public inbox for linux-coco@lists.linux.dev
 help / color / mirror / Atom feed
 messages from 2025-12-15 15:35:26 to 2026-01-08 16:52:30 UTC [more...]

[PATCH v4 00/16] TDX: Enable Dynamic PAMT
 2026-01-08 16:52 UTC  (10+ messages)
` [PATCH v4 04/16] x86/virt/tdx: Allocate page bitmap for "

[PATCH v2 00/11] TSM: Implement ->lock()/->accept() callbacks for ARM CCA TDISP setup
 2026-01-08 15:32 UTC  (3+ messages)
` [PATCH v2 03/11] coco: guest: arm64: Add support for guest initiated TDI bind/unbind

[PATCH] dma-direct: swiotlb: Skip encryption toggles for swiotlb allocations
 2026-01-08 11:01 UTC  (2+ messages)

[PATCH 0/2] x86/virt/tdx: Print TDX module version to dmesg
 2026-01-08 10:50 UTC  (5+ messages)
` [PATCH 1/2] x86/virt/tdx: Retrieve TDX module version
` [PATCH 2/2] x86/virt/tdx: Print TDX module version during init

SVSM Development Call January 7th, 2026
 2026-01-08  9:21 UTC  (2+ messages)

"Paravisor" Feature Enumeration
 2026-01-08  6:53 UTC  (17+ messages)
  ` [EXTERNAL] "

[PATCH v2 0/3] Expose TDX Module version
 2026-01-07 22:26 UTC  (18+ messages)
` [PATCH v2 1/3] x86/virt/tdx: Retrieve "
` [PATCH v2 2/3] coco/tdx-host: Expose "
` [PATCH v2 3/3] x86/virt/tdx: Print TDX Module version during init

[Invitation] bi-weekly guest_memfd upstream call on 2026-01-08
 2026-01-07 22:01 UTC 

[Invitation] bi-weekly guest_memfd upstream call on 2025-12-04
 2026-01-07 21:52 UTC  (3+ messages)

[PATCH RESEND v2 00/12] coc: tsm: Implement ->connect()/->disconnect() callbacks for ARM CCA IDE setup
 2026-01-06 12:33 UTC  (3+ messages)
` [PATCH RESEND v2 02/12] firmware: smccc: coco: Manage arm-smccc platform device and CCA auxiliary drivers

[PATCH v2 0/4] Enforce host page-size alignment for shared buffers
 2026-01-06  6:39 UTC  (17+ messages)
` [PATCH v2 1/4] swiotlb: dma: its: "
` [PATCH v2 2/4] coco: guest: arm64: Fetch host IPA change alignment via RHI hostconf
` [PATCH v2 3/4] coco: host: arm64: Handle hostconf RHI calls in kernel
` [PATCH v2 4/4] dma: direct: set decrypted flag for remapped dma allocations

[PATCH v2] PCI/IDE: Fix duplicate stream symlink names for TSM class devices
 2026-01-06  1:59 UTC  (3+ messages)

[PATCH v2 0/7] KVM: x86/tdx: Have TDX handle VMXON during bringup
 2026-01-05 17:48 UTC  (20+ messages)
` [PATCH v2 1/7] KVM: x86: Move kvm_rebooting to x86
` [PATCH v2 2/7] KVM: x86: Extract VMXON and EFER.SVME enablement to kernel

[PATCH v2 00/21] Runtime TDX Module update support
 2026-01-05  7:54 UTC  (6+ messages)

[PATCH v2 0/5] KVM: guest_memfd: Rework preparation/population flows in prep for in-place conversion
 2025-12-26  3:09 UTC  (19+ messages)
` [PATCH v2 1/5] KVM: guest_memfd: Remove partial hugepage handling from kvm_gmem_populate()
` [PATCH v2 2/5] KVM: guest_memfd: Remove preparation tracking
` [PATCH v2 3/5] KVM: SEV: Document/enforce page-alignment for KVM_SEV_SNP_LAUNCH_UPDATE
` [PATCH v2 4/5] KVM: TDX: Document alignment requirements for KVM_TDX_INIT_MEM_REGION
` [PATCH v2 5/5] KVM: guest_memfd: GUP source pages prior to populating guest memory

[PATCH] PCI/IDE: Fix duplicate stream symlink names for TSM class devices
 2025-12-24  1:00 UTC  (3+ messages)

[RFC PATCH v2 0/1] firmware: smccc: Add support for Live Firmware Activation (LFA)
 2025-12-23 23:01 UTC  (2+ messages)

[PATCH v1 00/26] PCI/TSM: TDX Connect: SPDM Session and IDE Establishment
 2025-12-23 10:45 UTC  (28+ messages)
` [PATCH v1 01/26] coco/tdx-host: Introduce a "tdx_host" device
` [PATCH v1 03/26] coco/tdx-host: Support Link TSM for TDX host
` [PATCH v1 05/26] mm: Add __free() support for __free_page()
` [PATCH v1 06/26] x86/virt/tdx: Add tdx_page_array helpers for new TDX Module objects
` [PATCH v1 10/26] acpi: Add KEYP support to fw_table parsing
` [PATCH v1 11/26] iommu/vt-d: Cache max domain ID to avoid redundant calculation
` [PATCH v1 12/26] iommu/vt-d: Reserve the MSB domain ID bit for the TDX module
` [PATCH v1 14/26] mm: Add __free() support for folio_put()
` [PATCH v1 23/26] coco/tdx-host: Parse ACPI KEYP table to init IDE for PCI host bridges
` [PATCH v1 26/26] coco/tdx-host: Finally enable SPDM session and IDE Establishment

[PATCH 0/8] KVM: VMX: Introduce Intel Mode-Based Execute Control (MBEC)
 2025-12-23  5:47 UTC  (2+ messages)
` [PATCH 1/8] KVM: TDX/VMX: rework EPT_VIOLATION_EXEC_FOR_RING3_LIN into PROT_MASK

[PATCH v12 00/46] arm64: Support for Arm CCA in KVM
 2025-12-20 14:34 UTC  (54+ messages)
` [PATCH v12 01/46] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h
` [PATCH v12 02/46] arm64: RME: Handle Granule Protection Faults (GPFs)
` [PATCH v12 03/46] arm64: RMI: Add SMC definitions for calling the RMM
` [PATCH v12 04/46] arm64: RMI: Add wrappers for RMI calls
` [PATCH v12 05/46] arm64: RMI: Check for RMI support at KVM init
` [PATCH v12 06/46] arm64: RMI: Define the user ABI
` [PATCH v12 07/46] arm64: RMI: Basic infrastructure for creating a realm
` [PATCH v12 08/46] kvm: arm64: Don't expose unsupported capabilities for realm guests
` [PATCH v12 09/46] KVM: arm64: Allow passing machine type in KVM creation
` [PATCH v12 10/46] arm64: RMI: RTT tear down
` [PATCH v12 11/46] arm64: RMI: Activate realm on first VCPU run
` [PATCH v12 12/46] arm64: RMI: Allocate/free RECs to match vCPUs
` [PATCH v12 13/46] KVM: arm64: vgic: Provide helper for number of list registers
` [PATCH v12 14/46] arm64: RMI: Support for the VGIC in realms
` [PATCH v12 15/46] KVM: arm64: Support timers in realm RECs
` [PATCH v12 16/46] arm64: RMI: Handle realm enter/exit
` [PATCH v12 17/46] arm64: RMI: Handle RMI_EXIT_RIPAS_CHANGE
` [PATCH v12 18/46] KVM: arm64: Handle realm MMIO emulation
` [PATCH v12 19/46] KVM: arm64: Expose support for private memory
` [PATCH v12 20/46] arm64: RMI: Allow populating initial contents
` [PATCH v12 21/46] arm64: RMI: Set RIPAS of initial memslots
` [PATCH v12 22/46] arm64: RMI: Create the realm descriptor
` [PATCH v12 23/46] arm64: RMI: Add a VMID allocator for realms
` [PATCH v12 24/46] arm64: RMI: Runtime faulting of memory
` [PATCH v12 25/46] KVM: arm64: Handle realm VCPU load
` [PATCH v12 26/46] KVM: arm64: Validate register access for a Realm VM
` [PATCH v12 27/46] KVM: arm64: Handle Realm PSCI requests
` [PATCH v12 28/46] KVM: arm64: WARN on injected undef exceptions
` [PATCH v12 29/46] arm64: Don't expose stolen time for realm guests
` [PATCH v12 30/46] arm64: RMI: allow userspace to inject aborts
` [PATCH v12 31/46] arm64: RMI: support RSI_HOST_CALL
` [PATCH v12 32/46] arm64: RMI: Allow checking SVE on VM instance
` [PATCH v12 33/46] arm64: RMI: Always use 4k pages for realms
` [PATCH v12 34/46] arm64: RMI: Prevent Device mappings for Realms
` [PATCH v12 35/46] HACK: Restore per-CPU cpu_armpmu pointer
` [PATCH v12 36/46] arm_pmu: Provide a mechanism for disabling the physical IRQ
` [PATCH v12 37/46] arm64: RMI: Enable PMU support with a realm guest
` [PATCH v12 38/46] arm64: RMI: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v12 39/46] arm64: RMI: Set breakpoint parameters through SET_ONE_REG
` [PATCH v12 40/46] arm64: RMI: Initialize PMCR.N with number counter supported by RMM
` [PATCH v12 41/46] arm64: RMI: Propagate max SVE vector length from RMM
` [PATCH v12 42/46] arm64: RMI: Configure max SVE vector length for a Realm
` [PATCH v12 43/46] arm64: RMI: Provide register list for unfinalized RMI RECs
` [PATCH v12 44/46] arm64: RMI: Provide accurate register list
` [PATCH v12 45/46] KVM: arm64: Expose KVM_ARM_VCPU_REC to user space
` [PATCH v12 46/46] arm64: RMI: Enable realms to be created

[RFC PATCH 0/5] Arm LFA: Improvements and interrupt support
 2025-12-19 10:40 UTC  (17+ messages)
` [RFC PATCH 1/5] firmware: smccc: LFA: use smcc 1.2
` [RFC PATCH 4/5] firmware: smccc: register as platform driver
` [RFC PATCH 5/5] firmware: smccc: lfa: refresh fw details

[PATCH v4] page_alloc: allow migration of smaller hugepages during contig_alloc
 2025-12-18 15:40 UTC  (6+ messages)

COCONUT-SVSM Development Release v2025.12-devel
 2025-12-18 11:38 UTC 

SVSM Development Call December 17th, 2025
 2025-12-18  9:08 UTC  (2+ messages)

[PATCH 0/2] x86/split_lock: Fix and enhancement for TDX guest
 2025-12-17 10:56 UTC  (4+ messages)
` [PATCH 1/2] x86/split_lock: Don't try to handle user split lock in "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox