All of lore.kernel.org
 help / color / mirror / Atom feed
 messages from 2018-08-14 17:32:08 to 2018-08-14 17:45:44 UTC [more...]

[PATCH 4.9 000/107] 4.9.120-stable review
 2018-08-14 17:18 UTC  (97+ messages)
` [PATCH 4.9 001/107] ext4: fix check to prevent initializing reserved inodes
` [PATCH 4.9 002/107] tpm: fix race condition in tpm_common_write()
` [PATCH 4.9 003/107] parisc: Enable CONFIG_MLONGCALLS by default
` [PATCH 4.9 005/107] kasan: add no_sanitize attribute for clang builds
` [PATCH 4.9 006/107] Mark HI and TASKLET softirq synchronous
` [PATCH 4.9 007/107] xen/netfront: dont cache skb_shinfo()
` [PATCH 4.9 008/107] ACPI / LPSS: Add missing prv_offset setting for byt/cht PWM devices
` [PATCH 4.9 009/107] scsi: sr: Avoid that opening a CD-ROM hangs with runtime power management enabled
` [PATCH 4.9 010/107] init: rename and re-order boot_cpu_state_init()
` [PATCH 4.9 011/107] root dentries need RCU-delayed freeing
` [PATCH 4.9 012/107] make sure that __dentry_kill() always invalidates d_seq, unhashed or not
` [PATCH 4.9 013/107] fix mntput/mntput race
` [PATCH 4.9 014/107] fix __legitimize_mnt()/mntput() race
` [PATCH 4.9 016/107] proc/sysctl: Dont grab i_lock under sysctl_lock
` [PATCH 4.9 018/107] IB/core: Make testing MR flags for writability a static inline function
` [PATCH 4.9 019/107] IB/mlx4: Mark user MR as writable if actual virtual memory is writable
` [PATCH 4.9 020/107] mtd: nand: qcom: Add a NULL check for devm_kasprintf()
` [PATCH 4.9 021/107] IB/ocrdma: fix out of bounds access to local buffer
` [PATCH 4.9 022/107] ARM: dts: imx6sx: fix irq for pcie bridge
` [PATCH 4.9 023/107] x86/paravirt: Fix spectre-v2 mitigations for paravirt guests
` [PATCH 4.9 024/107] x86/speculation: Protect against userspace-userspace spectreRSB
` [PATCH 4.9 026/107] x86/irqflags: Provide a declaration for native_save_fl
` [PATCH 4.9 027/107] x86/speculation/l1tf: Increase 32bit PAE __PHYSICAL_PAGE_SHIFT
` [PATCH 4.9 028/107] mm: x86: move _PAGE_SWP_SOFT_DIRTY from bit 7 to bit 1
` [PATCH 4.9 029/107] x86/speculation/l1tf: Change order of offset/type in swap entry
` [PATCH 4.9 030/107] x86/speculation/l1tf: Protect swap entries against L1TF
` [PATCH 4.9 031/107] x86/speculation/l1tf: Protect PROT_NONE PTEs against speculation
` [PATCH 4.9 032/107] x86/speculation/l1tf: Make sure the first page is always reserved
` [PATCH 4.9 033/107] x86/speculation/l1tf: Add sysfs reporting for l1tf
` [PATCH 4.9 034/107] x86/speculation/l1tf: Disallow non privileged high MMIO PROT_NONE mappings
` [PATCH 4.9 035/107] x86/speculation/l1tf: Limit swap file size to MAX_PA/2
` [PATCH 4.9 036/107] x86/bugs: Move the l1tf function and define pr_fmt properly
` [PATCH 4.9 037/107] x86/smp: Provide topology_is_primary_thread()
` [PATCH 4.9 038/107] x86/topology: Provide topology_smt_supported()
` [PATCH 4.9 039/107] cpu/hotplug: Make bringup/teardown of smp threads symmetric
` [PATCH 4.9 040/107] cpu/hotplug: Split do_cpu_down()
` [PATCH 4.9 041/107] cpu/hotplug: Provide knobs to control SMT
` [PATCH 4.9 042/107] x86/cpu: Remove the pointless CPU printout
` [PATCH 4.9 043/107] x86/cpu/AMD: Remove the pointless detect_ht() call
` [PATCH 4.9 044/107] x86/cpu/common: Provide detect_ht_early()
` [PATCH 4.9 045/107] x86/cpu/topology: Provide detect_extended_topology_early()
` [PATCH 4.9 046/107] x86/cpu/intel: Evaluate smp_num_siblings early
` [PATCH 4.9 047/107] x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info
` [PATCH 4.9 048/107] x86/cpu/AMD: Evaluate smp_num_siblings early
` [PATCH 4.9 050/107] x86/speculation/l1tf: Extend 64bit swap file size limit
` [PATCH 4.9 051/107] x86/cpufeatures: Add detection of L1D cache flush support
` [PATCH 4.9 052/107] x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings
` [PATCH 4.9 053/107] x86/speculation/l1tf: Protect PAE swap entries against L1TF
` [PATCH 4.9 054/107] x86/speculation/l1tf: Fix up pte->pfn conversion for PAE
` [PATCH 4.9 055/107] Revert "x86/apic: Ignore secondary threads if nosmt=force"
` [PATCH 4.9 056/107] cpu/hotplug: Boot HT siblings at least once
` [PATCH 4.9 057/107] x86/KVM: Warn user if KVM is loaded SMT and L1TF CPU bug being present
` [PATCH 4.9 058/107] x86/KVM/VMX: Add module argument for L1TF mitigation
` [PATCH 4.9 059/107] x86/KVM/VMX: Add L1D flush algorithm
` [PATCH 4.9 060/107] x86/KVM/VMX: Add L1D MSR based flush
` [PATCH 4.9 061/107] x86/KVM/VMX: Add L1D flush logic
` [PATCH 4.9 063/107] x86/KVM/VMX: Split the VMX MSR LOAD structures to have an host/guest numbers
` [PATCH 4.9 064/107] x86/KVM/VMX: Add find_msr() helper function
` [PATCH 4.9 065/107] x86/KVM/VMX: Separate the VMX AUTOLOAD guest/host number accounting
` [PATCH 4.9 066/107] x86/KVM/VMX: Extend add_atomic_switch_msr() to allow VMENTER only MSRs
` [PATCH 4.9 067/107] x86/KVM/VMX: Use MSR save list for IA32_FLUSH_CMD if required
` [PATCH 4.9 068/107] cpu/hotplug: Online siblings when SMT control is turned on
` [PATCH 4.9 069/107] x86/litf: Introduce vmx status variable
` [PATCH 4.9 070/107] x86/kvm: Drop L1TF MSR list approach
` [PATCH 4.9 071/107] x86/l1tf: Handle EPT disabled state proper
` [PATCH 4.9 072/107] x86/kvm: Move l1tf setup function
` [PATCH 4.9 073/107] x86/kvm: Add static key for flush always
` [PATCH 4.9 074/107] x86/kvm: Serialize L1D flush parameter setter
` [PATCH 4.9 075/107] x86/kvm: Allow runtime control of L1D flush
` [PATCH 4.9 076/107] cpu/hotplug: Expose SMT control init function
` [PATCH 4.9 077/107] cpu/hotplug: Set CPU_SMT_NOT_SUPPORTED early
` [PATCH 4.9 078/107] x86/bugs, kvm: Introduce boot-time control of L1TF mitigations
` [PATCH 4.9 079/107] Documentation: Add section about CPU vulnerabilities
` [PATCH 4.9 080/107] x86/KVM/VMX: Initialize the vmx_l1d_flush_pages content
` [PATCH 4.9 081/107] Documentation/l1tf: Fix typos
` [PATCH 4.9 082/107] cpu/hotplug: detect SMT disabled by BIOS
` [PATCH 4.9 083/107] x86/KVM/VMX: Dont set l1tf_flush_l1d to true from vmx_l1d_flush()
` [PATCH 4.9 084/107] x86/KVM/VMX: Replace vmx_l1d_flush_always with vmx_l1d_flush_cond
` [PATCH 4.9 085/107] x86/KVM/VMX: Move the l1tf_flush_l1d test to vmx_l1d_flush()
` [PATCH 4.9 086/107] x86/irq: Demote irq_cpustat_t::__softirq_pending to u16
` [PATCH 4.9 087/107] x86/KVM/VMX: Introduce per-host-cpu analogue of l1tf_flush_l1d
` [PATCH 4.9 088/107] x86: Dont include linux/irq.h from asm/hardirq.h
` [PATCH 4.9 089/107] x86/irq: Let interrupt handlers set kvm_cpu_l1tf_flush_l1d
` [PATCH 4.9 090/107] x86/KVM/VMX: Dont set l1tf_flush_l1d from vmx_handle_external_intr()
` [PATCH 4.9 091/107] Documentation/l1tf: Remove Yonah processors from not vulnerable list
` [PATCH 4.9 096/107] KVM: VMX: support MSR_IA32_ARCH_CAPABILITIES as a feature MSR
` [PATCH 4.9 097/107] x86/speculation: Simplify sysfs report of VMX L1TF vulnerability
` [PATCH 4.9 098/107] x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry
` [PATCH 4.9 099/107] KVM: VMX: Tell the nested hypervisor "
` [PATCH 4.9 100/107] cpu/hotplug: Fix SMT supported evaluation
` [PATCH 4.9 101/107] x86/speculation/l1tf: Invert all not present mappings
` [PATCH 4.9 103/107] x86/mm/pat: Make set_memory_np() L1TF safe
` [PATCH 4.9 104/107] x86/mm/kmmio: Make the tracer robust against L1TF
` [PATCH 4.9 105/107] tools headers: Synchronise x86 cpufeatures.h for L1TF additions
` [PATCH 4.9 106/107] x86/microcode: Do not upload microcode if CPUs are offline
` [PATCH 4.9 107/107] x86/microcode: Allow late microcode loading with SMT disabled

[PATCH 1/2] 9p: rename p9_free_req() function
 2018-08-14 17:44 UTC  (4+ messages)
` [PATCH 2/2] 9p: Add refcount to p9_req_t
  ` [V9fs-developer] "

[Buildroot] [PATCH 1/3] fake-hwclock: new package
 2018-08-14 17:44 UTC  (3+ messages)

[PATCH v2 1/2] WIP: 9p: rename p9_free_req() function
 2018-08-14 17:43 UTC 

Contributor Summit planning
 2018-08-14 17:43 UTC  (8+ messages)
            ` Measuring Community Involvement (was Re: Contributor Summit planning)

[v2 v3 PATCH 0/2] modify runtime test cases
 2018-08-14 17:43 UTC  (3+ messages)
` [PATCH v3 2/2] runtime selftest: optimize the case of hw_breakpoint

[PATCH] x86/kvm/vmx: Remove duplicate l1d flush definitions
 2018-08-14 17:32 UTC 

[PATCH 4.17 00/97] 4.17.15-stable review
 2018-08-14 17:17 UTC  (3+ messages)
` [PATCH 4.17 89/97] KVM: VMX: Tell the nested hypervisor to skip L1D flush on vmentry
` [PATCH 4.17 91/97] x86/speculation/l1tf: Invert all not present mappings

[PATCH 00/13] coresight: Implement device claim protocol
 2018-08-14 17:40 UTC  (3+ messages)
` [PATCH 06/13] coresight: etb10: Handle errors enabling the device

Smatch for Xen
 2018-08-14 14:52 UTC  (10+ messages)

[PATCH 4.14 000/104] 4.14.63-stable review
 2018-08-14 17:17 UTC  (85+ messages)
` [PATCH 4.14 003/104] scsi: hpsa: fix selection of reply queue
` [PATCH 4.14 004/104] scsi: core: introduce force_blk_mq
` [PATCH 4.14 005/104] scsi: virtio_scsi: fix IO hang caused by automatic irq vector affinity
` [PATCH 4.14 006/104] kasan: add no_sanitize attribute for clang builds
` [PATCH 4.14 007/104] Mark HI and TASKLET softirq synchronous
` [PATCH 4.14 009/104] xen/netfront: dont cache skb_shinfo()
` [PATCH 4.14 015/104] fix mntput/mntput race
` [PATCH 4.14 018/104] phy: phy-mtk-tphy: use auto instead of force to bypass utmi signals
` [PATCH 4.14 021/104] ARM: dts: imx6sx: fix irq for pcie bridge
` [PATCH 4.14 022/104] x86/paravirt: Fix spectre-v2 mitigations for paravirt guests
` [PATCH 4.14 023/104] x86/speculation: Protect against userspace-userspace spectreRSB
` [PATCH 4.14 025/104] x86/irqflags: Provide a declaration for native_save_fl
` [PATCH 4.14 026/104] x86/speculation/l1tf: Increase 32bit PAE __PHYSICAL_PAGE_SHIFT
` [PATCH 4.14 027/104] x86/speculation/l1tf: Change order of offset/type in swap entry
` [PATCH 4.14 028/104] x86/speculation/l1tf: Protect swap entries against L1TF
` [PATCH 4.14 029/104] x86/speculation/l1tf: Protect PROT_NONE PTEs against speculation
` [PATCH 4.14 030/104] x86/speculation/l1tf: Make sure the first page is always reserved
` [PATCH 4.14 031/104] x86/speculation/l1tf: Add sysfs reporting for l1tf
` [PATCH 4.14 033/104] x86/speculation/l1tf: Limit swap file size to MAX_PA/2
` [PATCH 4.14 034/104] x86/bugs: Move the l1tf function and define pr_fmt properly
` [PATCH 4.14 035/104] sched/smt: Update sched_smt_present at runtime
` [PATCH 4.14 036/104] x86/smp: Provide topology_is_primary_thread()
` [PATCH 4.14 037/104] x86/topology: Provide topology_smt_supported()
` [PATCH 4.14 038/104] cpu/hotplug: Make bringup/teardown of smp threads symmetric
` [PATCH 4.14 039/104] cpu/hotplug: Split do_cpu_down()
` [PATCH 4.14 040/104] cpu/hotplug: Provide knobs to control SMT
` [PATCH 4.14 041/104] x86/cpu: Remove the pointless CPU printout
` [PATCH 4.14 042/104] x86/cpu/AMD: Remove the pointless detect_ht() call
` [PATCH 4.14 043/104] x86/cpu/common: Provide detect_ht_early()
` [PATCH 4.14 044/104] x86/cpu/topology: Provide detect_extended_topology_early()
` [PATCH 4.14 045/104] x86/cpu/intel: Evaluate smp_num_siblings early
` [PATCH 4.14 046/104] x86/CPU/AMD: Do not check CPUID max ext level before parsing SMP info
` [PATCH 4.14 047/104] x86/cpu/AMD: Evaluate smp_num_siblings early
` [PATCH 4.14 049/104] x86/speculation/l1tf: Extend 64bit swap file size limit
` [PATCH 4.14 050/104] x86/cpufeatures: Add detection of L1D cache flush support
` [PATCH 4.14 051/104] x86/CPU/AMD: Move TOPOEXT reenablement before reading smp_num_siblings
` [PATCH 4.14 052/104] x86/speculation/l1tf: Protect PAE swap entries against L1TF
` [PATCH 4.14 053/104] x86/speculation/l1tf: Fix up pte->pfn conversion for PAE
` [PATCH 4.14 054/104] Revert "x86/apic: Ignore secondary threads if nosmt=force"
` [PATCH 4.14 055/104] cpu/hotplug: Boot HT siblings at least once
` [PATCH 4.14 056/104] x86/KVM: Warn user if KVM is loaded SMT and L1TF CPU bug being present
` [PATCH 4.14 057/104] x86/KVM/VMX: Add module argument for L1TF mitigation
` [PATCH 4.14 058/104] x86/KVM/VMX: Add L1D flush algorithm
` [PATCH 4.14 059/104] x86/KVM/VMX: Add L1D MSR based flush
` [PATCH 4.14 060/104] x86/KVM/VMX: Add L1D flush logic
` [PATCH 4.14 061/104] x86/KVM/VMX: Split the VMX MSR LOAD structures to have an host/guest numbers
` [PATCH 4.14 062/104] x86/KVM/VMX: Add find_msr() helper function
` [PATCH 4.14 063/104] x86/KVM/VMX: Separate the VMX AUTOLOAD guest/host number accounting
` [PATCH 4.14 064/104] x86/KVM/VMX: Extend add_atomic_switch_msr() to allow VMENTER only MSRs
` [PATCH 4.14 065/104] x86/KVM/VMX: Use MSR save list for IA32_FLUSH_CMD if required
` [PATCH 4.14 066/104] cpu/hotplug: Online siblings when SMT control is turned on
` [PATCH 4.14 067/104] x86/litf: Introduce vmx status variable
` [PATCH 4.14 068/104] x86/kvm: Drop L1TF MSR list approach
` [PATCH 4.14 069/104] x86/l1tf: Handle EPT disabled state proper
` [PATCH 4.14 070/104] x86/kvm: Move l1tf setup function
` [PATCH 4.14 071/104] x86/kvm: Add static key for flush always
` [PATCH 4.14 072/104] x86/kvm: Serialize L1D flush parameter setter
` [PATCH 4.14 073/104] x86/kvm: Allow runtime control of L1D flush
` [PATCH 4.14 074/104] cpu/hotplug: Expose SMT control init function
` [PATCH 4.14 075/104] cpu/hotplug: Set CPU_SMT_NOT_SUPPORTED early
` [PATCH 4.14 076/104] x86/bugs, kvm: Introduce boot-time control of L1TF mitigations
` [PATCH 4.14 077/104] Documentation: Add section about CPU vulnerabilities
` [PATCH 4.14 078/104] x86/KVM/VMX: Initialize the vmx_l1d_flush_pages content
` [PATCH 4.14 080/104] cpu/hotplug: detect SMT disabled by BIOS
` [PATCH 4.14 081/104] x86/KVM/VMX: Dont set l1tf_flush_l1d to true from vmx_l1d_flush()
` [PATCH 4.14 082/104] x86/KVM/VMX: Replace vmx_l1d_flush_always with vmx_l1d_flush_cond
` [PATCH 4.14 083/104] x86/KVM/VMX: Move the l1tf_flush_l1d test to vmx_l1d_flush()
` [PATCH 4.14 084/104] x86/irq: Demote irq_cpustat_t::__softirq_pending to u16
` [PATCH 4.14 085/104] x86/KVM/VMX: Introduce per-host-cpu analogue of l1tf_flush_l1d
` [PATCH 4.14 086/104] x86: Dont include linux/irq.h from asm/hardirq.h
` [PATCH 4.14 087/104] x86/irq: Let interrupt handlers set kvm_cpu_l1tf_flush_l1d
` [PATCH 4.14 088/104] x86/KVM/VMX: Dont set l1tf_flush_l1d from vmx_handle_external_intr()
` [PATCH 4.14 089/104] Documentation/l1tf: Remove Yonah processors from not vulnerable list
` [PATCH 4.14 094/104] KVM: VMX: support MSR_IA32_ARCH_CAPABILITIES as a feature MSR
` [PATCH 4.14 095/104] x86/speculation: Simplify sysfs report of VMX L1TF vulnerability
` [PATCH 4.14 096/104] x86/speculation: Use ARCH_CAPABILITIES to skip L1D flush on vmentry
` [PATCH 4.14 097/104] KVM: VMX: Tell the nested hypervisor "
` [PATCH 4.14 098/104] cpu/hotplug: Fix SMT supported evaluation
` [PATCH 4.14 099/104] x86/speculation/l1tf: Invert all not present mappings
` [PATCH 4.14 100/104] x86/speculation/l1tf: Make pmd/pud_mknotpresent() invert
` [PATCH 4.14 101/104] x86/mm/pat: Make set_memory_np() L1TF safe
` [PATCH 4.14 102/104] x86/mm/kmmio: Make the tracer robust against L1TF
` [PATCH 4.14 103/104] tools headers: Synchronise x86 cpufeatures.h for L1TF additions
` [PATCH 4.14 104/104] x86/microcode: Allow late microcode loading with SMT disabled

[yocto-docs][PATCH] ref-manual: Removed misleading paragraph in siteinfo section
 2018-08-14 17:37 UTC  (4+ messages)

possible deadlock in rhashtable_lookup_insert_fast
 2018-08-14 17:39 UTC  (2+ messages)

[PATCH] drm/i915/execlists: Clear STOP_RING bit before restoring the context
 2018-08-14 17:35 UTC  (2+ messages)
` ✓ Fi.CI.IGT: success for "

[PATCH v4 1/3] drm/i915: make PCH_GMBUS* definitions private to gvt
 2018-08-14 17:34 UTC  (3+ messages)
` [PATCH v4 3/3] drm/i915: remove confusing GPIO vs PCH_GPIO

[Qemu-devel] [PATCH v5 0/6] arm: add Cortex M0 CPU model and hex file loader
 2018-08-14 16:22 UTC  (4+ messages)
` [Qemu-arm] [PATCH v5 6/6] Add QTest testcase for the Intel Hexadecimal
    ` [Qemu-devel] "

[Buildroot] [Next v2] openresolv: new package
 2018-08-14 17:33 UTC 

[PATCH 1/6] package_manager: Remove rpm specific pieces of create_packages_dir()
 2018-08-14 17:32 UTC  (3+ messages)
` [PATCH 5/6] sstate/lib.oe.path: Ensure file sparseness is preserved
` [PATCH 6/6] selftest/package: Improve test to cover sparseness and hardlinking from sstate


This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.