Pawan Gupta ([email protected])

Number of posts: 113 (0.09 per day)
First post: 2019-03-12 19:09:42
Last post: 2022-09-23 18:54:37

Date List Subject
2022-09-23 18:54:37 linux-kernel Re: [PATCH v3 32/59] objtool: Allow STT_NOTYPE -> STT_FUNC+0 tail-calls
2022-09-22 05:31:09 linux-kernel Re: [PATCH v3 32/59] objtool: Allow STT_NOTYPE -> STT_FUNC+0 tail-calls
2022-09-21 19:06:48 linux-kernel Re: [PATCH v3.1 58/59] x86/ftrace: Make it call depth tracking aware
2022-09-19 18:08:11 linux-kernel Re: [PATCH 0/3] Check enumeration before MSR save/restore
2022-09-13 00:58:33 linux-kernel Re: [PATCH 0/3] Check enumeration before MSR save/restore
2022-09-13 00:51:55 linux-kernel [PATCH 0/3] Check enumeration before MSR save/restore
2022-09-13 00:31:49 linux-kernel [PATCH 3/3] x86/pm: Add enumeration check before spec MSRs save/restore setup
2022-09-13 00:25:03 linux-kernel [PATCH 1/3] x86/tsx: Add feature bit for TSX control MSR support
2022-09-13 00:13:01 linux-kernel [PATCH 2/3] x86/cpu/amd: Add feature bit for MSR_AMD64_LS_CFG enumeration
2022-09-08 01:25:07 linux-kernel Re: [PATCH] x86/cpu: Avoid writing MSR_IA32_TSX_CTRL when writing it is not supported
2022-08-31 00:49:12 linux-kernel [PATCH] x86/bugs: Fix retbleed reporting "Vulnerable" when spectre_v2=ibrs
2022-08-30 23:18:10 linux-kernel [PATCH 4.9 1/2] x86/cpu: Add Tiger Lake to Intel family
2022-08-30 23:18:09 linux-kernel Re: [PATCH 4.14 1/2] x86/cpu: Add Tiger Lake to Intel family
2022-08-30 23:18:07 linux-kernel [PATCH 4.9 2/2] x86/bugs: Add "unknown" reporting for MMIO Stale Data
2022-08-30 22:52:43 linux-kernel [PATCH 4.14 1/2] x86/cpu: Add Tiger Lake to Intel family
2022-08-30 22:51:42 linux-kernel [PATCH 4.14 2/2] x86/bugs: Add "unknown" reporting for MMIO Stale Data
2022-08-30 21:44:58 linux-kernel [PATCH 4.19] x86/bugs: Add "unknown" reporting for MMIO Stale Data
2022-08-30 20:35:57 linux-kernel [PATCH 5.4] x86/bugs: Add "unknown" reporting for MMIO Stale Data
2022-08-18 18:44:13 linux-kernel Re: [PATCH v2] x86/bugs: Add "unknown" reporting for MMIO Stale Data
2022-08-16 22:46:02 linux-kernel Re: [PATCH] x86/nospec: Unwreck the RSB stuffing
2022-08-03 22:00:11 linux-kernel [PATCH v2] x86/bugs: Add "unknown" reporting for MMIO Stale Data
2022-07-30 03:06:59 linux-kernel Re: [RESEND RFC PATCH] x86/bugs: Add "unknown" reporting for MMIO Stale Data
2022-07-30 02:44:00 linux-kernel Re: [RESEND RFC PATCH] x86/bugs: Add "unknown" reporting for MMIO Stale Data
2022-07-29 22:01:45 linux-kernel Re: [RESEND RFC PATCH] x86/bugs: Add "unknown" reporting for MMIO Stale Data
2022-07-29 18:36:11 linux-kernel Re: [RESEND RFC PATCH] x86/bugs: Add "unknown" reporting for MMIO Stale Data
2022-07-29 18:15:25 linux-kernel Re: [RESEND RFC PATCH] x86/bugs: Add "unknown" reporting for MMIO Stale Data
2022-07-29 18:13:13 linux-kernel Re: [RESEND RFC PATCH] x86/bugs: Add "unknown" reporting for MMIO Stale Data
2022-07-29 02:32:28 linux-kernel Re: [RESEND RFC PATCH] x86/bugs: Add "unknown" reporting for MMIO Stale Data
2022-07-28 01:34:35 linux-kernel Re: [RESEND RFC PATCH] x86/bugs: Add "unknown" reporting for MMIO Stale Data
2022-07-15 22:24:25 linux-kernel Re: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible!
2022-07-15 17:30:47 linux-kernel Re: [PATCH v2] x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS parts
2022-07-15 02:46:56 linux-kernel Re: [PATCH v2] x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS parts
2022-07-15 01:46:23 linux-kernel [RESEND RFC PATCH] x86/bugs: Add "unknown" reporting for MMIO Stale Data
2022-07-14 23:17:13 linux-kernel [PATCH v2] x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS parts
2022-07-14 19:10:42 linux-kernel Re: [PATCH] x86/bugs: Switch to "auto" when "ibrs" selected on Enhanced IBRS parts
2022-07-14 15:17:17 linux-kernel Re: [PATCH] x86/bugs: Switch to "auto" when "ibrs" selected on Enhanced IBRS parts
2022-07-14 06:00:54 linux-kernel [PATCH] x86/bugs: Switch to "auto" when "ibrs" selected on Enhanced IBRS parts
2022-07-12 20:55:49 linux-kernel Re: [perf] unchecked MSR access error: WRMSR to 0x689 in intel_pmu_lbr_restore
2022-07-11 22:43:01 linux-kernel Re: [perf] unchecked MSR access error: WRMSR to 0x689 in intel_pmu_lbr_restore
2022-06-15 03:49:57 linux-kernel [PATCH] Documentation: Clarify the affected CPUs list for Processor MMIO Stale Data
2022-06-15 03:30:49 linux-kernel Re: [PATCH 5.18 01/11] Documentation: Add documentation for Processor MMIO Stale Data
2022-06-10 08:43:02 linux-kernel [RFC PATCH] KVM: x86/speculation/taa: Export TAA_NO to guest when host is not affected
2022-04-22 23:19:18 linux-kernel Re: [PATCH] x86/cpu: Load microcode during restore_processor_state()
2022-04-22 21:45:48 linux-kernel [PATCH] x86/cpu: Load microcode during restore_processor_state()
2022-04-13 00:07:08 linux-kernel Re: [PATCH v2] x86/tsx: fix KVM guest live migration for tsx=on
2022-04-13 00:06:13 linux-kernel Re: [PATCH v2] x86/tsx: fix KVM guest live migration for tsx=on
2022-04-12 23:45:24 linux-kernel Re: [PATCH] x86/tsx: fix KVM guest live migration for tsx=on
2022-04-12 21:44:35 linux-kernel Re: [PATCH] x86/tsx: fix KVM guest live migration for tsx=on
2022-03-31 19:43:00 linux-kernel Re: [PATCH v2] x86/speculation/srbds: do not try to turn mitigation off when not supported
2022-03-31 10:59:00 linux-kernel Re: [PATCH v2] x86/speculation/srbds: do not try to turn mitigation off when not supported
2022-03-31 08:37:59 linux-kernel Re: [PATCH v2] x86/speculation/srbds: do not try to turn mitigation off when not supported