messages from 2026-03-10 11:55:50 to 2026-03-11 09:19:59 UTC [more...]
[PATCH 00/61] treewide: Use IS_ERR_OR_NULL over manual NULL check - refactor
2026-03-11 9:19 UTC (74+ messages)
` [PATCH 03/61] ceph: Prefer IS_ERR_OR_NULL over manual NULL check
` [Intel-wired-lan] "
` [PATCH 06/61] 9p: "
` [Intel-wired-lan] "
` [PATCH 08/61] fuse: "
` [Intel-wired-lan] "
` [PATCH 12/61] quota: "
` [Intel-wired-lan] "
` [PATCH 13/61] squashfs: "
` [Intel-wired-lan] "
` [PATCH 15/61] trace: "
` [PATCH 16/61] sched: "
` [Intel-wired-lan] "
` [PATCH 17/61] module: "
` [Intel-wired-lan] "
` [PATCH 18/61] sound: "
` [PATCH 22/61] md: "
` [Intel-wired-lan] "
` [PATCH 24/61] net/9p: "
` [Intel-wired-lan] "
` [PATCH 25/61] net/bluetooth: "
` [PATCH 27/61] net/netlink: "
` [PATCH 28/61] net/sched: "
` [PATCH 29/61] net/sctp: "
` [PATCH 30/61] net/sunrpc: "
` [PATCH 32/61] net/wireless: "
` [PATCH 37/61] drm: "
` [PATCH 38/61] net: "
` [EXTERNAL] "
` [PATCH 40/61] phy: "
` [PATCH 41/61] pinctrl: "
` [PATCH 42/61] pmdomain: "
` [PATCH 43/61] s390: "
` [PATCH 45/61] thermal: "
` [PATCH 46/61] vfio: "
` [PATCH 47/61] nfc: "
` [PATCH 48/61] mtd: "
` [PATCH 49/61] media: "
` [PATCH 50/61] iommu: "
` [PATCH 51/61] leds: "
` (subset) "
` [PATCH 52/61] gpib: "
` [PATCH 53/61] hyperv: "
` [PATCH 54/61] aoe: "
` [PATCH 55/61] interconnect: "
` [PATCH 56/61] clk: "
` [PATCH 57/61] reset: "
` [PATCH 58/61] arch/x86: "
` [PATCH 59/61] debugobjects: Drop likely() around !IS_ERR_OR_NULL()
` [PATCH 60/61] Input alps: Drop unlikely() around IS_ERR_OR_NULL()
` [PATCH 61/61] file: "
[PATCH v7 0/2] LoongArch: KVM: Add DMSINTC support irqchip in kernel
2026-03-11 8:50 UTC (3+ messages)
` [PATCH v7 1/2] LoongArch: KVM: Add DMSINTC device support
` [PATCH v7 2/2] LoongArch: KVM: Add dmsintc inject msi to the dest vcpu
[PATCH v4 0/6] x86: Cleanups around slow_down_io()
2026-03-11 9:16 UTC (2+ messages)
[PATCH v1 00/16] mm: cleanups around unmapping / zapping
2026-03-11 9:15 UTC (16+ messages)
` [PATCH v1 04/16] mm/memory: simplify calculation in unmap_mapping_range_tree()
` [PATCH v1 09/16] mm/memory: convert details->even_cows into details->skip_cows
` [PATCH v1 10/16] mm/memory: use __zap_vma_range() in zap_vma_for_reaping()
` [PATCH v1 15/16] mm: rename zap_vma_ptes() to zap_special_vma_range()
` [PATCH v1 16/16] mm/memory: support VM_MIXEDMAP in zap_special_vma_range()
[PATCH v3] coverity: fix coverity issues related to confidential guest reset
2026-03-11 7:40 UTC
[PATCH v2] coverity: fix coverity issues related to confidential guest reset
2026-03-11 7:38 UTC (2+ messages)
[PATCH] coverity: fix coverity issues related to confidential guest reset
2026-03-11 7:46 UTC (2+ messages)
[PATCH v3 00/15] Make RamDiscardManager work with multiple sources
2026-03-11 7:17 UTC (4+ messages)
[PATCH v2] s390/mm: add missing secure storage access fixups for donated memory
2026-03-11 7:00 UTC (4+ messages)
[PATCH RFC v2 00/15] Add virtualization support for EGM
2026-03-11 6:47 UTC (3+ messages)
[PATCH 0/3] LoongArch: KVM: Some small enhanments
2026-03-11 6:30 UTC (8+ messages)
` [PATCH 1/3] LoongArch: KVM: Add kvm_request_pending checking in kvm_late_check_requests()
` [PATCH 2/3] LoongArch: KVM: Move host CSR_EENTRY save in context switch
` [PATCH 3/3] LoongArch: KVM: Set vcpu_is_preempted() macro rather than function
[PATCH v2 0/7] Add RMPOPT support
2026-03-11 6:00 UTC (5+ messages)
` [PATCH v2 5/7] KVM: guest_memfd: Add cleanup interface for guest teardown
[PATCH 0/2] KVM: SEV: Fix a CR8 intercept goof with SEV-ES guests
2026-03-11 4:56 UTC (5+ messages)
` [PATCH 1/2] KVM: SEV: Don't set CR8 write intercept when disabling AVIC for "
` [PATCH 2/2] KVM: selftests: Verify SEV+ guests can read and write EFER, CR0, CR4, and CR8
[PATCH 0/7] KVM: SVM: Enable FRED support
2026-03-11 4:18 UTC (11+ messages)
` [PATCH 1/7] KVM: SVM: Initialize FRED VMCB fields
` [PATCH 5/7] KVM: SVM: Support FRED nested exception injection
[PATCH 1/1] vfio/pci: add PCIe TPH device ioctl
2026-03-11 3:58 UTC (7+ messages)
[PATCH v2 0/4] mm: move vma_(kernel|mmu)_pagesize() out of hugetlb.c
2026-03-11 3:36 UTC (3+ messages)
` [PATCH v2 4/4] KVM: PPC: remove hugetlb.h inclusion
[PATCH v2 1/2] drivers/vfio_pci_core: Change PXD_ORDER check from switch case to if/else block
2026-03-11 2:20 UTC (3+ messages)
[PATCH 0/7] KVM: x86: APX reg prep work
2026-03-11 2:03 UTC (9+ messages)
` [PATCH 1/7] KVM: x86: Add dedicated storage for guest RIP
` [PATCH 2/7] KVM: x86: Drop the "EX" part of "EXREG" to avoid collision with APX
` [PATCH 3/7] KVM: nVMX: Do a bitwise-AND of regs_avail when switching active VMCS
` [PATCH 4/7] KVM: x86: Add wrapper APIs to reset dirty/available register masks
` [PATCH 5/7] KVM: x86: Track available/dirty register masks as "unsigned long" values
` [PATCH 6/7] KVM: x86: Use a proper bitmap for tracking available/dirty registers
` [PATCH 7/7] *** DO NOT MERGE *** KVM: x86: Pretend that APX is supported on 64-bit kernels
[PATCH] KVM: VMX: Eliminate warnings by sparse in vmcs12.c and hyperv_evmcs.c
2026-03-11 1:59 UTC
[PATCH 0/2] KVM: x86: Syzkaller nested_run_pending defense
2026-03-11 1:53 UTC (4+ messages)
` [PATCH 1/2] KVM: x86: Move nested_run_pending to kvm_vcpu_arch
` [PATCH 2/2] KVM: x86: Suppress WARNs on nested_run_pending after userspace exit
[PATCH] KVM: SVM: Add a helper to get LBR field pointer to dedup MSR accesses
2026-03-11 1:45 UTC (2+ messages)
[PATCH v2 0/9] Upgrade intel vPMU version to 5
2026-03-11 1:37 UTC (3+ messages)
[PATCH v2 0/2] kthread, exit: clean up kernel thread exit paths
2026-03-11 0:02 UTC (6+ messages)
` [PATCH v2 1/2] kthread: remove kthread_exit()
` [PATCH v2 2/2] tree-wide: rename do_exit() to task_exit()
[PATCH 00/21] Fixes and lock cleanup+hardening
2026-03-10 23:48 UTC (22+ messages)
` [PATCH 01/21] KVM: selftests: Remove duplicate LAUNCH_UPDATE_VMSA call in SEV-ES migrate test
` [PATCH 02/21] KVM: SEV: Reject attempts to sync VMSA of an already-launched/encrypted vCPU
` [PATCH 03/21] KVM: SEV: Protect *all* of sev_mem_enc_register_region() with kvm->lock
` [PATCH 04/21] KVM: SEV: Disallow LAUNCH_FINISH if vCPUs are actively being created
` [PATCH 05/21] KVM: SEV: Lock all vCPUs when synchronzing VMSAs for SNP launch finish
` [PATCH 06/21] KVM: SEV: Lock all vCPUs for the duration of SEV-ES VMSA synchronization
` [PATCH 07/21] KVM: SEV: Provide vCPU-scoped accessors for detecting SEV+ guests
` [PATCH 08/21] KVM: SEV: Add quad-underscore version of VM-scoped APIs to detect "
` [PATCH 09/21] KVM: SEV: Document the SEV-ES check when querying SMM support as "safe"
` [PATCH 10/21] KVM: SEV: Move standard VM-scoped helpers to detect SEV+ guests to sev.c
` [PATCH 11/21] KVM: SEV: Move SEV-specific VM initialization "
` [PATCH 12/21] KVM: SEV: WARN on unhandled VM type when initializing VM
` [PATCH 13/21] KVM: SEV: Hide "struct kvm_sev_info" behind CONFIG_KVM_AMD_SEV=y
` [PATCH 14/21] KVM: SEV: Document that checking for SEV+ guests when reclaiming memory is "safe"
` [PATCH 15/21] KVM: SEV: Assert that kvm->lock is held when querying SEV+ support
` [PATCH 16/21] KVM: SEV: use mutex guard in snp_launch_update()
` [PATCH 17/21] KVM: SEV: use mutex guard in sev_mem_enc_ioctl()
` [PATCH 18/21] KVM: SEV: use mutex guard in sev_mem_enc_unregister_region()
` [PATCH 19/21] KVM: SEV: use mutex guard in snp_handle_guest_req()
` [PATCH 20/21] KVM: SVM: Move lock-protected allocation of SEV ASID into a separate helper
` [PATCH 21/21] KVM: SEV: Goto an existing error label if charging misc_cg for an ASID fails
[PATCH v2 00/16] KVM: x86: Enable APX for guests
2026-03-10 23:12 UTC (7+ messages)
` [PATCH v2 01/16] KVM: x86: Rename register accessors to be GPR-specific
[PATCH 0/2] KVM: SVM: Fix CR8 intercpetion woes with AVIC
2026-03-10 22:40 UTC (13+ messages)
` [PATCH 2/2] KVM: SVM: Set/clear CR8 write interception when AVIC is (de)activated
[PATCH 00/14] iommu: Add live update state preservation
2026-03-10 21:47 UTC (4+ messages)
` [PATCH 08/14] iommu: Restore and reattach preserved domains to devices
[PATCH 0/5] KVM: x86: check validity of nested state when returning from SMM
2026-03-10 21:46 UTC (9+ messages)
` [PATCH 1/5] KVM: VMX: check validity of VMCS controls "
` [PATCH 2/5] KVM: SVM: check validity of VMCB "
` [PATCH 3/5] selftests: kvm: extract common functionality out of smm_test.c
` [PATCH 4/5] selftests: kvm: add a test that VMX validates controls on RSM
` [PATCH 5/5] KVM: x86: clarify leave_smm() return value
[GIT PULL] KVM: x86 (and a PPC) fixes for 7.0-rc3+
2026-03-10 21:20 UTC (2+ messages)
[PATCH v3 0/3] vfio/pci: Introduce vfio_pci driver for ISM devices
2026-03-10 19:20 UTC (3+ messages)
` [PATCH v3 2/3] vfio/ism: Implement "
[PATCH 0/1] [Test Report] get qutoe time via tdvmcall
2026-03-10 18:58 UTC (5+ messages)
` [PATCH 1/1] virt: tdx-guest: Optimize the get-quote polling interval time
[PATCH] vfio/qat: extend Kconfig dependencies for 420xx and 6xxx devices
2026-03-10 17:40 UTC (4+ messages)
[PATCH V1 vfio 0/6] Add support for PRE_COPY initial bytes re-initialization
2026-03-10 16:40 UTC (7+ messages)
` [PATCH V1 vfio 1/6] vfio: Define uAPI for re-init initial bytes during the PRE_COPY phase
` [PATCH V1 vfio 2/6] vfio: Add support for VFIO_DEVICE_FEATURE_MIG_PRECOPY_INFOv2
` [PATCH V1 vfio 3/6] vfio: Adapt drivers to use the core helper vfio_check_precopy_ioctl
` [PATCH V1 vfio 4/6] net/mlx5: Add IFC bits for migration state
` [PATCH V1 vfio 5/6] vfio/mlx5: consider inflight SAVE during PRE_COPY
` [PATCH V1 vfio 6/6] vfio/mlx5: Add REINIT support to VFIO_MIG_GET_PRECOPY_INFO
[PATCH vfio 0/6] Add support for PRE_COPY initial bytes re-initialization
2026-03-10 16:00 UTC (8+ messages)
Stalls when starting a VSOCK listening socket: soft lockups, RCU stalls, timeout
2026-03-10 15:51 UTC (15+ messages)
[PATCH 01/61] Coccinelle: Prefer IS_ERR_OR_NULL over manual NULL check
2026-03-10 15:41 UTC (2+ messages)
[RFC 0/1] Avoid pagewalk hugepage-split race with VFIO DMA set
2026-03-10 15:19 UTC (7+ messages)
` [RFC 1/1] mm/pagewalk: don't split device-backed huge pfnmaps
[PULL 0/3] Firmware 20260310 patches
2026-03-10 14:52 UTC (5+ messages)
` [PULL 1/3] docs/interop: Add AMD SEV-SNP SVSM interface to firmware.json
` [PULL 2/3] igvm: fix build when igvm is not installed in a well known path
` [PULL 3/3] i386/sev/igvm: do not reset guest policy if IGVM does not set it
[PATCH] KVM: eventfd: Remove redundant synchronize_srcu_expedited from irqfd assignment
2026-03-10 14:12 UTC (4+ messages)
` 答复: [????] "
[PATCH] KVM: s390: log machine checks more aggressively
2026-03-10 13:05 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox