LKML Archive mirror
 help / color / mirror / Atom feed
 messages from 2024-01-22 23:55:40 to 2024-01-23 00:55:32 UTC [more...]

DMAR-IR: IRQ remapping was enabled on dmar6 but we are not in kdump mode
 2024-01-23  0:55 UTC  (4+ messages)

[PATCH 0/3] power: supply: axp20x_usb_power: prepare for external power delivery negotiation
 2024-01-23  0:52 UTC  (4+ messages)
` [PATCH 1/3] power: supply: axp20x_usb_power: add input current limit
    `  "

[PATCH 1/2] lkdtm: Make lkdtm_do_action() return to avoid tail call optimization
 2024-01-23  0:49 UTC  (2+ messages)
` [PATCH 2/2] lkdtm/bugs: Adjust lkdtm_HUNG_TASK() "

[PATCH 5.10 000/286] 5.10.209-rc1 review
 2024-01-22 23:55 UTC 

[PATCH 00/82] overflow: Refactor open-coded arithmetic wrap-around
 2024-01-23  0:27 UTC  (77+ messages)
` [PATCH 01/82] overflow: Expand check_add_overflow() for pointer addition
` [PATCH 02/82] overflow: Introduce add_would_overflow()
` [PATCH 03/82] overflow: Introduce add_wrap()
` [PATCH 04/82] docs: deprecated.rst: deprecate open-coded arithmetic wrap-around
` [PATCH 05/82] cocci: Refactor "
` [PATCH 06/82] overflow: Reintroduce signed and unsigned overflow sanitizers
` [PATCH 07/82] overflow: Introduce CONFIG_UBSAN_POINTER_WRAP
` [PATCH 08/82] iov_iter: Avoid wrap-around instrumentation in copy_compat_iovec_from_user
` [PATCH 09/82] select: Avoid wrap-around instrumentation in do_sys_poll()
` [PATCH 10/82] locking/atomic/x86: Silence intentional wrapping addition
` [PATCH 11/82] arm64: atomics: lse: "
` [PATCH 12/82] ipv4: "
` [PATCH 13/82] btrfs: Refactor intentional wrap-around calculation
` [PATCH 14/82] smb: client: "
` [PATCH 15/82] dma-buf: "
` [PATCH 16/82] drm/nouveau/mmu: "
` [PATCH 17/82] drm/vc4: "
` [PATCH 18/82] ext4: "
` [PATCH 19/82] fs: "
` [PATCH 20/82] fpga: dfl: "
` [PATCH 21/82] drivers/fsi: "
` [PATCH 22/82] x86/sgx: "
` [PATCH 23/82] KVM: "
` [PATCH 24/82] KVM: arm64: vgic: "
` [PATCH 25/82] KVM: SVM: "
` [PATCH 26/82] buildid: "
` [PATCH 27/82] m68k: "
` [PATCH 28/82] niu: "
` [PATCH 29/82] rds: "
` [PATCH 30/82] s390/kexec_file: "
` [PATCH 31/82] ARC: dw2 unwind: "
` [PATCH 32/82] vringh: "
` [PATCH 33/82] mm/vmalloc: "
` [PATCH 34/82] ipc: "
` [PATCH 36/82] agp: Refactor intentional wrap-around test
` [PATCH 38/82] arm: 3117/1: "
` [PATCH 39/82] crypto: "
` [PATCH 40/82] arm64: stacktrace: "
` [PATCH 41/82] wil6210: "
` [PATCH 42/82] bcachefs: "
` [PATCH 45/82] cifs: "
` [PATCH 46/82] crypto: "
` [PATCH 47/82] dm verity: "
` [PATCH 48/82] drm/nouveau/mmu: "
` [PATCH 49/82] drm/i915: "
` [PATCH 50/82] drm/vc4: "
` [PATCH 51/82] ext4: "
` [PATCH 52/82] f2fs: "
` [PATCH 53/82] fs: "
` [PATCH 54/82] hpfs: "
` [PATCH 55/82] kasan: "
` [PATCH 56/82] usercopy: "
` [PATCH 57/82] KVM: arm64: vgic-v3: "
` [PATCH 58/82] s390/mm: "
` [PATCH 59/82] lib/scatterlist: "
` [PATCH 60/82] powerpc: "
` [PATCH 61/82] scsi: mpt3sas: "
` [PATCH 62/82] mwifiex: pcie: "
` [PATCH 63/82] mm: "
` [PATCH 64/82] netfilter: "
` [PATCH 65/82] nios2: "
` [PATCH 66/82] fs/ntfs3: "
` [PATCH 67/82] ocfs2: "
` [PATCH 68/82] PCI: "
` [PATCH 69/82] perf tools: "
` [PATCH 70/82] remoteproc: "
` [PATCH 72/82] scsi: sd_zbc: "
` [PATCH 73/82] sh: "
` [PATCH 74/82] ARC: dw2 unwind: "
` [PATCH 75/82] timekeeping: "
` [PATCH 76/82] udf: "
` [PATCH 77/82] virtio: "
` [PATCH 79/82] staging: vme_user: "
` [PATCH 80/82] xen-netback: "
` [PATCH 81/82] lib: zstd: "
` [PATCH 82/82] mqueue: "

[PATCH 0/7] arm64: sun50i-h616: Add DMA and SPDIF controllers
 2024-01-23  0:43 UTC  (11+ messages)
` [PATCH 3/7] ASoC: sunxi: sun4i-spdif: Add support for Allwinner H616
` [PATCH 4/7] dt-bindings: dma: allwinner,sun50i-a64-dma: Add compatible for H616
` [PATCH 5/7] arm64: dts: allwinner: h6: Add RX DMA channel for SPDIF
` [PATCH 6/7] arm64: dts: allwinner: h616: Add DMA controller and DMA channels
` [PATCH 7/7] arm64: dts: allwinner: h616: Add SPDIF device node

[BUG] BUG: kernel NULL pointer dereference at ttm_device_init+0xb4
 2024-01-23  0:43 UTC  (6+ messages)

[PATCH 6.1 000/417] 6.1.75-rc1 review
 2024-01-22 23:52 UTC 

[PATCH v2 0/4] perf sched: Fix task state report
 2024-01-23  0:38 UTC  (3+ messages)
` [PATCH v2 4/4] perf sched: Commit to evsel__taskstate() to parse task state info

[PATCH v3] soc: qcom: aoss: Add debugfs interface for sending messages
 2024-01-23  0:29 UTC  (3+ messages)

[PATCH 6.7 000/641] 6.7.2-rc1 review
 2024-01-22 23:54 UTC  (4+ messages)
` [PATCH 6.7 370/641] kselftest/alsa - mixer-test: fix the number of parameters to ksft_exit_fail_msg()
` [PATCH 6.7 371/641] kselftest/alsa - mixer-test: Fix the print format specifier warning
` [PATCH 6.7 372/641] kselftest/alsa - conf: Stringify the printed errno in sysfs_get()

[PATCH bpf 0/3] Fix the read of vsyscall page through bpf
 2024-01-23  0:25 UTC  (5+ messages)
` [PATCH bpf 2/3] x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault()
` [PATCH bpf 3/3] selftest/bpf: Test the read of vsyscall page under x86-64

[PATCH v7 00/13] KVM TDX: TDP MMU: large page support
 2024-01-23  0:22 UTC  (14+ messages)
` [PATCH v7 01/13] KVM: TDX: Flush cache based on page size before TDX SEAMCALL
` [PATCH v7 02/13] KVM: TDX: Pass KVM page level to tdh_mem_page_aug()
` [PATCH v7 03/13] KVM: TDX: Pass size to reclaim_page()
` [PATCH v7 04/13] KVM: TDX: Update tdx_sept_{set,drop}_private_spte() to support large page
` [PATCH v7 05/13] KVM: MMU: Introduce level info in PFERR code
` [PATCH v7 06/13] KVM: TDX: Pass desired page level in err code for page fault handler
` [PATCH v7 07/13] KVM: x86/tdp_mmu: Allocate private page table for large page split
` [PATCH v7 08/13] KVM: x86/tdp_mmu: Split the large page when zap leaf
` [PATCH v7 09/13] KVM: x86/tdp_mmu, TDX: Split a large page when 4KB page within it converted to shared
` [PATCH v7 10/13] KVM: x86/tdp_mmu: Try to merge pages into a large page
` [PATCH v7 11/13] KVM: TDX: Implement "
` [PATCH v7 12/13] KVM: x86/mmu: Make kvm fault handler aware of large page of private memslot
` [PATCH v7 13/13] KVM: TDX: Allow 2MB large page for TD GUEST

[PATCH v6 0/7] VMware hypercalls enhancements
 2024-01-23  0:17 UTC  (6+ messages)
` [PATCH v6 7/7] x86/vmware: Add TDX hypercall support

[PATCH] mm/mmap: introduce vma_range_init()
 2024-01-23  0:18 UTC  (4+ messages)

[PATCH v2] KVM: x86: nSVM/nVMX: Fix handling triple fault on RSM instruction
 2024-01-23  0:15 UTC 

[PATCH 5.4 000/194] 5.4.268-rc1 review
 2024-01-22 23:55 UTC 

[PATCH] perf test: Fix session topology test on heterogeneous systems
 2024-01-23  0:09 UTC  (3+ messages)

[PATCH v1 0/5] Fixes for 6.8 PR1
 2024-01-23  0:06 UTC  (6+ messages)
` [PATCH v1 1/5] perf list: Switch error message to pr_err
` [PATCH v1 2/5] perf list: Add output file option
` [PATCH v1 3/5] perf test: Workaround debug output in list test
` [PATCH v1 4/5] perf test: Fix script test for python being disabled
` [PATCH v1 5/5] perf test: Make daemon signal test less racy

[PATCH 0/3] x86/bugs: Separate config for mitigations (part 2)
 2024-01-23  0:04 UTC  (3+ messages)
` [PATCH 3/3] x86/bugs: spectre_v2_user default mode depends on main default

[PATCH 4.19 000/148] 4.19.306-rc1 review
 2024-01-22 23:55 UTC 

[PATCH v2 0/2] getrusage: use sig->stats_lock
 2024-01-22 23:57 UTC  (3+ messages)
` [PATCH v2 2/2] getrusage: use sig->stats_lock rather than lock_task_sighand()

[PATCH v18 000/121] KVM TDX basic feature support
 2024-01-22 23:54 UTC  (73+ messages)
` [PATCH v18 047/121] KVM: x86/mmu: Add a private pointer to struct kvm_mmu_page
` [PATCH v18 051/121] KVM: x86/tdp_mmu: Support TDX private mapping for TDP MMU
` [PATCH v18 052/121] [MARKER] The start of TDX KVM patch series: TDX EPT violation
` [PATCH v18 053/121] KVM: x86/mmu: TDX: Do not enable page track for TD guest
` [PATCH v18 054/121] KVM: VMX: Split out guts of EPT violation to common/exposed function
` [PATCH v18 055/121] KVM: VMX: Move setting of EPT MMU masks to common VT-x code
` [PATCH v18 056/121] KVM: TDX: Add accessors VMX VMCS helpers
` [PATCH v18 057/121] KVM: TDX: Add load_mmu_pgd method for TDX
` [PATCH v18 058/121] KVM: TDX: Retry seamcall when TDX_OPERAND_BUSY with operand SEPT
` [PATCH v18 059/121] KVM: TDX: Require TDP MMU and mmio caching for TDX
` [PATCH v18 060/121] KVM: TDX: TDP MMU TDX support
` [PATCH v18 061/121] KVM: TDX: MTRR: implement get_mt_mask() for TDX
` [PATCH v18 062/121] [MARKER] The start of TDX KVM patch series: TD finalization
` [PATCH v18 063/121] KVM: x86/mmu: Introduce kvm_mmu_map_tdp_page() for use by TDX
` [PATCH v18 064/121] KVM: TDX: Create initial guest memory
` [PATCH v18 065/121] KVM: TDX: Finalize VM initialization
` [PATCH v18 066/121] [MARKER] The start of TDX KVM patch series: TD vcpu enter/exit
` [PATCH v18 067/121] KVM: TDX: Implement TDX vcpu enter/exit path
` [PATCH v18 068/121] KVM: TDX: vcpu_run: save/restore host state(host kernel gs)
` [PATCH v18 069/121] KVM: TDX: restore host xsave state when exit from the guest TD
` [PATCH v18 070/121] KVM: x86: Allow to update cached values in kvm_user_return_msrs w/o wrmsr
` [PATCH v18 071/121] KVM: TDX: restore user ret MSRs
` [PATCH v18 072/121] KVM: TDX: Add TSX_CTRL msr into uret_msrs list
` [PATCH v18 073/121] [MARKER] The start of TDX KVM patch series: TD vcpu exits/interrupts/hypercalls
` [PATCH v18 074/121] KVM: TDX: complete interrupts after tdexit
` [PATCH v18 075/121] KVM: TDX: restore debug store when TD exit
` [PATCH v18 076/121] KVM: TDX: handle vcpu migration over logical processor
` [PATCH v18 077/121] KVM: x86: Add a switch_db_regs flag to handle TDX's auto-switched behavior
` [PATCH v18 078/121] KVM: TDX: Add support for find pending IRQ in a protected local APIC
` [PATCH v18 079/121] KVM: x86: Assume timer IRQ was injected if APIC state is proteced
` [PATCH v18 080/121] KVM: TDX: remove use of struct vcpu_vmx from posted_interrupt.c
` [PATCH v18 081/121] KVM: TDX: Implement interrupt injection
` [PATCH v18 082/121] KVM: TDX: Implements vcpu request_immediate_exit
` [PATCH v18 083/121] KVM: TDX: Implement methods to inject NMI
` [PATCH v18 084/121] KVM: VMX: Modify NMI and INTR handlers to take intr_info as function argument
` [PATCH v18 085/121] KVM: VMX: Move NMI/exception handler to common helper
` [PATCH v18 086/121] KVM: x86: Split core of hypercall emulation to helper function
` [PATCH v18 087/121] KVM: TDX: Add a place holder to handle TDX VM exit
` [PATCH v18 088/121] KVM: TDX: Handle vmentry failure for INTEL TD guest
` [PATCH v18 089/121] KVM: TDX: handle EXIT_REASON_OTHER_SMI
` [PATCH v18 090/121] KVM: TDX: handle ept violation/misconfig exit
` [PATCH v18 091/121] KVM: TDX: handle EXCEPTION_NMI and EXTERNAL_INTERRUPT
` [PATCH v18 092/121] KVM: TDX: Handle EXIT_REASON_OTHER_SMI with MSMI
` [PATCH v18 093/121] KVM: TDX: Add a place holder for handler of TDX hypercalls (TDG.VP.VMCALL)
` [PATCH v18 094/121] KVM: TDX: handle KVM hypercall with TDG.VP.VMCALL
` [PATCH v18 095/121] KVM: TDX: Add KVM Exit for TDX TDG.VP.VMCALL
` [PATCH v18 096/121] KVM: TDX: Handle TDX PV CPUID hypercall
` [PATCH v18 097/121] KVM: TDX: Handle TDX PV HLT hypercall
` [PATCH v18 098/121] KVM: TDX: Handle TDX PV port io hypercall
` [PATCH v18 099/121] KVM: TDX: Handle TDX PV MMIO hypercall
` [PATCH v18 100/121] KVM: TDX: Implement callbacks for MSR operations for TDX
` [PATCH v18 101/121] KVM: TDX: Handle TDX PV rdmsr/wrmsr hypercall
` [PATCH v18 102/121] KVM: TDX: Handle MSR MTRRCap and MTRRDefType access
` [PATCH v18 103/121] KVM: TDX: Handle MSR IA32_FEAT_CTL MSR and IA32_MCG_EXT_CTL
` [PATCH v18 104/121] KVM: TDX: Handle TDG.VP.VMCALL<GetTdVmCallInfo> hypercall
` [PATCH v18 105/121] KVM: TDX: Silently discard SMI request
` [PATCH v18 106/121] KVM: TDX: Silently ignore INIT/SIPI
` [PATCH v18 107/121] KVM: TDX: Add methods to ignore accesses to CPU state
` [PATCH v18 108/121] KVM: TDX: Add methods to ignore guest instruction emulation
` [PATCH v18 109/121] KVM: TDX: Add a method to ignore dirty logging
` [PATCH v18 110/121] KVM: TDX: Add methods to ignore VMX preemption timer
` [PATCH v18 111/121] KVM: TDX: Add methods to ignore accesses to TSC
` [PATCH v18 112/121] KVM: TDX: Ignore setting up mce
` [PATCH v18 113/121] KVM: TDX: Add a method to ignore for TDX to ignore hypercall patch
` [PATCH v18 114/121] KVM: TDX: Add methods to ignore virtual apic related operation
` [PATCH v18 115/121] KVM: TDX: Inhibit APICv for TDX guest
` [PATCH v18 116/121] Documentation/virt/kvm: Document on Trust Domain Extensions(TDX)
` [PATCH v18 117/121] KVM: x86: design documentation on TDX support of x86 KVM TDP MMU
` [PATCH v18 118/121] KVM: TDX: Add hint TDX ioctl to release Secure-EPT
` [PATCH v18 119/121] RFC: KVM: x86: Add x86 callback to check cpuid
` [PATCH v18 120/121] RFC: KVM: x86, TDX: Add check for KVM_SET_CPUID2
` [PATCH v18 121/121] [MARKER] the end of (the first phase of) TDX KVM patch series


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).