linux-coco.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
 messages from 2025-07-15 17:59:25 to 2025-07-31 16:44:22 UTC [more...]

[RFC PATCH v1 00/38] ARM CCA Device Assignment support
 2025-07-31 16:44 UTC  (98+ messages)
` [RFC PATCH v1 01/38] tsm: Add tsm_bind/unbind helpers
` [RFC PATCH v1 02/38] tsm: Move tsm core outside the host directory
` [RFC PATCH v1 03/38] tsm: Move dsm_dev from pci_tdi to pci_tsm
` [RFC PATCH v1 04/38] tsm: Support DMA Allocation from private memory
` [RFC PATCH v1 05/38] tsm: Don't overload connect
` [RFC PATCH v1 06/38] iommufd: Add and option to request for bar mapping with IORESOURCE_EXCLUSIVE
` [RFC PATCH v1 07/38] iommufd/viommu: Add support to associate viommu with kvm instance
` [RFC PATCH v1 08/38] iommufd/tsm: Add tsm_op iommufd ioctls
` [RFC PATCH v1 09/38] iommufd/vdevice: Add TSM Guest request uAPI
` [RFC PATCH v1 10/38] iommufd/vdevice: Add TSM map ioctl
` [RFC PATCH v1 11/38] KVM: arm64: CCA: register host tsm platform device
` [RFC PATCH v1 12/38] coco: host: arm64: CCA host platform device driver
` [RFC PATCH v1 13/38] coco: host: arm64: Create a PDEV with rmm
` [RFC PATCH v1 14/38] coco: host: arm64: Device communication support
` [RFC PATCH v1 15/38] coco: host: arm64: Stop and destroy the physical device
` [RFC PATCH v1 16/38] X.509: Make certificate parser public
` [RFC PATCH v1 17/38] X.509: Parse Subject Alternative Name in certificates
` [RFC PATCH v1 18/38] X.509: Move certificate length retrieval into new helper
` [RFC PATCH v1 19/38] coco: host: arm64: set_pubkey support
` [RFC PATCH v1 20/38] coco: host: arm64: Add support for creating a virtual device
` [RFC PATCH v1 21/38] coco: host: arm64: Add support for virtual device communication
` [RFC PATCH v1 22/38] coco: host: arm64: Stop and destroy virtual device
` [RFC PATCH v1 23/38] coco: guest: arm64: Update arm CCA guest driver
` [RFC PATCH v1 24/38] arm64: CCA: Register guest tsm callback
` [RFC PATCH v1 25/38] cca: guest: arm64: Realm device lock support
` [RFC PATCH v1 26/38] KVM: arm64: Add exit handler related to device assignment
` [RFC PATCH v1 27/38] coco: host: arm64: add RSI_RDEV_GET_INSTANCE_ID related exit handler
` [RFC PATCH v1 28/38] coco: host: arm64: Add support for device communication "
` [RFC PATCH v1 29/38] coco: guest: arm64: Add support for collecting interface reports
` [RFC PATCH v1 30/38] coco: host: arm64: Add support for realm host interface (RHI)
` [RFC PATCH v1 31/38] coco: guest: arm64: Add support for fetching interface report and certificate chain from host
` [RFC PATCH v1 32/38] coco: guest: arm64: Add support for guest initiated TDI bind/unbind
` [RFC PATCH v1 33/38] KVM: arm64: CCA: handle dev mem map/unmap
` [RFC PATCH v1 34/38] coco: guest: arm64: Validate mmio range found in the interface report
` [RFC PATCH v1 35/38] coco: guest: arm64: Add Realm device start and stop support
` [RFC PATCH v1 36/38] KVM: arm64: CCA: enable DA in realm create parameters
` [RFC PATCH v1 37/38] coco: guest: arm64: Add support for fetching device measurements
` [RFC PATCH v1 38/38] coco: guest: arm64: Add support for fetching device info

SVSM Development Call July 30th, 2025
 2025-07-31  7:10 UTC  (2+ messages)

[PATCHv2 00/12] TDX: Enable Dynamic PAMT
 2025-07-31  4:10 UTC  (16+ messages)
` [PATCHv2 01/12] x86/tdx: Consolidate TDX error handling
` [PATCHv2 02/12] x86/virt/tdx: Allocate page bitmap for Dynamic PAMT

[PATCH 0/6] KVM: Export KVM-internal symbols for sub-modules only
 2025-07-30  2:14 UTC  (8+ messages)
` [PATCH 1/6] KVM: s390/vfio-ap: Use kvm_is_gpa_in_memslot() instead of open coded equivalent
` [PATCH 2/6] KVM: Export KVM-internal symbols for sub-modules only
` [PATCH 3/6] KVM: x86: Move kvm_intr_is_single_vcpu() to lapic.c
` [PATCH 4/6] KVM: x86: Drop pointless exports of kvm_arch_xxx() hooks
` [PATCH 5/6] KVM: x86: Export KVM-internal symbols for sub-modules only
` [PATCH 6/6] x86: Restrict KVM-induced symbol exports to KVM modules where obvious/possible

[PATCH v4 00/10] PCI/TSM: Core infrastructure for PCI device security (TDISP)
 2025-07-29 16:06 UTC  (22+ messages)
` [PATCH v4 01/10] coco/tsm: Introduce a core device for TEE Security Managers
` [PATCH v4 02/10] PCI/IDE: Enumerate Selective Stream IDE capabilities
` [PATCH v4 03/10] PCI: Introduce pci_walk_bus_reverse(), for_each_pci_dev_reverse()
` [PATCH v4 04/10] PCI/TSM: Authenticate devices via platform TSM
` [PATCH v4 05/10] samples/devsec: Introduce a PCI device-security bus + endpoint sample
` [PATCH v4 06/10] PCI: Add PCIe Device 3 Extended Capability enumeration
` [PATCH v4 07/10] PCI/IDE: Add IDE establishment helpers
` [PATCH v4 08/10] PCI/IDE: Report available IDE streams
` [PATCH v4 09/10] PCI/TSM: Report active "
` [PATCH v4 10/10] samples/devsec: Add sample IDE establishment

[RFC PATCH 00/20] TD-Preserving updates
 2025-07-29 10:00 UTC  (7+ messages)
` [RFC PATCH 07/20] x86/virt/tdx: Expose SEAMLDR information via sysfs

SVSM Development Call July 23rd, 2025
 2025-07-28 13:31 UTC  (2+ messages)

[PATCH hyperv-next v4 00/16] Confidential VMBus
 2025-07-25 14:40 UTC  (43+ messages)
` [PATCH hyperv-next v4 01/16] Documentation: hyperv: "
` [PATCH hyperv-next v4 02/16] drivers: hv: VMBus protocol version 6.0
` [PATCH hyperv-next v4 03/16] arch: hyperv: Get/set SynIC synth.registers via paravisor
` [PATCH hyperv-next v4 04/16] arch/x86: mshyperv: Trap on access for some synthetic MSRs
` [PATCH hyperv-next v4 05/16] Drivers: hv: Rename fields for SynIC message and event pages
` [PATCH hyperv-next v4 06/16] Drivers: hv: Allocate the paravisor SynIC pages when required
` [PATCH hyperv-next v4 07/16] Drivers: hv: Post messages through the confidential VMBus if available
` [PATCH hyperv-next v4 08/16] Drivers: hv: remove stale comment
` [PATCH hyperv-next v4 09/16] Drivers: hv: Check message and event pages for non-NULL before iounmap()
` [PATCH hyperv-next v4 10/16] Drivers: hv: Rename the SynIC enable and disable routines
` [PATCH hyperv-next v4 11/16] Drivers: hv: Functions for setting up and tearing down the paravisor SynIC
` [PATCH hyperv-next v4 12/16] Drivers: hv: Allocate encrypted buffers when requested
` [PATCH hyperv-next v4 13/16] Drivers: hv: Free msginfo when the buffer fails to decrypt
` [PATCH hyperv-next v4 14/16] Drivers: hv: Support confidential VMBus channels
` [PATCH hyperv-next v4 15/16] Drivers: hv: Support establishing the confidential VMBus connection
` [PATCH hyperv-next v4 16/16] Drivers: hv: Set the default VMBus version to 6.0

[PATCH v9 00/43] arm64: Support for Arm CCA in KVM
 2025-07-24 10:47 UTC  (5+ messages)
` [PATCH v9 34/43] arm64: RME: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v9 36/43] arm64: RME: Initialize PMCR.N with number counter supported by RMM

[Invitation] bi-weekly guest_memfd upstream call on 2025-07-24
 2025-07-23 15:05 UTC 

[PATCH V9 0/7] Add NUMA mempolicy support for KVM guest-memfd
 2025-07-23  8:20 UTC  (19+ messages)
` [PATCH V9 1/7] KVM: guest_memfd: Use guest mem inodes instead of anonymous inodes
` [PATCH V9 2/7] mm/filemap: Add NUMA mempolicy support to filemap_alloc_folio()
` [PATCH V9 3/7] mm/filemap: Extend __filemap_get_folio() to support NUMA memory policies
` [PATCH V9 5/7] KVM: guest_memfd: Add slab-allocated inode cache
` [PATCH V9 6/7] KVM: guest_memfd: Enforce NUMA mempolicy using shared policy

[PATCH v3 12/13] PCI/TSM: support TDI related operations for host TSM driver
 2025-07-20  2:37 UTC  (12+ messages)
` [RFC PATCH 1/3] coco: tsm: Add tsm_bind/unbind helpers
  ` [RFC PATCH 3/3] iommufd/tsm: Add tsm_bind/unbind iommufd ioctls

EAT Profile for Device Attestation
 2025-07-18 19:33 UTC 

[Invitation] bi-weekly guest_memfd upstream call on 2025-07-17
 2025-07-18 18:17 UTC  (4+ messages)

[PATCH v3 0/4] TDX: Clean up the definitions of TDX TD ATTRIBUTES
 2025-07-17  1:27 UTC  (8+ messages)
` [PATCH v3 2/4] KVM: TDX: Remove redundant definitions of TDX_TD_ATTR_*
` [PATCH v3 3/4] x86/tdx: Rename TDX_ATTR_* to TDX_TD_ATTR_*

[PATCH RFC v1 0/5] KVM: guest_memfd: Support in-place conversion for CoCo VMs
 2025-07-16 13:04 UTC  (8+ messages)
` [PATCH RFC v1 1/5] KVM: guest_memfd: Remove preparation tracking
` [PATCH RFC v1 3/5] KVM: guest_memfd: Call arch invalidation hooks when converting to shared

SVSM Development Call July 16, 2025
 2025-07-15 21:00 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).