Linux Hyperv
[Prev Page][Next Page]
- RE: [PATCH 08/18] fbdev/hyperv-fb: Do not set struct fb_info.apertures
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v4 04/13] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v4 03/13] Drivers: hv: Explicitly request decrypted in vmap_pfn() calls
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v4 01/13] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 13/18] x86/hyperv: Add smp support for sev-snp guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 12/18] x86/hyperv: Initialize cpu and memory for sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 11/18] Drivers: hv: vmbus: Decrypt vmbus ring buffer
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V2 08/18] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v5 0/7] KVM: x86: Hyper-V invariant TSC control feature
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 0/4] KVM: VMX: nVMX: Make eVMCS enablement more robust
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 18/18] drm/fbdev: Remove aperture handling and FBINFO_MISC_FIRMWARE
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 17/18] fbdev/vga16fb: Do not use struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 16/18] fbdev/vesafb: Do not use struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 15/18] fbdev/vesafb: Remove trailing whitespaces
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 14/18] fbdev/simplefb: Do not use struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 13/18] fbdev/offb: Do not use struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 12/18] fbdev/offb: Allocate struct offb_par with framebuffer_alloc()
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 11/18] fbdev/efifb: Do not use struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 10/18] fbdev/efifb: Add struct efifb_par for driver data
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 09/18] vfio-mdev/mdpy-fb: Do not set struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 08/18] fbdev/hyperv-fb: Do not set struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 07/18] fbdev/clps711x-fb: Do not set struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 06/18] drm/fb-helper: Do not allocate unused apertures structure
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 05/18] drm/radeon: Do not set struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 04/18] drm/i915: Do not set struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 03/18] drm/gma500: Do not set struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 02/18] Revert "fbcon: don't lose the console font across generic->chip driver switch"
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 01/18] fbcon: Remove trailing whitespaces
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH 16/18] fbdev/vesafb: Do not use struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 18/18] drm/fbdev: Remove aperture handling and FBINFO_MISC_FIRMWARE
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 15/18] fbdev/vesafb: Remove trailing whitespaces
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 14/18] fbdev/simplefb: Do not use struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 11/18] fbdev/efifb: Do not use struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 12/18] fbdev/offb: Allocate struct offb_par with framebuffer_alloc()
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 09/18] vfio-mdev/mdpy-fb: Do not set struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 17/18] fbdev/vga16fb: Do not use struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 13/18] fbdev/offb: Do not use struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 08/18] fbdev/hyperv-fb: Do not set struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 07/18] fbdev/clps711x-fb: Do not set struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 10/18] fbdev/efifb: Add struct efifb_par for driver data
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 06/18] drm/fb-helper: Do not allocate unused apertures structure
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 05/18] drm/radeon: Do not set struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 04/18] drm/i915: Do not set struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 02/18] Revert "fbcon: don't lose the console font across generic->chip driver switch"
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 03/18] drm/gma500: Do not set struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 00/18] drm,fbdev: Remove apertures structure and FBINFO_MISC_FIRMWARE
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 01/18] fbcon: Remove trailing whitespaces
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH AUTOSEL 5.10 4/5] x86/hyperv: Remove unregister syscore call from Hyper-V cleanup
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 3/5] video: hyperv_fb: Avoid taking busy spinlock on panic path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 4/5] x86/hyperv: Remove unregister syscore call from Hyper-V cleanup
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 3/5] video: hyperv_fb: Avoid taking busy spinlock on panic path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.0 5/8] x86/hyperv: Remove unregister syscore call from Hyper-V cleanup
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.0 4/8] video: hyperv_fb: Avoid taking busy spinlock on panic path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 4/9] video: hyperv_fb: Avoid taking busy spinlock on panic path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 5/9] x86/hyperv: Remove unregister syscore call from Hyper-V cleanup
- From: Sasha Levin <sashal@xxxxxxxxxx>
- RE: [RFC PATCH V2 11/18] Drivers: hv: vmbus: Decrypt vmbus ring buffer
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 09/18] x86/hyperv: set target vtl in the vmbus init message
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V2 07/18] clocksource: hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v9 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM
- From: "Martin K. Petersen" <martin.petersen@xxxxxxxxxx>
- RE: [RFC PATCH V2 08/18] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 07/18] clocksource: hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 04/18] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V2 02/18] x86/hyperv: Add sev-snp enlightened guest specific config
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V2 18/18] x86/sev: Fix interrupt exit code paths from #HV exception
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- RE: [RFC PATCH V2 05/18] x86/hyperv: Get Virtual Trust Level via hvcall
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 04/18] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 6/6] Drivers: hv: vmbus: Support TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH v2 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 03/18] x86/hyperv: apic change for sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [GIT PULL] Hyper-V commits for v6.2
- From: pr-tracker-bot@xxxxxxxxxx
- RE: [RFC PATCH V2 02/18] x86/hyperv: Add sev-snp enlightened guest specific config
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 6/6] Drivers: hv: vmbus: Support TDX guests
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- RE: [PATCH v2 0/6] Support TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v8 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v8 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH V3 08/11] EDAC/altera: Skip the panic notifier if kdump is loaded
- From: Petr Mladek <pmladek@xxxxxxxx>
- Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
- From: Kai Vehmanen <kai.vehmanen@xxxxxxxxxxxxxxx>
- [PATCH v8 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- RE: [PATCH v2 4/6] x86/tdx: Expand __tdx_hypercall() to handle more arguments
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] x86/tdx: Expand __tdx_hypercall() to handle more arguments
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] x86/tdx: Expand __tdx_hypercall() to handle more arguments
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH v2 1/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- RE: [PATCH v2 4/6] x86/tdx: Expand __tdx_hypercall() to handle more arguments
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [GIT PULL] Hyper-V commits for v6.2
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH v2 4/6] x86/tdx: Expand __tdx_hypercall() to handle more arguments
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- [PATCH v2 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 4/6] x86/tdx: Expand __tdx_hypercall() to handle more arguments
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 6/6] Drivers: hv: vmbus: Support TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 3/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 2/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 1/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 0/6] Support TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [Patch v4 05/13] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- RE: [Patch v4 05/13] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v4 01/13] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v4 05/13] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [Patch v4 01/13] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [Patch v4 01/13] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/6] Make remove() of any bus based driver void returned
- From: Dawei Li <set_pte_at@xxxxxxxxxxx>
- Re: [PATCH 1/6] hyperv: Make remove callback of hyperv driver void returned
- From: Dawei Li <set_pte_at@xxxxxxxxxxx>
- [PATCH v2] hv_balloon: Fix committed value in post_status() if dynamic memory is disabled
- From: Shradha Gupta <shradhagupta@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] hyperv: Make remove callback of hyperv driver void returned
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH net] net: mana: Fix race on per-CQ variable napi work_done
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH 2/6] macio: Make remove callback of macio driver void returned
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] soundbus: make remove callback of soundbus driver void returned
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/6] ac97: make remove callback of ac97 driver void returned
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/6] xen: make remove callback of xen driver void returned
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] Make remove() of any bus based driver void returned
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH 4/6] xen: make remove callback of xen driver void returned
- From: Juergen Gross <jgross@xxxxxxxx>
- [PATCH 5/6] ac97: make remove callback of ac97 driver void returned
- From: Dawei Li <set_pte_at@xxxxxxxxxxx>
- [PATCH 6/6] soundbus: make remove callback of soundbus driver void returned
- From: Dawei Li <set_pte_at@xxxxxxxxxxx>
- [PATCH 1/6] hyperv: Make remove callback of hyperv driver void returned
- From: Dawei Li <set_pte_at@xxxxxxxxxxx>
- [PATCH 0/6] Make remove() of any bus based driver void returned
- From: Dawei Li <set_pte_at@xxxxxxxxxxx>
- [PATCH 3/6] apr: make remove callback of apr driver void returned
- From: Dawei Li <set_pte_at@xxxxxxxxxxx>
- [PATCH 4/6] xen: make remove callback of xen driver void returned
- From: Dawei Li <set_pte_at@xxxxxxxxxxx>
- [PATCH 2/6] macio: Make remove callback of macio driver void returned
- From: Dawei Li <set_pte_at@xxxxxxxxxxx>
- Re: [PATCH v8 2/3] freezer: refactor pm_freezing into a function.
- From: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
- Re: [RFC PATCH v2 5/6] test/vsock: add big message test
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- RE: [PATCH 1/1] scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 1/1] scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: "'Kirill A. Shutemov'" <kirill@xxxxxxxxxxxxx>
- [PATCH net] net: mana: Fix race on per-CQ variable napi work_done
- From: Haiyang Zhang <haiyangz@xxxxxxxxxxxxx>
- Re: [PATCH] clocksource/drivers/hyperv: use Hyper-V's page size to calculate PFN
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [PATCH v3 0/4] hyper-v: Introduce TSC page for root partition
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH] clocksource/drivers/hyperv: use Hyper-V's page size to calculate PFN
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v8 2/3] freezer: refactor pm_freezing into a function.
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v3 0/4] hyper-v: Introduce TSC page for root partition
- From: Stanislav Kinsburskii <skinsburskii@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v7 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] hyper-v: Introduce TSC page for root partition
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [PATCH] clocksource/drivers/hyperv: use Hyper-V's page size to calculate PFN
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [PATCH v7 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v7 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [Patch v4 13/13] PCI: hv: Enable PCI pass-thru devices in Confidential VMs
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 12/13] PCI: hv: Add hypercalls to read/write MMIO space
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 10/13] hv_netvsc: Remove second mapping of send and recv buffers
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 07/13] swiotlb: Remove bounce buffer remapping for Hyper-V
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 11/13] Drivers: hv: Don't remap addresses that are above shared_gpa_boundary
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 09/13] Drivers: hv: vmbus: Remove second way of mapping ring buffers
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 08/13] Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 06/13] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 05/13] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 04/13] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 03/13] Drivers: hv: Explicitly request decrypted in vmap_pfn() calls
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 02/13] x86/hyperv: Reorder code in prep for subsequent patch
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 01/13] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 00/13] Add PCI pass-thru support to Hyper-V Confidential VMs
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH v2 2/6] hv_sock: always return ENOMEM in case of error
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] vsock/vmci: always return ENOMEM in case of error
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] vsock/vmci: always return ENOMEM in case of error
- From: Vishnu Dasa <vdasa@xxxxxxxxxx>
- Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
- From: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
- Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
- From: Oliver Neukum <oneukum@xxxxxxxx>
- Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
- From: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
- Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
- From: Oliver Neukum <oneukum@xxxxxxxx>
- Re: [RFC PATCH v2 6/6] test/vsock: vsock_perf utility
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 5/6] test/vsock: add big message test
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 4/6] test/vsock: rework message bounds test
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] vsock/vmci: always return ENOMEM in case of error
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
- From: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
- [PATCH v8 0/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
- From: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
- [PATCH v8 1/3] kexec: Refactor kexec_in_progress into a function
- From: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
- [PATCH v8 2/3] freezer: refactor pm_freezing into a function.
- From: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
- [PATCH v7 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 6/6] test/vsock: vsock_perf utility
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 5/6] test/vsock: add big message test
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 4/6] test/vsock: rework message bounds test
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 2/6] hv_sock: always return ENOMEM in case of error
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/6] vsock: return errors other than -ENOMEM to socket
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- RE: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v2] x86/hyperv: Remove unregister syscore call from Hyper-V cleanup
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH v6 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH v2] x86/hyperv: Remove unregister syscore call from Hyper-V cleanup
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [PATCH v4 1/1] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH v4 1/1] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- RE: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH] x86/sev: mem_encrypt_free_decrypted_mem(): encrypt the pages for AMD SME only
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH] x86/sev: mem_encrypt_free_decrypted_mem(): encrypt the pages for AMD SME only
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2] x86/hyperv: Remove unregister syscore call from Hyper-V cleanup
- From: Gaurav Kohli <gauravkohli@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Hyper-V fixes for 6.1-rc7
- From: pr-tracker-bot@xxxxxxxxxx
- [RFC PATCH v2 6/6] test/vsock: vsock_perf utility
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v2 5/6] test/vsock: add big message test
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v2 4/6] test/vsock: rework message bounds test
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v2 3/6] vsock/vmci: always return ENOMEM in case of error
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v2 2/6] hv_sock: always return ENOMEM in case of error
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v2 1/6] vsock: return errors other than -ENOMEM to socket
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v2 0/6] vsock: update tools and error handling
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v2 0/6] vsock: update tools and error handling
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH] x86/hyperv: Remove unregister syscore call from hyperv cleanup
- From: Gaurav Kohli <gauravkohli@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/hyperv: Remove unregister syscore call from hyperv cleanup
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH] x86/hyperv: Remove unregister syscore call from hyperv cleanup
- From: Gaurav Kohli <gauravkohli@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 6.0 13/44] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH] x86/hyperv: Remove unregister syscore call from hyperv cleanup
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v4 1/1] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Christophe de Dinechin <dinechin@xxxxxxxxxx>
- [GIT PULL] Hyper-V fixes for 6.1-rc7
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH AUTOSEL 6.0 13/44] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- [PATCH v6 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH] x86/hyperv: Remove unregister syscore call from hyperv cleanup
- From: Gaurav Kohli <gauravkohli@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] swiotlb: check set_memory_decrypted()'s return value
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 4/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- RE: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- RE: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH v4 1/1] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH] drivers: hv: vmbus: Fix possible memory leak when device_register() failed
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/7] KVM: x86: Hyper-V invariant TSC control feature
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH V3 08/11] EDAC/altera: Skip the panic notifier if kdump is loaded
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH V3 08/11] EDAC/altera: Skip the panic notifier if kdump is loaded
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH V3 03/11] alpha: Clean-up the panic notifier code
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH V3 11/11] panic: Fixes the panic_print NMI backtrace setting
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH V3 06/11] tracing: Improve panic/die notifiers
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH V3 07/11] notifiers: Add tracepoints to the notifiers infrastructure
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH V3 02/11] notifier: Add panic notifiers info and purge trailing whitespaces
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH] drivers: hv: vmbus: Fix possible memory leak when device_register() failed
- From: Praveen Kumar <kumarpraveen@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- [PATCH] drivers: hv: vmbus: Fix possible memory leak when device_register() failed
- From: Nir Levy <bhr166@xxxxxxxxx>
- Re: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 4/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] swiotlb: check set_memory_decrypted()'s return value
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 6/6] Drivers: hv: vmbus: Support TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 4/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 0/6] Support TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH] swiotlb: check set_memory_decrypted()'s return value
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [Patch v3 02/14] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [Patch v3 02/14] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 06/14] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 02/14] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 0/2] Drivers: hv: vmbus: fix two issues
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v13 00/48] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- RE: [PATCH v3 2/2] Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v3 1/2] Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH v3 2/2] Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register()
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- [PATCH v3 1/2] Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work()
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- [PATCH v3 0/2] Drivers: hv: vmbus: fix two issues
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- RE: [PATCH AUTOSEL 6.0 14/44] x86/hyperv: fix invalid writes to MSRs during root partition kexec
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH AUTOSEL 6.0 13/44] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [RFC PATCH V2 11/18] Drivers: hv: vmbus: Decrypt vmbus ring buffer
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 05/18] x86/hyperv: Get Virtual Trust Level via hvcall
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 04/18] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 07/18] clocksource: hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 15/18] x86/sev: Add a #HV exception handler
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 13/18] x86/hyperv: Add smp support for sev-snp guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 12/18] x86/hyperv: Initialize cpu and memory for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 14/18] x86/hyperv: Add hyperv-specific hadling for VMMCALL under SEV-ES
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 17/18] x86/sev: optimize system vector processing invoked from #HV exception
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 08/18] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 09/18] x86/hyperv: set target vtl in the vmbus init message
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 18/18] x86/sev: Fix interrupt exit code paths from #HV exception
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 03/18] x86/hyperv: apic change for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 02/18] x86/hyperv: Add sev-snp enlightened guest specific config
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 00/18] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH AUTOSEL 5.15 09/27] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 10/27] x86/hyperv: fix invalid writes to MSRs during root partition kexec
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.0 14/44] x86/hyperv: fix invalid writes to MSRs during root partition kexec
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.0 13/44] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v4 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v13 00/48] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [PATCH v2 2/2] Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 1/2] Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v4 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v4 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v4 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v4 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v4 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v2] iommu/hyper-v: Allow hyperv irq remapping without x2apic
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v2] iommu/hyper-v: Allow hyperv irq remapping without x2apic
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- RE: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2] iommu/hyper-v: Allow hyperv irq remapping without x2apic
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [Patch v3 02/14] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- [PATCH v2] iommu/hyper-v: Allow hyperv irq remapping without x2apic
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- RE: [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: Haiyang Zhang <haiyangz@xxxxxxxxxxxxx>
- Re: [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- RE: [PATCH] clocksource/drivers/hyper-v: Include asm/hyperv-tlfs.h not asm/mshyperv.h
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- RE: [PATCH] clocksource/drivers/hyper-v: Include asm/hyperv-tlfs.h not asm/mshyperv.h
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [Patch v3 06/14] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- RE: [PATCH] clocksource/drivers/hyper-v: Include asm/hyperv-tlfs.h not asm/mshyperv.h
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- RE: [PATCH] iommu/hyper-v: Allow hyperv irq remapping without x2apic
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [Patch v3 08/14] swiotlb: Remove bounce buffer remapping for Hyper-V
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 14/14] PCI: hv: Enable PCI pass-thru devices in Confidential VMs
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 12/14] Drivers: hv: Don't remap addresses that are above shared_gpa_boundary
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 11/14] hv_netvsc: Remove second mapping of send and recv buffers
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 09/14] Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 10/14] Drivers: hv: vmbus: Remove second way of mapping ring buffers
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 06/14] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 04/14] Drivers: hv: Explicitly request decrypted in vmap_pfn() calls
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 03/14] x86/hyperv: Reorder code in prep for subsequent patch
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 02/14] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v3 00/14] Add PCI pass-thru support to Hyper-V Confidential VMs
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/12] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v3 0/5] Add support running nested Microsoft Hypervisor
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH] iommu/hyper-v: Allow hyperv irq remapping without x2apic
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] iommu/hyper-v: Allow hyperv irq remapping without x2apic
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH] iommu/hyper-v: Allow hyperv irq remapping without x2apic
- From: Stanislav Kinsburskii <skinsburskii@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v2 01/12] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH v2 02/12] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 01/12] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/12] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 02/12] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] iommu/hyper-v: Allow hyperv irq remapping without x2apic
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v3 0/4] hyper-v: Introduce TSC page for root partition
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH rdma-next] RDMA/mana: Remove redefinition of basic u64 type
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [RFC PATCH 16/17] x86/sev: Add a #HV exception handler
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- RE: [PATCH] clocksource/drivers/hyper-v: Include asm/hyperv-tlfs.h not asm/mshyperv.h
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- RE: [PATCH] clocksource/drivers/hyper-v: Include asm/hyperv-tlfs.h not asm/mshyperv.h
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- RE: [EXTERNAL] [PATCH rdma-next] RDMA/mana: Remove redefinition of basic u64 type
- From: Long Li <longli@xxxxxxxxxxxxx>
- RE: [PATCH v2 05/12] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH] clocksource/drivers/hyper-v: Include asm/hyperv-tlfs.h not asm/mshyperv.h
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH] clocksource/drivers/hyper-v: Include asm/hyperv-tlfs.h not asm/mshyperv.h
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- RE: [PATCH] clocksource/drivers/hyper-v: Include asm/hyperv-tlfs.h not asm/mshyperv.h
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- RE: [PATCH] clocksource/drivers/hyper-v: Include asm/hyperv-tlfs.h not asm/mshyperv.h
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- RE: [PATCH] clocksource/drivers/hyper-v: Include asm/hyperv-tlfs.h not asm/mshyperv.h
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH V3 10/11] drivers/hv/vmbus, video/hyperv_fb: Untangle and refactor Hyper-V panic notifiers
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- [PATCH] clocksource/drivers/hyper-v: Include asm/hyperv-tlfs.h not asm/mshyperv.h
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v3] PCI: hv: Only reuse existing IRTE allocation for Multi-MSI
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- RE: [PATCH v2 02/12] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 01/12] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [EXTERNAL] [PATCH rdma-next] RDMA/mana: Remove redefinition of basic u64 type
- From: Ajay Sharma <sharmaajay@xxxxxxxxxxxxx>
- RE: [PATCH v3] PCI: hv: Only reuse existing IRTE allocation for Multi-MSI
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v2 02/12] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 01/12] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/1] scsi: storvsc: Fix handling of srb_status and capacity change events
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v3] PCI: hv: Only reuse existing IRTE allocation for Multi-MSI
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v2] x86/Hyper-V: Expand definition of struct hv_vp_assist_page
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH] x86/hyperv: Restore VP assist page after cpu offlining/onlining
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v1] PCI: hv: update comment in x86 specific hv_arch_irq_unmask
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v1] hv: fix comment typo in vmbus_channel/low_latency
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH V3 10/11] drivers/hv/vmbus, video/hyperv_fb: Untangle and refactor Hyper-V panic notifiers
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH] iommu/hyper-v: Allow hyperv irq remapping without x2apic
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V3 10/11] drivers/hv/vmbus, video/hyperv_fb: Untangle and refactor Hyper-V panic notifiers
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v2 05/12] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [GIT PULL] Hyper-V fixes for 6.1-rc5
- From: pr-tracker-bot@xxxxxxxxxx
- RE: [PATCH] iommu/hyper-v: Allow hyperv irq remapping without x2apic
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH] iommu/hyper-v: Allow hyperv irq remapping without x2apic
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- RE: [PATCH] iommu/hyper-v: Allow hyperv irq remapping without x2apic
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH] hv_balloon: Fix committed value in post_status() if dynamic memory is disabled
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v2 00/12] Drivers: hv: Add PCI pass-thru support to Hyper-V Confidential VMs
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH] iommu/hyper-v: Allow hyperv irq remapping without x2apic
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v3] PCI: hv: Only reuse existing IRTE allocation for Multi-MSI
- From: Lorenzo Pieralisi <lpieralisi@xxxxxxxxxx>
- [PATCH rdma-next] RDMA/mana: Remove redefinition of basic u64 type
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: (subset) [Patch v10 00/12] Introduce Microsoft Azure Network Adapter (MANA) RDMA driver
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- RE: [PATCH v3] PCI: hv: Only reuse existing IRTE allocation for Multi-MSI
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 12/12] PCI: hv: Enable PCI pass-thru devices in Confidential VMs
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 11/12] PCI: hv: Add hypercalls to read/write MMIO space
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 10/12] Drivers: hv: Don't remap addresses that are above shared_gpa_boundary
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 09/12] hv_netvsc: Remove second mapping of send and recv buffers
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 08/12] Drivers: hv: vmbus: Remove second way of mapping ring buffers
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 07/12] Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 05/12] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 06/12] swiotlb: Remove bounce buffer remapping for Hyper-V
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 04/12] Drivers: hv: Explicitly request decrypted in vmap_pfn() calls
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 03/12] x86/hyperv: Reorder code in prep for subsequent patch
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 01/12] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 00/12] Drivers: hv: Add PCI pass-thru support to Hyper-V Confidential VMs
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 02/12] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 2/2] Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register()
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- [PATCH v2 0/2] Drivers: hv: vmbus: fix two issues
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- [PATCH v2 1/2] Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work()
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- Re: [PATCH V3 10/11] drivers/hv/vmbus, video/hyperv_fb: Untangle and refactor Hyper-V panic notifiers
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH v3] PCI: hv: Only reuse existing IRTE allocation for Multi-MSI
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [RFC PATCH 17/17] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- [GIT PULL] Hyper-V fixes for 6.1-rc5
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- RE: [PATCH v3] PCI: hv: Only reuse existing IRTE allocation for Multi-MSI
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [RFC PATCH 16/17] x86/sev: Add a #HV exception handler
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- RE: [PATCH 1/2] Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [Patch v10 00/12] Introduce Microsoft Azure Network Adapter (MANA) RDMA driver
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [RFC PATCH 01/17] x86/boot: Check boot param's cc_blob_address for direct boot mode
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v3] net: mana: Fix return type of mana_start_xmit()
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- [PATCH 2/2] Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register()
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- [PATCH 0/2] Drivers: hv: vmbus: fix two issues
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- [PATCH 1/2] Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work()
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- Re: [Patch v10 00/12] Introduce Microsoft Azure Network Adapter (MANA) RDMA driver
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [RFC PATCH 01/17] x86/boot: Check boot param's cc_blob_address for direct boot mode
- From: Michael Roth <michael.roth@xxxxxxx>
- [RFC PATCH 17/17] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 14/17] x86/hyperv: Add smp support for sev-snp guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 16/17] x86/sev: Add a #HV exception handler
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 15/17] x86/hyperv: Add hyperv-specific hadling for VMMCALL under SEV-ES
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 13/17] x86/hyperv: Initialize cpu and memory for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 04/17] x86/hyperv: apic change for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 12/17] Drivers: hv: vmbus: Decrypt vmbus ring buffer
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 11/17] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 03/17] x86/hyperv: Add sev-snp enlightened guest specific config
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 10/17] x86/hyperv: set target vtl in the vmbus init message
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 05/17] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 09/17] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 08/17] clocksource: hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 06/17] x86/hyperv: Get Virtual Trust Level via hvcall
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 07/17] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 02/17] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 01/17] x86/boot: Check boot param's cc_blob_address for direct boot mode
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 00/17] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 00/17] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [Patch v10 00/12] Introduce Microsoft Azure Network Adapter (MANA) RDMA driver
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- [PATCH] iommu/hyper-v: Allow hyperv irq remapping without x2apic
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/1] scsi: storvsc: Fix handling of srb_status and capacity change events
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v10 00/12] Introduce Microsoft Azure Network Adapter (MANA) RDMA driver
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [Patch v10 01/12] net: mana: Add support for auxiliary device
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [Patch v10 00/12] Introduce Microsoft Azure Network Adapter (MANA) RDMA driver
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH 05/12] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v3] net: mana: Fix return type of mana_start_xmit()
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [Patch v10 00/12] Introduce Microsoft Azure Network Adapter (MANA) RDMA driver
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- RE: [Patch v10 01/12] net: mana: Add support for auxiliary device
- From: Long Li <longli@xxxxxxxxxxxxx>
- Re: [Patch v10 01/12] net: mana: Add support for auxiliary device
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [Patch v10 00/12] Introduce Microsoft Azure Network Adapter (MANA) RDMA driver
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH 09/12] hv_netvsc: Remove second mapping of send and recv buffers
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH 12/12] PCI: hv: Enable PCI pass-thru devices in Confidential VMs
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- [PATCH v1] PCI: hv: update comment in x86 specific hv_arch_irq_unmask
- From: Olaf Hering <olaf@xxxxxxxxx>
- Re: [PATCH v2] x86/Hyper-V: Expand definition of struct hv_vp_assist_page
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1] hv: fix comment typo in vmbus_channel/low_latency
- From: Olaf Hering <olaf@xxxxxxxxx>
- RE: [PATCH v3] PCI: hv: Only reuse existing IRTE allocation for Multi-MSI
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH v3] PCI: hv: Only reuse existing IRTE allocation for Multi-MSI
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH] x86/hyperv: Restore VP assist page after cpu offlining/onlining
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v4] drivers/clocksource/hyper-v: Add TSC page support for root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH v4] drivers/clocksource/hyper-v: Add TSC page support for root partition
- From: Stanislav Kinsburskii <skinsburskii@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] x86/Hyper-V: Expand definition of struct hv_vp_assist_page
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] x86/hyperv: Restore VP assist page after cpu offlining/onlining
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- RE: [PATCH] x86/hyperv: Restore VP assist page after cpu offlining/onlining
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH] x86/Hyper-V: Expand definition of struct hv_vp_assist_page
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 4/4] KVM: VMX: Resurrect vmcs_conf sanitization for KVM-on-Hyper-V
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 2/4] KVM: nVMX: Invert 'unsupported by eVMCSv1' check
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 3/4] KVM: nVMX: Prepare to sanitize tertiary execution controls with eVMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 1/4] KVM: nVMX: Sanitize primary processor-based VM-execution controls with eVMCS too
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 0/4] KVM: VMX: nVMX: Make eVMCS enablement more robust
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v3 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/Hyper-V: Expand definition of struct hv_vp_assist_page
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/Hyper-V: Expand definition of struct hv_vp_assist_page
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] hv_balloon: Fix committed value in post_status() if dynamic memory is disabled
- From: Shradha Gupta <shradhagupta@xxxxxxxxxxxxxxxxxxx>
- [PATCH] x86/Hyper-V: Expand definition of struct hv_vp_assist_page
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v3 4/4] drivers/clocksource/hyper-v: Add TSC page support for root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v3 4/4] drivers/clocksource/hyper-v: Add TSC page support for root partition
- From: Stanislav Kinsburskii <skinsburskii@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v3 3/4] drivers/clocksource/hyper-v: Use TSC PFN getter to map vvar page
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v3 2/4] drivers/clocksource/hyper-v: Introduce TSC PFN getter
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v3 1/4] drivers/clocksource/hyper-v: Introduce a pointer to TSC page
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v3 4/4] drivers/clocksource/hyper-v: Add TSC page support for root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [Patch v10 05/12] net: mana: Export Work Queue functions for use by RDMA driver
- From: longli@xxxxxxxxxxxxxxxxx
- [Patch v10 06/12] net: mana: Record port number in netdev
- From: longli@xxxxxxxxxxxxxxxxx
- [Patch v10 12/12] RDMA/mana_ib: Add a driver for Microsoft Azure Network Adapter
- From: longli@xxxxxxxxxxxxxxxxx
- [Patch v10 11/12] net: mana: Define data structures for protection domain and memory registration
- From: longli@xxxxxxxxxxxxxxxxx
- [Patch v10 04/12] net: mana: Set the DMA device max segment size
- From: longli@xxxxxxxxxxxxxxxxx
- [Patch v10 09/12] net: mana: Define and process GDMA response code GDMA_STATUS_MORE_ENTRIES
- From: longli@xxxxxxxxxxxxxxxxx
- [Patch v10 07/12] net: mana: Move header files to a common location
- From: longli@xxxxxxxxxxxxxxxxx
- [Patch v10 10/12] net: mana: Define data structures for allocating doorbell page from GDMA
- From: longli@xxxxxxxxxxxxxxxxx
- [Patch v10 08/12] net: mana: Define max values for SGL entries
- From: longli@xxxxxxxxxxxxxxxxx
- [Patch v10 03/12] net: mana: Handle vport sharing between devices
- From: longli@xxxxxxxxxxxxxxxxx
- [Patch v10 01/12] net: mana: Add support for auxiliary device
- From: longli@xxxxxxxxxxxxxxxxx
- [Patch v10 02/12] net: mana: Record the physical address for doorbell page region
- From: longli@xxxxxxxxxxxxxxxxx
- [Patch v10 00/12] Introduce Microsoft Azure Network Adapter (MANA) RDMA driver
- From: longli@xxxxxxxxxxxxxxxxx
- [PATCH] x86/hyperv: Restore VP assist page after cpu offlining/onlining
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 4/4] drivers/clocksource/hyper-v: Add TSC page support for root partition
- From: Stanislav Kinsburskii <skinsburskii@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/4] drivers/clocksource/hyper-v: Use TSC PFN getter to map vvar page
- From: Stanislav Kinsburskii <skinsburskii@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/4] drivers/clocksource/hyper-v: Introduce TSC PFN getter
- From: Stanislav Kinsburskii <skinsburskii@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/4] drivers/clocksource/hyper-v: Introduce a pointer to TSC page
- From: Stanislav Kinsburskii <skinsburskii@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/4] hyper-v: Introduce TSC page for root partition
- From: Stanislav Kinsburskii <skinsburskii@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v2 4/4] drivers/clocksource/hyper-v: Add TSC page support for root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] drivers/clocksource/hyper-v: Add TSC page support for root partition
- From: Stanislav Kinsburskii <skinsburskii@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] clocksource/drivers/hyperv: use Hyper-V's page size to calculate PFN
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support running nested Microsoft Hypervisor
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] clocksource/drivers/hyperv: use Hyper-V's page size to calculate PFN
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/12] Drivers: hv: Don't remap addresses that are above shared_gpa_boundary
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH] clocksource/drivers/hyperv: use Hyper-V's page size to calculate PFN
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 09/12] hv_netvsc: Remove second mapping of send and recv buffers
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH 08/12] Drivers: hv: vmbus: Remove second way of mapping ring buffers
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH 07/12] Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v2 1/2] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v2 4/5] hv: Enable vmbus driver for nested root partition
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- RE: [PATCH 05/12] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 04/12] Drivers: hv: Explicitly request decrypted in vmap_pfn() calls
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v3 0/5] Add support running nested Microsoft Hypervisor
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 05/12] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v3 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] net: mana: Assign interrupts to CPUs based on NUMA nodes
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH v2 0/2] vsock: remove an unused variable and fix infinite sleep
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH v2 4/5] hv: Enable vmbus driver for nested root partition
- From: Anirudh Rayabharam <anrayabh@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v2 4/5] hv: Enable vmbus driver for nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 3/5] hv: Add an interface to do nested hypercalls
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 2/5] hv: Setup synic registers in case of nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 1/5] mshv: Add support for detecting nested hypervisor
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 4/4] drivers/clocksource/hyper-v: Add TSC page support for root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 2/4] drivers/clocksource/hyper-v: Introduce TSC PFN getter
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 4/4] drivers/clocksource/hyper-v: Add TSC page support for root partition
- From: Stanislav Kinsburskii <skinsburskii@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/4] drivers/clocksource/hyper-v: Use TSC PFN getter to map vvar page
- From: Stanislav Kinsburskii <skinsburskii@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/4] drivers/clocksource/hyper-v: Introduce TSC PFN getter
- From: Stanislav Kinsburskii <skinsburskii@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/4] drivers/clocksource/hyper-v: Introduce a pointer to TSC page
- From: Stanislav Kinsburskii <skinsburskii@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/4] hyper-v: Introduce TSC page for root partition
- From: Stanislav Kinsburskii <skinsburskii@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] drivers/clocksource/hyper-v: Introduce TSC MSR register structure
- From: Stanislav Kinsburskii <skinsburskii@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 2/4] drivers/clocksource/hyper-v: Introduce TSC MSR register structure
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH 1/4] drivers/clocksource/hyper-v: Introduce a pointer to TSC page
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 1/2] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH 2/4] drivers/clocksource/hyper-v: Introduce TSC MSR register structure
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 3/4] drivers/clocksource/hyper-v: Use TSC PFN getter to map vvar page
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- RE: [PATCH 4/4] drivers/clocksource/hyper-v: Add TSC page support for root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH 2/4] drivers/clocksource/hyper-v: Introduce TSC MSR register structure
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH 2/4] drivers/clocksource/hyper-v: Introduce TSC MSR register structure
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH 1/4] drivers/clocksource/hyper-v: Introduce a pointer to TSC page
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 2/2] vsock: fix possible infinite sleep in vsock_connectible_wait_data()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 03/12] x86/hyperv: Reorder code in prep for subsequent patch
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH 2/2] vsock: fix possible infinite sleep in vsock_connectible_wait_data()
- From: Frederic Dalleau <frederic.dalleau@xxxxxxxxxx>
- [PATCH v2 4/5] hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 5/5] hv, mshv : Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Linux Samsung SoC]
[Linux Rockchip SoC]
[Linux for Synopsys ARC Processors]
[Linux Actions SoC]
[Linux Kernel]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Scanners]
[Yosemite Forum]