Linux Arch
[Prev Page][Next Page]
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [GIT PULL, v2] asm-generic bits for 6.2
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH] cputime: remove cputime_to_nsecs fallback
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [RFC][PATCH 03/12] cyrpto/b128ops: Remove struct u128
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC][PATCH 02/12] crypto/ghash-clmulni: Use (struct) be128
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/3] crypto: x86/ghash - use le128 instead of u128
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/3] crypto: x86/ghash - add comment and fix broken link
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/3] crypto: x86/ghash - fix unaligned access in ghash_setkey()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/3] crypto: x86/ghash cleanups
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC][PATCH 01/12] crypto: Remove u128 usage
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC][PATCH 01/12] crypto: Remove u128 usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC][PATCH 01/12] crypto: Remove u128 usage
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] asm-generic bits for 6.2
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] asm-generic bits for 6.2
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [RFC][PATCH 05/12] arch: Introduce arch_{,try_}_cmpxchg128{,_local}()
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [RFC][PATCH 01/12] crypto: Remove u128 usage
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFC][PATCH 01/12] crypto: Remove u128 usage
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 09/12] x86,amd_iommu: Replace cmpxchg_double()
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [RFC][PATCH 01/12] crypto: Remove u128 usage
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [RFC][PATCH 07/12] percpu: Wire up cmpxchg128
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 12/12] arch: Remove cmpxchg_double
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 11/12] slub: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 05/12] arch: Introduce arch_{,try_}_cmpxchg128{,_local}()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 01/12] crypto: Remove u128 usage
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 03/12] cyrpto/b128ops: Remove struct u128
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 08/12] s390: Replace cmpxchg_double() with cmpxchg128()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 10/12] x86,intel_iommu: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 06/12] instrumentation: Wire up cmpxchg128()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 09/12] x86,amd_iommu: Replace cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 02/12] crypto/ghash-clmulni: Use (struct) be128
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 00/12] Introduce cmpxchg128() -- aka. the demise of cmpxchg_double()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC][PATCH 04/12] types: Introduce [us]128
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [GIT PULL] csky changes for v6.2-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [GIT PULL] LoongArch changes for v6.2
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] LoongArch changes for v6.2
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [GIT PULL] csky changes for v6.2-rc1
- BUG: arm64: missing build-id from vmlinux
- From: Dennis Gilmore <dennis@xxxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] m68k: string: Make char intermediate in strcmp() signed
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH] m68k: string: Make char intermediate in strcmp() signed
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v4 33/39] x86: Prevent 32 bit operations for 64 bit shstk tasks
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC PATCH] Syscall tracing on PPC64_ELF_ABI_V1 without KALLSYMS_ALL
- From: Michael Jeanson <mjeanson@xxxxxxxxxxxx>
- RE: [RFC PATCH V2 11/18] Drivers: hv: vmbus: Decrypt vmbus ring buffer
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 09/18] x86/hyperv: set target vtl in the vmbus init message
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V2 07/18] clocksource: hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v9 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- RE: [RFC PATCH V2 08/18] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH] riscv: Fixup compile error with !MMU
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH] riscv: Fixup compile error with !MMU
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- RE: [RFC PATCH V2 07/18] clocksource: hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v3] riscv: Use PUD/P4D/PGD pages for the linear mapping
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [RFC PATCH V2 04/18] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH] Documentation: raise minimum supported version of binutils to 2.25
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [RFC PATCH V2 02/18] x86/hyperv: Add sev-snp enlightened guest specific config
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v2] riscv: Use PUD/P4D/PGD pages for the linear mapping
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [RFC PATCH V2 18/18] x86/sev: Fix interrupt exit code paths from #HV exception
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [RFC PATCH] Syscall tracing on PPC64_ELF_ABI_V1 without KALLSYMS_ALL
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3] riscv: Use PUD/P4D/PGD pages for the linear mapping
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- RE: [RFC PATCH V2 05/18] x86/hyperv: Get Virtual Trust Level via hvcall
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 04/18] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 6/6] Drivers: hv: vmbus: Support TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH v2 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 03/18] x86/hyperv: apic change for sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 02/18] x86/hyperv: Add sev-snp enlightened guest specific config
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v2] riscv: Use PUD/P4D/PGD pages for the linear mapping
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- RE: [PATCH v2 6/6] Drivers: hv: vmbus: Support TDX guests
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH v2] riscv: Use PUD/P4D/PGD pages for the linear mapping
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [PATCH -next V11 0/7] riscv: Add GENERIC_ENTRY support
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH v10 8/9] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH -next V11 0/7] riscv: Add GENERIC_ENTRY support
- From: Björn Töpel <bjorn@xxxxxxxxxx>
- Re: [PATCH v2 3/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- RE: [PATCH v2 0/6] Support TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 24/24] xtensa: Remove empty <uapi/asm/setup.h>
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 21/24] s390: Remove empty <uapi/asm/setup.h>
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 23/24] x86: Remove empty <uapi/asm/setup.h>
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 19/24] parisc: Remove empty <uapi/asm/setup.h>
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 17/24] microblaze: Remove empty <uapi/asm/setup.h>
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 18/24] mips: Remove empty <uapi/asm/setup.h>
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 22/24] sparc: Remove empty <uapi/asm/setup.h>
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 15/24] arm64: Remove empty <uapi/asm/setup.h>
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 20/24] powerpc: Remove empty <uapi/asm/setup.h>
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 16/24] m68k: Remove empty <uapi/asm/setup.h>
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 14/24] arc: Remove empty <uapi/asm/setup.h>
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 13/24] alpha: Remove empty <uapi/asm/setup.h>
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 08/24] parisc: Remove COMMAND_LINE_SIZE from uapi
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 12/24] asm-generic: Remove COMMAND_LINE_SIZE from uapi
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 11/24] xtensa: Remove COMMAND_LINE_SIZE from uapi
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 09/24] powerpc: Remove COMMAND_LINE_SIZE from uapi
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 10/24] sparc: Remove COMMAND_LINE_SIZE from uapi
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 07/24] mips: Remove COMMAND_LINE_SIZE from uapi
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 06/24] microblaze: Remove COMMAND_LINE_SIZE from uapi
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 05/24] m68k: Remove COMMAND_LINE_SIZE from uapi
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 04/24] ia64: Remove COMMAND_LINE_SIZE from uapi
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 02/24] arm: Remove COMMAND_LINE_SIZE from uapi
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 03/24] arm64: Remove COMMAND_LINE_SIZE from uapi
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 01/24] alpha: Remove COMMAND_LINE_SIZE from uapi
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH v2 00/24] Remove COMMAND_LINE_SIZE from uapi
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- [PATCH -next V11 6/7] riscv: entry: Consolidate ret_from_kernel_thread into ret_from_fork
- [PATCH -next V11 5/7] riscv: entry: Remove extra level wrappers of trace_hardirqs_{on,off}
- [PATCH -next V11 7/7] riscv: entry: Consolidate general regs saving/restoring
- [PATCH -next V11 4/7] riscv: entry: Convert to generic entry
- [PATCH -next V11 3/7] riscv: entry: Add noinstr to prevent instrumentation inserted
- [PATCH -next V11 2/7] riscv: ptrace: Remove duplicate operation
- [PATCH -next V11 1/7] compiler_types.h: Add __noinstr_section() for noinstr
- [PATCH -next V11 0/7] riscv: Add GENERIC_ENTRY support
- Re: [PATCH -next V10 04/10] riscv: entry: Convert to generic entry
- From: Björn Töpel <bjorn@xxxxxxxxxx>
- Re: [PATCH -next V10 04/10] riscv: entry: Convert to generic entry
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH -next V10 09/10] riscv: stack: Support HAVE_SOFTIRQ_ON_OWN_STACK
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH v8 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v8 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v4 37/39] x86: Add PTRACE interface for shadow stack
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v4 37/39] x86: Add PTRACE interface for shadow stack
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v10 9/9] KVM: Enable and expose KVM_MEM_PRIVATE
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v10 8/9] KVM: Handle page fault for private memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH -next V10 09/10] riscv: stack: Support HAVE_SOFTIRQ_ON_OWN_STACK
- From: Björn Töpel <bjorn@xxxxxxxxxx>
- Re: [PATCH v10 5/9] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 8/9] KVM: Handle page fault for private memory
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- [PATCH v8 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH -next V10 10/10] riscv: stack: Add config of thread stack size
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH -next V10 09/10] riscv: stack: Support HAVE_SOFTIRQ_ON_OWN_STACK
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH -next V10 08/10] riscv: stack: Support HAVE_IRQ_EXIT_ON_IRQ_STACK
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH -next V10 06/10] riscv: entry: Consolidate ret_from_kernel_thread into ret_from_fork
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH -next V10 05/10] riscv: entry: Remove extra level wrappers of trace_hardirqs_{on,off}
- From: Guo Ren <guoren@xxxxxxxxxx>
- RE: [PATCH v2 4/6] x86/tdx: Expand __tdx_hypercall() to handle more arguments
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] x86/tdx: Expand __tdx_hypercall() to handle more arguments
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] x86/tdx: Expand __tdx_hypercall() to handle more arguments
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH v2 1/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [GIT PULL] LoongArch fixes for v6.1-final
- From: pr-tracker-bot@xxxxxxxxxx
- RE: [PATCH v2 4/6] x86/tdx: Expand __tdx_hypercall() to handle more arguments
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH] iopoll: Call cpu_relax() in busy loops
- From: Geert Uytterhoeven <geert+renesas@xxxxxxxxx>
- Re: [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [GIT PULL] LoongArch fixes for v6.1-final
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 8/9] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 7/9] KVM: Update lpage info when private/shared memory are mixed
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 03/39] x86/cpufeatures: Add CPU feature flags for shadow stacks
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH -next V10 10/10] riscv: stack: Add config of thread stack size
- From: Björn Töpel <bjorn@xxxxxxxxxx>
- Re: [PATCH -next V10 08/10] riscv: stack: Support HAVE_IRQ_EXIT_ON_IRQ_STACK
- From: Björn Töpel <bjorn@xxxxxxxxxx>
- Re: [PATCH -next V10 09/10] riscv: stack: Support HAVE_SOFTIRQ_ON_OWN_STACK
- From: Björn Töpel <bjorn@xxxxxxxxxx>
- Re: [PATCH -next V10 06/10] riscv: entry: Consolidate ret_from_kernel_thread into ret_from_fork
- From: Björn Töpel <bjorn@xxxxxxxxxx>
- Re: [PATCH -next V10 05/10] riscv: entry: Remove extra level wrappers of trace_hardirqs_{on,off}
- From: Björn Töpel <bjorn@xxxxxxxxxx>
- Re: [PATCH -next V10 04/10] riscv: entry: Convert to generic entry
- From: Björn Töpel <bjorn@xxxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH 0/3] bitmap: optimize small_const path for
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH -next V10 10/10] riscv: stack: Add config of thread stack size
- [PATCH -next V10 03/10] riscv: entry: Add noinstr to prevent instrumentation inserted
- [PATCH -next V10 04/10] riscv: entry: Convert to generic entry
- [PATCH -next V10 06/10] riscv: entry: Consolidate ret_from_kernel_thread into ret_from_fork
- [PATCH -next V10 09/10] riscv: stack: Support HAVE_SOFTIRQ_ON_OWN_STACK
- [PATCH -next V10 05/10] riscv: entry: Remove extra level wrappers of trace_hardirqs_{on,off}
- [PATCH -next V10 07/10] riscv: entry: Consolidate general regs saving/restoring
- [PATCH -next V10 08/10] riscv: stack: Support HAVE_IRQ_EXIT_ON_IRQ_STACK
- [PATCH -next V10 02/10] riscv: ptrace: Remove duplicate operation
- [PATCH -next V10 01/10] compiler_types.h: Add __noinstr_section() for noinstr
- [PATCH -next V10 00/10] riscv: Add GENERIC_ENTRY support and related features
- Re: [PATCH v10 8/9] KVM: Handle page fault for private memory
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 03/39] x86/cpufeatures: Add CPU feature flags for shadow stacks
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [linux-next:master] [mm] 5df397dec7: will-it-scale.per_thread_ops -53.3% regression
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] x86/tdx: Expand __tdx_hypercall() to handle more arguments
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [linux-next:master] [mm] 5df397dec7: will-it-scale.per_thread_ops -53.3% regression
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 04/39] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v10 5/9] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 4/9] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH] riscv: Fixup compile error with !MMU
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 04/39] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 03/39] x86/cpufeatures: Add CPU feature flags for shadow stacks
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] riscv: Fixup compile error with !MMU
- From: Conor Dooley <conor@xxxxxxxxxx>
- [PATCH] riscv: Fixup compile error with !MMU
- Re: [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 7/9] KVM: Update lpage info when private/shared memory are mixed
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v10 5/9] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [linux-next:master] [mm] 5df397dec7: will-it-scale.per_thread_ops -53.3% regression
- From: Hugh Dickins <hughd@xxxxxxxxxx>
- Re: [linux-next:master] [mm] 5df397dec7: will-it-scale.per_thread_ops -53.3% regression
- From: "Huang, Ying" <ying.huang@xxxxxxxxx>
- Re: [linux-next:master] [mm] 5df397dec7: will-it-scale.per_thread_ops -53.3% regression
- From: Yujie Liu <yujie.liu@xxxxxxxxx>
- [PATCH v2 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 6/6] Drivers: hv: vmbus: Support TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 4/6] x86/tdx: Expand __tdx_hypercall() to handle more arguments
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 2/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 3/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 0/6] Support TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 1/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [Patch v4 05/13] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- RE: [Patch v4 05/13] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v4 01/13] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v4 05/13] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [Patch v4 01/13] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [Patch v4 01/13] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [linux-next:master] [mm] 5df397dec7: will-it-scale.per_thread_ops -53.3% regression
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [linux-next:master] [mm] 5df397dec7: will-it-scale.per_thread_ops -53.3% regression
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 2/2] mm/ptshare: Create a new mm for shared pagetables and add basic page table sharing support
- From: Khalid Aziz <khalid@xxxxxxxxxxxxxx>
- [RFC PATCH 0/2] Add support for sharing page tables across processes (Previously mshare)
- From: Khalid Aziz <khalid@xxxxxxxxxxxxxx>
- [RFC PATCH 1/2] mm/ptshare: Add vm flag for shared PTE
- From: Khalid Aziz <khalid@xxxxxxxxxxxxxx>
- Re: [PATCH v10 5/9] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v10 4/9] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v3 3/4] include/asm-generic/io.h: remove performing pointer arithmetic on a null pointer
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Fabiano Rosas <farosas@xxxxxxx>
- [PATCH] x86/boot: Check if the input parameter (buffer) of the function is a null pointer
- From: Liam Ni <zhiguangni01@xxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v10 7/9] KVM: Update lpage info when private/shared memory are mixed
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 5/9] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH -next V8 00/14] riscv: Add GENERIC_ENTRY support and related features
- From: Björn Töpel <bjorn@xxxxxxxxxx>
- Re: [PATCH -next V8 06/14] riscv: convert to generic entry
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH -next V8 00/14] riscv: Add GENERIC_ENTRY support and related features
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH v3 3/4] include/asm-generic/io.h: remove performing pointer arithmetic on a null pointer
- From: Song Chen <chensong_2000@xxxxxx>
- Re: [PATCH -next V8 04/14] riscv: ptrace: Remove duplicate operation
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH -next V8 02/14] riscv: elf_kexec: Fixup compile warning
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH 2/2] riscv: stacktrace: Make walk_stackframe cross pt_regs frame
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH 0/2] riscv: stacktrace: A fixup and an optimization
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH 0/2] riscv: stacktrace: A fixup and an optimization
- From: Palmer Dabbelt <palmer@xxxxxxxxxxxx>
- Re: [PATCH 2/2] riscv: stacktrace: Make walk_stackframe cross pt_regs frame
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [linux-next:master] [mm] 5df397dec7: will-it-scale.per_thread_ops -53.3% regression
- From: "Huang, Ying" <ying.huang@xxxxxxxxx>
- Re: [PATCH v10 7/9] KVM: Update lpage info when private/shared memory are mixed
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v4 30/39] x86/shstk: Introduce map_shadow_stack syscall
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH RFC v2 3/3] riscv: hw-breakpoints: add more trigger controls
- From: Andrew Bresticker <abrestic@xxxxxxxxxxxx>
- Re: [PATCH v4 01/39] Documentation/x86: Add CET shadow stack description
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [linux-next:master] [mm] 5df397dec7: will-it-scale.per_thread_ops -53.3% regression
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 3/3] riscv: hw-breakpoints: add more trigger controls
- From: Sergey Matyukevich <geomatsi@xxxxxxxxx>
- Re: [PATCH RFC v2 3/3] riscv: hw-breakpoints: add more trigger controls
- From: Andrew Bresticker <abrestic@xxxxxxxxxxxx>
- Re: [PATCH -next V8 06/14] riscv: convert to generic entry
- From: Björn Töpel <bjorn@xxxxxxxxxx>
- Re: [PATCH v3 3/4] include/asm-generic/io.h: remove performing pointer arithmetic on a null pointer
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH -next V8 00/14] riscv: Add GENERIC_ENTRY support and related features
- From: Björn Töpel <bjorn@xxxxxxxxxx>
- Re: [PATCH -next V8 04/14] riscv: ptrace: Remove duplicate operation
- From: Björn Töpel <bjorn@xxxxxxxxxx>
- Re: [PATCH v10 5/9] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH -next V8 10/14] riscv: Typo fixup for addi -> andi in comment
- From: Björn Töpel <bjorn@xxxxxxxxxx>
- Re: [PATCH -next V8 03/14] riscv: compat_syscall_table: Fixup compile warning
- From: Björn Töpel <bjorn@xxxxxxxxxx>
- Re: [PATCH -next V8 02/14] riscv: elf_kexec: Fixup compile warning
- From: Björn Töpel <bjorn@xxxxxxxxxx>
- Re: [PATCH -next V8 01/14] compiler_types.h: Add __noinstr_section() for noinstr
- From: Björn Töpel <bjorn@xxxxxxxxxx>
- Re: [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [PATCH v3 4/4] kernel/trace: remove calling regs_* when compiling HEXAGON
- From: Song Chen <chensong_2000@xxxxxx>
- [PATCH v3 2/4] kernel/trace: Provide default impelentations defined in trace_probe_tmpl.h
- From: Song Chen <chensong_2000@xxxxxx>
- [PATCH v3 1/4] kernel/trace: Introduce trace_probe_print_args and use it in *probes
- From: Song Chen <chensong_2000@xxxxxx>
- [PATCH v3 3/4] include/asm-generic/io.h: remove performing pointer arithmetic on a null pointer
- From: Song Chen <chensong_2000@xxxxxx>
- [PATCH v3 0/4] reorganize trace_peobe_tmpl.h
- From: Song Chen <chensong_2000@xxxxxx>
- Re: [PATCH RFC v2 1/3] riscv: add support for hardware breakpoints/watchpoints
- From: Sergey Matyukevich <geomatsi@xxxxxxxxx>
- Re: [PATCH RFC v2 1/3] riscv: add support for hardware breakpoints/watchpoints
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH v4 33/39] x86: Prevent 32 bit operations for 64 bit shstk tasks
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v4 33/39] x86: Prevent 32 bit operations for 64 bit shstk tasks
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH RFC v2 3/3] riscv: hw-breakpoints: add more trigger controls
- From: Sergey Matyukevich <geomatsi@xxxxxxxxx>
- [PATCH RFC v2 2/3] riscv: ptrace: expose hardware breakpoints to debuggers
- From: Sergey Matyukevich <geomatsi@xxxxxxxxx>
- [PATCH RFC v2 1/3] riscv: add support for hardware breakpoints/watchpoints
- From: Sergey Matyukevich <geomatsi@xxxxxxxxx>
- [PATCH RFC v2 0/3] riscv: support for hardware breakpoints/watchpoints
- From: Sergey Matyukevich <geomatsi@xxxxxxxxx>
- Re: [PATCH v4 01/39] Documentation/x86: Add CET shadow stack description
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v4 39/39] x86/shstk: Add ARCH_SHSTK_STATUS
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 38/39] x86/shstk: Add ARCH_SHSTK_UNLOCK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 37/39] x86: Add PTRACE interface for shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 32/39] x86: Expose thread features in /proc/$PID/status
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 31/39] x86/shstk: Support wrss for userspace
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 30/39] x86/shstk: Introduce map_shadow_stack syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 29/39] x86/shstk: Handle signals for shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 28/39] x86/shstk: Introduce routines modifying shstk
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 27/39] x86/shstk: Handle thread shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 26/39] x86/shstk: Add user-mode shadow stack support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 25/39] x86: Introduce userspace API for shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 24/39] mm: Warn on shadow stack memory in wrong vma
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 23/39] mm: Don't allow write GUPs to shadow stack memory
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 21/39] mm/mprotect: Exclude shadow stack from preserve_write
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 20/39] mm/mmap: Add shadow stack pages to memory accounting
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 18/39] mm: Fixup places that call pte_mkwrite() directly
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 17/39] x86/mm: Update maybe_mkwrite() for shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 15/39] mm: Introduce VM_SHADOW_STACK for shadow stack memory
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 13/39] x86/mm: Start actually marking _PAGE_COW
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 12/39] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 11/39] x86/mm: Update pte_modify for _PAGE_COW
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 10/39] x86/mm: Introduce _PAGE_COW
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 08/39] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 07/39] x86: Add user control-protection fault handler
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 06/39] x86/fpu: Add helper for modifying xstate
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 05/39] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 04/39] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 03/39] x86/cpufeatures: Add CPU feature flags for shadow stacks
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 02/39] x86/shstk: Add Kconfig option for Shadow Stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 01/39] Documentation/x86: Add CET shadow stack description
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 35/39] selftests/x86: Add shadow stack test
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 34/39] x86/shstk: Wire in shadow stack interface
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 39/39] x86/shstk: Add ARCH_SHSTK_STATUS
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 37/39] x86: Add PTRACE interface for shadow stack
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 36/39] x86/fpu: Add helper for initing features
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 38/39] x86/shstk: Add ARCH_SHSTK_UNLOCK
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 30/39] x86/shstk: Introduce map_shadow_stack syscall
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 28/39] x86/shstk: Introduce routines modifying shstk
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 31/39] x86/shstk: Support wrss for userspace
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 32/39] x86: Expose thread features in /proc/$PID/status
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 29/39] x86/shstk: Handle signals for shadow stack
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 26/39] x86/shstk: Add user-mode shadow stack support
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 33/39] x86: Prevent 32 bit operations for 64 bit shstk tasks
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 27/39] x86/shstk: Handle thread shadow stack
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 25/39] x86: Introduce userspace API for shadow stack
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 24/39] mm: Warn on shadow stack memory in wrong vma
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 23/39] mm: Don't allow write GUPs to shadow stack memory
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 19/39] mm: Add guard pages around a shadow stack.
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 20/39] mm/mmap: Add shadow stack pages to memory accounting
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 22/39] mm: Re-introduce vm_flags to do_mmap()
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 21/39] mm/mprotect: Exclude shadow stack from preserve_write
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 14/39] mm: Move VM_UFFD_MINOR_BIT from 37 to 38
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 16/39] x86/mm: Check Shadow Stack page fault errors
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 15/39] mm: Introduce VM_SHADOW_STACK for shadow stack memory
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 18/39] mm: Fixup places that call pte_mkwrite() directly
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 17/39] x86/mm: Update maybe_mkwrite() for shadow stack
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 12/39] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 13/39] x86/mm: Start actually marking _PAGE_COW
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 11/39] x86/mm: Update pte_modify for _PAGE_COW
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 04/39] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 08/39] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 09/39] x86/mm: Move pmd_write(), pud_write() up in the file
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 06/39] x86/fpu: Add helper for modifying xstate
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 05/39] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 07/39] x86: Add user control-protection fault handler
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 10/39] x86/mm: Introduce _PAGE_COW
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 03/39] x86/cpufeatures: Add CPU feature flags for shadow stacks
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 01/39] Documentation/x86: Add CET shadow stack description
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 02/39] x86/shstk: Add Kconfig option for Shadow Stack
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 00/39] Shadow stacks for userspace
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: "'Kirill A. Shutemov'" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH V2] selftests/vDSO: Add riscv getcpu & gettimeofday test
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- RE: [PATCH v7 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Kirill A . Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v7 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v10 9/9] KVM: Enable and expose KVM_MEM_PRIVATE
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v10 8/9] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v10 7/9] KVM: Update lpage info when private/shared memory are mixed
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v10 4/9] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v10 5/9] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v10 2/9] KVM: Introduce per-page memory attributes
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v10 0/9] KVM: mm: fd-based approach for supporting KVM
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [arnd-asm-generic:asm-generic] BUILD SUCCESS 32975c491ee410598b33201344c123fcc81a7c33
- From: kernel test robot <lkp@xxxxxxxxx>
- RE: [PATCH v7 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [Patch v4 13/13] PCI: hv: Enable PCI pass-thru devices in Confidential VMs
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 10/13] hv_netvsc: Remove second mapping of send and recv buffers
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 12/13] PCI: hv: Add hypercalls to read/write MMIO space
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 11/13] Drivers: hv: Don't remap addresses that are above shared_gpa_boundary
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 08/13] Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 09/13] Drivers: hv: vmbus: Remove second way of mapping ring buffers
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 07/13] swiotlb: Remove bounce buffer remapping for Hyper-V
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 05/13] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 06/13] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 04/13] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 03/13] Drivers: hv: Explicitly request decrypted in vmap_pfn() calls
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 02/13] x86/hyperv: Reorder code in prep for subsequent patch
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 01/13] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 00/13] Add PCI pass-thru support to Hyper-V Confidential VMs
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH resend] uapi: Add missing _UAPI prefix to <asm-generic/types.h> include guard
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH v7 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH -next V9 12/14] riscv: remove extra level wrappers of trace_hardirqs_{on,off}
- [PATCH -next V9 10/14] riscv: Typo fixup for addi -> andi in comment
- [PATCH -next V9 13/14] riscv: consolidate ret_from_kernel_thread into ret_from_fork
- [PATCH -next V9 14/14] riscv: entry: consolidate general regs saving/restoring
- [PATCH -next V9 09/14] riscv: Add config of thread stack size
- [PATCH -next V9 11/14] riscv: Add support for STACKLEAK gcc plugin
- [PATCH -next V9 07/14] riscv: Support HAVE_IRQ_EXIT_ON_IRQ_STACK
- [PATCH -next V9 08/14] riscv: Support HAVE_SOFTIRQ_ON_OWN_STACK
- [PATCH -next V9 06/14] riscv: convert to generic entry
- [PATCH -next V9 05/14] riscv: traps: Add noinstr to prevent instrumentation inserted
- [PATCH -next V9 01/14] compiler_types.h: Add __noinstr_section() for noinstr
- [PATCH -next V9 00/14] riscv: Add GENERIC_ENTRY support and related features
- [PATCH -next V9 04/14] riscv: ptrace: Remove duplicate operation
- [PATCH -next V9 03/14] riscv: compat_syscall_table: Fixup compile warning
- [PATCH -next V9 02/14] riscv: elf_kexec: Fixup compile warning
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH] Documentation: Fixed a typo in atomic_t.txt
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 3/3] compiler: inline does not imply notrace
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 3/3] compiler: inline does not imply notrace
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH V2 2/3] LoongArch: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK
- From: John Paul Adrian Glaubitz <glaubitz@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH V2 3/3] SH: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK
- From: Huacai Chen <chenhuacai@xxxxxxxxx>
- Re: [PATCH V2 2/3] LoongArch: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK
- From: Huacai Chen <chenhuacai@xxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH] Documentation: Fixed a typo in atomic_t.txt
- From: Kushagra Verma <kushagra765@xxxxxxxxxxx>
- Re: [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] powerpc/book3e: remove #include <generated/utsrelease.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 3/3] compiler: inline does not imply notrace
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH 3/3] compiler: inline does not imply notrace
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH V14 0/4] mm/sparse-vmemmap: Generalise helpers and enable for LoongArch
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH 3/3] compiler: inline does not imply notrace
- From: Nadav Amit <namit@xxxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH V14 0/4] mm/sparse-vmemmap: Generalise helpers and enable for LoongArch
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH v6 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [PATCH v4 1/1] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH v4 1/1] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH V2 3/3] SH: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH V2 3/3] SH: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK
- From: Huacai Chen <chenhuacai@xxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- RE: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH -next V8 06/14] riscv: convert to generic entry
- From: Guo Ren <guoren@xxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] powerpc/book3e: remove #include <generated/utsrelease.h>
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- RE: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH -next V8 06/14] riscv: convert to generic entry
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: [PATCH V14 0/4] mm/sparse-vmemmap: Generalise helpers and enable for LoongArch
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- [arnd-asm-generic:syscall-tbl] BUILD REGRESSION 9a44a4401f3517a2475158925110f06179accabe
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 2/3] powerpc/book3e: remove #include <generated/utsrelease.h>
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 2/3] powerpc/book3e: remove #include <generated/utsrelease.h>
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] powerpc/book3e: remove #include <generated/utsrelease.h>
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 6.0 13/44] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v4 1/1] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Christophe de Dinechin <dinechin@xxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [GIT PULL] LoongArch fixes for v6.1-rc7
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH AUTOSEL 6.0 13/44] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [GIT PULL] LoongArch fixes for v6.1-rc7
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [linux-next:master] [asm] 5e5ff73c2e: Initramfs_unpacking_failed
- From: kernel test robot <yujie.liu@xxxxxxxxx>
- [PATCH v6 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 4/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH resend] uapi: Add missing _UAPI prefix to <asm-generic/types.h> include guard
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH -next V8 00/14] riscv: Add GENERIC_ENTRY support and related features
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- RE: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- RE: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- [arnd-asm-generic:asm-generic] BUILD SUCCESS 5e5ff73c2e5863f93fc5fd78d178cd8f2af12464
- From: kernel test robot <lkp@xxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH] riscv: Use PUD/P4D/PGD pages for the linear mapping
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 3/3] compiler: inline does not imply notrace
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH 3/3] compiler: inline does not imply notrace
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH 3/3] compiler: inline does not imply notrace
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH 3/3] compiler: inline does not imply notrace
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- [PATCH 2/3] lib/usercopy: Allow traceing of usercopy, xarray, iov_iter
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- [PATCH 1/3] kprobes: Mark descendents of core_kernel_text as notrace
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- [PATCH 0/3] kprobes: notrace enhancements
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH v4 1/1] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v2 12/44] cpuidle,dt: Push RCU-idle into driver
- From: Ulf Hansson <ulf.hansson@xxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH V2 3/3] riscv: ftrace: Reduce the detour code size to half
- From: Song Shuai <suagrfillet@xxxxxxxxx>
- [PATCH] riscv: Use PUD/P4D/PGD pages for the linear mapping
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [PATCH v2] tools/memory-model: Use "grep -E" instead of "egrep"
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 4/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH] asm-generic/io: Add _RET_IP_ to MMIO trace for more accurate debug info
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- RE: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 4/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH 6/6] Drivers: hv: vmbus: Support TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 4/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 0/6] Support TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [Patch v3 02/14] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [Patch v3 02/14] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH] asm-generic/io: Add _RET_IP_ to MMIO trace for more accurate debug info
- From: Sai Prakash Ranjan <quic_saipraka@xxxxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 06/14] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 02/14] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 2/2] riscv: stacktrace: Make walk_stackframe cross pt_regs frame
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH 2/2] riscv: stacktrace: Make walk_stackframe cross pt_regs frame
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v2] tools/memory-model: Use "grep -E" instead of "egrep"
- From: Tiezhu Yang <yangtiezhu@xxxxxxxxxxx>
- Re: [PATCH] tools/memory-model: Use "grep -E" instead of "egrep"
- From: Tiezhu Yang <yangtiezhu@xxxxxxxxxxx>
- Re: [PATCH] tools/memory-model: Use "grep -E" instead of "egrep"
- From: Akira Yokosawa <akiyks@xxxxxxxxx>
- RE: [PATCH AUTOSEL 6.0 13/44] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [RFC PATCH V2 13/18] x86/hyperv: Add smp support for sev-snp guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 15/18] x86/sev: Add a #HV exception handler
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 03/18] x86/hyperv: apic change for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 18/18] x86/sev: Fix interrupt exit code paths from #HV exception
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 07/18] clocksource: hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 08/18] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 14/18] x86/hyperv: Add hyperv-specific hadling for VMMCALL under SEV-ES
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 04/18] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 05/18] x86/hyperv: Get Virtual Trust Level via hvcall
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 02/18] x86/hyperv: Add sev-snp enlightened guest specific config
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 12/18] x86/hyperv: Initialize cpu and memory for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 17/18] x86/sev: optimize system vector processing invoked from #HV exception
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 09/18] x86/hyperv: set target vtl in the vmbus init message
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 11/18] Drivers: hv: vmbus: Decrypt vmbus ring buffer
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 00/18] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH AUTOSEL 5.15 09/27] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] tools/memory-model: Use "grep -E" instead of "egrep"
- From: Tiezhu Yang <yangtiezhu@xxxxxxxxxxx>
- [PATCH AUTOSEL 6.0 13/44] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v4 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: "Schimpe, Christina" <christina.schimpe@xxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- RE: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: "Schimpe, Christina" <christina.schimpe@xxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH v4 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v4 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v4 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v4 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v4 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- RE: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: Syzkaller found a bug: KASAN: null-ptr-deref Write in prepare_to_wait
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [Patch v3 02/14] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- RE: [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: Haiyang Zhang <haiyangz@xxxxxxxxxxxxx>
- Re: [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- RE: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: "Schimpe, Christina" <christina.schimpe@xxxxxxxxx>
- Re: [PATCH 05/15] kbuild: build init/built-in.a just once
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 05/15] kbuild: build init/built-in.a just once
- From: Jon Hunter <jonathanh@xxxxxxxxxx>
[Index of Archives]
[Kernel Announce]
[IETF Annouce]
[Netdev]
[Netfilter]
[Bugtraq]