Pawan Gupta ([email protected])

Number of posts: 339 (0.18 per day)
First post: 2019-03-12 19:09:42
Last post: 2024-05-24 20:42:30

Date List Subject
2022-07-15 22:24:25 linux-kernel Re: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible!
2022-07-15 17:30:47 linux-kernel Re: [PATCH v2] x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS parts
2022-07-15 02:46:56 linux-kernel Re: [PATCH v2] x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS parts
2022-07-15 01:46:23 linux-kernel [RESEND RFC PATCH] x86/bugs: Add "unknown" reporting for MMIO Stale Data
2022-07-14 23:17:13 linux-kernel [PATCH v2] x86/bugs: Warn when "ibrs" mitigation is selected on Enhanced IBRS parts
2022-07-14 19:10:42 linux-kernel Re: [PATCH] x86/bugs: Switch to "auto" when "ibrs" selected on Enhanced IBRS parts
2022-07-14 15:17:17 linux-kernel Re: [PATCH] x86/bugs: Switch to "auto" when "ibrs" selected on Enhanced IBRS parts
2022-07-14 06:00:54 linux-kernel [PATCH] x86/bugs: Switch to "auto" when "ibrs" selected on Enhanced IBRS parts
2022-07-12 20:55:49 linux-kernel Re: [perf] unchecked MSR access error: WRMSR to 0x689 in intel_pmu_lbr_restore
2022-07-11 22:43:01 linux-kernel Re: [perf] unchecked MSR access error: WRMSR to 0x689 in intel_pmu_lbr_restore
2022-06-15 03:49:57 linux-kernel [PATCH] Documentation: Clarify the affected CPUs list for Processor MMIO Stale Data
2022-06-15 03:30:49 linux-kernel Re: [PATCH 5.18 01/11] Documentation: Add documentation for Processor MMIO Stale Data
2022-06-10 08:43:02 linux-kernel [RFC PATCH] KVM: x86/speculation/taa: Export TAA_NO to guest when host is not affected
2022-04-22 23:19:18 linux-kernel Re: [PATCH] x86/cpu: Load microcode during restore_processor_state()
2022-04-22 21:45:48 linux-kernel [PATCH] x86/cpu: Load microcode during restore_processor_state()
2022-04-13 00:07:08 linux-kernel Re: [PATCH v2] x86/tsx: fix KVM guest live migration for tsx=on
2022-04-13 00:06:13 linux-kernel Re: [PATCH v2] x86/tsx: fix KVM guest live migration for tsx=on
2022-04-12 23:45:24 linux-kernel Re: [PATCH] x86/tsx: fix KVM guest live migration for tsx=on
2022-04-12 21:44:35 linux-kernel Re: [PATCH] x86/tsx: fix KVM guest live migration for tsx=on
2022-03-31 19:43:00 linux-kernel Re: [PATCH v2] x86/speculation/srbds: do not try to turn mitigation off when not supported
2022-03-31 10:59:00 linux-kernel Re: [PATCH v2] x86/speculation/srbds: do not try to turn mitigation off when not supported
2022-03-31 08:37:59 linux-kernel Re: [PATCH v2] x86/speculation/srbds: do not try to turn mitigation off when not supported
2022-03-30 14:51:31 linux-kernel Re: [PATCH v2 2/2] x86/tsx: Disable TSX development mode at boot
2022-03-30 11:48:25 linux-kernel Re: [PATCH v2 2/2] x86/tsx: Disable TSX development mode at boot
2022-03-23 18:18:22 linux-kernel Re: [PATCH v2 0/2] TSX update
2022-03-11 21:06:14 linux-kernel [PATCH v2 0/2] TSX update
2022-03-11 16:17:20 linux-kernel [PATCH v2 1/2] x86/tsx: Use MSR_TSX_CTRL to clear CPUID bits
2022-03-11 03:29:06 linux-kernel [PATCH v2 2/2] x86/tsx: Disable TSX development mode at boot
2022-02-17 07:58:52 linux-kernel Re: [PATCH] x86/tsx: Use MSR_TSX_CTRL to clear CPUID bits
2022-02-17 05:59:03 linux-kernel Re: [PATCH] x86/tsx: Use MSR_TSX_CTRL to clear CPUID bits
2022-02-16 07:41:45 linux-kernel Re: [PATCH] x86/tsx: Use MSR_TSX_CTRL to clear CPUID bits
2022-02-16 07:36:17 linux-kernel Re: [PATCH] x86/tsx: Use MSR_TSX_CTRL to clear CPUID bits
2022-02-16 03:22:17 linux-kernel Re: [PATCH] x86/tsx: Use MSR_TSX_CTRL to clear CPUID bits
2022-02-15 20:06:31 linux-kernel Re: [PATCH] x86/tsx: Use MSR_TSX_CTRL to clear CPUID bits
2022-02-15 12:43:37 linux-kernel Re: [PATCH] x86/tsx: Use MSR_TSX_CTRL to clear CPUID bits
2022-02-15 00:26:09 linux-kernel Re: [PATCH] x86/tsx: Use MSR_TSX_CTRL to clear CPUID bits
2022-02-14 23:29:21 linux-kernel Re: [PATCH] x86/tsx: Use MSR_TSX_CTRL to clear CPUID bits
2022-02-09 23:20:59 linux-kernel [PATCH] x86/tsx: Use MSR_TSX_CTRL to clear CPUID bits
2021-10-29 22:55:05 linux-kernel Re: [PATCH v2 1/2] arch/Kconfig: Make CONFIG_CPU_SPECTRE available for all architectures
2021-10-29 19:44:06 linux-kernel [PATCH ebpf v3] bpf: Disallow unprivileged bpf by default
2021-10-29 19:37:55 linux-kernel Re: [PATCH v2 1/2] arch/Kconfig: Make CONFIG_CPU_SPECTRE available for all architectures
2021-10-28 19:39:48 linux-kernel Re: [PATCH ebpf v2 2/2] bpf: Make unprivileged bpf depend on CONFIG_CPU_SPECTRE
2021-10-28 19:36:29 linux-kernel Re: [PATCH v2 1/2] arch/Kconfig: Make CONFIG_CPU_SPECTRE available for all architectures
2021-10-28 01:36:20 linux-kernel [PATCH ebpf v2 2/2] bpf: Make unprivileged bpf depend on CONFIG_CPU_SPECTRE
2021-10-28 01:35:13 linux-kernel [PATCH v2 1/2] arch/Kconfig: Make CONFIG_CPU_SPECTRE available for all architectures
2021-10-28 01:33:44 linux-kernel [PATCH ebpf v2 0/2] Unprivileged BPF default
2021-10-27 23:41:38 linux-kernel Re: [PATCH ebpf] bpf: Disallow unprivileged bpf by default
2021-10-27 22:16:21 linux-kernel [PATCH ebpf] bpf: Disallow unprivileged bpf by default
2021-09-08 16:03:06 linux-kernel Re: [PATCH] x86/tsx: clear RTM and HLE when MSR_IA32_TSX_CTRL is not supported
2021-09-07 23:50:59 linux-kernel Re: [PATCH] x86/tsx: clear RTM and HLE when MSR_IA32_TSX_CTRL is not supported
2021-09-07 23:07:11 linux-kernel Re: [PATCH] x86/tsx: clear RTM and HLE when MSR_IA32_TSX_CTRL is not supported