Show patches with: Submitter = Mark Brown       |    State = Action Required       |    Archived = No       |   917 patches
« 1 2 3 49 10 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
KVM: arm64: Only save S1PIE registers when dirty KVM: arm64: Only save S1PIE registers when dirty - - - --- 2024-03-01 Mark Brown New
[v2,2/2] KVM: arm64: Reuse struct cpu_fp_state to track the guest FP state KVM: arm64: Store a cpu_fp_state directly in the vCPU data - - - --- 2024-02-29 Mark Brown New
[v2,1/2] KVM: arm64: Rename variable for tracking ownership of FP state KVM: arm64: Store a cpu_fp_state directly in the vCPU data - - - --- 2024-02-29 Mark Brown New
[GIT,PULL] SPI fixes for v6.8-rc5 [GIT,PULL] SPI fixes for v6.8-rc5 - - - --- 2024-02-28 Mark Brown New
[GIT,PULL] regulator fixes for v6.8-rc5 [GIT,PULL] regulator fixes for v6.8-rc5 - - - --- 2024-02-28 Mark Brown New
[2/2] KVM: arm64: Reuse struct cpu_fp_state to track the guest FP state KVM: arm64: Store a cpu_fp_state directly in the vCPU data - - - --- 2024-02-26 Mark Brown New
[1/2] KVM: arm64: Rename variable for tracking ownership of FP state KVM: arm64: Store a cpu_fp_state directly in the vCPU data - - - --- 2024-02-26 Mark Brown New
regmap: kunit: Add a test for ranges in combination with windows regmap: kunit: Add a test for ranges in combination with windows - - - --- 2024-02-25 Mark Brown New
[8/8] regulator: mp8859: Implement set_current_limit() regulator: mp8859: Cleanups and enhancements - - - --- 2024-02-25 Mark Brown New
[7/8] regulator: mp8859: Report slew rate regulator: mp8859: Cleanups and enhancements - - - --- 2024-02-25 Mark Brown New
[6/8] regulator: mp8859: Support status and error readback regulator: mp8859: Cleanups and enhancements - - - --- 2024-02-25 Mark Brown New
[5/8] regulator: mp8859: Support active discharge control regulator: mp8859: Cleanups and enhancements - - - --- 2024-02-25 Mark Brown New
[4/8] regulator: mp8859: Support mode operations regulator: mp8859: Cleanups and enhancements - - - --- 2024-02-25 Mark Brown New
[3/8] regulator: mp8859: Support enable control regulator: mp8859: Cleanups and enhancements - - - --- 2024-02-25 Mark Brown New
[2/8] regulator: mp8859: Validate and log device identifier information regulator: mp8859: Cleanups and enhancements - - - --- 2024-02-25 Mark Brown New
[1/8] regulator: mp8859: Specify register accessibility and enable caching regulator: mp8859: Cleanups and enhancements - - - --- 2024-02-25 Mark Brown New
[GIT,PULL] SPI fixes for v6.8-rc4 [GIT,PULL] SPI fixes for v6.8-rc4 - - - --- 2024-02-15 Mark Brown New
[GIT,PULL] regmap fixes for v6.8-rc4 [GIT,PULL] regmap fixes for v6.8-rc4 - - - --- 2024-02-15 Mark Brown New
[v3,2/2] arm64/sme: Restore SMCR_EL1.EZT0 on exit from suspend arm64/sme: Fix handling of traps on resume - - - --- 2024-02-13 Mark Brown New
[v3,1/2] arm64/sme: Restore SME registers on exit from suspend arm64/sme: Fix handling of traps on resume - - - --- 2024-02-13 Mark Brown New
selftests: fuxex: Report a unique test name per run of futex_requeue_pi selftests: fuxex: Report a unique test name per run of futex_requeue_pi 2 - - --- 2024-02-13 Mark Brown New
[v2] arm64/sve: Lower the maximum allocation for the SVE ptrace regset [v2] arm64/sve: Lower the maximum allocation for the SVE ptrace regset - - 1 --- 2024-02-13 Mark Brown New
[2/2] arm64/sme: Ensure that all fields in SMCR_EL1 are set to known values arm64/fp: Initialise all bits in vector control registers to known values - - - --- 2024-02-13 Mark Brown New
[1/2] arm64/sve: Ensure that all fields in ZCR_EL1 are set to known values arm64/fp: Initialise all bits in vector control registers to known values - - - --- 2024-02-13 Mark Brown New
usb: typec: tpcm: Fix issues with power being removed during reset usb: typec: tpcm: Fix issues with power being removed during reset - - - --- 2024-02-12 Mark Brown New
[v3] regmap: kunit: Ensure that changed bytes are actually different [v3] regmap: kunit: Ensure that changed bytes are actually different - 1 1 --- 2024-02-11 Mark Brown New
[v2] regmap: kunit: Ensure that changed bytes are actually different [v2] regmap: kunit: Ensure that changed bytes are actually different - - - --- 2024-02-09 Mark Brown New
selftests/mm: Don't needlessly use sudo to obtain root in run_vmtests.sh selftests/mm: Don't needlessly use sudo to obtain root in run_vmtests.sh - - - --- 2024-02-09 Mark Brown New
regmap: kunit: Ensure that changed bytes are actually different regmap: kunit: Ensure that changed bytes are actually different - - - --- 2024-02-09 Mark Brown New
[v2] arm64/sve: Document that __SVE_VQ_MAX is much larger than needed [v2] arm64/sve: Document that __SVE_VQ_MAX is much larger than needed 1 - - --- 2024-02-09 Mark Brown New
[2/2] selftests/mm: Log a consistent test name for check_compaction selftests/mm: Output cleanups for the compaction test - - - --- 2024-02-09 Mark Brown New
[1/2] selftests/mm: Log skipped compaction test as a skip selftests/mm: Output cleanups for the compaction test - - - --- 2024-02-09 Mark Brown New
arm64/sve: Document that __SVE_VQ_MAX is much larger than needed arm64/sve: Document that __SVE_VQ_MAX is much larger than needed - - - --- 2024-02-06 Mark Brown New
[v2,2/2] arm64/sme: Restore SMCR_EL1.EZT0 on exit from suspend arm64/sme: Fix handling of traps on resume - - - --- 2024-02-03 Mark Brown New
[v2,1/2] arm64/sme: Restore SMCR on exit from suspend arm64/sme: Fix handling of traps on resume - - - --- 2024-02-03 Mark Brown New
[v8,38/38] kselftest: Provide shadow stack enable helpers for arm64 arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,37/38] kselftest/arm64: Enable GCS for the FP stress tests arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,36/38] kselftest/arm64: Add a GCS stress test arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,35/38] selftests/arm64: Add GCS signal tests arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,34/38] kselftest/arm64: Add test coverage for GCS mode locking arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,33/38] kselftest/arm64: Add a GCS test program built with the system libc arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,32/38] kselftest/arm64: Add very basic GCS test program arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,31/38] kselftest/arm64: Always run signals tests with GCS enabled arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,30/38] kselftest/arm64: Allow signals tests to specify an expected si_code arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,29/38] kselftest/arm64: Add framework support for GCS to signal handling tests arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,28/38] kselftest/arm64: Add GCS as a detected feature in the signal tests arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,27/38] kselftest/arm64: Verify the GCS hwcap arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,26/38] arm64: Add Kconfig for Guarded Control Stack (GCS) arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,25/38] arm64/ptrace: Expose GCS via ptrace and core files arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,24/38] arm64/signal: Expose GCS state in signal frames arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,23/38] arm64/signal: Set up and restore the GCS context for signal handlers arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,22/38] arm64/mm: Implement map_shadow_stack() arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,21/38] arm64/gcs: Implement shadow stack prctl() interface arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,20/38] arm64/gcs: Ensure that new threads have a GCS arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,19/38] arm64/gcs: Context switch GCS state for EL0 arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,18/38] arm64/mm: Handle GCS data aborts arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,17/38] arm64/traps: Handle GCS exceptions arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,16/38] arm64/hwcap: Add hwcap for GCS arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,15/38] arm64/idreg: Add overrride for GCS arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,14/38] arm64/gcs: Allow GCS usage at EL0 and EL1 arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,13/38] KVM: arm64: Manage GCS registers for guests arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,12/38] arm64/mm: Map pages for guarded control stack arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,11/38] mm: Define VM_SHADOW_STACK for arm64 when we support GCS arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,10/38] arm64/mm: Allocate PIE slots for EL0 guarded control stack arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,09/38] arm64/cpufeature: Runtime detection of Guarded Control Stack (GCS) arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,08/38] arm64/gcs: Provide put_user_gcs() arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,07/38] arm64/gcs: Add manual encodings of GCS instructions arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,06/38] arm64/sysreg: Add definitions for architected GCS caps arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,05/38] arm64/gcs: Document the ABI for Guarded Control Stacks arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,04/38] arm64: Document boot requirements for Guarded Control Stacks arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,03/38] mman: Add map_shadow_stack() flags arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,02/38] prctl: arch-agnostic prctl for shadow stack arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
[v8,01/38] arm64/mm: Restructure arch_validate_flags() for extensibility arm64/gcs: Provide support for GCS in userspace - - - --- 2024-02-03 Mark Brown New
arm64/sve: Lower the maximum allocation for the SVE ptrace regset arm64/sve: Lower the maximum allocation for the SVE ptrace regset - - 1 --- 2024-02-03 Mark Brown New
[RFT,v5,7/7] selftests/clone3: Test shadow stack support fork: Support shadow stacks in clone3() - - - --- 2024-02-03 Mark Brown New
[RFT,v5,6/7] selftests/clone3: Allow tests to flag if -E2BIG is a valid error code fork: Support shadow stacks in clone3() - - - --- 2024-02-03 Mark Brown New
[RFT,v5,5/7] selftests/clone3: Factor more of main loop into test_clone3() fork: Support shadow stacks in clone3() - - - --- 2024-02-03 Mark Brown New
[RFT,v5,4/7] fork: Add shadow stack support to clone3() fork: Support shadow stacks in clone3() - - - --- 2024-02-03 Mark Brown New
[RFT,v5,3/7] mm: Introduce ARCH_HAS_USER_SHADOW_STACK fork: Support shadow stacks in clone3() 1 2 - --- 2024-02-03 Mark Brown New
[RFT,v5,2/7] selftests: Provide helper header for shadow stack testing fork: Support shadow stacks in clone3() - 1 - --- 2024-02-03 Mark Brown New
[RFT,v5,1/7] Documentation: userspace-api: Add shadow stack API documentation fork: Support shadow stacks in clone3() - - - --- 2024-02-03 Mark Brown New
[GIT,PULL] SPI fixes for v6.8-rc2 [GIT,PULL] SPI fixes for v6.8-rc2 - - - --- 2024-02-01 Mark Brown New
[GIT,PULL] regulator fixes for v6.8-rc2 [GIT,PULL] regulator fixes for v6.8-rc2 - - - --- 2024-02-01 Mark Brown New
[v2] arm64/signal: Don't assume that TIF_SVE means we saved SVE state [v2] arm64/signal: Don't assume that TIF_SVE means we saved SVE state - - - --- 2024-01-30 Mark Brown New
[2/2] arm64/sme: Restore SMCR_EL1.EZT0 on exit from suspend arm64/sme: Fix handling of traps on resume - - - --- 2024-01-30 Mark Brown New
[1/2] arm64/sme: Restore SMCR on exit from suspend arm64/sme: Fix handling of traps on resume - - - --- 2024-01-30 Mark Brown New
[GIT,PULL] SPI fixes for v6.8-rc1 [GIT,PULL] SPI fixes for v6.8-rc1 - - - --- 2024-01-26 Mark Brown New
[v2,4/4] arm64/sme: Remove spurious 'is' in SME documentation arm64/fp: Documentation cleanups and clarifications - 1 - --- 2024-01-24 Mark Brown New
[v2,3/4] arm64/fp: Clarify effect of setting an unsupported system VL arm64/fp: Documentation cleanups and clarifications - 1 - --- 2024-01-24 Mark Brown New
[v2,2/4] arm64/sme: Fix cut'n'paste in ABI document arm64/fp: Documentation cleanups and clarifications - 1 - --- 2024-01-24 Mark Brown New
[v2,1/4] arm64/sve: Remove bitrotted comment about syscall behaviour arm64/fp: Documentation cleanups and clarifications - 1 - --- 2024-01-24 Mark Brown New
[v2] spi: Raise limit on number of chip selects [v2] spi: Raise limit on number of chip selects - - - --- 2024-01-24 Mark Brown New
[v4,2/2] kselftest/seccomp: Report each expectation we assert as a KTAP test kselftest/seccomp: Convert to KTAP output 1 - 1 --- 2024-01-24 Mark Brown New
[v4,1/2] kselftest/seccomp: Use kselftest output functions for benchmark kselftest/seccomp: Convert to KTAP output 1 - 1 --- 2024-01-24 Mark Brown New
[v3] thermal/drivers/sun8i: Don't fail probe due to zone registration failure [v3] thermal/drivers/sun8i: Don't fail probe due to zone registration failure 1 1 - --- 2024-01-23 Mark Brown New
[v3,2/2] kselftest/seccomp: Report each expectation we assert as a KTAP test kselftest/seccomp: Convert to KTAP output 1 - 1 --- 2024-01-22 Mark Brown New
[v3,1/2] kselftest/seccomp: Use kselftest output functions for benchmark kselftest/seccomp: Convert to KTAP output 1 - 1 --- 2024-01-22 Mark Brown New
kselftest/arm64: Test that ptrace takes effect in the target process kselftest/arm64: Test that ptrace takes effect in the target process - - - --- 2024-01-22 Mark Brown New
[4/4] arm64/sme: Remove spurious 'is' in SME documentation arm64/fp: Documentation cleanups and clarifications - 1 - --- 2024-01-22 Mark Brown New
[3/4] arm64/fp: Clarify effect of setting an unsupported system VL arm64/fp: Documentation cleanups and clarifications - - - --- 2024-01-22 Mark Brown New
« 1 2 3 49 10 »