public inbox for linux-coco@lists.linux.dev
 help / color / mirror / Atom feed
 messages from 2026-03-03 17:07:54 to 2026-03-12 12:06:09 UTC [more...]

[PATCH net-next v3 0/2] dma-buf: heaps: system: add an option to allocate explicitly decrypted memory
 2026-03-12 12:06 UTC  (19+ messages)
` [PATCH net-next v3 1/2] dma-mapping: introduce DMA_ATTR_CC_DECRYPTED for pre-decrypted memory
` [PATCH net-next v3 2/2] dma-buf: heaps: system: add system_cc_decrypted heap for explicitly decrypted memory

[PATCH v12 00/46] arm64: Support for Arm CCA in KVM
 2026-03-12 10:45 UTC  (10+ messages)
` [PATCH v12 06/46] arm64: RMI: Define the user ABI

[PATCH v4 00/24] Runtime TDX Module update support
 2026-03-12  9:59 UTC  (58+ messages)
` [PATCH v4 01/24] x86/virt/tdx: Move low level SEAMCALL helpers out of <asm/tdx.h>
` [PATCH v4 02/24] coco/tdx-host: Introduce a "tdx_host" device
` [PATCH v4 04/24] x86/virt/seamldr: Introduce a wrapper for P-SEAMLDR SEAMCALLs
` [PATCH v4 06/24] coco/tdx-host: Expose P-SEAMLDR information via sysfs
` [PATCH v4 07/24] coco/tdx-host: Implement firmware upload sysfs ABI for TDX Module updates
` [PATCH v4 08/24] x86/virt/seamldr: Block TDX Module updates if any CPU is offline
` [PATCH v4 09/24] x86/virt/seamldr: Check update limit before TDX Module updates
` [PATCH v4 10/24] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v4 11/24] x86/virt/seamldr: Introduce skeleton for TDX Module updates
` [PATCH v4 12/24] x86/virt/seamldr: Abort updates if errors occurred midway
` [PATCH v4 13/24] x86/virt/seamldr: Shut down the current TDX module
` [PATCH v4 14/24] x86/virt/tdx: Reset software states during TDX Module shutdown
` [PATCH v4 15/24] x86/virt/seamldr: Log TDX Module update failures
` [PATCH v4 16/24] x86/virt/seamldr: Install a new TDX Module
` [PATCH v4 17/24] x86/virt/seamldr: Do TDX per-CPU initialization after updates
` [PATCH v4 18/24] x86/virt/tdx: Restore TDX Module state
` [PATCH v4 19/24] x86/virt/tdx: Update tdx_sysinfo and check features post-update
` [PATCH v4 23/24] x86/virt/tdx: Document TDX Module updates
` [PATCH v4 24/24] [NOT-FOR-REVIEW] x86/virt/seamldr: Save and restore current VMCS

[RFC PATCH v3 00/12] coco/TSM: Implement host-side support for Arm CCA TDISP setup
 2026-03-12  8:07 UTC  (13+ messages)
` [RFC PATCH v3 01/12] coco: host: arm64: Add support for virtual device communication
` [RFC PATCH v3 02/12] coco: host: arm64: Add support for RMM vdev objects
` [RFC PATCH v3 03/12] coco: host: arm64: Add helpers to unlock and destroy RMM vdev
` [RFC PATCH v3 04/12] coco: host: arm64: Add support for da object read RHI handling
` [RFC PATCH v3 05/12] coco: host: arm64: Add helper for cached object fetches
` [RFC PATCH v3 06/12] coco: host: arm64: Fetch interface report via RMI
` [RFC PATCH v3 07/12] coco: host: arm64: Fetch device measurements "
` [RFC PATCH v3 08/12] coco: host: KVM: arm64: Handle vdev request exits and completion
` [RFC PATCH v3 09/12] coco: host: KVM: arm64: Handle vdev map/validation exits
` [RFC PATCH v3 10/12] KVM: arm64: Unmap device mappings when a private granule is destroyed
` [RFC PATCH v3 11/12] coco: host: arm64: Transition vdevs to TDISP RUN state
` [RFC PATCH v3 12/12] KVM: arm64: CCA: enable DA in realm create parameters

[RFC PATCH v3 00/11] coco/TSM: Arm CCA guest TDISP lock/accept flow with verification and DMA enable
 2026-03-12  8:04 UTC  (12+ messages)
` [RFC PATCH v3 01/11] coco: guest: arm64: Guest TSM callback and realm device lock support
` [RFC PATCH v3 02/11] coco: guest: arm64: Fix a typo in the ARM_CCA_GUEST Kconfig help string ("and" -> "an")
` [RFC PATCH v3 03/11] coco: guest: arm64: Add Realm Host Interface and guest DA helper
` [RFC PATCH v3 04/11] coco: guest: arm64: Support guest-initiated TDI lock/unlock transitions
` [RFC PATCH v3 05/11] coco: guest: arm64: Refresh interface-report cache during device lock
` [RFC PATCH v3 06/11] coco: guest: arm64: Add measurement refresh via RHI_DA_VDEV_GET_MEASUREMENTS
` [RFC PATCH v3 07/11] coco: guest: arm64: Add guest APIs to read host-cached DA objects
` [RFC PATCH v3 08/11] coco: guest: arm64: Verify DA evidence with RSI_VDEV_GET_INFO digests
` [RFC PATCH v3 09/11] coco: guest: arm64: Hook TSM accept to Realm TDISP RUN transition
` [RFC PATCH v3 10/11] coco: arm64: dma: Update force_dma_unencrypted for accepted devices
` [RFC PATCH v3 11/11] coco: guest: arm64: Enable vdev DMA after attestation

[RFC PATCH v3 00/10] coco/TSM: Host-side Arm CCA IDE setup via connect/disconnect callbacks
 2026-03-12  8:01 UTC  (11+ messages)
` [RFC PATCH v3 01/10] KVM: arm64: RMI: Add and export kvm_has_da_feature helper
` [RFC PATCH v3 02/10] coco: host: arm64: Add host TSM callback and IDE stream allocation support
` [RFC PATCH v3 03/10] coco: host: arm64: Build and register RMM pdev descriptors
` [RFC PATCH v3 04/10] coco: host: arm64: Add RMM device communication helpers
` [RFC PATCH v3 05/10] coco: host: arm64: Add helper to stop and tear down an RMM pdev
` [RFC PATCH v3 06/10] coco: host: arm64: Instantiate RMM pdev during device connect
` [RFC PATCH v3 07/10] X.509: Make certificate parser public
` [RFC PATCH v3 08/10] X.509: Parse Subject Alternative Name in certificates
` [RFC PATCH v3 09/10] X.509: Move certificate length retrieval into new helper
` [RFC PATCH v3 10/10] coco: host: arm64: Register device public key with RMM

[PATCH v2 0/3] KVM: SEV: Add support for BTB Isolation
 2026-03-12  3:41 UTC  (6+ messages)
` [PATCH v2 1/3] cpu/bugs: Allow forcing Automatic IBRS with SNP enabled using spectre_v2=eibrs
` [PATCH v2 2/3] cpu/bugs: Allow spectre_v2=ibrs on x86 vendors other than Intel
` [PATCH v2 3/3] KVM: SEV: Add support for SNP BTB Isolation

[PATCH v2 0/7] Add RMPOPT support
 2026-03-11 22:20 UTC  (20+ messages)
` [PATCH v2 1/7] x86/cpufeatures: Add X86_FEATURE_AMD_RMPOPT feature flag
` [PATCH v2 2/7] x86/sev: add support for enabling RMPOPT
` [PATCH v2 3/7] x86/sev: add support for RMPOPT instruction
` [PATCH v2 5/7] KVM: guest_memfd: Add cleanup interface for guest teardown

[PATCH 0/7] KVM: x86: APX reg prep work
 2026-03-11 19:01 UTC  (14+ messages)
` [PATCH 1/7] KVM: x86: Add dedicated storage for guest RIP
` [PATCH 2/7] KVM: x86: Drop the "EX" part of "EXREG" to avoid collision with APX
` [PATCH 3/7] KVM: nVMX: Do a bitwise-AND of regs_avail when switching active VMCS
` [PATCH 4/7] KVM: x86: Add wrapper APIs to reset dirty/available register masks
` [PATCH 5/7] KVM: x86: Track available/dirty register masks as "unsigned long" values
` [PATCH 6/7] KVM: x86: Use a proper bitmap for tracking available/dirty registers
` [PATCH 7/7] *** DO NOT MERGE *** KVM: x86: Pretend that APX is supported on 64-bit kernels

[PATCH v2 0/4] Enforce host page-size alignment for shared buffers
 2026-03-11 12:24 UTC  (6+ messages)
` [PATCH v2 4/4] dma: direct: set decrypted flag for remapped dma allocations

[PATCH 0/1] [Test Report] get qutoe time via tdvmcall
 2026-03-10 18:58 UTC  (5+ messages)
` [PATCH 1/1] virt: tdx-guest: Optimize the get-quote polling interval time

SVSM Development Call March 11, 2026
 2026-03-10 17:10 UTC 

[PATCH 0/4] x86/vmware: Hypercall refactoring and improved guest support
 2026-03-09 23:52 UTC  (12+ messages)
` [PATCH 1/4] x86/vmware: Introduce common vmware_hypercall()
` [PATCH 2/4] x86/vmware: Log kmsg dump on panic
` [PATCH 3/4] x86/vmware: Report guest crash to the hypervisor
` [PATCH 4/4] x86/vmware: Support steal time clock for encrypted guests
` [PATCH v2 0/4] x86/vmware: Hypercall refactoring and improved guest support
  ` [PATCH v2 1/4] x86/vmware: Introduce common vmware_hypercall()
  ` [PATCH v2 2/4] x86/vmware: Log kmsg dump on panic
  ` [PATCH v2 3/4] x86/vmware: Report guest crash to the hypervisor
  ` [PATCH v2 4/4] x86/vmware: Support steal time clock for encrypted guests

[PATCH v2 00/19] PCI/TSM: TEE I/O infrastructure
 2026-03-09 16:58 UTC  (14+ messages)
` [PATCH v2 01/19] PCI/TSM: Report active IDE streams per host bridge
` [PATCH v2 02/19] device core: Fix kernel-doc warnings in base.h
` [PATCH v2 03/19] device core: Introduce confidential device acceptance
` [PATCH v2 05/19] device core: Autoprobe considered harmful?
` [PATCH v2 09/19] PCI/TSM: Support creating encrypted MMIO descriptors via TDISP Report

[PATCH 0/4] Fuller TDX kexec support
 2026-03-09 16:24 UTC  (11+ messages)
` [PATCH 1/4] x86/tdx: Move all TDX error defines into <asm/shared/tdx_errno.h>
` [PATCH 2/4] x86/virt/tdx: Pull kexec cache flush logic into arch/x86
` [PATCH 3/4] x86/virt/tdx: Add SEAMCALL wrapper for TDH.SYS.DISABLE
` [PATCH 4/4] KVM: x86: Disable the TDX module during kexec and kdump

[PATCH v3 0/3] Enforce host page-size alignment for shared buffers
 2026-03-09 15:55 UTC  (9+ messages)
` [PATCH v3 1/3] dma-direct: swiotlb: handle swiotlb alloc/free outside __dma_direct_alloc_pages
` [PATCH v3 2/3] swiotlb: dma: its: Enforce host page-size alignment for shared buffers
` [PATCH v3 3/3] coco: guest: arm64: Add Realm Host Interface and hostconf RHI

[PATCH] KVM: SEV: Track SNP launch state and disallow invalid userspace interactions
 2026-03-07  1:51 UTC  (7+ messages)

SVSM Development Call March 4, 2026
 2026-03-06  8:45 UTC  (2+ messages)

[PATCH v3 0/2] Extend KVM_HC_MAP_GPA_RANGE api to allow retry
 2026-03-05 22:27 UTC  (7+ messages)
` [PATCH v3 1/2] KVM: TDX: Allow userspace to return errors to guest for MAPGPA

[PATCH v4 0/2] Extend KVM_HC_MAP_GPA_RANGE api to allow retry
 2026-03-05 22:26 UTC  (3+ messages)
` [PATCH v4 1/2] KVM: TDX: Allow userspace to return errors to guest for MAPGPA
` [PATCH v4 2/2] KVM: SEV: Restrict userspace return codes for KVM_HC_MAP_GPA_RANGE

[PATCH v3 00/16] KVM: x86/tdx: Have TDX handle VMXON during bringup
 2026-03-05 19:08 UTC  (8+ messages)

[PATCH 00/14] KVM: x86: Emulator MMIO fix and cleanups
 2026-03-05 17:07 UTC  (9+ messages)
` [PATCH 14/14] KVM: x86: Add helpers to prepare kvm_run for userspace MMIO exit

[PATCH v2] KVM: x86: synthesize CPUID bits only if CPU capability is set
 2026-03-05 17:07 UTC  (2+ messages)

[Invitation] bi-weekly guest_memfd upstream call on 2026-03-05
 2026-03-04 20:11 UTC 

[PATCH v2 3/7] x86/sev: add support for RMPOPT instruction
 2026-03-04 16:03 UTC  (3+ messages)

[PATCH v4 0/4] x86/tdx: Clean up the definitions of TDX TD ATTRIBUTES
 2026-03-04 15:02 UTC  (2+ messages)

[PATCH kernel 0/9] PCI/TSM: coco/sev-guest: Implement SEV-TIO PCIe TDISP (phase2)
 2026-03-04 12:43 UTC  (11+ messages)
` [PATCH kernel 4/9] dma/swiotlb: Stop forcing SWIOTLB for TDISP devices


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox