ messages)
` [PATCH v2 02/11] coco/guest: Move shared guest CC infrastructure to drivers/virt/coco/guest/
` [PATCH v2 04/11] PCI/IDE: Enumerate Selective Stream IDE capabilities
` [PATCH v2 05/11] PCI/TSM: Authenticate devices via platform TSM
` [PATCH v2 08/11] PCI/IDE: Add IDE establishment helpers
` [PATCH v2 09/11] PCI/IDE: Report available IDE streams

[PATCH v5 0/2] KVM: SEV: Add support for the ALLOWED_SEV_FEATURES feature
 2025-04-25 23:23 UTC  (2+ messages)

[PATCH v2] x86/sev: Fix SNP guest kdump hang/softlockup/panic
 2025-04-24 20:23 UTC  (5+ messages)

[PATCH] x86/sev: Fix making shared pages private during kdump
 2025-04-24 19:27 UTC  (3+ messages)

[RFC PATCH v2 00/22] TSM: Secure VFIO, TDISP, SEV TIO
 2025-04-24  3:37 UTC  (7+ messages)
` [RFC PATCH v2 06/22] KVM: X86: Define tsm_get_vmid

[PATCH RFC v1 0/5] KVM: gmem: 2MB THP support and preparedness tracking changes
 2025-04-23 20:30 UTC  (5+ messages)
` [PATCH 3/5] KVM: gmem: Hold filemap invalidate lock while allocating/preparing folios

[PATCH RFC v7 0/8] Add NUMA mempolicy support for KVM guest-memfd
 2025-04-22 17:25 UTC  (7+ messages)
` [PATCH RFC v7 3/8] security: Export security_inode_init_security_anon for KVM guest_memfd

[PATCH v2 06/11] samples/devsec: Introduce a PCI device-security
 2025-04-22 15:45 UTC  (5+ messages)
` [RESEND RFC PATCH 1/3] pci: ide: Fix build failure
  ` [RESEND RFC PATCH 3/3] samples: devsec: Add support for PCI_DOMAINS_GENERIC

[PATCH] x86/sev: Fix SNP guest kdump hang/softlockup/panic
 2025-04-22 14:53 UTC  (3+ messages)

SVSM Development Call April 16th, 2025
 2025-04-17  9:05 UTC  (2+ messages)
` [svsm-devel] "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox