public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2022-03-10 14:34:57 to 2022-03-10 15:10:24 UTC [more...]

[for-linus][PATCH 0/3] tracing: Three fixes
 2022-03-10 15:04 UTC  (2+ messages)
` [for-linus][PATCH 1/3] tracing/osnoise: Do not unregister events twice

[PATCH] tcp: export symbol tcp_set_congestion_control
 2022-03-10 15:05 UTC  (4+ messages)

[PATCH v3 1/3] sched/cpuacct: fix charge percpu cpuusage
 2022-03-10 15:01 UTC  (7+ messages)
` [PATCH v3 2/3] sched/cpuacct: optimize away RCU read lock

[PATCH net-next 0/3] Extend locked port feature with FDB locked flag (MAC-Auth/MAB)
 2022-03-10 15:00 UTC  (8+ messages)
` [PATCH net-next 1/3] net: bridge: add fdb flag to extent locked port feature
` [PATCH net-next 2/3] net: switchdev: add support for offloading of fdb locked flag
` [PATCH net-next 3/3] net: dsa: mv88e6xxx: mac-auth/MAB implementation

[PATCH] perf/arm-ccn: Use platform_get_irq() to get the interrupt
 2022-03-10 14:59 UTC  (7+ messages)
` [PATCH] slimbus: qcom-ngd-ctrl: "

[PATCH v1 0/6] Add TDX Guest Attestation support
 2022-03-10 14:57 UTC  (6+ messages)
` [PATCH v1 4/6] platform/x86: intel_tdx_attest: Add TDX Guest attestation interface driver

[PATCH v4 0/3] arch_topology, ACPI: populate cpu capacity from CPPC
 2022-03-10 14:54 UTC  (4+ messages)
` [PATCH v4 1/3] x86, ACPI: rename init_freq_invariance_cppc to arch_init_invariance_cppc
` [PATCH v4 2/3] arch_topology: obtain cpu capacity using information from CPPC
` [PATCH v4 3/3] arm64, topology: enable use of init_cpu_capacity_cppc()

[PATCH -next] i2c: designware: Add helper to remove redundancy
 2022-03-10 14:52 UTC  (2+ messages)

[PATCHv5 00/30] TDX Guest: TDX core support
 2022-03-10 14:51 UTC  (9+ messages)
` [PATCHv5 02/30] x86/tdx: Provide common base for SEAMCALL and TDCALL C wrappers
` [PATCHv5 27/30] x86/kvm: Use bounce buffers for TD guest

[PATCH] drm: of: Properly try all possible cases for bridge/panel detection
 2022-03-10 14:54 UTC  (2+ messages)

[PATCH v12 00/46] Add AMD Secure Nested Paging (SEV-SNP) Guest Support
 2022-03-10 14:51 UTC  (3+ messages)
` [PATCH v12 32/46] x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers

[PATCH] docs: UML: Mention telnetd for port channel
 2022-03-10 14:17 UTC  (2+ messages)

[PATCH] PCI: mediatek: Fix refcount leak in mtk_pcie_subsys_powerup
 2022-03-10 14:48 UTC  (2+ messages)

[PATCH v3 0/2] gpio: ts4900: Do not set DAT and OE together
 2022-03-10 14:48 UTC  (3+ messages)
` [PATCH v3 1/2] "

[PATCH v2 00/18] crypto: rockchip: permit to pass self-tests
 2022-03-10 14:45 UTC  (4+ messages)
` [PATCH v2 11/18] crypto: rockhip: do not handle dma clock

[PATCH v2 0/2] Cleanups for slab
 2022-03-10 14:45 UTC  (4+ messages)
` [PATCH v2 1/2] mm: slab: Delete unused SLAB_DEACTIVATED flag
` [PATCH v2 2/2] mm: slub: Delete useless parameter of alloc_slab_page()

[PATCH] drm/rockchip: remove redundant assignment to pointer connector
 2022-03-10 14:50 UTC  (3+ messages)

[PATCH] gpio: Restrict usage of gc irq members before initialization
 2022-03-10 14:44 UTC  (2+ messages)

[PATCH V2] arm64: dts: qcom: sc7280: Enable gcc HW reset
 2022-03-10 14:45 UTC 

[PATCH V2] ax25: Fix NULL pointer dereferences in ax25 timers
 2022-03-10 14:43 UTC 

[RFC PATCH v0 0/6] x86/AMD: Userspace address tagging
 2022-03-10 14:32 UTC  (2+ messages)

[PATCH v2 0/2] exfat: allow access to paths with trailing dots
 2022-03-10 14:24 UTC  (3+ messages)
` [PATCH v2 1/2] The "keep_last_dots" mount option will, in a subsequent commit, control whether or not trailing periods '.' are stripped from path components during file lookup or file creation
` [PATCH v2 2/2] exfat currently unconditionally strips trailing periods '.' when performing path lookup, but allows them in the filenames during file creation. This is done intentionally, loosely following Windows behaviour and specifications which state:

arch/arm64/kvm/va_layout.c:292:6: warning: no previous prototype for function 'kvm_compute_final_ctr_el0'
 2022-03-10 14:42 UTC 

[syzbot] memory leak in usb_get_configuration
 2022-03-10 14:36 UTC  (2+ messages)

[PATCH] net: phy: Kconfig: micrel_phy: fix dependency issue
 2022-03-10 14:38 UTC  (2+ messages)

[PATCH] net: ipv6: fix invalid alloclen in __ip6_append_data
 2022-03-10 14:39 UTC  (8+ messages)

[PATCH v4 00/45] x86: Kernel IBT
 2022-03-10 14:37 UTC  (13+ messages)

[PATCH v3] cpufreq: unify the show() and store() styles of attr and use __ATTR_XX macro
 2022-03-10 14:38 UTC 

[PATCH printk v1 00/13] implement threaded console printing
 2022-03-10 14:34 UTC  (5+ messages)
` [PATCH printk v1 11/13] printk: reimplement console_lock for proper kthread support

[PATCH] remoteproc: mediatek: fix side effect of mt8195 sram power on
 2022-03-10 14:40 UTC  (2+ messages)

[PATCH net-next v2] net: lan966x: Improve the CPU TX bitrate
 2022-03-10 14:36 UTC  (2+ messages)

[PATCH 5.15 00/58] 5.15.28-rc2 review
 2022-03-10 14:19 UTC  (59+ messages)
` [PATCH 5.15 01/58] slip: fix macro redefine warning
` [PATCH 5.15 02/58] x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
` [PATCH 5.15 03/58] x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
` [PATCH 5.15 04/58] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 5.15 05/58] Documentation/hw-vuln: Update spectre doc
` [PATCH 5.15 06/58] x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 5.15 07/58] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 5.15 08/58] x86/speculation: Update link to AMD speculation whitepaper
` [PATCH 5.15 09/58] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 5.15 10/58] x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
` [PATCH 5.15 11/58] ARM: report Spectre v2 status through sysfs
` [PATCH 5.15 12/58] ARM: early traps initialisation
` [PATCH 5.15 13/58] ARM: use LOADADDR() to get load address of sections
` [PATCH 5.15 14/58] ARM: Spectre-BHB workaround
` [PATCH 5.15 15/58] ARM: include unprivileged BPF status in Spectre V2 reporting
` [PATCH 5.15 16/58] arm64: Add Neoverse-N2, Cortex-A710 CPU part definition
` [PATCH 5.15 17/58] arm64: Add HWCAP for self-synchronising virtual counter
` [PATCH 5.15 18/58] arm64: Add Cortex-X2 CPU part definition
` [PATCH 5.15 19/58] arm64: add ID_AA64ISAR2_EL1 sys register
` [PATCH 5.15 20/58] arm64: cpufeature: add HWCAP for FEAT_AFP
` [PATCH 5.15 21/58] arm64: cpufeature: add HWCAP for FEAT_RPRES
` [PATCH 5.15 22/58] arm64: entry.S: Add ventry overflow sanity checks
` [PATCH 5.15 23/58] arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
` [PATCH 5.15 24/58] KVM: arm64: Allow indirect vectors to be used without SPECTRE_V3A
` [PATCH 5.15 25/58] arm64: entry: Make the trampoline cleanup optional
` [PATCH 5.15 26/58] arm64: entry: Free up another register on kptis tramp_exit path
` [PATCH 5.15 27/58] arm64: entry: Move the trampoline data page before the text page
` [PATCH 5.15 28/58] arm64: entry: Allow tramp_alias to access symbols after the 4K boundary
` [PATCH 5.15 29/58] arm64: entry: Dont assume tramp_vectors is the start of the vectors
` [PATCH 5.15 30/58] arm64: entry: Move trampoline macros out of ifdefd section
` [PATCH 5.15 31/58] arm64: entry: Make the kpti trampolines kpti sequence optional
` [PATCH 5.15 32/58] arm64: entry: Allow the trampoline text to occupy multiple pages
` [PATCH 5.15 33/58] arm64: entry: Add non-kpti __bp_harden_el1_vectors for mitigations
` [PATCH 5.15 34/58] arm64: entry: Add vectors that have the bhb mitigation sequences
` [PATCH 5.15 35/58] arm64: entry: Add macro for reading symbol addresses from the trampoline
` [PATCH 5.15 36/58] arm64: Add percpu vectors for EL1
` [PATCH 5.15 37/58] arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of Spectre-v2
` [PATCH 5.15 38/58] arm64: Mitigate spectre style branch history side channels
` [PATCH 5.15 39/58] KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered and migrated
` [PATCH 5.15 40/58] arm64: Use the clearbhb instruction in mitigations
` [PATCH 5.15 41/58] arm64: proton-pack: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 5.15 42/58] ARM: fix build error when BPF_SYSCALL is disabled
` [PATCH 5.15 43/58] ARM: fix co-processor register typo
` [PATCH 5.15 44/58] ARM: Do not use NOCROSSREFS directive with ld.lld
` [PATCH 5.15 45/58] arm64: Do not include __READ_ONCE() block in assembly files
` [PATCH 5.15 46/58] ARM: fix build warning in proc-v7-bugs.c
` [PATCH 5.15 47/58] xen/xenbus: dont let xenbus_grant_ring() remove grants in error case
` [PATCH 5.15 48/58] xen/grant-table: add gnttab_try_end_foreign_access()
` [PATCH 5.15 49/58] xen/blkfront: dont use gnttab_query_foreign_access() for mapped status
` [PATCH 5.15 50/58] xen/netfront: "
` [PATCH 5.15 51/58] xen/scsifront: "
` [PATCH 5.15 52/58] xen/gntalloc: dont use gnttab_query_foreign_access()
` [PATCH 5.15 53/58] xen: remove gnttab_query_foreign_access()
` [PATCH 5.15 54/58] xen/9p: use alloc/free_pages_exact()
` [PATCH 5.15 55/58] xen/pvcalls: "
` [PATCH 5.15 56/58] xen/gnttab: fix gnttab_end_foreign_access() without page specified
` [PATCH 5.15 57/58] xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
` [PATCH 5.15 58/58] Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC GPE"

[PATCH 5.10 00/58] 5.10.105-rc2 review
 2022-03-10 14:19 UTC  (48+ messages)
` [PATCH 5.10 03/58] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 5.10 06/58] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 5.10 10/58] ARM: report Spectre v2 status through sysfs
` [PATCH 5.10 13/58] ARM: Spectre-BHB workaround
` [PATCH 5.10 15/58] arm64: cputype: Add CPU implementor & types for the Apple M1 cores
` [PATCH 5.10 16/58] arm64: Add Neoverse-N2, Cortex-A710 CPU part definition
` [PATCH 5.10 17/58] arm64: Add Cortex-X2 "
` [PATCH 5.10 18/58] arm64: Add Cortex-A510 "
` [PATCH 5.10 19/58] arm64: Add HWCAP for self-synchronising virtual counter
` [PATCH 5.10 20/58] arm64: add ID_AA64ISAR2_EL1 sys register
` [PATCH 5.10 21/58] arm64: cpufeature: add HWCAP for FEAT_AFP
` [PATCH 5.10 22/58] arm64: cpufeature: add HWCAP for FEAT_RPRES
` [PATCH 5.10 23/58] arm64: entry.S: Add ventry overflow sanity checks
` [PATCH 5.10 24/58] arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
` [PATCH 5.10 25/58] arm64: entry: Make the trampoline cleanup optional
` [PATCH 5.10 27/58] arm64: entry: Move the trampoline data page before the text page
` [PATCH 5.10 28/58] arm64: entry: Allow tramp_alias to access symbols after the 4K boundary
` [PATCH 5.10 29/58] arm64: entry: Dont assume tramp_vectors is the start of the vectors
` [PATCH 5.10 30/58] arm64: entry: Move trampoline macros out of ifdefd section
` [PATCH 5.10 31/58] arm64: entry: Make the kpti trampolines kpti sequence optional
` [PATCH 5.10 32/58] arm64: entry: Allow the trampoline text to occupy multiple pages
` [PATCH 5.10 33/58] arm64: entry: Add non-kpti __bp_harden_el1_vectors for mitigations
` [PATCH 5.10 34/58] arm64: entry: Add vectors that have the bhb mitigation sequences
` [PATCH 5.10 35/58] arm64: entry: Add macro for reading symbol addresses from the trampoline
` [PATCH 5.10 36/58] arm64: Add percpu vectors for EL1
` [PATCH 5.10 37/58] arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of Spectre-v2
` [PATCH 5.10 38/58] KVM: arm64: Allow indirect vectors to be used without SPECTRE_V3A
` [PATCH 5.10 39/58] arm64: Mitigate spectre style branch history side channels
` [PATCH 5.10 40/58] KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered and migrated
` [PATCH 5.10 41/58] arm64: Use the clearbhb instruction in mitigations
` [PATCH 5.10 42/58] arm64: proton-pack: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 5.10 43/58] ARM: fix build error when BPF_SYSCALL is disabled
` [PATCH 5.10 44/58] ARM: fix co-processor register typo
` [PATCH 5.10 45/58] ARM: Do not use NOCROSSREFS directive with ld.lld
` [PATCH 5.10 46/58] ARM: fix build warning in proc-v7-bugs.c
` [PATCH 5.10 47/58] xen/xenbus: dont let xenbus_grant_ring() remove grants in error case
` [PATCH 5.10 48/58] xen/grant-table: add gnttab_try_end_foreign_access()
` [PATCH 5.10 49/58] xen/blkfront: dont use gnttab_query_foreign_access() for mapped status
` [PATCH 5.10 50/58] xen/netfront: "
` [PATCH 5.10 51/58] xen/scsifront: "
` [PATCH 5.10 52/58] xen/gntalloc: dont use gnttab_query_foreign_access()
` [PATCH 5.10 53/58] xen: remove gnttab_query_foreign_access()
` [PATCH 5.10 54/58] xen/9p: use alloc/free_pages_exact()
` [PATCH 5.10 55/58] xen/pvcalls: "
` [PATCH 5.10 56/58] xen/gnttab: fix gnttab_end_foreign_access() without page specified
` [PATCH 5.10 57/58] xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
` [PATCH 5.10 58/58] Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC GPE"

[PATCH 5.4 00/33] 5.4.184-rc2 review
 2022-03-10 14:19 UTC  (34+ messages)
` [PATCH 5.4 01/33] x86/speculation: Merge one test in spectre_v2_user_select_mitigation()
` [PATCH 5.4 02/33] x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
` [PATCH 5.4 03/33] x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
` [PATCH 5.4 04/33] x86/speculation: Add eIBRS + Retpoline options
` [PATCH 5.4 05/33] Documentation/hw-vuln: Update spectre doc
` [PATCH 5.4 06/33] x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation reporting
` [PATCH 5.4 07/33] x86/speculation: Use generic retpoline by default on AMD
` [PATCH 5.4 08/33] x86/speculation: Update link to AMD speculation whitepaper
` [PATCH 5.4 09/33] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 5.4 10/33] x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT
` [PATCH 5.4 11/33] arm/arm64: Provide a wrapper for SMCCC 1.1 calls
` [PATCH 5.4 12/33] arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit()
` [PATCH 5.4 13/33] ARM: report Spectre v2 status through sysfs
` [PATCH 5.4 14/33] ARM: early traps initialisation
` [PATCH 5.4 15/33] ARM: use LOADADDR() to get load address of sections
` [PATCH 5.4 16/33] ARM: Spectre-BHB workaround
` [PATCH 5.4 17/33] ARM: include unprivileged BPF status in Spectre V2 reporting
` [PATCH 5.4 18/33] ARM: fix build error when BPF_SYSCALL is disabled
` [PATCH 5.4 19/33] ARM: fix co-processor register typo
` [PATCH 5.4 20/33] ARM: Do not use NOCROSSREFS directive with ld.lld
` [PATCH 5.4 21/33] ARM: fix build warning in proc-v7-bugs.c
` [PATCH 5.4 22/33] xen/xenbus: dont let xenbus_grant_ring() remove grants in error case
` [PATCH 5.4 23/33] xen/grant-table: add gnttab_try_end_foreign_access()
` [PATCH 5.4 24/33] xen/blkfront: dont use gnttab_query_foreign_access() for mapped status
` [PATCH 5.4 25/33] xen/netfront: "
` [PATCH 5.4 26/33] xen/scsifront: "
` [PATCH 5.4 27/33] xen/gntalloc: dont use gnttab_query_foreign_access()
` [PATCH 5.4 28/33] xen: remove gnttab_query_foreign_access()
` [PATCH 5.4 29/33] xen/9p: use alloc/free_pages_exact()
` [PATCH 5.4 30/33] xen/pvcalls: "
` [PATCH 5.4 31/33] xen/gnttab: fix gnttab_end_foreign_access() without page specified
` [PATCH 5.4 32/33] xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
` [PATCH 5.4 33/33] Revert "ACPI: PM: s2idle: Cancel wakeup before dispatching EC GPE"

[PATCH v1 0/4] arm64: mvebu: Support for Marvell 98DX2530 (and variants)
 2022-03-10 14:26 UTC  (3+ messages)
` [PATCH v1 3/4] arm64: dts: marvell: Add Armada 98DX2530 SoC and RD-AC5X board

[PATCH 4.19 00/33] 4.19.234-rc2 review
 2022-03-10 14:18 UTC  (5+ messages)
` [PATCH 4.19 09/33] x86/speculation: Warn about Spectre v2 LFENCE mitigation
` [PATCH 4.19 11/33] arm/arm64: Provide a wrapper for SMCCC 1.1 calls
` [PATCH 4.19 12/33] arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit()
` [PATCH 4.19 29/33] xen: remove gnttab_query_foreign_access()

[PATCH iproute2-next 0/3] Extend locked port feature with FDB locked flag (MAC-Auth/MAB)
 2022-03-10 14:26 UTC  (3+ messages)

[PATCH] task_work: simplify the task_work_add() interface
 2022-03-10 14:27 UTC  (3+ messages)

[PATCH] riscv: ftrace: no need to acquire text_mutex when executed in stop_machine
 2022-03-10 14:27 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox