Linux Arch
[Prev Page][Next Page]
- [PATCH v7 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH -next V9 12/14] riscv: remove extra level wrappers of trace_hardirqs_{on,off}
- [PATCH -next V9 10/14] riscv: Typo fixup for addi -> andi in comment
- [PATCH -next V9 13/14] riscv: consolidate ret_from_kernel_thread into ret_from_fork
- [PATCH -next V9 14/14] riscv: entry: consolidate general regs saving/restoring
- [PATCH -next V9 09/14] riscv: Add config of thread stack size
- [PATCH -next V9 11/14] riscv: Add support for STACKLEAK gcc plugin
- [PATCH -next V9 07/14] riscv: Support HAVE_IRQ_EXIT_ON_IRQ_STACK
- [PATCH -next V9 08/14] riscv: Support HAVE_SOFTIRQ_ON_OWN_STACK
- [PATCH -next V9 06/14] riscv: convert to generic entry
- [PATCH -next V9 05/14] riscv: traps: Add noinstr to prevent instrumentation inserted
- [PATCH -next V9 01/14] compiler_types.h: Add __noinstr_section() for noinstr
- [PATCH -next V9 00/14] riscv: Add GENERIC_ENTRY support and related features
- [PATCH -next V9 04/14] riscv: ptrace: Remove duplicate operation
- [PATCH -next V9 03/14] riscv: compat_syscall_table: Fixup compile warning
- [PATCH -next V9 02/14] riscv: elf_kexec: Fixup compile warning
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH] Documentation: Fixed a typo in atomic_t.txt
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 3/3] compiler: inline does not imply notrace
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 3/3] compiler: inline does not imply notrace
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH V2 2/3] LoongArch: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK
- From: John Paul Adrian Glaubitz <glaubitz@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH V2 3/3] SH: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK
- From: Huacai Chen <chenhuacai@xxxxxxxxx>
- Re: [PATCH V2 2/3] LoongArch: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK
- From: Huacai Chen <chenhuacai@xxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH] Documentation: Fixed a typo in atomic_t.txt
- From: Kushagra Verma <kushagra765@xxxxxxxxxxx>
- Re: [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] powerpc/book3e: remove #include <generated/utsrelease.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 3/3] compiler: inline does not imply notrace
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH 3/3] compiler: inline does not imply notrace
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH V14 0/4] mm/sparse-vmemmap: Generalise helpers and enable for LoongArch
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH 3/3] compiler: inline does not imply notrace
- From: Nadav Amit <namit@xxxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH V14 0/4] mm/sparse-vmemmap: Generalise helpers and enable for LoongArch
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH v6 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [PATCH v4 1/1] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH v4 1/1] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH V2 3/3] SH: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH V2 3/3] SH: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK
- From: Huacai Chen <chenhuacai@xxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- RE: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH -next V8 06/14] riscv: convert to generic entry
- From: Guo Ren <guoren@xxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] powerpc/book3e: remove #include <generated/utsrelease.h>
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- RE: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH -next V8 06/14] riscv: convert to generic entry
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: [PATCH V14 0/4] mm/sparse-vmemmap: Generalise helpers and enable for LoongArch
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- [arnd-asm-generic:syscall-tbl] BUILD REGRESSION 9a44a4401f3517a2475158925110f06179accabe
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 2/3] powerpc/book3e: remove #include <generated/utsrelease.h>
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 2/3] powerpc/book3e: remove #include <generated/utsrelease.h>
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH 2/3] powerpc/book3e: remove #include <generated/utsrelease.h>
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH AUTOSEL 6.0 13/44] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v4 1/1] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Christophe de Dinechin <dinechin@xxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [GIT PULL] LoongArch fixes for v6.1-rc7
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH AUTOSEL 6.0 13/44] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [GIT PULL] LoongArch fixes for v6.1-rc7
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [linux-next:master] [asm] 5e5ff73c2e: Initramfs_unpacking_failed
- From: kernel test robot <yujie.liu@xxxxxxxxx>
- [PATCH v6 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 4/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH resend] uapi: Add missing _UAPI prefix to <asm-generic/types.h> include guard
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH -next V8 00/14] riscv: Add GENERIC_ENTRY support and related features
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- RE: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- RE: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- [arnd-asm-generic:asm-generic] BUILD SUCCESS 5e5ff73c2e5863f93fc5fd78d178cd8f2af12464
- From: kernel test robot <lkp@xxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH] riscv: Use PUD/P4D/PGD pages for the linear mapping
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 3/3] compiler: inline does not imply notrace
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH 3/3] compiler: inline does not imply notrace
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH 3/3] compiler: inline does not imply notrace
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH 3/3] compiler: inline does not imply notrace
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- [PATCH 2/3] lib/usercopy: Allow traceing of usercopy, xarray, iov_iter
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- [PATCH 1/3] kprobes: Mark descendents of core_kernel_text as notrace
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- [PATCH 0/3] kprobes: notrace enhancements
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH v4 1/1] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v2 12/44] cpuidle,dt: Push RCU-idle into driver
- From: Ulf Hansson <ulf.hansson@xxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH V2 3/3] riscv: ftrace: Reduce the detour code size to half
- From: Song Shuai <suagrfillet@xxxxxxxxx>
- [PATCH] riscv: Use PUD/P4D/PGD pages for the linear mapping
- From: Alexandre Ghiti <alexghiti@xxxxxxxxxxxx>
- Re: [PATCH v2] tools/memory-model: Use "grep -E" instead of "egrep"
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 4/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH] asm-generic/io: Add _RET_IP_ to MMIO trace for more accurate debug info
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- RE: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 4/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH 6/6] Drivers: hv: vmbus: Support TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 4/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 0/6] Support TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [Patch v3 02/14] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [Patch v3 02/14] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH] asm-generic/io: Add _RET_IP_ to MMIO trace for more accurate debug info
- From: Sai Prakash Ranjan <quic_saipraka@xxxxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 06/14] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 02/14] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 2/2] riscv: stacktrace: Make walk_stackframe cross pt_regs frame
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH 2/2] riscv: stacktrace: Make walk_stackframe cross pt_regs frame
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v2] tools/memory-model: Use "grep -E" instead of "egrep"
- From: Tiezhu Yang <yangtiezhu@xxxxxxxxxxx>
- Re: [PATCH] tools/memory-model: Use "grep -E" instead of "egrep"
- From: Tiezhu Yang <yangtiezhu@xxxxxxxxxxx>
- Re: [PATCH] tools/memory-model: Use "grep -E" instead of "egrep"
- From: Akira Yokosawa <akiyks@xxxxxxxxx>
- RE: [PATCH AUTOSEL 6.0 13/44] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [RFC PATCH V2 13/18] x86/hyperv: Add smp support for sev-snp guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 15/18] x86/sev: Add a #HV exception handler
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 03/18] x86/hyperv: apic change for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 18/18] x86/sev: Fix interrupt exit code paths from #HV exception
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 07/18] clocksource: hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 08/18] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 14/18] x86/hyperv: Add hyperv-specific hadling for VMMCALL under SEV-ES
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 04/18] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 05/18] x86/hyperv: Get Virtual Trust Level via hvcall
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 02/18] x86/hyperv: Add sev-snp enlightened guest specific config
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 12/18] x86/hyperv: Initialize cpu and memory for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 17/18] x86/sev: optimize system vector processing invoked from #HV exception
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 09/18] x86/hyperv: set target vtl in the vmbus init message
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 11/18] Drivers: hv: vmbus: Decrypt vmbus ring buffer
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 00/18] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH AUTOSEL 5.15 09/27] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH] tools/memory-model: Use "grep -E" instead of "egrep"
- From: Tiezhu Yang <yangtiezhu@xxxxxxxxxxx>
- [PATCH AUTOSEL 6.0 13/44] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v4 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: "Schimpe, Christina" <christina.schimpe@xxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- RE: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: "Schimpe, Christina" <christina.schimpe@xxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH v4 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v4 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v4 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v4 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v4 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- RE: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: Syzkaller found a bug: KASAN: null-ptr-deref Write in prepare_to_wait
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [Patch v3 02/14] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- RE: [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: Haiyang Zhang <haiyangz@xxxxxxxxxxxxx>
- Re: [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- RE: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: "Schimpe, Christina" <christina.schimpe@xxxxxxxxx>
- Re: [PATCH 05/15] kbuild: build init/built-in.a just once
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 05/15] kbuild: build init/built-in.a just once
- From: Jon Hunter <jonathanh@xxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [Patch v3 06/14] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [Patch v3 08/14] swiotlb: Remove bounce buffer remapping for Hyper-V
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 14/14] PCI: hv: Enable PCI pass-thru devices in Confidential VMs
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 12/14] Drivers: hv: Don't remap addresses that are above shared_gpa_boundary
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 10/14] Drivers: hv: vmbus: Remove second way of mapping ring buffers
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 11/14] hv_netvsc: Remove second mapping of send and recv buffers
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 09/14] Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 06/14] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 04/14] Drivers: hv: Explicitly request decrypted in vmap_pfn() calls
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 03/14] x86/hyperv: Reorder code in prep for subsequent patch
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 02/14] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 00/14] Add PCI pass-thru support to Hyper-V Confidential VMs
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH v2 05/12] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 12/44] cpuidle,dt: Push RCU-idle into driver
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support running nested Microsoft Hypervisor
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 15/37] x86/mm: Check Shadow Stack page fault errors
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 15/37] x86/mm: Check Shadow Stack page fault errors
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 18/37] mm: Add guard pages around a shadow stack.
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 25/37] x86/shstk: Add user-mode shadow stack support
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 36/37] x86/cet/shstk: Add ARCH_CET_UNLOCK
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 15/37] x86/mm: Check Shadow Stack page fault errors
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 36/37] x86/cet/shstk: Add ARCH_CET_UNLOCK
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3 36/37] x86/cet/shstk: Add ARCH_CET_UNLOCK
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 18/37] mm: Add guard pages around a shadow stack.
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 24/37] x86: Introduce userspace API for CET enabling
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 24/37] x86: Introduce userspace API for CET enabling
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 20/37] mm/mprotect: Exclude shadow stack from preserve_write
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 18/37] mm: Add guard pages around a shadow stack.
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 20/37] mm/mprotect: Exclude shadow stack from preserve_write
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 24/37] x86: Introduce userspace API for CET enabling
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 15/37] x86/mm: Check Shadow Stack page fault errors
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 36/37] x86/cet/shstk: Add ARCH_CET_UNLOCK
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 18/37] mm: Add guard pages around a shadow stack.
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 25/37] x86/shstk: Add user-mode shadow stack support
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 24/37] x86: Introduce userspace API for CET enabling
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 24/37] x86: Introduce userspace API for CET enabling
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 15/37] x86/mm: Check Shadow Stack page fault errors
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 36/37] x86/cet/shstk: Add ARCH_CET_UNLOCK
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 13/37] mm: Move VM_UFFD_MINOR_BIT from 37 to 38
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v3 13/37] mm: Move VM_UFFD_MINOR_BIT from 37 to 38
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH V14 0/4] mm/sparse-vmemmap: Generalise helpers and enable for LoongArch
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- RE: [PATCH v2 01/12] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH v2 02/12] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 01/12] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 02/12] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [RFC PATCH 16/17] x86/sev: Add a #HV exception handler
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- RE: [PATCH v2 05/12] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH V14 0/4] mm/sparse-vmemmap: Generalise helpers and enable for LoongArch
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- RE: [PATCH v2 02/12] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 01/12] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v2 02/12] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 01/12] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 05/12] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 00/12] Drivers: hv: Add PCI pass-thru support to Hyper-V Confidential VMs
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v2 12/12] PCI: hv: Enable PCI pass-thru devices in Confidential VMs
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 11/12] PCI: hv: Add hypercalls to read/write MMIO space
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 10/12] Drivers: hv: Don't remap addresses that are above shared_gpa_boundary
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 09/12] hv_netvsc: Remove second mapping of send and recv buffers
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 08/12] Drivers: hv: vmbus: Remove second way of mapping ring buffers
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 05/12] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 07/12] Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 06/12] swiotlb: Remove bounce buffer remapping for Hyper-V
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 04/12] Drivers: hv: Explicitly request decrypted in vmap_pfn() calls
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 03/12] x86/hyperv: Reorder code in prep for subsequent patch
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 01/12] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 00/12] Drivers: hv: Add PCI pass-thru support to Hyper-V Confidential VMs
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 02/12] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [RFC PATCH 17/17] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [RFC PATCH 16/17] x86/sev: Add a #HV exception handler
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH 01/17] x86/boot: Check boot param's cc_blob_address for direct boot mode
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH 01/17] x86/boot: Check boot param's cc_blob_address for direct boot mode
- From: Michael Roth <michael.roth@xxxxxxx>
- [RFC PATCH 17/17] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 14/17] x86/hyperv: Add smp support for sev-snp guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 16/17] x86/sev: Add a #HV exception handler
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 15/17] x86/hyperv: Add hyperv-specific hadling for VMMCALL under SEV-ES
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 03/17] x86/hyperv: Add sev-snp enlightened guest specific config
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 10/17] x86/hyperv: set target vtl in the vmbus init message
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 13/17] x86/hyperv: Initialize cpu and memory for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 12/17] Drivers: hv: vmbus: Decrypt vmbus ring buffer
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 04/17] x86/hyperv: apic change for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 11/17] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 09/17] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 06/17] x86/hyperv: Get Virtual Trust Level via hvcall
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 08/17] clocksource: hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 05/17] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 07/17] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 02/17] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 01/17] x86/boot: Check boot param's cc_blob_address for direct boot mode
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 00/17] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 00/17] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: io_ordering.rst vs. memory-barriers.txt
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH 2/2] riscv: stacktrace: Make walk_stackframe cross pt_regs frame
- [PATCH 1/2] riscv: stacktrace: Fixup ftrace_graph_ret_addr retp argument
- [PATCH 0/2] riscv: stacktrace: A fixup and an optimization
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 6/8] KVM: Update lpage info when private/shared memory are mixed
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v12 10/17] riscv: Add sigcontext save/restore for vector
- From: Vineet Gupta <vineetg@xxxxxxxxxxxx>
- Re: [PATCH 05/12] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: io_ordering.rst vs. memory-barriers.txt
- From: Akira Yokosawa <akiyks@xxxxxxxxx>
- Re: io_ordering.rst vs. memory-barriers.txt
- From: Tony Battersby <tonyb@xxxxxxxxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Konstantin Ryabitsev <mricon@xxxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] vmlinux.lds.h: Fix placement of '.data..decrypted' section
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] vmlinux.lds.h: Fix placement of '.data..decrypted' section
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: vmlinux.lds.h: Bug report: unable to handle page fault when start the virtual machine with qemu
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: vmlinux.lds.h: Bug report: unable to handle page fault when start the virtual machine with qemu
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: vmlinux.lds.h: Bug report: unable to handle page fault when start the virtual machine with qemu
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v9 6/8] KVM: Update lpage info when private/shared memory are mixed
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v2 0/5] execmem_alloc for BPF programs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH 09/12] hv_netvsc: Remove second mapping of send and recv buffers
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH 07/10] [elf][non-regset] uninline elf_core_copy_task_fpregs() (and lose pt_regs argument)
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: vmlinux.lds.h: Bug report: unable to handle page fault when start the virtual machine with qemu
- From: xiafukun <xiafukun@xxxxxxxxxx>
- Re: [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH 12/12] PCI: hv: Enable PCI pass-thru devices in Confidential VMs
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC PATCH v1] riscv: support for hardware breakpoints/watchpoints
- From: Sergey Matyukevich <geomatsi@xxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Johannes Weiner <hannes@xxxxxxxxxxx>
- Re: [PATCH v3 04/37] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 04/37] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 04/37] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH] arm64: remove special treatment for the link order of head.o
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v3 04/37] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 04/37] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 04/37] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v1] riscv: support for hardware breakpoints/watchpoints
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 03/37] x86/cpufeatures: Add CPU feature flags for shadow stacks
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC PATCH v1] riscv: support for hardware breakpoints/watchpoints
- From: Andrew Bresticker <abrestic@xxxxxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1] riscv: support for hardware breakpoints/watchpoints
- From: Anup Patel <apatel@xxxxxxxxxxxxxxxx>
- Re: vmlinux.lds.h: Bug report: unable to handle page fault when start the virtual machine with qemu
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH v1] riscv: support for hardware breakpoints/watchpoints
- From: Andrew Bresticker <abrestic@xxxxxxxxxxxx>
- Re: [PATCH v6 6/44] kmsan: add ReST documentation
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH 0/5] powerpc/kprobes: preempt related changes and cleanups
- From: "Nicholas Piggin" <npiggin@xxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- vmlinux.lds.h: Bug report: unable to handle page fault when start the virtual machine with qemu
- From: "zhaowenhui (A)" <zhaowenhui8@xxxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Hugh Dickins <hughd@xxxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [RFC PATCH v1] riscv: support for hardware breakpoints/watchpoints
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 36/37] x86/cet/shstk: Add ARCH_CET_UNLOCK
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 31/37] x86: Expose thread features in /proc/$PID/status
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 32/37] x86/cet/shstk: Wire in CET interface
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 33/37] selftests/x86: Add shadow stack test
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 34/37] x86/fpu: Add helper for initing features
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 30/37] x86/shstk: Support wrss for userspace
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 29/37] x86/shstk: Introduce map_shadow_stack syscall
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 28/37] x86/shstk: Handle signals for shadow stack
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 26/37] x86/shstk: Handle thread shadow stack
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 24/37] x86: Introduce userspace API for CET enabling
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 25/37] x86/shstk: Add user-mode shadow stack support
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 23/37] mm: Warn on shadow stack memory in wrong vma
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 22/37] mm: Don't allow write GUPs to shadow stack memory
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 21/37] mm: Re-introduce vm_flags to do_mmap()
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 20/37] mm/mprotect: Exclude shadow stack from preserve_write
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 19/37] mm/mmap: Add shadow stack pages to memory accounting
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 18/37] mm: Add guard pages around a shadow stack.
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 13/37] mm: Move VM_UFFD_MINOR_BIT from 37 to 38
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 17/37] mm: Fixup places that call pte_mkwrite() directly
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 16/37] x86/mm: Update maybe_mkwrite() for shadow stack
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 15/37] x86/mm: Check Shadow Stack page fault errors
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 14/37] mm: Introduce VM_SHADOW_STACK for shadow stack memory
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 12/37] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 11/37] x86/mm: Update pte_modify for _PAGE_COW
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 10/37] x86/mm: Introduce _PAGE_COW
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 05/37] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 04/37] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 09/37] x86/mm: Move pmd_write(), pud_write() up in the file
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 07/37] x86/cet: Add user control-protection fault handler
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 06/37] x86/fpu: Add helper for modifying xstate
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 08/37] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 02/37] x86/cet/shstk: Add Kconfig option for Shadow Stack
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 03/37] x86/cpufeatures: Add CPU feature flags for shadow stacks
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 01/37] Documentation/x86: Add CET description
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 00/37] Shadow stacks for userspace
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [RFC PATCH v1] riscv: support for hardware breakpoints/watchpoints
- From: Sergey Matyukevich <geomatsi@xxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH] mm: swap the definition of CONFIG_SPARSEMEM_VMEMMAP and CONFIG_SPARSEMEM
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Alexander Gordeev <agordeev@xxxxxxxxxxxxx>
- [PATCH] mm: swap the definition of CONFIG_SPARSEMEM_VMEMMAP and CONFIG_SPARSEMEM
- From: "zhijun.han" <hanzj.it@xxxxxxxxx>
- Re: [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 33/39] x86/cpufeatures: Limit shadow stack to Intel CPUs
- From: John Allen <john.allen@xxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support running nested Microsoft Hypervisor
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/12] Drivers: hv: Don't remap addresses that are above shared_gpa_boundary
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH 09/12] hv_netvsc: Remove second mapping of send and recv buffers
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH 08/12] Drivers: hv: vmbus: Remove second way of mapping ring buffers
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH 07/12] Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v2 1/2] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v2 4/5] hv: Enable vmbus driver for nested root partition
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- RE: [PATCH 05/12] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 04/12] Drivers: hv: Explicitly request decrypted in vmap_pfn() calls
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v3 0/5] Add support running nested Microsoft Hypervisor
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 05/12] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v3 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH V2] selftests/vDSO: Add riscv getcpu & gettimeofday test
- [PATCH -next V8 14/14] riscv: entry: consolidate general regs saving/restoring
- [PATCH -next V8 12/14] riscv: remove extra level wrappers of trace_hardirqs_{on,off}
- [PATCH -next V8 13/14] riscv: consolidate ret_from_kernel_thread into ret_from_fork
- [PATCH -next V8 11/14] riscv: Add support for STACKLEAK gcc plugin
- [PATCH -next V8 10/14] riscv: Typo fixup for addi -> andi in comment
- [PATCH -next V8 09/14] riscv: Add config of thread stack size
- [PATCH -next V8 08/14] riscv: Support HAVE_SOFTIRQ_ON_OWN_STACK
- [PATCH -next V8 06/14] riscv: convert to generic entry
- [PATCH -next V8 07/14] riscv: Support HAVE_IRQ_EXIT_ON_IRQ_STACK
- [PATCH -next V8 05/14] riscv: traps: Add noinstr to prevent instrumentation inserted
- [PATCH -next V8 04/14] riscv: ptrace: Remove duplicate operation
- [PATCH -next V8 03/14] riscv: compat_syscall_table: Fixup compile warning
- [PATCH -next V8 02/14] riscv: elf_kexec: Fixup compile warning
- [PATCH -next V8 01/14] compiler_types.h: Add __noinstr_section() for noinstr
- [PATCH -next V8 00/14] riscv: Add GENERIC_ENTRY support and related features
- Re: [PATCH v2 4/5] hv: Enable vmbus driver for nested root partition
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v2 4/5] hv: Enable vmbus driver for nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 3/5] hv: Add an interface to do nested hypercalls
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 2/5] hv: Setup synic registers in case of nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 1/5] mshv: Add support for detecting nested hypervisor
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH V14 4/4] LoongArch: Enable ARCH_WANT_HUGETLB_PAGE_OPTIMIZE_VMEMMAP
- From: Muchun Song <muchun.song@xxxxxxxxx>
- Re: [PATCH 0/3] bitmap: optimize small_const path for
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Gerald Schaefer <gerald.schaefer@xxxxxxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Gerald Schaefer <gerald.schaefer@xxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- RE: [PATCH v2 1/2] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v5] locking/memory-barriers.txt: Improve documentation for writel() example
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/12] x86/hyperv: Reorder code in prep for subsequent patch
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [linux-next:master] BUILD REGRESSION 61c3426aca2c71052ddcd06c32e29d92304990fd
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2 4/5] hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 5/5] hv, mshv : Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/5] mshv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/5] hv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/5] hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] hv, mshv : Change interrupt vector for nested root partition
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH 2/6] hv: Setup synic registers in case of nested root partition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH 6/6] hv, mshv : Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5/6] hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/6] hv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3/6] hv: Set the correct EOM register in case of nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/6] hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/6] mshv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/6] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/12] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: mm: delay rmap removal until after TLB flush
- From: Christian Borntraeger <borntraeger@xxxxxxxxxxxxx>
- Re: [PATCH] selftests/vDSO: Add riscv getcpu & gettimeofday test
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- [PATCH] selftests/vDSO: Add riscv getcpu & gettimeofday test
- Re: [PATCH v5] locking/memory-barriers.txt: Improve documentation for writel() example
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [RFC PATCH v1] riscv: support for hardware breakpoints/watchpoints
- From: Andrew Bresticker <abrestic@xxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- [linux-next:master] BUILD REGRESSION e9d267f752f8ff62f0111cea90e3ced4fc595b4f
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION 6fbda10ec6f8d70d0f4446f861f7db726c2f2e7c
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- [RFC PATCH v1] riscv: support for hardware breakpoints/watchpoints
- From: Sergey Matyukevich <geomatsi@xxxxxxxxx>
- mm: delay rmap removal until after TLB flush
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [GIT PULL] LoongArch fixes for v6.1-rc3
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] LoongArch fixes for v6.1-rc3
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- [PATCH 09/10] [elf] unify regset and non-regset cases
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH 10/10] [elf] get rid of get_note_info_size()
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH 07/10] [elf][non-regset] uninline elf_core_copy_task_fpregs() (and lose pt_regs argument)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH 08/10] [elf][non-regset] use elf_core_copy_task_regs() for dumper as well
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH 05/10] [elf][regset] simplify thread list handling in fill_note_info()
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH 06/10] elf_core_copy_task_regs(): task_pt_regs is defined everywhere
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH 04/10] [elf][regset] clean fill_note_info() a bit
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH 02/10] kill coredump_params->regs
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH 03/10] kill extern of vsyscall32_sysctl
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH 01/10] kill signal_pt_regs()
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [RFC][PATCHSET] coredump unification for regset and non-regset architectures
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- RE: [PATCH v5] locking/memory-barriers.txt: Improve documentation for writel() example
- From: Parav Pandit <parav@xxxxxxxxxx>
- Re: [PATCH v5] locking/memory-barriers.txt: Improve documentation for writel() example
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION fd8dab197cca2746e1fcd399a218eec5164726d4
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 2/2] x86/hyperv: fix invalid writes to MSRs during root partition kexec
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 6/8] KVM: Update lpage info when private/shared memory are mixed
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH V2] uapi: Fixup strace compile error
- From: Guo Ren <guoren@xxxxxxxxxx>
- [PATCH v5] locking/memory-barriers.txt: Improve documentation for writel() example
- From: Parav Pandit <parav@xxxxxxxxxx>
- Re: [PATCH v2 2/2] x86/hyperv: fix invalid writes to MSRs during root partition kexec
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: make ctype ascii only? (was [PATCH] kbuild: treat char as always signed)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v4] locking/memory-barriers.txt: Improve documentation for writel() example
- From: Parav Pandit <parav@xxxxxxxxxx>
- Re: [PATCH v4] locking/memory-barriers.txt: Improve documentation for writel() example
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- [linux-next:master] BUILD SUCCESS WITH WARNING ecc4eeb2208ab537a3f3744984cd7f30ac971db8
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH V2] uapi: Fixup strace compile error
- From: Wojtek Porczyk <woju@xxxxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v2 2/2] x86/hyperv: fix invalid writes to MSRs during root partition kexec
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 1/2] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH V14 4/4] LoongArch: Enable ARCH_WANT_HUGETLB_PAGE_OPTIMIZE_VMEMMAP
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- [PATCH V14 3/4] mm/sparse-vmemmap: Generalise vmemmap_populate_hugepages()
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- [PATCH V14 2/4] LoongArch: Add sparse memory vmemmap support
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- [PATCH V14 1/4] MIPS&LoongArch&NIOS2: Adjust prototypes of p?d_init()
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- [PATCH V14 0/4] mm/sparse-vmemmap: Generalise helpers and enable for LoongArch
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [PATCH V13 4/4] LoongArch: Enable ARCH_WANT_HUGETLB_PAGE_OPTIMIZE_VMEMMAP
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH v9 8/8] KVM: Enable and expose KVM_MEM_PRIVATE
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
[Index of Archives]
[Kernel Announce]
[IETF Annouce]
[Netdev]
[Netfilter]
[Bugtraq]