On Fri, Sep 29, 2017 at 05:44:24PM -0500, Brijesh Singh wrote:
> Part1 is based on tip/master and Part2 is based on kvm/master.
>
> With the current division, we should be able to compile and run part1
> and part2 independently. This patch defines X86_FEATURE_SEV which is
> currently been used by
On Fri, Sep 29, 2017 at 05:44:24PM -0500, Brijesh Singh wrote:
> Part1 is based on tip/master and Part2 is based on kvm/master.
>
> With the current division, we should be able to compile and run part1
> and part2 independently. This patch defines X86_FEATURE_SEV which is
> currently been used by
On 09/29/2017 07:19 AM, Borislav Petkov wrote:
...
This one was in the Part1 set, right? It landed here for whatever
reason...
Part1 is based on tip/master and Part2 is based on kvm/master.
With the current division, we should be able to compile and run part1
and part2 independently.
On 09/29/2017 07:19 AM, Borislav Petkov wrote:
...
This one was in the Part1 set, right? It landed here for whatever
reason...
Part1 is based on tip/master and Part2 is based on kvm/master.
With the current division, we should be able to compile and run part1
and part2 independently.
On Tue, Sep 19, 2017 at 03:46:00PM -0500, Brijesh Singh wrote:
> From: Tom Lendacky
>
> Update the CPU features to include identifying and reporting on the
> Secure Encrypted Virtualization (SEV) feature. SEV is identified by
> CPUID 0x801f, but requires BIOS
On Tue, Sep 19, 2017 at 03:46:00PM -0500, Brijesh Singh wrote:
> From: Tom Lendacky
>
> Update the CPU features to include identifying and reporting on the
> Secure Encrypted Virtualization (SEV) feature. SEV is identified by
> CPUID 0x801f, but requires BIOS support to enable it (set bit
From: Tom Lendacky
Update the CPU features to include identifying and reporting on the
Secure Encrypted Virtualization (SEV) feature. SEV is identified by
CPUID 0x801f, but requires BIOS support to enable it (set bit 23 of
MSR_K8_SYSCFG and set bit 0 of
From: Tom Lendacky
Update the CPU features to include identifying and reporting on the
Secure Encrypted Virtualization (SEV) feature. SEV is identified by
CPUID 0x801f, but requires BIOS support to enable it (set bit 23 of
MSR_K8_SYSCFG and set bit 0 of MSR_K7_HWCR). Only show the SEV
8 matches
Mail list logo