All of lore.kernel.org
 help / color / mirror / Atom feed
 messages from 2020-11-25 09:24:57 to 2020-11-25 09:50:21 UTC [more...]

[PATCH] dma-buf/dma-resv: Respect num_fences when initializing the shared fence list
 2020-11-25  9:50 UTC  (5+ messages)
` [Intel-gfx] "

[PATCH 3/3] drm/virtio: consider dma-fence context when signaling
 2020-11-25  9:50 UTC  (3+ messages)

[PATCH 1/3] drm/virtio: virtio_{blah} --> virtio_gpu_{blah}
 2020-11-25  9:48 UTC  (4+ messages)
` [PATCH 2/3] drm/virtio: rework virtio_fence_signaled

[net-next v2] can: pcan_usb_core: fix fall-through warnings for Clang
 2020-11-25  9:47 UTC 

[PATCH v4] drm/scheduler: Avoid accessing freed bad job
 2020-11-25  9:47 UTC  (8+ messages)
` [PATCH 0/6] Allow to extend the timeout without jobs disappearing
  ` [PATCH 1/6] drm/scheduler: "node" --> "list"
  ` [PATCH 2/6] gpu/drm: ring_mirror_list --> pending_list

kernel/bpf/ringbuf.c:166 ringbuf_map_alloc() warn: impossible condition '(attr->max_entries > (((1 << 24) - 2 - ($expr_0x7f1f90b15400(30) >> (12))) COPYING CREDITS Documentation Kbuild Kconfig LICENSES MAINTAINERS Makefile README arch block certs crypto drivers fs include init ipc kernel lib mm net samples scripts security sound tools usr virt ((1) << (12)))) => (0-u32max > 68719464448)'
 2020-11-25  9:47 UTC 

[xen-unstable-coverity test] 157003: all pass - PUSHED
 2020-11-25  9:46 UTC 

[dpdk-dev] [PATCH] test: fix buffer overflow
 2020-11-25  9:46 UTC 

[PATCH] kfence: Avoid stalling work queue task without allocations
 2020-11-25  9:45 UTC  (12+ messages)
  ` linux-next: stall warnings and deadlock on Arm64 (was: [PATCH] kfence: Avoid stalling...)

[PATCH] ARM: dts: stm32: Fix uSD card-detect GPIO on DHCOM
 2020-11-25  9:45 UTC  (2+ messages)

[PATCH] findmnt: add option to list all statvfs f_flags
 2020-11-25  9:45 UTC 

[dpdk-dev] [PATCH] net/mlx5: fix memory management for released offloaded tunnels
 2020-11-25  9:44 UTC  (2+ messages)
` [dpdk-dev] [PATCH v2] "

[PATCH 1/2] pinctrl: stm32: display bias information for all pins
 2020-11-25  9:43 UTC  (4+ messages)
` [PATCH 2/2] gpio: stm32: correct the bias management

[PATCH v10 00/81] VM introspection
 2020-11-25  9:36 UTC  (122+ messages)
` [PATCH v10 01/81] KVM: UAPI: add error codes used by the VM introspection code
` [PATCH v10 02/81] KVM: add kvm_vcpu_kick_and_wait()
` [PATCH v10 03/81] KVM: add kvm_get_max_gfn()
` [PATCH v10 04/81] KVM: doc: fix the hypercalls numbering
` [PATCH v10 05/81] KVM: x86: add kvm_arch_vcpu_get_regs() and kvm_arch_vcpu_get_sregs()
` [PATCH v10 06/81] KVM: x86: add kvm_arch_vcpu_set_regs()
` [PATCH v10 07/81] KVM: x86: avoid injecting #PF when emulate the VMCALL instruction
` [PATCH v10 08/81] KVM: x86: add kvm_x86_ops.bp_intercepted()
` [PATCH v10 09/81] KVM: x86: add kvm_x86_ops.control_cr3_intercept()
` [PATCH v10 10/81] KVM: x86: add kvm_x86_ops.cr3_write_intercepted()
` [PATCH v10 11/81] KVM: x86: add kvm_x86_ops.desc_ctrl_supported()
` [PATCH v10 12/81] KVM: svm: add support for descriptor-table VM-exits
` [PATCH v10 13/81] KVM: x86: add kvm_x86_ops.control_desc_intercept()
` [PATCH v10 14/81] KVM: x86: add kvm_x86_ops.desc_intercepted()
` [PATCH v10 15/81] KVM: x86: add kvm_x86_ops.msr_write_intercepted()
` [PATCH v10 16/81] KVM: x86: svm: use the vmx convention to control the MSR interception
` [PATCH v10 17/81] KVM: x86: add kvm_x86_ops.control_msr_intercept()
` [PATCH v10 18/81] KVM: x86: vmx: use a symbolic constant when checking the exit qualifications
` [PATCH v10 19/81] KVM: x86: save the error code during EPT/NPF exits handling
` [PATCH v10 20/81] KVM: x86: add kvm_x86_ops.fault_gla()
` [PATCH v10 21/81] KVM: x86: add kvm_x86_ops.control_singlestep()
` [PATCH v10 22/81] KVM: x86: export kvm_arch_vcpu_set_guest_debug()
` [PATCH v10 23/81] KVM: x86: extend kvm_mmu_gva_to_gpa_system() with the 'access' parameter
` [PATCH v10 24/81] KVM: x86: export kvm_inject_pending_exception()
` [PATCH v10 25/81] KVM: x86: export kvm_vcpu_ioctl_x86_get_xsave()
` [PATCH v10 26/81] KVM: x86: export kvm_vcpu_ioctl_x86_set_xsave()
` [PATCH v10 27/81] KVM: x86: page track: provide all callbacks with the guest virtual address
` [PATCH v10 28/81] KVM: x86: page track: add track_create_slot() callback
` [PATCH v10 29/81] KVM: x86: page_track: add support for preread, prewrite and preexec
` [PATCH v10 30/81] KVM: x86: wire in the preread/prewrite/preexec page trackers
` [PATCH v10 31/81] KVM: x86: disable gpa_available optimization for fetch and page-walk SPT violations
` [PATCH v10 32/81] KVM: introduce VM introspection
` [PATCH v10 33/81] KVM: introspection: add hook/unhook ioctls
` [PATCH v10 34/81] KVM: introspection: add permission access ioctls
` [PATCH v10 35/81] KVM: introspection: add the read/dispatch message function
` [PATCH v10 36/81] KVM: introspection: add KVMI_GET_VERSION
` [PATCH v10 37/81] KVM: introspection: add KVMI_VM_CHECK_COMMAND and KVMI_VM_CHECK_EVENT
` [PATCH v10 38/81] KVM: introspection: add KVMI_VM_GET_INFO
` [PATCH v10 39/81] KVM: introspection: add KVM_INTROSPECTION_PREUNHOOK
` [PATCH v10 40/81] KVM: introspection: add KVMI_VM_EVENT_UNHOOK
` [PATCH v10 41/81] KVM: introspection: add KVMI_VM_CONTROL_EVENTS
` [PATCH v10 42/81] KVM: introspection: add KVMI_VM_READ_PHYSICAL/KVMI_VM_WRITE_PHYSICAL
` [PATCH v10 43/81] KVM: introspection: add vCPU related data
` [PATCH v10 44/81] KVM: introspection: add a jobs list to every introspected vCPU
` [PATCH v10 45/81] KVM: introspection: handle vCPU introspection requests
` [PATCH v10 46/81] KVM: introspection: handle vCPU commands
` [PATCH v10 47/81] KVM: introspection: add KVMI_VCPU_GET_INFO
` [PATCH v10 48/81] KVM: introspection: add KVMI_VM_PAUSE_VCPU
` [PATCH v10 49/81] KVM: introspection: add support for vCPU events
` [PATCH v10 50/81] KVM: introspection: add KVMI_VCPU_EVENT_PAUSE
` [PATCH v10 51/81] KVM: introspection: add the crash action handling on the event reply
` [PATCH v10 52/81] KVM: introspection: add KVMI_VCPU_CONTROL_EVENTS
` [PATCH v10 53/81] KVM: introspection: add KVMI_VCPU_GET_REGISTERS
` [PATCH v10 54/81] KVM: introspection: add KVMI_VCPU_SET_REGISTERS
` [PATCH v10 55/81] KVM: introspection: add KVMI_VCPU_GET_CPUID
` [PATCH v10 56/81] KVM: introspection: add KVMI_VCPU_EVENT_HYPERCALL
` [PATCH v10 57/81] KVM: introspection: add KVMI_VCPU_EVENT_BREAKPOINT
` [PATCH v10 58/81] KVM: introspection: add cleanup support for vCPUs
` [PATCH v10 59/81] KVM: introspection: restore the state of #BP interception on unhook
` [PATCH v10 60/81] KVM: introspection: add KVMI_VM_CONTROL_CLEANUP
` [PATCH v10 61/81] KVM: introspection: add KVMI_VCPU_CONTROL_CR and KVMI_VCPU_EVENT_CR
` [PATCH v10 62/81] KVM: introspection: restore the state of CR3 interception on unhook
` [PATCH v10 63/81] KVM: introspection: add KVMI_VCPU_INJECT_EXCEPTION + KVMI_VCPU_EVENT_TRAP
` [PATCH v10 64/81] KVM: introspection: add KVMI_VM_GET_MAX_GFN
` [PATCH v10 65/81] KVM: introspection: add KVMI_VCPU_EVENT_XSETBV
` [PATCH v10 66/81] KVM: introspection: add KVMI_VCPU_GET_XCR
` [PATCH v10 67/81] KVM: introspection: add KVMI_VCPU_GET_XSAVE
` [PATCH v10 68/81] KVM: introspection: add KVMI_VCPU_SET_XSAVE
` [PATCH v10 69/81] KVM: introspection: add KVMI_VCPU_GET_MTRR_TYPE
` [PATCH v10 70/81] KVM: introspection: add KVMI_VCPU_EVENT_DESCRIPTOR
` [PATCH v10 71/81] KVM: introspection: restore the state of descriptor-table register interception on unhook
` [PATCH v10 72/81] KVM: introspection: add KVMI_VCPU_CONTROL_MSR and KVMI_VCPU_EVENT_MSR
` [PATCH v10 73/81] KVM: introspection: restore the state of MSR interception on unhook
` [PATCH v10 74/81] KVM: introspection: add KVMI_VM_SET_PAGE_ACCESS
` [PATCH v10 75/81] KVM: introspection: add KVMI_VCPU_EVENT_PF
` [PATCH v10 76/81] KVM: introspection: extend KVMI_GET_VERSION with struct kvmi_features
` [PATCH v10 77/81] KVM: introspection: add KVMI_VCPU_CONTROL_SINGLESTEP
` [PATCH v10 78/81] KVM: introspection: add KVMI_VCPU_EVENT_SINGLESTEP
` [PATCH v10 79/81] KVM: introspection: add KVMI_VCPU_TRANSLATE_GVA
` [PATCH v10 80/81] KVM: introspection: emulate a guest page table walk on SPT violations due to A/D bit updates
` [PATCH v10 81/81] KVM: x86: call the page tracking code on emulation failure

help with a build-user and build-user-plugin failure
 2020-11-25  9:42 UTC  (3+ messages)

[PATCH] ARM: dts: stm32: Add DHCOM based PicoITX board
 2020-11-25  9:42 UTC  (2+ messages)

[PATCH] linux-user/elfload: Fix handling of pure BSS segments
 2020-11-25  9:39 UTC  (3+ messages)
`  "

[RFC 0/1] Remove uevent suppression logic from css driver
 2020-11-25  9:40 UTC  (4+ messages)
` [RFC 1/1] s390/cio: Remove uevent-suppress "

[PATCH v3] virtio-rng: return available data with O_NONBLOCK
 2020-11-25  9:39 UTC  (9+ messages)

[PATCH v2] tools: zynqmp: Fix regex expression around XPm_ConfigObject
 2020-11-25  9:40 UTC  (2+ messages)

[PATCH] option: added support for Thales Cinterion EXS82 option port
 2020-11-25  9:40 UTC  (2+ messages)

Considering new SATA PCIe card
 2020-11-25  9:31 UTC  (2+ messages)

[PATCH -tip 00/32] Core scheduling (v9)
 2020-11-25  9:37 UTC  (3+ messages)
` [PATCH -tip 18/32] kernel/entry: Add support for core-wide protection of kernel-mode

[PATCH] credential-store: use timeout when locking file
 2020-11-25  9:37 UTC  (4+ messages)
` [PATCH v2] crendential-store: "

[PATCH v4 0/3] evtchn: Introduce a per-guest knob to control FIFO ABI
 2020-11-25  9:36 UTC  (4+ messages)
` [PATCH v4 1/3] domctl: introduce a new domain create flag, XEN_DOMCTL_CDF_disable_fifo,

[PATCH] drm/i915: fix error return code in check_partial_mapping()
 2020-11-25  9:36 UTC  (3+ messages)
` [Intel-gfx] "

[RFC v5 00/12] i386 cleanup
 2020-11-25  9:32 UTC  (20+ messages)
` [RFC v5 09/12] module: introduce MODULE_INIT_ACCEL_CPU
` [RFC v5 11/12] i386: centralize initialization of cpu accel interfaces
` [RFC v5 12/12] accel: centralize initialization of CpusAccelOps

[dpdk-dev] [PATCH 0/2] support GTP-U Tx offload on FVL and CVL
 2020-11-25  9:32 UTC  (3+ messages)
` [dpdk-dev] [PATCH 1/2] net/i40e: support GTP checksum offload
` [dpdk-dev] [PATCH 2/2] app/testpmd: support GTP-U extension packet "

[net] can: m_can: fix nominal bitiming tseg2 min for version >= 3.1
 2020-11-25  8:55 UTC  (2+ messages)

[PATCH v4] i2c: virtio: add a virtio i2c frontend driver
 2020-11-25  9:35 UTC  (3+ messages)

[PATCH] arm: stm32mp: correct the ALIGN macro usage
 2020-11-25  9:35 UTC  (2+ messages)

[PATCH for-6.0 0/8] spapr: Address the confusion between IPI numbers and vCPU ids
 2020-11-25  9:33 UTC  (8+ messages)
` [PATCH for-6.0 2/8] spapr/xive: Introduce spapr_xive_nr_ends()

[Intel-gfx] [PATCH 01/16] drm/i915/gem: Drop free_work for GEM contexts
 2020-11-25  9:34 UTC  (3+ messages)
` [Intel-gfx] [PATCH 09/16] drm/i915/gt: ce->inflight updates are now serialised

[PATCH 1/1] Fix to show vfio migration stat in migration status
 2020-11-25  9:30 UTC  (2+ messages)

[PATCH v3 0/2] siox: two cleanups
 2020-11-25  9:31 UTC  (3+ messages)
` [PATCH v3 1/2] siox: Use bus_type functions for probe, remove and shutdown
` [PATCH v3 2/2] siox: Make remove callback return void

[PATCH] KVM: s390: track synchronous pfault events in kvm_stat
 2020-11-25  9:31 UTC  (2+ messages)

[PATCH 0/2] SCMI performance protocol power scale interface
 2020-11-25  9:29 UTC  (3+ messages)

[PATCH v3] vhost-vdpa: fix page pinning leakage in error path (rework)
 2020-11-25  9:30 UTC  (3+ messages)

[PATCH v10 00/13] iommu: Shared Virtual Addressing for SMMUv3 (PT sharing part)
 2020-11-25  9:27 UTC  (6+ messages)
` [PATCH v10 12/13] iommu/arm-smmu-v3: Implement iommu_sva_bind/unbind()

[PATCH v2 1/1] board: freescale: vid.c: Add check for return value of adjust_vdd()
 2020-11-25  9:28 UTC 

[PATCH net] netdevice.h: Fix unintentional disable of ALL_FOR_ALL features on upper device
 2020-11-25  9:27 UTC  (7+ messages)

[PATCH 0/4] grep: retire `init_grep_defaults()`
 2020-11-25  9:27 UTC  (3+ messages)
` [PATCH v2 0/4] grep: simplify "grep defaults" handling

[PATCH v12 00/10] mm: introduce memfd_secret system call to create "secret" memory areas
 2020-11-25  9:22 UTC  (14+ messages)
` [PATCH v12 03/10] set_memory: allow set_direct_map_*_noflush() for multiple pages
` [PATCH v12 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
` [PATCH v12 05/10] mm: introduce memfd_secret system call to create "secret" memory areas
` [PATCH v12 06/10] secretmem: use PMD-size pages to amortize direct map fragmentation
` [PATCH v12 07/10] secretmem: add memcg accounting
` [PATCH v12 08/10] PM: hibernate: disable when there are active secretmem users
` [PATCH v12 09/10] arch, mm: wire up memfd_secret system call were relevant
` [PATCH v12 10/10] secretmem: test: add basic selftest for memfd_secret(2)

[PATCH] riscv: defconfig: k210: Disable CONFIG_VT
 2020-11-25  9:26 UTC  (6+ messages)


This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.