messages from 2022-11-09 20:54:37 to 2022-11-21 16:40:27 UTC [more...]
[Patch v3 00/14] Add PCI pass-thru support to Hyper-V Confidential VMs
2022-11-21 16:40 UTC (37+ messages)
` [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
` [Patch v3 02/14] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
` [Patch v3 03/14] x86/hyperv: Reorder code in prep for subsequent patch
` [Patch v3 04/14] Drivers: hv: Explicitly request decrypted in vmap_pfn() calls
` [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
` [Patch v3 06/14] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
` [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
` [Patch v3 08/14] swiotlb: Remove bounce buffer remapping for Hyper-V
` [Patch v3 09/14] Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages
` [Patch v3 10/14] Drivers: hv: vmbus: Remove second way of mapping ring buffers
` [Patch v3 11/14] hv_netvsc: Remove second mapping of send and recv buffers
` [Patch v3 12/14] Drivers: hv: Don't remap addresses that are above shared_gpa_boundary
` [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
` [Patch v3 14/14] PCI: hv: Enable PCI pass-thru devices in Confidential VMs
[PATCH] asm-generic/io: Add _RET_IP_ to MMIO trace for more accurate debug info
2022-11-21 15:53 UTC (4+ messages)
[PATCH v3 00/37] Shadow stacks for userspace
2022-11-21 15:52 UTC (54+ messages)
` [PATCH v3 13/37] mm: Move VM_UFFD_MINOR_BIT from 37 to 38
` [PATCH v3 15/37] x86/mm: Check Shadow Stack page fault errors
` [PATCH v3 18/37] mm: Add guard pages around a shadow stack
` [PATCH v3 20/37] mm/mprotect: Exclude shadow stack from preserve_write
` [PATCH v3 24/37] x86: Introduce userspace API for CET enabling
` [PATCH v3 25/37] x86/shstk: Add user-mode shadow stack support
` [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
` [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
` [PATCH v3 36/37] x86/cet/shstk: Add ARCH_CET_UNLOCK
[RFC PATCH V2 00/18] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
2022-11-21 15:05 UTC (20+ messages)
` [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
` [RFC PATCH V2 02/18] x86/hyperv: Add sev-snp enlightened guest specific config
` [RFC PATCH V2 03/18] x86/hyperv: apic change for sev-snp enlightened guest
` [RFC PATCH V2 04/18] x86/hyperv: Decrypt hv vp assist page in "
` [RFC PATCH V2 05/18] x86/hyperv: Get Virtual Trust Level via hvcall
` [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
` [RFC PATCH V2 07/18] clocksource: hyper-v: decrypt hyperv tsc page "
` [RFC PATCH V2 08/18] x86/hyperv: decrypt vmbus pages for "
` [RFC PATCH V2 09/18] x86/hyperv: set target vtl in the vmbus init message
` [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
` [RFC PATCH V2 11/18] Drivers: hv: vmbus: Decrypt vmbus ring buffer
` [RFC PATCH V2 12/18] x86/hyperv: Initialize cpu and memory for sev-snp enlightened guest
` [RFC PATCH V2 13/18] x86/hyperv: Add smp support for sev-snp guest
` [RFC PATCH V2 14/18] x86/hyperv: Add hyperv-specific hadling for VMMCALL under SEV-ES
` [RFC PATCH V2 15/18] x86/sev: Add a #HV exception handler
` [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
` [RFC PATCH V2 17/18] x86/sev: optimize system vector processing invoked from #HV exception
` [RFC PATCH V2 18/18] x86/sev: Fix interrupt exit code paths "
[PATCH 0/2] riscv: stacktrace: A fixup and an optimization
2022-11-21 11:49 UTC (4+ messages)
` [PATCH 2/2] riscv: stacktrace: Make walk_stackframe cross pt_regs frame
[PATCH v2] tools/memory-model: Use "grep -E" instead of "egrep"
2022-11-21 3:25 UTC
[PATCH] tools/memory-model: Use "grep -E" instead of "egrep"
2022-11-21 3:02 UTC (3+ messages)
[PATCH AUTOSEL 6.0 13/44] clocksource/drivers/hyperv: add data structure for reference TSC MSR
2022-11-19 5:37 UTC (2+ messages)
[PATCH AUTOSEL 5.15 09/27] clocksource/drivers/hyperv: add data structure for reference TSC MSR
2022-11-19 2:13 UTC
[PATCH v2 0/5] Add support running nested Microsoft Hypervisor
2022-11-19 1:39 UTC (13+ messages)
` [PATCH v4 "
` [PATCH v4 1/5] x86/hyperv: Add support for detecting nested hypervisor
` [PATCH v4 2/5] Drivers: hv: Setup synic registers in case of nested root partition
` [PATCH v4 3/5] x86/hyperv: Add an interface to do nested hypercalls
` [PATCH v4 4/5] Drivers: hv: Enable vmbus driver for nested root partition
` [PATCH v4 5/5] x86/hyperv: Change interrupt vector "
[PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
2022-11-18 15:59 UTC (44+ messages)
` [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
` [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
` [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
` [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
` [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
Syzkaller found a bug: KASAN: null-ptr-deref Write in prepare_to_wait
2022-11-17 23:52 UTC
[PATCH v9 7/8] KVM: Handle page fault for private memory
2022-11-17 13:25 UTC (4+ messages)
[PATCH 00/15] kbuild: various cleanups
2022-11-17 11:08 UTC (4+ messages)
` [PATCH 05/15] kbuild: build init/built-in.a just once
[PATCH v3 0/5] Add support running nested Microsoft Hypervisor
2022-11-17 4:04 UTC (6+ messages)
` [PATCH v3 2/5] Drivers: hv: Setup synic registers in case of nested root partition
[PATCH v2 00/12] Drivers: hv: Add PCI pass-thru support to Hyper-V Confidential VMs
2022-11-16 16:38 UTC (27+ messages)
` [PATCH v2 01/12] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
` [PATCH v2 02/12] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
` [PATCH v2 03/12] x86/hyperv: Reorder code in prep for subsequent patch
` [PATCH v2 04/12] Drivers: hv: Explicitly request decrypted in vmap_pfn() calls
` [PATCH v2 05/12] x86/hyperv: Change vTOM handling to use standard coco mechanisms
` [PATCH v2 06/12] swiotlb: Remove bounce buffer remapping for Hyper-V
` [PATCH v2 07/12] Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages
` [PATCH v2 08/12] Drivers: hv: vmbus: Remove second way of mapping ring buffers
` [PATCH v2 09/12] hv_netvsc: Remove second mapping of send and recv buffers
` [PATCH v2 10/12] Drivers: hv: Don't remap addresses that are above shared_gpa_boundary
` [PATCH v2 11/12] PCI: hv: Add hypercalls to read/write MMIO space
` [PATCH v2 12/12] PCI: hv: Enable PCI pass-thru devices in Confidential VMs
[PATCH v2 00/44] cpuidle,rcu: Clean up the mess
2022-11-16 15:29 UTC (4+ messages)
` [PATCH v2 12/44] cpuidle,dt: Push RCU-idle into driver
[PATCH V14 0/4] mm/sparse-vmemmap: Generalise helpers and enable for LoongArch
2022-11-14 20:09 UTC (3+ messages)
[RFC PATCH 00/17] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
2022-11-14 1:28 UTC (12+ messages)
` [RFC PATCH 01/17] x86/boot: Check boot param's cc_blob_address for direct boot mode
` [RFC PATCH 12/17] Drivers: hv: vmbus: Decrypt vmbus ring buffer
` [RFC PATCH 14/17] x86/hyperv: Add smp support for sev-snp guest
` [RFC PATCH 15/17] x86/hyperv: Add hyperv-specific hadling for VMMCALL under SEV-ES
` [RFC PATCH 16/17] x86/sev: Add a #HV exception handler
` [RFC PATCH 17/17] x86/sev: Initialize #HV doorbell and handle interrupt requests
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).