public inbox for linux-coco@lists.linux.dev
 help / color / mirror / Atom feed
 messages from 2026-02-24 01:57:50 to 2026-03-03 12:15:11 UTC [more...]

[PATCH kernel 0/9] PCI/TSM: coco/sev-guest: Implement SEV-TIO PCIe TDISP (phase2)
 2026-03-03 12:15 UTC  (48+ messages)
` [PATCH kernel 1/9] pci/tsm: Add TDISP report blob and helpers to parse it
` [PATCH kernel 2/9] pci/tsm: Add tsm_tdi_status
` [PATCH kernel 3/9] coco/sev-guest: Allow multiple source files in the driver
` [PATCH kernel 4/9] dma/swiotlb: Stop forcing SWIOTLB for TDISP devices
` [PATCH kernel 5/9] x86/mm: Stop forcing decrypted page state "
` [PATCH kernel 6/9] x86/dma-direct: Stop changing encrypted "
` [PATCH kernel 7/9] coco/sev-guest: Implement the guest support for SEV TIO (phase2)
` [PATCH kernel 8/9] RFC: PCI: Avoid needless touching of Command register
` [PATCH kernel 9/9] pci: Allow encrypted MMIO mapping via sysfs

[PATCH v2 00/19] PCI/TSM: TEE I/O infrastructure
 2026-03-03 10:16 UTC  (26+ messages)
` [PATCH v2 01/19] PCI/TSM: Report active IDE streams per host bridge
` [PATCH v2 02/19] device core: Fix kernel-doc warnings in base.h
` [PATCH v2 03/19] device core: Introduce confidential device acceptance
` [PATCH v2 04/19] modules: Document the global async_probe parameter
` [PATCH v2 05/19] device core: Autoprobe considered harmful?
` [PATCH v2 06/19] PCI/TSM: Add Device Security (TVM Guest) LOCK operation support
` [PATCH v2 07/19] PCI/TSM: Add Device Security (TVM Guest) ACCEPT "
` [PATCH v2 08/19] PCI/TSM: Add "evidence" support
` [PATCH v2 09/19] PCI/TSM: Support creating encrypted MMIO descriptors via TDISP Report
` [PATCH v2 10/19] x86, swiotlb: Teach swiotlb to skip "accepted" devices
` [PATCH v2 11/19] x86, dma: Allow accepted devices to map private memory
` [PATCH v2 12/19] x86, ioremap, resource: Support IORES_DESC_ENCRYPTED for encrypted PCI MMIO
` [PATCH v2 13/19] samples/devsec: Introduce a PCI device-security bus + endpoint sample
` [PATCH v2 14/19] samples/devsec: Add sample IDE establishment
` [PATCH v2 15/19] samples/devsec: Add sample TSM bind and guest_request flows
` [PATCH v2 16/19] samples/devsec: Introduce a "Device Security TSM" sample driver
` [PATCH v2 17/19] tools/testing/devsec: Add a script to exercise samples/devsec/
` [PATCH v2 18/19] samples/devsec: Add evidence support
` [PATCH v2 19/19] tools/testing/devsec: Add basic evidence retrieval validation

[PATCH v12 00/46] arm64: Support for Arm CCA in KVM
 2026-03-03  9:26 UTC  (14+ messages)
` [PATCH v12 06/46] arm64: RMI: Define the user ABI
` [PATCH v12 11/46] arm64: RMI: Activate realm on first VCPU run
` [PATCH v12 20/46] arm64: RMI: Allow populating initial contents
` [PATCH v12 27/46] KVM: arm64: Handle Realm PSCI requests

[PATCH v4 0/4] x86/tdx: Clean up the definitions of TDX TD ATTRIBUTES
 2026-03-03  3:03 UTC  (5+ messages)
` [PATCH v4 1/4] x86/tdx: Fix the typo in TDX_ATTR_MIGRTABLE
` [PATCH v4 2/4] KVM: TDX: Remove redundant definitions of TDX_TD_ATTR_*
` [PATCH v4 3/4] x86/tdx: Rename TDX_ATTR_* to TDX_TD_ATTR_*
` [PATCH v4 4/4] KVM: TDX: Rename KVM_SUPPORTED_TD_ATTRS to KVM_SUPPORTED_TDX_TD_ATTRS

[PATCH 00/14] KVM: x86: Emulator MMIO fix and cleanups
 2026-03-03  2:24 UTC  (21+ messages)
` [PATCH 01/14] KVM: x86: Use scratch field in MMIO fragment to hold small write values
` [PATCH 02/14] KVM: x86: Open code handling of completed MMIO reads in emulator_read_write()
` [PATCH 03/14] KVM: x86: Trace unsatisfied MMIO reads on a per-page basis
` [PATCH 04/14] KVM: x86: Use local MMIO fragment variable to clean up emulator_read_write()
` [PATCH 05/14] KVM: x86: Open code read vs. write userspace MMIO exits in emulator_read_write()
` [PATCH 06/14] KVM: x86: Move MMIO write tracing into vcpu_mmio_write()
` [PATCH 07/14] KVM: x86: Harden SEV-ES MMIO against on-stack use-after-free
` [PATCH 08/14] KVM: x86: Dedup kvm_sev_es_mmio_{read,write}()
` [PATCH 09/14] KVM: x86: Consolidate SEV-ES MMIO emulation into a single public API
` [PATCH 10/14] KVM: x86: Bury emulator read/write ops in emulator_{read,write}_emulated()
` [PATCH 11/14] KVM: x86: Fold emulator_write_phys() into write_emulate()
` [PATCH 12/14] KVM: x86: Rename .read_write_emulate() to .read_write_guest()
` [PATCH 13/14] KVM: x86: Don't panic the kernel if completing userspace I/O / MMIO goes sideways
` [PATCH 14/14] KVM: x86: Add helpers to prepare kvm_run for userspace MMIO exit

[PATCH v2 0/7] Add RMPOPT support
 2026-03-02 23:15 UTC  (17+ messages)
` [PATCH v2 1/7] x86/cpufeatures: Add X86_FEATURE_AMD_RMPOPT feature flag
` [PATCH v2 2/7] x86/sev: add support for enabling RMPOPT
` [PATCH v2 3/7] x86/sev: add support for RMPOPT instruction
` [PATCH v2 4/7] x86/sev: Add interface to re-enable RMP optimizations
` [PATCH v2 5/7] KVM: guest_memfd: Add cleanup interface for guest teardown
` [PATCH v2 6/7] KVM: SEV: Implement SEV-SNP specific guest cleanup
` [PATCH v2 7/7] x86/sev: Add debugfs support for RMPOPT

[PATCH v2 0/3] KVM: SEV: Add support for IBPB-on-Entry
 2026-03-02 15:10 UTC  (4+ messages)
` [PATCH v2 2/3] "

[PATCH v4 00/24] Runtime TDX Module update support
 2026-03-02 12:24 UTC  (35+ messages)
` [PATCH v4 01/24] x86/virt/tdx: Move low level SEAMCALL helpers out of <asm/tdx.h>
` [PATCH v4 03/24] coco/tdx-host: Expose TDX Module version
` [PATCH v4 04/24] x86/virt/seamldr: Introduce a wrapper for P-SEAMLDR SEAMCALLs
` [PATCH v4 05/24] x86/virt/seamldr: Retrieve P-SEAMLDR information
` [PATCH v4 07/24] coco/tdx-host: Implement firmware upload sysfs ABI for TDX Module updates
` [PATCH v4 10/24] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v4 11/24] x86/virt/seamldr: Introduce skeleton for TDX Module updates
` [PATCH v4 20/24] x86/virt/tdx: Enable TDX Module runtime updates
` [PATCH v4 21/24] x86/virt/tdx: Avoid updates during update-sensitive operations

[RFC PATCH kernel] iommufd: Allow mapping from KVM's guest_memfd
 2026-02-28 18:29 UTC  (15+ messages)

[PATCH] crypto: ccp - allow callers to use HV-Fixed page API when SEV is disabled
 2026-02-28  8:43 UTC  (2+ messages)

[PATCH v3 00/16] KVM: x86/tdx: Have TDX handle VMXON during bringup
 2026-02-27 11:28 UTC  (14+ messages)
` [PATCH v3 06/16] KVM: VMX: Move core VMXON enablement to kernel
` [PATCH v3 07/16] KVM: SVM: Move core EFER.SVME "
` [PATCH v3 08/16] KVM: x86: Move bulk of emergency virtualizaton logic to virt subsystem
` [PATCH v3 09/16] x86/virt: Add refcounting of VMX/SVM usage to support multiple in-kernel users
` [PATCH v3 11/16] KVM: x86/tdx: Do VMXON and TDX-Module initialization during subsys init

COCONUT-SVSM Development Release v2026.02-devel
 2026-02-27  8:31 UTC 

[PATCH] KVM: SEV: Track SNP launch state and disallow invalid userspace interactions
 2026-02-26 19:30 UTC  (6+ messages)

SVSM Development Call February 25, 2026
 2026-02-26  9:49 UTC  (2+ messages)

[PATCH v2] KVM: x86: synthesize CPUID bits only if CPU capability is set
 2026-02-25 16:43 UTC  (2+ messages)

[PATCH] KVM: TDX: Set SIGNIFCANT_INDEX flag for supported CPUIDs
 2026-02-25 15:03 UTC  (12+ messages)

[PATCH 0/3] KVM: SEV: Add support for BTB Isolation
 2026-02-24 21:40 UTC  (7+ messages)
` [PATCH 1/3] cpu/bugs: Fix selecting Automatic IBRS using spectre_v2=eibrs
` [PATCH 2/3] cpu/bugs: Allow spectre_v2=ibrs on x86 vendors other than Intel
` [PATCH 3/3] KVM: SEV: Add support for SNP BTB Isolation

[PATCH v2 0/2] dma-buf: heaps: system: add an option to allocate explicitly decrypted memory
 2026-02-24 19:04 UTC  (5+ messages)
` [PATCH v2 2/2] dma-buf: heaps: system: add system_cc_decrypted heap for "

[PATCH 0/2] Arm LFA: timeout and ACPI platform driver support
 2026-02-24 10:58 UTC  (3+ messages)
` [PATCH 1/2] firmware: smccc: add timeout, touch wdt


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox