Toggle navigation
Patchwork
linux-kernel
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Submitter =
Mark Brown
| Archived =
No
| 917 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Unresolved
Repeat Merge
Corrupt patch
Search
Archived
No
Yes
Both
Delegate
------
Nobody
snail
snail
patchwork-bot
patchwork-bot
patchwork-bot
ww
ww
ww
Apply
«
1
2
3
4
…
9
10
»
Patch
Series
A/R/T
S/W/F
Date
Submitter
Delegate
State
KVM: arm64: Only save S1PIE registers when dirty
KVM: arm64: Only save S1PIE registers when dirty
- - -
-
-
-
2024-03-01
Mark Brown
New
[v2,2/2] KVM: arm64: Reuse struct cpu_fp_state to track the guest FP state
KVM: arm64: Store a cpu_fp_state directly in the vCPU data
- - -
-
-
-
2024-02-29
Mark Brown
New
[v2,1/2] KVM: arm64: Rename variable for tracking ownership of FP state
KVM: arm64: Store a cpu_fp_state directly in the vCPU data
- - -
-
-
-
2024-02-29
Mark Brown
New
[GIT,PULL] SPI fixes for v6.8-rc5
[GIT,PULL] SPI fixes for v6.8-rc5
- - -
-
-
-
2024-02-28
Mark Brown
New
[GIT,PULL] regulator fixes for v6.8-rc5
[GIT,PULL] regulator fixes for v6.8-rc5
- - -
-
-
-
2024-02-28
Mark Brown
New
[2/2] KVM: arm64: Reuse struct cpu_fp_state to track the guest FP state
KVM: arm64: Store a cpu_fp_state directly in the vCPU data
- - -
-
-
-
2024-02-26
Mark Brown
New
[1/2] KVM: arm64: Rename variable for tracking ownership of FP state
KVM: arm64: Store a cpu_fp_state directly in the vCPU data
- - -
-
-
-
2024-02-26
Mark Brown
New
regmap: kunit: Add a test for ranges in combination with windows
regmap: kunit: Add a test for ranges in combination with windows
- - -
-
-
-
2024-02-25
Mark Brown
New
[8/8] regulator: mp8859: Implement set_current_limit()
regulator: mp8859: Cleanups and enhancements
- - -
-
-
-
2024-02-25
Mark Brown
New
[7/8] regulator: mp8859: Report slew rate
regulator: mp8859: Cleanups and enhancements
- - -
-
-
-
2024-02-25
Mark Brown
New
[6/8] regulator: mp8859: Support status and error readback
regulator: mp8859: Cleanups and enhancements
- - -
-
-
-
2024-02-25
Mark Brown
New
[5/8] regulator: mp8859: Support active discharge control
regulator: mp8859: Cleanups and enhancements
- - -
-
-
-
2024-02-25
Mark Brown
New
[4/8] regulator: mp8859: Support mode operations
regulator: mp8859: Cleanups and enhancements
- - -
-
-
-
2024-02-25
Mark Brown
New
[3/8] regulator: mp8859: Support enable control
regulator: mp8859: Cleanups and enhancements
- - -
-
-
-
2024-02-25
Mark Brown
New
[2/8] regulator: mp8859: Validate and log device identifier information
regulator: mp8859: Cleanups and enhancements
- - -
-
-
-
2024-02-25
Mark Brown
New
[1/8] regulator: mp8859: Specify register accessibility and enable caching
regulator: mp8859: Cleanups and enhancements
- - -
-
-
-
2024-02-25
Mark Brown
New
[GIT,PULL] SPI fixes for v6.8-rc4
[GIT,PULL] SPI fixes for v6.8-rc4
- - -
-
-
-
2024-02-15
Mark Brown
New
[GIT,PULL] regmap fixes for v6.8-rc4
[GIT,PULL] regmap fixes for v6.8-rc4
- - -
-
-
-
2024-02-15
Mark Brown
New
[v3,2/2] arm64/sme: Restore SMCR_EL1.EZT0 on exit from suspend
arm64/sme: Fix handling of traps on resume
- - -
-
-
-
2024-02-13
Mark Brown
New
[v3,1/2] arm64/sme: Restore SME registers on exit from suspend
arm64/sme: Fix handling of traps on resume
- - -
-
-
-
2024-02-13
Mark Brown
New
selftests: fuxex: Report a unique test name per run of futex_requeue_pi
selftests: fuxex: Report a unique test name per run of futex_requeue_pi
2 - -
-
-
-
2024-02-13
Mark Brown
New
[v2] arm64/sve: Lower the maximum allocation for the SVE ptrace regset
[v2] arm64/sve: Lower the maximum allocation for the SVE ptrace regset
- - 1
-
-
-
2024-02-13
Mark Brown
New
[2/2] arm64/sme: Ensure that all fields in SMCR_EL1 are set to known values
arm64/fp: Initialise all bits in vector control registers to known values
- - -
-
-
-
2024-02-13
Mark Brown
New
[1/2] arm64/sve: Ensure that all fields in ZCR_EL1 are set to known values
arm64/fp: Initialise all bits in vector control registers to known values
- - -
-
-
-
2024-02-13
Mark Brown
New
usb: typec: tpcm: Fix issues with power being removed during reset
usb: typec: tpcm: Fix issues with power being removed during reset
- - -
-
-
-
2024-02-12
Mark Brown
New
[v3] regmap: kunit: Ensure that changed bytes are actually different
[v3] regmap: kunit: Ensure that changed bytes are actually different
- 1 1
-
-
-
2024-02-11
Mark Brown
New
[v2] regmap: kunit: Ensure that changed bytes are actually different
[v2] regmap: kunit: Ensure that changed bytes are actually different
- - -
-
-
-
2024-02-09
Mark Brown
New
selftests/mm: Don't needlessly use sudo to obtain root in run_vmtests.sh
selftests/mm: Don't needlessly use sudo to obtain root in run_vmtests.sh
- - -
-
-
-
2024-02-09
Mark Brown
New
regmap: kunit: Ensure that changed bytes are actually different
regmap: kunit: Ensure that changed bytes are actually different
- - -
-
-
-
2024-02-09
Mark Brown
New
[v2] arm64/sve: Document that __SVE_VQ_MAX is much larger than needed
[v2] arm64/sve: Document that __SVE_VQ_MAX is much larger than needed
1 - -
-
-
-
2024-02-09
Mark Brown
New
[2/2] selftests/mm: Log a consistent test name for check_compaction
selftests/mm: Output cleanups for the compaction test
- - -
-
-
-
2024-02-09
Mark Brown
New
[1/2] selftests/mm: Log skipped compaction test as a skip
selftests/mm: Output cleanups for the compaction test
- - -
-
-
-
2024-02-09
Mark Brown
New
arm64/sve: Document that __SVE_VQ_MAX is much larger than needed
arm64/sve: Document that __SVE_VQ_MAX is much larger than needed
- - -
-
-
-
2024-02-06
Mark Brown
New
[v2,2/2] arm64/sme: Restore SMCR_EL1.EZT0 on exit from suspend
arm64/sme: Fix handling of traps on resume
- - -
-
-
-
2024-02-03
Mark Brown
New
[v2,1/2] arm64/sme: Restore SMCR on exit from suspend
arm64/sme: Fix handling of traps on resume
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,38/38] kselftest: Provide shadow stack enable helpers for arm64
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,37/38] kselftest/arm64: Enable GCS for the FP stress tests
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,36/38] kselftest/arm64: Add a GCS stress test
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,35/38] selftests/arm64: Add GCS signal tests
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,34/38] kselftest/arm64: Add test coverage for GCS mode locking
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,33/38] kselftest/arm64: Add a GCS test program built with the system libc
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,32/38] kselftest/arm64: Add very basic GCS test program
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,31/38] kselftest/arm64: Always run signals tests with GCS enabled
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,30/38] kselftest/arm64: Allow signals tests to specify an expected si_code
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,29/38] kselftest/arm64: Add framework support for GCS to signal handling tests
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,28/38] kselftest/arm64: Add GCS as a detected feature in the signal tests
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,27/38] kselftest/arm64: Verify the GCS hwcap
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,26/38] arm64: Add Kconfig for Guarded Control Stack (GCS)
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,25/38] arm64/ptrace: Expose GCS via ptrace and core files
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,24/38] arm64/signal: Expose GCS state in signal frames
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,23/38] arm64/signal: Set up and restore the GCS context for signal handlers
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,22/38] arm64/mm: Implement map_shadow_stack()
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,21/38] arm64/gcs: Implement shadow stack prctl() interface
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,20/38] arm64/gcs: Ensure that new threads have a GCS
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,19/38] arm64/gcs: Context switch GCS state for EL0
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,18/38] arm64/mm: Handle GCS data aborts
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,17/38] arm64/traps: Handle GCS exceptions
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,16/38] arm64/hwcap: Add hwcap for GCS
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,15/38] arm64/idreg: Add overrride for GCS
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,14/38] arm64/gcs: Allow GCS usage at EL0 and EL1
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,13/38] KVM: arm64: Manage GCS registers for guests
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,12/38] arm64/mm: Map pages for guarded control stack
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,11/38] mm: Define VM_SHADOW_STACK for arm64 when we support GCS
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,10/38] arm64/mm: Allocate PIE slots for EL0 guarded control stack
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,09/38] arm64/cpufeature: Runtime detection of Guarded Control Stack (GCS)
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,08/38] arm64/gcs: Provide put_user_gcs()
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,07/38] arm64/gcs: Add manual encodings of GCS instructions
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,06/38] arm64/sysreg: Add definitions for architected GCS caps
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,05/38] arm64/gcs: Document the ABI for Guarded Control Stacks
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,04/38] arm64: Document boot requirements for Guarded Control Stacks
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,03/38] mman: Add map_shadow_stack() flags
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,02/38] prctl: arch-agnostic prctl for shadow stack
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
[v8,01/38] arm64/mm: Restructure arch_validate_flags() for extensibility
arm64/gcs: Provide support for GCS in userspace
- - -
-
-
-
2024-02-03
Mark Brown
New
arm64/sve: Lower the maximum allocation for the SVE ptrace regset
arm64/sve: Lower the maximum allocation for the SVE ptrace regset
- - 1
-
-
-
2024-02-03
Mark Brown
New
[RFT,v5,7/7] selftests/clone3: Test shadow stack support
fork: Support shadow stacks in clone3()
- - -
-
-
-
2024-02-03
Mark Brown
New
[RFT,v5,6/7] selftests/clone3: Allow tests to flag if -E2BIG is a valid error code
fork: Support shadow stacks in clone3()
- - -
-
-
-
2024-02-03
Mark Brown
New
[RFT,v5,5/7] selftests/clone3: Factor more of main loop into test_clone3()
fork: Support shadow stacks in clone3()
- - -
-
-
-
2024-02-03
Mark Brown
New
[RFT,v5,4/7] fork: Add shadow stack support to clone3()
fork: Support shadow stacks in clone3()
- - -
-
-
-
2024-02-03
Mark Brown
New
[RFT,v5,3/7] mm: Introduce ARCH_HAS_USER_SHADOW_STACK
fork: Support shadow stacks in clone3()
1 2 -
-
-
-
2024-02-03
Mark Brown
New
[RFT,v5,2/7] selftests: Provide helper header for shadow stack testing
fork: Support shadow stacks in clone3()
- 1 -
-
-
-
2024-02-03
Mark Brown
New
[RFT,v5,1/7] Documentation: userspace-api: Add shadow stack API documentation
fork: Support shadow stacks in clone3()
- - -
-
-
-
2024-02-03
Mark Brown
New
[GIT,PULL] SPI fixes for v6.8-rc2
[GIT,PULL] SPI fixes for v6.8-rc2
- - -
-
-
-
2024-02-01
Mark Brown
New
[GIT,PULL] regulator fixes for v6.8-rc2
[GIT,PULL] regulator fixes for v6.8-rc2
- - -
-
-
-
2024-02-01
Mark Brown
New
[v2] arm64/signal: Don't assume that TIF_SVE means we saved SVE state
[v2] arm64/signal: Don't assume that TIF_SVE means we saved SVE state
- - -
-
-
-
2024-01-30
Mark Brown
New
[2/2] arm64/sme: Restore SMCR_EL1.EZT0 on exit from suspend
arm64/sme: Fix handling of traps on resume
- - -
-
-
-
2024-01-30
Mark Brown
New
[1/2] arm64/sme: Restore SMCR on exit from suspend
arm64/sme: Fix handling of traps on resume
- - -
-
-
-
2024-01-30
Mark Brown
New
[GIT,PULL] SPI fixes for v6.8-rc1
[GIT,PULL] SPI fixes for v6.8-rc1
- - -
-
-
-
2024-01-26
Mark Brown
New
[v2,4/4] arm64/sme: Remove spurious 'is' in SME documentation
arm64/fp: Documentation cleanups and clarifications
- 1 -
-
-
-
2024-01-24
Mark Brown
New
[v2,3/4] arm64/fp: Clarify effect of setting an unsupported system VL
arm64/fp: Documentation cleanups and clarifications
- 1 -
-
-
-
2024-01-24
Mark Brown
New
[v2,2/4] arm64/sme: Fix cut'n'paste in ABI document
arm64/fp: Documentation cleanups and clarifications
- 1 -
-
-
-
2024-01-24
Mark Brown
New
[v2,1/4] arm64/sve: Remove bitrotted comment about syscall behaviour
arm64/fp: Documentation cleanups and clarifications
- 1 -
-
-
-
2024-01-24
Mark Brown
New
[v2] spi: Raise limit on number of chip selects
[v2] spi: Raise limit on number of chip selects
- - -
-
-
-
2024-01-24
Mark Brown
New
[v4,2/2] kselftest/seccomp: Report each expectation we assert as a KTAP test
kselftest/seccomp: Convert to KTAP output
1 - 1
-
-
-
2024-01-24
Mark Brown
New
[v4,1/2] kselftest/seccomp: Use kselftest output functions for benchmark
kselftest/seccomp: Convert to KTAP output
1 - 1
-
-
-
2024-01-24
Mark Brown
New
[v3] thermal/drivers/sun8i: Don't fail probe due to zone registration failure
[v3] thermal/drivers/sun8i: Don't fail probe due to zone registration failure
1 1 -
-
-
-
2024-01-23
Mark Brown
New
[v3,2/2] kselftest/seccomp: Report each expectation we assert as a KTAP test
kselftest/seccomp: Convert to KTAP output
1 - 1
-
-
-
2024-01-22
Mark Brown
New
[v3,1/2] kselftest/seccomp: Use kselftest output functions for benchmark
kselftest/seccomp: Convert to KTAP output
1 - 1
-
-
-
2024-01-22
Mark Brown
New
kselftest/arm64: Test that ptrace takes effect in the target process
kselftest/arm64: Test that ptrace takes effect in the target process
- - -
-
-
-
2024-01-22
Mark Brown
New
[4/4] arm64/sme: Remove spurious 'is' in SME documentation
arm64/fp: Documentation cleanups and clarifications
- 1 -
-
-
-
2024-01-22
Mark Brown
New
[3/4] arm64/fp: Clarify effect of setting an unsupported system VL
arm64/fp: Documentation cleanups and clarifications
- - -
-
-
-
2024-01-22
Mark Brown
New
«
1
2
3
4
…
9
10
»