Linux Hyperv
[Prev Page][Next Page]
- Re: [PATCH v2 10/13] EDAC/altera: Skip the panic notifier if kdump is loaded
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 10/13] EDAC/altera: Skip the panic notifier if kdump is loaded
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH 0/6] virtio/vsock: introduce dgrams, sk_buff, and qdisc
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH 0/6] virtio/vsock: introduce dgrams, sk_buff, and qdisc
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v2 10/13] EDAC/altera: Skip the panic notifier if kdump is loaded
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/6] virtio/vsock: introduce dgrams, sk_buff, and qdisc
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH 0/6] virtio/vsock: introduce dgrams, sk_buff, and qdisc
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH 0/6] virtio/vsock: introduce dgrams, sk_buff, and qdisc
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH] tools: hv: Fix comment typo
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH] PCI: hv: Only reuse existing IRTE allocation for Multi-MSI
- From: Lorenzo Pieralisi <lpieralisi@xxxxxxxxxx>
- Re: [PATCH 0/6] virtio/vsock: introduce dgrams, sk_buff, and qdisc
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [virtio-dev] Re: [PATCH 2/6] vsock: return errors other than -ENOMEM to socket
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- RE: [PATCH] PCI: hv: Fix the definiton of vector in hv_compose_msi_msg()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH] PCI: hv: Only reuse existing IRTE allocation for Multi-MSI
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH] PCI: hv: Only reuse existing IRTE allocation for Multi-MSI
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v2 10/13] EDAC/altera: Skip the panic notifier if kdump is loaded
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH v2 08/13] tracing: Improve panic/die notifiers
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH v2 10/13] EDAC/altera: Skip the panic notifier if kdump is loaded
- From: Dinh Nguyen <dinguyen@xxxxxxxxxx>
- [PATCH] tools: hv: Fix comment typo
- From: Xin Gao <gaoxin@xxxxxxxxxx>
- Re: [PATCH 0/6] virtio/vsock: introduce dgrams, sk_buff, and qdisc
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH 2/6] vsock: return errors other than -ENOMEM to socket
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH 0/6] virtio/vsock: introduce dgrams, sk_buff, and qdisc
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH] PCI: hv: Fix the definiton of vector in hv_compose_msi_msg()
- From: Jeffrey Hugo <quic_jhugo@xxxxxxxxxxx>
- Re: [PATCH v2 08/13] tracing: Improve panic/die notifiers
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH] PCI: hv: Only reuse existing IRTE allocation for Multi-MSI
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH] PCI: hv: Only reuse existing IRTE allocation for Multi-MSI
- From: Lorenzo Pieralisi <lpieralisi@xxxxxxxxxx>
- Re: [PATCH v2 08/13] tracing: Improve panic/die notifiers
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 08/13] tracing: Improve panic/die notifiers
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- [PATCH v2 0/4] Make balloon drivers memory changes known to the rest of the kernel
- From: Alexander Atanasov <alexander.atanasov@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] vsock: return errors other than -ENOMEM to socket
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 0/6] virtio/vsock: introduce dgrams, sk_buff, and qdisc
- From: Bobby Eshleman <bobbyeshleman@xxxxxxxxx>
- Re: [PATCH] drm/hyperv: Fix an error handling path in hyperv_vmbus_probe()
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- Re: [PATCH 2/6] vsock: return errors other than -ENOMEM to socket
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 0/6] virtio/vsock: introduce dgrams, sk_buff, and qdisc
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH] PCI: hv: Fix the definiton of vector in hv_compose_msi_msg()
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- RE: [PATCH] PCI: hv: Fix the definiton of vector in hv_compose_msi_msg()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] vsock: return errors other than -ENOMEM to socket
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 5.19 0087/1157] drm/hyperv-drm: Include framebuffer and EDID headers
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] PCI: hv: Fix the definiton of vector in hv_compose_msi_msg()
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 5.18 0079/1095] drm/hyperv-drm: Include framebuffer and EDID headers
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.15 063/779] drm/hyperv-drm: Include framebuffer and EDID headers
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/6] vsock: return errors other than -ENOMEM to socket
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxx>
- [PATCH 0/6] virtio/vsock: introduce dgrams, sk_buff, and qdisc
- From: Bobby Eshleman <bobby.eshleman@xxxxxxxxx>
- Re: [PATCH] tools: hv: Fix comment typo
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH] drm/hyperv: Fix an error handling path in hyperv_vmbus_probe()
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH] Drivers: hv: vmbus: Optimize vmbus_on_event
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v1 5/5][RFT] ACPI: Drop parent field from struct acpi_device
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v2] scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq
- From: "Martin K. Petersen" <martin.petersen@xxxxxxxxxx>
- Re: Booting Xen dom0 on Hyper-V
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- [PATCH] tools: hv: Fix comment typo
- From: Jason Wang <wangborong@xxxxxxxxxx>
- RE: [PATCH] PCI: hv: Only reuse existing IRTE allocation for Multi-MSI
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v1 5/5][RFT] ACPI: Drop parent field from struct acpi_device
- From: Mika Westerberg <mika.westerberg@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 5/5][RFT] ACPI: Drop parent field from struct acpi_device
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v1 5/5][RFT] ACPI: Drop parent field from struct acpi_device
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH v2 03/13] firmware: google: Test spinlock on panic path to avoid lockups
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: Booting Xen dom0 on Hyper-V
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v2 00/14] drm/format-helper: Move to struct iosys_map
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH v2 06/13] um: Improve panic notifiers consistency and ordering
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH v2 06/13] um: Improve panic notifiers consistency and ordering
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/13] um: Improve panic notifiers consistency and ordering
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH v2 06/13] um: Improve panic notifiers consistency and ordering
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Booting Xen dom0 on Hyper-V
- From: Anish Gupta <anish@xxxxxxxxxxxx>
- Re: [RFC PATCH v3 1/9] vsock: SO_RCVLOWAT transport set callback
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 1/9] vsock: SO_RCVLOWAT transport set callback
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 1/9] vsock: SO_RCVLOWAT transport set callback
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 1/9] vsock: SO_RCVLOWAT transport set callback
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v3 0/9] vsock: updates for SO_RCVLOWAT handling
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH v2 00/14] drm/format-helper: Move to struct iosys_map
- From: Noralf Trønnes <noralf@xxxxxxxxxxx>
- Re: [PATCH v2 00/14] drm/format-helper: Move to struct iosys_map
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH v2 14/14] drm/format-helper: Rename parameter vmap to src
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH v2 13/14] drm/format-helper: Move destination-buffer handling into internal helper
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH v2 04/14] drm/format-helper: Convert drm_fb_swab() to struct iosys_map
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH v2 03/14] drm/format-helper: Merge drm_fb_memcpy() and drm_fb_memcpy_toio()
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH v2 01/14] iosys-map: Add IOSYS_MAP_INIT_VADDR_IOMEM()
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH 12/12] drm/format-helper: Move destination-buffer handling into internal helper
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [GIT PULL] Hyper-V next patches
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 03/13] firmware: google: Test spinlock on panic path to avoid lockups
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH v2 03/13] firmware: google: Test spinlock on panic path to avoid lockups
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 03/13] firmware: google: Test spinlock on panic path to avoid lockups
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH v2 01/14] iosys-map: Add IOSYS_MAP_INIT_VADDR_IOMEM()
- From: Lucas De Marchi <lucas.demarchi@xxxxxxxxx>
- [PATCH v2 10/14] drm/format-helper: Rework XRGB8888-to-XRGB2101010 conversion
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 07/14] drm/format-helper: Rework XRGB8888-to-RGB888 conversion
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 13/14] drm/format-helper: Move destination-buffer handling into internal helper
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 09/14] drm/format-helper: Rework RGB888-to-XRGB8888 conversion
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 04/14] drm/format-helper: Convert drm_fb_swab() to struct iosys_map
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 12/14] drm/format-helper: Rework XRGB8888-to-MONO conversion
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 11/14] drm/format-helper: Rework XRGB8888-to-GRAY8 conversion
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 08/14] drm/format-helper: Rework RGB565-to-XRGB8888 conversion
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 06/14] drm/format-helper: Rework XRGB8888-to-RGBG565 conversion
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 01/14] iosys-map: Add IOSYS_MAP_INIT_VADDR_IOMEM()
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 05/14] drm/format-helper: Rework XRGB8888-to-RGBG332 conversion
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 03/14] drm/format-helper: Merge drm_fb_memcpy() and drm_fb_memcpy_toio()
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 02/14] drm/format-helper: Provide drm_fb_blit()
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 14/14] drm/format-helper: Rename parameter vmap to src
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH v2 00/14] drm/format-helper: Move to struct iosys_map
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH 02/12] drm/format-helper: Merge drm_fb_memcpy() and drm_fb_memcpy_toio()
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH 12/12] drm/format-helper: Move destination-buffer handling into internal helper
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [RFC PATCH v3 0/9] vsock: updates for SO_RCVLOWAT handling
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 9/9] vsock_test: POLLIN + SO_RCVLOWAT test
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 9/9] vsock_test: POLLIN + SO_RCVLOWAT test
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 8/9] vmci/vsock: check SO_RCVLOWAT before wake up reader
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 7/9] virtio/vsock: check SO_RCVLOWAT before wake up reader
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 6/9] vsock: add API call for data ready
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 5/9] vsock: pass sock_rcvlowat to notify_poll_in as target
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 4/9] vmci/vsock: use 'target' in notify_poll_in callback
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 3/9] virtio/vsock: use 'target' in notify_poll_in callback
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 2/9] hv_sock: disable SO_RCVLOWAT support
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 1/9] vsock: SO_RCVLOWAT transport set callback
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 1/9] vsock: SO_RCVLOWAT transport set callback
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v3 0/9] vsock: updates for SO_RCVLOWAT handling
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH v2 03/13] firmware: google: Test spinlock on panic path to avoid lockups
- From: Evan Green <evgreen@xxxxxxxxxxxx>
- [GIT PULL] Hyper-V next patches
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v2 10/13] EDAC/altera: Skip the panic notifier if kdump is loaded
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH v2 08/13] tracing: Improve panic/die notifiers
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH v2 06/13] um: Improve panic notifiers consistency and ordering
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH v2 03/13] firmware: google: Test spinlock on panic path to avoid lockups
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH v2 01/13] ARM: Disable FIQs (but not IRQs) on CPUs shutdown paths
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- RE: [PATCH] drm/hyperv: Fix an error handling path in hyperv_vmbus_probe()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 00/12] drm/format-helper: Move to struct iosys_map
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH 12/12] drm/format-helper: Move destination-buffer handling into internal helper
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [RFC PATCH v3 0/9] vsock: updates for SO_RCVLOWAT handling
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 11/12] drm/format-helper: Rework XRGB8888-to-MONO conversion
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH 10/12] drm/format-helper: Rework XRGB8888-to-GRAY8 conversion
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH 09/12] drm/format-helper: Rework XRGB8888-to-XRGB2101010 conversion
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH 08/12] drm/format-helper: Rework RGB888-to-XRGB8888 conversion
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH 07/12] drm/format-helper: Rework RGB565-to-XRGB8888 conversion
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH 06/12] drm/format-helper: Rework XRGB8888-to-RGB888 conversion
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH 05/12] drm/format-helper: Rework XRGB8888-to-RGBG565 conversion
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH 04/12] drm/format-helper: Rework XRGB8888-to-RGBG332 conversion
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH 03/12] drm/format-helper: Convert drm_fb_swab() to struct iosys_map
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH 02/12] drm/format-helper: Merge drm_fb_memcpy() and drm_fb_memcpy_toio()
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH 01/12] drm/format-helper: Provide drm_fb_blit()
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- RE: [PATCH v2] scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH v2] scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH] PCI: hv: Only reuse existing IRTE allocation for Multi-MSI
- From: Jeffrey Hugo <quic_jhugo@xxxxxxxxxxx>
- Re: [PATCH 1/1] iommu/hyper-v: Use helper instead of directly accessing affinity
- From: Marc Zyngier <maz@xxxxxxxxxx>
- RE: [PATCH] Drivers: hv: vmbus: Optimize vmbus_on_event
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH] PCI: hv: Only reuse existing IRTE allocation for Multi-MSI
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH 1/1] iommu/hyper-v: Use helper instead of directly accessing affinity
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v9 28/40] KVM: selftests: Fill in vm->vpages_mapped bitmap in virt_map() too
- From: Andrew Jones <andrew.jones@xxxxxxxxx>
- [RFC PATCH v3 9/9] vsock_test: POLLIN + SO_RCVLOWAT test
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 8/9] vmci/vsock: check SO_RCVLOWAT before wake up reader
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 7/9] virtio/vsock: check SO_RCVLOWAT before wake up reader
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 6/9] vsock: add API call for data ready
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 5/9] vsock: pass sock_rcvlowat to notify_poll_in as target
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 4/9] vmci/vsock: use 'target' in notify_poll_in callback
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 3/9] virtio/vsock: use 'target' in notify_poll_in callback
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 2/9] hv_sock: disable SO_RCVLOWAT support
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v3 1/9] vsock: SO_RCVLOWAT transport set callback
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [PATCH v9 37/40] KVM: selftests: Allocate Hyper-V partition assist page
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 40/40] KVM: selftests: Rename 'evmcs_test' to 'hyperv_evmcs'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 34/40] KVM: selftests: Move Hyper-V VP assist page enablement out of evmcs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 30/40] KVM: selftests: Export _vm_get_page_table_entry()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 18/40] KVM: x86: hyper-v: Introduce fast guest_hv_cpuid_has_l2_tlb_flush() check
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 16/40] KVM: x86: hyper-v: Introduce kvm_hv_is_tlb_flush_hcall()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 24/40] KVM: selftests: Better XMM read/write helpers
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 26/40] KVM: selftests: Move the function doing Hyper-V hypercall to a common header
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 32/40] KVM: selftests: Sync 'struct hv_enlightened_vmcs' definition with hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 23/40] KVM: x86: Expose Hyper-V L2 TLB flush feature
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 21/40] KVM: nVMX: hyper-v: Enable L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [RFC PATCH v3 0/9] vsock: updates for SO_RCVLOWAT handling
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [PATCH v9 33/40] KVM: selftests: Sync 'struct hv_vp_assist_page' definition with hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 25/40] KVM: selftests: Move HYPERV_LINUX_OS_ID definition to a common header
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 19/40] x86/hyperv: Fix 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 22/40] KVM: nSVM: hyper-v: Enable L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 28/40] KVM: selftests: Fill in vm->vpages_mapped bitmap in virt_map() too
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 38/40] KVM: selftests: evmcs_test: Introduce L2 TLB flush test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 17/40] KVM: x86: hyper-v: L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 36/40] KVM: selftests: Create a vendor independent helper to allocate Hyper-V specific test pages
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 20/40] KVM: nVMX: hyper-v: Cache VP assist page in 'struct kvm_vcpu_hv'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 31/40] KVM: selftests: Hyper-V PV TLB flush selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 39/40] KVM: selftests: hyperv_svm_test: Introduce L2 TLB flush test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 29/40] KVM: selftests: Export vm_vaddr_unused_gap() to make it possible to request unmapped ranges
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 35/40] KVM: selftests: Split off load_evmcs() from load_vmcs()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 27/40] KVM: selftests: Hyper-V PV IPI selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 15/40] KVM: x86: Introduce .hv_inject_synthetic_vmexit_post_tlb_flush() nested hook
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 11/40] KVM: x86: hyper-v: Create a separate fifo for L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 14/40] KVM: nSVM: Keep track of Hyper-V hv_vm_id/hv_vp_id
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 13/40] KVM: nVMX: Keep track of hv_vm_id/hv_vp_id when eVMCS is in use
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 12/40] KVM: x86: hyper-v: Use preallocated buffer in 'struct kvm_vcpu_hv' instead of on-stack 'sparse_banks'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 08/40] x86/hyperv: Introduce HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK constants
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 09/40] KVM: x86: hyper-v: Use HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK instead of raw '64'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 10/40] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 07/40] KVM: x86: Prepare kvm_hv_flush_tlb() to handle L2's GPAs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 06/40] KVM: x86: hyper-v: Expose support for extended gva ranges for flush hypercalls
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 04/40] KVM: x86: hyper-v: Add helper to read hypercall data for array
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 01/40] KVM: x86: Rename 'enable_direct_tlbflush' to 'enable_l2_tlb_flush'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 03/40] KVM: x86: hyper-v: Introduce TLB flush fifo
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 02/40] KVM: x86: hyper-v: Resurrect dedicated KVM_REQ_HV_TLB_FLUSH flag
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 05/40] KVM: x86: hyper-v: Handle HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST{,EX} calls gently
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v9 00/40] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v8 33/39] KVM: selftests: nVMX: Allocate Hyper-V partition assist page
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 08/13] tracing: Improve panic/die notifiers
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH v2 08/13] tracing: Improve panic/die notifiers
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v2 08/13] tracing: Improve panic/die notifiers
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v2 02/13] notifier: Add panic notifiers info and purge trailing whitespaces
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH] Drivers: hv: vmbus: Optimize vmbus_on_event
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- RE: [Patch v4 03/12] net: mana: Handle vport sharing between devices
- From: Long Li <longli@xxxxxxxxxxxxx>
- Re: [Patch v4 03/12] net: mana: Handle vport sharing between devices
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v4 24/25] KVM: VMX: Cache MSR_IA32_VMX_MISC in vmcs_config
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 24/25] KVM: VMX: Cache MSR_IA32_VMX_MISC in vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 24/26] KVM: nVMX: Use sanitized allowed-1 bits for VMX control MSRs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 26/26] KVM: nVMX: Use cached host MSR_IA32_VMX_MISC value for setting up nested MSR
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 25/26] KVM: VMX: Cache MSR_IA32_VMX_MISC in vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 22/26] KVM: VMX: Move LOAD_IA32_PERF_GLOBAL_CTRL errata handling out of setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 23/26] KVM: nVMX: Always set required-1 bits of pinbased_ctls to PIN_BASED_ALWAYSON_WITHOUT_TRUE_MSR
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 15/26] KVM: VMX: Don't toggle VM_ENTRY_IA32E_MODE for 32-bit kernels/KVM
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 13/26] KVM: VMX: Check CPU_BASED_{INTR,NMI}_WINDOW_EXITING in setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 19/26] KVM: VMX: Add missing CPU based VM execution controls to vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 12/26] KVM: VMX: Check VM_ENTRY_IA32E_MODE in setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 17/26] KVM: VMX: Move CPU_BASED_CR8_{LOAD,STORE}_EXITING filtering out of setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 20/26] KVM: VMX: Adjust CR3/INVPLG interception for EPT=y at runtime, not setup
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 14/26] KVM: VMX: Tweak the special handling of SECONDARY_EXEC_ENCLS_EXITING in setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 18/26] KVM: VMX: Add missing VMEXIT controls to vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 21/26] KVM: x86: VMX: Replace some Intel model numbers with mnemonics
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 16/26] KVM: VMX: Extend VMX controls macro shenanigans
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 11/26] KVM: VMX: Get rid of eVMCS specific VMX controls sanitization
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 09/26] KVM: VMX: nVMX: Support TSC scaling and PERF_GLOBAL_CTRL with enlightened VMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 08/26] KVM: selftests: Switch to updated eVMCSv1 definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 10/26] KVM: selftests: Enable TSC scaling in evmcs selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 07/26] KVM: selftests: Add ENCLS_EXITING_BITMAP{,HIGH} VMCS fields
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 06/26] KVM: x86: hyper-v: Cache HYPERV_CPUID_NESTED_FEATURES CPUID leaf
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 00/26] KVM: VMX: Support updated eVMCSv1 revision + use vmcs_config for L1 VMX MSRs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 05/26] KVM: nVMX: Support several new fields in eVMCSv1
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 04/26] KVM: VMX: Define VMCS-to-EVMCS conversion for the new fields
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 03/26] x86/hyperv: Update 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 02/26] x86/hyperv: Fix 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v5 01/26] KVM: x86: hyper-v: Expose access to debug MSRs in the partition privilege flags
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v4 09/25] KVM: VMX: nVMX: Support TSC scaling and PERF_GLOBAL_CTRL with enlightened VMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v4 14/25] KVM: VMX: Tweak the special handling of SECONDARY_EXEC_ENCLS_EXITING in setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH] Drivers: hv: vmbus: Optimize vmbus_on_event
- From: Praveen Kumar <kumarpraveen@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/9] vsock: updates for SO_RCVLOWAT handling
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- RE: [RFC PATCH v2 6/9] hv_sock: disable SO_RCVLOWAT support
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/9] vsock: updates for SO_RCVLOWAT handling
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/9] vsock: updates for SO_RCVLOWAT handling
- From: Vishnu Dasa <vdasa@xxxxxxxxxx>
- Re: [RFC PATCH v2 0/9] vsock: updates for SO_RCVLOWAT handling
- From: Vishnu Dasa <vdasa@xxxxxxxxxx>
- Re: [PATCH v4 09/25] KVM: VMX: nVMX: Support TSC scaling and PERF_GLOBAL_CTRL with enlightened VMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH] scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 01/25] KVM: x86: hyper-v: Expose access to debug MSRs in the partition privilege flags
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH] hyperv_setup_vram() calls vmbus_allocate_mmio(). This must be undone in the error handling path of the probe, as already done in the remove function.
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- [PATCH] drm/hyperv: Fix an error handling path in hyperv_vmbus_probe()
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- Re: [PATCH] hyperv_setup_vram() calls vmbus_allocate_mmio(). This must be undone in the error handling path of the probe, as already done in the remove function.
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- Re: [PATCH 05/12] drm/format-helper: Rework XRGB8888-to-RGBG565 conversion
- From: José Expósito <jose.exposito89@xxxxxxxxx>
- RE: [Patch v4 03/12] net: mana: Handle vport sharing between devices
- From: Long Li <longli@xxxxxxxxxxxxx>
- Re: [Patch v4 03/12] net: mana: Handle vport sharing between devices
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- RE: [Patch v4 03/12] net: mana: Handle vport sharing between devices
- From: Long Li <longli@xxxxxxxxxxxxx>
- Re: [PATCH v4 09/25] KVM: VMX: nVMX: Support TSC scaling and PERF_GLOBAL_CTRL with enlightened VMCS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 21/25] KVM: VMX: Move LOAD_IA32_PERF_GLOBAL_CTRL errata handling out of setup_vmcs_config()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 21/25] KVM: VMX: Move LOAD_IA32_PERF_GLOBAL_CTRL errata handling out of setup_vmcs_config()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 09/25] KVM: VMX: nVMX: Support TSC scaling and PERF_GLOBAL_CTRL with enlightened VMCS
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v4 09/25] KVM: VMX: nVMX: Support TSC scaling and PERF_GLOBAL_CTRL with enlightened VMCS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 09/25] KVM: VMX: nVMX: Support TSC scaling and PERF_GLOBAL_CTRL with enlightened VMCS
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 12/12] drm/format-helper: Move destination-buffer handling into internal helper
- From: José Expósito <jose.exposito89@xxxxxxxxx>
- Re: [PATCH 04/12] drm/format-helper: Rework XRGB8888-to-RGBG332 conversion
- From: José Expósito <jose.exposito89@xxxxxxxxx>
- Re: [PATCH v4 15/25] KVM: VMX: Extend VMX controls macro shenanigans
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 12/12] drm/format-helper: Move destination-buffer handling into internal helper
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH 04/12] drm/format-helper: Rework XRGB8888-to-RGBG332 conversion
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH 12/12] drm/format-helper: Move destination-buffer handling into internal helper
- From: José Expósito <jose.exposito89@xxxxxxxxx>
- Re: [PATCH 04/12] drm/format-helper: Rework XRGB8888-to-RGBG332 conversion
- From: José Expósito <jose.exposito89@xxxxxxxxx>
- Re: [RFC PATCH v2 0/9] vsock: updates for SO_RCVLOWAT handling
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 5/9] vsock: SO_RCVLOWAT transport set callback
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/9] vmci/vsock: use 'target' in notify_poll_in, callback
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/9] vsock: use sk_rcvlowat to set POLLIN/POLLRDNORM
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/9] vsock: updates for SO_RCVLOWAT handling
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/9] vmci/vsock: use 'target' in notify_poll_in, callback
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 5/9] vsock: SO_RCVLOWAT transport set callback
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/9] vmci/vsock: use 'target' in notify_poll_in, callback
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/9] vsock: use sk_rcvlowat to set POLLIN/POLLRDNORM
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH 11/12] drm/format-helper: Rework XRGB8888-to-MONO conversion
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 12/12] drm/format-helper: Move destination-buffer handling into internal helper
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 08/12] drm/format-helper: Rework RGB888-to-XRGB8888 conversion
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 09/12] drm/format-helper: Rework XRGB8888-to-XRGB2101010 conversion
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 10/12] drm/format-helper: Rework XRGB8888-to-GRAY8 conversion
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 07/12] drm/format-helper: Rework RGB565-to-XRGB8888 conversion
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 05/12] drm/format-helper: Rework XRGB8888-to-RGBG565 conversion
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 06/12] drm/format-helper: Rework XRGB8888-to-RGB888 conversion
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 04/12] drm/format-helper: Rework XRGB8888-to-RGBG332 conversion
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 03/12] drm/format-helper: Convert drm_fb_swab() to struct iosys_map
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 02/12] drm/format-helper: Merge drm_fb_memcpy() and drm_fb_memcpy_toio()
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 01/12] drm/format-helper: Provide drm_fb_blit()
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 00/12] drm/format-helper: Move to struct iosys_map
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH 1/1] iommu/hyper-v: Use helper instead of directly accessing affinity
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- RE: [PATCH 1/1] iommu/hyper-v: Use helper instead of directly accessing affinity
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] iommu/hyper-v: Use helper instead of directly accessing affinity
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH 1/1] iommu/hyper-v: Use helper instead of directly accessing affinity
- From: Joerg Roedel <joro@xxxxxxxxxx>
- RE: [PATCH 1/1] iommu/hyper-v: Use helper instead of directly accessing affinity
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] iommu/hyper-v: Use helper instead of directly accessing affinity
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH 1/1] iommu/hyper-v: Use helper instead of directly accessing affinity
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v2 11/13] video/hyperv_fb: Avoid taking busy spinlock on panic path
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- RE: linux-next: Tree for Jul 25 (drivers/iommu/hyperv-iommu.c)
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: linux-next: Tree for Jul 25 (drivers/iommu/hyperv-iommu.c)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- RE: [PATCH v2 12/13] drivers/hv/vmbus, video/hyperv_fb: Untangle and refactor Hyper-V panic notifiers
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v4 09/25] KVM: VMX: nVMX: Support TSC scaling and PERF_GLOBAL_CTRL with enlightened VMCS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH v2 11/13] video/hyperv_fb: Avoid taking busy spinlock on panic path
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v4 09/25] KVM: VMX: nVMX: Support TSC scaling and PERF_GLOBAL_CTRL with enlightened VMCS
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH] Drivers: hv: vmbus: Optimize vmbus_on_event
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v2 9/9] vmci/vsock: check SO_RCVLOWAT before wake up reader
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v2 8/9] virtio/vsock: check SO_RCVLOWAT before wake up reader
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v2 7/9] vsock: add API call for data ready
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v2 6/9] hv_sock: disable SO_RCVLOWAT support
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v2 5/9] vsock: SO_RCVLOWAT transport set callback
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v2 4/9] vsock_test: POLLIN + SO_RCVLOWAT test
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v2 3/9] vmci/vsock: use 'target' in notify_poll_in, callback
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v2 2/9] virtio/vsock: use 'target' in notify_poll_in, callback
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v2 1/9] vsock: use sk_rcvlowat to set POLLIN/POLLRDNORM
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- [RFC PATCH v2 0/9] vsock: updates for SO_RCVLOWAT handling
- From: Arseniy Krasnov <AVKrasnov@xxxxxxxxxxxxxx>
- Re: [PATCH] swiotlb: Clean up some coding style and minor issues
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v4 15/25] KVM: VMX: Extend VMX controls macro shenanigans
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v4 15/25] KVM: VMX: Extend VMX controls macro shenanigans
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 15/25] KVM: VMX: Extend VMX controls macro shenanigans
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v4 15/25] KVM: VMX: Extend VMX controls macro shenanigans
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 01/25] KVM: x86: hyper-v: Expose access to debug MSRs in the partition privilege flags
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH] swiotlb: Clean up some coding style and minor issues
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- RE: [PATCH] swiotlb: Clean up some coding style and minor issues
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH] swiotlb: Clean up some coding style and minor issues
- From: "hch@xxxxxxxxxxxxx" <hch@xxxxxxxxxxxxx>
- RE: [PATCH] swiotlb: Clean up some coding style and minor issues
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH] swiotlb: Clean up some coding style and minor issues
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v4 24/25] KVM: VMX: Cache MSR_IA32_VMX_MISC in vmcs_config
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 21/25] KVM: VMX: Move LOAD_IA32_PERF_GLOBAL_CTRL errata handling out of setup_vmcs_config()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 18/25] KVM: VMX: Add missing CPU based VM execution controls to vmcs_config
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 17/25] KVM: VMX: Add missing VMEXIT controls to vmcs_config
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 16/25] KVM: VMX: Move CPU_BASED_CR8_{LOAD,STORE}_EXITING filtering out of setup_vmcs_config()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 15/25] KVM: VMX: Extend VMX controls macro shenanigans
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 14/25] KVM: VMX: Tweak the special handling of SECONDARY_EXEC_ENCLS_EXITING in setup_vmcs_config()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 13/25] KVM: VMX: Check CPU_BASED_{INTR,NMI}_WINDOW_EXITING in setup_vmcs_config()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 12/25] KVM: VMX: Check VM_ENTRY_IA32E_MODE in setup_vmcs_config()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 09/25] KVM: VMX: nVMX: Support TSC scaling and PERF_GLOBAL_CTRL with enlightened VMCS
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v4 01/25] KVM: x86: hyper-v: Expose access to debug MSRs in the partition privilege flags
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 33/39] KVM: selftests: nVMX: Allocate Hyper-V partition assist page
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 28/39] KVM: selftests: Fill in vm->vpages_mapped bitmap in virt_map() too
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [EXTERNAL] Re: [Patch v4 12/12] RDMA/mana_ib: Add a driver for Microsoft Azure Network Adapter
- From: Ajay Sharma <sharmaajay@xxxxxxxxxxxxx>
- Re: [Patch v4 03/12] net: mana: Handle vport sharing between devices
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- RE: [Patch v4 03/12] net: mana: Handle vport sharing between devices
- From: Long Li <longli@xxxxxxxxxxxxx>
- RE: [Patch v4 12/12] RDMA/mana_ib: Add a driver for Microsoft Azure Network Adapter
- From: Long Li <longli@xxxxxxxxxxxxx>
- RE: [PATCH] fbdev: Fix order of arguments to aperture_remove_conflicting_devices()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [Patch v4 03/12] net: mana: Handle vport sharing between devices
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 07/13] parisc: Replace regular spinlock with spin_trylock on panic path
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH v2 07/13] parisc: Replace regular spinlock with spin_trylock on panic path
- From: Helge Deller <deller@xxxxxx>
- Re: [PATCH v2 09/13] notifier: Show function names on notifier routines if DEBUG_NOTIFIERS is set
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH v2 07/13] parisc: Replace regular spinlock with spin_trylock on panic path
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH v2 04/13] soc: bcm: brcmstb: Document panic notifier action and remove useless header
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [Patch v4 12/12] RDMA/mana_ib: Add a driver for Microsoft Azure Network Adapter
- From: Cheng Xu <chengyou@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] fbdev: Fix order of arguments to aperture_remove_conflicting_devices()
- From: Javier Martinez Canillas <javierm@xxxxxxxxxx>
- [PATCH] fbdev: Fix order of arguments to aperture_remove_conflicting_devices()
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- RE: [Patch v4 06/12] net: mana: Define data structures for protection domain and memory registration
- From: Long Li <longli@xxxxxxxxxxxxx>
- RE: [Patch v4 03/12] net: mana: Handle vport sharing between devices
- From: Long Li <longli@xxxxxxxxxxxxx>
- Re: [Patch v4 12/12] RDMA/mana_ib: Add a driver for Microsoft Azure Network Adapter
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [Patch v4 06/12] net: mana: Define data structures for protection domain and memory registration
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [Patch v4 04/12] net: mana: Add functions for allocating doorbell page from GDMA
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [Patch v4 03/12] net: mana: Handle vport sharing between devices
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH v2 04/13] soc: bcm: brcmstb: Document panic notifier action and remove useless header
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH V4] swiotlb: Split up single swiotlb lock
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH V4] swiotlb: Split up single swiotlb lock
- From: "hch@xxxxxxxxxxxxx" <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2 07/13] parisc: Replace regular spinlock with spin_trylock on panic path
- From: Jeroen Roovers <jer@xxxxxxxxx>
- Re: [PATCH v2 09/13] notifier: Show function names on notifier routines if DEBUG_NOTIFIERS is set
- From: Arjan van de Ven <arjan@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 09/13] notifier: Show function names on notifier routines if DEBUG_NOTIFIERS is set
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH v2 09/13] notifier: Show function names on notifier routines if DEBUG_NOTIFIERS is set
- From: Arjan van de Ven <arjan@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 09/13] notifier: Show function names on notifier routines if DEBUG_NOTIFIERS is set
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- Re: [PATCH v2 09/13] notifier: Show function names on notifier routines if DEBUG_NOTIFIERS is set
- From: Arjan van de Ven <arjan@xxxxxxxxxxxxxxx>
- [PATCH v2 12/13] drivers/hv/vmbus, video/hyperv_fb: Untangle and refactor Hyper-V panic notifiers
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- [PATCH v2 13/13] panic: Fixes the panic_print NMI backtrace setting
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- [PATCH v2 11/13] video/hyperv_fb: Avoid taking busy spinlock on panic path
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- [PATCH v2 10/13] EDAC/altera: Skip the panic notifier if kdump is loaded
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- [PATCH v2 09/13] notifier: Show function names on notifier routines if DEBUG_NOTIFIERS is set
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- [PATCH v2 08/13] tracing: Improve panic/die notifiers
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- [PATCH v2 07/13] parisc: Replace regular spinlock with spin_trylock on panic path
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- [PATCH v2 06/13] um: Improve panic notifiers consistency and ordering
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- [PATCH v2 05/13] alpha: Clean-up the panic notifier code
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- [PATCH v2 04/13] soc: bcm: brcmstb: Document panic notifier action and remove useless header
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- [PATCH v2 03/13] firmware: google: Test spinlock on panic path to avoid lockups
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- [PATCH v2 02/13] notifier: Add panic notifiers info and purge trailing whitespaces
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- [PATCH v2 01/13] ARM: Disable FIQs (but not IRQs) on CPUs shutdown paths
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- [PATCH v2 00/13] The panic notifiers refactor strikes back - fixes/clean-ups
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxx>
- RE: [PATCH V4] swiotlb: Split up single swiotlb lock
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH][next] Drivers: hv: Fix spelling mistake "total_pages_commited" -> "total_pages_committed"
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v2 0/3] Documentation: hyperv: Add basic info on Hyper-V enlightenments
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Fully initialize 'struct kvm_lapic_irq' in kvm_pv_kick_cpu_op()
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v8 08/39] x86/hyperv: Introduce HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK constants
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 20/39] KVM: nVMX: hyper-v: Cache VP assist page in 'struct kvm_vcpu_hv'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 07/39] KVM: x86: Prepare kvm_hv_flush_tlb() to handle L2's GPAs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 17/39] KVM: x86: hyper-v: L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 19/39] x86/hyperv: Fix 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 34/39] KVM: selftests: nSVM: Allocate Hyper-V partition assist and VP assist pages
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 39/39] KVM: selftests: Rename 'evmcs_test' to 'hyperv_evmcs'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 10/39] KVM: x86: hyper-v: Don't use sparse_set_to_vcpu_mask() in kvm_hv_send_ipi()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 11/39] KVM: x86: hyper-v: Create a separate fifo for L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 03/39] KVM: x86: hyper-v: Introduce TLB flush fifo
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 38/39] KVM: selftests: hyperv_svm_test: Introduce L2 TLB flush test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 29/39] KVM: selftests: Export vm_vaddr_unused_gap() to make it possible to request unmapped ranges
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 35/39] KVM: selftests: Sync 'struct hv_vp_assist_page' definition with hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 30/39] KVM: selftests: Export _vm_get_page_table_entry()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 18/39] KVM: x86: hyper-v: Introduce fast guest_hv_cpuid_has_l2_tlb_flush() check
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 26/39] KVM: selftests: Move the function doing Hyper-V hypercall to a common header
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 00/39] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 33/39] KVM: selftests: nVMX: Allocate Hyper-V partition assist page
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 21/39] KVM: nVMX: hyper-v: Enable L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 22/39] KVM: nSVM: hyper-v: Enable L2 TLB flush
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 37/39] KVM: selftests: Move Hyper-V VP assist page enablement out of evmcs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 02/39] KVM: x86: hyper-v: Resurrect dedicated KVM_REQ_HV_TLB_FLUSH flag
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 31/39] KVM: selftests: Hyper-V PV TLB flush selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 32/39] KVM: selftests: Sync 'struct hv_enlightened_vmcs' definition with hyperv-tlfs.h
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 28/39] KVM: selftests: Fill in vm->vpages_mapped bitmap in virt_map() too
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 12/39] KVM: x86: hyper-v: Use preallocated buffer in 'struct kvm_vcpu_hv' instead of on-stack 'sparse_banks'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 24/39] KVM: selftests: Better XMM read/write helpers
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 14/39] KVM: nSVM: Keep track of Hyper-V hv_vm_id/hv_vp_id
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 06/39] KVM: x86: hyper-v: Expose support for extended gva ranges for flush hypercalls
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 36/39] KVM: selftests: evmcs_test: Introduce L2 TLB flush test
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 27/39] KVM: selftests: Hyper-V PV IPI selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 23/39] KVM: x86: Expose Hyper-V L2 TLB flush feature
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 09/39] KVM: x86: hyper-v: Use HV_MAX_SPARSE_VCPU_BANKS/HV_VCPUS_PER_SPARSE_BANK instead of raw '64'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 25/39] KVM: selftests: Move HYPERV_LINUX_OS_ID definition to a common header
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 15/39] KVM: x86: Introduce .hv_inject_synthetic_vmexit_post_tlb_flush() nested hook
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 04/39] KVM: x86: hyper-v: Add helper to read hypercall data for array
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 05/39] KVM: x86: hyper-v: Handle HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST{,EX} calls gently
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 16/39] KVM: x86: hyper-v: Introduce kvm_hv_is_tlb_flush_hcall()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 13/39] KVM: nVMX: Keep track of hv_vm_id/hv_vp_id when eVMCS is in use
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v8 01/39] KVM: x86: Rename 'enable_direct_tlbflush' to 'enable_l2_tlb_flush'
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v7 00/39] KVM: x86: hyper-v: Fine-grained TLB flush + L2 TLB flush features
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH][next] Drivers: hv: Fix spelling mistake "total_pages_commited" -> "total_pages_committed"
- From: Colin Ian King <colin.i.king@xxxxxxxxx>
- Re: [PATCH v4 08/25] KVM: selftests: Switch to updated eVMCSv1 definition
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 11/25] KVM: VMX: Get rid of eVMCS specific VMX controls sanitization
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 06/25] KVM: x86: hyper-v: Cache HYPERV_CPUID_NESTED_FEATURES CPUID leaf
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 03/25] x86/hyperv: Update 'struct hv_enlightened_vmcs' definition
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v4 07/25] KVM: selftests: Add ENCLS_EXITING_BITMAP{,HIGH} VMCS fields
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v4 22/25] KVM: nVMX: Always set required-1 bits of pinbased_ctls to PIN_BASED_ALWAYSON_WITHOUT_TRUE_MSR
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 25/25] KVM: nVMX: Use cached host MSR_IA32_VMX_MISC value for setting up nested MSR
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 24/25] KVM: VMX: Cache MSR_IA32_VMX_MISC in vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 15/25] KVM: VMX: Extend VMX controls macro shenanigans
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 12/25] KVM: VMX: Check VM_ENTRY_IA32E_MODE in setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 23/25] KVM: nVMX: Use sanitized allowed-1 bits for VMX control MSRs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 21/25] KVM: VMX: Move LOAD_IA32_PERF_GLOBAL_CTRL errata handling out of setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 14/25] KVM: VMX: Tweak the special handling of SECONDARY_EXEC_ENCLS_EXITING in setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 20/25] KVM: x86: VMX: Replace some Intel model numbers with mnemonics
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 09/25] KVM: VMX: nVMX: Support TSC scaling and PERF_GLOBAL_CTRL with enlightened VMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 18/25] KVM: VMX: Add missing CPU based VM execution controls to vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 13/25] KVM: VMX: Check CPU_BASED_{INTR,NMI}_WINDOW_EXITING in setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 17/25] KVM: VMX: Add missing VMEXIT controls to vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 19/25] KVM: VMX: Adjust CR3/INVPLG interception for EPT=y at runtime, not setup
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 16/25] KVM: VMX: Move CPU_BASED_CR8_{LOAD,STORE}_EXITING filtering out of setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 11/25] KVM: VMX: Get rid of eVMCS specific VMX controls sanitization
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 10/25] KVM: selftests: Enable TSC scaling in evmcs selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 08/25] KVM: selftests: Switch to updated eVMCSv1 definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 05/25] KVM: nVMX: Support several new fields in eVMCSv1
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 07/25] KVM: selftests: Add ENCLS_EXITING_BITMAP{,HIGH} VMCS fields
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 06/25] KVM: x86: hyper-v: Cache HYPERV_CPUID_NESTED_FEATURES CPUID leaf
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 03/25] x86/hyperv: Update 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 02/25] x86/hyperv: Fix 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 04/25] KVM: VMX: Define VMCS-to-EVMCS conversion for the new fields
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 01/25] KVM: x86: hyper-v: Expose access to debug MSRs in the partition privilege flags
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v4 00/25] KVM: VMX: Support updated eVMCSv1 revision + use vmcs_config for L1 VMX MSRs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 0/3] Documentation: hyperv: Add basic info on Hyper-V enlightenments
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH v3 06/25] KVM: x86: hyper-v: Cache HYPERV_CPUID_NESTED_FEATURES CPUID leaf
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v3 1/1] Create debugfs file with hyper-v balloon usage information
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- RE: [Patch v4 12/12] RDMA/mana_ib: Add a driver for Microsoft Azure Network Adapter
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v4 06/12] net: mana: Define data structures for protection domain and memory registration
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [Patch v4 12/12] RDMA/mana_ib: Add a driver for Microsoft Azure Network Adapter
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- RE: [Patch v4 06/12] net: mana: Define data structures for protection domain and memory registration
- From: Ajay Sharma <sharmaajay@xxxxxxxxxxxxx>
- RE: [Patch v4 12/12] RDMA/mana_ib: Add a driver for Microsoft Azure Network Adapter
- From: Ajay Sharma <sharmaajay@xxxxxxxxxxxxx>
- RE: [Patch v4 12/12] RDMA/mana_ib: Add a driver for Microsoft Azure Network Adapter
- From: Long Li <longli@xxxxxxxxxxxxx>
- Re: [Patch v4 12/12] RDMA/mana_ib: Add a driver for Microsoft Azure Network Adapter
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- RE: [Patch v4 10/12] net: mana: Define max values for SGL entries
- From: Long Li <longli@xxxxxxxxxxxxx>
- RE: [Patch v4 07/12] net: mana: Export Work Queue functions for use by RDMA driver
- From: Long Li <longli@xxxxxxxxxxxxx>
- RE: [Patch v4 04/12] net: mana: Add functions for allocating doorbell page from GDMA
- From: Long Li <longli@xxxxxxxxxxxxx>
- RE: [Patch v4 03/12] net: mana: Handle vport sharing between devices
- From: Long Li <longli@xxxxxxxxxxxxx>
- RE: [Patch v4 01/12] net: mana: Add support for auxiliary device
- From: Long Li <longli@xxxxxxxxxxxxx>
- RE: [PATCH v3 1/1] Create debugfs file with hyper-v balloon usage information
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v3 03/25] x86/hyperv: Update 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v3 11/25] KVM: VMX: Get rid of eVMCS specific VMX controls sanitization
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 11/25] KVM: VMX: Get rid of eVMCS specific VMX controls sanitization
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v3 25/25] KVM: nVMX: Use cached host MSR_IA32_VMX_MISC value for setting up nested MSR
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 24/25] KVM: VMX: Cache MSR_IA32_VMX_MISC in vmcs_config
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 23/25] KVM: nVMX: Use sanitized allowed-1 bits for VMX control MSRs
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 22/25] KVM: nVMX: Always set required-1 bits of pinbased_ctls to PIN_BASED_ALWAYSON_WITHOUT_TRUE_MSR
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 21/25] KVM: VMX: Move LOAD_IA32_PERF_GLOBAL_CTRL errata handling out of setup_vmcs_config()
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 20/25] KVM: x86: VMX: Replace some Intel model numbers with mnemonics
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 19/25] KVM: VMX: Adjust CR3/INVPLG interception for EPT=y at runtime, not setup
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 18/25] KVM: VMX: Add missing CPU based VM execution controls to vmcs_config
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 17/25] KVM: VMX: Add missing VMEXIT controls to vmcs_config
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 16/25] KVM: VMX: Move CPU_BASED_CR8_{LOAD,STORE}_EXITING filtering out of setup_vmcs_config()
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 15/25] KVM: VMX: Extend VMX controls macro shenanigans
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 14/25] KVM: VMX: Tweak the special handling of SECONDARY_EXEC_ENCLS_EXITING in setup_vmcs_config()
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 13/25] KVM: VMX: Check CPU_BASED_{INTR,NMI}_WINDOW_EXITING in setup_vmcs_config()
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 12/25] KVM: VMX: Check VM_ENTRY_IA32E_MODE in setup_vmcs_config()
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 11/25] KVM: VMX: Get rid of eVMCS specific VMX controls sanitization
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 10/25] KVM: selftests: Enable TSC scaling in evmcs selftest
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 09/25] KVM: VMX: nVMX: Support TSC scaling and PERF_GLOBAL_CTRL with enlightened VMCS
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 08/25] KVM: selftests: Switch to updated eVMCSv1 definition
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 07/25] KVM: selftests: Add ENCLS_EXITING_BITMAP{,HIGH} VMCS fields
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 06/25] KVM: x86: hyper-v: Cache HYPERV_CPUID_NESTED_FEATURES CPUID leaf
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 05/25] KVM: nVMX: Support several new fields in eVMCSv1
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 03/25] x86/hyperv: Update 'struct hv_enlightened_vmcs' definition
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 04/25] KVM: VMX: Define VMCS-to-EVMCS conversion for the new fields
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH v3 01/25] KVM: x86: hyper-v: Expose access to debug MSRs in the partition privilege flags
- From: Maxim Levitsky <mlevitsk@xxxxxxxxxx>
- Re: [PATCH V4] swiotlb: Split up single swiotlb lock
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2] drm/hyperv : Removing the restruction of VRAM allocation with PCI bar size
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH] PCI: hv: Take a const cpumask in hv_compose_msi_req_get_cpu()
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v2 0/3] Documentation: hyperv: Add basic info on Hyper-V enlightenments
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v3] Drivers: hv: vm_bus: Handle vmbus rescind calls after vmbus is suspended
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- [PATCH v3 1/1] Create debugfs file with hyper-v balloon usage information
- From: Alexander Atanasov <alexander.atanasov@xxxxxxxxxxxxx>
- RE: [PATCH v3] Drivers: hv: vm_bus: Handle vmbus rescind calls after vmbus is suspended
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 1/3] Documentation: hyperv: Add overview of Hyper-V enlightenments
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 2/3] Documentation: hyperv: Add overview of VMbus
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 3/3] Documentation: hyperv: Add overview of clocks and timers
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 0/3] Documentation: hyperv: Add basic info on Hyper-V enlightenments
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v3] Drivers: hv: vm_bus: Handle vmbus rescind calls after vmbus is suspended
- From: Shradha Gupta <shradhagupta@xxxxxxxxxxxxxxxxxxx>
- RE: [Patch v4 12/12] RDMA/mana_ib: Add a driver for Microsoft Azure Network Adapter
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v4 11/12] net: mana: Define and process GDMA response code GDMA_STATUS_MORE_ENTRIES
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v4 10/12] net: mana: Define max values for SGL entries
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v4 09/12] net: mana: Move header files to a common location
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v2] Drivers: hv: vm_bus: Handle vmbus rescind calls after vmbus is suspended
- From: kernel test robot <lkp@xxxxxxxxx>
- RE: [Patch v4 08/12] net: mana: Record port number in netdev
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v4 07/12] net: mana: Export Work Queue functions for use by RDMA driver
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v4 05/12] net: mana: Set the DMA device max segment size
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v4 06/12] net: mana: Define data structures for protection domain and memory registration
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v4 04/12] net: mana: Add functions for allocating doorbell page from GDMA
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v4 03/12] net: mana: Handle vport sharing between devices
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v4 02/12] net: mana: Record the physical address for doorbell page region
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [Patch v4 01/12] net: mana: Add support for auxiliary device
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2] Drivers: hv: vm_bus: Handle vmbus rescind calls after vmbus is suspended
- From: Shradha Gupta <shradhagupta@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/1] Create debugfs file with hyper-v balloon usage information
- From: Alexander Atanasov <alexander.atanasov@xxxxxxxxxxxxx>
- Re: [PATCH V3] swiotlb: Split up single swiotlb lock
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V4] swiotlb: Split up single swiotlb lock
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Fully initialize 'struct kvm_lapic_irq' in kvm_pv_kick_cpu_op()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH v2 1/1] Create debugfs file with hyper-v balloon usage information
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH v3 15/25] KVM: VMX: Extend VMX controls macro shenanigans
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 14/25] KVM: VMX: Tweak the special handling of SECONDARY_EXEC_ENCLS_EXITING in setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 05/25] KVM: nVMX: Support several new fields in eVMCSv1
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 09/25] KVM: VMX: nVMX: Support TSC scaling and PERF_GLOBAL_CTRL with enlightened VMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 24/25] KVM: VMX: Cache MSR_IA32_VMX_MISC in vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 16/25] KVM: VMX: Move CPU_BASED_CR8_{LOAD,STORE}_EXITING filtering out of setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 04/25] KVM: VMX: Define VMCS-to-EVMCS conversion for the new fields
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 12/25] KVM: VMX: Check VM_ENTRY_IA32E_MODE in setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 11/25] KVM: VMX: Get rid of eVMCS specific VMX controls sanitization
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 22/25] KVM: nVMX: Always set required-1 bits of pinbased_ctls to PIN_BASED_ALWAYSON_WITHOUT_TRUE_MSR
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 21/25] KVM: VMX: Move LOAD_IA32_PERF_GLOBAL_CTRL errata handling out of setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 25/25] KVM: nVMX: Use cached host MSR_IA32_VMX_MISC value for setting up nested MSR
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 06/25] KVM: x86: hyper-v: Cache HYPERV_CPUID_NESTED_FEATURES CPUID leaf
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 08/25] KVM: selftests: Switch to updated eVMCSv1 definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 20/25] KVM: x86: VMX: Replace some Intel model numbers with mnemonics
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 17/25] KVM: VMX: Add missing VMEXIT controls to vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 07/25] KVM: selftests: Add ENCLS_EXITING_BITMAP{,HIGH} VMCS fields
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 13/25] KVM: VMX: Check CPU_BASED_{INTR,NMI}_WINDOW_EXITING in setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 23/25] KVM: nVMX: Use sanitized allowed-1 bits for VMX control MSRs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 18/25] KVM: VMX: Add missing CPU based VM execution controls to vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 19/25] KVM: VMX: Adjust CR3/INVPLG interception for EPT=y at runtime, not setup
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 10/25] KVM: selftests: Enable TSC scaling in evmcs selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 03/25] x86/hyperv: Update 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 02/25] x86/hyperv: Fix 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 01/25] KVM: x86: hyper-v: Expose access to debug MSRs in the partition privilege flags
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v3 00/25] KVM: VMX: Support updated eVMCSv1 revision + use vmcs_config for L1 VMX MSRs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2] KVM: x86: Fully initialize 'struct kvm_lapic_irq' in kvm_pv_kick_cpu_op()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2] KVM: x86: Fully initialize 'struct kvm_lapic_irq' in kvm_pv_kick_cpu_op()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH] scsi: storvsc: Prevent running tasklet for long
- From: Jeremi Piotrowski <jpiotrowski@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fully initialize 'struct kvm_lapic_irq' in kvm_pv_kick_cpu_op()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- RE: [PATCH] scsi: storvsc: Prevent running tasklet for long
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] scsi: storvsc: Prevent running tasklet for long
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 22/28] KVM: VMX: Clear controls obsoleted by EPT at runtime, not setup
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- RE: [PATCH] PCI: hv: Take a const cpumask in hv_compose_msi_req_get_cpu()
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH] PCI: hv: Take a const cpumask in hv_compose_msi_req_get_cpu()
- From: Samuel Holland <samuel@xxxxxxxxxxxx>
- Re: [PATCH v2 22/28] KVM: VMX: Clear controls obsoleted by EPT at runtime, not setup
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2 22/28] KVM: VMX: Clear controls obsoleted by EPT at runtime, not setup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 22/28] KVM: VMX: Clear controls obsoleted by EPT at runtime, not setup
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2 22/28] KVM: VMX: Clear controls obsoleted by EPT at runtime, not setup
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] KVM: x86: Fully initialize 'struct kvm_lapic_irq' in kvm_pv_kick_cpu_op()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V3] swiotlb: Split up single swiotlb lock
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2 06/28] KVM: nVMX: Introduce KVM_CAP_HYPERV_ENLIGHTENED_VMCS2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 06/28] KVM: nVMX: Introduce KVM_CAP_HYPERV_ENLIGHTENED_VMCS2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 22/28] KVM: VMX: Clear controls obsoleted by EPT at runtime, not setup
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] dma-direct: Fix dma_direct_{alloc,free}() for Hyperv-V IVMs
- From: Andrea Parri <parri.andrea@xxxxxxxxx>
- Re: [PATCH v3 6/8] genirq: Add and use an irq_data_update_affinity helper
- From: Oleksandr Tyshchenko <Oleksandr_Tyshchenko@xxxxxxxx>
- Re: [PATCH v2 24/28] KVM: nVMX: Use sanitized allowed-1 bits for VMX control MSRs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 23/28] KVM: VMX: Move LOAD_IA32_PERF_GLOBAL_CTRL errata handling out of setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v3 1/8] irqchip/mips-gic: Only register IPI domain when SMP is enabled
- From: Serge Semin <fancer.lancer@xxxxxxxxx>
- Re: [PATCH v2 20/28] KVM: VMX: Add missing VMENTRY controls to vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 13/28] KVM: VMX: Get rid of eVMCS specific VMX controls sanitization
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 08/28] KVM: VMX: Support TSC scaling with enlightened VMCS
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 06/28] KVM: nVMX: Introduce KVM_CAP_HYPERV_ENLIGHTENED_VMCS2
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v3 6/8] genirq: Add and use an irq_data_update_affinity helper
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH V3] swiotlb: Split up single swiotlb lock
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v3 1/8] irqchip/mips-gic: Only register IPI domain when SMP is enabled
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 2/2] dma-direct: Fix dma_direct_{alloc,free}() for Hyperv-V IVMs
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 00/14] KVM: nVMX: Use vmcs_config for setting up nested VMX MSRs
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 13/28] KVM: VMX: Get rid of eVMCS specific VMX controls sanitization
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 06/28] KVM: nVMX: Introduce KVM_CAP_HYPERV_ENLIGHTENED_VMCS2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC PATCH 2/2] dma-direct: Fix dma_direct_{alloc,free}() for Hyperv-V IVMs
- From: "Andrea Parri (Microsoft)" <parri.andrea@xxxxxxxxx>
- [RFC PATCH 1/2] swiotlb,dma-direct: Move swiotlb_unencrypted_base to direct.c
- From: "Andrea Parri (Microsoft)" <parri.andrea@xxxxxxxxx>
- [RFC PATCH 0/2] dma_direct_{alloc,free}() for Hyper-V IVMs
- From: "Andrea Parri (Microsoft)" <parri.andrea@xxxxxxxxx>
- RE: [PATCH 3/3] Documentation: hyperv: Add overview of clocks and timers
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v2 15/28] KVM: VMX: Check CPU_BASED_{INTR,NMI}_WINDOW_EXITING in setup_vmcs_config()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- RE: [PATCH 0/3] Documentation: hyperv: Add basic info on Hyper-V enlightenments
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 3/3] Documentation: hyperv: Add overview of clocks and timers
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- [PATCH v2 1/1] Create debugfs file with hyper-v balloon usage information
- From: Alexander Atanasov <alexander.atanasov@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] Documentation: hyperv: Add basic info on Hyper-V enlightenments
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v1 1/1] Create debugfs file with hyper-v balloon usage information
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH] scsi: storvsc: Prevent running tasklet for long
- From: Praveen Kumar <kumarpraveen@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] scsi: storvsc: Prevent running tasklet for long
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 2/2] x86/ACPI: Set swiotlb area according to the number of lapic entry in MADT
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH] scsi: storvsc: Prevent running tasklet for long
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] scsi: storvsc: Prevent running tasklet for long
- From: Praveen Kumar <kumarpraveen@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] x86/ACPI: Set swiotlb area according to the number of lapic entry in MADT
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] x86/ACPI: Set swiotlb area according to the number of lapic entry in MADT
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH 2/2] x86/ACPI: Set swiotlb area according to the number of lapic entry in MADT
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- RE: [PATCH] scsi: storvsc: Prevent running tasklet for long
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v1 1/1] Create debugfs file with hyper-v balloon usage information
- From: "Denis V. Lunev" <den@xxxxxxxxxxxxx>
- RE: [PATCH v1 1/1] Create debugfs file with hyper-v balloon usage information
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH 3/3] Documentation: hyperv: Add overview of clocks and timers
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH 2/3] Documentation: hyperv: Add overview of VMbus
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH 1/3] Documentation: hyperv: Add overview of Hyper-V enlightenments
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH 0/3] Documentation: hyperv: Add basic info on Hyper-V enlightenments
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH] Drivers: hv: vm_bus: Handle vmbus rescind calls after vmbus is suspended
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH] scsi: storvsc: Prevent running tasklet for long
- From: Saurabh Sengar <ssengar@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/8] irqchip/mips-gic: Only register IPI domain when SMP is enabled
- From: Serge Semin <fancer.lancer@xxxxxxxxx>
- [PATCH v1 1/1] Create debugfs file with hyper-v balloon usage information
- From: Alexander Atanasov <alexander.atanasov@xxxxxxxxxxxxx>
- Re: [PATCH v3 6/8] genirq: Add and use an irq_data_update_affinity helper
- From: Oleksandr <olekstysh@xxxxxxxxx>
- Re: [PATCH v3 7/8] genirq: Return a const cpumask from irq_data_get_affinity_mask
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- RE: [PATCH v3 7/8] genirq: Return a const cpumask from irq_data_get_affinity_mask
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- [PATCH] Drivers: hv: vm_bus: Handle vmbus rescind calls after vmbus is suspended
- From: Shradha Gupta <shradhagupta@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 24/28] KVM: nVMX: Use sanitized allowed-1 bits for VMX control MSRs
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v3 5/8] genirq: Refactor accessors to use irq_data_get_affinity_mask
- From: Samuel Holland <samuel@xxxxxxxxxxxx>
- [PATCH v3 7/8] genirq: Return a const cpumask from irq_data_get_affinity_mask
- From: Samuel Holland <samuel@xxxxxxxxxxxx>
- [PATCH v3 6/8] genirq: Add and use an irq_data_update_affinity helper
- From: Samuel Holland <samuel@xxxxxxxxxxxx>
- [PATCH v3 4/8] genirq: Drop redundant irq_init_effective_affinity
- From: Samuel Holland <samuel@xxxxxxxxxxxx>
- [PATCH v3 1/8] irqchip/mips-gic: Only register IPI domain when SMP is enabled
- From: Samuel Holland <samuel@xxxxxxxxxxxx>
- [PATCH v3 0/8] genirq: Provide real IRQ affinity masks in non-SMP configs
- From: Samuel Holland <samuel@xxxxxxxxxxxx>
- [PATCH v3 2/8] genirq: GENERIC_IRQ_IPI depends on SMP
- From: Samuel Holland <samuel@xxxxxxxxxxxx>
- [PATCH v3 8/8] genirq: Provide an IRQ affinity mask in non-SMP configs
- From: Samuel Holland <samuel@xxxxxxxxxxxx>
- [PATCH v3 3/8] genirq: GENERIC_IRQ_EFFECTIVE_AFF_MASK depends on SMP
- From: Samuel Holland <samuel@xxxxxxxxxxxx>
- Re: [PATCH v2 23/28] KVM: VMX: Move LOAD_IA32_PERF_GLOBAL_CTRL errata handling out of setup_vmcs_config()
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2 22/28] KVM: VMX: Clear controls obsoleted by EPT at runtime, not setup
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2 21/28] KVM: VMX: Add missing CPU based VM execution controls to vmcs_config
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2 19/28] KVM: VMX: Add missing VMEXIT controls to vmcs_config
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2 20/28] KVM: VMX: Add missing VMENTRY controls to vmcs_config
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2 15/28] KVM: VMX: Check CPU_BASED_{INTR,NMI}_WINDOW_EXITING in setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 18/28] KVM: VMX: Move CPU_BASED_CR8_{LOAD,STORE}_EXITING filtering out of setup_vmcs_config()
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2 15/28] KVM: VMX: Check CPU_BASED_{INTR,NMI}_WINDOW_EXITING in setup_vmcs_config()
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH 2/2] x86/ACPI: Set swiotlb area according to the number of lapic entry in MADT
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V2 1/1] swiotlb: Split up single swiotlb lock
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v2 28/28] KVM: nVMX: Use cached host MSR_IA32_VMX_MISC value for setting up nested MSR
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- RE: [PATCH 04/14] KVM: VMX: Extend VMX controls macro shenanigans
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 28/28] KVM: nVMX: Use cached host MSR_IA32_VMX_MISC value for setting up nested MSR
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 16/28] KVM: VMX: Tweak the special handling of SECONDARY_EXEC_ENCLS_EXITING in setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH 00/14] KVM: nVMX: Use vmcs_config for setting up nested VMX MSRs
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- RE: [PATCH 04/14] KVM: VMX: Extend VMX controls macro shenanigans
- From: "Dong, Eddie" <eddie.dong@xxxxxxxxx>
- Re: [PATCH v2 14/28] KVM: VMX: Check VM_ENTRY_IA32E_MODE in setup_vmcs_config()
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2 16/28] KVM: VMX: Tweak the special handling of SECONDARY_EXEC_ENCLS_EXITING in setup_vmcs_config()
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2 28/28] KVM: nVMX: Use cached host MSR_IA32_VMX_MISC value for setting up nested MSR
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- Re: [PATCH v2 27/28] KVM: VMX: Cache MSR_IA32_VMX_MISC in vmcs_config
- From: Jim Mattson <jmattson@xxxxxxxxxx>
- [PATCH v2 15/28] KVM: VMX: Check CPU_BASED_{INTR,NMI}_WINDOW_EXITING in setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 27/28] KVM: VMX: Cache MSR_IA32_VMX_MISC in vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 28/28] KVM: nVMX: Use cached host MSR_IA32_VMX_MISC value for setting up nested MSR
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 26/28] KVM: nVMX: Use sanitized required-1 bits for VMX control MSRs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 24/28] KVM: nVMX: Use sanitized allowed-1 bits for VMX control MSRs
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 23/28] KVM: VMX: Move LOAD_IA32_PERF_GLOBAL_CTRL errata handling out of setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 19/28] KVM: VMX: Add missing VMEXIT controls to vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 25/28] KVM: VMX: Store required-1 VMX controls in vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 22/28] KVM: VMX: Clear controls obsoleted by EPT at runtime, not setup
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 11/28] KVM: selftests: Enable TSC scaling in evmcs selftest
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 03/28] x86/hyperv: Update 'struct hv_enlightened_vmcs' definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 09/28] KVM: selftests: Add ENCLS_EXITING_BITMAP{,HIGH} VMCS fields
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 21/28] KVM: VMX: Add missing CPU based VM execution controls to vmcs_config
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 04/28] KVM: VMX: Define VMCS-to-EVMCS conversion for the new fields
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 07/28] KVM: selftests: Switch to KVM_CAP_HYPERV_ENLIGHTENED_VMCS2
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 14/28] KVM: VMX: Check VM_ENTRY_IA32E_MODE in setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 10/28] KVM: selftests: Switch to updated eVMCSv1 definition
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 16/28] KVM: VMX: Tweak the special handling of SECONDARY_EXEC_ENCLS_EXITING in setup_vmcs_config()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
[Index of Archives]
[Linux Samsung SoC]
[Linux Rockchip SoC]
[Linux for Synopsys ARC Processors]
[Linux Actions SoC]
[Linux Kernel]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Scanners]
[Yosemite Forum]