Confidential Computing aims to provide users with an additional layer of protection by raising the standards above our traditional platforms. It will accomplish this by utilizing a combination of novel hardware and software features. Within the Arm architecture, this is the Arm Confidential Compute Architecture (CCA).
Making use of …
Linux kernel's use of Rust
The kernel makes use of and depends on unstable features. Do we know what those features are? Can we name something?
Rust for Linux - Miguel Ojeda, will share his view.
The PR for tracking unstable features.
Also, creating connections for certain subsystems like clk, …
For today's meeting we'd like to discuss dma-buf heaps and the interaction with secure enclaves and also virtualized environments. In short, this is a continuation of an email from me to the TSC in August last year (subject: "dma_buf heaps - unmapped heaps").
For more details, please see the Collaborate …