Patch Series

Subject PCI/TSM: PCIe Link Encryption Establishment via TDX platform services
Author yilun.xu@linux.intel.com
Date 2026-03-27 16:01:02 +0000 UTC
Version
Cc baolu.lu@linux.intel.com chao.gao@intel.com dan.j.williams@intel.com dave.hansen@linux.intel.com dave.jiang@intel.com kas@kernel.org kvm@vger.kernel.org linux-coco@lists.linux.dev linux-kernel@vger.kernel.org linux-pci@vger.kernel.org rick.p.edgecombe@intel.com vishal.l.verma@intel.com x86@kernel.org xiaoyao.li@intel.com yilun.xu@intel.com yilun.xu@linux.intel.com zhenzhong.duan@intel.com

Patches (31)

Name Content [All]
[PATCH v2 01/31] x86/tdx: Move all TDX error defines into <asm/shared/tdx_errno.h> [Body]
[PATCH v2 02/31] x86/virt/tdx: Move bit definitions of TDX_FEATURES0 to public header [Body]
[PATCH v2 03/31] x86/virt/tdx: Add tdx_page_array helpers for new TDX Module objects [Body]
[PATCH v2 04/31] x86/virt/tdx: Support allocating contiguous pages for tdx_page_array [Body]
[PATCH v2 05/31] x86/virt/tdx: Extend tdx_page_array to support IOMMU_MT [Body]
[PATCH v2 06/31] x86/virt/tdx: Read global metadata for TDX Module Extensions/Connect [Body]
[PATCH v2 07/31] x86/virt/tdx: Embed version info in SEAMCALL leaf function definitions [Body]
[PATCH v2 08/31] x86/virt/tdx: Configure TDX Module with optional TDX Connect feature [Body]
[PATCH v2 09/31] x86/virt/tdx: Move tdx_clflush_page() up in the file [Body]
[PATCH v2 10/31] x86/virt/tdx: Add extra memory to TDX Module for Extensions [Body]
[PATCH v2 11/31] x86/virt/tdx: Make TDX Module initialize Extensions [Body]
[PATCH v2 12/31] x86/virt/tdx: Enable the Extensions after basic TDX Module init [Body]
[PATCH v2 13/31] x86/virt/tdx: Extend tdx_clflush_page() to handle compound pages [Body]
[PATCH v2 14/31] PCI/TSM: Report active IDE streams per host bridge [Body]
[PATCH v2 15/31] coco/tdx-host: Introduce a "tdx_host" device [Body]
[PATCH v2 16/31] coco/tdx-host: Support Link TSM for TDX host [Body]
[PATCH v2 17/31] acpi: Add KEYP support to fw_table parsing [Body]
[PATCH v2 18/31] iommu/vt-d: Cache max domain ID to avoid redundant calculation [Body]
[PATCH v2 19/31] iommu/vt-d: Reserve the MSB domain ID bit for the TDX module [Body]
[PATCH v2 20/31] x86/virt/tdx: Add a helper to loop on TDX_INTERRUPTED_RESUMABLE [Body]
[PATCH v2 21/31] x86/virt/tdx: Add SEAMCALL wrappers for trusted IOMMU setup and clear [Body]
[PATCH v2 22/31] iommu/vt-d: Export a helper to do function for each dmar_drhd_unit [Body]
[PATCH v2 23/31] coco/tdx-host: Setup all trusted IOMMUs on TDX Connect init [Body]
[PATCH v2 24/31] coco/tdx-host: Add a helper to exchange SPDM messages through DOE [Body]
[PATCH v2 25/31] x86/virt/tdx: Add SEAMCALL wrappers for SPDM management [Body]
[PATCH v2 26/31] mm: Add __free() support for __free_page() [Body]
[PATCH v2 27/31] coco/tdx-host: Implement SPDM session setup [Body]
[PATCH v2 28/31] coco/tdx-host: Parse ACPI KEYP table to init IDE for PCI host bridges [Body]
[PATCH v2 29/31] x86/virt/tdx: Add SEAMCALL wrappers for IDE stream management [Body]
[PATCH v2 30/31] coco/tdx-host: Implement IDE stream setup/teardown [Body]
[PATCH v2 31/31] coco/tdx-host: Finally enable SPDM session and IDE Establishment [Body]

Session 2026-03-27

ID (for dev) fd6b3d30-a1c6-44c3-8317-3722e824864c
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 11439c4635edd669ae435eec308f4ab8a0804808 [Config] passed [Log]
[KASAN] Boot test: Base 11439c4635edd669ae435eec308f4ab8a0804808 [Config] passed [Log]
[KASAN] Build Patched 11439c4635edd669ae435eec308f4ab8a0804808 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 11439c4635edd669ae435eec308f4ab8a0804808 [Config] [patched] passed [Log]
[KASAN] Fuzz 11439c4635edd669ae435eec308f4ab8a0804808 [Config] 11439c4635edd669ae435eec308f4ab8a0804808 [Config] [patched] passed [Log] [Artifacts]