messages from 2026-04-24 06:57:36 to 2026-04-30 21:48:48 UTC [more...]
[PATCH v8 00/21] Runtime TDX module update support
2026-04-30 21:48 UTC (37+ messages)
` [PATCH v8 01/21] x86/virt/tdx: Move low level SEAMCALL helpers out of <asm/tdx.h>
` [PATCH v8 02/21] coco/tdx-host: Introduce a "tdx_host" device
` [PATCH v8 03/21] coco/tdx-host: Expose TDX module version
` [PATCH v8 04/21] x86/virt/seamldr: Introduce a wrapper for P-SEAMLDR SEAMCALLs
` [PATCH v8 05/21] x86/virt/seamldr: Add a helper to retrieve P-SEAMLDR information
` [PATCH v8 06/21] coco/tdx-host: Expose P-SEAMLDR information via sysfs
` [PATCH v8 07/21] coco/tdx-host: Implement firmware upload sysfs ABI for TDX module updates
` [PATCH v8 08/21] x86/virt/seamldr: Allocate and populate a module update request
` [PATCH v8 09/21] x86/virt/seamldr: Introduce skeleton for TDX module updates
` [PATCH v8 10/21] x86/virt/seamldr: Shut down the current TDX module
` [PATCH v8 11/21] x86/virt/tdx: Reset software states during TDX module shutdown
` [PATCH v8 12/21] x86/virt/seamldr: Install a new TDX module
` [PATCH v8 13/21] x86/virt/seamldr: Do TDX per-CPU initialization after module installation
` [PATCH v8 14/21] x86/virt/tdx: Restore TDX module state
` [PATCH v8 15/21] x86/virt/tdx: Refresh TDX module version after update
` [PATCH v8 16/21] x86/virt/tdx: Reject updates during concurrent TD build
` [PATCH v8 17/21] x86/virt/seamldr: Abort updates on failure
` [PATCH v8 18/21] coco/tdx-host: Don't expose P-SEAMLDR features on CPUs with erratum
` [PATCH v8 19/21] x86/virt/tdx: Enable TDX module runtime updates
` [PATCH v8 20/21] coco/tdx-host: Document TDX module update compatibility criteria
` [PATCH v8 21/21] x86/virt/tdx: Document TDX module update
[PATCH v2 0/4] struct page to PFN conversion for TDX guest private memory
2026-04-30 19:37 UTC (11+ messages)
` [PATCH v2 1/4] x86/tdx: Use PFN directly for mapping "
` [PATCH v2 2/4] x86/tdx: Use PFN directly for unmapping "
` [PATCH v2 3/4] x86/tdx: Drop exported function tdx_quirk_reset_page()
` [PATCH v2 4/4] x86/virt/tdx: Move mk_keyed_paddr() to tdx.c due to no external users
[Invitation] bi-weekly guest_memfd upstream call on 2026-04-30 (today!)
2026-04-30 10:47 UTC
[PATCH kernel 4/9] dma/swiotlb: Stop forcing SWIOTLB for TDISP devices
2026-04-30 3:25 UTC (12+ messages)
[PATCH RFC v5 00/53] guest_memfd: In-place conversion support
2026-04-29 23:51 UTC (64+ messages)
` [PATCH RFC v5 01/53] KVM: guest_memfd: Introduce per-gmem attributes, use to guard user mappings
` [PATCH RFC v5 02/53] KVM: Rename KVM_GENERIC_MEMORY_ATTRIBUTES to KVM_VM_MEMORY_ATTRIBUTES
` [PATCH RFC v5 03/53] KVM: Enumerate support for PRIVATE memory iff kvm_arch_has_private_mem is defined
` [PATCH RFC v5 04/53] KVM: Stub in ability to disable per-VM memory attribute tracking
` [PATCH RFC v5 05/53] KVM: guest_memfd: Wire up kvm_get_memory_attributes() to per-gmem attributes
` [PATCH RFC v5 06/53] KVM: x86/mmu: Bug the VM if gmem attributes are queried to determine max mapping level
` [PATCH RFC v5 07/53] KVM: guest_memfd: Update kvm_gmem_populate() to use gmem attributes
` [PATCH RFC v5 08/53] KVM: guest_memfd: Only prepare folios for private pages
` [PATCH RFC v5 09/53] KVM: Move kvm_supported_mem_attributes() to kvm_host.h
` [PATCH RFC v5 10/53] KVM: guest_memfd: Add basic support for KVM_SET_MEMORY_ATTRIBUTES2
` [PATCH RFC v5 11/53] KVM: guest_memfd: Ensure pages are not in use before conversion
` [PATCH RFC v5 12/53] KVM: guest_memfd: Call arch invalidate hooks on conversion
` [PATCH RFC v5 13/53] KVM: guest_memfd: Return early if range already has requested attributes
` [PATCH RFC v5 14/53] KVM: guest_memfd: Advertise KVM_SET_MEMORY_ATTRIBUTES2 ioctl
` [PATCH RFC v5 15/53] KVM: guest_memfd: Handle lru_add fbatch refcounts during conversion safety check
` [PATCH RFC v5 16/53] KVM: guest_memfd: Use actual size for invalidation in kvm_gmem_release()
` [PATCH RFC v5 17/53] KVM: guest_memfd: Determine invalidation filter from memory attributes
` [PATCH RFC v5 18/53] KVM: Move KVM_VM_MEMORY_ATTRIBUTES config definition to x86
` [PATCH RFC v5 19/53] KVM: Let userspace disable per-VM mem attributes, enable per-gmem attributes
` [PATCH RFC v5 20/53] KVM: guest_memfd: Enable INIT_SHARED on guest_memfd for x86 Coco VMs
` [PATCH RFC v5 21/53] KVM: guest_memfd: Introduce default handlers for content modes
` [PATCH RFC v5 22/53] KVM: guest_memfd: Apply content modes while setting memory attributes
` [PATCH RFC v5 23/53] KVM: x86: Support SW_PROTECTED_VM in applying content modes
` [PATCH RFC v5 24/53] KVM: SEV: Make 'uaddr' parameter optional for KVM_SEV_SNP_LAUNCH_UPDATE
` [PATCH RFC v5 25/53] KVM: TDX: Make source page optional for KVM_TDX_INIT_MEM_REGION
` [PATCH RFC v5 26/53] KVM: x86: Support SNP and TDX applying content modes
` [PATCH RFC v5 27/53] KVM: x86: Bug CoCo VM on page fault before finalizing
` [PATCH RFC v5 28/53] KVM: Add CAP to enumerate supported SET_MEMORY_ATTRIBUTES2 flags
` [PATCH RFC v5 29/53] KVM: selftests: Create gmem fd before "regular" fd when adding memslot
` [PATCH RFC v5 30/53] KVM: selftests: Rename guest_memfd{,_offset} to gmem_{fd,offset}
` [PATCH RFC v5 31/53] KVM: selftests: Add support for mmap() on guest_memfd in core library
` [PATCH RFC v5 32/53] KVM: selftests: Add selftests global for guest memory attributes capability
` [PATCH RFC v5 33/53] KVM: selftests: Add helpers for calling ioctls on guest_memfd
` [PATCH RFC v5 34/53] KVM: selftests: Test basic single-page conversion flow
` [PATCH RFC v5 35/53] KVM: selftests: Test conversion flow when INIT_SHARED
` [PATCH RFC v5 36/53] KVM: selftests: Test conversion precision in guest_memfd
` [PATCH RFC v5 37/53] KVM: selftests: Test conversion before allocation
` [PATCH RFC v5 38/53] KVM: selftests: Convert with allocated folios in different layouts
` [PATCH RFC v5 39/53] KVM: selftests: Test that truncation does not change shared/private status
` [PATCH RFC v5 40/53] KVM: selftests: Test that shared/private status is consistent across processes
` [PATCH RFC v5 41/53] KVM: selftests: Test conversion with elevated page refcount
` [PATCH RFC v5 42/53] KVM: selftests: Test that conversion to private does not support ZERO
` [PATCH RFC v5 43/53] KVM: selftests: Support checking that data not equal expected
` [PATCH RFC v5 44/53] KVM: selftests: Test that not specifying a conversion flag scrambles memory contents
` [PATCH RFC v5 45/53] KVM: selftests: Reset shared memory after hole-punching
` [PATCH RFC v5 46/53] KVM: selftests: Provide function to look up guest_memfd details from gpa
` [PATCH RFC v5 47/53] KVM: selftests: Provide common function to set memory attributes
` [PATCH RFC v5 48/53] KVM: selftests: Check fd/flags provided to mmap() when setting up memslot
` [PATCH RFC v5 49/53] KVM: selftests: Make TEST_EXPECT_SIGBUS thread-safe
` [PATCH RFC v5 50/53] KVM: selftests: Update private_mem_conversions_test to mmap() guest_memfd
` [PATCH RFC v5 51/53] KVM: selftests: Add script to exercise private_mem_conversions_test
` [PATCH RFC v5 52/53] KVM: selftests: Update pre-fault test to work with per-guest_memfd attributes
` [PATCH RFC v5 53/53] KVM: selftests: Update private memory exits test to work with per-gmem attributes
` [POC PATCH 0/6] guest_memfd in-place conversion selftests for SNP
` [POC PATCH 1/6] KVM: selftests: Initialize guest_memfd with INIT_SHARED
` [POC PATCH 2/6] KVM: selftests: Use guest_memfd memory contents in-place for SNP launch update
` [POC PATCH 3/6] KVM: selftests: Make guest_code_xsave more friendly
` [POC PATCH 4/6] KVM: selftests: Allow specifying CoCo-privateness while mapping a page
` [POC PATCH 5/6] KVM: selftests: Test conversions for SNP
` [POC PATCH 6/6] KVM: selftests: Test content modes ZERO and PRESERVE "
[PATCH v4 0/7] Add RMPOPT support
2026-04-29 23:07 UTC (2+ messages)
COCONUT-SVSM Development Release v2026.04-devel
2026-04-29 12:03 UTC
[PATCH v4 0/3] Enforce host page-size alignment for shared buffers
2026-04-29 9:03 UTC (17+ messages)
` [PATCH v4 1/3] dma-direct: swiotlb: handle swiotlb alloc/free outside __dma_direct_alloc_pages
` [PATCH v4 2/3] swiotlb: dma: its: Enforce host page-size alignment for shared buffers
` [PATCH v4 3/3] coco: guest: arm64: Query host IPA-change alignment via RHI
[PATCH v3 0/6] KVM: SEV: Add support for IBPB-on-Entry and BTB Isolation
2026-04-28 21:34 UTC (4+ messages)
` [PATCH v3 1/6] cpu/bugs: Allow forcing Automatic IBRS with SNP active using spectre_v2=eibrs
SVSM Development Call April 22, 2026
2026-04-28 17:27 UTC (2+ messages)
SVSM Development Call April 29, 2026
2026-04-28 16:11 UTC
[PATCH v2 0/2] x86/tdx: Port I/O emulation fixes
2026-04-28 12:56 UTC (3+ messages)
` [PATCH v2 1/2] x86/tdx: Fix off-by-one in port I/O handling
` [PATCH v2 2/2] x86/tdx: Fix zero-extension for 32-bit port I/O
[RFC PATCH v4 00/16] coco/TSM: Implement host-side support for Arm CCA TDISP setup
2026-04-27 8:53 UTC (17+ messages)
` [RFC PATCH v4 01/16] iommu/arm-smmu-v3: Discover RME support and realm IRQ topology
` [RFC PATCH v4 02/16] iommu/arm-smmu-v3: Save the programmed MSI message in msi_desc
` [RFC PATCH v4 03/16] iommu/arm-smmu-v3: Add initial pSMMU realm viommu plumbing
` [RFC PATCH v4 04/16] iommu/arm-smmu-v3: Track realm pSMMU users with refcount_t
` [RFC PATCH v4 05/16] coco: host: arm64: Add support for virtual device communication
` [RFC PATCH v4 06/16] coco: host: arm64: Add support for RMM vdev objects
` [RFC PATCH v4 07/16] coco: host: arm64: Add pdev stream key refresh and purge helpers
` [RFC PATCH v4 08/16] coco: host: arm64: Add helpers to unlock and destroy RMM vdev
` [RFC PATCH v4 09/16] coco: host: arm64: Add support for da object read RHI handling
` [RFC PATCH v4 10/16] coco: host: arm64: Add helper for cached object fetches
` [RFC PATCH v4 11/16] coco: host: arm64: Fetch interface report via RMI
` [RFC PATCH v4 12/16] coco: host: arm64: Fetch device measurements "
` [RFC PATCH v4 13/16] coco: host: KVM: arm64: Handle vdev validate-mapping exits
` [RFC PATCH v4 14/16] KVM: arm64: Unmap device mappings when a private granule is destroyed
` [RFC PATCH v4 15/16] coco: host: arm64: Transition vdevs to TDISP RUN state
` [RFC PATCH v4 16/16] KVM: arm64: CCA: enable DA in realm create parameters
[RFC PATCH v4 00/11] coco/TSM: Arm CCA guest TDISP lock/accept flow with verification and DMA enable
2026-04-27 8:28 UTC (12+ messages)
` [RFC PATCH v4 01/11] coco: guest: arm64: Guest TSM callback and realm device lock support
` [RFC PATCH v4 02/11] coco: guest: arm64: Fix a typo in the ARM_CCA_GUEST Kconfig help string ("and" -> "an")
` [RFC PATCH v4 03/11] coco: guest: arm64: Add Realm Host Interface and guest DA helper
` [RFC PATCH v4 04/11] coco: guest: arm64: Support guest-initiated TDI lock/unlock transitions
` [RFC PATCH v4 05/11] coco: guest: arm64: Refresh interface-report cache during device lock
` [RFC PATCH v4 06/11] coco: guest: arm64: Add measurement refresh via RHI_DA_VDEV_GET_MEASUREMENTS
` [RFC PATCH v4 07/11] coco: guest: arm64: Add guest APIs to read host-cached DA objects
` [RFC PATCH v4 08/11] coco: guest: arm64: Verify DA evidence with RSI_VDEV_GET_INFO digests
` [RFC PATCH v4 09/11] coco: guest: arm64: Hook TSM accept to Realm TDISP RUN transition
` [RFC PATCH v4 10/11] coco: arm64: dma: Update force_dma_unencrypted for accepted devices
` [RFC PATCH v4 11/11] coco: guest: arm64: Enable vdev DMA after attestation
[RFC PATCH v4 00/14] coco/TSM: Host-side Arm CCA IDE setup via connect/disconnect callbacks
2026-04-27 6:51 UTC (15+ messages)
` [RFC PATCH v4 01/14] coco: host: arm64: Add host TSM callback and IDE stream allocation support
` [RFC PATCH v4 02/14] coco: host: arm64: Create RMM pdev objects for PCI endpoints
` [RFC PATCH v4 03/14] coco: host: arm64: Add RMM device communication helpers
` [RFC PATCH v4 04/14] coco: host: arm64: Add helper to stop and tear down an RMM pdev
` [RFC PATCH v4 05/14] X.509: Make certificate parser public
` [RFC PATCH v4 06/14] X.509: Parse Subject Alternative Name in certificates
` [RFC PATCH v4 07/14] X.509: Move certificate length retrieval into new helper
` [RFC PATCH v4 08/14] coco: host: arm64: Register device public key with RMM
` [RFC PATCH v4 09/14] coco: host: arm64: Initialize RMM pdev state for TDISP IDE connect
` [RFC PATCH v4 10/14] coco: host: arm64: Coordinate peer stream waits during pdev communication
` [RFC PATCH v4 11/14] coco: host: arm64: Connect RMM pdev streams for IDE devices
` [RFC PATCH v4 12/14] coco: host: arm64: Refcount root-port pdevs used by IDE streams
` [RFC PATCH v4 13/14] PCI/TSM: Move CMA DOE mailbox discovery out of pci_tsm_pf0_constructor()
` [RFC PATCH v4 14/14] coco: host: arm64: Add NCOH_SYS stream support for RC endpoints
[PATCH v2 00/31] PCI/TSM: PCIe Link Encryption Establishment via TDX platform services
2026-04-27 3:54 UTC (33+ messages)
` [PATCH v2 10/31] x86/virt/tdx: Add extra memory to TDX Module for Extensions
` [PATCH v2 19/31] iommu/vt-d: Reserve the MSB domain ID bit for the TDX module
` [PATCH v2 20/31] x86/virt/tdx: Add a helper to loop on TDX_INTERRUPTED_RESUMABLE
` [PATCH v2 23/31] coco/tdx-host: Setup all trusted IOMMUs on TDX Connect init
` [PATCH v2 24/31] coco/tdx-host: Add a helper to exchange SPDM messages through DOE
` [PATCH v2 30/31] coco/tdx-host: Implement IDE stream setup/teardown
[GIT PULL] Trusted Security Manager (PCIe TSM) Update for 7.1
2026-04-26 19:35 UTC (3+ messages)
[PATCH v5 0/2] dma-buf: heaps: system: add an option to allocate explicitly shared/decrypted memory
2026-04-26 13:05 UTC (10+ messages)
` [PATCH v5 1/2] dma-mapping: introduce DMA_ATTR_CC_SHARED for shared memory
[PATCH v2 00/19] PCI/TSM: TEE I/O infrastructure
2026-04-24 10:15 UTC (5+ messages)
` [PATCH v2 08/19] PCI/TSM: Add "evidence" support
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox