Linux Arch
[Prev Page][Next Page]
- [PATCH V6 4/5] scsi: storvsc: Add Isolation VM support for storvsc driver
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V6 2/5] x86/hyper-v: Add hyperv Isolation VM check in the cc_platform_has()
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V6 1/5] swiotlb: Add swiotlb bounce buffer remap function for HV IVM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V6 0/5] x86/Hyper-V: Add Hyper-V Isolation VM support(Second part)
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v8 07/14] kallsyms: Hide layout
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v5 3/3] riscv: optimized memset
- From: Emil Renner Berthing <kernel@xxxxxxxx>
- Re: [PATCH v3 08/25] kcsan: Show location access was reordered to
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v3 08/25] kcsan: Show location access was reordered to
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH v3 01/13] riscv: Move KASAN mapping next to the kernel mapping
- From: Jisheng Zhang <jszhang@xxxxxxxxxx>
- Re: [PATCH v3 08/25] kcsan: Show location access was reordered to
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v3 08/25] kcsan: Show location access was reordered to
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH V4 3/5] hyperv/IOMMU: Enable swiotlb bounce buffer for Isolation VM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH V4 1/5] Swiotlb: Add Swiotlb bounce buffer remap function for HV IVM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH V4 2/5] x86/hyper-v: Add hyperv Isolation VM check in the cc_platform_has()
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V5 5/5] net: netvsc: Add Isolation VM support for netvsc driver
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V5 3/5] hyper-v: Enable swiotlb bounce buffer for Isolation VM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V5 4/5] scsi: storvsc: Add Isolation VM support for storvsc driver
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V5 2/5] x86/hyper-v: Add hyperv Isolation VM check in the cc_platform_has()
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V5 1/5] Swiotlb: Add Swiotlb bounce buffer remap function for HV IVM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V5 0/5] x86/Hyper-V: Add Hyper-V Isolation VM support(Second part)
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH V4 1/5] Swiotlb: Add Swiotlb bounce buffer remap function for HV IVM
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH V4 2/5] x86/hyper-v: Add hyperv Isolation VM check in the cc_platform_has()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v2 00/10] Introduce sv48 support without relocatable kernel
- From: Heiko Stübner <heiko@xxxxxxxxx>
- Re: [PATCH v3 00/13] Introduce sv48 support without relocatable kernel
- From: Alexandre ghiti <alex@xxxxxxxx>
- Re: [PATCH v3 07/13] riscv: Implement sv48 support
- From: Alexandre ghiti <alex@xxxxxxxx>
- [PATCH v3 13/13] riscv: Allow user to downgrade to sv39 when hw supports sv48 if !KASAN
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH v3 12/13] riscv: Initialize thread pointer before calling C functions
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH v3 11/13] Documentation: riscv: Add sv48 description to VM layout
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH v3 10/13] riscv: Improve virtual kernel memory layout dump
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH v3 09/13] riscv: Explicit comment about user virtual address space size
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH v3 08/13] riscv: Use pgtable_l4_enabled to output mmu_type in cpuinfo
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH v3 07/13] riscv: Implement sv48 support
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH v3 06/13] asm-generic: Prepare for riscv use of pud_alloc_one and pud_free
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH v3 05/13] riscv: Get rid of MAXPHYSMEM configs
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH v3 04/13] riscv: Allow to dynamically define VA_BITS
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH v3 03/13] riscv: Introduce functions to switch pt_ops
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/10] Introduce sv48 support without relocatable kernel
- From: Alexandre ghiti <alex@xxxxxxxx>
- [PATCH v3 02/13] riscv: Split early kasan mapping to prepare sv48 introduction
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH v3 01/13] riscv: Move KASAN mapping next to the kernel mapping
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH v3 00/13] Introduce sv48 support without relocatable kernel
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- Re: [PATCH v3 08/25] kcsan: Show location access was reordered to
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v8 08/14] livepatch: only match unique symbols when using FG-KASLR
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v3 08/25] kcsan: Show location access was reordered to
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH V4 3/5] hyperv/IOMMU: Enable swiotlb bounce buffer for Isolation VM
- From: Juergen Gross <jgross@xxxxxxxx>
- Re: [PATCH V4 3/5] hyperv/IOMMU: Enable swiotlb bounce buffer for Isolation VM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH V4 3/5] hyperv/IOMMU: Enable swiotlb bounce buffer for Isolation VM
- From: Juergen Gross <jgross@xxxxxxxx>
- [PATCH V4 4/5] scsi: storvsc: Add Isolation VM support for storvsc driver
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V4 5/5] hv_netvsc: Add Isolation VM support for netvsc driver
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V4 3/5] hyperv/IOMMU: Enable swiotlb bounce buffer for Isolation VM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V4 2/5] x86/hyper-v: Add hyperv Isolation VM check in the cc_platform_has()
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V4 1/5] Swiotlb: Add Swiotlb bounce buffer remap function for HV IVM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V4 0/5] x86/Hyper-V: Add Hyper-V Isolation VM support(Second part)
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v8 05/14] x86: conditionally place regular ASM functions into separate sections
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v8 05/14] x86: conditionally place regular ASM functions into separate sections
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH V3 5/5] hv_netvsc: Add Isolation VM support for netvsc driver
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH V3 3/5] hyperv/IOMMU: Enable swiotlb bounce buffer for Isolation VM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH V3 1/5] Swiotlb: Add Swiotlb bounce buffer remap function for HV IVM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v3 04/25] kcsan: Add core support for a subset of weak memory modeling
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v2 7/8] KVM: x86: Reject fixeds-size Hyper-V hypercalls with non-zero "var_cnt"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 04/25] kcsan: Add core support for a subset of weak memory modeling
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v2 3/8] KVM: x86: Refactor kvm_hv_flush_tlb() to reduce indentation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 04/25] kcsan: Add core support for a subset of weak memory modeling
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v3 04/25] kcsan: Add core support for a subset of weak memory modeling
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v3 04/25] kcsan: Add core support for a subset of weak memory modeling
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH V3 1/5] Swiotlb: Add Swiotlb bounce buffer remap function for HV IVM
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v8 05/14] x86: conditionally place regular ASM functions into separate sections
- From: Nicolas Pitre <nico@xxxxxxxxxxx>
- RE: [PATCH V3 3/5] hyperv/IOMMU: Enable swiotlb bounce buffer for Isolation VM
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH V3 1/5] Swiotlb: Add Swiotlb bounce buffer remap function for HV IVM
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- RE: [PATCH V3 5/5] hv_netvsc: Add Isolation VM support for netvsc driver
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [RFD] clear virtual machine memory when virtual machine is turned off
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFD] clear virtual machine memory when virtual machine is turned off
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v8 05/14] x86: conditionally place regular ASM functions into separate sections
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v3 04/25] kcsan: Add core support for a subset of weak memory modeling
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v8 05/14] x86: conditionally place regular ASM functions into separate sections
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v8 00/14] Function Granular KASLR
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v8 00/14] Function Granular KASLR
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- Re: [PATCH v8 08/14] livepatch: only match unique symbols when using FG-KASLR
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- Re: [PATCH v8 05/14] x86: conditionally place regular ASM functions into separate sections
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- Re: ** POTENTIAL FRAUD ALERT - RED HAT ** RE: [PATCH v2 8/8] KVM: x86: Add checks for reserved-to-zero Hyper-V hypercall fields
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v8 04/14] linkage: add macros for putting ASM functions into own sections
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- Re: [PATCH v8 03/14] x86: Add support for function granular KASLR
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- Re: [PATCH] uapi: Make __{u,s}64 match {u,}int64_t in userspace
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH] uapi: Make __{u,s}64 match {u,}int64_t in userspace
- From: Adhemerval Zanella <adhemerval.zanella@xxxxxxxxxx>
- Re: [PATCH V3 3/5] hyperv/IOMMU: Enable swiotlb bounce buffer for Isolation VM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH V3 2/5] x86/hyper-v: Add hyperv Isolation VM check in the cc_platform_has()
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH V3 1/5] Swiotlb: Add Swiotlb bounce buffer remap function for HV IVM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v8 00/14] Function Granular KASLR
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v8 03/14] x86: Add support for function granular KASLR
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v8 11/14] module: Reorder functions
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v8 08/14] livepatch: only match unique symbols when using FG-KASLR
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v8 07/14] kallsyms: Hide layout
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 07/14] kallsyms: Hide layout
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v8 06/14] FG-KASLR: use a scripted approach to handle .text.* sections
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v8 05/14] x86: conditionally place regular ASM functions into separate sections
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v8 04/14] linkage: add macros for putting ASM functions into own sections
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v8 03/14] x86: Add support for function granular KASLR
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 04/25] kcsan: Add core support for a subset of weak memory modeling
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH] futex: Fix additional regressions
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [RFD] clear virtual machine memory when virtual machine is turned off
- From: fei luo <morphyluo@xxxxxxxxx>
- Re: [PATCH] uapi: Make __{u,s}64 match {u,}int64_t in userspace
- From: "Zack Weinberg" <zack@xxxxxxxxxxxx>
- Re: [PATCH] uapi: Make __{u,s}64 match {u,}int64_t in userspace
- From: Adhemerval Zanella <adhemerval.zanella@xxxxxxxxxx>
- Re: [PATCH] uapi: Make __{u,s}64 match {u,}int64_t in userspace
- From: Rich Felker <dalias@xxxxxxxx>
- [PATCH v8 11/14] module: Reorder functions
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v8 14/14] maintainers: add MAINTAINERS entry for FG-KASLR
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v8 13/14] Documentation: add documentation for FG-KASLR
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v8 12/14] module: use a scripted approach for FG-KASLR
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v8 10/14] arm64/crypto: conditionally place ASM functions into separate sections
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v8 09/14] x86/boot: allow FG-KASLR to be selected
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v8 06/14] FG-KASLR: use a scripted approach to handle .text.* sections
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v8 08/14] livepatch: only match unique symbols when using FG-KASLR
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v8 07/14] kallsyms: Hide layout
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v8 04/14] linkage: add macros for putting ASM functions into own sections
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v8 03/14] x86: Add support for function granular KASLR
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v8 02/14] x86/tools: Add relative relocs for randomized functions
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v8 01/14] x86: Makefile: Add build and config option for CONFIG_FG_KASLR
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v8 00/14] Function Granular KASLR
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- Re: [PATCH] uapi: Make __{u,s}64 match {u,}int64_t in userspace
- From: "Zack Weinberg" <zack@xxxxxxxxxxxx>
- Re: [RFD] clear virtual machine memory when virtual machine is turned off
- From: Mike Kravetz <mike.kravetz@xxxxxxxxxx>
- Re: [PATCH] uapi: Make __{u,s}64 match {u,}int64_t in userspace
- From: Rich Felker <dalias@xxxxxxxx>
- RE: [PATCH v2 8/8] KVM: x86: Add checks for reserved-to-zero Hyper-V hypercall fields
- From: "Michael Kelley (LINUX)" <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH] uapi: Make __{u,s}64 match {u,}int64_t in userspace
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] uapi: Make __{u,s}64 match {u,}int64_t in userspace
- From: "Zack Weinberg" <zack@xxxxxxxxxxxx>
- Re: [PATCH V3 3/5] hyperv/IOMMU: Enable swiotlb bounce buffer for Isolation VM
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH V3 1/5] Swiotlb: Add Swiotlb bounce buffer remap function for HV IVM
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH V3 2/5] x86/hyper-v: Add hyperv Isolation VM check in the cc_platform_has()
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [RFD] clear virtual machine memory when virtual machine is turned off
- From: David Hildenbrand <david@xxxxxxxxxx>
- [RFD] Clear virtual machine memory when virtual machine is turned off
- From: fei luo <morphyluo@xxxxxxxxx>
- Re: [PATCH v2 8/8] KVM: x86: Add checks for reserved-to-zero Hyper-V hypercall fields
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH memory-model 1/3] tools/memory-model: Provide extra ordering for unlock+lock pair on the same CPU
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- [PATCH memory-model 2/3] tools/memory-model: doc: Describe the requirement of the litmus-tests directory
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- [PATCH memory-model 3/3] tools/memory-model: litmus: Add two tests for unlock(A)+lock(B) ordering
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- [PATCH memory-model 0/3] LKMM updates for v5.17
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- [PATCH V3 1/5] Swiotlb: Add Swiotlb bounce buffer remap function for HV IVM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V3 5/5] hv_netvsc: Add Isolation VM support for netvsc driver
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V3 4/5] scsi: storvsc: Add Isolation VM support for storvsc driver
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V3 3/5] hyperv/IOMMU: Enable swiotlb bounce buffer for Isolation VM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V3 2/5] x86/hyper-v: Add hyperv Isolation VM check in the cc_platform_has()
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V3 0/5] x86/Hyper-V: Add Hyper-V Isolation VM support(Second part)
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH v3 23/25] objtool, kcsan: Remove memory barrier instrumentation from noinstr
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 19/25] x86/qspinlock, kcsan: Instrument barrier of pv_queued_spin_unlock()
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 25/25] kcsan: Support WEAK_MEMORY with Clang where no objtool support exists
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 24/25] compiler_attributes.h: Add __disable_sanitizer_instrumentation
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 22/25] objtool, kcsan: Add memory barrier instrumentation to whitelist
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 21/25] sched, kcsan: Enable memory barrier instrumentation
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 20/25] mm, kcsan: Enable barrier instrumentation
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 18/25] x86/barriers, kcsan: Use generic instrumentation for non-smp barriers
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 17/25] asm-generic/bitops, kcsan: Add instrumentation for barriers
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 16/25] locking/atomics, kcsan: Add instrumentation for barriers
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 15/25] locking/barriers, kcsan: Support generic instrumentation
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 14/25] locking/barriers, kcsan: Add instrumentation for barriers
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 13/25] kcsan: selftest: Add test case to check memory barrier instrumentation
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 12/25] kcsan: Ignore GCC 11+ warnings about TSan runtime support
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 11/25] kcsan: test: Add test cases for memory barrier instrumentation
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 10/25] kcsan: test: Match reordered or normal accesses
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 07/25] kcsan: Call scoped accesses reordered in reports
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 08/25] kcsan: Show location access was reordered to
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 09/25] kcsan: Document modeling of weak memory
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 06/25] kcsan, kbuild: Add option for barrier instrumentation only
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 04/25] kcsan: Add core support for a subset of weak memory modeling
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 05/25] kcsan: Add core memory barrier instrumentation functions
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 03/25] kcsan: Avoid checking scoped accesses from nested contexts
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 02/25] kcsan: Remove redundant zero-initialization of globals
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 01/25] kcsan: Refactor reading of instrumented memory
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v3 00/25] kcsan: Support detecting a subset of missing memory barriers
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v2 03/23] kcsan: Avoid checking scoped accesses from nested contexts
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v2 03/23] kcsan: Avoid checking scoped accesses from nested contexts
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH] uapi: Make __{u,s}64 match {u,}int64_t in userspace
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] uapi: Make __{u,s}64 match {u,}int64_t in userspace
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: [PATCH v2 03/23] kcsan: Avoid checking scoped accesses from nested contexts
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v2 03/23] kcsan: Avoid checking scoped accesses from nested contexts
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH] x86: Implement arch_prctl(ARCH_VSYSCALL_LOCKOUT) to disable vsyscall
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH] x86: Implement arch_prctl(ARCH_VSYSCALL_LOCKOUT) to disable vsyscall
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] x86: Implement arch_prctl(ARCH_VSYSCALL_LOCKOUT) to disable vsyscall
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH] x86: Implement arch_prctl(ARCH_VSYSCALL_LOCKOUT) to disable vsyscall
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] x86: Implement arch_prctl(ARCH_VSYSCALL_LOCKOUT) to disable vsyscall
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH 4.9] hugetlbfs: flush TLBs correctly after huge_pmd_unshare
- From: Anton Ivanov <anton.ivanov@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4.9] hugetlbfs: flush TLBs correctly after huge_pmd_unshare
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- [PATCH] x86: Implement arch_prctl(ARCH_VSYSCALL_LOCKOUT) to disable vsyscall
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH 4.9] hugetlbfs: flush TLBs correctly after huge_pmd_unshare
- From: Anton Ivanov <anton.ivanov@xxxxxxxxxxxxxxxxxx>
- [PATCH] futex: Fix sparc32/m68k/nds32 build regression
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 4.9] hugetlbfs: flush TLBs correctly after huge_pmd_unshare
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- [arnd-asm-generic:asm-generic] BUILD SUCCESS a0eb2da92b715d0c97b96b09979689ea09faefe6
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [GIT PULL] asm-generic: syscall table updates
- From: pr-tracker-bot@xxxxxxxxxx
- [GIT PULL] asm-generic: syscall table updates
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v5 3/3] riscv: optimized memset
- From: Ley Foon Tan <lftan.linux@xxxxxxxxx>
- Re: [PATCH v2 00/10] Introduce sv48 support without relocatable kernel
- From: Heiko Stübner <heiko@xxxxxxxxx>
- Re: [PATCH v2 23/23] objtool, kcsan: Remove memory barrier instrumentation from noinstr
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH] uapi: Make __{u,s}64 match {u,}int64_t in userspace
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- [PATCH 2/4] MIPS: tx39: fix tx39_flush_cache_page
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- [PATCH 4/4] MIPS: loongson64: fix FTLB configuration
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- [PATCH 3/4] MIPS: use 3-level pgtable for 64KB page size on MIPS_VA_BITS_48
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- [PATCH 1/4] MIPS: rework local_t operation on MIPS64
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- [PATCH V3]: bugfix
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- Re: [PATCH V2]: bugfix
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- Re: [PATCH v5] aio: Add support for the POLLFREE
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] uapi: Make __{u,s}64 match {u,}int64_t in userspace
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v5] aio: Add support for the POLLFREE
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- RE: [PATCH] uapi: Make __{u,s}64 match {u,}int64_t in userspace
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] uapi: Make __{u,s}64 match {u,}int64_t in userspace
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] uapi: Make __{u,s}64 match {u,}int64_t in userspace
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 6/6] MIPS: loongson64: fix FTLB configuration
- From: Sergey Shtylyov <s.shtylyov@xxxxxx>
- Re: [PATCH 1/2] hamradio: fix macro redefine warning
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH v2 23/23] objtool, kcsan: Remove memory barrier instrumentation from noinstr
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH 1/2] hamradio: fix macro redefine warning
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- [PATCH 2/2] slip: fix macro redefine warning
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- Re: [PATCH] uapi: Make __{u,s}64 match {u,}int64_t in userspace
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: [PATCH] uapi: Make __{u,s}64 match {u,}int64_t in userspace
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: [PATCH V2]: bugfix
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- [PATCH 6/6] MIPS: loongson64: fix FTLB configuration
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- [PATCH 5/6] MIPS: use 3-level pgtable for 64KB page size on MIPS_VA_BITS_48
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- [PATCH 3/6] MIPS: rework local_t operation on MIPS64
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- [PATCH 4/6] MIPS: tx39: fix tx39_flush_cache_page
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- [PATCH 1/6] hamradio: fix macro redefine warning
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- [PATCH V2]: bugfix
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- [PATCH 2/6] slip: fix macro redefine warning
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- Re: [PATCH] uapi: Make __{u,s}64 match {u,}int64_t in userspace
- From: "Zack Weinberg" <zack@xxxxxxxxxxxx>
- Re: [PATCH] uapi: Make __{u,s}64 match {u,}int64_t in userspace
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH net-next v2] sections: global data can be in .bss
- From: Antoine Tenart <atenart@xxxxxxxxxx>
- Re: [PATCH net-next v2] sections: global data can be in .bss
- From: Jonathon Reinhart <jonathon.reinhart@xxxxxxxxx>
- Re: [PATCH] uapi: Make __{u,s}64 match {u,}int64_t in userspace
- From: "Alejandro Colomar (mailing lists)" <alx.mailinglists@xxxxxxxxx>
- [PATCH] uapi: Make __{u,s}64 match {u,}int64_t in userspace
- From: Cyril Hrubis <chrubis@xxxxxxx>
- Re: [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH net-next v2] sections: global data can be in .bss
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH net-next v2] sections: global data can be in .bss
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH net-next v2] sections: global data can be in .bss
- From: Antoine Tenart <atenart@xxxxxxxxxx>
- Re: [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v2 23/23] objtool, kcsan: Remove memory barrier instrumentation from noinstr
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v2 23/23] objtool, kcsan: Remove memory barrier instrumentation from noinstr
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v6 2/2] arm64: PCI: hv: Add support for Hyper-V vPCI
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC PATCH 00/13] x86 User Interrupts support
- From: Sohil Mehta <sohil.mehta@xxxxxxxxx>
- Re: [RFC PATCH 00/13] x86 User Interrupts support
- From: Sohil Mehta <sohil.mehta@xxxxxxxxx>
- Re: [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/4] MIPS: rework local_t operation on MIPS64
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 02/23] kcsan: Remove redundant zero-initialization of globals
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 01/23] kcsan: Refactor reading of instrumented memory
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH] MIPS: simplify copy_user_high_page for MIPS64 w/o cache alias
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- [PATCH 3/4] MIPS: use 3-level pgtable for 64KB page size on MIPS_VA_BITS_48
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- [PATCH 2/4] MIPS: fix tx39_flush_cache_page
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- [PATCH 4/4] MIPS: fix FTLB configuration
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- [PATCH 1/4] MIPS: rework local_t operation on MIPS64
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- [PATCH v6 2/2] arm64: PCI: hv: Add support for Hyper-V vPCI
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 1/2] PCI: hv: Make the code arch neutral by adding arch specific interfaces
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6 0/2] PCI: hv: Hyper-V vPCI for arm64
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 23/23] objtool, kcsan: Remove memory barrier instrumentation from noinstr
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 22/23] objtool, kcsan: Add memory barrier instrumentation to whitelist
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 21/23] sched, kcsan: Enable memory barrier instrumentation
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 20/23] mm, kcsan: Enable barrier instrumentation
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 18/23] x86/barriers, kcsan: Use generic instrumentation for non-smp barriers
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 19/23] x86/qspinlock, kcsan: Instrument barrier of pv_queued_spin_unlock()
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 17/23] asm-generic/bitops, kcsan: Add instrumentation for barriers
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 16/23] locking/atomics, kcsan: Add instrumentation for barriers
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 15/23] locking/barriers, kcsan: Support generic instrumentation
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 14/23] locking/barriers, kcsan: Add instrumentation for barriers
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 13/23] kcsan: selftest: Add test case to check memory barrier instrumentation
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 12/23] kcsan: Ignore GCC 11+ warnings about TSan runtime support
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 11/23] kcsan: test: Add test cases for memory barrier instrumentation
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 10/23] kcsan: test: Match reordered or normal accesses
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 08/23] kcsan: Show location access was reordered to
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 09/23] kcsan: Document modeling of weak memory
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 07/23] kcsan: Call scoped accesses reordered in reports
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 06/23] kcsan, kbuild: Add option for barrier instrumentation only
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 05/23] kcsan: Add core memory barrier instrumentation functions
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 04/23] kcsan: Add core support for a subset of weak memory modeling
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 03/23] kcsan: Avoid checking scoped accesses from nested contexts
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 02/23] kcsan: Remove redundant zero-initialization of globals
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 01/23] kcsan: Refactor reading of instrumented memory
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH v2 00/23] kcsan: Support detecting a subset of missing memory barriers
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v5 1/2] PCI: hv: Make the code arch neutral by adding arch specific interfaces
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 12/13] lkdtm: Fix execute_[user]_location()
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [ELISA Safety Architecture WG] [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [ELISA Safety Architecture WG] [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: [ELISA Safety Architecture WG] [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Petr Mladek <pmladek@xxxxxxxx>
- Re: [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [ELISA Safety Architecture WG] [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: [ELISA Safety Architecture WG] [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [RFC PATCH 00/13] x86 User Interrupts support
- From: Prakash Sangappa <prakash.sangappa@xxxxxxxxxx>
- Re: [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [ELISA Safety Architecture WG] [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Gabriele Paoloni <gpaoloni@xxxxxxxxxx>
- [PATCH v7 4/4] elf: Remove has_interp property from arch_parse_elf_property()
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v7 3/4] elf: Remove has_interp property from arch_adjust_elf_prot()
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v7 2/4] arm64: Enable BTI for main executable as well as the interpreter
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v7 1/4] elf: Allow architectures to parse properties on the main executable
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v7 0/4] arm64: Enable BTI for the executable as well as the interpreter
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Kaiwan N Billimoria <kaiwan.billimoria@xxxxxxxxx>
- [PATCH] sched: Remove a useless #include
- From: Christophe JAILLET <christophe.jaillet@xxxxxxxxxx>
- Re: [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] sysctl: introduce kernel.pkill_on_warn
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH 0/2] Nuke PAGE_KERNEL_IO
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 0/2] Nuke PAGE_KERNEL_IO
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 0/2] Nuke PAGE_KERNEL_IO
- From: Lucas De Marchi <lucas.demarchi@xxxxxxxxx>
- Re: [PATCH 0/2] Nuke PAGE_KERNEL_IO
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- RE: [PATCH v5 2/2] arm64: PCI: hv: Add support for Hyper-V vPCI
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v5 1/2] PCI: hv: Make the code arch neutral by adding arch specific interfaces
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH -rcu/kcsan 23/23] objtool, kcsan: Remove memory barrier instrumentation from noinstr
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH -rcu/kcsan 23/23] objtool, kcsan: Remove memory barrier instrumentation from noinstr
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [GIT PULL] exit cleanups for v5.16
- From: pr-tracker-bot@xxxxxxxxxx
- RE: [EXTERNAL] Re: [PATCH v4 2/2] arm64: PCI: hv: Add support for Hyper-V vPCI
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxx>
- Re: [GIT PULL] asm-generic: asm/syscall.h cleanup
- From: pr-tracker-bot@xxxxxxxxxx
- [PATCH v5 2/2] arm64: PCI: hv: Add support for Hyper-V vPCI
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/2] PCI: hv: Make the code arch neutral by adding arch specific interfaces
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/2] PCI: hv: Hyper-V vPCI for arm64
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] exit cleanups for v5.16
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- RE: [EXTERNAL] Re: [PATCH v4 2/2] arm64: PCI: hv: Add support for Hyper-V vPCI
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxx>
- [GIT PULL] exit cleanups for v5.16
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4 2/2] arm64: PCI: hv: Add support for Hyper-V vPCI
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 2/2] arm64: PCI: hv: Add support for Hyper-V vPCI
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [GIT PULL] asm-generic: asm/syscall.h cleanup
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v4 2/2] arm64: PCI: hv: Add support for Hyper-V vPCI
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 1/2] PCI: hv: Make the code arch neutral by adding arch specific interfaces
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxxxxxxxx>
- [PATCH v4 0/2] PCI: hv: Hyper-V vPCI for arm64
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxxxxxxxx>
- RE: [EXTERNAL] Re: [PATCH v3 2/2] arm64: PCI: hv: Add support for Hyper-V vPCI
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxx>
- RE: [EXTERNAL] Re: [PATCH v3 1/2] PCI: hv: Make the code arch neutral by adding arch specific interfaces
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxx>
- RE: [EXTERNAL] Re: [PATCH v3 1/2] PCI: hv: Make the code arch neutral by adding arch specific interfaces
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxx>
- [PATCH v5 4/4] powerpc/64s: enable MMU_LAZY_TLB_SHOOTDOWN
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH v5 3/4] lazy tlb: shoot lazies, a non-refcounting lazy tlb option
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH v5 2/4] lazy tlb: allow lazy tlb mm refcounting to be configurable
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH v5 1/4] lazy tlb: introduce lazy mm refcount helper functions
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH v5 0/4] shoot lazy tlbs
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH v5 03/16] x86/tdx: Exclude Shared bit from physical_mask
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v5 03/16] x86/tdx: Exclude Shared bit from physical_mask
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: flush_dcache_page vs kunmap_local
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v3 2/4] mm: Make generic arch_is_kernel_initmem_freed() do what it says
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 2/2] x86/mm: nuke PAGE_KERNEL_IO
- From: Lucas De Marchi <lucas.demarchi@xxxxxxxxx>
- Re: [PATCH v3 2/4] mm: Make generic arch_is_kernel_initmem_freed() do what it says
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: flush_dcache_page vs kunmap_local
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: flush_dcache_page vs kunmap_local
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: flush_dcache_page vs kunmap_local
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: flush_dcache_page vs kunmap_local
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: flush_dcache_page vs kunmap_local
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: flush_dcache_page vs kunmap_local
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: flush_dcache_page vs kunmap_local
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: flush_dcache_page vs kunmap_local
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- flush_dcache_page vs kunmap_local
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH RESEND] include/asm-generic/error-injection.h: fix a spelling mistake, and a coding style issue
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- Re: [PATCH stable 4.19 1/1] arch: pgtable: define MAX_POSSIBLE_PHYSMEM_BITS where needed
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH stable 4.9 2/2] arch: pgtable: define MAX_POSSIBLE_PHYSMEM_BITS where needed
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH stable 4.9 1/2] mm/zsmalloc: Prepare to variable MAX_PHYSMEM_BITS
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH stable 4.9 0/2] zsmalloc MAX_POSSIBLE_PHYSMEM_BITS
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH stable 4.14 2/2] arch: pgtable: define MAX_POSSIBLE_PHYSMEM_BITS where needed
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH stable 4.14 1/2] mm/zsmalloc: Prepare to variable MAX_PHYSMEM_BITS
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH stable 4.14 0/2] zsmalloc MAX_POSSIBLE_PHYSMEM_BITS
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH stable 4.19 1/1] arch: pgtable: define MAX_POSSIBLE_PHYSMEM_BITS where needed
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- [PATCH RESEND] include/asm-generic/error-injection.h: fix a spelling mistake, and a coding style issue
- From: Wasin Thonkaew <wasin@xxxxxxxx>
- Re: [PATCH v2 8/8] KVM: x86: Add checks for reserved-to-zero Hyper-V hypercall fields
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 7/8] KVM: x86: Reject fixeds-size Hyper-V hypercalls with non-zero "var_cnt"
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 6/8] KVM: x86: Shove vp_bitmap handling down into sparse_set_to_vcpu_mask()
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 4/8] KVM: x86: Add a helper to get the sparse VP_SET for IPIs and TLB flushes
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 3/8] KVM: x86: Refactor kvm_hv_flush_tlb() to reduce indentation
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 2/8] KVM: x86: Get the number of Hyper-V sparse banks from the VARHEAD field
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 5/8] KVM: x86: Don't bother reading sparse banks that end up being ignored
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v2 1/8] KVM: x86: Ignore sparse banks size for an "all CPUs", non-sparse IPI req
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v2 8/8] KVM: x86: Add checks for reserved-to-zero Hyper-V hypercall fields
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 2/8] KVM: x86: Get the number of Hyper-V sparse banks from the VARHEAD field
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 7/8] KVM: x86: Reject fixeds-size Hyper-V hypercalls with non-zero "var_cnt"
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 5/8] KVM: x86: Don't bother reading sparse banks that end up being ignored
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 6/8] KVM: x86: Shove vp_bitmap handling down into sparse_set_to_vcpu_mask()
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 4/8] KVM: x86: Add a helper to get the sparse VP_SET for IPIs and TLB flushes
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 3/8] KVM: x86: Refactor kvm_hv_flush_tlb() to reduce indentation
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 1/8] KVM: x86: Ignore sparse banks size for an "all CPUs", non-sparse IPI req
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v2 0/8] KVM: x86: Hyper-V hypercall fix and cleanups
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH 11/20] signal/s390: Use force_sigsegv in default_trap_handler
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC v2 3/3] tools/memory-model: litmus: Add two tests for unlock(A)+lock(B) ordering
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [RFC v2 3/3] tools/memory-model: litmus: Add two tests for unlock(A)+lock(B) ordering
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC v2 3/3] tools/memory-model: litmus: Add two tests for unlock(A)+lock(B) ordering
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [RFC v2 3/3] tools/memory-model: litmus: Add two tests for unlock(A)+lock(B) ordering
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 13/20] signal: Implement force_fatal_sig
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 11/20] signal/s390: Use force_sigsegv in default_trap_handler
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v2 2/2] sysctl: introduce kernel.pkill_on_warn
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- [PATCH v2 1/2] bug: do refactoring allowing to add a warning handling action
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- [PATCH v2 0/2] Introduce the pkill_on_warn parameter
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH 06/20] signal/sh: Use force_sig(SIGKILL) instead of do_group_exit(SIGKILL)
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [PATCH 0/4] x86: Various clean-ups in support of FGKASLR
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] x86: Various clean-ups in support of FGKASLR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5] aio: Add support for the POLLFREE
- From: Ramji Jiyani <ramjiyani@xxxxxxxxxx>
- Re: [PATCH 13/20] signal: Implement force_fatal_sig
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] futex: ensure futex_atomic_cmpxchg_inatomic() is present
- From: Max Filippov <jcmvbkbc@xxxxxxxxx>
- [PATCH 1/2] futex: ensure futex_atomic_cmpxchg_inatomic() is present
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH 11/20] signal/s390: Use force_sigsegv in default_trap_handler
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH 2/7] stacktrace,sched: Make stack_trace_save_tsk() more robust
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [RFC v2 0/3] memory model: Make unlock(A)+lock(B) on the same CPU RCtso
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC v2 3/3] tools/memory-model: litmus: Add two tests for unlock(A)+lock(B) ordering
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 13/20] signal: Implement force_fatal_sig
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 13/20] signal: Implement force_fatal_sig
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 10/32] signal/vm86_32: Properly send SIGSEGV when the vm86 state cannot be saved.
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH v2 10/32] signal/vm86_32: Properly send SIGSEGV when the vm86 state cannot be saved.
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 13/20] signal: Implement force_fatal_sig
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 13/20] signal: Implement force_fatal_sig
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 14/20] exit/syscall_user_dispatch: Send ordinary signals on failure
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v2 10/32] signal/vm86_32: Properly send SIGSEGV when the vm86 state cannot be saved.
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v2 10/32] signal/vm86_32: Properly send SIGSEGV when the vm86 state cannot be saved.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 10/32] signal/vm86_32: Properly send SIGSEGV when the vm86 state cannot be saved.
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V9 0/9] x86/Hyper-V: Add Hyper-V Isolation VM support(First part)
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH 05/20] signal/mips: Update (_save|_restore)_fp_context to fail with -EFAULT
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH V8 5/9] x86/sev-es: Expose sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH 2/7] stacktrace,sched: Make stack_trace_save_tsk() more robust
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/7] stacktrace,sched: Make stack_trace_save_tsk() more robust
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH V8 5/9] x86/sev-es: Expose sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 2/7] stacktrace,sched: Make stack_trace_save_tsk() more robust
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [RFC v2 3/3] tools/memory-model: litmus: Add two tests for unlock(A)+lock(B) ordering
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- [RFC v2 2/3] tools/memory-model: doc: Describe the requirement of the litmus-tests directory
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- [RFC v2 1/3] tools/memory-model: Provide extra ordering for unlock+lock pair on the same CPU
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- [RFC v2 0/3] memory model: Make unlock(A)+lock(B) on the same CPU RCtso
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH V8 5/9] x86/sev-es: Expose sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V9 7/9] x86/hyperv: Add ghcb hvcall support for SNP VM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V9 9/9] Drivers: hv : vmbus: Initialize VMbus ring buffer for Isolation VM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V9 8/9] Drivers: hv: vmbus: Add SNP support for VMbus channel initiate message
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V9 6/9] x86/hyperv: Add Write/Read MSR registers via ghcb page
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V9 5/9] x86/sev-es: Expose sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V9 4/9] Drivers: hv: vmbus: Mark vmbus ring buffer visible to host in Isolation VM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V9 3/9] x86/hyperv: Add new hvcall guest address host visibility support
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V9 2/9] x86/hyperv: Initialize shared memory boundary in the Isolation VM.
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V9 1/9] x86/hyperv: Initialize GHCB page in Isolation VM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V9 0/9] x86/Hyper-V: Add Hyper-V Isolation VM support(First part)
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH V8 5/9] x86/sev-es: Expose sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH V8 5/9] x86/sev-es: Expose sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [PATCH 10/20] signal/vm86_32: Properly send SIGSEGV when the vm86 state cannot be saved.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 05/20] signal/mips: Update (_save|_restore)_fp_context to fail with -EFAULT
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/2] arm64: PCI: hv: Add support for Hyper-V vPCI
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 1/2] PCI: hv: Make the code arch neutral by adding arch specific interfaces
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH 05/20] signal/mips: Update (_save|_restore)_fp_context to fail with -EFAULT
- From: "Maciej W. Rozycki" <macro@xxxxxxxxxxx>
- Re: [PATCH V8.1 5/9] x86/sev-es: Expose sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Borislav Petkov <bp@xxxxxxxxx>
- RE: [PATCH V8.1 5/9] x86/sev-es: Expose sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH V8 0/9] x86/Hyper-V: Add Hyper-V Isolation VM support(First part)
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 6/7] arch: __get_wchan() || ARCH_STACKWALK
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 5/7] powerpc, arm64: Mark __switch_to() as __sched
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 4/7] arch: Make ARCH_STACKWALK independent of STACKTRACE
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 2/7] stacktrace,sched: Make stack_trace_save_tsk() more robust
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 2/7] stacktrace,sched: Make stack_trace_save_tsk() more robust
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 2/7] stacktrace,sched: Make stack_trace_save_tsk() more robust
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 2/7] stacktrace,sched: Make stack_trace_save_tsk() more robust
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 4/7] arch: Make ARCH_STACKWALK independent of STACKTRACE
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 1/7] x86: Fix __get_wchan() for !STACKTRACE
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/7] stacktrace,sched: Make stack_trace_save_tsk() more robust
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 3/7] ARM: implement ARCH_STACKWALK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 4/7] arch: Make ARCH_STACKWALK independent of STACKTRACE
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 5/7] powerpc, arm64: Mark __switch_to() as __sched
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 6/7] arch: __get_wchan() || ARCH_STACKWALK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 2/7] stacktrace,sched: Make stack_trace_save_tsk() more robust
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 7/7] selftests: proc: Make sure wchan works when it exists
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 0/7] arch: More wchan fixes
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 1/7] x86: Fix __get_wchan() for !STACKTRACE
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 6/7] arch: __get_wchan() || ARCH_STACKWALK
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 3/7] ARM: implement ARCH_STACKWALK
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 4/7] arch: Make ARCH_STACKWALK independent of STACKTRACE
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 0/7] arch: More wchan fixes
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 5/7] powerpc, arm64: Mark __switch_to() as __sched
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] locking: Generic ticket lock
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- [PATCH V8.1 6/9] x86/hyperv: Add Write/Read MSR registers via ghcb page
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH V8 5/9] x86/sev-es: Expose sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V8.1 5/9] x86/sev-es: Expose sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH] locking: Generic ticket lock
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] locking: Generic ticket lock
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] selftests: proc: Make sure wchan works when it exists
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 0/2] MIPS: convert to generic entry
- From: Feiyang Chen <chris.chenfeiyang@xxxxxxxxx>
- Re: [PATCH] locking: Generic ticket lock
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH] selftests: proc: Make sure wchan works when it exists
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH 10/20] signal/vm86_32: Properly send SIGSEGV when the vm86 state cannot be saved.
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH 10/20] signal/vm86_32: Properly send SIGSEGV when the vm86 state cannot be saved.
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] selftests: proc: Make sure wchan works when it exists
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] selftests: proc: Make sure wchan works when it exists
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] selftests: proc: Make sure wchan works when it exists
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH] selftests: proc: Make sure wchan works when it exists
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 2/2] x86/mm: nuke PAGE_KERNEL_IO
- From: Lucas De Marchi <lucas.demarchi@xxxxxxxxx>
- [PATCH 1/2] drm/i915/gem: stop using PAGE_KERNEL_IO
- From: Lucas De Marchi <lucas.demarchi@xxxxxxxxx>
- [PATCH 0/2] Nuke PAGE_KERNEL_IO
- From: Lucas De Marchi <lucas.demarchi@xxxxxxxxx>
- Re: [PATCH] locking: Generic ticket lock
- From: Waiman Long <longman@xxxxxxxxxx>
- Re: [PATCH] selftests: proc: Make sure wchan works when it exists
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 14/20] exit/syscall_user_dispatch: Send ordinary signals on failure
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 10/20] signal/vm86_32: Properly send SIGSEGV when the vm86 state cannot be saved.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 15/20] signal/sparc32: Exit with a fatal signal when try_to_clear_window_buffer fails
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 14/20] exit/syscall_user_dispatch: Send ordinary signals on failure
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 13/20] signal: Implement force_fatal_sig
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 20/20] exit/r8188eu: Replace the macro thread_exit with a simple return 0
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 14/20] exit/syscall_user_dispatch: Send ordinary signals on failure
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 19/20] exit/rtl8712: Replace the macro thread_exit with a simple return 0
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 18/20] exit/rtl8723bs: Replace the macro thread_exit with a simple return 0
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 17/20] signal/x86: In emulate_vsyscall force a signal instead of calling do_exit
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 14/20] exit/syscall_user_dispatch: Send ordinary signals on failure
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: [PATCH 16/20] signal/sparc32: In setup_rt_frame and setup_fram use force_fatal_sig
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 15/20] signal/sparc32: Exit with a fatal signal when try_to_clear_window_buffer fails
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 13/20] signal: Implement force_fatal_sig
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] locking: Generic ticket lock
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 14/20] exit/syscall_user_dispatch: Send ordinary signals on failure
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 02/20] exit: Remove calls of do_exit after noreturn versions of die
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 13/20] signal: Implement force_fatal_sig
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH V8 5/9] x86/sev-es: Expose sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 12/20] exit/kthread: Have kernel threads return instead of calling do_exit
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 11/20] signal/s390: Use force_sigsegv in default_trap_handler
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 10/20] signal/vm86_32: Properly send SIGSEGV when the vm86 state cannot be saved.
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 09/20] signal/vm86_32: Replace open coded BUG_ON with an actual BUG_ON
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 08/20] signal/sparc: In setup_tsb_params convert open coded BUG into BUG
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 07/20] signal/powerpc: On swapcontext failure force SIGSEGV
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 06/20] signal/sh: Use force_sig(SIGKILL) instead of do_group_exit(SIGKILL)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 05/20] signal/mips: Update (_save|_restore)_fp_context to fail with -EFAULT
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 04/20] signal/sparc32: Remove unreachable do_exit in do_sparc_fault
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 03/20] reboot: Remove the unreachable panic after do_exit in reboot(2)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 01/20] exit/doublefault: Remove apparently bogus comment about rewind_stack_do_exit
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 02/20] exit: Remove calls of do_exit after noreturn versions of die
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] x86/sev-es: Expose __sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V8 9/9] Drivers: hv : vmbus: Initialize VMbus ring buffer for Isolation VM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V8 8/9] Drivers: hv: vmbus: Add SNP support for VMbus channel initiate message
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V8 7/9] x86/hyperv: Add ghcb hvcall support for SNP VM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V8 6/9] x86/hyperv: Add Write/Read MSR registers via ghcb page
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V8 5/9] x86/sev-es: Expose sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V8 4/9] Drivers: hv: vmbus: Mark vmbus ring buffer visible to host in Isolation VM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V8 3/9] x86/hyperv: Add new hvcall guest address host visibility support
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V8 2/9] x86/hyperv: Initialize shared memory boundary in the Isolation VM.
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V8 1/9] x86/hyperv: Initialize GHCB page in Isolation VM
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [PATCH V8 0/9] x86/Hyper-V: Add Hyper-V Isolation VM support(First part)
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH] locking: Generic ticket lock
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] locking: Generic ticket lock
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 12/20] exit/kthread: Have kernel threads return instead of calling do_exit
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 18/20] exit/rtl8723bs: Replace the macro thread_exit with a simple return 0
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] locking: Generic ticket lock
- From: Stafford Horne <shorne@xxxxxxxxx>
- Re: [PATCH] locking: Generic ticket lock
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 21/20] signal: Replace force_sigsegv(SIGSEGV) with force_fatal_sig(SIGSEGV)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] locking: Generic ticket lock
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH] locking: Generic ticket lock
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 12/20] exit/kthread: Have kernel threads return instead of calling do_exit
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 21/20] signal: Replace force_sigsegv(SIGSEGV) with force_fatal_sig(SIGSEGV)
- From: Philippe Mathieu-Daudé <f4bug@xxxxxxxxx>
- Re: [PATCH 21/20] signal: Replace force_sigsegv(SIGSEGV) with force_fatal_sig(SIGSEGV)
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 20/20] exit/r8188eu: Replace the macro thread_exit with a simple return 0
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH 19/20] exit/rtl8712: Replace the macro thread_exit with a simple return 0
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH 18/20] exit/rtl8723bs: Replace the macro thread_exit with a simple return 0
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 21/20] signal: Replace force_sigsegv(SIGSEGV) with force_fatal_sig(SIGSEGV)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 13/20] signal: Implement force_fatal_sig
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 13/20] signal: Implement force_fatal_sig
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 06/20] signal/sh: Use force_sig(SIGKILL) instead of do_group_exit(SIGKILL)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] PCI: hv: Make the code arch neutral by adding arch specific interfaces
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- [PATCH 20/20] exit/r8188eu: Replace the macro thread_exit with a simple return 0
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 19/20] exit/rtl8712: Replace the macro thread_exit with a simple return 0
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 18/20] exit/rtl8723bs: Replace the macro thread_exit with a simple return 0
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 17/20] signal/x86: In emulate_vsyscall force a signal instead of calling do_exit
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 16/20] signal/sparc32: In setup_rt_frame and setup_fram use force_fatal_sig
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 15/20] signal/sparc32: Exit with a fatal signal when try_to_clear_window_buffer fails
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 13/20] signal: Implement force_fatal_sig
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 14/20] exit/syscall_user_dispatch: Send ordinary signals on failure
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 12/20] exit/kthread: Have kernel threads return instead of calling do_exit
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 11/20] signal/s390: Use force_sigsegv in default_trap_handler
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 10/20] signal/vm86_32: Properly send SIGSEGV when the vm86 state cannot be saved.
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 09/20] signal/vm86_32: Replace open coded BUG_ON with an actual BUG_ON
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 08/20] signal/sparc: In setup_tsb_params convert open coded BUG into BUG
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 07/20] signal/powerpc: On swapcontext failure force SIGSEGV
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 06/20] signal/sh: Use force_sig(SIGKILL) instead of do_group_exit(SIGKILL)
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 05/20] signal/mips: Update (_save|_restore)_fp_context to fail with -EFAULT
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 04/20] signal/sparc32: Remove unreachable do_exit in do_sparc_fault
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 02/20] exit: Remove calls of do_exit after noreturn versions of die
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 03/20] reboot: Remove the unreachable panic after do_exit in reboot(2)
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 01/20] exit/doublefault: Remove apparently bogus comment about rewind_stack_do_exit
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 00/20] exit cleanups
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v5 07/16] x86/kvm: Use bounce buffers for TD guest
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v5 06/16] x86/tdx: Make DMA pages shared
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 06/16] x86/tdx: Make DMA pages shared
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v5 07/16] x86/kvm: Use bounce buffers for TD guest
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 06/16] x86/tdx: Make DMA pages shared
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 01/16] x86/mm: Move force_dma_unencrypted() to common code
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 04/16] x86/tdx: Make pages shared in ioremap()
- From: Sathyanarayanan Kuppuswamy <sathyanarayanan.kuppuswamy@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 07/16] x86/kvm: Use bounce buffers for TD guest
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v5 06/16] x86/tdx: Make DMA pages shared
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] x86/sev-es: Expose __sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v5 01/16] x86/mm: Move force_dma_unencrypted() to common code
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v5 04/16] x86/tdx: Make pages shared in ioremap()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- RE: [PATCH v3 2/2] arm64: PCI: hv: Add support for Hyper-V vPCI
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v3 1/2] PCI: hv: Make the code arch neutral by adding arch specific interfaces
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH] x86/sev-es: Expose __sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH] x86/sev-es: Expose __sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86/sev-es: Expose __sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH] x86/sev-es: Expose __sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH] x86/sev-es: Expose __sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86/sev-es: Expose __sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH] x86/sev-es: Expose __sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH v2 07/11] riscv: cmo: Add dma-noncoherency support
- From: Guo Ren <guoren@xxxxxxxxxx>
- [PATCH] x86/sev-es: Expose __sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH V7 5/9] x86/sev-es: Expose __sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 0/2] MIPS: convert to generic entry
- From: "Maciej W. Rozycki" <macro@xxxxxxxxxxx>
- Re: Another possible use for LKMM, or a subset (strengthening) thereof
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: Another possible use for LKMM, or a subset (strengthening) thereof
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH v2 0/2] MIPS: convert to generic entry
- From: Feiyang Chen <chris.chenfeiyang@xxxxxxxxx>
- Re: Another possible use for LKMM, or a subset (strengthening) thereof
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: Another possible use for LKMM, or a subset (strengthening) thereof
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: Another possible use for LKMM, or a subset (strengthening) thereof
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v2 0/2] MIPS: convert to generic entry
- From: "Maciej W. Rozycki" <macro@xxxxxxxxxxx>
- Re: [PATCH v5 12/16] PCI: Add pci_iomap_host_shared(), pci_iomap_host_shared_range()
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH V7 5/9] x86/sev-es: Expose __sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH v5 12/16] PCI: Add pci_iomap_host_shared(), pci_iomap_host_shared_range()
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 12/16] PCI: Add pci_iomap_host_shared(), pci_iomap_host_shared_range()
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 12/16] PCI: Add pci_iomap_host_shared(), pci_iomap_host_shared_range()
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 07/12] asm-generic: Define 'func_desc_t' to commonly describe function descriptors
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH v3 04/12] powerpc: Prepare func_desc_t for refactorisation
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v3 07/12] asm-generic: Define 'func_desc_t' to commonly describe function descriptors
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- RE: [PATCH v5 12/16] PCI: Add pci_iomap_host_shared(), pci_iomap_host_shared_range()
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: [PATCH v3 07/12] asm-generic: Define 'func_desc_t' to commonly describe function descriptors
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH v3 04/12] powerpc: Prepare func_desc_t for refactorisation
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH v3 01/12] powerpc: Move and rename func_descr_t
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH v5 12/16] PCI: Add pci_iomap_host_shared(), pci_iomap_host_shared_range()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v5 12/16] PCI: Add pci_iomap_host_shared(), pci_iomap_host_shared_range()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v5 12/16] PCI: Add pci_iomap_host_shared(), pci_iomap_host_shared_range()
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- RE: [PATCH v5 12/16] PCI: Add pci_iomap_host_shared(), pci_iomap_host_shared_range()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH] asm-generic: bug.h: add unreachable() in BUG() for CONFIG_BUG not set
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH] asm-generic: bug.h: add unreachable() in BUG() for CONFIG_BUG not set
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] asm-generic: bug.h: add unreachable() in BUG() for CONFIG_BUG not set
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH] asm-generic: bug.h: add unreachable() in BUG() for CONFIG_BUG not set
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] asm-generic: bug.h: add unreachable() in BUG() for CONFIG_BUG not set
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH] asm-generic: bug.h: add unreachable() in BUG() for CONFIG_BUG not set
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] asm-generic: bug.h: add unreachable() in BUG() for CONFIG_BUG not set
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [RFC PATCH] lkdtm: Replace lkdtm_rodata_do_nothing() by do_nothing()
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3 11/12] lkdtm: Fix execute_[user]_location()
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3 07/12] asm-generic: Define 'func_desc_t' to commonly describe function descriptors
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3 06/12] asm-generic: Define CONFIG_HAVE_FUNCTION_DESCRIPTORS
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3 00/12] Fix LKDTM for PPC64/IA64/PARISC
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3 04/12] powerpc: Prepare func_desc_t for refactorisation
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3 12/12] lkdtm: Add a test for function descriptors protection
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3 08/12] asm-generic: Refactor dereference_[kernel]_function_descriptor()
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3 05/12] ia64: Rename 'ip' to 'addr' in 'struct fdesc'
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3 02/12] powerpc: Use 'struct func_desc' instead of 'struct ppc64_opd_entry'
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3 03/12] powerpc: Remove 'struct ppc64_opd_entry'
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3 09/12] lkdtm: Force do_nothing() out of line
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3 10/12] lkdtm: Really write into kernel text in WRITE_KERN
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3 01/12] powerpc: Move and rename func_descr_t
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [RFC PATCH v2 07/11] riscv: cmo: Add dma-noncoherency support
- From: twd2 <twd2.me@xxxxxxxxx>
- Re: [PATCH v2 11/13] lkdtm: Fix lkdtm_EXEC_RODATA()
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [GIT PULL] csky fixes for v5.15-rc6
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 12/13] lkdtm: Fix execute_[user]_location()
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v2 11/13] lkdtm: Fix lkdtm_EXEC_RODATA()
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v2 13/13] lkdtm: Add a test for function descriptors protection
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [GIT PULL] csky fixes for v5.15-rc6
- [GIT PULL] csky fixes for v5.15-rc6
- Re: [PATCH v2 13/13] lkdtm: Add a test for function descriptors protection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 11/13] lkdtm: Fix lkdtm_EXEC_RODATA()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 12/13] lkdtm: Fix execute_[user]_location()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/4] x86: Various clean-ups in support of FGKASLR
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- RE: [PATCH v3 0/2] PCI: hv: Hyper-V vPCI for ARM64
- From: Sunil Muthuswamy <sunilmut@xxxxxxxxxxxxx>
- Re: [PATCH v2 06/13] asm-generic: Use HAVE_FUNCTION_DESCRIPTORS to define associated stubs
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH v2 06/13] asm-generic: Use HAVE_FUNCTION_DESCRIPTORS to define associated stubs
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH v2 08/13] asm-generic: Refactor dereference_[kernel]_function_descriptor()
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH v5 16/16] x86/tdx: Add cmdline option to force use of ioremap_host_shared
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH v2 06/13] asm-generic: Use HAVE_FUNCTION_DESCRIPTORS to define associated stubs
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v2 06/13] asm-generic: Use HAVE_FUNCTION_DESCRIPTORS to define associated stubs
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH v2 03/13] powerpc: Remove func_descr_t
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH v2 02/13] powerpc: Rename 'funcaddr' to 'addr' in 'struct ppc64_opd_entry'
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH v2 01/13] powerpc: Move 'struct ppc64_opd_entry' back into asm/elf.h
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH v5 16/16] x86/tdx: Add cmdline option to force use of ioremap_host_shared
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 03/13] powerpc: Remove func_descr_t
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v2 02/13] powerpc: Rename 'funcaddr' to 'addr' in 'struct ppc64_opd_entry'
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- RE: [PATCH v3 0/2] PCI: hv: Hyper-V vPCI for ARM64
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [RFC PATCH] LKMM: Add ctrl_dep() macro for control dependency
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 03/13] powerpc: Remove func_descr_t
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH v2 02/13] powerpc: Rename 'funcaddr' to 'addr' in 'struct ppc64_opd_entry'
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH v2 00/13] Fix LKDTM for PPC64/IA64/PARISC
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH v2 01/13] powerpc: Move 'struct ppc64_opd_entry' back into asm/elf.h
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [RFC PATCH] LKMM: Add ctrl_dep() macro for control dependency
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 0/7] wchan: Fix wchan support
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
[Index of Archives]
[Kernel Announce]
[IETF Annouce]
[Netdev]
[Netfilter]
[Bugtraq]