All of lore.kernel.org
 help / color / mirror / Atom feed
 messages from 2021-03-02 18:02:38 to 2021-03-02 18:18:25 UTC [more...]

hppa64-linux-ld: kernel/sched/core.o(.init.text+0x90): cannot reach printk
 2021-03-02 18:07 UTC  (3+ messages)

[PATCH] ALSA: hda/realtek: Add quirk for Clevo NH55RZQ
 2021-03-02 18:10 UTC  (3+ messages)

[PATCH] perf test: Test case 27 fails on s390 and non-x86 platforms
 2021-03-02 15:23 UTC  (4+ messages)

[PATCH v6 0/5] Introducing QMP query-netdev command
 2021-03-02 18:02 UTC  (10+ messages)
` [PATCH v6 1/5] qapi: net: Add "
` [PATCH v6 2/5] tests: Add tests for "
` [PATCH v6 3/5] net: Move NetClientState.info_str to dynamic allocations
` [PATCH v6 4/5] hmp: Use QAPI NetdevInfo in hmp_info_network
` [PATCH v6 5/5] net: Do not fill legacy info_str for backends

[xlnx:xlnx_rebase_v5.4 1005/1700] crypto/af_alg.c:267:54: sparse: sparse: incorrect type in argument 2 (different address spaces)
 2021-03-02 18:17 UTC 

[PATCH 00/27] tcg patch queue
 2021-03-02 17:57 UTC  (18+ messages)
` [PATCH 02/27] tcg/aarch64: Fix I3617_CMLE0
` [PATCH 04/27] tcg/tci: Use exec/cpu_ldst.h interfaces
` [PATCH 06/27] tcg: Manage splitwx in tc_ptr_to_region_tree by hand
` [PATCH 07/27] tcg/tci: Merge identical cases in generation (arithmetic opcodes)
` [PATCH 08/27] tcg/tci: Merge identical cases in generation (exchange opcodes)
` [PATCH 10/27] tcg/tci: Merge identical cases in generation (conditional opcodes)
` [PATCH 11/27] tcg/tci: Merge identical cases in generation (load/store opcodes)
` [PATCH 12/27] tcg/tci: Remove tci_read_r8
` [PATCH 13/27] tcg/tci: Remove tci_read_r8s
` [PATCH 14/27] tcg/tci: Remove tci_read_r16
` [PATCH 20/27] tcg/tci: Merge extension operations
` [PATCH 21/27] tcg/tci: Merge bswap operations
` [PATCH 22/27] tcg/tci: Merge mov, not and neg operations
` [PATCH 24/27] accel/tcg: move CF_CLUSTER calculation to curr_cflags
` [PATCH 25/27] accel/tcg: drop the use of CF_HASH_MASK and rename params
` [PATCH 26/27] include/exec: lightly re-arrange TranslationBlock
` [PATCH 27/27] accel/tcg: Precompute curr_cflags into cpu->tcg_cflags

[Intel-wired-lan] [PATCH S56 01/13] ice: Change ice_vsi_setup_q_map() to not depend on RSS
 2021-03-02 18:15 UTC  (13+ messages)
` [Intel-wired-lan] [PATCH S56 02/13] ice: Refactor promiscuous functions
` [Intel-wired-lan] [PATCH S56 03/13] ice: Refactor get/set RSS LUT to use struct parameter
` [Intel-wired-lan] [PATCH S56 04/13] ice: Refactor ice_set/get_rss into LUT and key specific functions
` [Intel-wired-lan] [PATCH S56 05/13] ice: Consolidate VSI state and flags
` [Intel-wired-lan] [PATCH S56 06/13] ice: Drop leading underscores in enum ice_pf_state
` [Intel-wired-lan] [PATCH S56 07/13] ice: Add helper function to get the VF's VSI
` [Intel-wired-lan] [PATCH S56 08/13] ice: Refactor VIRTCHNL_OP_CONFIG_VSI_QUEUES handling
` [Intel-wired-lan] [PATCH S56 09/13] ice: Add new VSI states to track netdev alloc/registration
` [Intel-wired-lan] [PATCH S56 10/13] ice: cleanup style issues
` [Intel-wired-lan] [PATCH S56 11/13] ice: Correct comment block style
` [Intel-wired-lan] [PATCH S56 12/13] ice: Remove unnecessary blank line
` [Intel-wired-lan] [PATCH S56 13/13] ice: Fix prototype warnings

[meta-multimedia][PATCH v2] mpd: Upgrade to 0.22 series
 2021-03-02 18:14 UTC 

[PATCH v3 00/32] KVM: arm64: A stage 2 for the host
 2021-03-02 15:00 UTC  (10+ messages)
` [PATCH v3 01/32] arm64: lib: Annotate {clear,copy}_page() as position-independent
` [PATCH v3 02/32] KVM: arm64: Link position-independent string routines into .hyp.text
` [PATCH v3 04/32] KVM: arm64: Initialize kvm_nvhe_init_params early
` [PATCH v3 05/32] KVM: arm64: Avoid free_page() in page-table allocator
` [PATCH v3 07/32] KVM: arm64: Introduce a BSS section for use at Hyp
` [PATCH v3 08/32] KVM: arm64: Make kvm_call_hyp() a function call "
` [PATCH v3 27/32] KVM: arm64: Refactor stage2_map_set_prot_attr()
` [PATCH v3 30/32] KVM: arm64: Page-align the .hyp sections
` [PATCH v3 31/32] KVM: arm64: Disable PMU support in protected mode

[PATCH][next] net: fddi: skfp: smt: Replace one-element array with flexible-array member
 2021-03-02 15:27 UTC 

[PATCH] counter: stm32-timer-cnt: fix ceiling write max value
 2021-03-02 14:56 UTC  (2+ messages)

[Intel-wired-lan] [PATCH S55 01/14] ice: warn about potentially malicious VFs
 2021-03-02 18:12 UTC  (14+ messages)
` [Intel-wired-lan] [PATCH S55 02/14] ice: Allow ignoring opcodes on specific VF
` [Intel-wired-lan] [PATCH S55 03/14] ice: Add Support for XPS
` [Intel-wired-lan] [PATCH S55 04/14] ice: Delay netdev registration
` [Intel-wired-lan] [PATCH S55 05/14] ice: Update to use package info from ice segment
` [Intel-wired-lan] [PATCH S55 06/14] ice: handle increasing Tx or Rx ring sizes
` [Intel-wired-lan] [PATCH S55 07/14] ice: use kernel definitions for IANA protocol ports and ether-types
` [Intel-wired-lan] [PATCH S55 08/14] ice: change link misconfiguration message
` [Intel-wired-lan] [PATCH S55 09/14] ice: remove unnecessary duplicated AQ command flag setting
` [Intel-wired-lan] [PATCH S55 10/14] ice: Check for bail out condition early
` [Intel-wired-lan] [PATCH S55 11/14] ice: correct memory allocation call
` [Intel-wired-lan] [PATCH S55 12/14] ice: rename ptype bitmap
` [Intel-wired-lan] [PATCH S55 13/14] ice: Advertise virtchnl UDP segmentation offload capability
` [Intel-wired-lan] [PATCH S55 14/14] iavf: add support for UDP Segmentation Offload

[PATCH 0/3 v5] Add ESRT and test ESRT creation
 2021-03-02 18:11 UTC  (3+ messages)
` [PATCH RESEND 1/3 v5] efi: Add ESRT to the EFI system table

[dpdk-dev] [RFC 0/1] lib/librte_ethdev: Meter algorithms support packet per second
 2021-03-02 18:10 UTC  (9+ messages)
` [dpdk-dev] [RFC v4 0/4] adds support PPS(packet per second) on meter
  ` [dpdk-dev] [RFC v4 1/4] ethdev: add meter PPS profile

[PATCH v3 1/1] env: sf: single function env_sf_save()
 2021-03-02 18:09 UTC  (4+ messages)

[PATCH v19 00/13] Carry forward IMA measurement log on kexec on ARM64
 2021-03-02 15:25 UTC  (3+ messages)

Why do kprobes and uprobes singlestep?
 2021-03-02 15:25 UTC  (5+ messages)
` [PATCH -tip 0/3] x86/kprobes: Remoev single-step trap from x86 kprobes
  ` [PATCH -tip 1/3] x86/kprobes: Retrieve correct opcode for group instruction
  ` [PATCH -tip 2/3] x86/kprobes: Identify far indirect JMP correctly
  ` [PATCH -tip 3/3] x86/kprobes: Use int3 instead of debug trap for single-step

[gustavoars-linux:testing/net-fddi-skfp-smt] BUILD SUCCESS WITH WARNING 800290b4db3c7818e10af88f757b09b59588241c
 2021-03-02 15:18 UTC 

[PATCH] x86/cpu/hygon: Set __max_die_per_package on Hygon
 2021-03-02 15:08 UTC  (2+ messages)
` [tip: x86/cpu] "

[PATCH 1/2] dt-bindings: media: Document RDA5807 FM radio bindings
 2021-03-02 14:42 UTC 

[PATCH 0/2] Fix CMDLINE_EXTEND handling for FDT "bootargs"
 2021-03-02 15:16 UTC  (7+ messages)

[PATCH][next] drm/amd/display: fix the return of the uninitialized value in ret
 2021-03-02 15:03 UTC  (2+ messages)

[RESEND PATCH v11 0/3] AX88796C SPI Ethernet Adapter
 2021-03-02 15:22 UTC  (3+ messages)
    ` [RESEND PATCH v11 1/3] dt-bindings: vendor-prefixes: Add asix prefix
    ` [RESEND PATCH v11 2/3] dt-bindings: net: Add bindings for AX88796C SPI Ethernet Adapter

[PATCH 0/2] A64/R40 DRAM controller dual-rank-related changes
 2021-03-02 18:08 UTC  (6+ messages)
` [PATCH 2/2] sunxi: enable dual rank memory on R40
        ` [linux-sunxi] "

[SECURITY PATCH 000/117] Multiple GRUB2 vulnerabilities - 2021/03/02 round
 2021-03-02 18:02 UTC  (112+ messages)
` [SECURITY PATCH 007/117] acpi: Don't register the acpi command when locked down
` [SECURITY PATCH 008/117] mmap: Don't register cutmem and badram commands when lockdown is enforced
` [SECURITY PATCH 009/117] commands: Restrict commands that can load BIOS or DT blobs when locked down
` [SECURITY PATCH 010/117] commands/setpci: Restrict setpci command "
` [SECURITY PATCH 011/117] commands/hdparm: Restrict hdparm "
` [SECURITY PATCH 012/117] gdb: Restrict GDB access "
` [SECURITY PATCH 013/117] loader/xnu: Don't allow loading extension and packages "
` [SECURITY PATCH 014/117] docs: Document the cutmem command
` [SECURITY PATCH 015/117] dl: Only allow unloading modules that are not dependencies
` [SECURITY PATCH 016/117] usb: Avoid possible out-of-bound accesses caused by malicious devices
` [SECURITY PATCH 017/117] mmap: Fix memory leak when iterating over mapped memory
` [SECURITY PATCH 018/117] net/net: Fix possible dereference to of a NULL pointer
` [SECURITY PATCH 019/117] net/tftp: Fix dangling memory pointer
` [SECURITY PATCH 020/117] kern/parser: Fix resource leak if argc == 0
` [SECURITY PATCH 021/117] kern/efi: Fix memory leak on failure
` [SECURITY PATCH 022/117] kern/efi/mm: Fix possible NULL pointer dereference
` [SECURITY PATCH 023/117] gnulib/regexec: Resolve unused variable
` [SECURITY PATCH 024/117] gnulib/regcomp: Fix uninitialized token structure
` [SECURITY PATCH 025/117] gnulib/argp-help: Fix dereference of a possibly NULL state
` [SECURITY PATCH 026/117] gnulib/regexec: Fix possible null-dereference
` [SECURITY PATCH 027/117] gnulib/regcomp: Fix uninitialized re_token
` [SECURITY PATCH 028/117] io/lzopio: Resolve unnecessary self-assignment errors
` [SECURITY PATCH 029/117] zstd: Initialize seq_t structure fully
` [SECURITY PATCH 030/117] kern/partition: Check for NULL before dereferencing input string
` [SECURITY PATCH 031/117] disk/ldm: Make sure comp data is freed before exiting from make_vg()
` [SECURITY PATCH 032/117] disk/ldm: If failed then free vg variable too
` [SECURITY PATCH 033/117] disk/ldm: Fix memory leak on uninserted lv references
` [SECURITY PATCH 034/117] disk/cryptodisk: Fix potential integer overflow
` [SECURITY PATCH 035/117] hfsplus: Check that the volume name length is valid
` [SECURITY PATCH 036/117] zfs: Fix possible negative shift operation
` [SECURITY PATCH 037/117] zfs: Fix resource leaks while constructing path
` [SECURITY PATCH 038/117] zfs: Fix possible integer overflows
` [SECURITY PATCH 039/117] zfsinfo: Correct a check for error allocating memory
` [SECURITY PATCH 040/117] affs: Fix memory leaks
` [SECURITY PATCH 041/117] libgcrypt/mpi: Fix possible unintended sign extension
` [SECURITY PATCH 042/117] libgcrypt/mpi: Fix possible NULL dereference
` [SECURITY PATCH 043/117] syslinux: Fix memory leak while parsing
` [SECURITY PATCH 044/117] normal/completion: Fix leaking of memory when processing a completion
` [SECURITY PATCH 045/117] commands/hashsum: Fix a memory leak
` [SECURITY PATCH 046/117] commands/probe: Fix a resource leak when probing disks
` [SECURITY PATCH 047/117] video/efi_gop: Remove unnecessary return value of grub_video_gop_fill_mode_info()
` [SECURITY PATCH 048/117] video/fb/fbfill: Fix potential integer overflow
` [SECURITY PATCH 049/117] video/fb/video_fb: Fix multiple integer overflows
` [SECURITY PATCH 050/117] video/fb/video_fb: Fix possible integer overflow
` [SECURITY PATCH 051/117] video/readers/jpeg: Test for an invalid next marker reference from a jpeg file
` [SECURITY PATCH 052/117] gfxmenu/gui_list: Remove code that coverity is flagging as dead
` [SECURITY PATCH 053/117] loader/bsd: Check for NULL arg up-front
` [SECURITY PATCH 054/117] loader/xnu: Fix memory leak
` [SECURITY PATCH 055/117] loader/xnu: Free driverkey data when an error is detected in grub_xnu_writetree_toheap()
` [SECURITY PATCH 056/117] loader/xnu: Check if pointer is NULL before using it
` [SECURITY PATCH 057/117] util/grub-install: Fix NULL pointer dereferences
` [SECURITY PATCH 058/117] util/grub-editenv: Fix incorrect casting of a signed value
` [SECURITY PATCH 059/117] util/glue-efi: Fix incorrect use of a possibly negative value
` [SECURITY PATCH 060/117] script/execute: Fix NULL dereference in grub_script_execute_cmdline()
` [SECURITY PATCH 061/117] commands/ls: Require device_name is not NULL before printing
` [SECURITY PATCH 062/117] script/execute: Avoid crash when using "$#" outside a function scope
` [SECURITY PATCH 063/117] lib/arg: Block repeated short options that require an argument
` [SECURITY PATCH 064/117] script/execute: Don't crash on a "for" loop with no items
` [SECURITY PATCH 065/117] commands/menuentry: Fix quoting in setparams_prefix()
` [SECURITY PATCH 066/117] kern/misc: Always set *end in grub_strtoull()
` [SECURITY PATCH 067/117] video/readers/jpeg: Catch files with unsupported quantization or Huffman tables
` [SECURITY PATCH 068/117] video/readers/jpeg: Catch OOB reads/writes in grub_jpeg_decode_du()
` [SECURITY PATCH 069/117] video/readers/jpeg: Don't decode data before start of stream
` [SECURITY PATCH 070/117] term/gfxterm: Don't set up a font with glyphs that are too big
` [SECURITY PATCH 071/117] fs/fshelp: Catch impermissibly large block sizes in read helper
` [SECURITY PATCH 072/117] fs/hfsplus: Don't fetch a key beyond the end of the node
` [SECURITY PATCH 073/117] fs/hfsplus: Don't use uninitialized data on corrupt filesystems
` [SECURITY PATCH 074/117] fs/hfs: Disable under lockdown
` [SECURITY PATCH 075/117] fs/sfs: Fix over-read of root object name
` [SECURITY PATCH 076/117] fs/jfs: Do not move to leaf level if name length is negative
` [SECURITY PATCH 077/117] fs/jfs: Limit the extents that getblk() can consider
` [SECURITY PATCH 078/117] fs/jfs: Catch infinite recursion
` [SECURITY PATCH 079/117] fs/nilfs2: Reject too-large keys
` [SECURITY PATCH 080/117] fs/nilfs2: Don't search children if provided number is too large
` [SECURITY PATCH 081/117] fs/nilfs2: Properly bail on errors in grub_nilfs2_btree_node_lookup()
` [SECURITY PATCH 082/117] io/gzio: Bail if gzio->tl/td is NULL
` [SECURITY PATCH 083/117] io/gzio: Add init_dynamic_block() clean up if unpacking codes fails
` [SECURITY PATCH 084/117] io/gzio: Catch missing values in huft_build() and bail
` [SECURITY PATCH 085/117] io/gzio: Zero gzio->tl/td in init_dynamic_block() if huft_build() fails
` [SECURITY PATCH 086/117] disk/lvm: Don't go beyond the end of the data we read from disk
` [SECURITY PATCH 087/117] disk/lvm: Don't blast past the end of the circular metadata buffer
` [SECURITY PATCH 088/117] disk/lvm: Bail on missing PV list
` [SECURITY PATCH 089/117] disk/lvm: Do not crash if an expected string is not found
` [SECURITY PATCH 090/117] disk/lvm: Do not overread metadata
` [SECURITY PATCH 091/117] disk/lvm: Sanitize rlocn->offset to prevent wild read
` [SECURITY PATCH 092/117] disk/lvm: Do not allow a LV to be it's own segment's node's LV
` [SECURITY PATCH 093/117] fs/btrfs: Validate the number of stripes/parities in RAID5/6
` [SECURITY PATCH 094/117] fs/btrfs: Squash some uninitialized reads
` [SECURITY PATCH 095/117] kern/parser: Fix a memory leak
` [SECURITY PATCH 096/117] kern/parser: Introduce process_char() helper
` [SECURITY PATCH 097/117] kern/parser: Introduce terminate_arg() helper
` [SECURITY PATCH 098/117] kern/parser: Refactor grub_parser_split_cmdline() cleanup
` [SECURITY PATCH 099/117] kern/buffer: Add variable sized heap buffer
` [SECURITY PATCH 100/117] kern/parser: Fix a stack buffer overflow
` [SECURITY PATCH 101/117] kern/efi: Add initial stack protector implementation
` [SECURITY PATCH 102/117] util/mkimage: Remove unused code to add BSS section
` [SECURITY PATCH 103/117] util/mkimage: Use grub_host_to_target32() instead of grub_cpu_to_le32()
` [SECURITY PATCH 104/117] util/mkimage: Always use grub_host_to_target32() to initialize PE stack and heap stuff
` [SECURITY PATCH 105/117] util/mkimage: Unify more of the PE32 and PE32+ header set-up
` [SECURITY PATCH 106/117] util/mkimage: Reorder PE optional header fields set-up
` [SECURITY PATCH 107/117] util/mkimage: Improve data_size value calculation
` [SECURITY PATCH 108/117] util/mkimage: Refactor section setup to use a helper
` [SECURITY PATCH 109/117] util/mkimage: Add an option to import SBAT metadata into a .sbat section
` [SECURITY PATCH 110/117] grub-install-common: Add --sbat option
` [SECURITY PATCH 111/117] shim_lock: Only skip loading shim_lock verifier with explicit consent
` [SECURITY PATCH 112/117] kern/misc: Split parse_printf_args() into format parsing and va_list handling
` [SECURITY PATCH 113/117] kern/misc: Add STRING type for internal printf() format handling
` [SECURITY PATCH 114/117] kern/misc: Add function to check printf() format against expected format
` [SECURITY PATCH 115/117] gfxmenu/gui: Check printf() format in the gui_progress_bar and gui_label
` [SECURITY PATCH 116/117] templates: Disable the os-prober by default
` [SECURITY PATCH 117/117] kern/mm: Fix grub_debug_calloc() compilation error


This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.