linux-arch.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2022-11-04 22:43:25 to 2022-11-16 18:43:29 UTC [more...]

[Patch v3 00/14] Add PCI pass-thru support to Hyper-V Confidential VMs
 2022-11-16 18:41 UTC  (5+ messages)
` [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
` [Patch v3 02/14] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
` [Patch v3 03/14] x86/hyperv: Reorder code in prep for subsequent patch
` [Patch v3 04/14] Drivers: hv: Explicitly request decrypted in vmap_pfn() calls

[PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
 2022-11-16 18:15 UTC  (43+ messages)
` [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
` [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
` [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
` [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
` [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
` [PATCH v9 6/8] KVM: Update lpage info when private/shared memory are mixed

[PATCH v2 00/12] Drivers: hv: Add PCI pass-thru support to Hyper-V Confidential VMs
 2022-11-16 16:38 UTC  (27+ messages)
` [PATCH v2 01/12] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
` [PATCH v2 02/12] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
` [PATCH v2 03/12] x86/hyperv: Reorder code in prep for subsequent patch
` [PATCH v2 04/12] Drivers: hv: Explicitly request decrypted in vmap_pfn() calls
` [PATCH v2 05/12] x86/hyperv: Change vTOM handling to use standard coco mechanisms
` [PATCH v2 06/12] swiotlb: Remove bounce buffer remapping for Hyper-V
` [PATCH v2 07/12] Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages
` [PATCH v2 08/12] Drivers: hv: vmbus: Remove second way of mapping ring buffers
` [PATCH v2 09/12] hv_netvsc: Remove second mapping of send and recv buffers
` [PATCH v2 10/12] Drivers: hv: Don't remap addresses that are above shared_gpa_boundary
` [PATCH v2 11/12] PCI: hv: Add hypercalls to read/write MMIO space
` [PATCH v2 12/12] PCI: hv: Enable PCI pass-thru devices in Confidential VMs

[PATCH v2 00/44] cpuidle,rcu: Clean up the mess
 2022-11-16 15:29 UTC  (4+ messages)
` [PATCH v2 12/44] cpuidle,dt: Push RCU-idle into driver

[PATCH v3 0/5] Add support running nested Microsoft Hypervisor
 2022-11-16 12:12 UTC  (5+ messages)
  ` [PATCH v3 2/5] Drivers: hv: Setup synic registers in case of nested root partition

[PATCH v3 00/37] Shadow stacks for userspace
 2022-11-16 10:18 UTC  (75+ messages)
` [PATCH v3 03/37] x86/cpufeatures: Add CPU feature flags for shadow stacks
` [PATCH v3 04/37] x86/cpufeatures: Enable CET CR4 bit for shadow stack
` [PATCH v3 13/37] mm: Move VM_UFFD_MINOR_BIT from 37 to 38
` [PATCH v3 15/37] x86/mm: Check Shadow Stack page fault errors
` [PATCH v3 18/37] mm: Add guard pages around a shadow stack
` [PATCH v3 20/37] mm/mprotect: Exclude shadow stack from preserve_write
` [PATCH v3 23/37] mm: Warn on shadow stack memory in wrong vma
` [PATCH v3 24/37] x86: Introduce userspace API for CET enabling
` [PATCH v3 25/37] x86/shstk: Add user-mode shadow stack support
` [PATCH v3 26/37] x86/shstk: Handle thread shadow stack
` [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
` [PATCH v3 28/37] x86/shstk: Handle signals for shadow stack
` [PATCH v3 29/37] x86/shstk: Introduce map_shadow_stack syscall
` [PATCH v3 30/37] x86/shstk: Support wrss for userspace
` [PATCH v3 31/37] x86: Expose thread features in /proc/$PID/status
` [PATCH v3 32/37] x86/cet/shstk: Wire in CET interface
` [PATCH v3 33/37] selftests/x86: Add shadow stack test
` [PATCH v3 34/37] x86/fpu: Add helper for initing features
` [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
` [PATCH v3 36/37] x86/cet/shstk: Add ARCH_CET_UNLOCK
` [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit

[PATCH V14 0/4] mm/sparse-vmemmap: Generalise helpers and enable for LoongArch
 2022-11-14 20:09 UTC  (3+ messages)

[RFC PATCH 00/17] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
 2022-11-14  1:28 UTC  (23+ messages)
` [RFC PATCH 01/17] x86/boot: Check boot param's cc_blob_address for direct boot mode
` [RFC PATCH 02/17] x86/sev: Pvalidate memory gab for decompressing kernel
` [RFC PATCH 03/17] x86/hyperv: Add sev-snp enlightened guest specific config
` [RFC PATCH 04/17] x86/hyperv: apic change for sev-snp enlightened guest
` [RFC PATCH 05/17] x86/hyperv: Decrypt hv vp assist page in "
` [RFC PATCH 06/17] x86/hyperv: Get Virtual Trust Level via hvcall
` [RFC PATCH 07/17] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
` [RFC PATCH 08/17] clocksource: hyper-v: decrypt hyperv tsc page "
` [RFC PATCH 09/17] x86/hyperv: decrypt vmbus pages for "
` [RFC PATCH 10/17] x86/hyperv: set target vtl in the vmbus init message
` [RFC PATCH 11/17] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
` [RFC PATCH 12/17] Drivers: hv: vmbus: Decrypt vmbus ring buffer
` [RFC PATCH 13/17] x86/hyperv: Initialize cpu and memory for sev-snp enlightened guest
` [RFC PATCH 14/17] x86/hyperv: Add smp support for sev-snp guest
` [RFC PATCH 15/17] x86/hyperv: Add hyperv-specific hadling for VMMCALL under SEV-ES
` [RFC PATCH 16/17] x86/sev: Add a #HV exception handler
` [RFC PATCH 17/17] x86/sev: Initialize #HV doorbell and handle interrupt requests

[RFC PATCH 00/17] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
 2022-11-09 20:52 UTC 

io_ordering.rst vs. memory-barriers.txt
 2022-11-09  9:38 UTC  (3+ messages)

Słowa kluczowe do wypozycjonowania
 2022-11-08  8:50 UTC 

[PATCH 0/2] riscv: stacktrace: A fixup and an optimization
 2022-11-09  6:49 UTC  (3+ messages)
` [PATCH 1/2] riscv: stacktrace: Fixup ftrace_graph_ret_addr retp argument
` [PATCH 2/2] riscv: stacktrace: Make walk_stackframe cross pt_regs frame

[PATCH v12 10/17] riscv: Add sigcontext save/restore for vector
 2022-11-09  1:27 UTC 

[PATCH 00/12] Add PCI pass-thru support to Hyper-V Confidential VMs
 2022-11-09  1:09 UTC  (7+ messages)
` [PATCH 05/12] x86/hyperv: Change vTOM handling to use standard coco mechanisms
` [PATCH 09/12] hv_netvsc: Remove second mapping of send and recv buffers
` [PATCH 12/12] PCI: hv: Enable PCI pass-thru devices in Confidential VMs

mm: delay rmap removal until after TLB flush
 2022-11-08 20:18 UTC  (18+ messages)

[PATCH] vmlinux.lds.h: Fix placement of '.data..decrypted' section
 2022-11-08 18:00 UTC  (2+ messages)

vmlinux.lds.h: Bug report: unable to handle page fault when start the virtual machine with qemu
 2022-11-08 15:16 UTC  (6+ messages)

[PATCH bpf-next v2 0/5] execmem_alloc for BPF programs
 2022-11-08 11:48 UTC 

[RFC][PATCHSET] coredump unification for regset and non-regset architectures
 2022-11-08  9:41 UTC  (4+ messages)
` [PATCH 01/10] kill signal_pt_regs()
  ` [PATCH 07/10] [elf][non-regset] uninline elf_core_copy_task_fpregs() (and lose pt_regs argument)

[RFC PATCH v1] riscv: support for hardware breakpoints/watchpoints
 2022-11-07 20:52 UTC  (9+ messages)

[PATCH] arm64: remove special treatment for the link order of head.o
 2022-11-07 19:08 UTC  (2+ messages)

[PATCH v6 00/44] Add KernelMemorySanitizer infrastructure
 2022-11-07 14:24 UTC  (4+ messages)
` [PATCH v6 06/44] kmsan: add ReST documentation
  ` [PATCH v6 6/44] "

[PATCH 0/5] powerpc/kprobes: preempt related changes and cleanups
 2022-11-07 11:24 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).