public inbox for linux-coco@lists.linux.dev
 help / color / mirror / Atom feed
 messages from 2026-03-17 05:33:31 to 2026-03-23 02:15:02 UTC [more...]

[PATCH v5 00/22] Runtime TDX module update support
 2026-03-23  2:14 UTC  (75+ messages)
` [PATCH v5 03/22] coco/tdx-host: Expose TDX module version
` [PATCH v5 04/22] x86/virt/seamldr: Introduce a wrapper for P-SEAMLDR SEAMCALLs
` [PATCH v5 05/22] x86/virt/seamldr: Retrieve P-SEAMLDR information
` [PATCH v5 06/22] coco/tdx-host: Expose P-SEAMLDR information via sysfs
` [PATCH v5 07/22] coco/tdx-host: Implement firmware upload sysfs ABI for TDX module updates
` [PATCH v5 08/22] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v5 09/22] x86/virt/seamldr: Introduce skeleton for TDX module updates
` [PATCH v5 10/22] x86/virt/seamldr: Abort updates if errors occurred midway
` [PATCH v5 11/22] x86/virt/seamldr: Shut down the current TDX module
` [PATCH v5 12/22] x86/virt/tdx: Reset software states during TDX module shutdown
` [PATCH v5 13/22] x86/virt/seamldr: Install a new TDX module
` [PATCH v5 14/22] x86/virt/seamldr: Do TDX per-CPU initialization after updates
` [PATCH v5 15/22] x86/virt/tdx: Restore TDX module state
` [PATCH v5 16/22] x86/virt/tdx: Update tdx_sysinfo and check features post-update
` [PATCH v5 17/22] x86/virt/tdx: Avoid updates during update-sensitive operations
` [PATCH v5 18/22] coco/tdx-host: Don't expose P-SEAMLDR features on CPUs with erratum
` [PATCH v5 19/22] x86/virt/tdx: Enable TDX module runtime updates
` [PATCH v5 20/22] coco/tdx-host: Document TDX module update compatibility criteria
` [PATCH v5 21/22] x86/virt/tdx: Document TDX module update
` [PATCH v5 22/22] x86/virt/seamldr: Log TDX module update failures

[PATCH v13 00/48] arm64: Support for Arm CCA in KVM
 2026-03-21 16:34 UTC  (100+ messages)
` [PATCH v13 01/48] kvm: arm64: Include kvm_emulate.h in kvm/arm_psci.h
` [PATCH v13 02/48] kvm: arm64: Avoid including linux/kvm_host.h in kvm_pgtable.h
` [PATCH v13 03/48] arm64: RME: Handle Granule Protection Faults (GPFs)
` [PATCH v13 04/48] arm64: RMI: Add SMC definitions for calling the RMM
` [PATCH v13 05/48] arm64: RMI: Temporarily add SMCs from RMM v1.0 spec
` [PATCH v13 06/48] arm64: RMI: Add wrappers for RMI calls
` [PATCH v13 07/48] arm64: RMI: Check for RMI support at KVM init
` [PATCH v13 08/48] arm64: RMI: Configure the RMM with the host's page size
` [PATCH v13 09/48] arm64: RMI: Check for LPA2 support
` [PATCH v13 10/48] arm64: RMI: Ensure that the RMM has GPT entries for memory
` [PATCH v13 11/48] arm64: RMI: Define the user ABI
` [PATCH v13 12/48] arm64: RMI: Basic infrastructure for creating a realm
` [PATCH v13 13/48] kvm: arm64: Don't expose unsupported capabilities for realm guests
` [PATCH v13 14/48] KVM: arm64: Allow passing machine type in KVM creation
` [PATCH v13 15/48] arm64: RMI: RTT tear down
` [PATCH v13 16/48] arm64: RMI: Activate realm on first VCPU run
` [PATCH v13 17/48] arm64: RMI: Allocate/free RECs to match vCPUs
` [PATCH v13 18/48] arm64: RMI: Support for the VGIC in realms
` [PATCH v13 19/48] KVM: arm64: Support timers in realm RECs
` [PATCH v13 20/48] arm64: RMI: Handle realm enter/exit
` [PATCH v13 21/48] arm64: RMI: Handle RMI_EXIT_RIPAS_CHANGE
` [PATCH v13 22/48] KVM: arm64: Handle realm MMIO emulation
` [PATCH v13 23/48] KVM: arm64: Expose support for private memory
` [PATCH v13 24/48] arm64: RMI: Allow populating initial contents
` [PATCH v13 25/48] arm64: RMI: Set RIPAS of initial memslots
` [PATCH v13 26/48] arm64: RMI: Create the realm descriptor
` [PATCH v13 27/48] arm64: RMI: Runtime faulting of memory
` [PATCH v13 28/48] KVM: arm64: Handle realm VCPU load
` [PATCH v13 29/48] KVM: arm64: Validate register access for a Realm VM
` [PATCH v13 30/48] KVM: arm64: Handle Realm PSCI requests
` [PATCH v13 31/48] KVM: arm64: WARN on injected undef exceptions
` [PATCH v13 32/48] arm64: Don't expose stolen time for realm guests
` [PATCH v13 33/48] arm64: RMI: allow userspace to inject aborts
` [PATCH v13 34/48] arm64: RMI: support RSI_HOST_CALL
` [PATCH v13 35/48] arm64: RMI: Allow checking SVE on VM instance
` [PATCH v13 36/48] arm64: RMI: Always use 4k pages for realms
` [PATCH v13 37/48] arm64: RMI: Prevent Device mappings for Realms
` [PATCH v13 38/48] arm64: RMI: Enable PMU support with a realm guest
` [PATCH v13 39/48] arm64: RMI: Propagate number of breakpoints and watchpoints to userspace
` [PATCH v13 40/48] arm64: RMI: Set breakpoint parameters through SET_ONE_REG
` [PATCH v13 41/48] arm64: RMI: Initialize PMCR.N with number counter supported by RMM
` [PATCH v13 42/48] arm64: RMI: Propagate max SVE vector length from RMM
` [PATCH v13 43/48] arm64: RMI: Configure max SVE vector length for a Realm
` [PATCH v13 44/48] arm64: RMI: Provide register list for unfinalized RMI RECs
` [PATCH v13 45/48] arm64: RMI: Provide accurate register list
` [PATCH v13 46/48] KVM: arm64: Expose KVM_ARM_VCPU_REC to user space
` [PATCH v13 47/48] arm64: RMI: Enable realms to be created
` [PATCH v13 48/48] [WIP] arm64: RMI: Add support for SRO

[PATCH 0/2] struct page to PFN conversion for TDX guest private memory
 2026-03-20 17:48 UTC  (19+ messages)
` [PATCH 1/2] x86/virt/tdx: Use PFN directly for mapping "
` [PATCH 2/2] x86/virt/tdx: Use PFN directly for unmapping "

[PATCH v2 00/19] PCI/TSM: TEE I/O infrastructure
 2026-03-20  2:50 UTC  (22+ messages)
` [PATCH v2 08/19] PCI/TSM: Add "evidence" support
` [PATCH v2 09/19] PCI/TSM: Support creating encrypted MMIO descriptors via TDISP Report
` [PATCH v2 12/19] x86, ioremap, resource: Support IORES_DESC_ENCRYPTED for encrypted PCI MMIO

[PATCH] KVM: TDX: Fix APIC MSR ranges in tdx_has_emulated_msr()
 2026-03-19 19:33 UTC  (7+ messages)

[PATCH] sample/tsm-mr: Use SHA-2 library APIs
 2026-03-19 17:51 UTC  (4+ messages)

[Invitation] bi-weekly guest_memfd upstream call on 2026-03-19
 2026-03-19  6:05 UTC  (2+ messages)

SVSM Development Call March 18, 2026
 2026-03-18 20:59 UTC  (2+ messages)

[PATCH v2 0/7] Add RMPOPT support
 2026-03-18 14:00 UTC  (11+ messages)
` [PATCH v2 3/7] x86/sev: add support for RMPOPT instruction

[PATCH 0/4] Fuller TDX kexec support
 2026-03-17 21:55 UTC  (6+ messages)
` [PATCH 3/4] x86/virt/tdx: Add SEAMCALL wrapper for TDH.SYS.DISABLE

[PATCH net-next v3 0/2] dma-buf: heaps: system: add an option to allocate explicitly decrypted memory
 2026-03-17 15:40 UTC  (4+ messages)

[PATCH v4 0/2] dma-buf: heaps: system: add an option to allocate explicitly decrypted memory
 2026-03-17  8:26 UTC  (4+ messages)
` [PATCH v4 1/2] dma-mapping: introduce DMA_ATTR_CC_DECRYPTED for pre-decrypted memory


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox