Linux Arch
[Prev Page][Next Page]
- [PATCH] include/asm-generic/topology.h: remove dead code cpumask_of_node macro
- From: sunying@xxxxxxxxxxxxxx
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- Re: [PATCH 0/4] ppc, fbdev: Clean up fbdev mmap helper
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 0/4] ppc, fbdev: Clean up fbdev mmap helper
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH v6 26/38] sparc64: Implement the new page table range API
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v6 26/38] sparc64: Implement the new page table range API
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 26/38] sparc64: Implement the new page table range API
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH 4/4] fbdev: Replace fb_pgprotect() with fb_pgprot_device()
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- RE: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v7 1/4] scm: add SO_PASSPIDFD and SCM_PIDFD
- From: Aleksandr Mikhalitsyn <aleksandr.mikhalitsyn@xxxxxxxxxxxxx>
- Re: [PATCH net-next v7 1/4] scm: add SO_PASSPIDFD and SCM_PIDFD
- From: Kuniyuki Iwashima <kuniyu@xxxxxxxxxx>
- Re: [PATCH net-next v7 1/4] scm: add SO_PASSPIDFD and SCM_PIDFD
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH net-next v7 1/4] scm: add SO_PASSPIDFD and SCM_PIDFD
- From: Kuniyuki Iwashima <kuniyu@xxxxxxxxxx>
- Re: [PATCH net-next v7 1/4] scm: add SO_PASSPIDFD and SCM_PIDFD
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH v6 22/38] riscv: Implement the new page table range API
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- Re: [GIT PULL] csky 2nd changes for v6.6
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- [PATCH 4/4] fbdev: Replace fb_pgprotect() with fb_pgprot_device()
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 3/4] arch/powerpc: Call internal __phys_mem_access_prot() in fbdev code
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 2/4] arch/powerpc: Remove file parameter from phys_mem_access_prot code
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 0/4] ppc, fbdev: Clean up fbdev mmap helper
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- [PATCH 1/4] arch/powerpc: Remove trailing whitespaces
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- RE: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: Framebuffer mmap on PowerPC
- From: Thomas Zimmermann <tzimmermann@xxxxxxxx>
- Re: Framebuffer mmap on PowerPC
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [GIT PULL] csky 2nd changes for v6.6
- Re: Framebuffer mmap on PowerPC
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: Framebuffer mmap on PowerPC
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Framebuffer mmap on PowerPC
- From: Thomas Zimmermann <tzimmermann@xxxxxxxx>
- Re: [PATCH v5 00/12] GenieZone hypervisor drivers
- From: Yi-De Wu (吳一德) <Yi-De.Wu@xxxxxxxxxxxx>
- Re: [PATCH v5 04/12] virt: geniezone: Add vcpu support
- From: Yi-De Wu (吳一德) <Yi-De.Wu@xxxxxxxxxxxx>
- Re: [PATCH 1/9] ARM: Remove <asm/ide.h>
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 02/32] ACPI: Move ACPI_HOTPLUG_CPU to be enabled per architecture
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 03/36] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v2] riscv: support PREEMPT_DYNAMIC with static keys
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- [PATCH] csky: Fixup compile error
- Re: [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v2] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- Re: [PATCH] csky: Fixup -Wmissing-prototypes warning
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH] csky: Fixup -Wmissing-prototypes warning
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v4 03/36] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Szabolcs Nagy <Szabolcs.Nagy@xxxxxxx>
- Re: [PATCH] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- Re: [PATCH] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- Re: [GIT PULL] csky changes for v6.6
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [GIT PULL] csky changes for v6.6
- Re: [PATCH v2 10/15] x86: hyperv: Add mshv_handler irq handler and setup function
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH V2] asm-generic: ticket-lock: Optimize arch_spin_value_unlocked
- From: Guo Ren <guoren@xxxxxxxxxx>
- [PATCH V2] LoongArch: Remove shm_align_mask and use SHMLBA instead
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [PATCH] LoongArch: Remove shm_align_mask and use SHMLBA instead
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- Re: [PATCH] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- Re: [PATCH] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] x86: bring back rep movsq for user access on CPUs without ERMS
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- Re: [PATCH] LoongArch: Remove shm_align_mask and use SHMLBA instead
- From: WANG Xuerui <kernel@xxxxxxxxxx>
- [PATCH] LoongArch: Remove shm_align_mask and use SHMLBA instead
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [PATCH v5] mips: add <asm-generic/io.h> including
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [GIT PULL] LoongArch fixes for v6.5-final
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] LoongArch fixes for v6.5-final
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [PATCH] LoongArch: Ensure FP/SIMD registers in the core dump file is up to date
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH] LoongArch: Ensure FP/SIMD registers in the core dump file is up to date
- From: WANG Xuerui <kernel@xxxxxxxxxx>
- Re: [PATCH v2 15/15] Drivers: hv: Add modules to expose /dev/mshv to VMMs running on Hyper-V
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH v2 15/15] Drivers: hv: Add modules to expose /dev/mshv to VMMs running on Hyper-V
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 15/15] Drivers: hv: Add modules to expose /dev/mshv to VMMs running on Hyper-V
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 13/15] uapi: hyperv: Add mshv driver headers hvhdk.h, hvhdk_mini.h, hvgdk.h, hvgdk_mini.h
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- [PATCH] LoongArch: Ensure FP/SIMD registers in the core dump file is up to date
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [PATCH 7/7] asm-generic/io.h: Expect immutable pointer in virt_to_phys
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH v3 00/10] Support TDX guests on Hyper-V (the Hyper-V specific part)
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v2 15/15] Drivers: hv: Add modules to expose /dev/mshv to VMMs running on Hyper-V
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH v4 03/36] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v4 03/36] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH RFC 00/37] Add support for arm64 MTE dynamic tag storage reuse
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v3 10/10] x86/hyperv: Move the code in ivm.c around to avoid unnecessary ifdef's
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v3 09/10] x86/hyperv: Remove hv_isolation_type_en_snp
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v3 08/10] x86/hyperv: Use TDX GHCI to access some MSRs in a TDX VM with the paravisor
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v3 06/10] x86/hyperv: Introduce a global variable hyperv_paravisor_present
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v3 07/10] Drivers: hv: vmbus: Bring the post_msg_page back for TDX VMs with the paravisor
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- RE: [PATCH v3 10/10] x86/hyperv: Move the code in ivm.c around to avoid unnecessary ifdef's
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v3 09/10] x86/hyperv: Remove hv_isolation_type_en_snp
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v3 08/10] x86/hyperv: Use TDX GHCI to access some MSRs in a TDX VM with the paravisor
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v3 07/10] Drivers: hv: vmbus: Bring the post_msg_page back for TDX VMs with the paravisor
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v3 06/10] x86/hyperv: Introduce a global variable hyperv_paravisor_present
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH RFC 00/37] Add support for arm64 MTE dynamic tag storage reuse
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RFC 00/37] Add support for arm64 MTE dynamic tag storage reuse
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RFC 00/37] Add support for arm64 MTE dynamic tag storage reuse
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [RFC PATCH v1 1/1] tracing/kprobes: Return ENAMESVRLSYMS when func matches several symbols
- From: Francis Laniel <flaniel@xxxxxxxxxxxxxxxxxxx>
- [PATCH v3 10/10] x86/hyperv: Move the code in ivm.c around to avoid unnecessary ifdef's
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v3 09/10] x86/hyperv: Remove hv_isolation_type_en_snp
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v3 04/10] x86/hyperv: Fix serial console interrupts for fully enlightened TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v3 08/10] x86/hyperv: Use TDX GHCI to access some MSRs in a TDX VM with the paravisor
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v3 07/10] Drivers: hv: vmbus: Bring the post_msg_page back for TDX VMs with the paravisor
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v3 05/10] Drivers: hv: vmbus: Support >64 VPs for a fully enlightened TDX/SNP VM
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v3 06/10] x86/hyperv: Introduce a global variable hyperv_paravisor_present
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v3 03/10] Drivers: hv: vmbus: Support fully enlightened TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v3 02/10] x86/hyperv: Support hypercalls for fully enlightened TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v3 01/10] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v3 00/10] Support TDX guests on Hyper-V (the Hyper-V specific part)
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH RFC 00/37] Add support for arm64 MTE dynamic tag storage reuse
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v5] mips: add <asm-generic/io.h> including
- From: Jiaxun Yang <jiaxun.yang@xxxxxxxxxxx>
- Re: [RFC PATCH v1 1/1] tracing/kprobes: Return ENAMESVRLSYMS when func matches several symbols
- From: Masami Hiramatsu (Google) <mhiramat@xxxxxxxxxx>
- Re: [PATCH treewide 0/9] Remove obsolete IDE headers
- From: Damien Le Moal <dlemoal@xxxxxxxxxx>
- Re: [PATCH v4 03/36] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v4 03/36] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Szabolcs Nagy <Szabolcs.Nagy@xxxxxxx>
- RE: [PATCH 2/9] x86/hyperv: Support hypercalls for fully enlightened TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v4 03/36] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v4 03/36] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [RFC PATCH v1 1/1] tracing/kprobes: Return ENAMESVRLSYMS when func matches several symbols
- From: Francis Laniel <flaniel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 03/36] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH RFC 21/37] mm: khugepaged: Handle metadata-enabled VMAs
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 27/37] arm64: mte: Reserve tag block for the zero page
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 16/37] arm64: mte: Move tag storage to MIGRATE_MOVABLE when MTE is disabled
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 25/37] arm64: mte: Manage tag storage on page allocation
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 24/37] mm: page_alloc: Teach alloc_contig_range() about MIGRATE_METADATA
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 22/37] mm: shmem: Allocate metadata storage for in-memory filesystems
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 37/37] arm64: mte: Enable tag storage management
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 26/37] arm64: mte: Perform CMOs for tag blocks on tagged page allocation/free
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 23/37] mm: Teach vma_alloc_folio() about metadata-enabled VMAs
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 28/37] mm: sched: Introduce PF_MEMALLOC_ISOLATE
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 35/37] mm: hugepage: Handle PAGE_METADATA_NONE faults for huge pages
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 20/37] mm: compaction: Reserve metadata storage in compaction_alloc()
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 34/37] arm64: mte: Handle fatal signal in reserve_metadata_storage()
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 36/37] KVM: arm64: Disable MTE is tag storage is enabled
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 33/37] arm64: mte: swap/copypage: Handle tag restoring when missing tag storage
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 32/37] mm: Call arch_swap_prepare_to_restore() before arch_swap_restore()
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 31/37] mm: arm64: Set PAGE_METADATA_NONE in set_pte_at() if missing metadata storage
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 19/37] mm: page_alloc: Manage metadata storage on page allocation
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 30/37] mm: mprotect: arm64: Set PAGE_METADATA_NONE for mprotect(PROT_MTE)
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 29/37] mm: arm64: Define the PAGE_METADATA_NONE page protection
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 17/37] arm64: mte: Disable dynamic tag storage management if HW KASAN is enabled
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 18/37] arm64: mte: Check that tag storage blocks are in the same zone
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 15/37] arm64: mte: Make tag storage depend on ARCH_KEEP_MEMBLOCK
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 14/37] arm64: mte: Expose tag storage pages to the MIGRATE_METADATA freelist
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 13/37] arm64: mte: Reserve tag storage memory
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 12/37] mm: gup: Don't allow longterm pinning of MIGRATE_METADATA pages
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 11/37] mm: migrate/mempolicy: Allocate metadata-enabled destination page
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 10/37] mm: compaction: Do not use MIGRATE_METADATA to replace pages with metadata
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 09/37] mm: compaction: Handle metadata pages as source for direct compaction
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 08/37] mm: compaction: Account for free metadata pages in __compact_finished()
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 07/37] mm: page_alloc: Bypass pcp when freeing MIGRATE_METADATA pages
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 06/37] mm: page_alloc: Allocate from movable pcp lists only if ALLOC_FROM_METADATA
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 05/37] mm: Add memory statistics for the MIGRATE_METADATA allocation policy
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 04/37] mm: Add MIGRATE_METADATA allocation policy
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 03/37] arm64: mte: Rename __GFP_ZEROTAGS to __GFP_TAGGED
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 02/37] arm64: mte: Rework naming for tag manipulation functions
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 01/37] mm: page_alloc: Rename gfp_to_alloc_flags_cma -> gfp_to_alloc_flags_fast
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- [PATCH RFC 00/37] Add support for arm64 MTE dynamic tag storage reuse
- From: Alexandru Elisei <alexandru.elisei@xxxxxxx>
- Re: [PATCH v4 03/36] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v4 03/36] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 1/3] powerpc: remove unneeded #include <asm/export.h>
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [PATCH v4 03/36] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Szabolcs Nagy <Szabolcs.Nagy@xxxxxxx>
- Re: [PATCH 5/9] Drivers: hv: vmbus: Support >64 VPs for a fully enlightened TDX/SNP VM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH 4/9] x86/hyperv: Fix serial console interrupts for fully enlightened TDX guests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- RE: [PATCH v2 15/15] Drivers: hv: Add modules to expose /dev/mshv to VMMs running on Hyper-V
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxx>
- Re: [PATCH 2/9] x86/hyperv: Support hypercalls for fully enlightened TDX guests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- RE: [PATCH v2 8/9] x86/hyperv: Use TDX GHCI to access some MSRs in a TDX VM with the paravisor
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH v2 6/9] x86/hyperv: Introduce a global variable hyperv_paravisor_present
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH v2 6/9] x86/hyperv: Introduce a global variable hyperv_paravisor_present
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH v7 0/8] x86/hyperv: Add AMD sev-snp enlightened guest support on hyperv
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v2 15/15] Drivers: hv: Add modules to expose /dev/mshv to VMMs running on Hyper-V
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 15/15] Drivers: hv: Add modules to expose /dev/mshv to VMMs running on Hyper-V
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/8] x86/hyperv: Add AMD sev-snp enlightened guest support on hyperv
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v5 11/37] mm: Define VM_SHADOW_STACK for arm64 when we support GCS
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v4 03/36] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v4 21/36] arm64/mm: Implement map_shadow_stack()
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v4 18/36] arm64/gcs: Context switch GCS state for EL0
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v4 03/36] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v5 11/37] mm: Define VM_SHADOW_STACK for arm64 when we support GCS
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v4 21/36] arm64/mm: Implement map_shadow_stack()
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v4 18/36] arm64/gcs: Context switch GCS state for EL0
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v5 11/37] mm: Define VM_SHADOW_STACK for arm64 when we support GCS
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v5 11/37] mm: Define VM_SHADOW_STACK for arm64 when we support GCS
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH] LoongArch: Fix hw_breakpoint_control() for watchpoints
- From: Huacai Chen <chenhuacai@xxxxxxxxxxx>
- Re: [PATCH v5 04/37] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Szabolcs Nagy <Szabolcs.Nagy@xxxxxxx>
- [PATCH v5 23/37] arm64/signal: Set up and restore the GCS context for signal handlers
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 28/37] kselftest/arm64: Add GCS as a detected feature in the signal tests
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 1/9] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v5 29/37] kselftest/arm64: Add framework support for GCS to signal handling tests
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 31/37] kselftest/arm64: Always run signals tests with GCS enabled
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 35/37] selftests/arm64: Add GCS signal tests
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 34/37] kselftest/arm64: Add test coverage for GCS mode locking
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 36/37] kselftest/arm64: Add a GCS stress test
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 37/37] kselftest/arm64: Enable GCS for the FP stress tests
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 33/37] kselftest/arm64: Add a GCS test program built with the system libc
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 32/37] kselftest/arm64: Add very basic GCS test program
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 30/37] kselftest/arm64: Allow signals tests to specify an expected si_code
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 21/37] arm64/gcs: Implement shadow stack prctl() interface
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 25/37] arm64/ptrace: Expose GCS via ptrace and core files
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 18/37] arm64/mm: Handle GCS data aborts
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 27/37] kselftest/arm64: Verify the GCS hwcap
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 24/37] arm64/signal: Expose GCS state in signal frames
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 26/37] arm64: Add Kconfig for Guarded Control Stack (GCS)
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 22/37] arm64/mm: Implement map_shadow_stack()
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 20/37] arm64/gcs: Allocate a new GCS for threads with GCS enabled
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 16/37] arm64/hwcap: Add hwcap for GCS
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 19/37] arm64/gcs: Context switch GCS state for EL0
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 17/37] arm64/traps: Handle GCS exceptions
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 15/37] arm64/idreg: Add overrride for GCS
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 14/37] arm64/gcs: Allow GCS usage at EL0 and EL1
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 13/37] KVM: arm64: Manage GCS registers for guests
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 12/37] arm64/mm: Map pages for guarded control stack
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 11/37] mm: Define VM_SHADOW_STACK for arm64 when we support GCS
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 10/37] arm64/mm: Allocate PIE slots for EL0 guarded control stack
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 09/37] arm64/cpufeature: Runtime detection of Guarded Control Stack (GCS)
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 08/37] arm64/gcs: Provide copy_to_user_gcs()
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 07/37] arm64/gcs: Add manual encodings of GCS instructions
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 06/37] arm64/sysreg: Add definitions for architected GCS caps
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 05/37] arm64/sysreg: Add new system registers for GCS
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 04/37] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 03/37] arm64: Document boot requirements for Guarded Control Stacks
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 02/37] prctl: arch-agnostic prctl for shadow stack
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 01/37] arm64/mm: Restructure arch_validate_flags() for extensibility
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v5 00/37] arm64/gcs: Provide support for GCS in userspace
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v1] docs/zh_CN: add zh_CN translation for memory-barriers.txt
- From: Yanteng Si <siyanteng@xxxxxxxxxxx>
- Re: [PATCH 1/9] ARM: Remove <asm/ide.h>
- From: Damien Le Moal <dlemoal@xxxxxxxxxx>
- Re: [PATCH v7 0/8] x86/hyperv: Add AMD sev-snp enlightened guest support on hyperv
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- RE: [PATCH v2 6/9] x86/hyperv: Introduce a global variable hyperv_paravisor_present
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 8/9] x86/hyperv: Use TDX GHCI to access some MSRs in a TDX VM with the paravisor
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 5/9] extrawarn: enable format and stringop overflow warnings in W=1
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- RE: [PATCH v2 15/15] Drivers: hv: Add modules to expose /dev/mshv to VMMs running on Hyper-V
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxx>
- RE: [PATCH v2 5/9] Drivers: hv: vmbus: Support >64 VPs for a fully enlightened TDX/SNP VM
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH v2 5/9] Drivers: hv: vmbus: Support >64 VPs for a fully enlightened TDX/SNP VM
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v1] docs/zh_CN: add zh_CN translation for memory-barriers.txt
- From: Leo Yan <leo.yan@xxxxxxxxxx>
- Re: [PATCH v1] docs/zh_CN: add zh_CN translation for memory-barriers.txt
- From: Gang Li <gang.li@xxxxxxxxx>
- [PATCH v2 9/9] x86/hyperv: Remove hv_isolation_type_en_snp
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 6/9] x86/hyperv: Introduce a global variable hyperv_paravisor_present
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 2/9] x86/hyperv: Support hypercalls for fully enlightened TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 5/9] Drivers: hv: vmbus: Support >64 VPs for a fully enlightened TDX/SNP VM
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 3/9] Drivers: hv: vmbus: Support fully enlightened TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 8/9] x86/hyperv: Use TDX GHCI to access some MSRs in a TDX VM with the paravisor
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 7/9] Drivers: hv: vmbus: Bring the post_msg_page back for TDX VMs with the paravisor
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 4/9] x86/hyperv: Fix serial console interrupts for fully enlightened TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 1/9] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH v2 0/9] Support TDX guests on Hyper-V (the Hyper-V specific part)
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH v7 5/8] x86/hyperv: Use vmmcall to implement Hyper-V hypercall in sev-snp enlightened guest
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v1] docs/zh_CN: add zh_CN translation for memory-barriers.txt
- From: Leo Yan <leo.yan@xxxxxxxxxx>
- Re: [PATCH 2/6] sparc: remove <asm/export.h>
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH 1/6] sparc: replace #include <asm/export.h> with #include <linux/export.h>
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- RE: [PATCH v2 15/15] Drivers: hv: Add modules to expose /dev/mshv to VMMs running on Hyper-V
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxx>
- Re: [PATCH 3/9] Kbuild: avoid duplicate warning options
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 5/9] extrawarn: enable format and stringop overflow warnings in W=1
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 2/9] Kbuild: consolidate warning flags in scripts/Makefile.extrawarn
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 6/9] extrawarn: move -Wrestrict into W=1 warnings
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 1/2] asm-generic: current: Don't include thread-info.h if building asm
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH 6/6] alpha: remove <asm/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 1/6] sparc: replace #include <asm/export.h> with #include <linux/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 5/6] alpha: replace #include <asm/export.h> with #include <linux/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 2/6] sparc: remove <asm/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 4/6] ia64: remove <asm/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 1/2] asm-generic: current: Don't include thread-info.h if building asm
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH 3/6] ia64: replace #include <asm/export.h> with #include <linux/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v1] docs/zh_CN: add zh_CN translation for memory-barriers.txt
- From: Leo Yan <leo.yan@xxxxxxxxxx>
- Re: [PATCH v2 13/15] uapi: hyperv: Add mshv driver headers hvhdk.h, hvhdk_mini.h, hvgdk.h, hvgdk_mini.h
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] treewide: drop CONFIG_EMBEDDED
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH] treewide: drop CONFIG_EMBEDDED
- From: Jesse T <mr.bossman075@xxxxxxxxx>
- Re: [PATCH] treewide: drop CONFIG_EMBEDDED
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v2 14/15] asm-generic: hyperv: Use mshv headers conditionally. Add asm-generic/hyperv-defs.h
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v2 08/15] Drivers: hv: Introduce per-cpu event ring tail
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v2 12/15] Documentation: Reserve ioctl number for mshv driver
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v2 09/15] Drivers: hv: Introduce hv_output_arg_exists in hv_common.c
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v2 06/15] hyperv-tlfs: Introduce hv_status_to_string and hv_status_to_errno
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v2 05/15] hyperv: Move hv_connection_id to hyperv-tlfs
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH v1 1/1] asm-generic: Fix spelling of architecture
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v4 19/36] arm64/gcs: Allocate a new GCS for threads with GCS enabled
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v4 03/36] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v2 15/15] Drivers: hv: Add modules to expose /dev/mshv to VMMs running on Hyper-V
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/15] hyperv-tlfs: Change shared HV_REGISTER_* defines to HV_MSR_*
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [GIT PULL] asm-generic: regression fix for 6.5
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v4 03/36] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v4 21/36] arm64/mm: Implement map_shadow_stack()
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v1 1/1] asm-generic: Fix spelling of architecture
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [06/12] arch: Declare screen_info in <asm/screen_info.h>
- From: suijingfeng <suijingfeng@xxxxxxxxxxx>
- Re: [PATCH 1/9] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [06/12] arch: Declare screen_info in <asm/screen_info.h>
- From: suijingfeng <suijingfeng@xxxxxxxxxxx>
- RE: [PATCH v2 15/15] Drivers: hv: Add modules to expose /dev/mshv to VMMs running on Hyper-V
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxx>
- [PATCH v7 8/8] x86/hyperv: Add hyperv-specific handling for VMMCALL under SEV-ES
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v7 7/8] x86/hyperv: Add smp support for SEV-SNP guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v7 1/8] x86/hyperv: Add sev-snp enlightened guest static key
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v7 2/8] x86/hyperv: Set Virtual Trust Level in VMBus init message
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v7 6/8] clocksource: hyper-v: Mark hyperv tsc page unencrypted in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v7 5/8] x86/hyperv: Use vmmcall to implement Hyper-V hypercall in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v7 3/8] x86/hyperv: Mark Hyper-V vp assist page unencrypted in SEV-SNP enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v7 4/8] drivers: hv: Mark percpu hvcall input arg page unencrypted in SEV-SNP enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v7 0/8] x86/hyperv: Add AMD sev-snp enlightened guest support on hyperv
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH 3/9] powerpc: Remove <asm/ide.h>
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [GIT PULL] asm-generic: regression fix for 6.5
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v2 03/15] mshyperv: Introduce numa_node_to_proximity_domain_info
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 03/15] mshyperv: Introduce numa_node_to_proximity_domain_info
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/15] mshyperv: Introduce hv_get_hypervisor_version function
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 03/15] mshyperv: Introduce numa_node_to_proximity_domain_info
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 02/15] mshyperv: Introduce hv_get_hypervisor_version function
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 13/15] uapi: hyperv: Add mshv driver headers hvhdk.h, hvhdk_mini.h, hvgdk.h, hvgdk_mini.h
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- [PATCH v2 13/15] uapi: hyperv: Add mshv driver headers hvhdk.h, hvhdk_mini.h, hvgdk.h, hvgdk_mini.h
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 07/15] Drivers: hv: Move hv_call_deposit_pages and hv_call_create_vp to common code
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 11/15] Drivers: hv: export vmbus_isr, hv_context and hv_post_message
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 12/15] Documentation: Reserve ioctl number for mshv driver
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 14/15] asm-generic: hyperv: Use mshv headers conditionally. Add asm-generic/hyperv-defs.h
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 09/15] Drivers: hv: Introduce hv_output_arg_exists in hv_common.c
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 06/15] hyperv-tlfs: Introduce hv_status_to_string and hv_status_to_errno
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 01/15] hyperv-tlfs: Change shared HV_REGISTER_* defines to HV_MSR_*
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 10/15] x86: hyperv: Add mshv_handler irq handler and setup function
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 08/15] Drivers: hv: Introduce per-cpu event ring tail
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 03/15] mshyperv: Introduce numa_node_to_proximity_domain_info
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 02/15] mshyperv: Introduce hv_get_hypervisor_version function
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 04/15] asm-generic/mshyperv: Introduce hv_recommend_using_aeoi()
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 00/15] Introduce /dev/mshv drivers
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 05/15] hyperv: Move hv_connection_id to hyperv-tlfs
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/9] ata: pata_gayle: Remove #include <asm/ide.h>
- From: Sergey Shtylyov <s.shtylyov@xxxxxx>
- Re: [PATCH 7/9] ata: pata_falcon: Remove #include <asm/ide.h>
- From: Sergey Shtylyov <s.shtylyov@xxxxxx>
- Re: [PATCH 6/9] ata: pata_buddha: Remove #include <asm/ide.h>
- From: Sergey Shtylyov <s.shtylyov@xxxxxx>
- Re: [PATCH 5/9] asm-generic: Remove ide_iops.h
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 2/9] parisc: Remove <asm/ide.h>
- From: Helge Deller <deller@xxxxxx>
- Re: [PATCH 15/15] Drivers: hv: Add modules to expose /dev/mshv to VMMs running on Hyper-V
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 14/15] asm-generic: hyperv: Use mshv headers conditionally. Add asm-generic/hyperv-defs.h
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/9] sparc: Remove <asm/ide.h>
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- [PATCH 9/9] m68k: Remove <asm/ide.h>
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH 8/9] ata: pata_gayle: Remove #include <asm/ide.h>
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH 4/9] sparc: Remove <asm/ide.h>
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH 6/9] ata: pata_buddha: Remove #include <asm/ide.h>
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH 2/9] parisc: Remove <asm/ide.h>
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH 5/9] asm-generic: Remove ide_iops.h
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH treewide 0/9] Remove obsolete IDE headers
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH 3/9] powerpc: Remove <asm/ide.h>
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH 1/9] ARM: Remove <asm/ide.h>
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH 7/9] ata: pata_falcon: Remove #include <asm/ide.h>
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH V2 0/2] riscv: stack: Fixup independent softirq/irq stack for CONFIG_FRAME_POINTER=n
- From: patchwork-bot+linux-riscv@xxxxxxxxxx
- Re: [PATCH v5 00/12] GenieZone hypervisor drivers
- From: Yi-De Wu (吳一德) <Yi-De.Wu@xxxxxxxxxxxx>
- Re: [PATCH] treewide: drop CONFIG_EMBEDDED
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH] treewide: drop CONFIG_EMBEDDED
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH RESEND v1] docs/zh_CN: add zh_CN translation for memory-barriers.txt
- From: Gang Li <gang.li@xxxxxxxxx>
- Re: [PATCH] treewide: drop CONFIG_EMBEDDED
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] treewide: drop CONFIG_EMBEDDED
- From: Jesse Taube <mr.bossman075@xxxxxxxxx>
- Re: [PATCH] treewide: drop CONFIG_EMBEDDED
- From: Greg Ungerer <gerg@xxxxxxxxxxxxxx>
- Re: [PATCH 09/15] Drivers: hv: Introduce hv_output_arg_exists in hv_common
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v6 8/8] x86/hyperv: Add hyperv-specific handling for VMMCALL under SEV-ES
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH v6 7/8] x86/hyperv: Add smp support for SEV-SNP guest
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH 08/15] Drivers: hv: Introduce per-cpu event ring tail
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v6 5/8] x86/hyperv: Use vmmcall to implement Hyper-V hypercall in sev-snp enlightened guest
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH v6 6/8] clocksource: hyper-v: Mark hyperv tsc page unencrypted in sev-snp enlightened guest
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH v6 5/8] x86/hyperv: Use vmmcall to implement Hyper-V hypercall in sev-snp enlightened guest
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH v6 4/8] drivers: hv: Mark percpu hvcall input arg page unencrypted in SEV-SNP enlightened guest
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH v6 3/8] x86/hyperv: Mark Hyper-V vp assist page unencrypted in SEV-SNP enlightened guest
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH v6 2/8] x86/hyperv: Set Virtual Trust Level in VMBus init message
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH v6 1/8] x86/hyperv: Add sev-snp enlightened guest static key
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v4 07/36] arm64/gcs: Provide copy_to_user_gcs()
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v4 18/36] arm64/gcs: Context switch GCS state for EL0
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v6 7/8] x86/hyperv: Add smp support for SEV-SNP guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v6 8/8] x86/hyperv: Add hyperv-specific handling for VMMCALL under SEV-ES
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v6 6/8] clocksource: hyper-v: Mark hyperv tsc page unencrypted in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v6 5/8] x86/hyperv: Use vmmcall to implement Hyper-V hypercall in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v6 4/8] drivers: hv: Mark percpu hvcall input arg page unencrypted in SEV-SNP enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v6 3/8] x86/hyperv: Mark Hyper-V vp assist page unencrypted in SEV-SNP enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v6 0/8] x86/hyperv: Add AMD sev-snp enlightened guest support on hyperv
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v6 2/8] x86/hyperv: Set Virtual Trust Level in VMBus init message
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v6 1/8] x86/hyperv: Add sev-snp enlightened guest static key
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH 2/2] m68k: remove <asm/export.h>
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 1/2] m68k: replace #include <asm/export.h> with #include <linux/export.h>
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] treewide: drop CONFIG_EMBEDDED
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [RFC] Bridging the gap between the Linux Kernel Memory Consistency Model (LKMM) and C11/C++11 atomics
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH] treewide: drop CONFIG_EMBEDDED
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH] treewide: drop CONFIG_EMBEDDED
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH] treewide: drop CONFIG_EMBEDDED
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- RE: [PATCH 9/9] x86/hyperv: Remove hv_isolation_type_en_snp
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v4 17/36] arm64/mm: Handle GCS data aborts
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v4 09/36] arm64/mm: Allocate PIE slots for EL0 guarded control stack
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 05/15] hyperv: Move hv_connection_id to hyperv-tlfs
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/15] mshyperv: Introduce hv_get_hypervisor_version
- From: Nuno Das Neves <nunodasneves@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 21/36] arm64/mm: Implement map_shadow_stack()
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v4 21/36] arm64/mm: Implement map_shadow_stack()
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v5 04/12] virt: geniezone: Add vcpu support
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 1/3] mips: remove unneeded #include <asm/export.h>
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] mips: remove <asm/export.h>
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] mips: replace #include <asm/export.h> with #include <linux/export.h>
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND v1] docs/zh_CN: add zh_CN translation for memory-barriers.txt
- From: Gang Li <gang.li@xxxxxxxxx>
- Re: [PATCH 9/9] [RFC] extrawarn: enable more W=1 warnings by default
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH RESEND v1] docs/zh_CN: add zh_CN translation for memory-barriers.txt
- From: Gang Li <gang.li@xxxxxxxxx>
- Re: [PATCH RESEND v1] docs/zh_CN: add zh_CN translation for memory-barriers.txt
- From: Yanteng Si <siyanteng@xxxxxxxxxxx>
- Re: [PATCH RESEND v1] docs/zh_CN: add zh_CN translation for memory-barriers.txt
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH RESEND v1] docs/zh_CN: add zh_CN translation for memory-barriers.txt
- From: Gang Li <gang.li@xxxxxxxxx>
- Re: [PATCH v4 10/10] powerpc/pseries: Honour current SMT state when DLPAR onlining CPUs
- From: Srikar Dronamraju <srikar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 09/10] powerpc: Add HOTPLUG_SMT support
- From: Srikar Dronamraju <srikar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 08/10] powerpc/pseries: Initialise CPU hotplug callbacks earlier
- From: Srikar Dronamraju <srikar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND v1] docs/zh_CN: add zh_CN translation for memory-barriers.txt
- From: Yanteng Si <siyanteng@xxxxxxxxxxx>
- Re: [PATCH RESEND v1] docs/zh_CN: add zh_CN translation for memory-barriers.txt
- From: Gang Li <gang.li@xxxxxxxxx>
- Re: [PATCH 6/9] extrawarn: move -Wrestrict into W=1 warnings
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 5/9] extrawarn: enable format and stringop overflow warnings in W=1
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 4/9] extrawarn: don't turn off -Wshift-negative-value for gcc-9
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [arnd-asm-generic:asm-generic] BUILD SUCCESS cdea694d7616727c2028ddac4d05ce4454d2e1db
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 3/9] Kbuild: avoid duplicate warning options
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 3/9] Kbuild: avoid duplicate warning options
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 2/9] Kbuild: consolidate warning flags in scripts/Makefile.extrawarn
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH V10 18/19] locking/qspinlock: Move pv_ops into x86 directory
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH V10 18/19] locking/qspinlock: Move pv_ops into x86 directory
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH V10 05/19] riscv: qspinlock: Introduce combo spinlock
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH V10 04/19] riscv: qspinlock: Add basic queued_spinlock support
- From: Guo Ren <guoren@xxxxxxxxxx>
- [PATCH 3/9] Drivers: hv: vmbus: Support fully enlightened TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 9/9] x86/hyperv: Remove hv_isolation_type_en_snp
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 5/9] Drivers: hv: vmbus: Support >64 VPs for a fully enlightened TDX/SNP VM
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 8/9] x86/hyperv: Use TDX GHCI to access some MSRs in a TDX VM with the paravisor
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 6/9] x86/hyperv: Introduce a global variable hyperv_paravisor_present
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 7/9] Drivers: hv: vmbus: Bring the post_msg_page back for TDX VMs with the paravisor
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 2/9] x86/hyperv: Support hypercalls for fully enlightened TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 4/9] x86/hyperv: Fix serial console interrupts for fully enlightened TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 1/9] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- [PATCH 0/9] Support TDX guests on Hyper-V (the Hyper-V specific part)
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH V5 2/8] x86/hyperv: Set Virtual Trust Level in VMBus init message
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH V5 2/8] x86/hyperv: Set Virtual Trust Level in VMBus init message
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH V10 18/19] locking/qspinlock: Move pv_ops into x86 directory
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH V10 05/19] riscv: qspinlock: Introduce combo spinlock
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH V10 04/19] riscv: qspinlock: Add basic queued_spinlock support
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH 9/9] [RFC] extrawarn: enable more W=1 warnings by default
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v5 04/12] virt: geniezone: Add vcpu support
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v5 00/12] GenieZone hypervisor drivers
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v4 21/36] arm64/mm: Implement map_shadow_stack()
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v4 07/36] arm64/gcs: Provide copy_to_user_gcs()
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v4 19/36] arm64/gcs: Allocate a new GCS for threads with GCS enabled
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 9/9] [RFC] extrawarn: enable more W=1 warnings by default
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v4 18/36] arm64/gcs: Context switch GCS state for EL0
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v4 17/36] arm64/mm: Handle GCS data aborts
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 2/9] Kbuild: consolidate warning flags in scripts/Makefile.extrawarn
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH 1/9] Kbuild: only pass -fno-inline-functions-called-once for gcc
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v4 09/36] arm64/mm: Allocate PIE slots for EL0 guarded control stack
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 2/9] Kbuild: consolidate warning flags in scripts/Makefile.extrawarn
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH 1/9] Kbuild: only pass -fno-inline-functions-called-once for gcc
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- [PATCH 9/9] [RFC] extrawarn: enable more W=1 warnings by default
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 8/9] extrawarn: enable more warnings in W=2
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 7/9] extrawarn: do not disable -Wmain at W=1 level
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 6/9] extrawarn: move -Wrestrict into W=1 warnings
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 5/9] extrawarn: enable format and stringop overflow warnings in W=1
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 4/9] extrawarn: don't turn off -Wshift-negative-value for gcc-9
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 3/9] Kbuild: avoid duplicate warning options
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 2/9] Kbuild: consolidate warning flags in scripts/Makefile.extrawarn
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 1/9] Kbuild: only pass -fno-inline-functions-called-once for gcc
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 0/9] Kbuild: warning options cleanup and more warnings
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH 3/5] kbuild: rename cmd_{bzip2,lzma,lzo,lz4,xzkern,zstd22}
- From: Eugeniu Rosca <erosca@xxxxxxxxxxxxxx>
- [PATCH RESEND v1] docs/zh_CN: add zh_CN translation for memory-barriers.txt
- From: Gang Li <gang.li@xxxxxxxxx>
- Re: [PATCH] csky: Fixup -Wmissing-prototypes warning
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH] csky: Fixup -Wmissing-prototypes warning
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [PATCH v1] docs/zh_CN: add zh_CN translation for memory-barriers.txt
- From: Gang Li <gang.li@xxxxxxxxx>
- [PATCH] csky: Fixup -Wmissing-prototypes warning
- RE: [EXTERNAL] [PATCH V2 2/9] x86/hyperv: Set Virtual Trust Level in VMBus init message
- From: Saurabh Singh Sengar <ssengar@xxxxxxxxxxxxx>
- RE: [PATCH V5 8/8] x86/hyperv: Add hyperv-specific handling for VMMCALL under SEV-ES
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH V5 7/8] x86/hyperv: Add smp support for SEV-SNP guest
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH V5 6/8] clocksource: hyper-v: Mark hyperv tsc page unencrypted in sev-snp enlightened guest
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH V5 5/8] x86/hyperv: Use vmmcall to implement Hyper-V hypercall in sev-snp enlightened guest
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH V5 4/8] drivers: hv: Mark percpu hvcall input arg page unencrypted in SEV-SNP enlightened guest
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH V5 3/8] x86/hyperv: Mark Hyper-V vp assist page unencrypted in SEV-SNP enlightened guest
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH V5 2/8] x86/hyperv: Set Virtual Trust Level in VMBus init message
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH V5 1/8] x86/hyperv: Add sev-snp enlightened guest static key
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH v4 11/36] arm64/mm: Map pages for guarded control stack
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 05/14] futex: Add sys_futex_wake()
- From: André Almeida <andrealmeid@xxxxxxxxxx>
- Re: [PATCH v4 03/36] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [EXTERNAL] [PATCH V2 2/9] x86/hyperv: Set Virtual Trust Level in VMBus init message
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V5 7/8] x86/hyperv: Add smp support for SEV-SNP guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V5 8/8] x86/hyperv: Add hyperv-specific handling for VMMCALL under SEV-ES
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v3 00/36] arm64/gcs: Provide support for GCS in userspace
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH V5 5/8] x86/hyperv: Use vmmcall to implement Hyper-V hypercall in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V5 6/8] clocksource: hyper-v: Mark hyperv tsc page unencrypted in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V5 2/8] x86/hyperv: Set Virtual Trust Level in VMBus init message
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V5 4/8] drivers: hv: Mark percpu hvcall input arg page unencrypted in SEV-SNP enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V5 3/8] x86/hyperv: Mark Hyper-V vp assist page unencrypted in SEV-SNP enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V5 1/8] x86/hyperv: Add sev-snp enlightened guest static key
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V5 0/8] x86/hyperv: Add AMD sev-snp enlightened guest support on hyperv
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v4 03/36] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Szabolcs Nagy <Szabolcs.Nagy@xxxxxxx>
- Re: [PATCH v2 05/14] futex: Add sys_futex_wake()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 03/36] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v3 00/36] arm64/gcs: Provide support for GCS in userspace
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v4 03/36] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Szabolcs Nagy <Szabolcs.Nagy@xxxxxxx>
- Re: [PATCH v4 00/10] Introduce SMT level and add PowerPC support
- From: Laurent Dufour <ldufour@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Introduce SMT level and add PowerPC support
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH V2] LoongArch: Fix module relocation error with binutils 2.41
- From: Xi Ruoyao <xry111@xxxxxxxxxxx>
- Re: [PATCH V2] LoongArch: Fix module relocation error with binutils 2.41
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH V2] LoongArch: Fix module relocation error with binutils 2.41
- From: Xi Ruoyao <xry111@xxxxxxxxxxx>
- Re: [PATCH V2] LoongArch: Fix module relocation error with binutils 2.41
- From: Xi Ruoyao <xry111@xxxxxxxxxxx>
- Re: [PATCH v2 05/14] futex: Add sys_futex_wake()
- From: André Almeida <andrealmeid@xxxxxxxxxx>
- Re: [PATCH v5 04/10] ARM: syscall: always store thread_info->abi_syscall
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- Re: [PATCH v4 03/36] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v4 03/36] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH] csky: pgtable: Invalidate stale I-cache lines in update_mmu_cache
- Re: [PATCH 3/3] mips: remove <asm/export.h>
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH V2] asm-generic: ticket-lock: Optimize arch_spin_value_unlocked
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- Re: [PATCH v3 00/36] arm64/gcs: Provide support for GCS in userspace
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v2 00/14] futex: More futex2 bits
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v3 21/36] arm64/mm: Implement map_shadow_stack()
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 2/3] mips: replace #include <asm/export.h> with #include <linux/export.h>
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH v2 11/14] futex: Implement FUTEX2_NUMA
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/36] arm64/gcs: Provide support for GCS in userspace
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2 11/14] futex: Implement FUTEX2_NUMA
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/36] arm64/gcs: Provide support for GCS in userspace
- From: Szabolcs Nagy <Szabolcs.Nagy@xxxxxxx>
- Re: [PATCH v3 21/36] arm64/mm: Implement map_shadow_stack()
- From: Szabolcs Nagy <Szabolcs.Nagy@xxxxxxx>
- Re: [PATCH 1/3] mips: remove unneeded #include <asm/export.h>
- From: Philippe Mathieu-Daudé <philmd@xxxxxxxxxx>
- Re: [PATCH V2] asm-generic: ticket-lock: Optimize arch_spin_value_unlocked
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH V10 07/19] riscv: qspinlock: errata: Introduce ERRATA_THEAD_QSPINLOCK
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH v2 03/14] futex: Flag conversion
- From: André Almeida <andrealmeid@xxxxxxxxxx>
- Re: [PATCH v2 02/14] futex: Extend the FUTEX2 flags
- From: André Almeida <andrealmeid@xxxxxxxxxx>
- Re: [PATCH v2 01/14] futex: Clarify FUTEX2 flags
- From: André Almeida <andrealmeid@xxxxxxxxxx>
- [PATCH mm-unstable v9 20/31] hexagon: Convert __pte_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 22/31] m68k: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 27/31] sh: Convert pte_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 21/31] loongarch: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 25/31] openrisc: Convert __pte_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 30/31] um: Convert {pmd, pte}_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 29/31] sparc: Convert pgtable_pte_page_{ctor, dtor}() to ptdesc equivalents
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 26/31] riscv: Convert alloc_{pmd, pte}_late() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 31/31] mm: Remove pgtable_{pmd, pte}_page_{ctor, dtor}() wrappers
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 23/31] mips: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 18/31] arm64: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 28/31] sparc64: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 24/31] nios2: Convert __pte_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 19/31] csky: Convert __pte_free_tlb() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 17/31] arm: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 14/31] s390: Convert various pgalloc functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 16/31] pgalloc: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 15/31] mm: remove page table members from struct page
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 13/31] x86: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 11/31] mm: Create ptdesc equivalents for pgtable_{pte,pmd}_page_{ctor,dtor}
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 12/31] powerpc: Convert various functions to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 10/31] mm: Convert ptlock_free() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 09/31] mm: Convert pmd_ptlock_free() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 08/31] mm: Convert ptlock_init() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 07/31] mm: Convert pmd_ptlock_init() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 06/31] mm: Convert ptlock_ptr() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 05/31] mm: Convert ptlock_alloc() to use ptdescs
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 04/31] mm: Convert pmd_pgtable_page() callers to use pmd_ptdesc()
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 02/31] pgtable: create struct ptdesc
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 01/31] mm: Add PAGE_TYPE_OP folio functions
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 03/31] mm: add utility functions for ptdesc
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH mm-unstable v9 00/31] Split ptdesc from struct page
- From: "Vishal Moola (Oracle)" <vishal.moola@xxxxxxxxx>
- [PATCH v4 35/36] kselftest/arm64: Add a GCS stress test
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 30/36] kselftest/arm64: Always run signals tests with GCS enabled
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 31/36] kselftest/arm64: Add very basic GCS test program
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 33/36] kselftest/arm64: Add test coverage for GCS mode locking
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 36/36] kselftest/arm64: Enable GCS for the FP stress tests
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 34/36] selftests/arm64: Add GCS signal tests
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 24/36] arm64/ptrace: Expose GCS via ptrace and core files
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 32/36] kselftest/arm64: Add a GCS test program built with the system libc
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 29/36] kselftest/arm64: Allow signals tests to specify an expected si_code
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 28/36] kselftest/arm64: Add framework support for GCS to signal handling tests
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 27/36] kselftest/arm64: Add GCS as a detected feature in the signal tests
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 26/36] kselftest/arm64: Verify the GCS hwcap
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 21/36] arm64/mm: Implement map_shadow_stack()
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 18/36] arm64/gcs: Context switch GCS state for EL0
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 22/36] arm64/signal: Set up and restore the GCS context for signal handlers
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 19/36] arm64/gcs: Allocate a new GCS for threads with GCS enabled
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 20/36] arm64/gcs: Implement shadow stack prctl() interface
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 25/36] arm64: Add Kconfig for Guarded Control Stack (GCS)
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 23/36] arm64/signal: Expose GCS state in signal frames
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 16/36] arm64/traps: Handle GCS exceptions
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 17/36] arm64/mm: Handle GCS data aborts
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 15/36] arm64/hwcap: Add hwcap for GCS
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 14/36] arm64/idreg: Add overrride for GCS
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 13/36] arm64/gcs: Allow GCS usage at EL0 and EL1
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 12/36] KVM: arm64: Manage GCS registers for guests
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 11/36] arm64/mm: Map pages for guarded control stack
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 10/36] mm: Define VM_SHADOW_STACK for arm64 when we support GCS
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 09/36] arm64/mm: Allocate PIE slots for EL0 guarded control stack
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 06/36] arm64/gcs: Add manual encodings of GCS instructions
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 07/36] arm64/gcs: Provide copy_to_user_gcs()
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 08/36] arm64/cpufeature: Runtime detection of Guarded Control Stack (GCS)
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 05/36] arm64/sysreg: Add definitions for architected GCS caps
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 04/36] arm64/sysreg: Add new system registers for GCS
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 03/36] arm64/gcs: Document the ABI for Guarded Control Stacks
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 02/36] arm64: Document boot requirements for Guarded Control Stacks
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 01/36] prctl: arch-agnostic prctl for shadow stack
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v4 00/36] arm64/gcs: Provide support for GCS in userspace
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v2 13/14] futex: Enable FUTEX2_{8,16}
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v2 12/14] futex: Propagate flags into futex_get_value_locked()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v2 11/14] futex: Implement FUTEX2_NUMA
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v2 09/14] futex: Add sys_futex_requeue()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v2 08/14] futex: Add flags2 argument to futex_requeue()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v2 05/14] futex: Add sys_futex_wake()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v2 03/14] futex: Flag conversion
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v2 02/14] futex: Extend the FUTEX2 flags
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH V2] asm-generic: ticket-lock: Optimize arch_spin_value_unlocked
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- Re: [PATCH] locking/arch: Rewrite local_add_unless as static inline function
- From: Uros Bizjak <ubizjak@xxxxxxxxx>
- Re: [PATCH 3/3] loongarch: remove <asm/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH] locking/arch: Rewrite local_add_unless as static inline function
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 3/3] loongarch: remove <asm/export.h>
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- [PATCH 3/3] loongarch: remove <asm/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 2/3] loongarch: replace #include <asm/export.h> with #include <linux/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 1/3] loongarch: remove unneeded #include <asm/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 2/2] m68k: remove <asm/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 1/2] m68k: replace #include <asm/export.h> with #include <linux/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 3/3] mips: remove <asm/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 2/3] mips: replace #include <asm/export.h> with #include <linux/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 1/3] mips: remove unneeded #include <asm/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v3 21/36] arm64/mm: Implement map_shadow_stack()
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v2 06/14] futex: Add sys_futex_wait()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2 09/14] futex: Add sys_futex_requeue()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2 05/14] futex: Add sys_futex_wake()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2 10/14] mm: Add vmalloc_huge_node()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2 13/14] futex: Enable FUTEX2_{8,16}
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2 00/14] futex: More futex2 bits
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2 14/14] futex,selftests: Extend the futex selftests
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2 08/14] futex: Add flags2 argument to futex_requeue()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2 07/14] futex: Propagate flags into get_futex_key()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2 04/14] futex: Validate futex value against futex size
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2 11/14] futex: Implement FUTEX2_NUMA
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2 02/14] futex: Extend the FUTEX2 flags
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2 12/14] futex: Propagate flags into futex_get_value_locked()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2 03/14] futex: Flag conversion
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v2 01/14] futex: Clarify FUTEX2 flags
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 21/36] arm64/mm: Implement map_shadow_stack()
- From: Szabolcs Nagy <Szabolcs.Nagy@xxxxxxx>
- Re: [PATCH 1/3] s390: remove unneeded #include <asm/export.h>
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH V10 07/19] riscv: qspinlock: errata: Introduce ERRATA_THEAD_QSPINLOCK
- From: "Stefan O'Rear" <sorear@xxxxxxxxxxxx>
- Re: [EXTERNAL] [PATCH V2 2/9] x86/hyperv: Set Virtual Trust Level in VMBus init message
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH V4 0/9] x86/hyperv: Add AMD sev-snp enlightened guest support on hyperv
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- [PATCH 3/3] s390: remove <asm/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 2/3] s390: replace #include <asm/export.h> with #include <linux/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 1/3] s390: remove unneeded #include <asm/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 3/3] powerpc: remove <asm/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 2/3] powerpc: replace #include <asm/export.h> with #include <linux/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 1/3] powerpc: remove unneeded #include <asm/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 2/3] x86: replace #include <asm/export.h> with #include <linux/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 3/3] x86: remove <asm/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 1/3] x86: remove unneeded #include <asm/export.h>
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- RE: [PATCH V4 0/9] x86/hyperv: Add AMD sev-snp enlightened guest support on hyperv
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- RE: [PATCH V4 0/9] x86/hyperv: Add AMD sev-snp enlightened guest support on hyperv
- From: Dexuan Cui <decui@xxxxxxxxxxxxx>
- Re: [PATCH V10 07/19] riscv: qspinlock: errata: Introduce ERRATA_THEAD_QSPINLOCK
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH v15 3/6] locking/qspinlock: Introduce CNA into the slow path of qspinlock
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH -next V13 1/3] riscv: stack: Support HAVE_IRQ_EXIT_ON_IRQ_STACK
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH V4 0/9] x86/hyperv: Add AMD sev-snp enlightened guest support on hyperv
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH -next V13 1/3] riscv: stack: Support HAVE_IRQ_EXIT_ON_IRQ_STACK
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH -next V13 1/3] riscv: stack: Support HAVE_IRQ_EXIT_ON_IRQ_STACK
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH -next V13 1/3] riscv: stack: Support HAVE_IRQ_EXIT_ON_IRQ_STACK
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH -next V13 1/3] riscv: stack: Support HAVE_IRQ_EXIT_ON_IRQ_STACK
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v15 3/6] locking/qspinlock: Introduce CNA into the slow path of qspinlock
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 21/36] arm64/mm: Implement map_shadow_stack()
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v3 21/36] arm64/mm: Implement map_shadow_stack()
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [PATCH V4 8/9] x86/hyperv: Add hyperv-specific handling for VMMCALL under SEV-ES
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V4 9/9] x86/hyperv: Initialize cpu and memory for SEV-SNP enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V4 7/9] x86/hyperv: Add smp support for SEV-SNP guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V4 5/9] x86/hyperv: Use vmmcall to implement Hyper-V hypercall in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V4 4/9] drivers: hv: Mark percpu hvcall input arg page unencrypted in SEV-SNP enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V4 6/9] clocksource: hyper-v: Mark hyperv tsc page unencrypted in sev-snp enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V4 3/9] x86/hyperv: Mark Hyper-V vp assist page unencrypted in SEV-SNP enlightened guest
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V4 2/9] x86/hyperv: Set Virtual Trust Level in VMBus init message
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V4 1/9] x86/hyperv: Add sev-snp enlightened guest static key
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V4 0/9] x86/hyperv: Add AMD sev-snp enlightened guest support on hyperv
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v15 3/6] locking/qspinlock: Introduce CNA into the slow path of qspinlock
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH v3 21/36] arm64/mm: Implement map_shadow_stack()
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH] word-at-a-time: use the same return type for has_zero regardless of endianness
- From: Will Deacon <will@xxxxxxxxxx>
[Index of Archives]
[Kernel Announce]
[IETF Annouce]
[Netdev]
[Netfilter]
[Bugtraq]