messages from 2023-10-16 15:44:58 to 2023-10-16 16:52:32 UTC [more...]
[PATCH] firmware: ti_sci: Use device_get_match_data()
2023-10-16 16:44 UTC (2+ messages)
[PATCH] dt-bindings: serial: re-order entries to match coding convention
2023-10-16 16:43 UTC (3+ messages)
[PATCH 1/3] PCI: layerscape: add function pointer for exit_from_l2()
2023-10-16 16:40 UTC (2+ messages)
[PATCH v16 000/116] KVM TDX basic feature support
2023-10-16 16:15 UTC (113+ messages)
` [PATCH v16 001/116] KVM: VMX: Move out vmx_x86_ops to 'main.c' to wrap VMX and TDX
` [PATCH v16 002/116] KVM: x86/vmx: initialize loaded_vmcss_on_cpu in vmx_hardware_setup()
` [PATCH v16 003/116] KVM: x86/vmx: Refactor KVM VMX module init/exit functions
` [PATCH v16 004/116] KVM: VMX: Reorder vmx initialization with kvm vendor initialization
` [PATCH v16 005/116] KVM: TDX: Initialize the TDX module when loading the KVM intel kernel module
` [PATCH v16 006/116] KVM: TDX: Add placeholders for TDX VM/vcpu structure
` [PATCH v16 007/116] KVM: TDX: Make TDX VM type supported
` [PATCH v16 008/116] [MARKER] The start of TDX KVM patch series: TDX architectural definitions
` [PATCH v16 009/116] KVM: TDX: Define "
` [PATCH v16 010/116] KVM: TDX: Add TDX "architectural" error codes
` [PATCH v16 011/116] KVM: TDX: Add C wrapper functions for SEAMCALLs to the TDX module
` [PATCH v16 012/116] KVM: TDX: Retry SEAMCALL on the lack of entropy error
` [PATCH v16 013/116] KVM: TDX: Add helper functions to print TDX SEAMCALL error
` [PATCH v16 014/116] [MARKER] The start of TDX KVM patch series: TD VM creation/destruction
` [PATCH v16 016/116] x86/virt/tdx: Add a helper function to return system wide info about TDX module
` [PATCH v16 017/116] KVM: TDX: Add place holder for TDX VM specific mem_enc_op ioctl
` [PATCH v16 018/116] KVM: TDX: x86: Add ioctl to get TDX systemwide parameters
` [PATCH v16 019/116] KVM: x86, tdx: Make KVM_CAP_MAX_VCPUS backend specific
` [PATCH v16 020/116] KVM: TDX: create/destroy VM structure
` [PATCH v16 021/116] KVM: TDX: initialize VM with TDX specific parameters
` [PATCH v16 023/116] KVM: TDX: Refuse to unplug the last cpu on the package
` [PATCH v16 024/116] [MARKER] The start of TDX KVM patch series: TD vcpu creation/destruction
` [PATCH v16 025/116] KVM: TDX: allocate/free TDX vcpu structure
` [PATCH v16 027/116] [MARKER] The start of TDX KVM patch series: KVM MMU GPA shared bits
` [PATCH v16 028/116] KVM: x86/mmu: introduce config for PRIVATE KVM MMU
` [PATCH v16 029/116] KVM: x86/mmu: Add address conversion functions for TDX shared bit of GPA
` [PATCH v16 030/116] [MARKER] The start of TDX KVM patch series: KVM TDP refactoring for TDX
` [PATCH v16 031/116] KVM: Allow page-sized MMU caches to be initialized with custom 64-bit values
` [PATCH v16 032/116] KVM: x86/mmu: Replace hardcoded value 0 for the initial value for SPTE
` [PATCH v16 033/116] KVM: x86/mmu: Allow non-zero value for non-present SPTE and removed SPTE
` [PATCH v16 034/116] KVM: x86/mmu: Add Suppress VE bit to shadow_mmio_mask/shadow_present_mask
` [PATCH v16 035/116] KVM: x86/mmu: Track shadow MMIO value on a per-VM basis
` [PATCH v16 036/116] KVM: x86/mmu: Disallow fast page fault on private GPA
` [PATCH v16 037/116] KVM: x86/mmu: Allow per-VM override of the TDP max page level
` [PATCH v16 038/116] KVM: VMX: Introduce test mode related to EPT violation VE
` [PATCH v16 039/116] [MARKER] The start of TDX KVM patch series: KVM TDP MMU hooks
` [PATCH v16 040/116] KVM: x86/mmu: Assume guest MMIOs are shared
` [PATCH v16 041/116] KVM: x86/tdp_mmu: Init role member of struct kvm_mmu_page at allocation
` [PATCH v16 042/116] KVM: x86/mmu: Add a new is_private member for union kvm_mmu_page_role
` [PATCH v16 043/116] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
` [PATCH v16 044/116] KVM: x86/tdp_mmu: Don't zap private pages for unsupported cases
` [PATCH v16 045/116] KVM: x86/tdp_mmu: Sprinkle __must_check
` [PATCH v16 046/116] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
` [PATCH v16 047/116] [MARKER] The start of TDX KVM patch series: TDX EPT violation
` [PATCH v16 048/116] KVM: x86/mmu: TDX: Do not enable page track for TD guest
` [PATCH v16 049/116] KVM: VMX: Split out guts of EPT violation to common/exposed function
` [PATCH v16 050/116] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
` [PATCH v16 051/116] KVM: TDX: Add accessors VMX VMCS helpers
` [PATCH v16 052/116] KVM: TDX: Add load_mmu_pgd method for TDX
` [PATCH v16 053/116] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
` [PATCH v16 054/116] KVM: TDX: Require TDP MMU and mmio caching for TDX
` [PATCH v16 055/116] KVM: TDX: TDP MMU TDX support
` [PATCH v16 056/116] KVM: TDX: MTRR: implement get_mt_mask() for TDX
` [PATCH v16 057/116] [MARKER] The start of TDX KVM patch series: TD finalization
` [PATCH v16 058/116] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
` [PATCH v16 059/116] KVM: TDX: Create initial guest memory
` [PATCH v16 060/116] KVM: TDX: Finalize VM initialization
` [PATCH v16 061/116] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
` [PATCH v16 062/116] KVM: TDX: Implement TDX vcpu enter/exit path
` [PATCH v16 063/116] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
` [PATCH v16 064/116] KVM: TDX: restore host xsave state when exit from the guest TD
` [PATCH v16 065/116] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
` [PATCH v16 066/116] KVM: TDX: restore user ret MSRs
` [PATCH v16 067/116] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
` [PATCH v16 068/116] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
` [PATCH v16 069/116] KVM: TDX: complete interrupts after tdexit
` [PATCH v16 070/116] KVM: TDX: restore debug store when TD exit
` [PATCH v16 071/116] KVM: TDX: handle vcpu migration over logical processor
` [PATCH v16 072/116] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
` [PATCH v16 073/116] KVM: TDX: Add support for find pending IRQ in a protected local APIC
` [PATCH v16 074/116] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
` [PATCH v16 075/116] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
` [PATCH v16 076/116] KVM: TDX: Implement interrupt injection
` [PATCH v16 077/116] KVM: TDX: Implements vcpu request_immediate_exit
` [PATCH v16 078/116] KVM: TDX: Implement methods to inject NMI
` [PATCH v16 079/116] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
` [PATCH v16 080/116] KVM: VMX: Move NMI/exception handler to common helper
` [PATCH v16 081/116] KVM: x86: Split core of hypercall emulation to helper function
` [PATCH v16 082/116] KVM: TDX: Add a place holder to handle TDX VM exit
` [PATCH v16 083/116] KVM: TDX: Handle vmentry failure for INTEL TD guest
` [PATCH v16 084/116] KVM: TDX: handle EXIT_REASON_OTHER_SMI
` [PATCH v16 085/116] KVM: TDX: handle ept violation/misconfig exit
` [PATCH v16 086/116] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
` [PATCH v16 087/116] KVM: TDX: Handle EXIT_REASON_OTHER_SMI with MSMI
` [PATCH v16 088/116] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
` [PATCH v16 089/116] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
` [PATCH v16 090/116] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL
` [PATCH v16 091/116] KVM: TDX: Handle TDX PV CPUID hypercall
` [PATCH v16 092/116] KVM: TDX: Handle TDX PV HLT hypercall
` [PATCH v16 093/116] KVM: TDX: Handle TDX PV port io hypercall
` [PATCH v16 094/116] KVM: TDX: Handle TDX PV MMIO hypercall
` [PATCH v16 095/116] KVM: TDX: Implement callbacks for MSR operations for TDX
` [PATCH v16 096/116] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
` [PATCH v16 097/116] KVM: TDX: Handle MSR MTRRCap and MTRRDefType access
` [PATCH v16 098/116] KVM: TDX: Handle MSR IA32_FEAT_CTL MSR and IA32_MCG_EXT_CTL
` [PATCH v16 099/116] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
` [PATCH v16 100/116] KVM: TDX: Silently discard SMI request
` [PATCH v16 101/116] KVM: TDX: Silently ignore INIT/SIPI
` [PATCH v16 102/116] KVM: TDX: Add methods to ignore accesses to CPU state
` [PATCH v16 103/116] KVM: TDX: Add methods to ignore guest instruction emulation
` [PATCH v16 104/116] KVM: TDX: Add a method to ignore dirty logging
` [PATCH v16 105/116] KVM: TDX: Add methods to ignore VMX preemption timer
` [PATCH v16 106/116] KVM: TDX: Add methods to ignore accesses to TSC
` [PATCH v16 107/116] KVM: TDX: Ignore setting up mce
` [PATCH v16 108/116] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch
` [PATCH v16 109/116] KVM: TDX: Add methods to ignore virtual apic related operation
` [PATCH v16 111/116] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
` [PATCH v16 112/116] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
` [PATCH v16 113/116] KVM: TDX: Add hint TDX ioctl to release Secure-EPT
` [PATCH v16 114/116] RFC: KVM: x86: Add x86 callback to check cpuid
` [PATCH v16 115/116] RFC: KVM: x86, TDX: Add check for KVM_SET_CPUID2
` [PATCH v16 116/116] [MARKER] the end of (the first phase of) TDX KVM patch series
[RFC PATCH v5 00/16] KVM TDX: TDP MMU: large page support
2023-10-16 16:21 UTC (15+ messages)
` [RFC PATCH v5 02/16] KVM: TDX: Pass page level to cache flush before TDX SEAMCALL
` [RFC PATCH v5 03/16] KVM: TDX: Pass KVM page level to tdh_mem_page_add() and tdh_mem_page_aug()
` [RFC PATCH v5 04/16] KVM: TDX: Pass size to tdx_measure_page()
` [RFC PATCH v5 05/16] KVM: TDX: Pass size to reclaim_page()
` [RFC PATCH v5 06/16] KVM: TDX: Update tdx_sept_{set,drop}_private_spte() to support large page
` [RFC PATCH v5 07/16] KVM: MMU: Introduce level info in PFERR code
` [RFC PATCH v5 09/16] KVM: TDX: Pass desired page level in err code for page fault handler
` [RFC PATCH v5 10/16] KVM: x86/tdp_mmu: Allocate private page table for large page split
` [RFC PATCH v5 11/16] KVM: x86/tdp_mmu: Split the large page when zap leaf
` [RFC PATCH v5 12/16] KVM: x86/tdp_mmu, TDX: Split a large page when 4KB page within it converted to shared
` [RFC PATCH v5 13/16] KVM: x86/tdp_mmu: Try to merge pages into a large page
` [RFC PATCH v5 14/16] KVM: x86/tdp_mmu: TDX: Implement "
` [RFC PATCH v5 15/16] KVM: x86/mmu: Make kvm fault handler aware of large page of private memslot
` [RFC PATCH v5 16/16] KVM: TDX: Allow 2MB large page for TD GUEST
mm: Unable to handle kernel NULL pointer dereference at virtual address - mmap_region (include/linux/fs.h:580 mm/mmap.c:2946)
2023-10-16 16:32 UTC (3+ messages)
[PATCH 2/2] ath10k: mac: enable WIPHY_FLAG_CHANNEL_CHANGE_ON_BEACON on ath10k
2023-10-16 16:41 UTC (4+ messages)
[PATCHv2] efi/unaccepted: Fix soft lockups caused by parallel memory acceptance
2023-10-16 16:41 UTC (2+ messages)
[PATCH v20 1/4] usb: Add support for Intel LJCA device
2023-10-16 16:05 UTC (11+ messages)
[RFC PATCH 00/53] netfs, afs, cifs: Delegate high-level I/O to netfslib
2023-10-16 16:31 UTC (6+ messages)
` [RFC PATCH 02/53] netfs: Track the fpos above which the server has no data
` [RFC PATCH 03/53] netfs: Note nonblockingness in the netfs_io_request struct
[PATCH v2 1/3] PCI: layerscape: Add function pointer for exit_from_l2()
2023-10-16 16:17 UTC (3+ messages)
` [PATCH v2 2/3] PCI: layerscape: Add suspend/resume for ls1021a
` [PATCH v2 3/3] PCI: layerscape: Add suspend/resume for ls1043a
[PATCH net-next v5 00/16] net: Make timestamping selectable
2023-10-16 16:23 UTC (11+ messages)
` [PATCH net-next v5 08/16] net: ethtool: Add a command to expose current time stamping layer
[RFC PATCH 00/53] netfs, afs, cifs: Delegate high-level I/O to netfslib
2023-10-16 16:19 UTC (11+ messages)
` [RFC PATCH 07/53] netfs: Provide invalidate_folio and release_folio calls
` [RFC PATCH 08/53] netfs: Add rsize to netfs_io_request
` [RFC PATCH 09/53] netfs: Implement unbuffered/DIO vs buffered I/O locking
` [RFC PATCH 11/53] netfs: Add support for DIO buffering
[PATCH v7 00/16] introduce more MDP3 components in MT8195
2023-10-16 16:21 UTC (6+ messages)
` [PATCH v7 15/16] dt-bindings: display: mediatek: split: add compatible for MT8195
[PATCH] selftests/nolibc: add tests for multi-object linkage
2023-10-16 16:24 UTC (11+ messages)
[PATCH RFC 1/1] KVM: x86: add param to update master clock periodically
2023-10-16 16:25 UTC (14+ messages)
[PATCH 2/3] PCI: layerscape: add suspend/resume for ls1021a
2023-10-16 16:25 UTC (6+ messages)
[PATCH net v2] net: ti: icssg-prueth: Fix r30 CMDs bitmasks
2023-10-16 16:28 UTC (2+ messages)
[PATCH] KVM: x86: hyper-v: Don't auto-enable stimer during deserialization
2023-10-16 16:27 UTC (4+ messages)
[PATCH v4 0/3] permit write-sealed memfd read-only shared mappings
2023-10-16 16:27 UTC (3+ messages)
` [PATCH v4 3/3] mm: perform the mapping_map_writable() check after call_mmap()
[PATCH v3 1/2] x86/cpu/intel: Fix MTRR verification for TME enabled platforms
2023-10-16 16:26 UTC (9+ messages)
[PATCH] x86/mce: Increase the size of the MCE pool from 2 to 8 pages
2023-10-16 16:14 UTC (8+ messages)
[PATCH net-next,v3] tcp: Set pingpong threshold via sysctl
2023-10-16 16:17 UTC (2+ messages)
[PATCH] efi/unaccepted: Fix soft lockups caused by parallel memory acceptance
2023-10-16 16:11 UTC (3+ messages)
[PATCH] Input: synaptics: enable InterTouch for ThinkPad L14 G1
2023-10-16 15:51 UTC (2+ messages)
[PATCH v1 1/6] leds: gpio: Keep driver firmware interface agnostic
2023-10-16 16:10 UTC (6+ messages)
` [PATCH v1 2/6] leds: gpio: Utilise PTR_ERR_OR_ZERO()
` [PATCH v1 3/6] leds: gpio: Refactor code to use devm_gpiod_get_index_optional()
` [PATCH v1 4/6] leds: gpio: Move temporary variable for struct device to gpio_led_probe()
` [PATCH v1 5/6] leds: gpio: Remove unneeded assignment
` [PATCH v1 6/6] leds: gpio: Update headers
[PATCH v2] ACPI: resource: Do IRQ override on TongFang GMxXGxx
2023-10-16 16:08 UTC
[PATCH 6.5 000/191] 6.5.8-rc1 review
2023-10-16 16:05 UTC (3+ messages)
` [PATCH 6.5 006/191] arm_pmu: acpi: Add a representative platform device for TRBE
[PATCH] Bluetooth: hci_bcm4377: Mark bcm4378/bcm4387 as BROKEN_LE_CODED
2023-10-16 16:03 UTC (2+ messages)
[PATCH] scsi: use ATA-12 pass-thru for OPAL as fallback
2023-10-16 16:01 UTC (7+ messages)
[GIT PULL] firewire updates for 6.5-rc1
2023-10-16 15:56 UTC (9+ messages)
[PATCH] [WIP] configfs: improve item creation performance
2023-10-16 15:56 UTC (4+ messages)
` [PATCH v2] "
[PATCH] dt-bindings: ata: tegra: Disallow undefined properties
2023-10-16 15:55 UTC
[PATCH] ASoC: dt-bindings: tas5805m: Disallow undefined properties
2023-10-16 15:55 UTC
[PATCH] dt-bindings: soundwire: Add reference to soundwire-controller.yaml schema
2023-10-16 15:55 UTC
[PATCH v3] perf bench sched pipe: Add -G/--cgroups option
2023-10-16 15:55 UTC (6+ messages)
[PATCH] dt-bindings: usb: ti,tps6598x: Disallow undefined properties
2023-10-16 15:55 UTC
[PATCH] rbtree: Examine rb_add* helpers in rbtree_test
2023-10-16 15:55 UTC
[PATCH 5.15 000/102] 5.15.136-rc1 review
2023-10-16 15:53 UTC (4+ messages)
[PATCH v2] mm: kmsan: Panic on failure to allocate early boot metadata
2023-10-16 15:52 UTC (2+ messages)
[PATCH net-next v2 1/3] sock: Code cleanup on __sk_mem_raise_allocated()
2023-10-16 15:52 UTC (5+ messages)
` [PATCH net-next v2 2/3] sock: Doc behaviors for pressure heurisitics
` [PATCH net-next v2 3/3] sock: Fix improper heuristic on raising memory
[RFC PATCH] tracing: change syscall number type in struct syscall_trace_*
2023-10-16 15:53 UTC (8+ messages)
` [RFC PATCH bpf-next] bpf: change syscall_nr type to int in struct syscall_tp_t
[PATCH][next] ASoC: sigmadsp: Add __counted_by for struct sigmadsp_data and use struct_size()
2023-10-16 15:33 UTC (2+ messages)
[PATCH 0/5] i3c: master: some improvment for i3c master
2023-10-16 15:46 UTC (6+ messages)
` [PATCH 1/5] i3c: master: svc: enable hotjoin default
` [PATCH 2/5] i3c: add actual in i3c_priv_xfer
` [PATCH 3/5] i3c: svc: rename read_len as actual_len
` [PATCH 4/5] i3c: master: svc return actual transfer data len
` [PATCH 5/5] i3c: add API i3c_dev_gettstatus_format1() to get target device status
[PATCH v2] mm/migrate: correct nr_failed in migrate_pages_sync()
2023-10-16 15:44 UTC (2+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox