All the mail mirrored from lore.kernel.org
 help / color / mirror / Atom feed
 messages from 2018-05-21 21:11:20 to 2018-05-21 21:22:47 UTC [more...]

[PATCH 4.16 000/110] 4.16.11-stable review
 2018-05-21 21:12 UTC  (57+ messages)
` [PATCH 4.16 024/110] x86/amd_nb: Add support for Raven Ridge CPUs
` [PATCH 4.16 025/110] tee: shm: fix use-after-free via temporarily dropped reference
` [PATCH 4.16 026/110] netfilter: nf_tables: free set name in error path
` [PATCH 4.16 027/110] netfilter: nf_tables: cant fail after linking rule into active rule list
` [PATCH 4.16 030/110] ARM64: dts: marvell: armada-cp110: Add mg_core_clk for ethernet node
` [PATCH 4.16 032/110] mtd: rawnand: marvell: Fix read logic for layouts with ->nchunks > 2
` [PATCH 4.16 033/110] powerpc/powernv: Fix NVRAM sleep in invalid context when crashing
` [PATCH 4.16 034/110] drm: Match sysfs name in link removal to link creation
` [PATCH 4.16 035/110] cpufreq: armada-37xx: driver relies on cpufreq-dt
` [PATCH 4.16 036/110] lib/test_bitmap.c: fix bitmap optimisation tests to report errors correctly
` [PATCH 4.16 037/110] radix tree: fix multi-order iteration race
` [PATCH 4.16 040/110] s390/qdio: fix access to uninitialized qdio_q fields
` [PATCH 4.16 041/110] s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero
` [PATCH 4.16 042/110] s390/qdio: dont release memory in qdio_setup_irq()
` [PATCH 4.16 043/110] s390: remove indirect branch from do_softirq_own_stack
` [PATCH 4.16 044/110] bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n
` [PATCH 4.16 045/110] x86/pkeys: Override pkey when moving away from PROT_EXEC
` [PATCH 4.16 046/110] x86/pkeys: Do not special case protection key 0
` [PATCH 4.16 047/110] efi: Avoid potential crashes, fix the struct efi_pci_io_protocol_32 definition for mixed mode
` [PATCH 4.16 048/110] ARM: 8771/1: kprobes: Prohibit kprobes on do_undefinstr
` [PATCH 4.16 049/110] x86/apic/x2apic: Initialize cluster ID properly
` [PATCH 4.16 050/110] x86/mm: Drop TS_COMPAT on 64-bit exec() syscall
` [PATCH 4.16 051/110] tick/broadcast: Use for_each_cpu() specially on UP kernels
` [PATCH 4.16 052/110] ARM: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed
` [PATCH 4.16 053/110] ARM: 8770/1: kprobes: Prohibit probing on optimized_callback
` [PATCH 4.16 054/110] ARM: 8772/1: kprobes: Prohibit kprobes on get_user functions
` [PATCH 4.16 056/110] Btrfs: send, fix invalid access to commit roots due to concurrent snapshotting
` [PATCH 4.16 057/110] btrfs: property: Set incompat flag if lzo/zstd compression is set
` [PATCH 4.16 058/110] btrfs: fix crash when trying to resume balance without the resume flag
` [PATCH 4.16 060/110] btrfs: Fix delalloc inodes invalidation during transaction abort
` [PATCH 4.16 061/110] btrfs: fix reading stale metadata blocks after degraded raid1 mounts
` [PATCH 4.16 062/110] x86/nospec: Simplify alternative_msr_write()
` [PATCH 4.16 063/110] x86/bugs: Concentrate bug detection into a separate function
` [PATCH 4.16 064/110] x86/bugs: Concentrate bug reporting "
` [PATCH 4.16 071/110] x86/bugs: Whitelist allowed SPEC_CTRL MSR values
` [PATCH 4.16 073/110] x86/KVM/VMX: Expose SPEC_CTRL Bit(2) to the guest
` [PATCH 4.16 074/110] x86/speculation: Create spec-ctrl.h to avoid include hell
` [PATCH 4.16 075/110] prctl: Add speculation control prctls
` [PATCH 4.16 077/110] x86/speculation: Add prctl for Speculative Store Bypass mitigation
` [PATCH 4.16 078/110] nospec: Allow getting/setting on non-current task
` [PATCH 4.16 079/110] proc: Provide details on speculation flaw mitigations
` [PATCH 4.16 081/110] x86/bugs: Make boot modes __ro_after_init
` [PATCH 4.16 083/110] seccomp: Use PR_SPEC_FORCE_DISABLE
` [PATCH 4.16 084/110] seccomp: Add filter flag to opt-out of SSB mitigation
` [PATCH 4.16 095/110] x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP
` [PATCH 4.16 097/110] x86/cpufeatures: Disentangle SSBD enumeration
` [PATCH 4.16 098/110] x86/cpufeatures: Add FEATURE_ZEN
` [PATCH 4.16 099/110] x86/speculation: Handle HT correctly on AMD
` [PATCH 4.16 101/110] x86/speculation: Add virtualized speculative store bypass disable support
` [PATCH 4.16 102/110] x86/speculation: Rework speculative_store_bypass_update()
` [PATCH 4.16 103/110] x86/bugs: Unify x86_spec_ctrl_{set_guest,restore_host}
` [PATCH 4.16 104/110] x86/bugs: Expose x86_spec_ctrl_base directly
` [PATCH 4.16 106/110] x86/bugs: Rework spec_ctrl base and mask logic
` [PATCH 4.16 107/110] x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG
` [PATCH 4.16 108/110] KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBD
` [PATCH 4.16 109/110] x86/bugs: Rename SSBD_NO to SSB_NO

post-receive: pub/scm/linux/kernel/git/wsa/linux
 2018-05-21 21:22 UTC 

post-receive: pub/scm/linux/kernel/git/wsa/linux
 2018-05-21 21:22 UTC 

post-receive: pub/scm/linux/kernel/git/wsa/linux
 2018-05-21 21:22 UTC 

[PATCH 4.14 00/95] 4.14.43-stable review
 2018-05-21 21:12 UTC  (74+ messages)
` [PATCH 4.14 02/95] usbip: usbip_host: delete device from busid_table after rebind
` [PATCH 4.14 08/95] ALSA: control: fix a redundant-copy issue
` [PATCH 4.14 09/95] spi: pxa2xx: Allow 64-bit DMA
` [PATCH 4.14 14/95] powerpc: Dont preempt_disable() in show_cpuinfo()
` [PATCH 4.14 16/95] tracing/x86/xen: Remove zero data size trace events trace_xen_mmu_flush_tlb{_all}
` [PATCH 4.14 23/95] drm: Match sysfs name in link removal to link creation
` [PATCH 4.14 24/95] lib/test_bitmap.c: fix bitmap optimisation tests to report errors correctly
` [PATCH 4.14 30/95] s390/qdio: dont release memory in qdio_setup_irq()
` [PATCH 4.14 31/95] s390: remove indirect branch from do_softirq_own_stack
` [PATCH 4.14 32/95] x86/pkeys: Override pkey when moving away from PROT_EXEC
` [PATCH 4.14 33/95] x86/pkeys: Do not special case protection key 0
` [PATCH 4.14 34/95] efi: Avoid potential crashes, fix the struct efi_pci_io_protocol_32 definition for mixed mode
` [PATCH 4.14 35/95] ARM: 8771/1: kprobes: Prohibit kprobes on do_undefinstr
` [PATCH 4.14 36/95] x86/mm: Drop TS_COMPAT on 64-bit exec() syscall
` [PATCH 4.14 37/95] tick/broadcast: Use for_each_cpu() specially on UP kernels
` [PATCH 4.14 38/95] ARM: 8769/1: kprobes: Fix to use get_kprobe_ctlblk after irq-disabed
` [PATCH 4.14 39/95] ARM: 8770/1: kprobes: Prohibit probing on optimized_callback
` [PATCH 4.14 40/95] ARM: 8772/1: kprobes: Prohibit kprobes on get_user functions
` [PATCH 4.14 41/95] Btrfs: fix xattr loss after power failure
` [PATCH 4.14 42/95] Btrfs: send, fix invalid access to commit roots due to concurrent snapshotting
` [PATCH 4.14 43/95] btrfs: property: Set incompat flag if lzo/zstd compression is set
` [PATCH 4.14 44/95] btrfs: fix crash when trying to resume balance without the resume flag
` [PATCH 4.14 45/95] btrfs: Split btrfs_del_delalloc_inode into 2 functions
` [PATCH 4.14 46/95] btrfs: Fix delalloc inodes invalidation during transaction abort
` [PATCH 4.14 47/95] btrfs: fix reading stale metadata blocks after degraded raid1 mounts
` [PATCH 4.14 48/95] x86/nospec: Simplify alternative_msr_write()
` [PATCH 4.14 49/95] x86/bugs: Concentrate bug detection into a separate function
` [PATCH 4.14 50/95] x86/bugs: Concentrate bug reporting "
` [PATCH 4.14 51/95] x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits
` [PATCH 4.14 52/95] x86/bugs, KVM: Support the combination of guest and host IBRS
` [PATCH 4.14 53/95] x86/bugs: Expose /sys/../spec_store_bypass
` [PATCH 4.14 54/95] x86/cpufeatures: Add X86_FEATURE_RDS
` [PATCH 4.14 55/95] x86/bugs: Provide boot parameters for the spec_store_bypass_disable mitigation
` [PATCH 4.14 56/95] x86/bugs/intel: Set proper CPU features and setup RDS
` [PATCH 4.14 57/95] x86/bugs: Whitelist allowed SPEC_CTRL MSR values
` [PATCH 4.14 58/95] x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested
` [PATCH 4.14 59/95] x86/KVM/VMX: Expose SPEC_CTRL Bit(2) to the guest
` [PATCH 4.14 60/95] x86/speculation: Create spec-ctrl.h to avoid include hell
` [PATCH 4.14 61/95] prctl: Add speculation control prctls
` [PATCH 4.14 62/95] x86/process: Allow runtime control of Speculative Store Bypass
` [PATCH 4.14 63/95] x86/speculation: Add prctl for Speculative Store Bypass mitigation
` [PATCH 4.14 64/95] nospec: Allow getting/setting on non-current task
` [PATCH 4.14 65/95] proc: Provide details on speculation flaw mitigations
` [PATCH 4.14 66/95] seccomp: Enable "
` [PATCH 4.14 67/95] x86/bugs: Make boot modes __ro_after_init
` [PATCH 4.14 68/95] prctl: Add force disable speculation
` [PATCH 4.14 69/95] seccomp: Use PR_SPEC_FORCE_DISABLE
` [PATCH 4.14 70/95] seccomp: Add filter flag to opt-out of SSB mitigation
` [PATCH 4.14 71/95] seccomp: Move speculation migitation control to arch code
` [PATCH 4.14 72/95] x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass
` [PATCH 4.14 73/95] x86/bugs: Rename _RDS to _SSBD
` [PATCH 4.14 74/95] proc: Use underscores for SSBD in status
` [PATCH 4.14 75/95] Documentation/spec_ctrl: Do some minor cleanups
` [PATCH 4.14 76/95] x86/bugs: Fix __ssb_select_mitigation() return type
` [PATCH 4.14 77/95] x86/bugs: Make cpu_show_common() static
` [PATCH 4.14 78/95] x86/bugs: Fix the parameters alignment and missing void
` [PATCH 4.14 79/95] x86/cpu: Make alternative_msr_write work for 32-bit code
` [PATCH 4.14 80/95] KVM: SVM: Move spec control call after restore of GS
` [PATCH 4.14 81/95] x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP
` [PATCH 4.14 82/95] x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS
` [PATCH 4.14 83/95] x86/cpufeatures: Disentangle SSBD enumeration
` [PATCH 4.14 84/95] x86/cpufeatures: Add FEATURE_ZEN
` [PATCH 4.14 85/95] x86/speculation: Handle HT correctly on AMD
` [PATCH 4.14 86/95] x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL
` [PATCH 4.14 87/95] x86/speculation: Add virtualized speculative store bypass disable support
` [PATCH 4.14 88/95] x86/speculation: Rework speculative_store_bypass_update()
` [PATCH 4.14 89/95] x86/bugs: Unify x86_spec_ctrl_{set_guest,restore_host}
` [PATCH 4.14 90/95] x86/bugs: Expose x86_spec_ctrl_base directly
` [PATCH 4.14 91/95] x86/bugs: Remove x86_spec_ctrl_set()
` [PATCH 4.14 92/95] x86/bugs: Rework spec_ctrl base and mask logic
` [PATCH 4.14 93/95] x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG
` [PATCH 4.14 94/95] KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBD
` [PATCH 4.14 95/95] x86/bugs: Rename SSBD_NO to SSB_NO

[meta-oe][PATCH v2] stm32flash: add recipe
 2018-05-21 21:21 UTC  (4+ messages)

[PATCH bpf-next 0/7] BTF uapi cleanup
 2018-05-21 21:18 UTC  (5+ messages)
` [PATCH bpf-next 4/7] bpf: btf: Remove unused bits from uapi/linux/btf.h
` [PATCH bpf-next 5/7] bpf: btf: Rename btf_key_id and btf_value_id in bpf_map_info

[Buildroot] [PATCH 0/8] Fix the Config.in prefix of a number of options
 2018-05-21 21:18 UTC  (8+ messages)
` [Buildroot] [PATCH 6/8] ti-sgx-km: rename options to have proper prefix

[PATCH 4.9 00/87] 4.9.102-stable review
 2018-05-21 21:12 UTC  (51+ messages)
` [PATCH 4.9 01/87] usbip: usbip_host: refine probe and disconnect debug msgs to be useful
` [PATCH 4.9 21/87] s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero
` [PATCH 4.9 28/87] tick/broadcast: Use for_each_cpu() specially on UP kernels
` [PATCH 4.9 39/87] x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits
` [PATCH 4.9 40/87] x86/bugs, KVM: Support the combination of guest and host IBRS
` [PATCH 4.9 41/87] x86/bugs: Expose /sys/../spec_store_bypass
` [PATCH 4.9 44/87] x86/bugs/intel: Set proper CPU features and setup RDS
` [PATCH 4.9 45/87] x86/bugs: Whitelist allowed SPEC_CTRL MSR values
` [PATCH 4.9 46/87] x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested
` [PATCH 4.9 47/87] x86/KVM/VMX: Expose SPEC_CTRL Bit(2) to the guest
` [PATCH 4.9 48/87] x86/speculation: Create spec-ctrl.h to avoid include hell
` [PATCH 4.9 49/87] prctl: Add speculation control prctls
` [PATCH 4.9 50/87] x86/process: Optimize TIF checks in __switch_to_xtra()
` [PATCH 4.9 51/87] x86/process: Correct and optimize TIF_BLOCKSTEP switch
` [PATCH 4.9 52/87] x86/process: Optimize TIF_NOTSC switch
` [PATCH 4.9 53/87] x86/process: Allow runtime control of Speculative Store Bypass
` [PATCH 4.9 54/87] x86/speculation: Add prctl for Speculative Store Bypass mitigation
` [PATCH 4.9 55/87] nospec: Allow getting/setting on non-current task
` [PATCH 4.9 56/87] proc: Provide details on speculation flaw mitigations
` [PATCH 4.9 57/87] seccomp: Enable "
` [PATCH 4.9 58/87] x86/bugs: Make boot modes __ro_after_init
` [PATCH 4.9 59/87] prctl: Add force disable speculation
` [PATCH 4.9 60/87] seccomp: Use PR_SPEC_FORCE_DISABLE
` [PATCH 4.9 61/87] seccomp: Add filter flag to opt-out of SSB mitigation
` [PATCH 4.9 62/87] seccomp: Move speculation migitation control to arch code
` [PATCH 4.9 63/87] x86/speculation: Make "seccomp" the default mode for Speculative Store Bypass
` [PATCH 4.9 64/87] x86/bugs: Rename _RDS to _SSBD
` [PATCH 4.9 65/87] proc: Use underscores for SSBD in status
` [PATCH 4.9 66/87] Documentation/spec_ctrl: Do some minor cleanups
` [PATCH 4.9 67/87] x86/bugs: Fix __ssb_select_mitigation() return type
` [PATCH 4.9 68/87] x86/bugs: Make cpu_show_common() static
` [PATCH 4.9 69/87] x86/bugs: Fix the parameters alignment and missing void
` [PATCH 4.9 70/87] x86/cpu: Make alternative_msr_write work for 32-bit code
` [PATCH 4.9 71/87] KVM: SVM: Move spec control call after restore of GS
` [PATCH 4.9 72/87] x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP
` [PATCH 4.9 73/87] x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS
` [PATCH 4.9 74/87] x86/cpufeatures: Disentangle SSBD enumeration
` [PATCH 4.9 75/87] x86/cpu/AMD: Fix erratum 1076 (CPB bit)
` [PATCH 4.9 76/87] x86/cpufeatures: Add FEATURE_ZEN
` [PATCH 4.9 77/87] x86/speculation: Handle HT correctly on AMD
` [PATCH 4.9 78/87] x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL
` [PATCH 4.9 79/87] x86/speculation: Add virtualized speculative store bypass disable support
` [PATCH 4.9 80/87] x86/speculation: Rework speculative_store_bypass_update()
` [PATCH 4.9 81/87] x86/bugs: Unify x86_spec_ctrl_{set_guest,restore_host}
` [PATCH 4.9 82/87] x86/bugs: Expose x86_spec_ctrl_base directly
` [PATCH 4.9 83/87] x86/bugs: Remove x86_spec_ctrl_set()
` [PATCH 4.9 84/87] x86/bugs: Rework spec_ctrl base and mask logic
` [PATCH 4.9 85/87] x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG
` [PATCH 4.9 86/87] KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBD
` [PATCH 4.9 87/87] x86/bugs: Rename SSBD_NO to SSB_NO

[Bug 106597] [vga_switcheroo] commit 07f4f97d7b4bf325d9f558c5b58230387e4e57e0 breaks dpm on Alienware 15R3
 2018-05-21 21:17 UTC  (2+ messages)

[Buildroot] modem-manager: build issue
 2018-05-21 21:17 UTC  (5+ messages)
` [Buildroot] [PATCH] modem-manager: remove -Werror from CFLAGS
` [Buildroot] [PATCH v2] "

mellanox connectx-2 support
 2018-05-21 21:17 UTC  (6+ messages)

[PATCH net-next v14 0/7] sched: Add Common Applications Kept Enhanced (cake) qdisc
 2018-05-21 21:15 UTC  (3+ messages)
` [PATCH net-next v14 3/7] sch_cake: Add optional ACK filter

[Buildroot] [git commit] libmediaart: rename options to have proper prefix
 2018-05-21 21:13 UTC 

PROBLEM: mce: [Hardware Error] from dmesg -l emerg
 2018-05-21 21:13 UTC  (9+ messages)

[Buildroot] [git commit] ti-sgx-km: rename options to have proper prefix
 2018-05-21 21:13 UTC 

[Buildroot] [git commit] janus-gateway: rename options to have proper prefix
 2018-05-21 21:12 UTC 

Status of stable branches
 2018-05-21 21:12 UTC  (3+ messages)
` [MODERATED] "

[PATCH] Add the memcg print oom info for system oom
 2018-05-21 21:11 UTC  (5+ messages)


This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.