public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2022-03-09 15:29:18 to 2022-03-09 16:21:47 UTC [more...]

[PATCH 5.15 00/43] 5.15.28-rc1 review
 2022-03-09 16:00 UTC  (37+ messages)
` [PATCH 5.15 01/43] x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
` [PATCH 5.15 02/43] x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
` [PATCH 5.15 03/43] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 5.15 04/43] Documentation/hw-vuln: Update spectre doc
` [PATCH 5.15 05/43] x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 5.15 06/43] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 5.15 07/43] x86/speculation: Update link to AMD speculation whitepaper
` [PATCH 5.15 08/43] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 5.15 09/43] x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
` [PATCH 5.15 11/43] ARM: early traps initialisation
` [PATCH 5.15 12/43] ARM: use LOADADDR() to get load address of sections
` [PATCH 5.15 13/43] ARM: Spectre-BHB workaround
` [PATCH 5.15 14/43] ARM: include unprivileged BPF status in Spectre V2 reporting
` [PATCH 5.15 15/43] arm64: Add Neoverse-N2, Cortex-A710 CPU part definition
` [PATCH 5.15 16/43] arm64: Add HWCAP for self-synchronising virtual counter
` [PATCH 5.15 17/43] arm64: Add Cortex-X2 CPU part definition
` [PATCH 5.15 20/43] arm64: cpufeature: add HWCAP for FEAT_RPRES
` [PATCH 5.15 21/43] arm64: entry.S: Add ventry overflow sanity checks
` [PATCH 5.15 22/43] arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
` [PATCH 5.15 23/43] KVM: arm64: Allow indirect vectors to be used without SPECTRE_V3A
` [PATCH 5.15 24/43] arm64: entry: Make the trampoline cleanup optional
` [PATCH 5.15 25/43] arm64: entry: Free up another register on kptis tramp_exit path
` [PATCH 5.15 26/43] arm64: entry: Move the trampoline data page before the text page
` [PATCH 5.15 28/43] arm64: entry: Dont assume tramp_vectors is the start of the vectors
` [PATCH 5.15 29/43] arm64: entry: Move trampoline macros out of ifdefd section
` [PATCH 5.15 30/43] arm64: entry: Make the kpti trampolines kpti sequence optional
` [PATCH 5.15 31/43] arm64: entry: Allow the trampoline text to occupy multiple pages
` [PATCH 5.15 32/43] arm64: entry: Add non-kpti __bp_harden_el1_vectors for mitigations
` [PATCH 5.15 33/43] arm64: entry: Add vectors that have the bhb mitigation sequences
` [PATCH 5.15 34/43] arm64: entry: Add macro for reading symbol addresses from the trampoline
` [PATCH 5.15 35/43] arm64: Add percpu vectors for EL1
` [PATCH 5.15 37/43] arm64: Mitigate spectre style branch history side channels
` [PATCH 5.15 38/43] KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered and migrated
` [PATCH 5.15 40/43] arm64: proton-pack: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 5.15 41/43] ARM: fix build error when BPF_SYSCALL is disabled
` [PATCH 5.15 43/43] block: drop unused includes in <linux/genhd.h>

[PATCH v2 1/2] x86/boot: Fix memremap of setup_indirect structures
 2022-03-09 16:06 UTC  (2+ messages)
` [tip: x86/urgent] "

[PATCH 5.10 00/43] 5.10.105-rc1 review
 2022-03-09 16:00 UTC  (43+ messages)
` [PATCH 5.10 01/43] x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
` [PATCH 5.10 02/43] x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
` [PATCH 5.10 03/43] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 5.10 04/43] Documentation/hw-vuln: Update spectre doc
` [PATCH 5.10 05/43] x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 5.10 06/43] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 5.10 07/43] x86/speculation: Update link to AMD speculation whitepaper
` [PATCH 5.10 08/43] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 5.10 09/43] x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
` [PATCH 5.10 10/43] ARM: report Spectre v2 status through sysfs
` [PATCH 5.10 11/43] ARM: early traps initialisation
` [PATCH 5.10 12/43] ARM: use LOADADDR() to get load address of sections
` [PATCH 5.10 13/43] ARM: Spectre-BHB workaround
` [PATCH 5.10 14/43] ARM: include unprivileged BPF status in Spectre V2 reporting
` [PATCH 5.10 15/43] arm64: cputype: Add CPU implementor & types for the Apple M1 cores
` [PATCH 5.10 16/43] arm64: Add Neoverse-N2, Cortex-A710 CPU part definition
` [PATCH 5.10 17/43] arm64: Add Cortex-X2 "
` [PATCH 5.10 19/43] arm64: Add HWCAP for self-synchronising virtual counter
` [PATCH 5.10 20/43] arm64: add ID_AA64ISAR2_EL1 sys register
` [PATCH 5.10 21/43] arm64: cpufeature: add HWCAP for FEAT_AFP
` [PATCH 5.10 22/43] arm64: cpufeature: add HWCAP for FEAT_RPRES
` [PATCH 5.10 23/43] arm64: entry.S: Add ventry overflow sanity checks
` [PATCH 5.10 24/43] arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
` [PATCH 5.10 25/43] arm64: entry: Make the trampoline cleanup optional
` [PATCH 5.10 26/43] arm64: entry: Free up another register on kptis tramp_exit path
` [PATCH 5.10 27/43] arm64: entry: Move the trampoline data page before the text page
` [PATCH 5.10 28/43] arm64: entry: Allow tramp_alias to access symbols after the 4K boundary
` [PATCH 5.10 29/43] arm64: entry: Dont assume tramp_vectors is the start of the vectors
` [PATCH 5.10 30/43] arm64: entry: Move trampoline macros out of ifdefd section
` [PATCH 5.10 31/43] arm64: entry: Make the kpti trampolines kpti sequence optional
` [PATCH 5.10 32/43] arm64: entry: Allow the trampoline text to occupy multiple pages
` [PATCH 5.10 33/43] arm64: entry: Add non-kpti __bp_harden_el1_vectors for mitigations
` [PATCH 5.10 34/43] arm64: entry: Add vectors that have the bhb mitigation sequences
` [PATCH 5.10 35/43] arm64: entry: Add macro for reading symbol addresses from the trampoline
` [PATCH 5.10 36/43] arm64: Add percpu vectors for EL1
` [PATCH 5.10 37/43] arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of Spectre-v2
` [PATCH 5.10 38/43] KVM: arm64: Allow indirect vectors to be used without SPECTRE_V3A
` [PATCH 5.10 39/43] arm64: Mitigate spectre style branch history side channels
` [PATCH 5.10 40/43] KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered and migrated
` [PATCH 5.10 41/43] arm64: Use the clearbhb instruction in mitigations
` [PATCH 5.10 42/43] arm64: proton-pack: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 5.10 43/43] ARM: fix build error when BPF_SYSCALL is disabled

[PATCH 5.4 00/18] 5.4.184-rc1 review
 2022-03-09 16:00 UTC  (19+ messages)
` [PATCH 5.4 01/18] x86/speculation: Merge one test in spectre_v2_user_select_mitigation()
` [PATCH 5.4 02/18] x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
` [PATCH 5.4 03/18] x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
` [PATCH 5.4 04/18] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 5.4 05/18] Documentation/hw-vuln: Update spectre doc
` [PATCH 5.4 06/18] x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 5.4 07/18] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 5.4 08/18] x86/speculation: Update link to AMD speculation whitepaper
` [PATCH 5.4 09/18] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 5.4 10/18] x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
` [PATCH 5.4 11/18] arm/arm64: Provide a wrapper for SMCCC 1.1 calls
` [PATCH 5.4 12/18] arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit()
` [PATCH 5.4 13/18] ARM: report Spectre v2 status through sysfs
` [PATCH 5.4 14/18] ARM: early traps initialisation
` [PATCH 5.4 15/18] ARM: use LOADADDR() to get load address of sections
` [PATCH 5.4 16/18] ARM: Spectre-BHB workaround
` [PATCH 5.4 17/18] ARM: include unprivileged BPF status in Spectre V2 reporting
` [PATCH 5.4 18/18] ARM: fix build error when BPF_SYSCALL is disabled

[PATCH v4 1/2] drm/bridge: analogix_dp: Grab runtime PM reference for DP-AUX
 2022-03-09 16:04 UTC  (4+ messages)
` [PATCH v4 2/2] drm/bridge: analogix_dp: Enable autosuspend

[PATCH 4.19 00/18] 4.19.234-rc1 review
 2022-03-09 15:59 UTC  (19+ messages)
` [PATCH 4.19 01/18] x86/speculation: Merge one test in spectre_v2_user_select_mitigation()
` [PATCH 4.19 02/18] x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
` [PATCH 4.19 03/18] x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
` [PATCH 4.19 04/18] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 4.19 05/18] Documentation/hw-vuln: Update spectre doc
` [PATCH 4.19 06/18] x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 4.19 07/18] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 4.19 08/18] x86/speculation: Update link to AMD speculation whitepaper
` [PATCH 4.19 09/18] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 4.19 10/18] x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
` [PATCH 4.19 11/18] arm/arm64: Provide a wrapper for SMCCC 1.1 calls
` [PATCH 4.19 12/18] arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit()
` [PATCH 4.19 13/18] ARM: report Spectre v2 status through sysfs
` [PATCH 4.19 14/18] ARM: early traps initialisation
` [PATCH 4.19 15/18] ARM: use LOADADDR() to get load address of sections
` [PATCH 4.19 16/18] ARM: Spectre-BHB workaround
` [PATCH 4.19 17/18] ARM: include unprivileged BPF status in Spectre V2 reporting
` [PATCH 4.19 18/18] ARM: fix build error when BPF_SYSCALL is disabled

[PATCH] docs/kernel-parameters: update description of mem=
 2022-03-09 16:05 UTC  (2+ messages)

[PATCH] x86/mce: Unify vendors grading logic and provide AMD machine error checks
 2022-03-09 16:03 UTC  (3+ messages)

[PATCH 4.14 00/18] 4.14.271-rc1 review
 2022-03-09 15:59 UTC  (19+ messages)
` [PATCH 4.14 01/18] x86/speculation: Merge one test in spectre_v2_user_select_mitigation()
` [PATCH 4.14 02/18] x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
` [PATCH 4.14 03/18] x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
` [PATCH 4.14 04/18] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 4.14 05/18] Documentation/hw-vuln: Update spectre doc
` [PATCH 4.14 06/18] x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 4.14 07/18] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 4.14 08/18] x86/speculation: Update link to AMD speculation whitepaper
` [PATCH 4.14 09/18] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 4.14 10/18] x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
` [PATCH 4.14 11/18] arm/arm64: Provide a wrapper for SMCCC 1.1 calls
` [PATCH 4.14 12/18] arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit()
` [PATCH 4.14 13/18] ARM: report Spectre v2 status through sysfs
` [PATCH 4.14 14/18] ARM: early traps initialisation
` [PATCH 4.14 15/18] ARM: use LOADADDR() to get load address of sections
` [PATCH 4.14 16/18] ARM: Spectre-BHB workaround
` [PATCH 4.14 17/18] ARM: include unprivileged BPF status in Spectre V2 reporting
` [PATCH 4.14 18/18] ARM: fix build error when BPF_SYSCALL is disabled

[PATCH v8 0/5] Enable root to update the blacklist keyring
 2022-03-09 16:01 UTC  (7+ messages)
` [PATCH v8 5/5] certs: Allow root user to append signed hashes to "

[PATCH 4.9 00/24] 4.9.306-rc1 review
 2022-03-09 15:59 UTC  (25+ messages)
` [PATCH 4.9 01/24] x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant
` [PATCH 4.9 02/24] x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support
` [PATCH 4.9 03/24] x86/retpoline: Remove minimal retpoline support
` [PATCH 4.9 04/24] Documentation: Add section about CPU vulnerabilities for Spectre
` [PATCH 4.9 05/24] Documentation: Add swapgs description to the Spectre v1 documentation
` [PATCH 4.9 06/24] Documentation: refer to config RANDOMIZE_BASE for kernel address-space randomization
` [PATCH 4.9 07/24] x86/speculation: Merge one test in spectre_v2_user_select_mitigation()
` [PATCH 4.9 08/24] x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
` [PATCH 4.9 09/24] x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
` [PATCH 4.9 10/24] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 4.9 11/24] Documentation/hw-vuln: Update spectre doc
` [PATCH 4.9 12/24] x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 4.9 13/24] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 4.9 14/24] x86/speculation: Update link to AMD speculation whitepaper
` [PATCH 4.9 15/24] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 4.9 16/24] x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
` [PATCH 4.9 17/24] arm/arm64: Provide a wrapper for SMCCC 1.1 calls
` [PATCH 4.9 18/24] arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit()
` [PATCH 4.9 19/24] ARM: report Spectre v2 status through sysfs
` [PATCH 4.9 20/24] ARM: early traps initialisation
` [PATCH 4.9 21/24] ARM: use LOADADDR() to get load address of sections
` [PATCH 4.9 22/24] ARM: Spectre-BHB workaround
` [PATCH 4.9 23/24] ARM: include unprivileged BPF status in Spectre V2 reporting
` [PATCH 4.9 24/24] ARM: fix build error when BPF_SYSCALL is disabled

[PATCHv5 04/30] x86/tdx: Extend the confidential computing API to support TDX guests
 2022-03-09 16:01 UTC  (2+ messages)
` [PATCHv5.1 "

[PATCH v7 00/13] media: atmel: atmel-isc: implement media controller
 2022-03-09 15:57 UTC  (5+ messages)
` [PATCH v7 04/13] "

net: asix: best way to handle orphan PHYs
 2022-03-09 15:57 UTC  (4+ messages)

[PATCH net-next] net: openvswitch: fix uAPI incompatibility with existing user space
 2022-03-09 15:56 UTC 

[PATCH v2] ASoC: tas5805m: fix pdn polarity
 2022-03-09 15:56 UTC  (2+ messages)

[PATCH 1/3] drm/bridge: Add MAINTAINERS entry for DRM drivers for bridge chip bindings
 2022-03-09 15:56 UTC  (2+ messages)

Warning when exiting osnoise tracer
 2022-03-09 15:54 UTC  (3+ messages)

[PATCH] powerpc/vdso: Fix VDSO unmap check
 2022-03-09 15:51 UTC  (2+ messages)

[PATCH v2 00/19] netfs: Prep for write helpers
 2022-03-09 15:49 UTC  (12+ messages)
` [PATCH v2 02/19] netfs: Generate enums from trace symbol mapping lists
` [PATCH v2 03/19] netfs: Rename netfs_read_*request to netfs_io_*request
` [PATCH v2 04/19] netfs: Finish off rename of netfs_read_request to netfs_io_request
` [PATCH v2 05/19] netfs: Split netfs_io_* object handling out
` [PATCH v2 06/19] netfs: Adjust the netfs_rreq tracepoint slightly

[PATCH 0/4] SVM fixes + apic fix
 2022-03-09 15:48 UTC  (9+ messages)
` [PATCH 1/4] KVM: x86: mark synthetic SMM vmexit as SVM_EXIT_SW
` [PATCH 3/4] KVM: x86: SVM: use vmcb01 in avic_init_vmcb

[RFC PATCH 09/11] x86/microcode: Expose EUPDATESVN procedure via sysfs
 2022-03-09 15:48 UTC  (3+ messages)

[PATCH 1/2] ARM: fix building NOMMU ARMv4/v5 kernels
 2022-03-09 15:48 UTC  (3+ messages)
` [PATCH 2/2] ARM: remove support for NOMMU ARMv4/v5

[PATCH v1 00/15] mm: COW fixes part 2: reliable GUP pins of anonymous pages
 2022-03-09 15:47 UTC  (3+ messages)
` [PATCH v1 10/15] mm/page-flags: reuse PG_slab as PG_anon_exclusive for PageAnon() pages

[PATCH v2 net-next 00/10] net: bridge: Multiple Spanning Trees
 2022-03-09 15:47 UTC  (9+ messages)
` [PATCH v2 net-next 04/10] net: bridge: mst: Notify switchdev drivers of VLAN MSTI migrations
` [PATCH v2 net-next 06/10] net: dsa: Pass VLAN MSTI migration notifications to driver

[PATCH v1 0/4] Thermal library and tools
 2022-03-09 15:42 UTC  (4+ messages)

[PATCH v3 00/23] Add generic vdso_base tracking
 2022-03-09 15:41 UTC  (2+ messages)

[PATCH v3 0/6] KVM: my debug patch queue
 2022-03-09 15:40 UTC  (8+ messages)
` [PATCH v3 2/6] KVM: x86: add force_intercept_exceptions_mask

[PATCH V3] dt-bindings: nvmem: add U-Boot environment variables binding
 2022-03-09 15:40 UTC  (3+ messages)

[PATCH v2 00/25] KVM MMU refactoring part 2: role changes
 2022-03-09 15:40 UTC  (6+ messages)
` [PATCH v2 08/25] KVM: x86/mmu: split cpu_mode from mmu_role

[PATCH 1/1] Rewrite mathematical expressions
 2022-03-09 15:38 UTC  (2+ messages)

[PATCH v3 0/3] arch_topology, ACPI: populate cpu capacity from CPPC
 2022-03-09 15:37 UTC  (4+ messages)
` [PATCH v3 2/3] arch_topology: obtain cpu capacity using information "

[PATCH v13 00/11] arm64: Reorganize the unwinder and implement stack trace reliability checks
 2022-03-09 15:34 UTC  (8+ messages)
  ` [PATCH v13 06/11] arm64: Use stack_trace_consume_fn and rename args to unwind()

[patch v11 00/13] extensible prctl task isolation interface and vmstat sync
 2022-03-09 15:31 UTC  (2+ messages)

[PATCH 0/2] Cleanups for slab
 2022-03-09 15:28 UTC  (3+ messages)
` [PATCH 2/2] mm: slub: Delete useless parameter of alloc_slab_page()


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox