linux-coco.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
 messages from 2025-05-02 13:08:43 to 2025-05-19 08:38:37 UTC [more...]

Linux kernel SIG meeting for vwfwupdate discussion
 2025-05-19  8:37 UTC  (5+ messages)

[RFC, PATCH 00/12] TDX: Enable Dynamic PAMT
 2025-05-19  5:06 UTC  (56+ messages)
` [RFC, PATCH 01/12] x86/virt/tdx: Allocate page bitmap for "
` [RFC, PATCH 02/12] x86/virt/tdx: Allocate reference counters for PAMT memory
` [RFC, PATCH 03/12] x86/virt/tdx: Add wrappers for TDH.PHYMEM.PAMT.ADD/REMOVE
` [RFC, PATCH 04/12] x86/virt/tdx: Account PAMT memory and print if in /proc/meminfo
` [RFC, PATCH 05/12] KVM: TDX: Add tdx_pamt_get()/put() helpers
` [RFC, PATCH 06/12] KVM: TDX: Allocate PAMT memory in __tdx_td_init()
` [RFC, PATCH 07/12] KVM: TDX: Allocate PAMT memory in tdx_td_vcpu_init()
` [RFC, PATCH 08/12] KVM: x86/tdp_mmu: Add phys_prepare() and phys_cleanup() to kvm_x86_ops
` [RFC, PATCH 09/12] KVM: TDX: Preallocate PAMT pages to be used in page fault path
` [RFC, PATCH 10/12] KVM: TDX: Hookup phys_prepare() and phys_cleanup() kvm_x86_ops
` [RFC, PATCH 11/12] KVM: TDX: Reclaim PAMT memory
` [RFC, PATCH 12/12] x86/virt/tdx: Enable Dynamic PAMT

[PATCH v3 00/13] PCI/TSM: Core infrastructure for PCI device security (TDISP)
 2025-05-18 12:48 UTC  (16+ messages)
` [PATCH v3 01/13] coco/tsm: Introduce a core device for TEE Security Managers
` [PATCH v3 02/13] PCI/IDE: Enumerate Selective Stream IDE capabilities
` [PATCH v3 03/13] PCI/TSM: Authenticate devices via platform TSM
` [PATCH v3 04/13] PCI: Enable host-bridge emulation for PCI_DOMAINS_GENERIC platforms
` [PATCH v3 05/13] PCI: vmd: Switch to pci_bus_find_emul_domain_nr()
` [PATCH v3 06/13] samples/devsec: Introduce a PCI device-security bus + endpoint sample
` [PATCH v3 07/13] PCI: Add PCIe Device 3 Extended Capability enumeration
` [PATCH v3 08/13] PCI/IDE: Add IDE establishment helpers
` [PATCH v3 09/13] PCI/IDE: Report available IDE streams
` [PATCH v3 10/13] PCI/TSM: Report active "
` [PATCH v3 11/13] samples/devsec: Add sample IDE establishment
` [PATCH v3 12/13] PCI/TSM: support TDI related operations for host TSM driver
` [PATCH v3 13/13] PCI/TSM: Add Guest TSM Support

[RFC PATCH 00/12] Private MMIO support for private assigned dev
 2025-05-17  2:33 UTC  (27+ messages)

[PATCH v5 0/2] kvm: sev: Add SNP guest request throttling
 2025-05-17  0:37 UTC  (6+ messages)
` [PATCH v5 1/2] kvm: sev: Add SEV-SNP "
` [PATCH v5 2/2] kvm: sev: If ccp is busy, report busy to guest

[PATCH v8 00/43] arm64: Support for Arm CCA in KVM
 2025-05-16 16:00 UTC  (26+ messages)
` [PATCH v8 13/43] arm64: RME: Support for the VGIC in realms
` [PATCH v8 15/43] arm64: RME: Allow VMM to set RIPAS
` [PATCH v8 16/43] arm64: RME: Handle realm enter/exit
` [PATCH v8 17/43] arm64: RME: Handle RMI_EXIT_RIPAS_CHANGE
` [PATCH v8 20/43] arm64: RME: Runtime faulting of memory

[PATCH v4 0/2] kvm: sev: Add SNP guest request throttling
 2025-05-15 18:21 UTC  (7+ messages)
` [PATCH v4 1/2] kvm: sev: Add SEV-SNP "
` [PATCH v4 2/2] kvm: sev: If ccp is busy, report busy to guest
` [PATCH v4 2/2] The ccp driver can be overloaded even with guest request rate limits. The return value of -EBUSY means that there is no firmware error to report back to user space, so the guest VM would see this as exitinfo2 = 0. The false success can trick the guest to update its message sequence number when it shouldn't have

SVSM Development Call May 14th, 2025
 2025-05-15 10:08 UTC  (2+ messages)

[Overview] guest_memfd extensions and dependencies 2025-05-15
 2025-05-15  9:58 UTC 

[PATCH v6 0/7] tsm-mr: Unified Measurement Register ABI for TVMs
 2025-05-15  8:39 UTC  (13+ messages)
` [PATCH v6 1/7] tsm-mr: Add TVM Measurement Register support
  ` [PATCH v7 "
    ` [PATCH v8 "
` [PATCH v6 2/7] tsm-mr: Add tsm-mr sample code
` [PATCH v6 3/7] x86/tdx: Add tdx_mcall_extend_rtmr() interface
` [PATCH v6 4/7] x86/tdx: tdx_mcall_get_report0: Return -EBUSY on TDCALL_OPERAND_BUSY error
` [PATCH v6 5/7] virt: tdx-guest: Expose TDX MRs as sysfs attributes
  ` [PATCH v7 "
` [PATCH v6 6/7] virt: tdx-guest: Refactor and streamline TDREPORT generation
` [PATCH v6 7/7] virt: tdx-guest: Transition to scoped_cond_guard for mutex operations

[RFC PATCH v2 00/22] TSM: Secure VFIO, TDISP, SEV TIO
 2025-05-15  8:18 UTC  (5+ messages)
` [RFC PATCH v2 07/22] coco/tsm: Add tsm and tsm-host modules
` [RFC PATCH v2 15/22] KVM: X86: Handle private MMIO as shared

[Invitation] bi-weekly guest_memfd upstream call on 2025-05-15
 2025-05-14 13:12 UTC 

[PATCH 0/2] Allow individual features to be locked down
 2025-05-13 23:07 UTC  (7+ messages)

[PATCH] MAINTAINERS: rectify file entries in TRUSTED SECURITY MODULE (TSM) INFRASTRUCTURE
 2025-05-13 18:48 UTC  (2+ messages)

[PATCH] sample/tsm-mr: Fix missing static for sample_report
 2025-05-13 18:38 UTC  (2+ messages)

[PATCH v5] x86/sev: Fix making shared pages private during kdump
 2025-05-13 12:02 UTC  (4+ messages)

[PATCH v2 00/11] PCI/TSM: Core infrastructure for PCI device security (TDISP)
 2025-05-13 10:18 UTC  (4+ messages)
` [PATCH v2 06/11] samples/devsec: Introduce a PCI device-security bus + endpoint sample

[PATCH v3] KVM: SEV: Disable SEV-SNP support on initialization failure
 2025-05-13  4:46 UTC  (3+ messages)

[PATCH v2] KVM: SEV: Disable SEV-SNP support on initialization failure
 2025-05-12 21:55 UTC  (2+ messages)

[PATCH 0/6] x86/msr: let paravirt inline rdmsr/wrmsr instructions
 2025-05-10 16:03 UTC  (4+ messages)
` [PATCH 1/6] coco/tdx: Rename MSR access helpers

[PATCH] KVM: SEV: Disable SEV-SNP support on initialization failure
 2025-05-09 17:57 UTC  (5+ messages)

SVSM Development Call May 7th, 2025
 2025-05-08  8:33 UTC  (2+ messages)
` [svsm-devel] "

[PATCH RFC v7 0/8] Add NUMA mempolicy support for KVM guest-memfd
 2025-05-08  6:37 UTC  (5+ messages)
` [PATCH RFC v7 3/8] security: Export security_inode_init_security_anon for KVM guest_memfd

CCC Kernel SIG Tomorrow, May 8th - vmfwupdate
 2025-05-07 23:12 UTC 

[PATCH 0/2] mm/page_alloc: Fix couple of unaccepted memory issues
 2025-05-07 15:27 UTC  (14+ messages)
` [PATCH 1/2] mm/page_alloc: Ensure try_alloc_pages() plays well with unaccepted memory
` [PATCH 2/2] mm/page_alloc: Fix race condition in unaccepted memory handling
    ` [PATCHv2] "

[PATCH v3 2/2] x86/devmem: Drop /dev/mem access for confidential guests
 2025-05-07  5:44 UTC  (2+ messages)

[PATCH AUTOSEL 6.14 083/642] x86/headers: Replace __ASSEMBLY__ with __ASSEMBLER__ in non-UAPI headers
 2025-05-05 22:04 UTC 

[PATCH v4] x86/sev: Fix making shared pages private during kdump
 2025-05-05 21:49 UTC  (3+ messages)

[PATCH v4.1] x86/sev: Fix making shared pages private during kdump
 2025-05-04  6:26 UTC 

[PATCH v3] x86/sev: Fix making shared pages private during kdump
 2025-05-02 19:40 UTC  (5+ messages)

[PATCH v4] x86/sev: Don't touch VMSA pages during kdump of SNP guest memory
 2025-05-02 13:42 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).