Linux Hyperv
[Prev Page][Next Page]
- [PATCH v3 5/6] Drivers: hv: vmbus: Support TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v3 4/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v3 3/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v3 2/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v3 1/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v3 0/6] Support TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v3 3/6] Drivers: hv: vmbus: Convert acpi_device to more generic platform_device
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 5/6] dt-bindings: hypervisor: VMBus
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/6] dt-bindings: hypervisor: Rename virtio to hypervisor
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 6/6] Driver: VMBus: Add device tree support
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 2/6] Drivers: hv: allow non ACPI compilation for hv_is_hibernation_supported
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 0/6] Device tree support for Hyper-V VMBus driver
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/6] drivers/clocksource/hyper-v: non ACPI support in hyperv clock
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] Device tree support for Hyper-V VMBus driver
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] HID: Constify lowlevel HID drivers
- From: Benjamin Tissoires <benjamin.tissoires@xxxxxxxxxx>
- Re: [PATCH v2 6/6] Driver: VMBus: Add device tree support
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V3 12/16] x86/sev: Add a #HV exception handler
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V3 10/16] x86/hyperv: Add smp support for sev-snp guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH] HV: hv_balloon: fix memory leak with using debugfs_lookup()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V3 10/16] x86/hyperv: Add smp support for sev-snp guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V3 08/16] x86/hyperv: Initialize cpu and memory for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v2 3/6] Drivers: hv: vmbus: Convert acpi_device to platform_device
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V3 07/16] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V3 06/16] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- RE: [RFC PATCH V3 00/16] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH] HV: hv_balloon: fix memory leak with using debugfs_lookup()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [RFC PATCH V3 03/16] x86/hyperv: Set Virtual Trust Level in vmbus init message
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V3 16/16] x86/sev: Fix interrupt exit code paths from #HV exception
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [RFC PATCH V3 00/16] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- [PATCH net,v3] net: mana: Fix accessing freed irq affinity_hint
- From: Haiyang Zhang <haiyangz@xxxxxxxxxxxxx>
- RE: [PATCH net,v2] net: mana: Fix accessing freed irq affinity_hint
- From: Haiyang Zhang <haiyangz@xxxxxxxxxxxxx>
- Re: [PATCH net,v2] net: mana: Fix accessing freed irq affinity_hint
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- RE: [PATCH net 1/1] hv_netvsc: Fix missed pagebuf entries in netvsc_dma_map/unmap()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 2/6] Drivers: hv: allow non ACPI compilation for hv_is_hibernation_supported
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/6] Drivers: hv: vmbus: Convert acpi_device to platform_device
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/6] Drivers: hv: allow non ACPI compilation for hv_is_hibernation_supported
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- [PATCH] HV: hv_balloon: fix memory leak with using debugfs_lookup()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net 1/1] hv_netvsc: Fix missed pagebuf entries in netvsc_dma_map/unmap()
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH net 1/1] hv_netvsc: Fix missed pagebuf entries in netvsc_dma_map/unmap()
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH net,v2] net: mana: Fix accessing freed irq affinity_hint
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- RE: [PATCH v5 06/14] x86/ioremap: Support hypervisor specified range to map as encrypted
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH net 1/1] hv_netvsc: Fix missed pagebuf entries in netvsc_dma_map/unmap()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH net 1/1] hv_netvsc: Fix missed pagebuf entries in netvsc_dma_map/unmap()
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [RFC PATCH V3 01/16] x86/hyperv: Add sev-snp enlightened guest specific config
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V3 09/16] x86/hyperv: SEV-SNP enlightened guest don't support legacy rtc
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- RE: [PATCH net,v2] net: mana: Fix accessing freed irq affinity_hint
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH net,v2] net: mana: Fix accessing freed irq affinity_hint
- From: Haiyang Zhang <haiyangz@xxxxxxxxxxxxx>
- RE: [PATCH v2 3/6] Drivers: hv: vmbus: Convert acpi_device to platform_device
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] Driver: VMBus: Add device tree support
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v2 2/6] Drivers: hv: allow non ACPI compilation for hv_is_hibernation_supported
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] Driver: VMBus: Add device tree support
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 0/6] Device tree support for Hyper-V VMBus driver
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v2 6/6] Driver: VMBus: Add device tree support
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] Device tree support for Hyper-V VMBus driver
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] Device tree support for Hyper-V VMBus driver
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 4/4] dt-bindings: hv: Add dt-bindings for VMBus
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/4] Drivers: hv: vmbus: Device Tree support
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] dt-bindings: hypervisor: Add dt-bindings for VMBus
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] dt-bindings: hypervisor: Add dt-bindings for VMBus
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v2 4/6] dt-bindings: hypervisor: Rename virtio to hypervisor
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] Device tree support for Hyper-V VMBus driver
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] dt-bindings: hypervisor: Add dt-bindings for VMBus
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] dt-bindings: hypervisor: Add dt-bindings for VMBus
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/6] Device tree support for Hyper-V VMBus driver
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH v2 6/6] Driver: VMBus: Add device tree support
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: [PATCH v2 4/6] dt-bindings: hypervisor: Rename virtio to hypervisor
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v2 5/6] dt-bindings: hypervisor: Add dt-bindings for VMBus
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH v2 5/6] dt-bindings: hypervisor: Add dt-bindings for VMBus
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- RE: [RFC PATCH V3 10/16] x86/hyperv: Add smp support for sev-snp guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V3 08/16] x86/hyperv: Initialize cpu and memory for sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 6/6] Driver: VMBus: Add device tree support
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/6] dt-bindings: hypervisor: Rename virtio to hypervisor
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 3/6] Drivers: hv: vmbus: Convert acpi_device to platform_device
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 5/6] dt-bindings: hypervisor: Add dt-bindings for VMBus
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/6] Drivers: hv: allow non ACPI compilation for hv_is_hibernation_supported
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 0/6] Device tree support for Hyper-V VMBus driver
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 1/6] drivers/clocksource/hyper-v: non ACPI support in hyperv clock
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- RE: [RFC PATCH V3 07/16] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V3 06/16] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V3 03/16] x86/hyperv: Set Virtual Trust Level in vmbus init message
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V3 01/16] x86/hyperv: Add sev-snp enlightened guest specific config
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH net 1/1] hv_netvsc: Fix missed pagebuf entries in netvsc_dma_map/unmap()
- From: Haiyang Zhang <haiyangz@xxxxxxxxxxxxx>
- Re: [RFC PATCH V3 09/16] x86/hyperv: SEV-SNP enlightened guest don't support legacy rtc
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH 9/9] staging: greybus: hid: Constify lowlevel HID driver
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH net 1/1] hv_netvsc: Fix missed pagebuf entries in netvsc_dma_map/unmap()
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 4/6] x86/amd: Configure necessary MSRs for SNP during CPU init when running as a guest
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 3/6] x86/sev: Maintain shadow rmptable on Hyper-V
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/9] HID: hyperv: Constify lowlevel HID driver
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- RE: [RFC PATCH v1 2/6] x86/sev: Add support for NestedVirtSnpMsr
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 2/6] x86/sev: Add support for NestedVirtSnpMsr
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 1/6] x86/hyperv: Allocate RMP table during boot
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] HID: Constify lowlevel HID drivers
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- Re: [PATCH 0/9] HID: Constify lowlevel HID drivers
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH 6/9] HID: surface-hid: Constify lowlevel HID driver
- From: Maximilian Luz <luzmaximilian@xxxxxxxxx>
- RE: unlocked access to struct irq_data->chip_data in pci_hyperv
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 0/9] HID: Constify lowlevel HID drivers
- From: Hans de Goede <hdegoede@xxxxxxxxxx>
- [PATCH 6/9] HID: surface-hid: Constify lowlevel HID driver
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH 7/9] platform/x86: asus-tf103c-dock: Constify lowlevel HID driver
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH 9/9] staging: greybus: hid: Constify lowlevel HID driver
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH 8/9] platform/x86: asus-tf103c-dock: Constify toprow keymap
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH 5/9] HID: intel-ish-hid: Constify lowlevel HID driver
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH 2/9] HID: hyperv: Constify lowlevel HID driver
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH 1/9] HID: amd_sfh: Constify lowlevel HID driver
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH 0/9] HID: Constify lowlevel HID drivers
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH 3/9] HID: logitech-dj: Constify lowlevel HID driver
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH 4/9] HID: steam: Constify lowlevel HID driver
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- RE: [PATCH net, 2/2] net: mana: Fix accessing freed irq affinity_hint
- From: Haiyang Zhang <haiyangz@xxxxxxxxxxxxx>
- RE: [PATCH net, 1/2] net: mana: Fix hint value before free irq
- From: Haiyang Zhang <haiyangz@xxxxxxxxxxxxx>
- RE: [PATCH net, 1/2] net: mana: Fix hint value before free irq
- From: Haiyang Zhang <haiyangz@xxxxxxxxxxxxx>
- RE: [PATCH net, 2/2] net: mana: Fix accessing freed irq affinity_hint
- From: Haiyang Zhang <haiyangz@xxxxxxxxxxxxx>
- RE: [PATCH net, 2/2] net: mana: Fix accessing freed irq affinity_hint
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH net, 1/2] net: mana: Fix hint value before free irq
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH net, 2/2] net: mana: Fix accessing freed irq affinity_hint
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH net, 1/2] net: mana: Fix hint value before free irq
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- RE: [RFC PATCH v1 4/6] x86/amd: Configure necessary MSRs for SNP during CPU init when running as a guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH v1 3/6] x86/sev: Maintain shadow rmptable on Hyper-V
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH v1 2/6] x86/sev: Add support for NestedVirtSnpMsr
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH v1 1/6] x86/hyperv: Allocate RMP table during boot
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH net, 2/2] net: mana: Fix accessing freed irq affinity_hint
- From: Haiyang Zhang <haiyangz@xxxxxxxxxxxxx>
- [PATCH net, 1/2] net: mana: Fix hint value before free irq
- From: Haiyang Zhang <haiyangz@xxxxxxxxxxxxx>
- [PATCH net, 0/2] Fix usage of irq affinity_hint
- From: Haiyang Zhang <haiyangz@xxxxxxxxxxxxx>
- unlocked access to struct irq_data->chip_data in pci_hyperv
- From: Olaf Hering <olaf@xxxxxxxxx>
- Re: [PATCH v5 06/14] x86/ioremap: Support hypervisor specified range to map as encrypted
- From: Borislav Petkov <bp@xxxxxxxxx>
- [RFC PATCH v1 6/6] crypto: ccp - Introduce quirk to always reclaim pages after SEV-legacy commands
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 5/6] iommu/amd: Don't fail snp_enable when running virtualized
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 4/6] x86/amd: Configure necessary MSRs for SNP during CPU init when running as a guest
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 1/6] x86/hyperv: Allocate RMP table during boot
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 2/6] x86/sev: Add support for NestedVirtSnpMsr
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 3/6] x86/sev: Maintain shadow rmptable on Hyper-V
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 0/6] Support nested SNP KVM guests on Hyper-V
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V3 10/16] x86/hyperv: Add smp support for sev-snp guest
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC PATCH V3 12/16] x86/sev: Add a #HV exception handler
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- [RFC PATCH V3 15/16] x86/sev: optimize system vector processing invoked from #HV exception
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V3 14/16] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V3 16/16] x86/sev: Fix interrupt exit code paths from #HV exception
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V3 10/16] x86/hyperv: Add smp support for sev-snp guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V3 13/16] x86/sev: Add Check of #HV event in path
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V3 11/16] x86/hyperv: Add hyperv-specific hadling for VMMCALL under SEV-ES
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V3 12/16] x86/sev: Add a #HV exception handler
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V3 09/16] x86/hyperv: SEV-SNP enlightened guest don't support legacy rtc
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V3 08/16] x86/hyperv: Initialize cpu and memory for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V3 07/16] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V3 04/16] x86/hyperv: Use vmmcall to implement Hyper-V hypercall in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V3 06/16] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V3 03/16] x86/hyperv: Set Virtual Trust Level in vmbus init message
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V3 05/16] clocksource/drivers/hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V3 02/16] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V3 01/16] x86/hyperv: Add sev-snp enlightened guest specific config
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V3 00/16] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH 4/4] dt-bindings: hv: Add dt-bindings for VMBus
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- RE: [PATCH v5 06/14] x86/ioremap: Support hypervisor specified range to map as encrypted
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH net] net: mana: Fix IRQ name - add PCI and queue number
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH v5 06/14] x86/ioremap: Support hypervisor specified range to map as encrypted
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 4/4] dt-bindings: hv: Add dt-bindings for VMBus
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [Patch v4 00/13] Add PCI pass-thru support to Hyper-V Confidential VMs
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [Patch v4 00/13] Add PCI pass-thru support to Hyper-V Confidential VMs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 4/4] dt-bindings: hv: Add dt-bindings for VMBus
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH net] net: mana: Fix IRQ name - add PCI and queue number
- From: Jesse Brandeburg <jesse.brandeburg@xxxxxxxxx>
- [PATCH net] net: mana: Fix IRQ name - add PCI and queue number
- From: Haiyang Zhang <haiyangz@xxxxxxxxxxxxx>
- RE: [Patch v4 00/13] Add PCI pass-thru support to Hyper-V Confidential VMs
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 08/11] fbdev/hyperv: use pci aperture helpers
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] dt-bindings: hv: Add dt-bindings for VMBus
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] dt-bindings: hv: Add dt-bindings for VMBus
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 3/4] Drivers: hv: vmbus: Device Tree support
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] dt-bindings: hv: Add dt-bindings for VMBus
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] Device tree support for Hyper-V VMBus driver
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 3/4] Drivers: hv: vmbus: Device Tree support
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v3] Drivers: hv: Make remove callback of hyperv driver void returned
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH] x86/hyperv: conditionally build hv_get_nested_reg()
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [bug report] x86/hyperv: Add Write/Read MSR registers via ghcb page
- From: Dan Carpenter <error27@xxxxxxxxx>
- Re: [bug report] x86/hyperv: Add Write/Read MSR registers via ghcb page
- From: Dan Carpenter <error27@xxxxxxxxx>
- Re: [bug report] x86/hyperv: Add Write/Read MSR registers via ghcb page
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/hyperv: conditionally build hv_get_nested_reg()
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/4] dt-bindings: hv: Add dt-bindings for VMBus
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH 4/4] dt-bindings: hv: Add dt-bindings for VMBus
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 4/4] dt-bindings: hv: Add dt-bindings for VMBus
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- Re: [PATCH 3/4] Drivers: hv: vmbus: Device Tree support
- From: Krzysztof Kozlowski <krzysztof.kozlowski@xxxxxxxxxx>
- [PATCH 3/4] Drivers: hv: vmbus: Device Tree support
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4/4] dt-bindings: hv: Add dt-bindings for VMBus
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/4] Device tree support for Hyper-V VMBus driver
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/4] Drivers: hv: allow non ACPI compilation for hv_is_hibernation_supported
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/4] drivers/clocksource/hyper-v: non ACPI support in hyperv clock
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- [bug report] x86/hyperv: Add Write/Read MSR registers via ghcb page
- From: Dan Carpenter <error27@xxxxxxxxx>
- Re: [patch V2 30/46] x86/xen: Wrap XEN MSI management into irqdomain
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [patch V2 30/46] x86/xen: Wrap XEN MSI management into irqdomain
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- [PATCH] x86/hyperv: conditionally build hv_get_nested_reg()
- From: Tom Rix <trix@xxxxxxxxxx>
- [PATCH v5 14/14] PCI: hv: Enable PCI pass-thru devices in Confidential VMs
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v5 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v5 12/14] Drivers: hv: Don't remap addresses that are above shared_gpa_boundary
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v5 05/14] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v5 04/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v5 09/14] Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v5 10/14] Drivers: hv: vmbus: Remove second way of mapping ring buffers
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v5 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v5 00/14] Add PCI pass-thru support to Hyper-V Confidential VMs
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v5 02/14] x86/hyperv: Reorder code to facilitate future work
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v5 01/14] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v5 11/14] hv_netvsc: Remove second mapping of send and recv buffers
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v5 08/14] swiotlb: Remove bounce buffer remapping for Hyper-V
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v5 06/14] x86/ioremap: Support hypervisor specified range to map as encrypted
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v5 03/14] Drivers: hv: Explicitly request decrypted in vmap_pfn() calls
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v10 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v10 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v10 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v2 10/16] drivers: hv: move device_to_hv_device to use container_of_const()
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [Patch v4 00/13] Add PCI pass-thru support to Hyper-V Confidential VMs
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [RFC PATCH V2 15/18] x86/sev: Add a #HV exception handler
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH 03/11] drm/aperture: Remove primary argument
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 08/11] fbdev/hyperv: use pci aperture helpers
- From: Daniel Vetter <daniel.vetter@xxxxxxxx>
- [PATCH 03/11] drm/aperture: Remove primary argument
- From: Daniel Vetter <daniel.vetter@xxxxxxxx>
- [PATCH v2 10/16] drivers: hv: move device_to_hv_device to use container_of_const()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V2 15/18] x86/sev: Add a #HV exception handler
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V2 15/18] x86/sev: Add a #HV exception handler
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- RE: [Patch v4 00/13] Add PCI pass-thru support to Hyper-V Confidential VMs
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v4 04/13] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v4 04/13] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v4 00/13] Add PCI pass-thru support to Hyper-V Confidential VMs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v4 06/13] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v4 07/13] swiotlb: Remove bounce buffer remapping for Hyper-V
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [Patch v4 06/13] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v10 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [Patch v4 06/13] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [PATCH v2 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 6/6] Drivers: hv: vmbus: Support TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH v2 2/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [PATCH 6/6] Drivers: hv: vmbus: Support TDX guests
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- Re: [PATCH v2 2/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- RE: [PATCH v2 2/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- RE: [PATCH v2 2/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v3] Drivers: hv: Make remove callback of hyperv driver void returned
- From: Dawei Li <set_pte_at@xxxxxxxxxxx>
- Re: [PATCH v3] Drivers: hv: Make remove callback of hyperv driver void returned
- From: Praveen Kumar <kumarpraveen@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3] Drivers: hv: Make remove callback of hyperv driver void returned
- From: Dawei Li <set_pte_at@xxxxxxxxxxx>
- Re: [PATCH v2 2/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Zhi Wang <zhi.wang.linux@xxxxxxxxx>
- RE: [PATCH v2] hyperv: Make remove callback of hyperv driver void returned
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v10 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v10 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v10 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v10 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v10 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 09/18] vfio-mdev/mdpy-fb: Do not set struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v10 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v10 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [no subject]
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2] hyperv: Make remove callback of hyperv driver void returned
- From: Dawei Li <set_pte_at@xxxxxxxxxxx>
- RE: [PATCH v9 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v4 04/13] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v4 04/13] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- RE: [Patch v4 04/13] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v4 01/13] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH 08/18] fbdev/hyperv-fb: Do not set struct fb_info.apertures
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v4 04/13] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v4 03/13] Drivers: hv: Explicitly request decrypted in vmap_pfn() calls
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v4 01/13] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 13/18] x86/hyperv: Add smp support for sev-snp guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 12/18] x86/hyperv: Initialize cpu and memory for sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 11/18] Drivers: hv: vmbus: Decrypt vmbus ring buffer
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V2 08/18] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v5 0/7] KVM: x86: Hyper-V invariant TSC control feature
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v2 0/4] KVM: VMX: nVMX: Make eVMCS enablement more robust
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 18/18] drm/fbdev: Remove aperture handling and FBINFO_MISC_FIRMWARE
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 17/18] fbdev/vga16fb: Do not use struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 16/18] fbdev/vesafb: Do not use struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 15/18] fbdev/vesafb: Remove trailing whitespaces
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 14/18] fbdev/simplefb: Do not use struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 13/18] fbdev/offb: Do not use struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 12/18] fbdev/offb: Allocate struct offb_par with framebuffer_alloc()
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 11/18] fbdev/efifb: Do not use struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 10/18] fbdev/efifb: Add struct efifb_par for driver data
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 09/18] vfio-mdev/mdpy-fb: Do not set struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 08/18] fbdev/hyperv-fb: Do not set struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 07/18] fbdev/clps711x-fb: Do not set struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 06/18] drm/fb-helper: Do not allocate unused apertures structure
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 05/18] drm/radeon: Do not set struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 04/18] drm/i915: Do not set struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 03/18] drm/gma500: Do not set struct fb_info.apertures
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 02/18] Revert "fbcon: don't lose the console font across generic->chip driver switch"
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- Re: [PATCH 01/18] fbcon: Remove trailing whitespaces
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH 16/18] fbdev/vesafb: Do not use struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 18/18] drm/fbdev: Remove aperture handling and FBINFO_MISC_FIRMWARE
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 15/18] fbdev/vesafb: Remove trailing whitespaces
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 14/18] fbdev/simplefb: Do not use struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 11/18] fbdev/efifb: Do not use struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 12/18] fbdev/offb: Allocate struct offb_par with framebuffer_alloc()
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 09/18] vfio-mdev/mdpy-fb: Do not set struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 17/18] fbdev/vga16fb: Do not use struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 13/18] fbdev/offb: Do not use struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 08/18] fbdev/hyperv-fb: Do not set struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 07/18] fbdev/clps711x-fb: Do not set struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 10/18] fbdev/efifb: Add struct efifb_par for driver data
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 06/18] drm/fb-helper: Do not allocate unused apertures structure
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 05/18] drm/radeon: Do not set struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 04/18] drm/i915: Do not set struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 02/18] Revert "fbcon: don't lose the console font across generic->chip driver switch"
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 03/18] drm/gma500: Do not set struct fb_info.apertures
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 00/18] drm,fbdev: Remove apertures structure and FBINFO_MISC_FIRMWARE
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 01/18] fbcon: Remove trailing whitespaces
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH AUTOSEL 5.10 4/5] x86/hyperv: Remove unregister syscore call from Hyper-V cleanup
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.10 3/5] video: hyperv_fb: Avoid taking busy spinlock on panic path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 4/5] x86/hyperv: Remove unregister syscore call from Hyper-V cleanup
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 3/5] video: hyperv_fb: Avoid taking busy spinlock on panic path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.0 5/8] x86/hyperv: Remove unregister syscore call from Hyper-V cleanup
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.0 4/8] video: hyperv_fb: Avoid taking busy spinlock on panic path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 4/9] video: hyperv_fb: Avoid taking busy spinlock on panic path
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.1 5/9] x86/hyperv: Remove unregister syscore call from Hyper-V cleanup
- From: Sasha Levin <sashal@xxxxxxxxxx>
- RE: [RFC PATCH V2 11/18] Drivers: hv: vmbus: Decrypt vmbus ring buffer
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 09/18] x86/hyperv: set target vtl in the vmbus init message
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V2 07/18] clocksource: hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v9 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v9 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM
- From: "Martin K. Petersen" <martin.petersen@xxxxxxxxxx>
- RE: [RFC PATCH V2 08/18] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 07/18] clocksource: hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 04/18] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V2 02/18] x86/hyperv: Add sev-snp enlightened guest specific config
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V2 18/18] x86/sev: Fix interrupt exit code paths from #HV exception
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- RE: [RFC PATCH V2 05/18] x86/hyperv: Get Virtual Trust Level via hvcall
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 04/18] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 6/6] Drivers: hv: vmbus: Support TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH v2 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 03/18] x86/hyperv: apic change for sev-snp enlightened guest
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [GIT PULL] Hyper-V commits for v6.2
- From: pr-tracker-bot@xxxxxxxxxx
- RE: [RFC PATCH V2 02/18] x86/hyperv: Add sev-snp enlightened guest specific config
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 6/6] Drivers: hv: vmbus: Support TDX guests
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- RE: [PATCH v2 0/6] Support TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v8 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v8 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH V3 08/11] EDAC/altera: Skip the panic notifier if kdump is loaded
- From: Petr Mladek <pmladek@xxxxxxxx>
- Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
- From: Kai Vehmanen <kai.vehmanen@xxxxxxxxxxxxxxx>
- [PATCH v8 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v8 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- RE: [PATCH v2 4/6] x86/tdx: Expand __tdx_hypercall() to handle more arguments
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] x86/tdx: Expand __tdx_hypercall() to handle more arguments
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] x86/tdx: Expand __tdx_hypercall() to handle more arguments
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- RE: [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH v2 1/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- RE: [PATCH v2 4/6] x86/tdx: Expand __tdx_hypercall() to handle more arguments
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [GIT PULL] Hyper-V commits for v6.2
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH v2 4/6] x86/tdx: Expand __tdx_hypercall() to handle more arguments
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- [PATCH v2 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 4/6] x86/tdx: Expand __tdx_hypercall() to handle more arguments
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 6/6] Drivers: hv: vmbus: Support TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 3/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 2/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 1/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 0/6] Support TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [Patch v4 05/13] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- RE: [Patch v4 05/13] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v4 01/13] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v4 05/13] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [Patch v4 01/13] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [Patch v4 01/13] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/6] Make remove() of any bus based driver void returned
- From: Dawei Li <set_pte_at@xxxxxxxxxxx>
- Re: [PATCH 1/6] hyperv: Make remove callback of hyperv driver void returned
- From: Dawei Li <set_pte_at@xxxxxxxxxxx>
- [PATCH v2] hv_balloon: Fix committed value in post_status() if dynamic memory is disabled
- From: Shradha Gupta <shradhagupta@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] hyperv: Make remove callback of hyperv driver void returned
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH net] net: mana: Fix race on per-CQ variable napi work_done
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH 2/6] macio: Make remove callback of macio driver void returned
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/6] soundbus: make remove callback of soundbus driver void returned
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/6] ac97: make remove callback of ac97 driver void returned
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/6] xen: make remove callback of xen driver void returned
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/6] Make remove() of any bus based driver void returned
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH 4/6] xen: make remove callback of xen driver void returned
- From: Juergen Gross <jgross@xxxxxxxx>
- [PATCH 5/6] ac97: make remove callback of ac97 driver void returned
- From: Dawei Li <set_pte_at@xxxxxxxxxxx>
- [PATCH 6/6] soundbus: make remove callback of soundbus driver void returned
- From: Dawei Li <set_pte_at@xxxxxxxxxxx>
- [PATCH 1/6] hyperv: Make remove callback of hyperv driver void returned
- From: Dawei Li <set_pte_at@xxxxxxxxxxx>
- [PATCH 0/6] Make remove() of any bus based driver void returned
- From: Dawei Li <set_pte_at@xxxxxxxxxxx>
- [PATCH 3/6] apr: make remove callback of apr driver void returned
- From: Dawei Li <set_pte_at@xxxxxxxxxxx>
- [PATCH 4/6] xen: make remove callback of xen driver void returned
- From: Dawei Li <set_pte_at@xxxxxxxxxxx>
- [PATCH 2/6] macio: Make remove callback of macio driver void returned
- From: Dawei Li <set_pte_at@xxxxxxxxxxx>
- Re: [PATCH v8 2/3] freezer: refactor pm_freezing into a function.
- From: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
- Re: [RFC PATCH v2 5/6] test/vsock: add big message test
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- RE: [PATCH 1/1] scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 1/1] scsi: storvsc: Fix swiotlb bounce buffer leak in confidential VM
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: "'Kirill A. Shutemov'" <kirill@xxxxxxxxxxxxx>
- [PATCH net] net: mana: Fix race on per-CQ variable napi work_done
- From: Haiyang Zhang <haiyangz@xxxxxxxxxxxxx>
- Re: [PATCH] clocksource/drivers/hyperv: use Hyper-V's page size to calculate PFN
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [PATCH v3 0/4] hyper-v: Introduce TSC page for root partition
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH] clocksource/drivers/hyperv: use Hyper-V's page size to calculate PFN
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v8 2/3] freezer: refactor pm_freezing into a function.
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v3 0/4] hyper-v: Introduce TSC page for root partition
- From: Stanislav Kinsburskii <skinsburskii@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v7 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/4] hyper-v: Introduce TSC page for root partition
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [PATCH] clocksource/drivers/hyperv: use Hyper-V's page size to calculate PFN
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [PATCH v7 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v7 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [Patch v4 13/13] PCI: hv: Enable PCI pass-thru devices in Confidential VMs
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 12/13] PCI: hv: Add hypercalls to read/write MMIO space
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 10/13] hv_netvsc: Remove second mapping of send and recv buffers
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 07/13] swiotlb: Remove bounce buffer remapping for Hyper-V
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 11/13] Drivers: hv: Don't remap addresses that are above shared_gpa_boundary
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 09/13] Drivers: hv: vmbus: Remove second way of mapping ring buffers
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 08/13] Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 06/13] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 05/13] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 04/13] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 03/13] Drivers: hv: Explicitly request decrypted in vmap_pfn() calls
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 02/13] x86/hyperv: Reorder code in prep for subsequent patch
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 01/13] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [Patch v4 00/13] Add PCI pass-thru support to Hyper-V Confidential VMs
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- RE: [RFC PATCH v2 2/6] hv_sock: always return ENOMEM in case of error
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] vsock/vmci: always return ENOMEM in case of error
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] vsock/vmci: always return ENOMEM in case of error
- From: Vishnu Dasa <vdasa@xxxxxxxxxx>
- Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
- From: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
- Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
- From: Oliver Neukum <oneukum@xxxxxxxx>
- Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
- From: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
- Re: [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
- From: Oliver Neukum <oneukum@xxxxxxxx>
- Re: [RFC PATCH v2 6/6] test/vsock: vsock_perf utility
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 5/6] test/vsock: add big message test
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 4/6] test/vsock: rework message bounds test
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/6] vsock/vmci: always return ENOMEM in case of error
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [PATCH v8 3/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
- From: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
- [PATCH v8 0/3] ASoC: SOF: Fix deadlock when shutdown a frozen userspace
- From: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
- [PATCH v8 1/3] kexec: Refactor kexec_in_progress into a function
- From: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
- [PATCH v8 2/3] freezer: refactor pm_freezing into a function.
- From: Ricardo Ribalda <ribalda@xxxxxxxxxxxx>
- [PATCH v7 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v7 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 6/6] test/vsock: vsock_perf utility
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 5/6] test/vsock: add big message test
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 4/6] test/vsock: rework message bounds test
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 2/6] hv_sock: always return ENOMEM in case of error
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/6] vsock: return errors other than -ENOMEM to socket
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- RE: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v2] x86/hyperv: Remove unregister syscore call from Hyper-V cleanup
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH v6 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH v2] x86/hyperv: Remove unregister syscore call from Hyper-V cleanup
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [PATCH v4 1/1] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/1] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH v4 1/1] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- RE: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH] x86/sev: mem_encrypt_free_decrypted_mem(): encrypt the pages for AMD SME only
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH] x86/sev: mem_encrypt_free_decrypted_mem(): encrypt the pages for AMD SME only
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2] x86/hyperv: Remove unregister syscore call from Hyper-V cleanup
- From: Gaurav Kohli <gauravkohli@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] Hyper-V fixes for 6.1-rc7
- From: pr-tracker-bot@xxxxxxxxxx
- [RFC PATCH v2 6/6] test/vsock: vsock_perf utility
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v2 5/6] test/vsock: add big message test
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v2 4/6] test/vsock: rework message bounds test
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v2 3/6] vsock/vmci: always return ENOMEM in case of error
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v2 2/6] hv_sock: always return ENOMEM in case of error
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v2 1/6] vsock: return errors other than -ENOMEM to socket
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v2 0/6] vsock: update tools and error handling
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v2 0/6] vsock: update tools and error handling
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH] x86/hyperv: Remove unregister syscore call from hyperv cleanup
- From: Gaurav Kohli <gauravkohli@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86/hyperv: Remove unregister syscore call from hyperv cleanup
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH] x86/hyperv: Remove unregister syscore call from hyperv cleanup
- From: Gaurav Kohli <gauravkohli@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH AUTOSEL 6.0 13/44] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH] x86/hyperv: Remove unregister syscore call from hyperv cleanup
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v4 1/1] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Christophe de Dinechin <dinechin@xxxxxxxxxx>
- [GIT PULL] Hyper-V fixes for 6.1-rc7
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH AUTOSEL 6.0 13/44] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- [PATCH v6 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/5] Add support running nested Microsoft Hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: Jinank Jain <jinankjain@xxxxxxxxxxxxxxxxxxx>
- [PATCH] x86/hyperv: Remove unregister syscore call from hyperv cleanup
- From: Gaurav Kohli <gauravkohli@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] swiotlb: check set_memory_decrypted()'s return value
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 4/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- RE: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- RE: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH v4 1/1] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH] drivers: hv: vmbus: Fix possible memory leak when device_register() failed
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/7] KVM: x86: Hyper-V invariant TSC control feature
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH V3 08/11] EDAC/altera: Skip the panic notifier if kdump is loaded
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH V3 08/11] EDAC/altera: Skip the panic notifier if kdump is loaded
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH V3 03/11] alpha: Clean-up the panic notifier code
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH V3 11/11] panic: Fixes the panic_print NMI backtrace setting
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH V3 06/11] tracing: Improve panic/die notifiers
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH V3 07/11] notifiers: Add tracepoints to the notifiers infrastructure
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH V3 02/11] notifier: Add panic notifiers info and purge trailing whitespaces
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH] drivers: hv: vmbus: Fix possible memory leak when device_register() failed
- From: Praveen Kumar <kumarpraveen@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- [PATCH] drivers: hv: vmbus: Fix possible memory leak when device_register() failed
- From: Nir Levy <bhr166@xxxxxxxxx>
- Re: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH 4/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 4/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] swiotlb: check set_memory_decrypted()'s return value
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 6/6] Drivers: hv: vmbus: Support TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 4/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 1/6] x86/tdx: Support hypercalls for TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 0/6] Support TDX guests on Hyper-V
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH] swiotlb: check set_memory_decrypted()'s return value
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [Patch v3 02/14] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [Patch v3 02/14] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: "Kalra, Ashish" <ashish.kalra@xxxxxxx>
- Re: [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 06/14] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 02/14] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [Patch v3 01/14] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 0/2] Drivers: hv: vmbus: fix two issues
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v13 00/48] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- RE: [PATCH v3 2/2] Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v3 1/2] Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH v3 2/2] Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register()
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- [PATCH v3 1/2] Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work()
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- [PATCH v3 0/2] Drivers: hv: vmbus: fix two issues
- From: Yang Yingliang <yangyingliang@xxxxxxxxxx>
- RE: [PATCH AUTOSEL 6.0 14/44] x86/hyperv: fix invalid writes to MSRs during root partition kexec
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH AUTOSEL 6.0 13/44] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [RFC PATCH V2 11/18] Drivers: hv: vmbus: Decrypt vmbus ring buffer
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 05/18] x86/hyperv: Get Virtual Trust Level via hvcall
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 04/18] x86/hyperv: Decrypt hv vp assist page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 07/18] clocksource: hyper-v: decrypt hyperv tsc page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 15/18] x86/sev: Add a #HV exception handler
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 13/18] x86/hyperv: Add smp support for sev-snp guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 12/18] x86/hyperv: Initialize cpu and memory for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 14/18] x86/hyperv: Add hyperv-specific hadling for VMMCALL under SEV-ES
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 17/18] x86/sev: optimize system vector processing invoked from #HV exception
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 08/18] x86/hyperv: decrypt vmbus pages for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 09/18] x86/hyperv: set target vtl in the vmbus init message
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 18/18] x86/sev: Fix interrupt exit code paths from #HV exception
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 03/18] x86/hyperv: apic change for sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 02/18] x86/hyperv: Add sev-snp enlightened guest specific config
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH V2 00/18] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH AUTOSEL 5.15 09/27] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.15 10/27] x86/hyperv: fix invalid writes to MSRs during root partition kexec
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.0 14/44] x86/hyperv: fix invalid writes to MSRs during root partition kexec
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 6.0 13/44] clocksource/drivers/hyperv: add data structure for reference TSC MSR
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v4 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v13 00/48] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- RE: [PATCH v2 2/2] Drivers: hv: vmbus: fix possible memory leak in vmbus_device_register()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 1/2] Drivers: hv: vmbus: fix double free in the error path of vmbus_add_channel_work()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v4 5/5] x86/hyperv: Change interrupt vector for nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v4 4/5] Drivers: hv: Enable vmbus driver for nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v4 3/5] x86/hyperv: Add an interface to do nested hypercalls
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v4 2/5] Drivers: hv: Setup synic registers in case of nested root partition
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v4 1/5] x86/hyperv: Add support for detecting nested hypervisor
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v2] iommu/hyper-v: Allow hyperv irq remapping without x2apic
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v2] iommu/hyper-v: Allow hyperv irq remapping without x2apic
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- RE: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2] iommu/hyper-v: Allow hyperv irq remapping without x2apic
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [Patch v3 02/14] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- [PATCH v2] iommu/hyper-v: Allow hyperv irq remapping without x2apic
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- RE: [Patch v3 13/14] PCI: hv: Add hypercalls to read/write MMIO space
- From: Haiyang Zhang <haiyangz@xxxxxxxxxxxxx>
[Index of Archives]
[Linux Samsung SoC]
[Linux Rockchip SoC]
[Linux for Synopsys ARC Processors]
[Linux Actions SoC]
[Linux Kernel]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Scanners]
[Yosemite Forum]