linux-coco.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
 messages from 2025-10-29 17:18:10 to 2025-11-07 13:07:25 UTC [more...]

[PATCH RFC v1 0/5] KVM: guest_memfd: Support in-place conversion for CoCo VMs
 2025-11-07 13:05 UTC  (3+ messages)
` [PATCH RFC v1 1/5] KVM: guest_memfd: Remove preparation tracking

[PATCH v5 0/4] KVM: x86: User-return MSR fix+cleanups
 2025-11-07  8:18 UTC  (16+ messages)
` [PATCH v5 1/4] KVM: TDX: Explicitly set user-return MSRs that *may* be clobbered by the TDX-Module
` [PATCH v5 2/4] KVM: x86: WARN if user-return MSR notifier is registered on exit
` [PATCH v5 3/4] KVM: x86: Leave user-return notifier registered on reboot/shutdown
` [PATCH v5 4/4] KVM: x86: Don't disable IRQs when unregistering user-return notifier

[RFC PATCH 00/27] PCI/TSM: TDX Connect: SPDM Session and IDE Establishment
 2025-11-06  7:35 UTC  (37+ messages)
` [RFC PATCH 01/27] coco/tdx-host: Introduce a "tdx_host" device
` [RFC PATCH 03/27] coco/tdx-host: Support Link TSM for TDX host
` [RFC PATCH 05/27] x86/virt/tdx: Add tdx_page_array helpers for new TDX Module objects
` [RFC PATCH 08/27] x86/virt/tdx: Add tdx_enable_ext() to enable of TDX Module Extensions
` [RFC PATCH 11/27] acpi: Add KEYP Key Configuration Unit parsing
` [RFC PATCH 15/27] x86/virt/tdx: Extend tdx_page_array to support IOMMU_MT
` [RFC PATCH 18/27] coco/tdx-host: Setup all trusted IOMMUs on TDX Connect init
` [RFC PATCH 19/27] coco/tdx-host: Add a helper to exchange SPDM messages through DOE
` [RFC PATCH 20/27] coco/tdx-host: Add connect()/disconnect() handlers prototype
` [RFC PATCH 21/27] x86/virt/tdx: Add SEAMCALL wrappers for SPDM management
` [RFC PATCH 22/27] coco/tdx-host: Implement SPDM session setup
` [RFC PATCH 26/27] x86/virt/tdx: Add SEAMCALL wrappers for IDE stream management
` [RFC PATCH 27/27] coco/tdx-host: Implement IDE stream setup/teardown

SVSM draft specification (v1.01 draft #3)
 2025-11-06  3:40 UTC  (4+ messages)

[PATCH 0/6] PCI/TSM: Finalize "Link" TSM infrastructure
 2025-11-06  0:13 UTC  (20+ messages)
` [PATCH 1/6] resource: Introduce resource_assigned() for discerning active resources
` [PATCH 2/6] PCI/IDE: Add Address Association Register setup for downstream MMIO
` [PATCH 3/6] PCI/IDE: Initialize an ID for all IDE streams
` [PATCH 4/6] PCI/TSM: Add pci_tsm_bind() helper for instantiating TDIs
` [PATCH 5/6] PCI/TSM: Add pci_tsm_guest_req() for managing TDIs
` [PATCH 6/6] PCI/TSM: Add 'dsm' and 'bound' attributes for dependent functions

SVSM Development Call November 5th, 2025
 2025-11-05 22:02 UTC  (2+ messages)

One pager on SVSM_REBOOT_EXECUTE
 2025-11-05 17:32 UTC 

[PATCH RFC] KVM: TDX: Allow in place TDX.PAGE.ADD
 2025-11-05 15:44 UTC 

[PATCH v3 00/25] KVM: x86/mmu: TDX post-populate cleanups
 2025-11-05 15:26 UTC  (8+ messages)
` [PATCH v3 04/25] KVM: x86/mmu: Add dedicated API to map guest_memfd pfn into TDP MMU

[PATCH AUTOSEL 6.17] x86/kexec: Disable kexec/kdump on platforms with TDX partial write erratum
 2025-11-04 21:27 UTC  (5+ messages)

[PATCH v4 00/28] KVM: x86/mmu: TDX post-populate cleanups
 2025-11-04 18:02 UTC  (65+ messages)
` [PATCH v4 01/28] KVM: Make support for kvm_arch_vcpu_async_ioctl() mandatory
` [PATCH v4 02/28] KVM: Rename kvm_arch_vcpu_async_ioctl() to kvm_arch_vcpu_unlocked_ioctl()
` [PATCH v4 03/28] KVM: TDX: Drop PROVE_MMU=y sanity check on to-be-populated mappings
` [PATCH v4 04/28] KVM: x86/mmu: Add dedicated API to map guest_memfd pfn into TDP MMU
` [PATCH v4 05/28] KVM: x86/mmu: WARN if KVM attempts to map into an invalid TDP MMU root
` [PATCH v4 06/28] Revert "KVM: x86/tdp_mmu: Add a helper function to walk down the TDP MMU"
` [PATCH v4 07/28] KVM: x86/mmu: Rename kvm_tdp_map_page() to kvm_tdp_page_prefault()
` [PATCH v4 08/28] KVM: TDX: Drop superfluous page pinning in S-EPT management
` [PATCH v4 09/28] KVM: TDX: Return -EIO, not -EINVAL, on a KVM_BUG_ON() condition
` [PATCH v4 10/28] KVM: TDX: Fold tdx_sept_drop_private_spte() into tdx_sept_remove_private_spte()
` [PATCH v4 11/28] KVM: x86/mmu: Drop the return code from kvm_x86_ops.remove_external_spte()
` [PATCH v4 12/28] KVM: TDX: WARN if mirror SPTE doesn't have full RWX when creating S-EPT mapping
` [PATCH v4 13/28] KVM: TDX: Avoid a double-KVM_BUG_ON() in tdx_sept_zap_private_spte()
` [PATCH v4 14/28] KVM: TDX: Use atomic64_dec_return() instead of a poor equivalent
` [PATCH v4 15/28] KVM: TDX: Fold tdx_mem_page_record_premap_cnt() into its sole caller
` [PATCH v4 16/28] KVM: TDX: ADD pages to the TD image while populating mirror EPT entries
` [PATCH v4 17/28] KVM: TDX: Fold tdx_sept_zap_private_spte() into tdx_sept_remove_private_spte()
` [PATCH v4 18/28] KVM: TDX: Combine KVM_BUG_ON + pr_tdx_error() into TDX_BUG_ON()
` [PATCH v4 19/28] KVM: TDX: Derive error argument names from the local variable names
` [PATCH v4 20/28] KVM: TDX: Assert that mmu_lock is held for write when removing S-EPT entries
` [PATCH v4 21/28] KVM: TDX: Add macro to retry SEAMCALLs when forcing vCPUs out of guest
` [PATCH v4 22/28] KVM: TDX: Add tdx_get_cmd() helper to get and validate sub-ioctl command
` [PATCH v4 23/28] KVM: TDX: Convert INIT_MEM_REGION and INIT_VCPU to "unlocked" vCPU ioctl
` [PATCH v4 24/28] KVM: TDX: Use guard() to acquire kvm->lock in tdx_vm_ioctl()
` [PATCH v4 25/28] KVM: TDX: Don't copy "cmd" back to userspace for KVM_TDX_CAPABILITIES
` [PATCH v4 26/28] KVM: TDX: Guard VM state transitions with "all" the locks
` [PATCH v4 27/28] KVM: TDX: Bug the VM if extending the initial measurement fails
` [PATCH v4 28/28] KVM: TDX: Fix list_add corruption during vcpu_load()

[PATCH v8 0/9] PCI/TSM: Core infrastructure for PCI device security (TDISP)
 2025-11-03 15:04 UTC  (11+ messages)
` [PATCH v8 1/9] coco/tsm: Introduce a core device for TEE Security Managers
` [PATCH v8 2/9] PCI/IDE: Enumerate Selective Stream IDE capabilities
` [PATCH v8 3/9] PCI: Introduce pci_walk_bus_reverse(), for_each_pci_dev_reverse()
` [PATCH v8 4/9] PCI/TSM: Establish Secure Sessions and Link Encryption
` [PATCH v8 5/9] PCI: Add PCIe Device 3 Extended Capability enumeration
` [PATCH v8 6/9] PCI: Establish document for PCI host bridge sysfs attributes
` [PATCH v8 7/9] PCI/IDE: Add IDE establishment helpers
` [PATCH v8 8/9] PCI/IDE: Report available IDE streams
` [PATCH v8 9/9] PCI/TSM: Report active "

[PATCH v2 00/21] Runtime TDX Module update support
 2025-11-01  2:18 UTC  (9+ messages)
` [PATCH v2 07/21] coco/tdx-host: Expose P-SEAMLDR information via sysfs

[PATCH RESEND v2 00/12] coc: tsm: Implement ->connect()/->disconnect() callbacks for ARM CCA IDE setup
 2025-10-31 12:07 UTC  (24+ messages)
` [PATCH RESEND v2 04/12] coco: host: arm64: Add host TSM callback and IDE stream allocation support
` [PATCH RESEND v2 05/12] coco: host: arm64: Build and register RMM pdev descriptors
` [PATCH RESEND v2 06/12] coco: host: arm64: Add RMM device communication helpers
` [PATCH RESEND v2 07/12] coco: host: arm64: Add helper to stop and tear down an RMM pdev
` [PATCH RESEND v2 08/12] coco: host: arm64: Instantiate RMM pdev during device connect
` [PATCH RESEND v2 12/12] coco: host: arm64: Register device public key with RMM

[PATCH v2 00/21] Runtime TDX Module update support
 2025-10-31  2:53 UTC  (13+ messages)

[PATCH v7 0/9] PCI/TSM: Core infrastructure for PCI device security (TDISP)
 2025-10-31  1:20 UTC  (35+ messages)
` [PATCH v7 1/9] coco/tsm: Introduce a core device for TEE Security Managers
` [PATCH v7 2/9] PCI/IDE: Enumerate Selective Stream IDE capabilities
` [PATCH v7 3/9] PCI: Introduce pci_walk_bus_reverse(), for_each_pci_dev_reverse()
` [PATCH v7 4/9] PCI/TSM: Establish Secure Sessions and Link Encryption
` [PATCH v7 7/9] PCI/IDE: Add IDE establishment helpers
` [PATCH v7 8/9] PCI/IDE: Report available IDE streams
` [PATCH v7 9/9] PCI/TSM: Report active "

[PATCH] x86/virt/tdx: Use precalculated TDVPR page physical address
 2025-10-30 15:42 UTC  (6+ messages)

SVSM Development Call October 29th, 2025
 2025-10-30  8:29 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).