LKML Archive on lore.kernel.org
help / color / mirror / Atom feed
[PATCH 00/33] use match_string() helper
 2018-05-21 21:58 UTC  (21+ messages)
` [PATCH 03/33] Staging: gdm724x: "
` [PATCH 04/33] gpiolib-of: "
` [PATCH 05/33] cxgb4: "
` [PATCH 07/33] iwlwifi: mvm: "
` [PATCH 09/33] phy: tegra: "
` [PATCH 10/33] pata_hpt37x: "
` [PATCH 12/33] clk: bcm2835: "
` [PATCH 14/33] clk: "
` [PATCH 17/33] pinctrl: armada-37xx: "
` [PATCH 18/33] power: supply: "

[PATCH] audit: add containerid support for IMA-audit
 2018-05-21 21:57 UTC  (5+ messages)

[REGRESSION] v4.17-rc4: xgalaga fails to start in fullscreen (default) mode
 2018-05-21 21:57 UTC  (2+ messages)

[GIT PULL] SCSI fixes for 4.17-rc6
 2018-05-21 21:57 UTC 

[PATCH] Fix SSBD not being exposed to guests. (v1)
 2018-05-21 21:54 UTC 

INFO: task hung in blk_queue_enter
 2018-05-21 21:52 UTC  (6+ messages)

[PATCH] bpf: prevent memory disambiguation attack
 2018-05-21 21:46 UTC  (2+ messages)

[PATCH] spi: spi-geni-qcom: Add SPI driver support for GENI based QUP
 2018-05-21 21:45 UTC  (4+ messages)

[PATCH] pcnet32: add an error handling path in pcnet32_probe_pci()
 2018-05-21 21:44 UTC 

[PATCH v7 1/2] dt: bindings: lm3601x: Introduce the lm3601x driver
 2018-05-21 21:44 UTC  (6+ messages)
` [PATCH v7 2/2] leds: lm3601x: Introduce the lm3601x LED driver

[PATCH v5 0/5] AIO add per-command iopriority
 2018-05-21 21:43 UTC  (6+ messages)
` [PATCH v5 4/5] fs: blkdev set bio prio from kiocb prio

v4.17-rc1: regressions on N900, N950
 2018-05-21 21:39 UTC  (3+ messages)

[v4 09/11] drivers/hwmon: Add PECI cputemp driver
 2018-05-21 21:36 UTC  (8+ messages)

[Xen-devel][RFC 0/3] dma-buf support for gntdev
 2018-05-21 21:31 UTC  (3+ messages)
` [Xen-devel][RFC 3/3] xen/gntdev: Add support for Linux dma buffers

PROBLEM: mce: [Hardware Error] from dmesg -l emerg
 2018-05-21 21:13 UTC  (9+ messages)

[PATCH 4.16 000/110] 4.16.11-stable review
 2018-05-21 21:12 UTC  (77+ messages)
` [PATCH 4.16 002/110] usbip: usbip_host: refine probe and disconnect debug msgs to be useful
` [PATCH 4.16 028/110] netfilter: nf_tables: nf_tables_obj_lookup_byhandle() can be static
` [PATCH 4.16 029/110] ARM64: dts: marvell: armada-cp110: Add clocks for the xmdio node
` [PATCH 4.16 038/110] mm: dont allow deferred pages with NEED_PER_CPU_KM
` [PATCH 4.16 039/110] drm/i915/gen9: Add WaClearHIZ_WM_CHICKEN3 for bxt and glk
` [PATCH 4.16 040/110] s390/qdio: fix access to uninitialized qdio_q fields
` [PATCH 4.16 041/110] s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero
` [PATCH 4.16 042/110] s390/qdio: dont release memory in qdio_setup_irq()
` [PATCH 4.16 043/110] s390: remove indirect branch from do_softirq_own_stack
` [PATCH 4.16 044/110] bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n
` [PATCH 4.16 045/110] x86/pkeys: Override pkey when moving away from PROT_EXEC
` [PATCH 4.16 046/110] x86/pkeys: Do not special case protection key 0
` [PATCH 4.16 047/110] efi: Avoid potential crashes, fix the struct efi_pci_io_protocol_32 definition for mixed mode
` [PATCH 4.16 048/110] ARM: 8771/1: kprobes: Prohibit kprobes on do_undefinstr
` [PATCH 4.16 049/110] x86/apic/x2apic: Initialize cluster ID properly
` [PATCH 4.16 050/110] x86/mm: Drop TS_COMPAT on 64-bit exec() syscall
` [PATCH 4.16 051/110] tick/broadcast: Use for_each_cpu() specially on UP kernels
` [PATCH 4.16 052/110] ARM: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed
` [PATCH 4.16 053/110] ARM: 8770/1: kprobes: Prohibit probing on optimized_callback
` [PATCH 4.16 054/110] ARM: 8772/1: kprobes: Prohibit kprobes on get_user functions
` [PATCH 4.16 055/110] Btrfs: fix xattr loss after power failure
` [PATCH 4.16 056/110] Btrfs: send, fix invalid access to commit roots due to concurrent snapshotting
` [PATCH 4.16 057/110] btrfs: property: Set incompat flag if lzo/zstd compression is set
` [PATCH 4.16 058/110] btrfs: fix crash when trying to resume balance without the resume flag
` [PATCH 4.16 059/110] btrfs: Split btrfs_del_delalloc_inode into 2 functions
` [PATCH 4.16 060/110] btrfs: Fix delalloc inodes invalidation during transaction abort
` [PATCH 4.16 061/110] btrfs: fix reading stale metadata blocks after degraded raid1 mounts
` [PATCH 4.16 062/110] x86/nospec: Simplify alternative_msr_write()
` [PATCH 4.16 063/110] x86/bugs: Concentrate bug detection into a separate function
` [PATCH 4.16 064/110] x86/bugs: Concentrate bug reporting "
` [PATCH 4.16 065/110] x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits
` [PATCH 4.16 066/110] x86/bugs, KVM: Support the combination of guest and host IBRS
` [PATCH 4.16 067/110] x86/bugs: Expose /sys/../spec_store_bypass
` [PATCH 4.16 068/110] x86/cpufeatures: Add X86_FEATURE_RDS
` [PATCH 4.16 069/110] x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation
` [PATCH 4.16 070/110] x86/bugs/intel: Set proper CPU features and setup RDS
` [PATCH 4.16 071/110] x86/bugs: Whitelist allowed SPEC_CTRL MSR values
` [PATCH 4.16 072/110] x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested
` [PATCH 4.16 073/110] x86/KVM/VMX: Expose SPEC_CTRL Bit(2) to the guest
` [PATCH 4.16 074/110] x86/speculation: Create spec-ctrl.h to avoid include hell
` [PATCH 4.16 075/110] prctl: Add speculation control prctls
` [PATCH 4.16 076/110] x86/process: Allow runtime control of Speculative Store Bypass
` [PATCH 4.16 077/110] x86/speculation: Add prctl for Speculative Store Bypass mitigation
` [PATCH 4.16 078/110] nospec: Allow getting/setting on non-current task
` [PATCH 4.16 079/110] proc: Provide details on speculation flaw mitigations
` [PATCH 4.16 080/110] seccomp: Enable "
` [PATCH 4.16 081/110] x86/bugs: Make boot modes __ro_after_init
` [PATCH 4.16 082/110] prctl: Add force disable speculation
` [PATCH 4.16 083/110] seccomp: Use PR_SPEC_FORCE_DISABLE
` [PATCH 4.16 084/110] seccomp: Add filter flag to opt-out of SSB mitigation
` [PATCH 4.16 085/110] seccomp: Move speculation migitation control to arch code
` [PATCH 4.16 086/110] x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass
` [PATCH 4.16 087/110] x86/bugs: Rename _RDS to _SSBD
` [PATCH 4.16 088/110] proc: Use underscores for SSBD in status
` [PATCH 4.16 089/110] Documentation/spec_ctrl: Do some minor cleanups
` [PATCH 4.16 090/110] x86/bugs: Fix __ssb_select_mitigation() return type
` [PATCH 4.16 091/110] x86/bugs: Make cpu_show_common() static
` [PATCH 4.16 092/110] x86/bugs: Fix the parameters alignment and missing void
` [PATCH 4.16 093/110] x86/cpu: Make alternative_msr_write work for 32-bit code
` [PATCH 4.16 094/110] KVM: SVM: Move spec control call after restore of GS
` [PATCH 4.16 095/110] x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP
` [PATCH 4.16 096/110] x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS
` [PATCH 4.16 097/110] x86/cpufeatures: Disentangle SSBD enumeration
` [PATCH 4.16 098/110] x86/cpufeatures: Add FEATURE_ZEN
` [PATCH 4.16 099/110] x86/speculation: Handle HT correctly on AMD
` [PATCH 4.16 100/110] x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL
` [PATCH 4.16 101/110] x86/speculation: Add virtualized speculative store bypass disable support
` [PATCH 4.16 102/110] x86/speculation: Rework speculative_store_bypass_update()
` [PATCH 4.16 103/110] x86/bugs: Unify x86_spec_ctrl_{set_guest,restore_host}
` [PATCH 4.16 104/110] x86/bugs: Expose x86_spec_ctrl_base directly
` [PATCH 4.16 105/110] x86/bugs: Remove x86_spec_ctrl_set()
` [PATCH 4.16 106/110] x86/bugs: Rework spec_ctrl base and mask logic
` [PATCH 4.16 107/110] x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG
` [PATCH 4.16 108/110] KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBD
` [PATCH 4.16 109/110] x86/bugs: Rename SSBD_NO to SSB_NO
` [PATCH 4.16 110/110] bpf: Prevent memory disambiguation attack

[PATCH 4.14 00/95] 4.14.43-stable review
 2018-05-21 21:12 UTC  (56+ messages)
` [PATCH 4.14 02/95] usbip: usbip_host: delete device from busid_table after rebind
` [PATCH 4.14 08/95] ALSA: control: fix a redundant-copy issue
` [PATCH 4.14 09/95] spi: pxa2xx: Allow 64-bit DMA
` [PATCH 4.14 14/95] powerpc: Dont preempt_disable() in show_cpuinfo()
` [PATCH 4.14 16/95] tracing/x86/xen: Remove zero data size trace events trace_xen_mmu_flush_tlb{_all}
` [PATCH 4.14 24/95] lib/test_bitmap.c: fix bitmap optimisation tests to report errors correctly
` [PATCH 4.14 44/95] btrfs: fix crash when trying to resume balance without the resume flag
` [PATCH 4.14 48/95] x86/nospec: Simplify alternative_msr_write()
` [PATCH 4.14 49/95] x86/bugs: Concentrate bug detection into a separate function
` [PATCH 4.14 50/95] x86/bugs: Concentrate bug reporting "
` [PATCH 4.14 51/95] x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits
` [PATCH 4.14 52/95] x86/bugs, KVM: Support the combination of guest and host IBRS
` [PATCH 4.14 53/95] x86/bugs: Expose /sys/../spec_store_bypass
` [PATCH 4.14 54/95] x86/cpufeatures: Add X86_FEATURE_RDS
` [PATCH 4.14 55/95] x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation
` [PATCH 4.14 56/95] x86/bugs/intel: Set proper CPU features and setup RDS
` [PATCH 4.14 57/95] x86/bugs: Whitelist allowed SPEC_CTRL MSR values
` [PATCH 4.14 58/95] x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested
` [PATCH 4.14 59/95] x86/KVM/VMX: Expose SPEC_CTRL Bit(2) to the guest
` [PATCH 4.14 60/95] x86/speculation: Create spec-ctrl.h to avoid include hell
` [PATCH 4.14 61/95] prctl: Add speculation control prctls
` [PATCH 4.14 62/95] x86/process: Allow runtime control of Speculative Store Bypass
` [PATCH 4.14 63/95] x86/speculation: Add prctl for Speculative Store Bypass mitigation
` [PATCH 4.14 64/95] nospec: Allow getting/setting on non-current task
` [PATCH 4.14 65/95] proc: Provide details on speculation flaw mitigations
` [PATCH 4.14 66/95] seccomp: Enable "
` [PATCH 4.14 67/95] x86/bugs: Make boot modes __ro_after_init
` [PATCH 4.14 68/95] prctl: Add force disable speculation
` [PATCH 4.14 69/95] seccomp: Use PR_SPEC_FORCE_DISABLE
` [PATCH 4.14 70/95] seccomp: Add filter flag to opt-out of SSB mitigation
` [PATCH 4.14 71/95] seccomp: Move speculation migitation control to arch code
` [PATCH 4.14 72/95] x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass
` [PATCH 4.14 73/95] x86/bugs: Rename _RDS to _SSBD
` [PATCH 4.14 74/95] proc: Use underscores for SSBD in status
` [PATCH 4.14 75/95] Documentation/spec_ctrl: Do some minor cleanups
` [PATCH 4.14 76/95] x86/bugs: Fix __ssb_select_mitigation() return type
` [PATCH 4.14 77/95] x86/bugs: Make cpu_show_common() static
` [PATCH 4.14 78/95] x86/bugs: Fix the parameters alignment and missing void
` [PATCH 4.14 79/95] x86/cpu: Make alternative_msr_write work for 32-bit code
` [PATCH 4.14 80/95] KVM: SVM: Move spec control call after restore of GS
` [PATCH 4.14 81/95] x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP
` [PATCH 4.14 82/95] x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS
` [PATCH 4.14 83/95] x86/cpufeatures: Disentangle SSBD enumeration
` [PATCH 4.14 84/95] x86/cpufeatures: Add FEATURE_ZEN
` [PATCH 4.14 85/95] x86/speculation: Handle HT correctly on AMD
` [PATCH 4.14 86/95] x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL
` [PATCH 4.14 87/95] x86/speculation: Add virtualized speculative store bypass disable support
` [PATCH 4.14 88/95] x86/speculation: Rework speculative_store_bypass_update()
` [PATCH 4.14 89/95] x86/bugs: Unify x86_spec_ctrl_{set_guest,restore_host}
` [PATCH 4.14 90/95] x86/bugs: Expose x86_spec_ctrl_base directly
` [PATCH 4.14 91/95] x86/bugs: Remove x86_spec_ctrl_set()
` [PATCH 4.14 92/95] x86/bugs: Rework spec_ctrl base and mask logic
` [PATCH 4.14 93/95] x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG
` [PATCH 4.14 94/95] KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBD
` [PATCH 4.14 95/95] x86/bugs: Rename SSBD_NO to SSB_NO

[PATCH 4.9 00/87] 4.9.102-stable review
 2018-05-21 21:12 UTC  (39+ messages)
` [PATCH 4.9 01/87] usbip: usbip_host: refine probe and disconnect debug msgs to be useful
` [PATCH 4.9 21/87] s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero
` [PATCH 4.9 28/87] tick/broadcast: Use for_each_cpu() specially on UP kernels
` [PATCH 4.9 39/87] x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits
` [PATCH 4.9 40/87] x86/bugs, KVM: Support the combination of guest and host IBRS
` [PATCH 4.9 41/87] x86/bugs: Expose /sys/../spec_store_bypass
` [PATCH 4.9 45/87] x86/bugs: Whitelist allowed SPEC_CTRL MSR values
` [PATCH 4.9 46/87] x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested
` [PATCH 4.9 49/87] prctl: Add speculation control prctls
` [PATCH 4.9 51/87] x86/process: Correct and optimize TIF_BLOCKSTEP switch
` [PATCH 4.9 56/87] proc: Provide details on speculation flaw mitigations
` [PATCH 4.9 57/87] seccomp: Enable "
` [PATCH 4.9 62/87] seccomp: Move speculation migitation control to arch code
` [PATCH 4.9 63/87] x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass
` [PATCH 4.9 64/87] x86/bugs: Rename _RDS to _SSBD
` [PATCH 4.9 65/87] proc: Use underscores for SSBD in status
` [PATCH 4.9 66/87] Documentation/spec_ctrl: Do some minor cleanups
` [PATCH 4.9 67/87] x86/bugs: Fix __ssb_select_mitigation() return type
` [PATCH 4.9 68/87] x86/bugs: Make cpu_show_common() static
` [PATCH 4.9 69/87] x86/bugs: Fix the parameters alignment and missing void
` [PATCH 4.9 70/87] x86/cpu: Make alternative_msr_write work for 32-bit code
` [PATCH 4.9 71/87] KVM: SVM: Move spec control call after restore of GS
` [PATCH 4.9 72/87] x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP
` [PATCH 4.9 73/87] x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS
` [PATCH 4.9 74/87] x86/cpufeatures: Disentangle SSBD enumeration
` [PATCH 4.9 75/87] x86/cpu/AMD: Fix erratum 1076 (CPB bit)
` [PATCH 4.9 76/87] x86/cpufeatures: Add FEATURE_ZEN
` [PATCH 4.9 77/87] x86/speculation: Handle HT correctly on AMD
` [PATCH 4.9 78/87] x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL
` [PATCH 4.9 79/87] x86/speculation: Add virtualized speculative store bypass disable support
` [PATCH 4.9 80/87] x86/speculation: Rework speculative_store_bypass_update()
` [PATCH 4.9 81/87] x86/bugs: Unify x86_spec_ctrl_{set_guest,restore_host}
` [PATCH 4.9 82/87] x86/bugs: Expose x86_spec_ctrl_base directly
` [PATCH 4.9 83/87] x86/bugs: Remove x86_spec_ctrl_set()
` [PATCH 4.9 84/87] x86/bugs: Rework spec_ctrl base and mask logic
` [PATCH 4.9 85/87] x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG
` [PATCH 4.9 86/87] KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBD
` [PATCH 4.9 87/87] x86/bugs: Rename SSBD_NO to SSB_NO

page:  |  | latest

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).