public inbox for linux-coco@lists.linux.dev
 help / color / mirror / Atom feed
 messages from 2026-02-28 08:43:14 to 2026-03-10 00:17:15 UTC [more...]

[PATCH 0/4] x86/vmware: Hypercall refactoring and improved guest support
 2026-03-09 23:52 UTC  (12+ messages)
` [PATCH 1/4] x86/vmware: Introduce common vmware_hypercall()
` [PATCH 2/4] x86/vmware: Log kmsg dump on panic
` [PATCH 3/4] x86/vmware: Report guest crash to the hypervisor
` [PATCH 4/4] x86/vmware: Support steal time clock for encrypted guests
` [PATCH v2 0/4] x86/vmware: Hypercall refactoring and improved guest support
  ` [PATCH v2 1/4] x86/vmware: Introduce common vmware_hypercall()
  ` [PATCH v2 2/4] x86/vmware: Log kmsg dump on panic
  ` [PATCH v2 3/4] x86/vmware: Report guest crash to the hypervisor
  ` [PATCH v2 4/4] x86/vmware: Support steal time clock for encrypted guests

[PATCH net-next v3 0/2] dma-buf: heaps: system: add an option to allocate explicitly decrypted memory
 2026-03-09 17:51 UTC  (15+ messages)
` [PATCH net-next v3 1/2] dma-mapping: introduce DMA_ATTR_CC_DECRYPTED for pre-decrypted memory
` [PATCH net-next v3 2/2] dma-buf: heaps: system: add system_cc_decrypted heap for explicitly decrypted memory

[PATCH v2 00/19] PCI/TSM: TEE I/O infrastructure
 2026-03-09 16:58 UTC  (34+ messages)
` [PATCH v2 01/19] PCI/TSM: Report active IDE streams per host bridge
` [PATCH v2 02/19] device core: Fix kernel-doc warnings in base.h
` [PATCH v2 03/19] device core: Introduce confidential device acceptance
` [PATCH v2 04/19] modules: Document the global async_probe parameter
` [PATCH v2 05/19] device core: Autoprobe considered harmful?
` [PATCH v2 06/19] PCI/TSM: Add Device Security (TVM Guest) LOCK operation support
` [PATCH v2 07/19] PCI/TSM: Add Device Security (TVM Guest) ACCEPT "
` [PATCH v2 08/19] PCI/TSM: Add "evidence" support
` [PATCH v2 09/19] PCI/TSM: Support creating encrypted MMIO descriptors via TDISP Report
` [PATCH v2 10/19] x86, swiotlb: Teach swiotlb to skip "accepted" devices
` [PATCH v2 11/19] x86, dma: Allow accepted devices to map private memory
` [PATCH v2 12/19] x86, ioremap, resource: Support IORES_DESC_ENCRYPTED for encrypted PCI MMIO
` [PATCH v2 13/19] samples/devsec: Introduce a PCI device-security bus + endpoint sample
` [PATCH v2 14/19] samples/devsec: Add sample IDE establishment
` [PATCH v2 15/19] samples/devsec: Add sample TSM bind and guest_request flows
` [PATCH v2 16/19] samples/devsec: Introduce a "Device Security TSM" sample driver
` [PATCH v2 17/19] tools/testing/devsec: Add a script to exercise samples/devsec/
` [PATCH v2 18/19] samples/devsec: Add evidence support
` [PATCH v2 19/19] tools/testing/devsec: Add basic evidence retrieval validation

[PATCH 0/4] Fuller TDX kexec support
 2026-03-09 16:24 UTC  (11+ messages)
` [PATCH 1/4] x86/tdx: Move all TDX error defines into <asm/shared/tdx_errno.h>
` [PATCH 2/4] x86/virt/tdx: Pull kexec cache flush logic into arch/x86
` [PATCH 3/4] x86/virt/tdx: Add SEAMCALL wrapper for TDH.SYS.DISABLE
` [PATCH 4/4] KVM: x86: Disable the TDX module during kexec and kdump

[PATCH v3 0/3] Enforce host page-size alignment for shared buffers
 2026-03-09 15:55 UTC  (9+ messages)
` [PATCH v3 1/3] dma-direct: swiotlb: handle swiotlb alloc/free outside __dma_direct_alloc_pages
` [PATCH v3 2/3] swiotlb: dma: its: Enforce host page-size alignment for shared buffers
` [PATCH v3 3/3] coco: guest: arm64: Add Realm Host Interface and hostconf RHI

[PATCH v2 0/7] Add RMPOPT support
 2026-03-09  9:01 UTC  (29+ messages)
` [PATCH v2 1/7] x86/cpufeatures: Add X86_FEATURE_AMD_RMPOPT feature flag
` [PATCH v2 2/7] x86/sev: add support for enabling RMPOPT
` [PATCH v2 3/7] x86/sev: add support for RMPOPT instruction
` [PATCH v2 4/7] x86/sev: Add interface to re-enable RMP optimizations
` [PATCH v2 5/7] KVM: guest_memfd: Add cleanup interface for guest teardown
` [PATCH v2 6/7] KVM: SEV: Implement SEV-SNP specific guest cleanup
` [PATCH v2 7/7] x86/sev: Add debugfs support for RMPOPT

[PATCH] KVM: SEV: Track SNP launch state and disallow invalid userspace interactions
 2026-03-07  1:51 UTC  (7+ messages)

[PATCH v4 00/24] Runtime TDX Module update support
 2026-03-06  9:35 UTC  (44+ messages)
` [PATCH v4 01/24] x86/virt/tdx: Move low level SEAMCALL helpers out of <asm/tdx.h>
` [PATCH v4 02/24] coco/tdx-host: Introduce a "tdx_host" device
` [PATCH v4 04/24] x86/virt/seamldr: Introduce a wrapper for P-SEAMLDR SEAMCALLs
` [PATCH v4 06/24] coco/tdx-host: Expose P-SEAMLDR information via sysfs
` [PATCH v4 08/24] x86/virt/seamldr: Block TDX Module updates if any CPU is offline
` [PATCH v4 09/24] x86/virt/seamldr: Check update limit before TDX Module updates
` [PATCH v4 10/24] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v4 12/24] x86/virt/seamldr: Abort updates if errors occurred midway
` [PATCH v4 13/24] x86/virt/seamldr: Shut down the current TDX module
` [PATCH v4 14/24] x86/virt/tdx: Reset software states during TDX Module shutdown
` [PATCH v4 15/24] x86/virt/seamldr: Log TDX Module update failures
` [PATCH v4 16/24] x86/virt/seamldr: Install a new TDX Module
` [PATCH v4 17/24] x86/virt/seamldr: Do TDX per-CPU initialization after updates
` [PATCH v4 18/24] x86/virt/tdx: Restore TDX Module state
` [PATCH v4 19/24] x86/virt/tdx: Update tdx_sysinfo and check features post-update
` [PATCH v4 23/24] x86/virt/tdx: Document TDX Module updates

SVSM Development Call March 4, 2026
 2026-03-06  8:45 UTC  (2+ messages)

[PATCH v3 0/2] Extend KVM_HC_MAP_GPA_RANGE api to allow retry
 2026-03-05 22:27 UTC  (7+ messages)
` [PATCH v3 1/2] KVM: TDX: Allow userspace to return errors to guest for MAPGPA

[PATCH v4 0/2] Extend KVM_HC_MAP_GPA_RANGE api to allow retry
 2026-03-05 22:26 UTC  (3+ messages)
` [PATCH v4 1/2] KVM: TDX: Allow userspace to return errors to guest for MAPGPA
` [PATCH v4 2/2] KVM: SEV: Restrict userspace return codes for KVM_HC_MAP_GPA_RANGE

[PATCH v3 00/16] KVM: x86/tdx: Have TDX handle VMXON during bringup
 2026-03-05 19:08 UTC  (8+ messages)

[PATCH 00/14] KVM: x86: Emulator MMIO fix and cleanups
 2026-03-05 17:07 UTC  (9+ messages)
` [PATCH 14/14] KVM: x86: Add helpers to prepare kvm_run for userspace MMIO exit

[PATCH v2] KVM: x86: synthesize CPUID bits only if CPU capability is set
 2026-03-05 17:07 UTC  (2+ messages)

[Invitation] bi-weekly guest_memfd upstream call on 2026-03-05
 2026-03-04 20:11 UTC 

[PATCH v4 0/4] x86/tdx: Clean up the definitions of TDX TD ATTRIBUTES
 2026-03-04 15:02 UTC  (6+ messages)
` [PATCH v4 1/4] x86/tdx: Fix the typo in TDX_ATTR_MIGRTABLE
` [PATCH v4 2/4] KVM: TDX: Remove redundant definitions of TDX_TD_ATTR_*
` [PATCH v4 3/4] x86/tdx: Rename TDX_ATTR_* to TDX_TD_ATTR_*
` [PATCH v4 4/4] KVM: TDX: Rename KVM_SUPPORTED_TD_ATTRS to KVM_SUPPORTED_TDX_TD_ATTRS

[PATCH kernel 0/9] PCI/TSM: coco/sev-guest: Implement SEV-TIO PCIe TDISP (phase2)
 2026-03-04 12:43 UTC  (28+ messages)
` [PATCH kernel 2/9] pci/tsm: Add tsm_tdi_status
` [PATCH kernel 4/9] dma/swiotlb: Stop forcing SWIOTLB for TDISP devices
` [PATCH kernel 6/9] x86/dma-direct: Stop changing encrypted page state "
` [PATCH kernel 9/9] pci: Allow encrypted MMIO mapping via sysfs

[PATCH v12 00/46] arm64: Support for Arm CCA in KVM
 2026-03-04 12:08 UTC  (21+ messages)
` [PATCH v12 06/46] arm64: RMI: Define the user ABI
` [PATCH v12 11/46] arm64: RMI: Activate realm on first VCPU run
` [PATCH v12 20/46] arm64: RMI: Allow populating initial contents
` [PATCH v12 27/46] KVM: arm64: Handle Realm PSCI requests

[PATCH v2 0/3] KVM: SEV: Add support for IBPB-on-Entry
 2026-03-02 15:10 UTC  (4+ messages)
` [PATCH v2 2/3] "

[RFC PATCH kernel] iommufd: Allow mapping from KVM's guest_memfd
 2026-02-28 18:29 UTC  (11+ messages)

[PATCH] crypto: ccp - allow callers to use HV-Fixed page API when SEV is disabled
 2026-02-28  8:43 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox