linux-coco.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
 messages from 2025-05-06 12:44:07 to 2025-05-20 20:12:20 UTC [more...]

[PATCH v3 00/13] PCI/TSM: Core infrastructure for PCI device security (TDISP)
 2025-05-20 20:12 UTC  (23+ messages)
` [PATCH v3 01/13] coco/tsm: Introduce a core device for TEE Security Managers
` [PATCH v3 02/13] PCI/IDE: Enumerate Selective Stream IDE capabilities
` [PATCH v3 03/13] PCI/TSM: Authenticate devices via platform TSM
` [PATCH v3 04/13] PCI: Enable host-bridge emulation for PCI_DOMAINS_GENERIC platforms
` [PATCH v3 05/13] PCI: vmd: Switch to pci_bus_find_emul_domain_nr()
` [PATCH v3 06/13] samples/devsec: Introduce a PCI device-security bus + endpoint sample
` [PATCH v3 07/13] PCI: Add PCIe Device 3 Extended Capability enumeration
` [PATCH v3 08/13] PCI/IDE: Add IDE establishment helpers
` [PATCH v3 09/13] PCI/IDE: Report available IDE streams
` [PATCH v3 10/13] PCI/TSM: Report active "
` [PATCH v3 11/13] samples/devsec: Add sample IDE establishment
` [PATCH v3 12/13] PCI/TSM: support TDI related operations for host TSM driver
` [PATCH v3 13/13] PCI/TSM: Add Guest TSM Support

[PATCH v8 00/43] arm64: Support for Arm CCA in KVM
 2025-05-20 14:59 UTC  (55+ messages)
` [PATCH v8 13/43] arm64: RME: Support for the VGIC in realms
` [PATCH v8 15/43] arm64: RME: Allow VMM to set RIPAS
` [PATCH v8 16/43] arm64: RME: Handle realm enter/exit
` [PATCH v8 17/43] arm64: RME: Handle RMI_EXIT_RIPAS_CHANGE
` [PATCH v8 18/43] KVM: arm64: Handle realm MMIO emulation
` [PATCH v8 20/43] arm64: RME: Runtime faulting of memory
` [PATCH v8 21/43] KVM: arm64: Handle realm VCPU load
` [PATCH v8 22/43] KVM: arm64: Validate register access for a Realm VM
` [PATCH v8 29/43] arm64: RME: Always use 4k pages for realms
` [PATCH v8 30/43] arm64: RME: Prevent Device mappings for Realms
` [PATCH v8 33/43] arm64: RME: Hide KVM_CAP_READONLY_MEM for realm guests
` [PATCH v8 34/43] arm64: RME: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v8 35/43] arm64: RME: Set breakpoint parameters through SET_ONE_REG
` [PATCH v8 36/43] arm64: RME: Initialize PMCR.N with number counter supported by RMM
` [PATCH v8 37/43] arm64: RME: Propagate max SVE vector length from RMM
` [PATCH v8 38/43] arm64: RME: Configure max SVE vector length for a Realm
` [PATCH v8 40/43] arm64: RME: Provide accurate register list
` [PATCH v8 43/43] KVM: arm64: Allow activating realms

Linux kernel SIG meeting for vwfwupdate discussion
 2025-05-20 14:41 UTC  (7+ messages)

[RFC PATCH 00/12] Private MMIO support for private assigned dev
 2025-05-20 10:57 UTC  (28+ messages)

[PATCH v2 00/18] PCI device authentication
 2025-05-20  8:35 UTC  (6+ messages)

[PATCH v3] KVM: SEV: Disable SEV-SNP support on initialization failure
 2025-05-19 19:10 UTC  (4+ messages)

[PATCH 3/5] KVM: gmem: Hold filemap invalidate lock while allocating/preparing folios
 2025-05-19 17:04 UTC  (2+ messages)

[RFC, PATCH 00/12] TDX: Enable Dynamic PAMT
 2025-05-19  5:06 UTC  (48+ messages)
` [RFC, PATCH 02/12] x86/virt/tdx: Allocate reference counters for PAMT memory
` [RFC, PATCH 03/12] x86/virt/tdx: Add wrappers for TDH.PHYMEM.PAMT.ADD/REMOVE
` [RFC, PATCH 05/12] KVM: TDX: Add tdx_pamt_get()/put() helpers
` [RFC, PATCH 08/12] KVM: x86/tdp_mmu: Add phys_prepare() and phys_cleanup() to kvm_x86_ops
` [RFC, PATCH 09/12] KVM: TDX: Preallocate PAMT pages to be used in page fault path
` [RFC, PATCH 11/12] KVM: TDX: Reclaim PAMT memory

[PATCH v5 0/2] kvm: sev: Add SNP guest request throttling
 2025-05-17  0:37 UTC  (6+ messages)
` [PATCH v5 1/2] kvm: sev: Add SEV-SNP "
` [PATCH v5 2/2] kvm: sev: If ccp is busy, report busy to guest

[PATCH v4 0/2] kvm: sev: Add SNP guest request throttling
 2025-05-15 18:21 UTC  (7+ messages)
` [PATCH v4 1/2] kvm: sev: Add SEV-SNP "
` [PATCH v4 2/2] kvm: sev: If ccp is busy, report busy to guest
` [PATCH v4 2/2] The ccp driver can be overloaded even with guest request rate limits. The return value of -EBUSY means that there is no firmware error to report back to user space, so the guest VM would see this as exitinfo2 = 0. The false success can trick the guest to update its message sequence number when it shouldn't have

SVSM Development Call May 14th, 2025
 2025-05-15 10:08 UTC  (2+ messages)

[Overview] guest_memfd extensions and dependencies 2025-05-15
 2025-05-15  9:58 UTC 

[PATCH v6 0/7] tsm-mr: Unified Measurement Register ABI for TVMs
 2025-05-15  8:39 UTC  (13+ messages)
` [PATCH v6 1/7] tsm-mr: Add TVM Measurement Register support
  ` [PATCH v7 "
    ` [PATCH v8 "
` [PATCH v6 2/7] tsm-mr: Add tsm-mr sample code
` [PATCH v6 3/7] x86/tdx: Add tdx_mcall_extend_rtmr() interface
` [PATCH v6 4/7] x86/tdx: tdx_mcall_get_report0: Return -EBUSY on TDCALL_OPERAND_BUSY error
` [PATCH v6 5/7] virt: tdx-guest: Expose TDX MRs as sysfs attributes
  ` [PATCH v7 "
` [PATCH v6 6/7] virt: tdx-guest: Refactor and streamline TDREPORT generation
` [PATCH v6 7/7] virt: tdx-guest: Transition to scoped_cond_guard for mutex operations

[RFC PATCH v2 00/22] TSM: Secure VFIO, TDISP, SEV TIO
 2025-05-15  8:18 UTC  (5+ messages)
` [RFC PATCH v2 07/22] coco/tsm: Add tsm and tsm-host modules
` [RFC PATCH v2 15/22] KVM: X86: Handle private MMIO as shared

[Invitation] bi-weekly guest_memfd upstream call on 2025-05-15
 2025-05-14 13:12 UTC 

[PATCH 0/2] Allow individual features to be locked down
 2025-05-13 23:07 UTC  (7+ messages)

[PATCH] MAINTAINERS: rectify file entries in TRUSTED SECURITY MODULE (TSM) INFRASTRUCTURE
 2025-05-13 18:48 UTC  (2+ messages)

[PATCH] sample/tsm-mr: Fix missing static for sample_report
 2025-05-13 18:38 UTC  (2+ messages)

[PATCH v5] x86/sev: Fix making shared pages private during kdump
 2025-05-13 12:02 UTC  (4+ messages)

[PATCH v2 00/11] PCI/TSM: Core infrastructure for PCI device security (TDISP)
 2025-05-13 10:18 UTC  (4+ messages)
` [PATCH v2 06/11] samples/devsec: Introduce a PCI device-security bus + endpoint sample

[PATCH v2] KVM: SEV: Disable SEV-SNP support on initialization failure
 2025-05-12 21:55 UTC  (2+ messages)

[PATCH 0/6] x86/msr: let paravirt inline rdmsr/wrmsr instructions
 2025-05-10 16:03 UTC  (2+ messages)

[PATCH] KVM: SEV: Disable SEV-SNP support on initialization failure
 2025-05-09 17:57 UTC  (5+ messages)

SVSM Development Call May 7th, 2025
 2025-05-08  8:33 UTC  (2+ messages)
` [svsm-devel] "

[PATCH RFC v7 0/8] Add NUMA mempolicy support for KVM guest-memfd
 2025-05-08  6:37 UTC  (5+ messages)
` [PATCH RFC v7 3/8] security: Export security_inode_init_security_anon for KVM guest_memfd

CCC Kernel SIG Tomorrow, May 8th - vmfwupdate
 2025-05-07 23:12 UTC 

[PATCH 0/2] mm/page_alloc: Fix couple of unaccepted memory issues
 2025-05-07 15:27 UTC  (14+ messages)
` [PATCH 1/2] mm/page_alloc: Ensure try_alloc_pages() plays well with unaccepted memory
` [PATCH 2/2] mm/page_alloc: Fix race condition in unaccepted memory handling
    ` [PATCHv2] "

[PATCH v3 2/2] x86/devmem: Drop /dev/mem access for confidential guests
 2025-05-07  5:44 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).