public inbox for linux-coco@lists.linux.dev
 help / color / mirror / Atom feed
 messages from 2026-03-27 16:24:13 to 2026-04-02 23:46:03 UTC [more...]

[PATCH 0/2] struct page to PFN conversion for TDX guest private memory
 2026-04-02 23:46 UTC  (14+ messages)
` [PATCH 1/2] x86/virt/tdx: Use PFN directly for mapping "

[PATCH 0/7] KVM: x86: APX reg prep work
 2026-04-02 23:19 UTC  (7+ messages)

[PATCH v3 0/6] KVM: SEV: Add support for IBPB-on-Entry and BTB Isolation
 2026-04-02 20:25 UTC  (7+ messages)
` [PATCH v3 1/6] cpu/bugs: Allow forcing Automatic IBRS with SNP active using spectre_v2=eibrs
` [PATCH v3 2/6] cpu/bugs: Allow spectre_v2=ibrs on x86 vendors other than Intel
` [PATCH v3 3/6] KVM: SEV: Disallow setting SNP-only features for non-SNP guests via a single mask
` [PATCH v3 4/6] KVM: SEV: Advertise SVM_SEV_FEAT_SNP_ACTIVE
` [PATCH v3 5/6] KVM: SEV: Add support for IBPB-on-Entry
` [PATCH v3 6/6] KVM: SEV: Add support for SNP BTB Isolation

[PATCH v3 0/5] Fuller TDX kexec support
 2026-04-02 18:18 UTC  (8+ messages)
` [PATCH v3 1/5] x86/tdx: Move TDX architectural error codes into <asm/shared/tdx_errno.h>
` [PATCH v3 2/5] x86/virt/tdx: Pull kexec cache flush logic into arch/x86
` [PATCH v3 3/5] x86/virt/tdx: Add SEAMCALL wrapper for TDH.SYS.DISABLE
` [PATCH v3 4/5] x86/tdx: Disable the TDX module during kexec and kdump
` [PATCH v3 5/5] x86/virt/tdx: Remove kexec docs

[PATCH 0/2] x86/tdx: Fix memory hotplug in TDX guests
 2026-04-02 17:06 UTC  (15+ messages)
` [PATCH 2/2] x86/tdx: Accept hotplugged memory before online

[PATCH] dma-buf: heaps: system: document system_cc_shared heap
 2026-04-02 14:11 UTC 

[PATCH v5 0/2] dma-buf: heaps: system: add an option to allocate explicitly shared/decrypted memory
 2026-04-02 12:58 UTC  (16+ messages)
  ` [PATCH v5 1/2] dma-mapping: introduce DMA_ATTR_CC_SHARED for shared memory
  ` [PATCH v5 2/2] dma-buf: heaps: system: add system_cc_shared heap for explicitly "

[Invitation] bi-weekly guest_memfd upstream call on 2026-04-02
 2026-04-02 12:11 UTC 

[PATCH v2 00/31] PCI/TSM: PCIe Link Encryption Establishment via TDX platform services
 2026-04-02 11:29 UTC  (54+ messages)
` [PATCH v2 01/31] x86/tdx: Move all TDX error defines into <asm/shared/tdx_errno.h>
` [PATCH v2 02/31] x86/virt/tdx: Move bit definitions of TDX_FEATURES0 to public header
` [PATCH v2 03/31] x86/virt/tdx: Add tdx_page_array helpers for new TDX Module objects
` [PATCH v2 04/31] x86/virt/tdx: Support allocating contiguous pages for tdx_page_array
` [PATCH v2 05/31] x86/virt/tdx: Extend tdx_page_array to support IOMMU_MT
` [PATCH v2 06/31] x86/virt/tdx: Read global metadata for TDX Module Extensions/Connect
` [PATCH v2 08/31] x86/virt/tdx: Configure TDX Module with optional TDX Connect feature
` [PATCH v2 10/31] x86/virt/tdx: Add extra memory to TDX Module for Extensions
` [PATCH v2 11/31] x86/virt/tdx: Make TDX Module initialize Extensions
` [PATCH v2 27/31] coco/tdx-host: Implement SPDM session setup
` [PATCH v2 28/31] coco/tdx-host: Parse ACPI KEYP table to init IDE for PCI host bridges
` [PATCH v2 29/31] x86/virt/tdx: Add SEAMCALL wrappers for IDE stream management
` [PATCH v2 30/31] coco/tdx-host: Implement IDE stream setup/teardown
` [PATCH v2 31/31] coco/tdx-host: Finally enable SPDM session and IDE Establishment

SVSM Development Call April 1st, 2026
 2026-04-02  7:54 UTC  (2+ messages)

[PATCH v2 0/5] Fuller TDX kexec support
 2026-04-01 18:30 UTC  (26+ messages)
` [PATCH v2 1/5] x86/tdx: Move all TDX error defines into <asm/shared/tdx_errno.h>
` [PATCH v2 2/5] x86/virt/tdx: Pull kexec cache flush logic into arch/x86
` [PATCH v2 3/5] x86/virt/tdx: Add SEAMCALL wrapper for TDH.SYS.DISABLE
` [PATCH v2 4/5] x86/tdx: Disable the TDX module during kexec and kdump
` [PATCH v2 5/5] x86/virt/tdx: Remove kexec docs

[PATCH v3 1/6] x86/cpufeatures: Add X86_FEATURE_AMD_RMPOPT feature flag
 2026-04-01 16:10 UTC  (14+ messages)
` [PATCH v3 2/6] x86/sev: Add support for enabling RMPOPT
` [PATCH v3 3/6] x86/sev: Add support to perform RMP optimizations asynchronously
` [PATCH v3 4/6] x86/sev: Add interface to re-enable RMP optimizations
` [PATCH v3 5/6] KVM: SEV: Perform RMP optimizations on SNP guest shutdown
` [PATCH v3 6/6] x86/sev: Add debugfs support for RMPOPT

[PATCH v13 00/48] arm64: Support for Arm CCA in KVM
 2026-04-01 10:54 UTC  (16+ messages)
` [PATCH v13 10/48] arm64: RMI: Ensure that the RMM has GPT entries for memory
` [PATCH v13 12/48] arm64: RMI: Basic infrastructure for creating a realm
` [PATCH v13 30/48] KVM: arm64: Handle Realm PSCI requests
` [PATCH v13 31/48] KVM: arm64: WARN on injected undef exceptions
` [PATCH v13 32/48] arm64: Don't expose stolen time for realm guests
` [PATCH v13 34/48] arm64: RMI: support RSI_HOST_CALL

[PATCH 0/2] x86/tdx: Port I/O emulation fixes
 2026-04-01  8:34 UTC  (8+ messages)
` [PATCH 1/2] x86/tdx: Fix off-by-one in port I/O handling
` [PATCH 2/2] x86/tdx: Fix zero-extension for 32-bit port I/O

[PATCH v7 00/22] Runtime TDX module update support
 2026-04-01  8:27 UTC  (33+ messages)
` [PATCH v7 01/22] x86/virt/tdx: Move low level SEAMCALL helpers out of <asm/tdx.h>
` [PATCH v7 02/22] coco/tdx-host: Introduce a "tdx_host" device
` [PATCH v7 03/22] coco/tdx-host: Expose TDX module version
` [PATCH v7 04/22] x86/virt/seamldr: Introduce a wrapper for P-SEAMLDR SEAMCALLs
` [PATCH v7 05/22] x86/virt/seamldr: Add a helper to retrieve P-SEAMLDR information
` [PATCH v7 06/22] coco/tdx-host: Expose P-SEAMLDR information via sysfs
` [PATCH v7 07/22] coco/tdx-host: Implement firmware upload sysfs ABI for TDX module updates
` [PATCH v7 08/22] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v7 09/22] x86/virt/seamldr: Introduce skeleton for TDX module updates
` [PATCH v7 10/22] x86/virt/seamldr: Abort updates if errors occurred midway
` [PATCH v7 11/22] x86/virt/seamldr: Shut down the current TDX module
` [PATCH v7 12/22] x86/virt/tdx: Reset software states during TDX module shutdown
` [PATCH v7 13/22] x86/virt/seamldr: Install a new TDX module
` [PATCH v7 14/22] x86/virt/seamldr: Do TDX per-CPU initialization after updates
` [PATCH v7 15/22] x86/virt/tdx: Restore TDX module state
` [PATCH v7 16/22] x86/virt/tdx: Update tdx_sysinfo and check features post-update
` [PATCH v7 17/22] x86/virt/tdx: Avoid updates during update-sensitive operations
` [PATCH v7 18/22] coco/tdx-host: Don't expose P-SEAMLDR features on CPUs with erratum
` [PATCH v7 19/22] x86/virt/tdx: Enable TDX module runtime updates
` [PATCH v7 20/22] coco/tdx-host: Document TDX module update compatibility criteria
` [PATCH v7 21/22] x86/virt/tdx: Document TDX module update
` [PATCH v7 22/22] x86/virt/seamldr: Log TDX module update failures

[PATCH v2 00/16] fs,x86/resctrl: Add kernel-mode (e.g., PLZA) support to the resctrl subsystem
 2026-03-31 22:24 UTC  (6+ messages)

[PATCH v6 00/22] Runtime TDX module update support
 2026-03-31 12:22 UTC  (23+ messages)
` [PATCH v6 01/22] x86/virt/tdx: Move low level SEAMCALL helpers out of <asm/tdx.h>
` [PATCH v6 02/22] coco/tdx-host: Introduce a "tdx_host" device
` [PATCH v6 03/22] coco/tdx-host: Expose TDX module version
` [PATCH v6 04/22] x86/virt/seamldr: Introduce a wrapper for P-SEAMLDR SEAMCALLs
` [PATCH v6 05/22] x86/virt/seamldr: Add a helper to retrieve P-SEAMLDR information
` [PATCH v6 06/22] coco/tdx-host: Expose P-SEAMLDR information via sysfs
` [PATCH v6 08/22] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v6 10/22] x86/virt/seamldr: Abort updates if errors occurred midway
` [PATCH v6 13/22] x86/virt/seamldr: Install a new TDX module
` [PATCH v6 17/22] x86/virt/tdx: Avoid updates during update-sensitive operations

[PATCH v2 19/31] iommu/vt-d: Reserve the MSB domain ID bit for the TDX module
 2026-03-31  7:20 UTC  (4+ messages)

[PATCH v2 0/7] Add RMPOPT support
 2026-03-31  4:45 UTC  (8+ messages)
` [PATCH v2 5/7] KVM: guest_memfd: Add cleanup interface for guest teardown

[BUG] x86/tdx: handle_in()/handle_out() use one-bit-too-wide GENMASK for port I/O
 2026-03-30 22:33 UTC 

[PATCH v3 0/6] Add RMPOPT support
 2026-03-30 22:25 UTC 

[PATCH v2 00/19] PCI/TSM: TEE I/O infrastructure
 2026-03-30 11:49 UTC  (10+ messages)
` [PATCH v2 09/19] PCI/TSM: Support creating encrypted MMIO descriptors via TDISP Report

[GIT PULL] Confidential Computing: Attestation fixes for 7.0-rc6
 2026-03-27 23:32 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox