public inbox for linux-coco@lists.linux.dev
 help / color / mirror / Atom feed
 messages from 2026-01-29 01:16:43 to 2026-02-09 15:38:12 UTC [more...]

[PATCH 0/5] dma-buf: heaps: system: add an option to allocate explicitly decrypted memory
 2026-02-09 15:38 UTC  (2+ messages)
` [PATCH 1/5] dma-mapping: avoid random addr value print out on error path

[PATCH v2] KVM: x86: synthesize CPUID bits only if CPU capability is set
 2026-02-09 15:31 UTC 

[PATCH v2 0/2] x86/virt/tdx: Print TDX module version to dmesg
 2026-02-09 10:46 UTC  (6+ messages)

[RFC PATCH v5 00/45] TDX: Dynamic PAMT + S-EPT Hugepage
 2026-02-09 10:41 UTC  (97+ messages)
` [RFC PATCH v5 01/45] x86/tdx: Use pg_level in TDX APIs, not the TDX-Module's 0-based level
` [RFC PATCH v5 02/45] KVM: x86/mmu: Update iter->old_spte if cmpxchg64 on mirror SPTE "fails"
` [RFC PATCH v5 03/45] KVM: TDX: Account all non-transient page allocations for per-TD structures
` [RFC PATCH v5 04/45] KVM: x86: Make "external SPTE" ops that can fail RET0 static calls
` [RFC PATCH v5 05/45] KVM: TDX: Drop kvm_x86_ops.link_external_spt(), use .set_external_spte() for all
` [RFC PATCH v5 06/45] KVM: x86/mmu: Fold set_external_spte_present() into its sole caller
` [RFC PATCH v5 08/45] KVM: x86/mmu: Propagate mirror SPTE removal to S-EPT in handle_changed_spte()
` [RFC PATCH v5 09/45] KVM: x86: Rework .free_external_spt() into .reclaim_external_sp()
` [RFC PATCH v5 10/45] x86/tdx: Move all TDX error defines into <asm/shared/tdx_errno.h>
` [RFC PATCH v5 11/45] x86/tdx: Add helpers to check return status codes
` [RFC PATCH v5 16/45] x86/virt/tdx: Add tdx_alloc/free_control_page() helpers
` [RFC PATCH v5 19/45] KVM: Allow owner of kvm_mmu_memory_cache to provide a custom page allocator
` [RFC PATCH v5 20/45] KVM: x86/mmu: Allocate/free S-EPT pages using tdx_{alloc,free}_control_page()
` [RFC PATCH v5 22/45] KVM: TDX: Get/put PAMT pages when (un)mapping private memory
` [RFC PATCH v5 37/45] KVM: x86/tdp_mmu: Alloc external_spt page for mirror page table splitting
` [RFC PATCH v5 40/45] KVM: x86: Introduce hugepage_set_guest_inhibit()
` [RFC PATCH v5 41/45] KVM: TDX: Honor the guest's accept level contained in an EPT violation
` [RFC PATCH v5 42/45] KVM: guest_memfd: Add helpers to get start/end gfns give gmem+slot+pgoff
` [RFC PATCH v5 43/45] *** DO NOT MERGE *** KVM: guest_memfd: Add pre-zap arch hook for shared<=>private conversion
` [RFC PATCH v5 44/45] KVM: x86/mmu: Add support for splitting S-EPT hugepages on conversion
` [RFC PATCH v5 45/45] KVM: TDX: Turn on PG_LEVEL_2M

[PATCH v3 0/2] Extend KVM_HC_MAP_GPA_RANGE api to allow retry
 2026-02-06 22:28 UTC  (3+ messages)
` [PATCH v3 1/2] KVM: TDX: Allow userspace to return errors to guest for MAPGPA
` [PATCH v3 2/2] KVM: SEV: Restrict userspace return codes for KVM_HC_MAP_GPA_RANGE

[PATCH] crypto: ccp - allow callers to use HV-Fixed page API when SEV is disabled
 2026-02-06 21:26 UTC 

[PATCH v3 00/26] Runtime TDX Module update support
 2026-02-06 17:15 UTC  (82+ messages)
` [PATCH v3 01/26] x86/virt/tdx: Print SEAMCALL leaf numbers in decimal
` [PATCH v3 03/26] x86/virt/tdx: Move low level SEAMCALL helpers out of <asm/tdx.h>
` [PATCH v3 04/26] coco/tdx-host: Introduce a "tdx_host" device
` [PATCH v3 05/26] coco/tdx-host: Expose TDX Module version
` [PATCH v3 06/26] x86/virt/tdx: Prepare to support P-SEAMLDR SEAMCALLs
` [PATCH v3 07/26] x86/virt/seamldr: Introduce a wrapper for "
` [PATCH v3 08/26] x86/virt/seamldr: Retrieve P-SEAMLDR information
` [PATCH v3 09/26] coco/tdx-host: Expose P-SEAMLDR information via sysfs
` [PATCH v3 10/26] coco/tdx-host: Implement FW_UPLOAD sysfs ABI for TDX Module updates
` [PATCH v3 11/26] x86/virt/seamldr: Block TDX Module updates if any CPU is offline
` [PATCH v3 13/26] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v3 14/26] x86/virt/seamldr: Introduce skeleton for TDX Module updates
` [PATCH v3 15/26] x86/virt/seamldr: Abort updates if errors occurred midway
` [PATCH v3 16/26] x86/virt/seamldr: Shut down the current TDX module
` [PATCH v3 18/26] x86/virt/seamldr: Log TDX Module update failures
` [PATCH v3 20/26] x86/virt/seamldr: Do TDX per-CPU initialization after updates
` [PATCH v3 22/26] x86/virt/tdx: Update tdx_sysinfo and check features post-update
` [PATCH v3 23/26] x86/virt/tdx: Enable TDX Module runtime updates
` [PATCH v3 24/26] x86/virt/seamldr: Extend sigstruct to 16KB

[PATCH v4 0/2] SEV-SNP Unaccepted Memory Hotplug
 2026-02-06 12:03 UTC  (14+ messages)
` [PATCH v4 1/2] mm/memory_hotplug: Add support to accept memory during hot-add
` [PATCH v4 2/2] x86/sev: Add support to unaccept memory after hot-remove

[PATCH 0/1] Arm Live Firmware Activation (LFA) support
 2026-02-06  6:37 UTC  (9+ messages)
` [PATCH 1/1] firmware: smccc: add support for Live Firmware Activation (LFA)

CCC TEE I/O Meeting Agenda for February 5th at 8pm (PST)
 2026-02-05 23:19 UTC 

[GIT PULL] PCIe Link Encryption fixes for 6.19
 2026-02-04 23:25 UTC  (2+ messages)

SVSM Development Call February 4, 2026
 2026-02-04 21:50 UTC  (2+ messages)

[Invitation] bi-weekly guest_memfd upstream call on 2026-02-05
 2026-02-04 11:17 UTC 

[PATCH v7 0/2] SEV-SNP: Add KVM support for SNP certificate fetching
 2026-02-04  0:10 UTC  (2+ messages)

[PATCH v2 0/3] KVM: SEV: Add support for IBPB-on-Entry
 2026-02-03 22:24 UTC  (4+ messages)
` [PATCH v2 1/3] x86/sev: Allow IBPB-on-Entry feature for SNP guests
` [PATCH v2 2/3] KVM: SEV: Add support for IBPB-on-Entry
` [PATCH v2 3/3] x86/sev: Rename SNP_FEATURES_PRESENT->SNP_FEATURES_IMPL

[PATCH 0/2] KVM: SEV: Add support for IBPB-on-Entry
 2026-02-02 17:12 UTC  (13+ messages)
` [PATCH 1/2] KVM: SEV: IBPB-on-Entry guest support

[PATCH RESEND] KVM: SEV: Enable SNP AP CPU hotplug
 2026-02-02 10:12 UTC 

[PATCH RESEND] KVM: SEV: Track SNP launch state and disallow invalid userspace interactions
 2026-02-02 10:11 UTC 

6.18 CVM guest kernel boot issues with non-UEFI bootloader
 2026-01-30 22:12 UTC  (5+ messages)

[PATCH kernel 0/2] crypto/ccp: Fixes for PCI IDE
 2026-01-29 22:29 UTC  (6+ messages)
` [PATCH kernel 2/2] crypto/ccp: Allow multiple streams on the same root bridge

[PATCH v1 11/14] x86/boot: use __seg_fs and __seg_gs in the real-mode boot code
 2026-01-29 22:22 UTC  (11+ messages)
` [PATCH v1 08/14] x86: make CONFIG_EFI_STUB unconditional

[PATCH v3 0/2] SEV-SNP Unaccepted Memory Hotplug
 2026-01-29 19:32 UTC  (10+ messages)
` [PATCH v3 1/2] mm/memory_hotplug: Add support to accept memory during hot-add
` [PATCH v3 2/2] x86/sev: Add support to unaccept memory after hot-remove

[PATCH v4 00/16] TDX: Enable Dynamic PAMT
 2026-01-29 19:12 UTC  (8+ messages)
` [PATCH v4 07/16] x86/virt/tdx: Add tdx_alloc/free_page() helpers

COCONUT-SVSM Development Release v2026.01-devel
 2026-01-29 10:12 UTC 

SVSM Development Call January 28, 2026
 2026-01-29  9:40 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox