messages from 2023-05-11 02:58:04 to 2023-05-16 19:58:50 UTC [more...]
[PATCH] procfs: consolidate arch_report_meminfo declaration
2023-05-16 19:57 UTC
[PATCH v5 3/6] mm/gup: remove vmas parameter from get_user_pages_remote()
2023-05-16 18:37 UTC (4+ messages)
[PATCH RESEND 0/2] Make PCMCIA and QCOM_HIDMA depend on HAS_IOMEM
2023-05-16 17:56 UTC (3+ messages)
` [PATCH RESEND 2/2] dmaengine: make "
[kvm-unit-tests PATCH v2 0/6] s390x: Add support for running guests without MSO/MSL
2023-05-16 17:30 UTC (11+ messages)
` [kvm-unit-tests PATCH v2 1/6] s390x: add function to set DAT mode for all interrupts
` [kvm-unit-tests PATCH v2 2/6] s390x: sie: switch to home space mode before entering SIE
` [kvm-unit-tests PATCH v2 3/6] s390x: lib: don't forward PSW when handling exception in SIE
` [kvm-unit-tests PATCH v2 4/6] s390x: fix compile of interrupt.c
` [kvm-unit-tests PATCH v2 5/6] s390x: lib: sie: don't reenter SIE on pgm int
` [kvm-unit-tests PATCH v2 6/6] s390x: add a test for SIE without MSO/MSL
[RFC 0/2] allow to inline generic entry
2023-05-16 16:42 UTC (4+ messages)
` [PATCH 1/2] entry: move the exit path to header files
` [PATCH 2/2] entry: move the enter "
[PATCH v2 0/4] Make fprobe + rethook immune to recursion
2023-05-16 16:05 UTC (13+ messages)
` [PATCH v2 1/4] rethook: use preempt_{disable, enable}_notrace in rethook_trampoline_handler
` [PATCH v2 2/4] fprobe: make fprobe_kprobe_handler recursion free
` [PATCH v2 3/4] fprobe: add recursion detection in fprobe_exit_handler
` [PATCH v2 4/4] rehook, fprobe: do not trace rethook related functions
[PATCH 00/23] arch: allow pte_offset_map[_lock]() to fail
2023-05-16 10:41 UTC (21+ messages)
` [PATCH 01/23] arm: "
` [PATCH 05/23] m68k: "
` [PATCH 08/23] parisc: add pte_unmap() to balance get_ptep()
` [PATCH 21/23] x86: Allow get_locked_pte() to fail
[PATCH v9 0/6] iommu/dma: s390 DMA API conversion and optimized IOTLB flushing
2023-05-16 7:58 UTC (11+ messages)
` [PATCH v9 1/6] s390/ism: Set DMA coherent mask
` [PATCH v9 2/6] iommu: Allow .iotlb_sync_map to fail and handle s390's -ENOMEM return
` [PATCH v9 3/6] s390/pci: prepare is_passed_through() for dma-iommu
` [PATCH v9 4/6] s390/pci: Use dma-iommu layer
` [PATCH v9 5/6] iommu/dma: Allow a single FQ in addition to per-CPU FQs
` [PATCH v9 6/6] iommu/dma: Make flush queue sizes and timeout driver configurable
[PATCH 4/4] rehook, fprobe: mark rethook related functions notrace
2023-05-16 7:26 UTC (3+ messages)
[PATCH v5 RESEND 10/17] s390: mm: Convert to GENERIC_IOREMAP
2023-05-16 6:50 UTC (2+ messages)
[PATCH v4 5/9] drivers: use new capable_any functionality
2023-05-16 6:33 UTC (2+ messages)
[PATCH v5 00/26] Remove COMMAND_LINE_SIZE from uapi
2023-05-16 0:53 UTC (3+ messages)
` [PATCH v5 14/26] alpha: Remove empty <uapi/asm/setup.h>
[PATCH v2 00/25] iommu: Make default_domain's mandatory
2023-05-16 0:00 UTC (26+ messages)
` [PATCH v2 01/25] iommu: Add iommu_ops->identity_domain
` [PATCH v2 02/25] iommu: Add IOMMU_DOMAIN_PLATFORM
` [PATCH v2 03/25] powerpc/iommu: Setup a default domain and remove set_platform_dma_ops
` [PATCH v2 04/25] iommu: Add IOMMU_DOMAIN_PLATFORM for S390
` [PATCH v2 05/25] iommu/tegra-gart: Remove tegra-gart
` [PATCH v2 06/25] iommu/mtk_iommu_v1: Implement an IDENTITY domain
` [PATCH v2 07/25] iommu: Reorganize iommu_get_default_domain_type() to respect def_domain_type()
` [PATCH v2 08/25] iommu: Allow an IDENTITY domain as the default_domain in ARM32
` [PATCH v2 09/25] iommu/fsl_pamu: Implement an IDENTITY domain
` [PATCH v2 10/25] iommu/exynos: "
` [PATCH v2 11/25] iommu/tegra-smmu: "
` [PATCH v2 12/25] iommu/tegra-smmu: Support DMA domains in tegra
` [PATCH v2 13/25] iommu/omap: Implement an IDENTITY domain
` [PATCH v2 14/25] iommu/msm: "
` [PATCH v2 15/25] iommufd/selftest: Make the mock iommu driver into a real driver
` [PATCH v2 16/25] iommu: Remove ops->set_platform_dma_ops()
` [PATCH v2 17/25] iommu/qcom_iommu: Add an IOMMU_IDENTITIY_DOMAIN
` [PATCH v2 18/25] iommu/ipmmu: "
` [PATCH v2 19/25] iommu/mtk_iommu: "
` [PATCH v2 20/25] iommu/sun50i: "
` [PATCH v2 21/25] iommu: Require a default_domain for all iommu drivers
` [PATCH v2 22/25] iommu: Add __iommu_group_domain_alloc()
` [PATCH v2 23/25] iommu: Add ops->domain_alloc_paging()
` [PATCH v2 24/25] iommu: Convert simple drivers with DOMAIN_DMA to domain_alloc_paging()
` [PATCH v2 25/25] iommu: Convert remaining simple drivers "
[PATCH bpf-next v1 0/5] net/smc: Introduce BPF injection capability
2023-05-15 22:52 UTC (10+ messages)
` [PATCH bpf-next v1 1/5] net/smc: move smc_sock related structure definition
` [PATCH bpf-next v1 2/5] net/smc: allow smc to negotiate protocols on policies
` [PATCH bpf-next v1 3/5] net/smc: allow set or get smc negotiator by sockopt
` [PATCH bpf-next v1 4/5] bpf: add smc negotiator support in BPF struct_ops
` [PATCH bpf-next v1 5/5] bpf/selftests: add selftest for SMC bpf capability
[PATCH v2 00/34] Split ptdesc from struct page
2023-05-15 19:11 UTC (4+ messages)
` [PATCH v2 30/34] sh: Convert pte_free_tlb() to use ptdescs
[PATCH v2] iommu/s390: Get rid of S390_CCW_IOMMU and S390_AP_IOMMU
2023-05-15 15:27 UTC (2+ messages)
[RFC PATCH v2] fs/xattr: add *at family syscalls
2023-05-15 14:20 UTC (6+ messages)
[kvm-unit-tests PATCH v4 5/7] s390x: pv: Add sie entry intercept and validity test
2023-05-15 14:00 UTC (3+ messages)
` [kvm-unit-tests PATCH v5] "
[PATCH v8 0/6] iommu/dma: s390 DMA API conversion and optimized IOTLB flushing
2023-05-15 9:33 UTC (3+ messages)
[PATCH v3 00/11] Introduce cmpxchg128() -- aka. the demise of cmpxchg_double()
2023-05-15 9:42 UTC (14+ messages)
` [PATCH v3 01/11] cyrpto/b128ops: Remove struct u128
` [PATCH v3 02/11] types: Introduce [us]128
` [PATCH v3 03/11] arch: Introduce arch_{,try_}_cmpxchg128{,_local}()
` [PATCH v3 04/11] instrumentation: Wire up cmpxchg128()
` [PATCH v3 05/11] percpu: Wire up cmpxchg128
` [PATCH v3 06/11] x86,amd_iommu: Replace cmpxchg_double()
` [PATCH v3 07/11] x86,intel_iommu: "
` [PATCH v3 08/11] slub: "
` [PATCH v3 09/11] mm/slub: Fold slab_update_freelist()
` [PATCH v3 10/11] arch: Remove cmpxchg_double
` [PATCH v3 11/11] s390/cpum_sf: Convert to cmpxchg128()
[PATCH v5 00/10] Enhance vfio PCI hot reset for vfio cdev device
2023-05-15 7:47 UTC (14+ messages)
` [PATCH v5 01/10] vfio-iommufd: Create iommufd_access for noiommu devices
` [PATCH v5 02/10] vfio/pci: Update comment around group_fd get in vfio_pci_ioctl_pci_hot_reset()
` [PATCH v5 03/10] vfio/pci: Move the existing hot reset logic to be a helper
` [PATCH v5 04/10] vfio: Mark cdev usage in vfio_device
` [PATCH v5 05/10] iommufd: Reserve all negative IDs in the iommufd xarray
` [PATCH v5 06/10] vfio-iommufd: Add helper to retrieve iommufd_ctx and devid for vfio_device
` [PATCH v5 07/10] vfio: Add helper to search vfio_device in a dev_set
` [PATCH v5 08/10] iommufd: Add iommufd_ctx_has_group()
` [PATCH v5 09/10] vfio/pci: Extend VFIO_DEVICE_GET_PCI_HOT_RESET_INFO for vfio device cdev
` [PATCH v5 10/10] vfio/pci: Allow passing zero-length fd array in VFIO_DEVICE_PCI_HOT_RESET
[PATCH 4/4] rehook, fprobe: mark rethook related functions notrace
2023-05-15 3:13 UTC
[PATCH v11 00/23] Add vfio_device cdev for iommufd support
2023-05-13 13:28 UTC (24+ messages)
` [PATCH v11 01/23] vfio: Allocate per device file structure
` [PATCH v11 02/23] vfio: Refine vfio file kAPIs for KVM
` [PATCH v11 03/23] vfio: Accept vfio device file in the KVM facing kAPI
` [PATCH v11 04/23] kvm/vfio: Rename kvm_vfio_group to prepare for accepting vfio device fd
` [PATCH v11 05/23] kvm/vfio: Accept vfio device file from userspace
` [PATCH v11 06/23] vfio: Pass struct vfio_device_file * to vfio_device_open/close()
` [PATCH v11 07/23] vfio: Block device access via device fd until device is opened
` [PATCH v11 08/23] vfio: Add cdev_device_open_cnt to vfio_group
` [PATCH v11 09/23] vfio: Make vfio_device_open() single open for device cdev path
` [PATCH v11 10/23] vfio-iommufd: Move noiommu compat probe out of vfio_iommufd_bind()
` [PATCH v11 11/23] vfio-iommufd: Split bind/attach into two steps
` [PATCH v11 12/23] vfio: Record devid in vfio_device_file
` [PATCH v11 13/23] vfio-iommufd: Add detach_ioas support for physical VFIO devices
` [PATCH v11 14/23] iommufd/device: Add iommufd_access_detach() API
` [PATCH v11 15/23] vfio-iommufd: Add detach_ioas support for emulated VFIO devices
` [PATCH v11 16/23] vfio: Name noiommu vfio_device with "noiommu-" prefix
` [PATCH v11 17/23] vfio: Move vfio_device_group_unregister() to be the first operation in unregister
` [PATCH v11 18/23] vfio: Add cdev for vfio_device
` [PATCH v11 19/23] vfio: Add VFIO_DEVICE_BIND_IOMMUFD
` [PATCH v11 20/23] vfio: Add VFIO_DEVICE_[AT|DE]TACH_IOMMUFD_PT
` [PATCH v11 21/23] vfio: Determine noiommu device in __vfio_register_dev()
` [PATCH v11 22/23] vfio: Compile vfio_group infrastructure optionally
` [PATCH v11 23/23] docs: vfio: Add vfio device cdev description
[PATCH 0/5] s390/uvdevice: Expose secret UVCs
2023-05-13 6:10 UTC (11+ messages)
` [PATCH 1/5] s390/uvdevice: Add info IOCTL
` [PATCH 2/5] s390/uvdevice: Add 'Add Secret' UVC
` [PATCH 3/5] s390/uvdevice: Add 'List Secrets' UVC
` [PATCH 4/5] s390/uvdevice: Add 'Lock Secret Store' UVC
` [PATCH 5/5] s390/uv: Update query for secret-UVCs
[PATCH 02/20] iommu/terga-gart: Replace set_platform_dma_ops() with IOMMU_DOMAIN_PLATFORM
2023-05-12 20:52 UTC (11+ messages)
[PATCH] s390/Kconfig: remove obsolete configs SCHED_{BOOK,DRAWER}
2023-05-12 15:08 UTC (2+ messages)
[PATCH v10 00/22] Add vfio_device cdev for iommufd support
2023-05-12 7:57 UTC (4+ messages)
` [PATCH v10 05/22] kvm/vfio: Accept vfio device file from userspace
[PATCH v2 0/2] KVM: s390: CMMA migration selftest and small bugfix
2023-05-12 7:54 UTC (5+ messages)
` [PATCH v2 1/2] KVM: s390: fix KVM_S390_GET_CMMA_BITS for GFNs in memslot holes
[PATCH 0/1] KVM: s390: vsie: fix the length of APCB bitmap
2023-05-12 7:17 UTC (3+ messages)
` [PATCH 1/1] "
[RFC][PATCH 0/9] local_clock() vs noinstr
2023-05-12 6:00 UTC (7+ messages)
` [RFC][PATCH 7/9] x86/tsc: Provide sched_clock_noinstr()
[PATCH] cachestat: wire up cachestat for other architectures
2023-05-11 19:34 UTC (8+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).