Kexec
[Prev Page][Next Page]
- [PATCH v2] x86/kexec: Exclude GART aperture from vmcore
- [PATCH v2] kexec-tools: Perform run-time linking of libxenctrl.so
- [PATCH] certs: always use secondary keyring first if possible
- Regression: kexec/kdump boot hangs with x86/vector commits
- Regression: kexec/kdump boot hangs with x86/vector commits
- Regression: kexec/kdump boot hangs with x86/vector commits
- [PATCH] handle renamed init_level4_pgt -> init_top_pgt
- [PATCH v1] kexec-tools: Perform run-time linking of libxenctrl.so
- kdump issues with 4.11 kernel
- [PATCH v7 11/11] arm64: kexec_file: enable KEXEC_VERIFY_SIG for Image
- [PATCH v7 10/11] include: pe.h: remove message[] from mz header definition
- [PATCH v7 09/11] arm64: kexec_file: add Image format support
- [PATCH v7 08/11] arm64: kexec_file: enable KEXEC_FILE config
- [PATCH v7 07/11] arm64: kexec_file: set up for crash dump adding elf core header
- [PATCH v7 06/11] arm64: kexec_file: load initrd, device-tree and purgatory segments
- [PATCH v7 05/11] arm64: kexec_file: create purgatory
- [PATCH v7 04/11] asm-generic: add kexec_file_load system call to unistd.h
- [PATCH v7 03/11] kexec_file: factor out crashdump elf header function from x86
- [PATCH v7 02/11] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH v7 01/11] resource: add walk_system_ram_res_rev()
- [PATCH v7 00/11] arm64: kexec: add kexec_file_load() support
- [PATCH v1] kexec-tools: Perform run-time linking of libxenctrl.so
- kdump issues with 4.11 kernel
- [PATCH v1] kexec-tools: Perform run-time linking of libxenctrl.so
- [PATCH] x86/kexec: Exclude GART aperture from vmcore
- kdump issues with 4.11 kernel
- kdump issues with 4.11 kernel
- kdump issues with 4.11 kernel
- kdump issues with 4.11 kernel
- kdump issues with 4.11 kernel
- kdump issues with 4.11 kernel
- kdump issues with 4.11 kernel
- [PATCH] x86/kexec: Exclude GART aperture from vmcore
- [PATCH] certs: always use secondary keyring first if possible
- [PATCH] x86/kexec: Exclude GART aperture from vmcore
- [ANNOUNCE] kexec-tools 2.0.16
- [makedumpfile PATCH 1/2] Fix compilation warnings on ppc64/ppc64le platforms
- [PATCH] certs: always use secondary keyring first if possible
- [makedumpfile PATCH 2/2] Fix 'kernel_version' variable being uninitialized & introduce minor reorganization
- [makedumpfile PATCH 1/2] Fix compilation warnings on ppc64/ppc64le platforms
- [PATCH 2/3] X86/kdump: crashkernel=X try to reserve below 896M first then below 4G and MAXMEM
- [PATCH 2/3] X86/kdump: crashkernel=X try to reserve below 896M first then below 4G and MAXMEM
- [PATCH V2] kdump: print a message in case parse_crashkernel_mem resulted in zero bytes
- [PATCH v6 4/5] crash: export paddr_vmcoreinfo_note()
- No subject
- [makedumpfile PATCH] ppc64: update hash page table geometry
- [PATCH] kdump: print a message in case crashkernel size parsing resulted in zero bytes
- [PATCH] kdump: print a message in case crashkernel size parsing resulted in zero bytes
- [PATCH 2/3] X86/kdump: crashkernel=X try to reserve below 896M first then below 4G and MAXMEM
- [PATCH] x86/kexec: Exclude GART aperture from vmcore
- [PATCH] x86/kexec: Exclude GART aperture from vmcore
- [makedumpfile PATCH] ppc64: update hash page table geometry
- About command line for kdump on ARM64
- About command line for kdump on ARM64
- [ANNOUNCE] kexec-tools 2.0.16-rc1
- [Patch resend] vmcore-dmesg: avoid allocating large memory chunk for log buf
- [Patch resend] vmcore-dmesg: avoid allocating large memory chunk for log buf
- [PATCH] x86/kexec: Exclude GART aperture from vmcore
- [PATCH] x86/kexec: Exclude GART aperture from vmcore
- [PATCH] x86/kexec: Exclude GART aperture from vmcore
- [PATCH] handle renamed init_level4_pgt -> init_top_pgt
- [PATCH] handle renamed init_level4_pgt -> init_top_pgt
- [PATCH] x86/kexec: Exclude GART aperture from vmcore
- [PATCH] x86/kexec: Exclude GART aperture from vmcore
- [PATCH] x86/kexec: Exclude GART aperture from vmcore
- [PATCH] x86/kexec: Exclude GART aperture from vmcore
- [PATCH] x86/kexec: Exclude GART aperture from vmcore
- [PATCH 3/3 update] kdump: round up the total memory size to 128M for crashkernel reservation
- [PATCH 2/2] ARM: read kernel size from zImage
- [PATCH 2/2] ARM: read kernel size from zImage
- [PATCH 1/2] ARM: cleanup initrd and dtb handing
- [ANNOUNCE] kexec-tools v2.0.16 preparation
- [PATCH 3/3] kdump: round up the total memory size to 128M for crashkernel reservation
- [makedumpfile PATCH v3 0/4] Fix KASLR problem on sadump
- [makedumpfile PATCH v3 4/4] sadump: Fix a KASLR problem of sadump while kdump is working
- [makedumpfile PATCH v3 3/4] sadump: Fix a KASLR problem of sadump
- [makedumpfile PATCH v3 2/4] Introduce vtop4_x86_64_pagetable
- [makedumpfile PATCH v3 1/4] Support symbol __cpu_online_mask
- [makedumpfile PATCH v3 0/4] Fix KASLR problem on sadump
- [makedumpfile PATCH v2 3/3] sadump: Fix a KASLR problem of sadump
- [makedumpfile PATCH v2 3/3] sadump: Fix a KASLR problem of sadump
- [makedumpfile PATCH v2 0/3] Fix KASLR problem on sadump
- [PATCH v6 10/10] arm64: kexec_file: add Image format support
- [PATCH v6 09/10] arm64: enable KEXEC_FILE config
- [PATCH v6 08/10] arm64: kexec_file: set up for crash dump adding elf core header
- [PATCH v6 07/10] arm64: kexec_file: load initrd, device-tree and purgatory segments
- [PATCH v6 06/10] arm64: kexec_file: create purgatory
- [PATCH v6 05/10] asm-generic: add kexec_file_load system call to unistd.h
- [PATCH v6 04/10] kexec_file: factor out crashdump elf header function from x86
- [PATCH v6 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH v6 02/10] resource: add walk_system_ram_res_rev()
- [PATCH v6 01/10] include: pe.h: remove message[] from mz header definition
- [PATCH v6 00/10] arm64: kexec: add kexec_file_load() support
- [PATCH 3/3] kdump: round up the total memory size to 128M for crashkernel reservation
- [PATCH 1/3] kdump: extend crashkernel=range:size to dynamically increase reservation size
- [PATCH 1/3] kdump: extend crashkernel=range:size to dynamically increase reservation size
- [PATCH 3/3] kdump: round up the total memory size to 128M for crashkernel reservation
- [PATCH 3/3] kdump: round up the total memory size to 128M for crashkernel reservation
- From: dyoung at redhat.com
- [PATCH 2/3] X86/kdump: crashkernel=X try to reserve below 896M first then below 4G and MAXMEM
- From: dyoung at redhat.com
- [PATCH 1/3] kdump: extend crashkernel=range:size to dynamically increase reservation size
- From: dyoung at redhat.com
- [PATCH 0/3] kdump: crashkernel parameter improvement
- From: dyoung at redhat.com
- x86/kdump: crashkernel=X try to reserve below 896M first then below 4G and MAXMEM
- [PATCH 2/2] ARM: read kernel size from zImage
- [PATCH 1/2] ARM: cleanup initrd and dtb handing
- x86/kdump: crashkernel=X try to reserve below 896M first then below 4G and MAXMEM
- x86/kdump: crashkernel=X try to reserve below 896M first then below 4G and MAXMEM
- x86/kdump: crashkernel=X try to reserve below 896M first then below 4G and MAXMEM
- [PATCH v5 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH 3/4] kexec-tools: mips: Use proper page_offset for OCTEON CPUs.
- [PATCH 1/4] kexec-tools: mips: Merge adjacent memory ranges.
- [PATCH 1/4] kexec-tools: mips: Merge adjacent memory ranges.
- [PATCH 3/4] kexec-tools: mips: Use proper page_offset for OCTEON CPUs.
- [makedumpfile PATCH v2 3/3] sadump: Fix a KASLR problem of sadump
- [makedumpfile PATCH v2 2/3] Introduce vtop4_x86_64_pagetable
- [makedumpfile PATCH v2 1/3] Support symbol __cpu_online_mask
- [makedumpfile PATCH v2 0/3] Fix KASLR problem on sadump
- [PATCH 4/4] kexec-tools: mips: Try to include bss in kernel vmcore file.
- [PATCH 2/4] kexec-tools: mips: Don't set lowmem_limit to 2G for 64-bit systems.
- [PATCH 3/4] kexec-tools: mips: Use proper page_offset for OCTEON CPUs.
- [PATCH 1/4] kexec-tools: mips: Merge adjacent memory ranges.
- [PATCH v5 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH v5 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH 3/3] makedumpfile: sadump: Fix a KASLR problem of sadump
- [PATCH 2/3] makedumpfile: Introduce vtop4_x86_64_pagetable
- [PATCH 1/3] Support symbol __cpu_online_mask
- [PATCH v5 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH 4/4] kexec-tools: mips: Try to include bss in kernel vmcore file.
- [PATCH 3/4] kexec-tools: mips: Use proper page_offset for OCTEON CPUs.
- [PATCH 2/4] kexec-tools: mips: Don't set lowmem_limit to 2G for 64-bit systems.
- [PATCH 1/4] kexec-tools: mips: Merge adjacent memory ranges.
- [PATCH 0/4] kexec-tools: mips: Fixes for 64-bit and OCTEON
- [PATCH v5 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH v5 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH v5 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH v5 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH v5 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH 3/3] makedumpfile: sadump: Fix a KASLR problem of sadump
- [PATCH 2/3] makedumpfile: Introduce vtop4_x86_64_pagetable
- [PATCH 1/3] Support symbol __cpu_online_mask
- [PATCH 0/3] Fix KASLR problem on sadump
- [PATCH v5 10/10] arm64: kexec_file: add Image format support
- [PATCH v5 09/10] arm64: enable KEXEC_FILE config
- [PATCH v5 08/10] arm64: kexec_file: set up for crash dump adding elf core header
- [PATCH v5 07/10] arm64: kexec_file: load initrd, device-tree and purgatory segments
- [PATCH v5 06/10] arm64: kexec_file: create purgatory
- [PATCH v5 05/10] asm-generic: add kexec_file_load system call to unistd.h
- [PATCH v5 04/10] kexec_file: factor out crashdump elf header function from x86
- [PATCH v5 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH v5 02/10] resource: add walk_system_ram_res_rev()
- [PATCH v5 01/10] include: pe.h: remove message[] from mz header definition
- [PATCH v5 00/10] arm64: kexec: add kexec_file_load() support
- [PATCH v4 08/10] arm64: kexec_file: set up for crash dump adding elf core header
- [PATCH v4 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH v4 02/10] resource: add walk_system_ram_res_rev()
- [PATCH v4 08/10] arm64: kexec_file: set up for crash dump adding elf core header
- [PATCH v4 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH v4 02/10] resource: add walk_system_ram_res_rev()
- [PATCH v4 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH v4 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH v4 10/10] arm64: kexec_file: add Image format support
- [PATCH v4 09/10] arm64: enable KEXEC_FILE config
- [PATCH v4 08/10] arm64: kexec_file: set up for crash dump adding elf core header
- [PATCH v4 07/10] arm64: kexec_file: load initrd, device-tree and purgatory segments
- [PATCH v4 06/10] arm64: kexec_file: create purgatory
- [PATCH v4 05/10] asm-generic: add kexec_file_load system call to unistd.h
- [PATCH v4 04/10] kexec_file: factor out crashdump elf header function from x86
- [PATCH v4 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH v4 02/10] resource: add walk_system_ram_res_rev()
- [PATCH v4 01/10] include: pe.h: remove message[] from mz header definition
- [PATCH v4 00/10] arm64: kexec: add kexec_file_load() support
- [PATCH v3 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH v3 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH v3 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH v3 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH v3 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH v3 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH v3 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH v3 10/10] arm64: kexec_file: add Image format support
- [PATCH v3 09/10] arm64: enable KEXEC_FILE config
- [PATCH v3 08/10] arm64: kexec_file: set up for crash dump adding elf core header
- [PATCH v3 07/10] arm64: kexec_file: load initrd, device-tree and purgatory segments
- [PATCH v3 06/10] arm64: kexec_file: create purgatory
- [PATCH v3 05/10] asm-generic: add kexec_file_load system call to unistd.h
- [PATCH v3 04/10] kexec_file: factor out crashdump elf header function from x86
- [PATCH v3 03/10] kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc
- [PATCH v3 02/10] resource: add walk_system_ram_res_rev()
- [PATCH v3 01/10] include: pe.h: remove message[] from mz header definition
- [PATCH v3 00/10] arm64: kexec: add kexec_file_load() support
- [Makedumpfile PATCH v2] book3s/ppc64: Lower the max real address to 53 bits for kernels >= v4.11
- [PATCH 3/9] kexec_file: factor out crashdump elf header function from x86
- [Makedumpfile PATCH v2] book3s/ppc64: Lower the max real address to 53 bits for kernels >= v4.11
- [Makedumpfile PATCH] book3s/ppc64: Lower the max real address to 53 bits for kernels >= v4.11
- [Makedumpfile PATCH] book3s/ppc64: Lower the max real address to 53 bits for kernels >= v4.11
- [PATCH 3/9] kexec_file: factor out crashdump elf header function from x86
- [PATCH 6/9] arm64: kexec_file: load initrd, device-tree and purgatory segments
- [PATCH 8/9] arm64: enable KEXEC_FILE config
- Fwd: zImage support for ppc
- [Makedumpfile PATCH] book3s/ppc64: Lower the max real address to 53 bits for kernels >= v4.11
- [PATCH 6/9] arm64: kexec_file: load initrd, device-tree and purgatory segments
- [PATCH 6/9] arm64: kexec_file: load initrd, device-tree and purgatory segments
- [Makedumpfile PATCH] book3s/ppc64: Lower the max real address to 53 bits for kernels >= v4.11
- [PATCH 8/9] arm64: enable KEXEC_FILE config
- Fwd: zImage support for ppc
- [PATCH 09/14] arm64: kexec_file: add sha256 digest check in purgatory
- From: Thiago Jung Bauermann
- Fwd: zImage support for ppc
- [Makedumpfile PATCH] book3s/ppc64: Lower the max real address to 53 bits for kernels >= v4.11
- [Makedumpfile PATCH] book3s/ppc64: Lower the max real address to 53 bits for kernels >= v4.11
- Fwd: zImage support for ppc
- [PATCH 9/9] arm64: kexec_file: add Image format support
- [PATCH 8/9] arm64: enable KEXEC_FILE config
- [PATCH 7/9] arm64: kexec_file: set up for crash dump adding elf core header
- [PATCH 6/9] arm64: kexec_file: load initrd, device-tree and purgatory segments
- [PATCH 5/9] arm64: kexec_file: create purgatory
- [PATCH 4/9] asm-generic: add kexec_file_load system call to unistd.h
- [PATCH 3/9] kexec_file: factor out crashdump elf header function from x86
- [PATCH 2/9] resource: add walk_system_ram_res_rev()
- [PATCH 1/9] include: pe.h: remove message[] from mz header definition
- [PATCH 0/9] kexec: add kexec_file_load() support
- [PATCH 14/14] arm64: kexec_file: add vmlinux format support
- [PATCH 14/14] arm64: kexec_file: add vmlinux format support
- [PATCH 09/14] arm64: kexec_file: add sha256 digest check in purgatory
- [PATCH 08/14] arm64: kexec_file: create purgatory
- [PATCH 03/14] resource: add walk_system_ram_res_rev()
- [PATCH 05/14] kexec_file: factor out crashdump elf header function from x86
- Fwd: zImage support for ppc
- [PATCH 03/14] resource: add walk_system_ram_res_rev()
- [PATCH 14/14] arm64: kexec_file: add vmlinux format support
- [PATCH] kexec-tools: ppc64: fix leak while checking for coherent device memory
- [PATCH] kexec-tools: ppc64: avoid adding coherent memory regions to crash memory ranges
- [PATCH] kexec-tools: ppc64: fix leak while checking for coherent device memory
- [PATCH 14/14] arm64: kexec_file: add vmlinux format support
- From: Thiago Jung Bauermann
- [PATCH 14/14] arm64: kexec_file: add vmlinux format support
- [PATCH] kexec-tools: ppc64: avoid adding coherent memory regions to crash memory ranges
- [PATCH] kexec-tools: ppc64: avoid adding coherent memory regions to crash memory ranges
- [PATCH 08/14] arm64: kexec_file: create purgatory
- From: Thiago Jung Bauermann
- [PATCH 09/14] arm64: kexec_file: add sha256 digest check in purgatory
- [PATCH 08/14] arm64: kexec_file: create purgatory
- [PATCH 14/14] arm64: kexec_file: add vmlinux format support
- [PATCH 05/14] kexec_file: factor out crashdump elf header function from x86
- [PATCH 14/14] arm64: kexec_file: add vmlinux format support
- [PATCH 13/14] arm64: kexec_file: add Image format support
- [PATCH 10/14] arm64: kexec_file: load initrd, device-tree and purgatory segments
- [PATCH 09/14] arm64: kexec_file: add sha256 digest check in purgatory
- [PATCH 09/14] arm64: kexec_file: add sha256 digest check in purgatory
- [PATCH 08/14] arm64: kexec_file: create purgatory
- [PATCH 08/14] arm64: kexec_file: create purgatory
- [PATCH 03/14] resource: add walk_system_ram_res_rev()
- [PATCH 14/14] arm64: kexec_file: add vmlinux format support
- [PATCH 13/14] arm64: kexec_file: add Image format support
- [PATCH 10/14] arm64: kexec_file: load initrd, device-tree and purgatory segments
- [PATCH 09/14] arm64: kexec_file: add sha256 digest check in purgatory
- [PATCH 08/14] arm64: kexec_file: create purgatory
- [PATCH 07/14] asm-generic: add kexec_file_load system call to unistd.h
- [PATCH 09/14] arm64: kexec_file: add sha256 digest check in purgatory
- [PATCH 08/14] arm64: kexec_file: create purgatory
- [PATCH 03/14] resource: add walk_system_ram_res_rev()
- [PATCH 02/14] include: pe.h: remove message[] from mz header definition
- [PATCH 14/14] arm64: kexec_file: add vmlinux format support
- [PATCH 13/14] arm64: kexec_file: add Image format support
- [PATCH 12/14] arm64: enable KEXEC_FILE config
- [PATCH 11/14] arm64: kexec_file: set up for crash dump adding elf core header
- [PATCH 10/14] arm64: kexec_file: load initrd, device-tree and purgatory segments
- [PATCH 09/14] arm64: kexec_file: add sha256 digest check in purgatory
- [PATCH 08/14] arm64: kexec_file: create purgatory
- [PATCH 07/14] asm-generic: add kexec_file_load system call to unistd.h
- [PATCH 06/14] kexec_file: add kexec_add_segment()
- [PATCH 05/14] kexec_file: factor out crashdump elf header function from x86
- [PATCH 04/14] kexec_file: factor out vmlinux (elf) parser from powerpc
- [PATCH 03/14] resource: add walk_system_ram_res_rev()
- [PATCH 02/14] include: pe.h: remove message[] from mz header definition
- [PATCH 01/14] MODSIGN: Export module signature definitions
- [PATCH 00/14] arm64: kexec: add kexec_file_load support
- [PATCH] arm64: fix an issue with kaslr-enabled vmlinux
- [PATCH v2 0/2] makedumpfile/ppc64: enable mem-usage option
- [PATCH v2 2/2] makedumpfile/ppc64: get the info of mem reserved for crashkernel
- [PATCH v2 1/2] makedumpfile/ppc64: set page_offset in get_versiondep_info_ppc64()
- [PATCH v2 0/2] makedumpfile/ppc64: enable mem-usage option
- [PATCH 2/2] makedumpfile/ppc64: get the info of mem reserved for crashkernel
- [PATCH] kexec-tools: ppc64: avoid adding coherent memory regions to crash memory ranges
- [PATCH] kexec-tools: ppc64: avoid adding coherent memory regions to crash memory ranges
- [Makedumpfile PATCH v2] Fix SECTION_MAP_MASK for kernel >= v.13
- [PATCH v2] makedumpfile: arm64: Fix page table walk of 1GB section
- [PATCH 2/2] makedumpfile/ppc64: get the info of mem reserved for crashkernel
- [Makedumpfile PATCH v2] Fix SECTION_MAP_MASK for kernel >= v.13
- [PATCH v2] makedumpfile: arm64: Fix page table walk of 1GB section
- [PATCH v2] makedumpfile: arm64: Fix page table walk of 1GB section
- [PATCH 2/2] makedumpfile/ppc64: get the info of mem reserved for crashkernel
- [PATCH 1/2] makedumpfile/ppc64: set page_offset in get_versiondep_info_ppc64()
- [PATCH 0/2] makedumpfile/ppc64: enable the mem-usage option on ppc64 platform
- [PATCH] makedumpfile: arm64: Fix page table walk of 1GB section
- [PATCH] makedumpfile: arm64: Fix page table walk of 1GB section
- [Makedumpfile PATCH] Fix SECTION_MAP_MASK for kernel >= v.13
- [Makedumpfile PATCH v2] x86_64: Take care of init_level4_pgt rename in kernel
- [Makedumpfile PATCH] Fix SECTION_MAP_MASK for kernel >= v.13
- [PATCH] kexec-tools: powerpc: fix command line overflow error
- [Makedumpfile PATCH v2] x86_64: Take care of init_level4_pgt rename in kernel
- [V2] kexec_file: use crypto_free_shash to free memory
- [PATCH] kexec-tools: powerpc: fix command line overflow error
- [V2] kexec_file: use crypto_free_shash to free memory
- [PATCH v06 05/36] uapi linux/sysctl.h: use __kernel_size_t instead of size_t
- [PATCH v06 21/36] uapi linux/kexec.h: use __kernel_size_t instead of size_t
- kexec_file: use crypto_free_shash to free memory
- kexec_file: use crypto_free_shash to free memory
- [makedumpfile PATCH] Fix formatting problems in header file
- [makedumpfile PATCH v2] Wipe excluded pages that are written into ELF dump file
- [PATCH v06 21/36] uapi linux/kexec.h: use __kernel_size_t instead of size_t
- [PATCH v06 21/36] uapi linux/kexec.h: use __kernel_size_t instead of size_t
- [PATCH] makedumpfile: arm64: Fix page table walk of 1GB section
- [PATCH] makedumpfile: arm64: Fix page table walk of 1GB section
- [makedumpfile PATCH] Fix formatting problems in header file
- [makedumpfile PATCH] Wipe excluded pages that are written into ELF dump file
- [makedumpfile PATCH] Wipe excluded pages that are written into ELF dump file
- [makedumpfile PATCH v2] Wipe excluded pages that are written into ELF dump file
- [PATCH] kexec-tools: ppc64: fix how RMA top is deduced
- [makedumpfile PATCH] Wipe excluded pages that are written into ELF dump file
- [Makedumpfile PATCH v2] x86_64: Take care of init_level4_pgt rename in kernel
- [Makedumpfile PATCH v2] x86_64: Take care of init_level4_pgt rename in kernel
- [PATCH] makedumpfile: x86: Take care of init_level4_pgt rename in kernel
- [PATCH] makedumpfile: x86: Take care of init_level4_pgt rename in kernel
- [PATCH] makedumpfile: x86: Take care of init_level4_pgt rename in kernel
- [PATCH] makedumpfile: x86: Take care of init_level4_pgt rename in kernel
- [PATCH] makedumpfile: x86: Take care of init_level4_pgt rename in kernel
- [makedumpfile PATCH] Wipe excluded pages that are written into ELF dump file
- [makedumpfile PATCH] Wipe excluded pages that are written into ELF dump file
- [PATCH] makedumpfile: x86: Take care of init_level4_pgt rename in kernel
- [PATCH] makedumpfile: x86: Take care of init_level4_pgt rename in kernel
- [tip:x86/mm] x86/mm, kexec: Fix memory corruption with SME on successive kexecs
- From: tip-bot for Tom Lendacky
- [PATCH v2 1/2] x86/mm, kexec: Fix memory corruption with SME on successive kexecs
- [PATCH v2 0/2] x86: Secure Memory Encryption (SME) fixes 2017-07-26
- [PATCH v1 1/2] x86/mm, kexec: Fix memory corruption with SME on successive kexecs
- [PATCH v1 1/2] x86/mm, kexec: Fix memory corruption with SME on successive kexecs
- [PATCH v1 1/2] x86/mm, kexec: Fix memory corruption with SME on successive kexecs
- [PATCH v1 1/2] x86/mm, kexec: Fix memory corruption with SME on successive kexecs
- makedumpfile-1.6.2: Add support for sparc64
- [PATCH v1 1/2] x86/mm, kexec: Fix memory corruption with SME on successive kexecs
- [PATCH v1 0/2] x86: Secure Memory Encryption (SME) fixes 2017-07-26
- [PATCH] kexec-tools: ppc64: fix how RMA top is deduced
- Guest shutdown problem with kexec --load ... ; kexec --exec running under Xen on CentOS 7 (x86_64)
- Guest shutdown problem with kexec --load ... ; kexec --exec running under Xen on CentOS 7 (x86_64)
- [makedumpfile PATCH RFC v0.1] Implemented the --fill-excluded-pages=<value> feature
- [makedumpfile PATCH RFC v0.1] Implemented the --fill-excluded-pages=<value> feature
- [makedumpfile PATCH RFC v0.1] Implemented the --fill-excluded-pages=<value> feature
- [Makedumpfile Patch v3 2/7] initial(): call cach_init() a bit early
- [Makedumpfile Patch v3 2/7] initial(): call cach_init() a bit early
- [Makedumpfile Patch v3 2/7] initial(): call cach_init() a bit early
- [Makedumpfile Patch v3 2/7] initial(): call cach_init() a bit early
- [makedumpfile PATCH RFC v0.1] Implemented the --fill-excluded-pages=<value> feature
- [PATCH v10 00/38] x86: Secure Memory Encryption (AMD)
- [PATCH v10 00/38] x86: Secure Memory Encryption (AMD)
- [tip:x86/mm] x86/mm, kexec: Allow kexec to be used with SME
- From: tip-bot for Tom Lendacky
- [PATCH v10 31/38] x86/mm, kexec: Allow kexec to be used with SME
- [PATCH v10 00/38] x86: Secure Memory Encryption (AMD)
- [makedumpfile PATCH] fix compiler warnings
- [makedumpfile PATCH] fix compiler warnings
- [makedumpfile PATCH] Allow PFN_EXCLUDED to be tunable via command line option --exclude-threshold
- makedumpfile: support for newer kernels [v4.9 onwards]
- [PATCH v9 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
- [PATCH v9 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
- [PATCH v9 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
- [PATCH v9 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
- [PATCH v9 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
- [PATCH v9 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
- [PATCH v9 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
- [makedumpfile PATCH] Allow PFN_EXCLUDED to be tunable via command line option --exclude-threshold
- [PATCH v9 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
- [PATCH v9 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
- [PATCH v9 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
- [PATCH v9 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
- [PATCH v9 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
- [PATCH v9 00/38] x86: Secure Memory Encryption (AMD)
- [makedumpfile PATCH] Allow PFN_EXCLUDED to be tunable via command line option --exclude-threshold
- [PATCH v9 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
- [PATCH v9 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
- [PATCH v9 00/38] x86: Secure Memory Encryption (AMD)
- [makedumpfile PATCH] Allow PFN_EXCLUDED to be tunable via command line option --exclude-threshold
- [PATCH v9 38/38] x86/mm: Add support to make use of Secure Memory Encryption
- [PATCH v9 37/38] compiler-gcc.h: Introduce __nostackp function attribute
- [PATCH v9 36/38] x86/boot: Add early cmdline parsing for options with arguments
- [PATCH v9 35/38] x86/mm: Add support to encrypt the kernel in-place
- [PATCH v9 34/38] x86/mm: Create native_make_p4d() for PGTABLE_LEVELS <= 4
- [PATCH v9 33/38] x86/mm: Use proper encryption attributes with /dev/mem
- [PATCH v9 32/38] xen/x86: Remove SME feature in PV guests
- [PATCH v9 31/38] x86/mm, kexec: Allow kexec to be used with SME
- [PATCH v9 30/38] kvm: x86: svm: Support Secure Memory Encryption within KVM
- [PATCH v9 29/38] x86, drm, fbdev: Do not specify encrypted memory for video mappings
- [PATCH v9 28/38] x86, realmode: Check for memory encryption on the APs
- [PATCH v9 27/38] iommu/amd: Allow the AMD IOMMU to work with memory encryption
- [PATCH v9 26/38] x86/CPU/AMD: Make the microcode level available earlier in the boot
- [PATCH v9 25/38] swiotlb: Add warnings for use of bounce buffers with SME
- [PATCH v9 24/38] x86, swiotlb: Add memory encryption support
- [PATCH v9 23/38] x86/realmode: Decrypt trampoline area if memory encryption is active
- [PATCH v9 22/38] x86/mm: Add support for changing the memory encryption attribute
- [PATCH v9 21/38] x86/mm: Add support to access persistent memory in the clear
- [PATCH v9 20/38] x86, mpparse: Use memremap to map the mpf and mpc data
- [PATCH v9 19/38] x86/mm: Add support to access boot related data in the clear
- [PATCH v9 18/38] x86/efi: Update EFI pagetable creation to work with SME
- [PATCH v9 17/38] efi: Update efi_mem_type() to return an error rather than 0
- [PATCH v9 16/38] efi: Add an EFI table address match function
- [PATCH v9 15/38] x86/boot/e820: Add support to determine the E820 type of an address
- [PATCH v9 14/38] x86/mm: Insure that boot memory areas are mapped properly
- [PATCH v9 13/38] x86/mm: Add support for early encrypt/decrypt of memory
- [PATCH v9 12/38] x86/mm: Extend early_memremap() support with additional attrs
- [PATCH v9 11/38] x86/mm: Add SME support for read_cr3_pa()
- [PATCH v9 10/38] x86/mm: Provide general kernel support for memory encryption
- [PATCH v9 09/38] x86/mm: Simplify p[g4um]d_page() macros
- [PATCH v9 08/38] x86/mm: Add support to enable SME in early boot processing
- [PATCH v9 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
- [PATCH v9 06/38] x86/mm: Add Secure Memory Encryption (SME) support
- [PATCH v9 05/38] x86/CPU/AMD: Handle SME reduction in physical address size
- [PATCH v9 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
- [PATCH v9 03/38] x86, mpparse, x86/acpi, x86/PCI, x86/dmi, SFI: Use memremap for RAM mappings
- [PATCH v9 02/38] x86/mm/pat: Set write-protect cache mode for full PAT support
- [PATCH v9 01/38] x86: Document AMD Secure Memory Encryption (SME)
- [PATCH v9 00/38] x86: Secure Memory Encryption (AMD)
- [makedumpfile PATCH] Allow PFN_EXCLUDED to be tunable via command line option --exclude-threshold
- [makedumpfile PATCH v3] Prevent data loss in last page of ELF core dumpfile
- makedumpfile: support for newer kernels [v4.9 onwards]
- [makedumpfile PATCH] Allow PFN_EXCLUDED to be tunable via command line option --exclude-threshold
- [makedumpfile PATCH v3] Prevent data loss in last page of ELF core dumpfile
- [makedumpfile PATCH v2] Prevent data loss in last page of ELF core dumpfile
- [makedumpfile PATCH v2] Prevent data loss in last page of ELF core dumpfile
- [Patch v2] vmcore-dmesg: avoid allocating large memory chunk for log buf
- [PATCH] vmcore-dmesg: avoid allocating large memory chunk for log buf
- [makedumpfile PATCH v2] Prevent data loss in last page of ELF core dumpfile
- [makedumpfile PATCH] Prevent data loss in last page of ELF core dumpfile
- [makedumpfile PATCH] Prevent data loss in last page of ELF core dumpfile
- [PATCH] kexec:arm: support zImage with appended device tree
- [PATCH] kexec:arm: support zImage with appended device tree
- [PATCH] kexec:arm: support zImage with appended device tree
- Possible makedumpfile ELF issues
- [makedumpfile PATCH] Prevent data loss in last page of ELF core dumpfile
- [PATCH] kexec:arm: support zImage with appended device tree
- [PATCHv3] kexec-tools:arm: support zImage with appended device tree
- [PATCHv2] kexec-tools:arm: support zImage with appended device tree
- Possible makedumpfile ELF issues
- makedumpfile: support for newer kernels [v4.9 onwards]
- [Makedumpfile PATCH V3] elf_info: fix file_size if segment is excluded
- [PATCH v8 RESEND 27/38] iommu/amd: Allow the AMD IOMMU to work with memory encryption
- [PATCH] vmcore-dmesg: avoid allocating large memory chunk for log buf
- [PATCH] vmcore-dmesg: avoid allocating large memory chunk for log buf
- [Makedumpfile PATCH V3] elf_info: fix file_size if segment is excluded
- [PATCH] vmcore-dmesg: avoid allocating large memory chunk for log buf
- [PATCH v8 RESEND 38/38] x86/mm: Add support to make use of Secure Memory Encryption
- [PATCH v8 RESEND 37/38] compiler-gcc.h: Introduce __nostackp function attribute
- [PATCH v8 RESEND 36/38] x86/boot: Add early cmdline parsing for options with arguments
- [PATCH v8 RESEND 35/38] x86/mm: Add support to encrypt the kernel in-place
- [PATCH v8 RESEND 34/38] x86/mm: Create native_make_p4d() for PGTABLE_LEVELS <= 4
- [PATCH v8 RESEND 33/38] x86/mm: Use proper encryption attributes with /dev/mem
- [PATCH v8 RESEND 32/38] xen/x86: Remove SME feature in PV guests
- [PATCH v8 RESEND 31/38] x86/mm, kexec: Allow kexec to be used with SME
- [PATCH v8 RESEND 30/38] kvm: x86: svm: Support Secure Memory Encryption within KVM
- [PATCH v8 RESEND 29/38] x86, drm, fbdev: Do not specify encrypted memory for video mappings
- [PATCH v8 RESEND 28/38] x86, realmode: Check for memory encryption on the APs
- [PATCH v8 RESEND 27/38] iommu/amd: Allow the AMD IOMMU to work with memory encryption
- [PATCH v8 RESEND 26/38] x86/CPU/AMD: Make the microcode level available earlier in the boot
- [PATCH v8 RESEND 25/38] swiotlb: Add warnings for use of bounce buffers with SME
- [PATCH v8 RESEND 24/38] x86, swiotlb: Add memory encryption support
- [PATCH v8 RESEND 23/38] x86/realmode: Decrypt trampoline area if memory encryption is active
- [PATCH v8 RESEND 22/38] x86/mm: Add support for changing the memory encryption attribute
- [PATCH v8 RESEND 21/38] x86/mm: Add support to access persistent memory in the clear
- [PATCH v8 RESEND 20/38] x86, mpparse: Use memremap to map the mpf and mpc data
- [PATCH v8 RESEND 19/38] x86/mm: Add support to access boot related data in the clear
- [PATCH v8 RESEND 18/38] x86/efi: Update EFI pagetable creation to work with SME
- [PATCH v8 RESEND 17/38] efi: Update efi_mem_type() to return an error rather than 0
- [PATCH v8 RESEND 16/38] efi: Add an EFI table address match function
- [PATCH v8 RESEND 15/38] x86/boot/e820: Add support to determine the E820 type of an address
- [PATCH v8 RESEND 14/38] x86/mm: Insure that boot memory areas are mapped properly
- [PATCH v8 RESEND 13/38] x86/mm: Add support for early encrypt/decrypt of memory
- [PATCH v8 RESEND 12/38] x86/mm: Extend early_memremap() support with additional attrs
- [PATCH v8 RESEND 11/38] x86/mm: Add SME support for read_cr3_pa()
- [PATCH v8 RESEND 10/38] x86/mm: Provide general kernel support for memory encryption
- [PATCH v8 RESEND 09/38] x86/mm: Simplify p[g4um]d_page() macros
- [PATCH v8 RESEND 08/38] x86/mm: Add support to enable SME in early boot processing
- [PATCH v8 RESEND 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
- [PATCH v8 RESEND 06/38] x86/mm: Add Secure Memory Encryption (SME) support
- [PATCH v8 RESEND 05/38] x86/CPU/AMD: Handle SME reduction in physical address size
- [PATCH v8 RESEND 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
- [PATCH v8 RESEND 03/38] x86, mpparse, x86/acpi, x86/PCI, x86/dmi, SFI: Use memremap for RAM mappings
- [PATCH v8 RESEND 02/38] x86/mm/pat: Set write-protect cache mode for full PAT support
- [PATCH v8 RESEND 01/38] x86: Document AMD Secure Memory Encryption (SME)
- [PATCH v8 RESEND 00/38] x86: Secure Memory Encryption (AMD)
- [PATCH v8 30/38] kvm: x86: svm: Support Secure Memory Encryption within KVM
- [PATCH v8 29/38] x86, drm, fbdev: Do not specify encrypted memory for video mappings
- [PATCH v8 28/38] x86, realmode: Check for memory encryption on the APs
- [PATCH v8 27/38] iommu/amd: Allow the AMD IOMMU to work with memory encryption
- [PATCH v8 26/38] x86/CPU/AMD: Make the microcode level available earlier in the boot
- [PATCH v8 25/38] swiotlb: Add warnings for use of bounce buffers with SME
- [PATCH v8 24/38] x86, swiotlb: Add memory encryption support
- [PATCH v8 23/38] x86/realmode: Decrypt trampoline area if memory encryption is active
- [PATCH v8 22/38] x86/mm: Add support for changing the memory encryption attribute
- [PATCH v8 21/38] x86/mm: Add support to access persistent memory in the clear
- [PATCH v8 20/38] x86, mpparse: Use memremap to map the mpf and mpc data
- [PATCH v8 19/38] x86/mm: Add support to access boot related data in the clear
- [PATCH v8 18/38] x86/efi: Update EFI pagetable creation to work with SME
- [PATCH v8 17/38] efi: Update efi_mem_type() to return an error rather than 0
- [PATCH v8 16/38] efi: Add an EFI table address match function
- [PATCH v8 15/38] x86/boot/e820: Add support to determine the E820 type of an address
- [PATCH v8 14/38] x86/mm: Insure that boot memory areas are mapped properly
- [PATCH v8 13/38] x86/mm: Add support for early encrypt/decrypt of memory
- [PATCH v8 12/38] x86/mm: Extend early_memremap() support with additional attrs
- [PATCH v8 11/38] x86/mm: Add SME support for read_cr3_pa()
- [PATCH v8 10/38] x86/mm: Provide general kernel support for memory encryption
- [PATCH v8 09/38] x86/mm: Simplify p[g4um]d_page() macros
- [PATCH v8 08/38] x86/mm: Add support to enable SME in early boot processing
- [PATCH v8 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
- [PATCH v8 06/38] x86/mm: Add Secure Memory Encryption (SME) support
- [PATCH v8 05/38] x86/CPU/AMD: Handle SME reduction in physical address size
- [PATCH v8 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
- [PATCH v8 03/38] x86, mpparse, x86/acpi, x86/PCI, x86/dmi, SFI: Use memremap for RAM mappings
- [PATCH v8 02/38] x86/mm/pat: Set write-protect cache mode for full PAT support
- [PATCH v8 01/38] x86: Document AMD Secure Memory Encryption (SME)
- [PATCH v8 00/38] x86: Secure Memory Encryption (AMD)
- [PATCH] kexec:arm: support zImage with appended device tree
- [PATCH] kexec:arm: support zImage with appended device tree
- [PATCH] kexec:arm: support zImage with appended device tree
- [PATCH] kexec:arm: support zImage with appended device tree
- [PATCH] kexec:arm: support zImage with appended device tree
- [PATCH v7 34/36] x86/mm: Add support to encrypt the kernel in-place
- [PATCH v7 34/36] x86/mm: Add support to encrypt the kernel in-place
- [PATCH] kexec:arm: support zImage with appended device tree
- [PATCH] kexec:arm: support zImage with appended device tree
- [PATCH] kexec:arm: support zImage with appended device tree
- [PATCH v7 34/36] x86/mm: Add support to encrypt the kernel in-place
- [PATCH v7 36/36] x86/mm: Add support to make use of Secure Memory Encryption
- [PATCH v7 35/36] x86/boot: Add early cmdline parsing for options with arguments
- [PATCH v7 34/36] x86/mm: Add support to encrypt the kernel in-place
- [PATCH v7 33/36] x86/mm: Use proper encryption attributes with /dev/mem
- [PATCH v7 32/36] xen/x86: Remove SME feature in PV guests
- [PATCH v7 31/36] x86/mm, kexec: Allow kexec to be used with SME
- [PATCH] kexec:arm: support zImage with appended device tree
- [PATCH v7 27/36] iommu/amd: Allow the AMD IOMMU to work with memory encryption
- [PATCH v7 19/36] x86/mm: Add support to access boot related data in the clear
- [PATCH v7 18/36] x86/efi: Update EFI pagetable creation to work with SME
- [PATCH v7 16/36] efi: Add an EFI table address match function
- [PATCH v7 27/36] iommu/amd: Allow the AMD IOMMU to work with memory encryption
- [PATCH v7 17/36] efi: Update efi_mem_type() to return an error rather than 0
- [PATCH v7 26/36] x86/CPU/AMD: Make the microcode level available earlier in the boot
- [PATCH] s390/crash: Fix KEXEC_NOTE_BYTES definition
- [PATCH v7 08/36] x86/mm: Add support to enable SME in early boot processing
- [PATCH v6 26/34] iommu/amd: Allow the AMD IOMMU to work with memory encryption
- [PATCH v7 08/36] x86/mm: Add support to enable SME in early boot processing
- [PATCH] s390/crash: Fix KEXEC_NOTE_BYTES definition
- [PATCH v6 26/34] iommu/amd: Allow the AMD IOMMU to work with memory encryption
- [PATCH v7 08/36] x86/mm: Add support to enable SME in early boot processing
- [PATCH v7 25/36] swiotlb: Add warnings for use of bounce buffers with SME
- [PATCH v7 08/36] x86/mm: Add support to enable SME in early boot processing
- [PATCH v7 07/36] x86/mm: Don't use phys_to_virt in ioremap() if SME is active
- [PATCH v7 07/36] x86/mm: Don't use phys_to_virt in ioremap() if SME is active
- [PATCH v7 06/36] x86/mm: Add Secure Memory Encryption (SME) support
- [PATCH v7 25/36] swiotlb: Add warnings for use of bounce buffers with SME
- [PATCH v7 24/36] x86, swiotlb: Add memory encryption support
- [PATCH v7 23/36] x86, realmode: Decrypt trampoline area if memory encryption is active
- [PATCH] s390/crash: Fix KEXEC_NOTE_BYTES definition
- [PATCH v7 20/36] x86, mpparse: Use memremap to map the mpf and mpc data
- [PATCH v7 10/36] x86/mm: Provide general kernel support for memory encryption
- [PATCH v7 07/36] x86/mm: Don't use phys_to_virt in ioremap() if SME is active
- [PATCH v7 10/36] x86/mm: Provide general kernel support for memory encryption
- [PATCH v7 08/36] x86/mm: Add support to enable SME in early boot processing
- [PATCH v7 07/36] x86/mm: Don't use phys_to_virt in ioremap() if SME is active
- [PATCH v7 06/36] x86/mm: Add Secure Memory Encryption (SME) support
- [PATCH v7 19/36] x86/mm: Add support to access boot related data in the clear
- [PATCH v7 11/36] x86/mm: Add SME support for read_cr3_pa()
- [PATCH v7 11/36] x86/mm: Add SME support for read_cr3_pa()
- [PATCH v7 08/36] x86/mm: Add support to enable SME in early boot processing
- [PATCH v7 14/36] x86/mm: Insure that boot memory areas are mapped properly
- [PATCH v7 11/36] x86/mm: Add SME support for read_cr3_pa()
- [PATCH v7 08/36] x86/mm: Add support to enable SME in early boot processing
- [PATCH v7 03/36] x86, mpparse, x86/acpi, x86/PCI, x86/dmi, SFI: Use memremap for RAM mappings
- [PATCH] vmcore-dmesg: avoid allocating large memory chunk for log buf
- [PATCH v6 26/34] iommu/amd: Allow the AMD IOMMU to work with memory encryption
- makedumpfile: support for newer kernels [v4.9 onwards]
- [PATCH v7 29/36] x86, drm, fbdev: Do not specify encrypted memory for video mappings
- [PATCH v7 32/36] xen/x86: Remove SME feature in PV guests
- [PATCH v7 36/36] x86/mm: Add support to make use of Secure Memory Encryption
- [PATCH v7 35/36] x86/boot: Add early cmdline parsing for options with arguments
- [PATCH v7 34/36] x86/mm: Add support to encrypt the kernel in-place
- [PATCH v7 33/36] x86/mm: Use proper encryption attributes with /dev/mem
- [PATCH v7 32/36] xen/x86: Remove SME feature in PV guests
- [PATCH v7 31/36] x86/mm, kexec: Allow kexec to be used with SME
- [PATCH v7 30/36] kvm: x86: svm: Support Secure Memory Encryption within KVM
- [PATCH v7 29/36] x86, drm, fbdev: Do not specify encrypted memory for video mappings
- [PATCH v7 28/36] x86, realmode: Check for memory encryption on the APs
- [PATCH v7 27/36] iommu/amd: Allow the AMD IOMMU to work with memory encryption
- [PATCH v7 26/36] x86/CPU/AMD: Make the microcode level available earlier in the boot
- [PATCH v7 25/36] swiotlb: Add warnings for use of bounce buffers with SME
- [PATCH v7 24/36] x86, swiotlb: Add memory encryption support
- [PATCH v7 23/36] x86, realmode: Decrypt trampoline area if memory encryption is active
- [PATCH v7 22/36] x86/mm: Add support for changing the memory encryption attribute
- [PATCH v7 21/36] x86/mm: Add support to access persistent memory in the clear
- [PATCH v7 20/36] x86, mpparse: Use memremap to map the mpf and mpc data
- [PATCH v7 19/36] x86/mm: Add support to access boot related data in the clear
- [PATCH v7 18/36] x86/efi: Update EFI pagetable creation to work with SME
- [PATCH v7 17/36] efi: Update efi_mem_type() to return an error rather than 0
- [PATCH v7 16/36] efi: Add an EFI table address match function
- [PATCH v7 15/36] x86/boot/e820: Add support to determine the E820 type of an address
- [PATCH v7 14/36] x86/mm: Insure that boot memory areas are mapped properly
- [PATCH v7 13/36] x86/mm: Add support for early encrypt/decrypt of memory
- [PATCH v7 12/36] x86/mm: Extend early_memremap() support with additional attrs
- [PATCH v7 11/36] x86/mm: Add SME support for read_cr3_pa()
- [PATCH v7 10/36] x86/mm: Provide general kernel support for memory encryption
- [PATCH v7 09/36] x86/mm: Simplify p[gum]d_page() macros
- [PATCH v7 08/36] x86/mm: Add support to enable SME in early boot processing
- [PATCH v7 07/36] x86/mm: Don't use phys_to_virt in ioremap() if SME is active
- [PATCH v7 06/36] x86/mm: Add Secure Memory Encryption (SME) support
- [PATCH v7 05/36] x86/CPU/AMD: Handle SME reduction in physical address size
- [PATCH v7 04/36] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
- [PATCH v7 03/36] x86, mpparse, x86/acpi, x86/PCI, x86/dmi, SFI: Use memremap for RAM mappings
- [PATCH v7 02/36] x86/mm/pat: Set write-protect cache mode for full PAT support
- [PATCH v7 01/36] x86: Document AMD Secure Memory Encryption (SME)
- [PATCH v7 00/36] x86: Secure Memory Encryption (AMD)
- [ANNOUNCE] kexec-tools 2.0.15
- makedumpfile: support for newer kernels [v4.9 onwards]
- makedumpfile: support for newer kernels [v4.9 onwards]
- [PATCH v6 26/34] iommu/amd: Allow the AMD IOMMU to work with memory encryption
- From: Konrad Rzeszutek Wilk
- [PATCH v6 30/34] x86/mm, kexec: Allow kexec to be used with SME
- [PATCH v6 26/34] iommu/amd: Allow the AMD IOMMU to work with memory encryption
- [PATCH v6 26/34] iommu/amd: Allow the AMD IOMMU to work with memory encryption
- [PATCH v6 26/34] iommu/amd: Allow the AMD IOMMU to work with memory encryption
- [PATCH v6 25/34] swiotlb: Add warnings for use of bounce buffers with SME
- [PATCH v6 30/34] x86/mm, kexec: Allow kexec to be used with SME
- [PATCH v6 29/34] kvm: x86: svm: Support Secure Memory Encryption within KVM
- [PATCH v6 26/34] iommu/amd: Allow the AMD IOMMU to work with memory encryption
- [PATCH v6 25/34] swiotlb: Add warnings for use of bounce buffers with SME
- [makedumpfile PATCH v3 2/2] print_info: show the remaining time of dump progress
- [makedumpfile PATCH v3 2/2] print_info: show the remaining time of dump progress
- [PATCH v6 26/34] iommu/amd: Allow the AMD IOMMU to work with memory encryption
- [PATCH v6 25/34] swiotlb: Add warnings for use of bounce buffers with SME
- [PATCH v6 24/34] x86, swiotlb: Add memory encryption support
- [PATCH v6 26/34] iommu/amd: Allow the AMD IOMMU to work with memory encryption
- [PATCH v6 20/34] x86, mpparse: Use memremap to map the mpf and mpc data
- [PATCH v6 20/34] x86, mpparse: Use memremap to map the mpf and mpc data
- [PATCH v6 25/34] swiotlb: Add warnings for use of bounce buffers with SME
- [PATCH v6 24/34] x86, swiotlb: Add memory encryption support
- [PATCH v6 23/34] x86, realmode: Decrypt trampoline area if memory encryption is active
- [PATCH v6 23/34] x86, realmode: Decrypt trampoline area if memory encryption is active
- [PATCH v6 22/34] x86/mm: Add support for changing the memory encryption attribute
- [PATCH v6 23/34] x86, realmode: Decrypt trampoline area if memory encryption is active
- [PATCH v6 20/34] x86, mpparse: Use memremap to map the mpf and mpc data
- [makedumpfile PATCH v3 2/2] print_info: show the remaining time of dump progress
- [makedumpfile PATCHv3 1/2] fold the calc of time delta into a func
- [makedumpfile PATCHv3 1/2] fold the calc of time delta into a func
- [makedumpfile PATCH v2] Add the --partial-dmesg option to dump only non-cleared dmesg
- [makedumpfile PATCH v2] Add the --partial-dmesg option to dump only non-cleared dmesg
- makedumpfile: support for newer kernels [v4.9 onwards]
- makedumpfile: support for newer kernels [v4.9 onwards]
- makedumpfile: support for newer kernels [v4.9 onwards]
- [makedumpfile PATCHv2 2/2] print_info: show the remaining time of dump progress
- [makedumpfile PATCHv2 2/2] print_info: show the remaining time of dump progress
- [PATCH] Add the --partial-dmesg option to dump only non-cleared dmesg
- [ANNOUNCE] kexec-tools 2.0.15-rc1
- [PATCH] Add the --partial-dmesg option to dump only non-cleared dmesg
- [PATCH v6 14/34] x86/mm: Insure that boot memory areas are mapped properly
- [PATCH] s390/crash: Fix KEXEC_NOTE_BYTES definition
- [PATCH v6 18/34] x86/efi: Update EFI pagetable creation to work with SME
- [PATCH] s390/crash: Fix KEXEC_NOTE_BYTES definition
- [PATCH v6 14/34] x86/mm: Insure that boot memory areas are mapped properly
- [PATCH v6 13/34] x86/mm: Add support for early encrypt/decrypt of memory
- [PATCH v6 09/34] x86/mm: Simplify p[gum]d_page() macros
- [PATCH v6 10/34] x86, x86/mm, x86/xen, olpc: Use __va() against just the physical address in cr3
- [Xen-devel] [PATCH v6 10/34] x86, x86/mm, x86/xen, olpc: Use __va() against just the physical address in cr3
- [Xen-devel] [PATCH v6 10/34] x86, x86/mm, x86/xen, olpc: Use __va() against just the physical address in cr3
- [Xen-devel] [PATCH v6 10/34] x86, x86/mm, x86/xen, olpc: Use __va() against just the physical address in cr3
- [PATCH v6 10/34] x86, x86/mm, x86/xen, olpc: Use __va() against just the physical address in cr3
- [Xen-devel] [PATCH v6 10/34] x86, x86/mm, x86/xen, olpc: Use __va() against just the physical address in cr3
- [Xen-devel] [PATCH v6 10/34] x86, x86/mm, x86/xen, olpc: Use __va() against just the physical address in cr3
- [PATCH v6 06/34] x86/mm: Add Secure Memory Encryption (SME) support
[Index of Archives]
[LM Sensors]
[Linux Sound]
[ALSA Users]
[ALSA Devel]
[Linux Audio Users]
[Linux Media]
[Kernel]
[Gimp]
[Yosemite News]
[Linux Media]