linux-arch.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2022-11-07 18:20:35 to 2022-11-17 15:13:19 UTC [more...]

[PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
 2022-11-17 15:08 UTC  (51+ messages)
` [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
` [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
` [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
` [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
` [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
` [PATCH v9 6/8] KVM: Update lpage info when private/shared memory are mixed

[PATCH v3 00/37] Shadow stacks for userspace
 2022-11-17 14:17 UTC  (67+ messages)
` [PATCH v3 04/37] x86/cpufeatures: Enable CET CR4 bit for shadow stack
` [PATCH v3 13/37] mm: Move VM_UFFD_MINOR_BIT from 37 to 38
` [PATCH v3 15/37] x86/mm: Check Shadow Stack page fault errors
` [PATCH v3 18/37] mm: Add guard pages around a shadow stack
` [PATCH v3 20/37] mm/mprotect: Exclude shadow stack from preserve_write
` [PATCH v3 24/37] x86: Introduce userspace API for CET enabling
` [PATCH v3 25/37] x86/shstk: Add user-mode shadow stack support
` [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
` [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
` [PATCH v3 36/37] x86/cet/shstk: Add ARCH_CET_UNLOCK
` [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit

[PATCH v9 7/8] KVM: Handle page fault for private memory
 2022-11-17 13:25 UTC  (4+ messages)

[PATCH 00/15] kbuild: various cleanups
 2022-11-17 11:08 UTC  (4+ messages)
` [PATCH 05/15] kbuild: build init/built-in.a just once

[PATCH v3 0/5] Add support running nested Microsoft Hypervisor
 2022-11-17  4:04 UTC  (6+ messages)
  ` [PATCH v3 2/5] Drivers: hv: Setup synic registers in case of nested root partition

[PATCH v2 0/5] Add support running nested Microsoft Hypervisor
 2022-11-17  3:27 UTC  (7+ messages)
` [PATCH v4 "
  ` [PATCH v4 1/5] x86/hyperv: Add support for detecting nested hypervisor
  ` [PATCH v4 2/5] Drivers: hv: Setup synic registers in case of nested root partition
  ` [PATCH v4 3/5] x86/hyperv: Add an interface to do nested hypercalls
  ` [PATCH v4 4/5] Drivers: hv: Enable vmbus driver for nested root partition
  ` [PATCH v4 5/5] x86/hyperv: Change interrupt vector "

[Patch v3 00/14] Add PCI pass-thru support to Hyper-V Confidential VMs
 2022-11-17  2:59 UTC  (19+ messages)
` [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
` [Patch v3 02/14] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
` [Patch v3 03/14] x86/hyperv: Reorder code in prep for subsequent patch
` [Patch v3 04/14] Drivers: hv: Explicitly request decrypted in vmap_pfn() calls
` [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
` [Patch v3 06/14] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
` [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
` [Patch v3 08/14] swiotlb: Remove bounce buffer remapping for Hyper-V
` [Patch v3 09/14] Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages
` [Patch v3 10/14] Drivers: hv: vmbus: Remove second way of mapping ring buffers
` [Patch v3 11/14] hv_netvsc: Remove second mapping of send and recv buffers
` [Patch v3 12/14] Drivers: hv: Don't remap addresses that are above shared_gpa_boundary
` [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
` [Patch v3 14/14] PCI: hv: Enable PCI pass-thru devices in Confidential VMs

[PATCH v2 00/12] Drivers: hv: Add PCI pass-thru support to Hyper-V Confidential VMs
 2022-11-16 16:38 UTC  (27+ messages)
` [PATCH v2 01/12] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
` [PATCH v2 02/12] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
` [PATCH v2 03/12] x86/hyperv: Reorder code in prep for subsequent patch
` [PATCH v2 04/12] Drivers: hv: Explicitly request decrypted in vmap_pfn() calls
` [PATCH v2 05/12] x86/hyperv: Change vTOM handling to use standard coco mechanisms
` [PATCH v2 06/12] swiotlb: Remove bounce buffer remapping for Hyper-V
` [PATCH v2 07/12] Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages
` [PATCH v2 08/12] Drivers: hv: vmbus: Remove second way of mapping ring buffers
` [PATCH v2 09/12] hv_netvsc: Remove second mapping of send and recv buffers
` [PATCH v2 10/12] Drivers: hv: Don't remap addresses that are above shared_gpa_boundary
` [PATCH v2 11/12] PCI: hv: Add hypercalls to read/write MMIO space
` [PATCH v2 12/12] PCI: hv: Enable PCI pass-thru devices in Confidential VMs

[PATCH v2 00/44] cpuidle,rcu: Clean up the mess
 2022-11-16 15:29 UTC  (4+ messages)
` [PATCH v2 12/44] cpuidle,dt: Push RCU-idle into driver

[PATCH V14 0/4] mm/sparse-vmemmap: Generalise helpers and enable for LoongArch
 2022-11-14 20:09 UTC  (3+ messages)

[RFC PATCH 00/17] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
 2022-11-14  1:28 UTC  (23+ messages)
` [RFC PATCH 01/17] x86/boot: Check boot param's cc_blob_address for direct boot mode
` [RFC PATCH 02/17] x86/sev: Pvalidate memory gab for decompressing kernel
` [RFC PATCH 03/17] x86/hyperv: Add sev-snp enlightened guest specific config
` [RFC PATCH 04/17] x86/hyperv: apic change for sev-snp enlightened guest
` [RFC PATCH 05/17] x86/hyperv: Decrypt hv vp assist page in "
` [RFC PATCH 06/17] x86/hyperv: Get Virtual Trust Level via hvcall
` [RFC PATCH 07/17] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
` [RFC PATCH 08/17] clocksource: hyper-v: decrypt hyperv tsc page "
` [RFC PATCH 09/17] x86/hyperv: decrypt vmbus pages for "
` [RFC PATCH 10/17] x86/hyperv: set target vtl in the vmbus init message
` [RFC PATCH 11/17] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
` [RFC PATCH 12/17] Drivers: hv: vmbus: Decrypt vmbus ring buffer
` [RFC PATCH 13/17] x86/hyperv: Initialize cpu and memory for sev-snp enlightened guest
` [RFC PATCH 14/17] x86/hyperv: Add smp support for sev-snp guest
` [RFC PATCH 15/17] x86/hyperv: Add hyperv-specific hadling for VMMCALL under SEV-ES
` [RFC PATCH 16/17] x86/sev: Add a #HV exception handler
` [RFC PATCH 17/17] x86/sev: Initialize #HV doorbell and handle interrupt requests

[RFC PATCH 00/17] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
 2022-11-09 20:52 UTC 

io_ordering.rst vs. memory-barriers.txt
 2022-11-09  9:38 UTC  (3+ messages)

Słowa kluczowe do wypozycjonowania
 2022-11-08  8:50 UTC 

[PATCH 0/2] riscv: stacktrace: A fixup and an optimization
 2022-11-09  6:49 UTC  (3+ messages)
` [PATCH 1/2] riscv: stacktrace: Fixup ftrace_graph_ret_addr retp argument
` [PATCH 2/2] riscv: stacktrace: Make walk_stackframe cross pt_regs frame

[PATCH v12 10/17] riscv: Add sigcontext save/restore for vector
 2022-11-09  1:27 UTC 

[PATCH 00/12] Add PCI pass-thru support to Hyper-V Confidential VMs
 2022-11-09  1:09 UTC  (7+ messages)
` [PATCH 05/12] x86/hyperv: Change vTOM handling to use standard coco mechanisms
` [PATCH 09/12] hv_netvsc: Remove second mapping of send and recv buffers
` [PATCH 12/12] PCI: hv: Enable PCI pass-thru devices in Confidential VMs

mm: delay rmap removal until after TLB flush
 2022-11-08 20:18 UTC  (16+ messages)

[PATCH] vmlinux.lds.h: Fix placement of '.data..decrypted' section
 2022-11-08 18:00 UTC  (2+ messages)

vmlinux.lds.h: Bug report: unable to handle page fault when start the virtual machine with qemu
 2022-11-08 15:16 UTC  (6+ messages)

[PATCH bpf-next v2 0/5] execmem_alloc for BPF programs
 2022-11-08 11:48 UTC 

[RFC][PATCHSET] coredump unification for regset and non-regset architectures
 2022-11-08  9:41 UTC  (4+ messages)
` [PATCH 01/10] kill signal_pt_regs()
  ` [PATCH 07/10] [elf][non-regset] uninline elf_core_copy_task_fpregs() (and lose pt_regs argument)

[RFC PATCH v1] riscv: support for hardware breakpoints/watchpoints
 2022-11-07 20:52 UTC  (9+ messages)

[PATCH] arm64: remove special treatment for the link order of head.o
 2022-11-07 19:08 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).