Linux Arch
[Prev Page][Next Page]
- Re: [RFC PATCH 2/12] x86/Hyper-V: Add new hvcall guest address host visibility support
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [RFT PATCH v3 05/27] arm64: cputype: Add CPU implementor & types for the Apple M1 cores
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 08/27] asm-generic/io.h: Add a non-posted variant of ioremap()
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 06/27] dt-bindings: timer: arm,arch_timer: Add interrupt-names support
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 02/27] dt-bindings: vendor-prefixes: Add apple prefix
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 00/27] Apple M1 SoC platform bring-up
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 01/27] arm64: Cope with CPUs stuck in VHE mode
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 24/27] tty: serial: samsung_tty: Add support for Apple UARTs
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 26/27] dt-bindings: display: Add apple,simple-framebuffer
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 22/27] tty: serial: samsung_tty: Use devm_ioremap_resource
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 27/27] arm64: apple: Add initial Apple Mac mini (M1, 2020) devicetree
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 21/27] tty: serial: samsung_tty: IRQ rework
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 25/27] tty: serial: samsung_tty: Add earlycon support for Apple UARTs
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 19/27] tty: serial: samsung_tty: Add ucon_mask parameter
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 20/27] tty: serial: samsung_tty: Add s3c24xx_port_type
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 23/27] dt-bindings: serial: samsung: Add apple,s5l-uart compatible
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 16/27] irqchip/apple-aic: Add support for the Apple Interrupt Controller
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 18/27] tty: serial: samsung_tty: Separate S3C64XX ops structure
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 12/27] of/address: Add infrastructure to declare MMIO as non-posted
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 15/27] dt-bindings: interrupt-controller: Add DT bindings for apple-aic
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 17/27] arm64: Kconfig: Introduce CONFIG_ARCH_APPLE
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 10/27] docs: driver-api: device-io: Document ioremap() variants & access funcs
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 13/27] arm64: Add Apple vendor-specific system registers
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 09/27] docs: driver-api: device-io: Document I/O access functions
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 07/27] arm64: arch_timer: implement support for interrupt-names
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 14/27] arm64: move ICH_ sysreg bits from arm-gic-v3.h to sysreg.h
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 11/27] arm64: Implement ioremap_np() to map MMIO as nGnRnE
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 04/27] dt-bindings: arm: cpus: Add apple,firestorm & icestorm compatibles
- From: Hector Martin <marcan@xxxxxxxxx>
- [RFT PATCH v3 03/27] dt-bindings: arm: apple: Add bindings for Apple ARM platforms
- From: Hector Martin <marcan@xxxxxxxxx>
- [PATCH] sh: remove duplicate include in tlb.h
- From: menglong8.dong@xxxxxxxxx
- Re: [PATCH] MIPS: clean up CONFIG_MIPS_PGD_C0_CONTEXT handling
- From: "Maciej W. Rozycki" <macro@xxxxxxxxxxx>
- Re: [PATCH] MIPS: clean up CONFIG_MIPS_PGD_C0_CONTEXT handling
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- [PATCH memory-model 3/3] tools/memory-model: Add access-marking documentation
- [PATCH memory-model 1/3] doc: Update rcu_dereference.rst reference
- [PATCH memory-model 2/3] tools/memory-model: Remove reference to atomic_ops.rst
- Re: [RESEND PATCH 1/2] ARM64: enable GENERIC_FIND_FIRST_BIT
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH memory-model 0/3] LKMM updates for v5.13
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v2 0/7] Improve boot command line handling
- From: Daniel Walker <danielwa@xxxxxxxxx>
- Re: [PATCH v2 1/7] cmdline: Add generic function to build command line.
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v2 4/7] cmdline: Add capability to prepend the command line
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2 1/7] cmdline: Add generic function to build command line.
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2 1/7] cmdline: Add generic function to build command line.
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2 0/7] Improve boot command line handling
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v2 1/7] cmdline: Add generic function to build command line.
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v2 6/7] cmdline: Gives architectures opportunity to use generically defined boot cmdline manipulation
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2 0/7] Improve boot command line handling
- From: Daniel Walker <danielwa@xxxxxxxxx>
- Re: [PATCH v2 1/7] cmdline: Add generic function to build command line.
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2 1/7] cmdline: Add generic function to build command line.
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [RFC PATCH 3/12] x86/HV: Initialize GHCB page and shared memory boundary
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [PATCH v21 08/26] x86/mm: Introduce _PAGE_COW
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH 4/12] HV: Add Write/Read MSR registers via ghcb
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- Re: [RFC PATCH 2/12] x86/Hyper-V: Add new hvcall guest address host visibility support
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- [PATCH v18 9/9] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v18 8/9] arch, mm: wire up memfd_secret system call where relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v18 6/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v18 5/9] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v18 3/9] riscv/Kconfig: make direct map manipulation options depend on MMU
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v18 2/9] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v18 1/9] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v18 7/9] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v18 4/9] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v18 0/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 0/3] Introduce the for_each_set_clump macro
- From: Bartosz Golaszewski <bgolaszewski@xxxxxxxxxxxx>
- Re: [PATCH] module: remove extra spaces in include/asm-generic/tlb.h
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- [PATCH] module: remove extra spaces in include/asm-generic/tlb.h
- From: menglong8.dong@xxxxxxxxx
- Re: [PATCH v2 0/7] Improve boot command line handling
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH v21 08/26] x86/mm: Introduce _PAGE_COW
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- RE: [PATCH v3 07/10] clocksource/drivers/hyper-v: Handle vDSO differences inline
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v3 10/10] clocksource/drivers/hyper-v: Move handling of STIMER0 interrupts
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [PATCH v3 08/10] clocksource/drivers/hyper-v: Handle sched_clock differences inline
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [PATCH v3 07/10] clocksource/drivers/hyper-v: Handle vDSO differences inline
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- [PATCH v3 04/10] Drivers: hv: vmbus: Move hyperv_report_panic_msg to arch neutral code
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v3 09/10] clocksource/drivers/hyper-v: Set clocksource rating based on Hyper-V feature
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v3 10/10] clocksource/drivers/hyper-v: Move handling of STIMER0 interrupts
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v3 08/10] clocksource/drivers/hyper-v: Handle sched_clock differences inline
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v3 02/10] x86/hyper-v: Move hv_message_type to architecture neutral module
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v3 03/10] Drivers: hv: Redo Hyper-V synthetic MSR get/set functions
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v3 07/10] clocksource/drivers/hyper-v: Handle vDSO differences inline
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v3 01/10] Drivers: hv: vmbus: Move Hyper-V page allocator to arch neutral code
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v3 05/10] Drivers: hv: vmbus: Handle auto EOI quirk inline
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v3 06/10] Drivers: hv: vmbus: Move handling of VMbus interrupts
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v3 00/10] Refactor arch specific Hyper-V code
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/7] cmdline: Gives architectures opportunity to use generically defined boot cmdline manipulation
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 0/7] Improve boot command line handling
- From: Daniel Walker <danielwa@xxxxxxxxx>
- RE: ** POTENTIAL FRAUD ALERT - RED HAT ** [PATCH v2 01/10] Drivers: hv: vmbus: Move Hyper-V page allocator to arch neutral code
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 3/7] powerpc: convert to generic builtin command line
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v2 4/7] cmdline: Add capability to prepend the command line
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v2 0/7] Improve boot command line handling
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v2 1/7] cmdline: Add generic function to build command line.
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v2 2/7] drivers: of: use cmdline building function
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v2 0/7] Improve boot command line handling
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v2 6/7] cmdline: Gives architectures opportunity to use generically defined boot cmdline manipulation
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v2 7/7] powerpc: use generic CMDLINE manipulations
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v2 5/7] powerpc: add capability to prepend default command line
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v2 08/10] clocksource/drivers/hyper-v: Handle sched_clock differences inline
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [PATCH v2 07/10] clocksource/drivers/hyper-v: Handle vDSO differences inline
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: ** POTENTIAL FRAUD ALERT - RED HAT ** [PATCH v2 01/10] Drivers: hv: vmbus: Move Hyper-V page allocator to arch neutral code
- From: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
- RE: [PATCH v2 10/10] clocksource/drivers/hyper-v: Move handling of STIMER0 interrupts
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 08/10] clocksource/drivers/hyper-v: Handle sched_clock differences inline
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v2 07/10] clocksource/drivers/hyper-v: Handle vDSO differences inline
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/6] uapi: Define the aux vector AT_MINSIGSTKSZ
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v21 08/26] x86/mm: Introduce _PAGE_COW
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v2 10/10] clocksource/drivers/hyper-v: Move handling of STIMER0 interrupts
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [PATCH 12/11] pragma once: scripted treewide conversion
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH v21 08/26] x86/mm: Introduce _PAGE_COW
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 09/10] clocksource/drivers/hyper-v: Set clocksource rating based on Hyper-V feature
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [PATCH 2/2] MIPS: enable GENERIC_FIND_FIRST_BIT
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- [PATCH 4/4] perf: csky: Using CPUHP_AP_ONLINE_DYN
- [PATCH 3/4] clocksource: csky: Using CPUHP_AP_ONLINE_DYN
- [PATCH 2/4] clocksource: riscv: Using CPUHP_AP_ONLINE_DYN
- [PATCH 1/4] irqchip: riscv: Using CPUHP_AP_ONLINE_DYN
- Re: [PATCH v2 08/10] clocksource/drivers/hyper-v: Handle sched_clock differences inline
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [PATCH v2 07/10] clocksource/drivers/hyper-v: Handle vDSO differences inline
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [PATCH v2 00/10] Refactor arch specific Hyper-V code
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- Re: [GIT PULL] csky changes for v5.12-rc1
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [GIT PULL] csky changes for v5.12-rc1
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH] MIPS: loongson64: alloc pglist_data at run time
- From: Jinyang He <hejinyang@xxxxxxxxxxx>
- [PATCH v2 09/10] clocksource/drivers/hyper-v: Set clocksource rating based on Hyper-V feature
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 10/10] clocksource/drivers/hyper-v: Move handling of STIMER0 interrupts
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 07/10] clocksource/drivers/hyper-v: Handle vDSO differences inline
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 08/10] clocksource/drivers/hyper-v: Handle sched_clock differences inline
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 06/10] Drivers: hv: vmbus: Move handling of VMbus interrupts
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 05/10] Drivers: hv: vmbus: Handle auto EOI quirk inline
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 02/10] x86/hyper-v: Move hv_message_type to architecture neutral module
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 03/10] Drivers: hv: Redo Hyper-V synthetic MSR get/set functions
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 04/10] Drivers: hv: vmbus: Move hyperv_report_panic_msg to arch neutral code
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 01/10] Drivers: hv: vmbus: Move Hyper-V page allocator to arch neutral code
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [PATCH v2 00/10] Refactor arch specific Hyper-V code
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH] MIPS: clean up CONFIG_MIPS_PGD_C0_CONTEXT handling
- From: "Maciej W. Rozycki" <macro@xxxxxxxxxxx>
- Re: [GIT PULL] csky changes for v5.12-rc1
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [GIT PULL] csky changes for v5.12-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH] ipc/msg: add msgsnd_timed and msgrcv_timed syscall for system V message queue
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 12/11] pragma once: scripted treewide conversion
- From: Alexey Dobriyan <adobriyan@xxxxxxxxx>
- Re: [PATCH] ipc/msg: add msgsnd_timed and msgrcv_timed syscall for system V message queue
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [RFC PATCH 4/12] HV: Add Write/Read MSR registers via ghcb
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 3/12] x86/HV: Initialize GHCB page and shared memory boundary
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 00/12] x86/Hyper-V: Add Hyper-V Isolation VM support
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- [RFC PATCH 2/12] x86/Hyper-V: Add new hvcall guest address host visibility support
- From: Tianyu Lan <ltykernel@xxxxxxxxx>
- Re: [PATCH] MIPS: loongson64: alloc pglist_data at run time
- From: Sergei Shtylyov <sergei.shtylyov@xxxxxxxxx>
- [GIT PULL] csky changes for v5.12-rc1
- [PATCH v6 6/6] selftest/x86/signal: Include test cases for validating sigaltstack
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v6 4/6] selftest/sigaltstack: Use the AT_MINSIGSTKSZ aux vector if available
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v6 3/6] x86/elf: Support a new ELF aux vector AT_MINSIGSTKSZ
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v6 5/6] x86/signal: Detect and prevent an alternate signal stack overflow
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v6 2/6] x86/signal: Introduce helpers to get the maximum signal frame size
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v6 1/6] uapi: Define the aux vector AT_MINSIGSTKSZ
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v6 0/6] x86: Improve Minimum Alternate Stack Size
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH] ipc/msg: add msgsnd_timed and msgrcv_timed syscall for system V message queue
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH] MIPS: loongson64: alloc pglist_data at run time
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- [PATCH] MIPS: replace -pg with CC_FLAGS_FTRACE
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- [PATCH V2] MIPS: clean up CONFIG_MIPS_PGD_C0_CONTEXT
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- [PATCH] MIPS: clean up CONFIG_MIPS_PGD_C0_CONTEXT handling
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- Re: [PATCH 4/4] kbuild: re-implement CONFIG_TRIM_UNUSED_KSYMS to make it work in one-pass
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 2/2] MIPS: enable GENERIC_FIND_FIRST_BIT
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH 2/2] MIPS: enable GENERIC_FIND_FIRST_BIT
- From: Huacai Chen <chenhuacai@xxxxxxxxxx>
- Re: [PATCH 4/4] kbuild: re-implement CONFIG_TRIM_UNUSED_KSYMS to make it work in one-pass
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH 4/4] kbuild: re-implement CONFIG_TRIM_UNUSED_KSYMS to make it work in one-pass
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 0/4] kbuild: build speed improvment of CONFIG_TRIM_UNUSED_KSYMS
- From: Nicolas Pitre <nico@xxxxxxxxxxx>
- Re: [PATCH v9 0/3] Kbuild: DWARF v5 support
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- [PATCH v29 09/12] arch: Wire up Landlock syscalls
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v29 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 1/4] kbuild: fix UNUSED_KSYMS_WHITELIST for Clang LTO
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH v29 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v29 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v29 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v29 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v29 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v29 04/12] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v29 03/12] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v29 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v29 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v29 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 0/4] kbuild: build speed improvment of CONFIG_TRIM_UNUSED_KSYMS
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 4/4] kbuild: re-implement CONFIG_TRIM_UNUSED_KSYMS to make it work in one-pass
- From: kernel test robot <lkp@xxxxxxxxx>
- RE: [PATCH 10/10] clocksource/drivers/hyper-v: Move handling of STIMER0 interrupts
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 4/4] kbuild: re-implement CONFIG_TRIM_UNUSED_KSYMS to make it work in one-pass
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/4] kbuild: fix UNUSED_KSYMS_WHITELIST for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH 1/3] PCI: Introduce quirk hook after driver shutdown callback
- From: Kai-Heng Feng <kai.heng.feng@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] kbuild: build speed improvment of CONFIG_TRIM_UNUSED_KSYMS
- From: Nicolas Pitre <nico@xxxxxxxxxxx>
- [PATCH 1/4] kbuild: fix UNUSED_KSYMS_WHITELIST for Clang LTO
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 2/4] export.h: make __ksymtab_strings per-symbol section
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 4/4] kbuild: re-implement CONFIG_TRIM_UNUSED_KSYMS to make it work in one-pass
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 3/4] kbuild: separate out vmlinux.lds generation
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 0/4] kbuild: build speed improvment of CONFIG_TRIM_UNUSED_KSYMS
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [RESEND PATCH 1/2] ARM64: enable GENERIC_FIND_FIRST_BIT
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH 2/2] MIPS: enable GENERIC_FIND_FIRST_BIT
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [RESEND PATCH 1/2] ARM64: enable GENERIC_FIND_FIRST_BIT
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH 0/2] arch: enable GENERIC_FIND_FIRST_BIT for MIPS and ARM64
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH 2/3] Documentation: riscv: Add documentation that describes the VM layout
- From: Alex Ghiti <alex@xxxxxxxx>
- Re: [PATCH] arm64: enable GENERIC_FIND_FIRST_BIT
- From: Alexander Lobakin <alobakin@xxxxx>
- Re: [PATCH 2/3] Documentation: riscv: Add documentation that describes the VM layout
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH 3/3] riscv: Prepare ptdump for vm layout dynamic addresses
- From: Alexandre Ghiti <alex@xxxxxxxx>
- [PATCH 2/3] Documentation: riscv: Add documentation that describes the VM layout
- From: Alexandre Ghiti <alex@xxxxxxxx>
- [PATCH 1/3] riscv: Move kernel mapping outside of linear mapping
- From: Alexandre Ghiti <alex@xxxxxxxx>
- [PATCH 0/3] Move kernel mapping outside the linear mapping
- From: Alexandre Ghiti <alex@xxxxxxxx>
- Re: [PATCH v9 01/16] tracing: move function tracer options to Kconfig (causing parisc build failures)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v9 01/16] tracing: move function tracer options to Kconfig (causing parisc build failures)
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v9 01/16] tracing: move function tracer options to Kconfig (causing parisc build failures)
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v9 01/16] tracing: move function tracer options to Kconfig (causing parisc build failures)
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v9 01/16] tracing: move function tracer options to Kconfig (causing parisc build failures)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v9 01/16] tracing: move function tracer options to Kconfig (causing parisc build failures)
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v21 06/26] x86/cet: Add control-protection fault handler
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v21 06/26] x86/cet: Add control-protection fault handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v21 06/26] x86/cet: Add control-protection fault handler
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v21 06/26] x86/cet: Add control-protection fault handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v21 06/26] x86/cet: Add control-protection fault handler
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v21 06/26] x86/cet: Add control-protection fault handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v21 06/26] x86/cet: Add control-protection fault handler
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v21 06/26] x86/cet: Add control-protection fault handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v21 05/26] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] arm64: enable GENERIC_FIND_FIRST_BIT
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH v21 05/26] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v21 05/26] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH] arm64: enable GENERIC_FIND_FIRST_BIT
- From: Alexander Lobakin <alobakin@xxxxx>
- Re: [PATCH] arm64: enable GENERIC_FIND_FIRST_BIT
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH] asm-generic/ioctl.h: use BUILD_BUG_ON_ZERO() for type check
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH] arm64: enable GENERIC_FIND_FIRST_BIT
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH] asm-generic/ioctl.h: use BUILD_BUG_ON_ZERO() for type check
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH RFC 0/4] Add support for synchronous signals on perf events
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH RFC 0/4] Add support for synchronous signals on perf events
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH RFC 2/4] signal: Introduce TRAP_PERF si_code and si_perf to siginfo
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH] asm-generic/ioctl.h: use BUILD_BUG_ON_ZERO() for type check
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH RFC 0/4] Add support for synchronous signals on perf events
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH RFC 3/4] perf/core: Add support for SIGTRAP on perf events
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH RFC 2/4] signal: Introduce TRAP_PERF si_code and si_perf to siginfo
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH RFC 4/4] perf/core: Add breakpoint information to siginfo on SIGTRAP
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH RFC 4/4] perf/core: Add breakpoint information to siginfo on SIGTRAP
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH RFC 4/4] perf/core: Add breakpoint information to siginfo on SIGTRAP
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH RFC 4/4] perf/core: Add breakpoint information to siginfo on SIGTRAP
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH RFC 3/4] perf/core: Add support for SIGTRAP on perf events
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH RFC 1/4] perf/core: Apply PERF_EVENT_IOC_MODIFY_ATTRIBUTES to children
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH RFC 4/4] perf/core: Add breakpoint information to siginfo on SIGTRAP
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH RFC 3/4] perf/core: Add support for SIGTRAP on perf events
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH RFC 2/4] signal: Introduce TRAP_PERF si_code and si_perf to siginfo
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH RFC 1/4] perf/core: Apply PERF_EVENT_IOC_MODIFY_ATTRIBUTES to children
- From: Marco Elver <elver@xxxxxxxxxx>
- [PATCH RFC 0/4] Add support for synchronous signals on perf events
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH mips-fixes] vmlinux.lds.h: catch even more instrumentation symbols into .data
- From: Alexander Lobakin <alobakin@xxxxx>
- Re: [PATCH mips-fixes] vmlinux.lds.h: catch even more instrumentation symbols into .data
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- Re: [PATCH mips-fixes] vmlinux.lds.h: catch even more instrumentation symbols into .data
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- Re: [PATCH mips-fixes] vmlinux.lds.h: catch even more instrumentation symbols into .data
- From: Alexander Lobakin <alobakin@xxxxx>
- [PATCH mips-fixes] vmlinux.lds.h: catch even more instrumentation symbols into .data
- From: Alexander Lobakin <alobakin@xxxxx>
- [PATCH] asm-generic/ioctl.h: use BUILD_BUG_ON_ZERO() for type check
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 10/10] clocksource/drivers/hyper-v: Move handling of STIMER0 interrupts
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH 0/4] Kasan improvements and fixes
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- RE: [PATCH 09/10] clocksource/drivers/hyper-v: Set clocksource rating based on Hyper-V feature
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v17 08/10] PM: hibernate: disable when there are active secretmem users
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v17 08/10] PM: hibernate: disable when there are active secretmem users
- From: Dan Williams <dan.j.williams@xxxxxxxxx>
- Re: [PATCH v17 08/10] PM: hibernate: disable when there are active secretmem users
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH 09/10] clocksource/drivers/hyper-v: Set clocksource rating based on Hyper-V feature
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH 08/10] clocksource/drivers/hyper-v: Handle sched_clock differences inline
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v17 08/10] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: peter enderborg <peter.enderborg@xxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v17 08/10] PM: hibernate: disable when there are active secretmem users
- From: Matthew Garrett <mjg59@xxxxxxxxxxxxx>
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: pnagar@xxxxxxxxxxxxxx
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: pnagar@xxxxxxxxxxxxxx
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: pnagar@xxxxxxxxxxxxxx
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: pnagar@xxxxxxxxxxxxxx
- Re: [PATCH 07/10] clocksource/drivers/hyper-v: Handle vDSO differences inline
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH 06/10] Drivers: hv: vmbus: Move handling of VMbus interrupts
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH 05/10] Drivers: hv: vmbus: Handle auto EOI quirk inline
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH 04/10] Drivers: hv: vmbus: Move hyperv_report_panic_msg to arch neutral code
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH 03/10] Drivers: hv: Redo Hyper-V synthetic MSR get/set functions
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH 02/10] x86/hyper-v: Move hv_message_type to architecture neutral module
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH 01/10] Drivers: hv: vmbus: Move Hyper-V page allocator to arch neutral code
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH] MIPS: clean up CONFIG_MIPS_PGD_CONTEXT handling
- From: 黄沛 <huangpei@xxxxxxxxxxx>
- Re: [git pull] saner ELF compat handling
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 0/4] Kasan improvements and fixes
- From: Alex Ghiti <alex@xxxxxxxx>
- Re: [PATCH] MIPS: clean up CONFIG_MIPS_PGD_CONTEXT handling
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH] MIPS: loongson64: use 0b011 instead of 0b101 as xphys cached
- From: Jiaxun Yang <jiaxun.yang@xxxxxxxxxxx>
- [PATCH RFC tools/memory-model] Add access-marking documentation
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: David Hildenbrand <dhildenb@xxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: Mike Kravetz <mike.kravetz@xxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v28 07/12] landlock: Support filesystem access-control
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH 08/14] lib/Kconfig: introduce FAST_PATH option
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v12 13/14] mm/vmalloc: Hugepage vmalloc mappings
- From: Ding Tianhong <dingtianhong@xxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v12 13/14] mm/vmalloc: Hugepage vmalloc mappings
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH v12 13/14] mm/vmalloc: Hugepage vmalloc mappings
- From: Ding Tianhong <dingtianhong@xxxxxxxxxx>
- Re: [PATCH v5 4/5] x86/signal: Detect and prevent an alternate signal stack overflow
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 06/14] bitsperlong.h: introduce SMALL_CONST() macro
- From: Rasmus Villemoes <linux@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH 04/14] lib: introduce BITS_{FIRST,LAST} macro
- From: Rasmus Villemoes <linux@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/14] lib/Kconfig: introduce FAST_PATH option
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH 14/14] MAINTAINERS: Add entry for the bitmap API
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH 14/14] MAINTAINERS: Add entry for the bitmap API
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH 11/14] lib: add fast path for find_next_*_bit()
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH 08/14] lib/Kconfig: introduce FAST_PATH option
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- [PATCH RFC] madvise.2: Document MADV_POPULATE
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: Rolf Eike Beer <eike-kernel@xxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: Michal Hocko <mhocko@xxxxxxxx>
- [PATCH 14/14] MAINTAINERS: Add entry for the bitmap API
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH 12/14] lib: add fast path for find_first_*_bit() and find_last_bit()
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH 13/14] tools: sync lib/find_bit implementation
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH 11/14] lib: add fast path for find_next_*_bit()
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH 10/14] tools: sync find_next_bit implementation
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH 09/14] lib: inline _find_next_bit() wrappers
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH 08/14] lib/Kconfig: introduce FAST_PATH option
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH 07/14] tools: introduce SMALL_CONST() macro
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH 06/14] bitsperlong.h: introduce SMALL_CONST() macro
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH 04/14] lib: introduce BITS_{FIRST,LAST} macro
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH 05/14] tools: sync BITS_MASK macros with the kernel
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH 03/14] arch: rearrange headers inclusion order in asm/bitops for m68k and sh
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH 02/14] tools: bitmap: sync function declarations with the kernel
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH v3 00/14] lib/find_bit: fast path for small bitmaps
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH 01/14] tools: disable -Wno-type-limits
- From: Yury Norov <yury.norov@xxxxxxxxx>
- [PATCH v21 7/7] x86/vdso: Insert endbr32/endbr64 to vDSO
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 6/7] x86/vdso/32: Add ENDBR32 to __kernel_vsyscall entry point
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 3/7] x86/cet/ibt: Handle signals for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 4/7] x86/cet/ibt: Update ELF header parsing for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 5/7] x86/cet/ibt: Update arch_prctl functions for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 26/26] mm: Introduce PROT_SHSTK for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 23/26] x86/cet/shstk: Handle thread shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 25/26] mm: Move arch_calc_vm_prot_bits() to arch/x86/include/asm/mman.h
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 24/26] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 22/26] ELF: Introduce arch_setup_elf_property()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 2/7] x86/cet/ibt: User-mode Indirect Branch Tracking support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 1/7] x86/cet/ibt: Update Kconfig for user-mode Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 0/7] Control-flow Enforcement: Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 21/26] x86/cet/shstk: Handle signals for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 17/26] mm/mmap: Add shadow stack pages to memory accounting
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 18/26] mm: Update can_follow_write_pte() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 20/26] x86/cet/shstk: User-mode shadow stack support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 19/26] mm: Re-introduce vm_flags to do_mmap()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 13/26] x86/mm: Shadow Stack page fault error checking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 16/26] mm: Add guard pages around a shadow stack.
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 12/26] mm: Introduce VM_SHSTK for shadow stack memory
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 14/26] x86/mm: Update maybe_mkwrite() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 15/26] mm: Fixup places that call pte_mkwrite() directly
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 10/26] x86/mm: Update pte_modify for _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 09/26] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 11/26] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 07/26] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 08/26] x86/mm: Introduce _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 06/26] x86/cet: Add control-protection fault handler
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 05/26] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 04/26] x86/cpufeatures: Introduce X86_FEATURE_CET and setup functions
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 02/26] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 03/26] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 01/26] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v21 00/26] Control-flow Enforcement: Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- [PATCH RFC] mm/madvise: introduce MADV_POPULATE to prefault/prealloc memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RESEND PATCH v2 0/6] lib/find_bit: fast path for small bitmaps
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- Re: [PATCH mips-next] vmlinux.lds.h: catch more UBSAN symbols into .data
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- Re: [PATCH mips-next] vmlinux.lds.h: catch more UBSAN symbols into .data
- From: Alexander Lobakin <alobakin@xxxxx>
- Re: [PATCH mips-next] vmlinux.lds.h: catch more UBSAN symbols into .data
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [RESEND PATCH v2 0/6] lib/find_bit: fast path for small bitmaps
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH mips-next] vmlinux.lds.h: catch more UBSAN symbols into .data
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- [PATCH] RTIC: selinux: ARM64: Move selinux_state to a separate page
- From: Preeti Nagar <pnagar@xxxxxxxxxxxxxx>
- Re: [RESEND PATCH v2 0/6] lib/find_bit: fast path for small bitmaps
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- [PATCH mips-next] vmlinux.lds.h: catch more UBSAN symbols into .data
- From: Alexander Lobakin <alobakin@xxxxx>
- Re: [RESEND PATCH v2 0/6] lib/find_bit: fast path for small bitmaps
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- [git pull] saner ELF compat handling
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v20 08/25] x86/mm: Introduce _PAGE_COW
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 00/27] arch: syscalls: unifiy all syscalltbl.sh into scripts/syscalltbl.sh
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH 21/27] sparc: remove wrong comment from arch/sparc/include/asm/Kbuild
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 3/3] gpio: xilinx: Utilize generic bitmap_get_value and _set_value
- From: William Breathitt Gray <vilhelm.gray@xxxxxxxxx>
- Re: [PATCH v2 2/3] gpio: thunderx: Utilize for_each_set_clump macro
- From: William Breathitt Gray <vilhelm.gray@xxxxxxxxx>
- Re: [PATCH v2 1/3] gpiolib: Introduce the for_each_set_clump macro
- From: William Breathitt Gray <vilhelm.gray@xxxxxxxxx>
- Re: [PATCH 02/27] x86/syscalls: fix -Wmissing-prototypes warnings from COND_SYSCALL()
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v5 1/5] uapi: Move the aux vector AT_MINSIGSTKSZ define to uapi
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 02/27] x86/syscalls: fix -Wmissing-prototypes warnings from COND_SYSCALL()
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v2 3/3] gpio: xilinx: Utilize generic bitmap_get_value and _set_value
- From: Syed Nayyar Waris <syednwaris@xxxxxxxxx>
- [PATCH v2 2/3] gpio: thunderx: Utilize for_each_set_clump macro
- From: Syed Nayyar Waris <syednwaris@xxxxxxxxx>
- [PATCH v2 1/3] gpiolib: Introduce the for_each_set_clump macro
- From: Syed Nayyar Waris <syednwaris@xxxxxxxxx>
- [PATCH v2 0/3] Introduce the for_each_set_clump macro
- From: Syed Nayyar Waris <syednwaris@xxxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH 4/4] microblaze: Remove support for gcc < 4
- From: Michal Simek <monstr@xxxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v20 21/25] x86/cet/shstk: Handle signals for shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v20 21/25] x86/cet/shstk: Handle signals for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v20 08/25] x86/mm: Introduce _PAGE_COW
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v28 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v20 21/25] x86/cet/shstk: Handle signals for shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v20 06/25] x86/cet: Add control-protection fault handler
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v20 25/25] mm: Introduce PROT_SHSTK for shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v20 11/25] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v20 08/25] x86/mm: Introduce _PAGE_COW
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v20 02/25] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v28 07/12] landlock: Support filesystem access-control
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v20 07/25] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v20 06/25] x86/cet: Add control-protection fault handler
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v20 02/25] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] locking/arch: Move qrwlock.h include after qspinlock.h
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- [PATCH v20 25/25] mm: Introduce PROT_SHSTK for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 21/25] x86/cet/shstk: Handle signals for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 24/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 18/25] mm: Update can_follow_write_pte() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 23/25] x86/cet/shstk: Handle thread shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 22/25] ELF: Introduce arch_setup_elf_property()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 6/7] x86/vdso/32: Add ENDBR32 to __kernel_vsyscall entry point
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 4/7] x86/cet/ibt: Update ELF header parsing for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 7/7] x86/vdso: Insert endbr32/endbr64 to vDSO
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 3/7] x86/cet/ibt: Handle signals for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 17/25] mm/mmap: Add shadow stack pages to memory accounting
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 19/25] mm: Re-introduce vm_flags to do_mmap()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 1/7] x86/cet/ibt: Update Kconfig for user-mode Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 20/25] x86/cet/shstk: User-mode shadow stack support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 14/25] x86/mm: Update maybe_mkwrite() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 16/25] mm: Add guard pages around a shadow stack.
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 06/25] x86/cet: Add control-protection fault handler
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 0/7] Control-flow Enforcement: Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 2/7] x86/cet/ibt: User-mode Indirect Branch Tracking support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 5/7] x86/cet/ibt: Update arch_prctl functions for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 15/25] mm: Fixup places that call pte_mkwrite() directly
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 05/25] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 03/25] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 11/25] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 13/25] x86/mm: Shadow Stack page fault error checking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 04/25] x86/cpufeatures: Introduce X86_FEATURE_CET and setup functions
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 12/25] mm: Introduce VM_SHSTK for shadow stack memory
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 02/25] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 00/25] Control-flow Enforcement: Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 10/25] x86/mm: Update pte_modify for _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 07/25] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 08/25] x86/mm: Introduce _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 09/25] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v20 01/25] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 3/4] asm-generic: div64: Remove always-true __div64_const32_is_OK()
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH bpf 1/4] net: add SO_NETNS_COOKIE socket option
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [PATCH 0/4] Remove checks for gcc < 4
- From: Geert Uytterhoeven <geert+renesas@xxxxxxxxx>
- [PATCH 3/4] asm-generic: div64: Remove always-true __div64_const32_is_OK()
- From: Geert Uytterhoeven <geert+renesas@xxxxxxxxx>
- [PATCH 4/4] microblaze: Remove support for gcc < 4
- From: Geert Uytterhoeven <geert+renesas@xxxxxxxxx>
- [PATCH 2/4] ARM: unified: Remove check for gcc < 4
- From: Geert Uytterhoeven <geert+renesas@xxxxxxxxx>
- [PATCH 1/4] ARM: div64: Remove always-true __div64_const32_is_OK() duplicate
- From: Geert Uytterhoeven <geert+renesas@xxxxxxxxx>
- [PATCH bpf 1/4] net: add SO_NETNS_COOKIE socket option
- From: Lorenz Bauer <lmb@xxxxxxxxxxxxxx>
- [PATCH bpf 0/4] Expose network namespace cookies to user space
- From: Lorenz Bauer <lmb@xxxxxxxxxxxxxx>
- Re: [PATCH v17 00/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v17 00/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v17 00/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v17 00/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v17 00/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v17 00/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v17 00/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: [PATCH v17 00/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [x86/signal] dc8df6e85d: kernel-selftests.sigaltstack.sas.fail
- From: "Bae, Chang Seok" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v19 08/25] x86/mm: Introduce _PAGE_COW
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v17 00/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v17 08/10] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v17 00/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: "Bae, Chang Seok" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v19 06/25] x86/cet: Add control-protection fault handler
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v19 06/25] x86/cet: Add control-protection fault handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] MIPS: make userspace mapping young by default
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v19 06/25] x86/cet: Add control-protection fault handler
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v19 06/25] x86/cet: Add control-protection fault handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v19 06/25] x86/cet: Add control-protection fault handler
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH] MIPS: make userspace mapping young by default
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v19 06/25] x86/cet: Add control-protection fault handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86/build: Disable CET instrumentation in the kernel for 32-bit too
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- [PATCH] x86/build: Disable CET instrumentation in the kernel for 32-bit too
- From: Borislav Petkov <bp@xxxxxxx>
- Re: PROBLEM: 5.11.0-rc7 fails to compile with error: ‘-mindirect-branch’ and ‘-fcf-protection’ are not compatible
- From: AC <achirvasub@xxxxxxxxx>
- Re: [PATCH v17 08/10] PM: hibernate: disable when there are active secretmem users
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v17 08/10] PM: hibernate: disable when there are active secretmem users
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v17 08/10] PM: hibernate: disable when there are active secretmem users
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: PROBLEM: 5.11.0-rc7 fails to compile with error: ‘-mindirect-branch’ and ‘-fcf-protection’ are not compatible
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v17 08/10] PM: hibernate: disable when there are active secretmem users
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v17 08/10] PM: hibernate: disable when there are active secretmem users
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v17 08/10] PM: hibernate: disable when there are active secretmem users
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v17 08/10] PM: hibernate: disable when there are active secretmem users
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v17 08/10] PM: hibernate: disable when there are active secretmem users
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v17 08/10] PM: hibernate: disable when there are active secretmem users
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v17 08/10] PM: hibernate: disable when there are active secretmem users
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v17 08/10] PM: hibernate: disable when there are active secretmem users
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: PROBLEM: 5.11.0-rc7 fails to compile with error: ‘-mindirect-branch’ and ‘-fcf-protection’ are not compatible
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v17 00/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v17 10/10] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v17 09/10] arch, mm: wire up memfd_secret system call where relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v17 07/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v17 08/10] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v17 05/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v17 06/10] arm64: kfence: fix header inclusion
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v17 04/10] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v17 03/10] riscv/Kconfig: make direct map manipulation options depend on MMU
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v17 02/10] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v17 01/10] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v17 00/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: PROBLEM: 5.11.0-rc7 fails to compile with error: ‘-mindirect-branch’ and ‘-fcf-protection’ are not compatible
- From: Stuart Little <achirvasub@xxxxxxxxx>
- Re: PROBLEM: 5.11.0-rc7 fails to compile with error: ‘-mindirect-branch’ and ‘-fcf-protection’ are not compatible
- From: Stuart Little <achirvasub@xxxxxxxxx>
- PROBLEM: 5.11.0-rc7 fails to compile with error: ‘-mindirect-branch’ and ‘-fcf-protection’ are not compatible
- From: Stuart Little <achirvasub@xxxxxxxxx>
- Re: [PATCH 2/5] lib/test_bitmap.c: Add for_each_set_clump test cases
- From: Syed Nayyar Waris <syednwaris@xxxxxxxxx>
- Re: [PATCH v28 06/12] fs,security: Add sb_delete hook
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v7 1/2] Kbuild: make DWARF version a choice
- From: Mark Wielaard <mark@xxxxxxxxx>
- Re: [PATCH v9 1/3] vmlinux.lds.h: add DWARF v5 sections
- From: Mark Wielaard <mark@xxxxxxxxx>
- Re: [PATCH v9 0/3] Kbuild: DWARF v5 support
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: [PATCH v9 0/3] Kbuild: DWARF v5 support
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v9 1/3] vmlinux.lds.h: add DWARF v5 sections
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/3] vmlinux.lds.h: add DWARF v5 sections
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH] MIPS: make userspace mapping young by default
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [FIXED] Re: 5:11: in-kernel BTF is malformed
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- Re: [PATCH v28 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 1/2] Kbuild: make DWARF version a choice
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v9 0/3] Kbuild: DWARF v5 support
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- [PATCH v9 3/3] Kconfig: allow explicit opt in to DWARF v5
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH v9 2/3] Kbuild: make DWARF version a choice
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH v9 1/3] vmlinux.lds.h: add DWARF v5 sections
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH v9 0/3] Kbuild: DWARF v5 support
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v28 06/12] fs,security: Add sb_delete hook
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2] firmware_loader: Align .builtin_fw to 8
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v19 08/25] x86/mm: Introduce _PAGE_COW
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v19 08/25] x86/mm: Introduce _PAGE_COW
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v19 06/25] x86/cet: Add control-protection fault handler
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 24/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 06/25] x86/cet: Add control-protection fault handler
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v28 05/12] LSM: Infrastructure management of the superblock
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v2] firmware_loader: Align .builtin_fw to 8
- From: Doug Anderson <dianders@xxxxxxxxxxxx>
- Re: [PATCH v28 05/12] LSM: Infrastructure management of the superblock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v28 05/12] LSM: Infrastructure management of the superblock
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v19 04/25] x86/cpufeatures: Introduce X86_FEATURE_CET and setup functions
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v19 06/25] x86/cet: Add control-protection fault handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v28 04/12] landlock: Add ptrace restrictions
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v19 04/25] x86/cpufeatures: Introduce X86_FEATURE_CET and setup functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 1/2] Kbuild: make DWARF version a choice
- From: Mark Wielaard <mark@xxxxxxxxx>
- Re: [FIXED] Re: 5:11: in-kernel BTF is malformed
- From: Chris Murphy <lists@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v19 06/25] x86/cet: Add control-protection fault handler
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v19 02/25] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v5 0/3] Kbuild: DWARF v5 support
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v5 0/3] Kbuild: DWARF v5 support
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH v19 24/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v7 1/2] Kbuild: make DWARF version a choice
- From: Fangrui Song <maskray@xxxxxxxxxx>
- Re: [PATCH v7 1/2] Kbuild: make DWARF version a choice
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v19 12/25] mm: Introduce VM_SHSTK for shadow stack memory
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v19 12/25] mm: Introduce VM_SHSTK for shadow stack memory
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [PATCH v19 18/25] mm: Update can_follow_write_pte() for shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 24/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 22/25] ELF: Introduce arch_setup_elf_property()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 20/25] x86/cet/shstk: User-mode shadow stack support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 19/25] mm: Re-introduce vm_flags to do_mmap()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 1/2] Kbuild: make DWARF version a choice
- From: Mark Wielaard <mark@xxxxxxxxx>
- Re: [PATCH v19 08/25] x86/mm: Introduce _PAGE_COW
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v19 17/25] mm/mmap: Add shadow stack pages to memory accounting
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 16/25] mm: Add guard pages around a shadow stack.
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 15/25] mm: Fixup places that call pte_mkwrite() directly
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 06/25] x86/cet: Add control-protection fault handler
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 14/25] x86/mm: Update maybe_mkwrite() for shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 07/25] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 11/25] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 10/25] x86/mm: Update pte_modify for _PAGE_COW
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 08/25] x86/mm: Introduce _PAGE_COW
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 01/25] Documentation/x86: Add CET description
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 7/7] x86/vdso: Insert endbr32/endbr64 to vDSO
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 5/7] x86/cet/ibt: Update arch_prctl functions for Indirect Branch Tracking
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 2/7] x86/cet/ibt: User-mode Indirect Branch Tracking support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 3/7] x86/cet/ibt: Handle signals for Indirect Branch Tracking
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 02/25] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 1/2] Kbuild: make DWARF version a choice
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v19 01/25] Documentation/x86: Add CET description
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v19 05/25] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 04/25] x86/cpufeatures: Introduce X86_FEATURE_CET and setup functions
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 03/25] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 1/2] Kbuild: make DWARF version a choice
- From: Mark Wielaard <mark@xxxxxxxxx>
- Re: [PATCH v19 6/7] x86/vdso/32: Add ENDBR32 to __kernel_vsyscall entry point
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 4/7] x86/cet/ibt: Update ELF header parsing for Indirect Branch Tracking
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 1/7] x86/cet/ibt: Update Kconfig for user-mode Indirect Branch Tracking
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 1/2] Kbuild: make DWARF version a choice
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- RE: [PATCH v6 13/16] asm-generic/hyperv: introduce hv_device_id and auxiliary structures
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v6 09/16] x86/hyperv: provide a bunch of helper functions
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v6 06/16] x86/hyperv: extract partition ID from Microsoft Hypervisor if necessary
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH v5 13/16] asm-generic/hyperv: introduce hv_device_id and auxiliary structures
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- [FIXED] Re: 5:11: in-kernel BTF is malformed
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- RE: [PATCH v5 07/16] x86/hyperv: extract partition ID from Microsoft Hypervisor if necessary
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH 08/10] clocksource/drivers/hyper-v: Handle sched_clock differences inline
- From: Wei Liu <wei.liu@xxxxxxxxxx>
- RE: [PATCH 10/10] clocksource/drivers/hyper-v: Move handling of STIMER0 interrupts
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- RE: [PATCH 08/10] clocksource/drivers/hyper-v: Handle sched_clock differences inline
- From: Michael Kelley <mikelley@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/5] uapi: Move the aux vector AT_MINSIGSTKSZ define to uapi
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH] MIPS: make userspace mapping young by default
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- Re: [PATCH 02/27] x86/syscalls: fix -Wmissing-prototypes warnings from COND_SYSCALL()
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v16 06/11] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH] MIPS: make userspace mapping young by default
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v7 1/2] Kbuild: make DWARF version a choice
- From: Mark Wielaard <mark@xxxxxxxxx>
- Re: [PATCH] MIPS: make userspace mapping young by default
- From: Thomas Bogendoerfer <tsbogend@xxxxxxxxxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v5 0/3] Kbuild: DWARF v5 support
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: [PATCH 2/5] lib/test_bitmap.c: Add for_each_set_clump test cases
- From: Syed Nayyar Waris <syednwaris@xxxxxxxxx>
- Re: [PATCH v5 0/3] Kbuild: DWARF v5 support
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: [PATCH v8 0/2] Kbuild: DWARF v5 support
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: [PATCH v2 0/5] shoot lazy tlbs
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH v8 0/2] Kbuild: DWARF v5 support
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v8 0/2] Kbuild: DWARF v5 support
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- [PATCH v8 2/2] Kbuild: implement support for DWARF v5
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH v8 1/2] Kbuild: make DWARF version a choice
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH v8 0/2] Kbuild: DWARF v5 support
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v7 1/2] Kbuild: make DWARF version a choice
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v7 1/2] Kbuild: make DWARF version a choice
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v7 1/2] Kbuild: make DWARF version a choice
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH] MIPS: make userspace mapping young by default
- From: 黄沛 <huangpei@xxxxxxxxxxx>
- Re: [PATCH v28 03/12] landlock: Set up the security framework and manage credentials
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v7 1/2] Kbuild: make DWARF version a choice
- From: Fangrui Song <maskray@xxxxxxxxxx>
- Re: [PATCH v28 02/12] landlock: Add ruleset and domain management
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] MIPS: make userspace mapping young by default
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH] mm/memory.c: Remove pte_sw_mkyoung()
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH v5 0/3] Kbuild: DWARF v5 support
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v5 0/3] Kbuild: DWARF v5 support
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- [PATCH] MIPS: make userspace mapping young by default
- From: Huang Pei <huangpei@xxxxxxxxxxx>
- Re: [PATCH v5 0/3] Kbuild: DWARF v5 support
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH] mm/memory.c: Remove pte_sw_mkyoung()
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Kernel Announce]
[IETF Annouce]
[Netdev]
[Netfilter]
[Bugtraq]