Linux Arch
[Prev Page][Next Page]
- [PATCH v10 5/9] KVM: Use gfn instead of hva for mmu_notifier_retry, (continued)
- [arnd-asm-generic:asm-generic] BUILD SUCCESS 32975c491ee410598b33201344c123fcc81a7c33, kernel test robot
- [Patch v4 00/13] Add PCI pass-thru support to Hyper-V Confidential VMs,
Michael Kelley
- [Patch v4 01/13] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute, Michael Kelley
- [Patch v4 02/13] x86/hyperv: Reorder code in prep for subsequent patch, Michael Kelley
- [Patch v4 03/13] Drivers: hv: Explicitly request decrypted in vmap_pfn() calls, Michael Kelley
- [Patch v4 04/13] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently, Michael Kelley
- [Patch v4 06/13] x86/hyperv: Change vTOM handling to use standard coco mechanisms, Michael Kelley
- [Patch v4 05/13] init: Call mem_encrypt_init() after Hyper-V hypercall init is done, Michael Kelley
- [Patch v4 07/13] swiotlb: Remove bounce buffer remapping for Hyper-V, Michael Kelley
- [Patch v4 09/13] Drivers: hv: vmbus: Remove second way of mapping ring buffers, Michael Kelley
- [Patch v4 08/13] Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages, Michael Kelley
- [Patch v4 11/13] Drivers: hv: Don't remap addresses that are above shared_gpa_boundary, Michael Kelley
- [Patch v4 12/13] PCI: hv: Add hypercalls to read/write MMIO space, Michael Kelley
- [Patch v4 10/13] hv_netvsc: Remove second mapping of send and recv buffers, Michael Kelley
- [Patch v4 13/13] PCI: hv: Enable PCI pass-thru devices in Confidential VMs, Michael Kelley
- Re: [Patch v4 00/13] Add PCI pass-thru support to Hyper-V Confidential VMs, Borislav Petkov
- [PATCH -next V9 00/14] riscv: Add GENERIC_ENTRY support and related features,
guoren
- [PATCH -next V9 02/14] riscv: elf_kexec: Fixup compile warning, guoren
- [PATCH -next V9 03/14] riscv: compat_syscall_table: Fixup compile warning, guoren
- [PATCH -next V9 04/14] riscv: ptrace: Remove duplicate operation, guoren
- [PATCH -next V9 01/14] compiler_types.h: Add __noinstr_section() for noinstr, guoren
- [PATCH -next V9 05/14] riscv: traps: Add noinstr to prevent instrumentation inserted, guoren
- [PATCH -next V9 06/14] riscv: convert to generic entry, guoren
- [PATCH -next V9 08/14] riscv: Support HAVE_SOFTIRQ_ON_OWN_STACK, guoren
- [PATCH -next V9 07/14] riscv: Support HAVE_IRQ_EXIT_ON_IRQ_STACK, guoren
- [PATCH -next V9 11/14] riscv: Add support for STACKLEAK gcc plugin, guoren
- [PATCH -next V9 09/14] riscv: Add config of thread stack size, guoren
- [PATCH -next V9 14/14] riscv: entry: consolidate general regs saving/restoring, guoren
- [PATCH -next V9 13/14] riscv: consolidate ret_from_kernel_thread into ret_from_fork, guoren
- [PATCH -next V9 10/14] riscv: Typo fixup for addi -> andi in comment, guoren
- [PATCH -next V9 12/14] riscv: remove extra level wrappers of trace_hardirqs_{on,off}, guoren
- [PATCH] Documentation: Fixed a typo in atomic_t.txt,
Kushagra Verma
- [arnd-asm-generic:syscall-tbl] BUILD REGRESSION 9a44a4401f3517a2475158925110f06179accabe, kernel test robot
- Re: [PATCH 2/3] powerpc/book3e: remove #include <generated/utsrelease.h>,
Christophe Leroy
- [GIT PULL] LoongArch fixes for v6.1-rc7,
Huacai Chen
- Re: [linux-next:master] [asm] 5e5ff73c2e: Initramfs_unpacking_failed, kernel test robot
- [PATCH resend] uapi: Add missing _UAPI prefix to <asm-generic/types.h> include guard,
Geert Uytterhoeven
- [arnd-asm-generic:asm-generic] BUILD SUCCESS 5e5ff73c2e5863f93fc5fd78d178cd8f2af12464, kernel test robot
- [PATCH 0/3] kprobes: notrace enhancements,
Nadav Amit
- [PATCH v4 1/1] x86/ioremap: Fix page aligned size calculation in __ioremap_caller(),
Michael Kelley
- [PATCH] riscv: Use PUD/P4D/PGD pages for the linear mapping,
Alexandre Ghiti
- [PATCH 0/6] Support TDX guests on Hyper-V,
Dexuan Cui
- [PATCH v2] tools/memory-model: Use "grep -E" instead of "egrep",
Tiezhu Yang
- [RFC PATCH V2 00/18] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv,
Tianyu Lan
- [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel, Tianyu Lan
- [RFC PATCH V2 11/18] Drivers: hv: vmbus: Decrypt vmbus ring buffer, Tianyu Lan
- [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest, Tianyu Lan
- [RFC PATCH V2 09/18] x86/hyperv: set target vtl in the vmbus init message, Tianyu Lan
- [RFC PATCH V2 17/18] x86/sev: optimize system vector processing invoked from #HV exception, Tianyu Lan
- [RFC PATCH V2 12/18] x86/hyperv: Initialize cpu and memory for sev-snp enlightened guest, Tianyu Lan
- [RFC PATCH V2 02/18] x86/hyperv: Add sev-snp enlightened guest specific config, Tianyu Lan
- [RFC PATCH V2 05/18] x86/hyperv: Get Virtual Trust Level via hvcall, Tianyu Lan
- [RFC PATCH V2 04/18] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest, Tianyu Lan
- [RFC PATCH V2 14/18] x86/hyperv: Add hyperv-specific hadling for VMMCALL under SEV-ES, Tianyu Lan
- [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest, Tianyu Lan
- [RFC PATCH V2 08/18] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest, Tianyu Lan
- [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests, Tianyu Lan
- [RFC PATCH V2 07/18] clocksource: hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest, Tianyu Lan
- [RFC PATCH V2 18/18] x86/sev: Fix interrupt exit code paths from #HV exception, Tianyu Lan
- [RFC PATCH V2 03/18] x86/hyperv: apic change for sev-snp enlightened guest, Tianyu Lan
- [RFC PATCH V2 15/18] x86/sev: Add a #HV exception handler, Tianyu Lan
- [RFC PATCH V2 13/18] x86/hyperv: Add smp support for sev-snp guest, Tianyu Lan
- [PATCH AUTOSEL 5.15 09/27] clocksource/drivers/hyperv: add data structure for reference TSC MSR, Sasha Levin
- [PATCH] tools/memory-model: Use "grep -E" instead of "egrep",
Tiezhu Yang
- [PATCH AUTOSEL 6.0 13/44] clocksource/drivers/hyperv: add data structure for reference TSC MSR,
Sasha Levin
- Re: Syzkaller found a bug: KASAN: null-ptr-deref Write in prepare_to_wait, Waiman Long
- [Patch v3 00/14] Add PCI pass-thru support to Hyper-V Confidential VMs,
Michael Kelley
- [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller(), Michael Kelley
- [Patch v3 02/14] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute, Michael Kelley
- [Patch v3 03/14] x86/hyperv: Reorder code in prep for subsequent patch, Michael Kelley
- [Patch v3 04/14] Drivers: hv: Explicitly request decrypted in vmap_pfn() calls, Michael Kelley
- [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently, Michael Kelley
- [Patch v3 06/14] init: Call mem_encrypt_init() after Hyper-V hypercall init is done, Michael Kelley
- [Patch v3 09/14] Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages, Michael Kelley
- [Patch v3 11/14] hv_netvsc: Remove second mapping of send and recv buffers, Michael Kelley
- [Patch v3 10/14] Drivers: hv: vmbus: Remove second way of mapping ring buffers, Michael Kelley
- [Patch v3 12/14] Drivers: hv: Don't remap addresses that are above shared_gpa_boundary, Michael Kelley
- [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space, Michael Kelley
- [Patch v3 14/14] PCI: hv: Enable PCI pass-thru devices in Confidential VMs, Michael Kelley
- [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms, Michael Kelley
- [Patch v3 08/14] swiotlb: Remove bounce buffer remapping for Hyper-V, Michael Kelley
- [PATCH v2 00/12] Drivers: hv: Add PCI pass-thru support to Hyper-V Confidential VMs,
Michael Kelley
- [PATCH v2 02/12] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute, Michael Kelley
- [PATCH v2 01/12] x86/ioremap: Fix page aligned size calculation in __ioremap_caller(), Michael Kelley
- [PATCH v2 03/12] x86/hyperv: Reorder code in prep for subsequent patch, Michael Kelley
- [PATCH v2 04/12] Drivers: hv: Explicitly request decrypted in vmap_pfn() calls, Michael Kelley
- [PATCH v2 06/12] swiotlb: Remove bounce buffer remapping for Hyper-V, Michael Kelley
- [PATCH v2 07/12] Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages, Michael Kelley
- [PATCH v2 05/12] x86/hyperv: Change vTOM handling to use standard coco mechanisms, Michael Kelley
- [PATCH v2 08/12] Drivers: hv: vmbus: Remove second way of mapping ring buffers, Michael Kelley
- [PATCH v2 09/12] hv_netvsc: Remove second mapping of send and recv buffers, Michael Kelley
- [PATCH v2 10/12] Drivers: hv: Don't remap addresses that are above shared_gpa_boundary, Michael Kelley
- [PATCH v2 11/12] PCI: hv: Add hypercalls to read/write MMIO space, Michael Kelley
- [PATCH v2 12/12] PCI: hv: Enable PCI pass-thru devices in Confidential VMs, Michael Kelley
- Re: [PATCH v2 00/12] Drivers: hv: Add PCI pass-thru support to Hyper-V Confidential VMs, Wei Liu
- [RFC PATCH 00/17] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv,
Tianyu Lan
- <Possible follow-ups>
- [RFC PATCH 00/17] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv, Tianyu Lan
- [RFC PATCH 01/17] x86/boot: Check boot param's cc_blob_address for direct boot mode, Tianyu Lan
- [RFC PATCH 02/17] x86/sev: Pvalidate memory gab for decompressing kernel, Tianyu Lan
- [RFC PATCH 07/17] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest, Tianyu Lan
- [RFC PATCH 05/17] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest, Tianyu Lan
- [RFC PATCH 08/17] clocksource: hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest, Tianyu Lan
- [RFC PATCH 06/17] x86/hyperv: Get Virtual Trust Level via hvcall, Tianyu Lan
- [RFC PATCH 09/17] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest, Tianyu Lan
- [RFC PATCH 11/17] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest, Tianyu Lan
- [RFC PATCH 04/17] x86/hyperv: apic change for sev-snp enlightened guest, Tianyu Lan
- [RFC PATCH 12/17] Drivers: hv: vmbus: Decrypt vmbus ring buffer, Tianyu Lan
- [RFC PATCH 13/17] x86/hyperv: Initialize cpu and memory for sev-snp enlightened guest, Tianyu Lan
- [RFC PATCH 10/17] x86/hyperv: set target vtl in the vmbus init message, Tianyu Lan
- [RFC PATCH 03/17] x86/hyperv: Add sev-snp enlightened guest specific config, Tianyu Lan
- [RFC PATCH 15/17] x86/hyperv: Add hyperv-specific hadling for VMMCALL under SEV-ES, Tianyu Lan
- [RFC PATCH 16/17] x86/sev: Add a #HV exception handler, Tianyu Lan
- [RFC PATCH 14/17] x86/hyperv: Add smp support for sev-snp guest, Tianyu Lan
- [RFC PATCH 17/17] x86/sev: Initialize #HV doorbell and handle interrupt requests, Tianyu Lan
- [PATCH 0/2] riscv: stacktrace: A fixup and an optimization,
guoren
- Re: [PATCH v12 10/17] riscv: Add sigcontext save/restore for vector, Vineet Gupta
- Re: io_ordering.rst vs. memory-barriers.txt,
Tony Battersby
- [PATCH] vmlinux.lds.h: Fix placement of '.data..decrypted' section,
Nathan Chancellor
- Re: [PATCH bpf-next v2 0/5] execmem_alloc for BPF programs, Mike Rapoport
- Re: [PATCH 0/5] powerpc/kprobes: preempt related changes and cleanups, Nicholas Piggin
- vmlinux.lds.h: Bug report: unable to handle page fault when start the virtual machine with qemu,
zhaowenhui (A)
- [PATCH v3 00/37] Shadow stacks for userspace,
Rick Edgecombe
- [PATCH v3 01/37] Documentation/x86: Add CET description, Rick Edgecombe
- [PATCH v3 03/37] x86/cpufeatures: Add CPU feature flags for shadow stacks, Rick Edgecombe
- [PATCH v3 02/37] x86/cet/shstk: Add Kconfig option for Shadow Stack, Rick Edgecombe
- [PATCH v3 08/37] x86/mm: Remove _PAGE_DIRTY from kernel RO pages, Rick Edgecombe
- [PATCH v3 06/37] x86/fpu: Add helper for modifying xstate, Rick Edgecombe
- [PATCH v3 07/37] x86/cet: Add user control-protection fault handler, Rick Edgecombe
- [PATCH v3 09/37] x86/mm: Move pmd_write(), pud_write() up in the file, Rick Edgecombe
- [PATCH v3 04/37] x86/cpufeatures: Enable CET CR4 bit for shadow stack, Rick Edgecombe
- [PATCH v3 05/37] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states, Rick Edgecombe
- [PATCH v3 10/37] x86/mm: Introduce _PAGE_COW, Rick Edgecombe
- [PATCH v3 11/37] x86/mm: Update pte_modify for _PAGE_COW, Rick Edgecombe
- [PATCH v3 12/37] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW, Rick Edgecombe
- [PATCH v3 14/37] mm: Introduce VM_SHADOW_STACK for shadow stack memory, Rick Edgecombe
- [PATCH v3 15/37] x86/mm: Check Shadow Stack page fault errors, Rick Edgecombe
- [PATCH v3 16/37] x86/mm: Update maybe_mkwrite() for shadow stack, Rick Edgecombe
- [PATCH v3 17/37] mm: Fixup places that call pte_mkwrite() directly, Rick Edgecombe
- [PATCH v3 13/37] mm: Move VM_UFFD_MINOR_BIT from 37 to 38, Rick Edgecombe
- [PATCH v3 18/37] mm: Add guard pages around a shadow stack., Rick Edgecombe
- [PATCH v3 19/37] mm/mmap: Add shadow stack pages to memory accounting, Rick Edgecombe
- [PATCH v3 20/37] mm/mprotect: Exclude shadow stack from preserve_write, Rick Edgecombe
- [PATCH v3 21/37] mm: Re-introduce vm_flags to do_mmap(), Rick Edgecombe
- [PATCH v3 22/37] mm: Don't allow write GUPs to shadow stack memory, Rick Edgecombe
- [PATCH v3 23/37] mm: Warn on shadow stack memory in wrong vma, Rick Edgecombe
- [PATCH v3 25/37] x86/shstk: Add user-mode shadow stack support, Rick Edgecombe
- [PATCH v3 24/37] x86: Introduce userspace API for CET enabling, Rick Edgecombe
- [PATCH v3 26/37] x86/shstk: Handle thread shadow stack, Rick Edgecombe
- [PATCH v3 28/37] x86/shstk: Handle signals for shadow stack, Rick Edgecombe
- [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk, Rick Edgecombe
- [PATCH v3 29/37] x86/shstk: Introduce map_shadow_stack syscall, Rick Edgecombe
- [PATCH v3 30/37] x86/shstk: Support wrss for userspace, Rick Edgecombe
- [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET, Rick Edgecombe
- [PATCH v3 34/37] x86/fpu: Add helper for initing features, Rick Edgecombe
- [PATCH v3 33/37] selftests/x86: Add shadow stack test, Rick Edgecombe
- [PATCH v3 32/37] x86/cet/shstk: Wire in CET interface, Rick Edgecombe
- [PATCH v3 31/37] x86: Expose thread features in /proc/$PID/status, Rick Edgecombe
- [PATCH v3 36/37] x86/cet/shstk: Add ARCH_CET_UNLOCK, Rick Edgecombe
- [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit, Rick Edgecombe
- [PATCH] mm: swap the definition of CONFIG_SPARSEMEM_VMEMMAP and CONFIG_SPARSEMEM,
zhijun.han
- [PATCH v3 0/5] Add support running nested Microsoft Hypervisor,
Jinank Jain
- [PATCH V2] selftests/vDSO: Add riscv getcpu & gettimeofday test,
guoren
- [PATCH -next V8 00/14] riscv: Add GENERIC_ENTRY support and related features,
guoren
- [PATCH -next V8 01/14] compiler_types.h: Add __noinstr_section() for noinstr, guoren
- [PATCH -next V8 02/14] riscv: elf_kexec: Fixup compile warning, guoren
- [PATCH -next V8 03/14] riscv: compat_syscall_table: Fixup compile warning, guoren
- [PATCH -next V8 04/14] riscv: ptrace: Remove duplicate operation, guoren
- [PATCH -next V8 05/14] riscv: traps: Add noinstr to prevent instrumentation inserted, guoren
- [PATCH -next V8 07/14] riscv: Support HAVE_IRQ_EXIT_ON_IRQ_STACK, guoren
- [PATCH -next V8 06/14] riscv: convert to generic entry, guoren
- [PATCH -next V8 08/14] riscv: Support HAVE_SOFTIRQ_ON_OWN_STACK, guoren
- [PATCH -next V8 09/14] riscv: Add config of thread stack size, guoren
- [PATCH -next V8 10/14] riscv: Typo fixup for addi -> andi in comment, guoren
- [PATCH -next V8 11/14] riscv: Add support for STACKLEAK gcc plugin, guoren
- [PATCH -next V8 13/14] riscv: consolidate ret_from_kernel_thread into ret_from_fork, guoren
- [PATCH -next V8 12/14] riscv: remove extra level wrappers of trace_hardirqs_{on,off}, guoren
- [PATCH -next V8 14/14] riscv: entry: consolidate general regs saving/restoring, guoren
- Re: [PATCH -next V8 00/14] riscv: Add GENERIC_ENTRY support and related features, Jisheng Zhang
- Re: [PATCH -next V8 00/14] riscv: Add GENERIC_ENTRY support and related features, Björn Töpel
- [linux-next:master] BUILD REGRESSION 61c3426aca2c71052ddcd06c32e29d92304990fd, kernel test robot
- [PATCH v2 0/5] Add support running nested Microsoft Hypervisor,
Jinank Jain
[Index of Archives]
[Kernel Announce]
[Kernel Newbies]
[Linux RAID]
[IETF Annouce]
[Security]
[Netdev]
[Linux Wireless]
[Netfilter]
[Bugtraq]