Linux Arch
[Prev Page][Next Page]
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH V2 18/19] clocksource: add C-SKY clocksource drivers
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH 2/3] arm64: add endianness option to LDFLAGS instead of LD
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH V2 18/19] clocksource: add C-SKY clocksource drivers
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH V2 19/19] irqchip: add C-SKY irqchip drivers
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH V2 05/19] csky: System Call
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Horia Geanta <horia.geanta@xxxxxxx>
- Re: [PATCH V2 01/19] csky: Build infrastructure
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH V2 13/19] csky: Library functions
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH V2 18/19] clocksource: add C-SKY clocksource drivers
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH v2 0/8] add support for relative references in jump tables
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 0/8] add support for relative references in jump tables
- From: Heiko Carstens <heiko.carstens@xxxxxxxxxx>
- Re: [PATCH 05/11] hugetlb: Introduce generic version of huge_ptep_clear_flush
- From: Alexandre Ghiti <alex@xxxxxxxx>
- Re: [PATCH V2 19/19] irqchip: add C-SKY irqchip drivers
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [PATCH 00/11] hugetlb: Factorize architecture hugetlb primitives
- From: Alexandre Ghiti <alex@xxxxxxxx>
- [PATCH 02/11] hugetlb: Introduce generic version of hugetlb_free_pgd_range
- From: Alexandre Ghiti <alex@xxxxxxxx>
- [PATCH 04/11] hugetlb: Introduce generic version of huge_ptep_get_and_clear
- From: Alexandre Ghiti <alex@xxxxxxxx>
- [PATCH 03/11] hugetlb: Introduce generic version of set_huge_pte_at
- From: Alexandre Ghiti <alex@xxxxxxxx>
- [PATCH 05/11] hugetlb: Introduce generic version of huge_ptep_clear_flush
- From: Alexandre Ghiti <alex@xxxxxxxx>
- [PATCH 01/11] hugetlb: Harmonize hugetlb.h arch specific defines with pgtable.h
- From: Alexandre Ghiti <alex@xxxxxxxx>
- Re: [PATCH V2 19/19] irqchip: add C-SKY irqchip drivers
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH V2 13/19] csky: Library functions
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH V2 05/19] csky: System Call
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH V2 01/19] csky: Build infrastructure
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Fabio Estevam <festevam@xxxxxxxxx>
- Re: [PATCH V2 18/19] clocksource: add C-SKY clocksource drivers
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH V2 19/19] irqchip: add C-SKY irqchip drivers
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH V2 01/19] csky: Build infrastructure
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH V2 02/19] csky: defconfig
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH v2 8/8] jump_table: move entries into ro_after_init region
- From: Jessica Yu <jeyu@xxxxxxxxxx>
- Re: [PATCH V2 19/19] irqchip: add C-SKY irqchip drivers
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH v2 4/8] x86: add support for 64-bit place relative relocations
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH 3/6] timex: prepare compat helpers for y2038 changes
- From: Deepa Dinamani <deepa.kernel@xxxxxxxxx>
- [PATCH 0/6] Introduce struct __kernel_timex
- From: Deepa Dinamani <deepa.kernel@xxxxxxxxx>
- Re: [PATCH V2 01/19] csky: Build infrastructure
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH V2 19/19] irqchip: add C-SKY irqchip drivers
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH V2 02/19] csky: defconfig
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH V2 07/19] csky: MMU and page table management
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH] mm: allow arch to supply p??_free_tlb functions
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH 3/3] microblaze: add endianness options to LDFLAGS instead of LD
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH 2/3] arm64: add endianness option to LDFLAGS instead of LD
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH 1/3] ARM: add endianness option to LDFLAGS instead of LD
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH 0/3] arm,arm64,microblaze: add endianness options to LDFLAGS instead of LD
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH v2 8/8] jump_table: move entries into ro_after_init region
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 7/8] jump_label: annotate entries that operate on __init code earlier
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 1/8] kernel/jump_label: abstract jump_entry member accessors
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/8] add support for relative references in jump tables
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 3/8] arm64/kernel: jump_label: switch to relative references
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/8] kernel/jump_label: implement generic support for relative references
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 5/8] x86: jump_label: switch to jump_entry accessors
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 8/8] jump_table: move entries into ro_after_init region
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 6/8] x86/kernel: jump_table: use relative references
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 7/8] jump_label: annotate entries that operate on __init code earlier
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 4/8] x86: add support for 64-bit place relative relocations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH V2 07/19] csky: MMU and page table management
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: h8300: BUG: Bad page state in process swapper (was: Re: why do we still need bootmem allocator?)
- From: Yoshinori Sato <ysato@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 01/19] csky: Build infrastructure
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH V2 01/19] csky: Build infrastructure
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH V2 01/19] csky: Build infrastructure
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V2 08/19] csky: Process management and Signal
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V2 04/19] csky: Exception handling
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V2 07/19] csky: MMU and page table management
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V2 09/19] csky: VDSO and rt_sigreturn
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V2 19/19] irqchip: add C-SKY irqchip drivers
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V2 18/19] clocksource: add C-SKY clocksource drivers
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V2 14/19] csky: User access
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V2 00/19] C-SKY(csky) Linux Kernel Port
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V2 02/19] csky: defconfig
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V2 06/19] csky: Cache and TLB routines
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V2 05/19] csky: System Call
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V2 03/19] csky: Kernel booting
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V2 10/19] csky: IRQ handling
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V2 12/19] csky: ELF and module probe
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V2 11/19] csky: Atomic operations
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V2 17/19] csky: Misc headers
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V2 13/19] csky: Library functions
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V2 15/19] csky: Debug and Ptrace GDB
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V2 16/19] csky: SMP support
- From: Guo Ren <ren_guo@xxxxxxxxx>
- h8300: BUG: Bad page state in process swapper (was: Re: why do we still need bootmem allocator?)
- From: Mike Rapoport <rppt@xxxxxxxxxxxxxxxxxx>
- Re: [RFC v2] ARC: allow to use IOC and non-IOC DMA devices simultaneously
- From: Vineet Gupta <Vineet.Gupta1@xxxxxxxxxxxx>
- RE: [PATCH v4 0/7] arm64: untag user pointers passed to the kernel
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v4 0/7] arm64: untag user pointers passed to the kernel
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- Re: [PATCH v4 0/7] arm64: untag user pointers passed to the kernel
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- Re: [RFC v2] ARC: allow to use IOC and non-IOC DMA devices simultaneously
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH] sparse: stricter warning for explicit cast to ulong
- From: Luc Van Oostenryck <luc.vanoostenryck@xxxxxxxxx>
- Re: [PATCH v4 0/7] arm64: untag user pointers passed to the kernel
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- Re: [PATCH v4 0/7] arm64: untag user pointers passed to the kernel
- From: Luc Van Oostenryck <luc.vanoostenryck@xxxxxxxxx>
- Re: [PATCH v4 0/7] arm64: untag user pointers passed to the kernel
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [RFC v2] ARC: allow to use IOC and non-IOC DMA devices simultaneously
- From: Eugeniy Paltsev <Eugeniy.Paltsev@xxxxxxxxxxxx>
- Re: [PATCH v4 0/7] arm64: untag user pointers passed to the kernel
- From: Luc Van Oostenryck <luc.vanoostenryck@xxxxxxxxx>
- Re: [PATCH v4 0/7] arm64: untag user pointers passed to the kernel
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [RFC PATCH for 4.18 2/2] rseq: compat: clear high bits of rseq_cs fields
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/7] arm64: untag user pointers passed to the kernel
- From: Luc Van Oostenryck <luc.vanoostenryck@xxxxxxxxx>
- Re: [PATCH v4 0/7] arm64: untag user pointers passed to the kernel
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: why do we still need bootmem allocator?
- From: Mike Rapoport <rppt@xxxxxxxxxxxxxxxxxx>
- Re: why do we still need bootmem allocator?
- From: Mike Rapoport <rppt@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/7] arm64: untag user pointers passed to the kernel
- From: Ramana Radhakrishnan <ramana.radhakrishnan@xxxxxxx>
- Re: [PATCH v4 0/7] arm64: untag user pointers passed to the kernel
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- Re: why do we still need bootmem allocator?
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: why do we still need bootmem allocator?
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: why do we still need bootmem allocator?
- From: Mike Rapoport <rppt@xxxxxxxxxxxxxxxxxx>
- Re: why do we still need bootmem allocator?
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: why do we still need bootmem allocator?
- From: Mike Rapoport <rppt@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH for 4.18 2/2] rseq: compat: clear high bits of rseq_cs fields
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [RFC PATCH for 4.18 2/2] rseq: compat: clear high bits of rseq_cs fields
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: rseq: How to test for compat task at signal delivery
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [RFC PATCH for 4.18 2/2] rseq: compat: clear high bits of rseq_cs fields
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [RFC PATCH for 4.18 1/2] compat: Introduce is_compat_frame
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: rseq: How to test for compat task at signal delivery
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 0/7] arm64: untag user pointers passed to the kernel
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 00/10] Control Flow Enforcement - Part (3)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 00/10] Control Flow Enforcement - Part (3)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v4 0/7] arm64: untag user pointers passed to the kernel
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- Re: [PATCH 00/10] Control Flow Enforcement - Part (3)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 00/10] Control Flow Enforcement - Part (3)
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v5 15/27] compiler: Option to default to hidden symbols
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v5 15/27] compiler: Option to default to hidden symbols
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- [PATCH v5 24/27] x86/mm: Make the x86 GOT read-only
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- Re: [PATCH v2] ARC: Improve cmpxchg syscall implementation
- From: Vineet Gupta <Vineet.Gupta1@xxxxxxxxxxxx>
- Re: [PATCH v2] ARC: Improve cmpxchg syscall implementation
- From: Alexey Brodkin <Alexey.Brodkin@xxxxxxxxxxxx>
- Re: [PATCH v2] ARC: Improve cmpxchg syscall implementation
- From: Vineet Gupta <Vineet.Gupta1@xxxxxxxxxxxx>
- Re: why do we still need bootmem allocator?
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v2 2/2] rusage: allow 64-bit times ru_utime/ru_stime
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: why do we still need bootmem allocator?
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [RFC] ARC: allow to use IOC and non-IOC DMA devices simultaneously
- From: Alexey Brodkin <Alexey.Brodkin@xxxxxxxxxxxx>
- why do we still need bootmem allocator?
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v2 2/2] rusage: allow 64-bit times ru_utime/ru_stime
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v2 2/2] rusage: allow 64-bit times ru_utime/ru_stime
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [lkp-robot] a35353bb9e BUG: kernel hang in test stage
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH 04/24] 32-bit userspace ABI: introduce ARCH_32BIT_OFF_T config option
- From: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] rusage: allow 64-bit times ru_utime/ru_stime
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 2/2] rusage: allow 64-bit times ru_utime/ru_stime
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH v18 5/7] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v18 7/7] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v18 1/7] iomap: Use non-raw io functions for io{read|write}XXbe
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v18 3/7] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v18 2/7] parisc: iomap: introduce io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v18 4/7] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v18 6/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v18 0/7] Add io{read|write}64 to io-64-atomic headers
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v2 2/2] rusage: allow 64-bit times ru_utime/ru_stime
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC] ARC: allow to use IOC and non-IOC DMA devices simultaneously
- From: Eugeniy Paltsev <Eugeniy.Paltsev@xxxxxxxxxxxx>
- Re: [PATCH -tip v6 26/27] Documentation: kprobes: Add how to change the execution path
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- Re: [PATCH v2 2/2] rusage: allow 64-bit times ru_utime/ru_stime
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v2 2/2] rusage: allow 64-bit times ru_utime/ru_stime
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v2 2/2] rusage: allow 64-bit times ru_utime/ru_stime
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v2 2/2] rusage: allow 64-bit times ru_utime/ru_stime
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v2 2/2] rusage: allow 64-bit times ru_utime/ru_stime
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 5/5] Documentation/x86: Add CET description
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH -tip v6 26/27] Documentation: kprobes: Add how to change the execution path
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [RESEND PATCH v3 2/3] platform: move the early platform device support to arch/sh
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [RESEND PATCH v3 3/3] sh: add the sh_ prefix to early platform symbols
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [RESEND PATCH v3 1/3] clocksource: timer-ti-dm: remove the early platform driver registration
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [RESEND PATCH v3 0/3] sh: make early_platform code SuperH-specific
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH v4 2/7] uaccess: add untagged_addr definition for other arches
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v4 1/7] arm64: add type casts to untagged_addr macro
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v4 3/7] arm64: untag user addresses in access_ok and __uaccess_mask_ptr
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v4 5/7] lib, arm64: untag addrs passed to strncpy_from_user and strnlen_user
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v4 4/7] mm, arm64: untag user addresses in mm/gup.c
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v4 7/7] selftests, arm64: add a selftest for passing tagged pointers to kernel
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v4 6/7] arm64: update Documentation/arm64/tagged-pointers.txt
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v4 0/7] arm64: untag user pointers passed to the kernel
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- Re: [PATCH v13 24/24] selftests/vm: test correct behavior of pkey-0
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v13 22/24] selftests/vm: testcases must restore pkey-permissions
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v13 19/24] selftests/vm: associate key on a mapped page and detect access violation
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v13 18/24] selftests/vm: fix an assertion in test_pkey_alloc_exhaust()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v13 17/24] selftests/vm: powerpc implementation to check support for pkey
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v13 16/24] selftests/vm: clear the bits in shadow reg when a pkey is freed.
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v13 15/24] selftests/vm: powerpc implementation for generic abstraction
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v13 14/24] selftests/vm: generic cleanup
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v13 13/24] selftests/vm: pkey register should match shadow pkey
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v13 10/24] selftests/vm: clear the bits in shadow reg when a pkey is freed.
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v13 08/24] selftests/vm: fix the wrong assert in pkey_disable_set()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH -tip v6 26/27] Documentation: kprobes: Add how to change the execution path
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH -tip v6 26/27] Documentation: kprobes: Add how to change the execution path
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH -tip v6 27/27] kprobes: Remove jprobe stub API
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 26/27] Documentation: kprobes: Add how to change the execution path
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 25/27] kprobes/x86: Do not disable preempt on int3 path
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 24/27] bpf: error-inject: kprobes: Clear current_kprobe and enable preempt in kprobe
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 23/27] sparc64: kprobes: Don't call the ->break_handler() in sparc64 kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 21/27] s390/kprobes: Don't call the ->break_handler() in s390 kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 22/27] sh: kprobes: Don't call the ->break_handler() in SH kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 20/27] MIPS: kprobes: Don't call the ->break_handler() in MIPS kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 19/27] ia64: kprobes: Don't call the ->break_handler() in ia64 kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 18/27] powerpc/kprobes: Don't call the ->break_handler() in powerpc kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 17/27] arm64: kprobes: Don't call the ->break_handler() in arm64 kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 15/27] ARC: kprobes: Don't call the ->break_handler() in ARC kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 16/27] ARM: kprobes: Don't call the ->break_handler() in arm kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 14/27] kprobes/x86: Don't call ->break_handler() in x86 kprobes
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 13/27] kprobes: Don't check the ->break_handler() in generic kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 12/27] sparc64: kprobes: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 11/27] sh: kprobes: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 10/27] s390/kprobes: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 09/27] MIPS: kprobes: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 08/27] ia64: kprobes: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 07/27] powerpc/kprobes: Remove jprobe powerpc implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 06/27] arm64: kprobes: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 05/27] ARM: kprobes: Remove jprobe arm implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 04/27] ARC: kprobes: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 03/27] kprobes/x86: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 02/27] kprobes: Remove jprobe API implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 01/27] Documentation/kprobes: Fix to remove remaining jprobe
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v6 00/27] kprobes: Cleanup jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH v2] ARC: Improve cmpxchg syscall implementation
- From: Alexey Brodkin <Alexey.Brodkin@xxxxxxxxxxxx>
- Re: [PATCH] ARC: Improve cmpxchng syscall implementation
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/10] Control Flow Enforcement - Part (3)
- From: Balbir Singh <bsingharora@xxxxxxxxx>
- Re: [PATCH] ARC: Improve cmpxchng syscall implementation
- From: Alexey Brodkin <Alexey.Brodkin@xxxxxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC] ARC: allow to use IOC and non-IOC DMA devices simultaneously
- From: Vineet Gupta <Vineet.Gupta1@xxxxxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 00/10] Control Flow Enforcement - Part (3)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 00/10] Control Flow Enforcement - Part (3)
- From: Balbir Singh <bsingharora@xxxxxxxxx>
- Re: [PATCH v4 0/8] Introduce the for_each_set_clump macro
- From: William Breathitt Gray <vilhelm.gray@xxxxxxxxx>
- Re: [PATCH 5/5] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [RFC] ARC: allow to use IOC and non-IOC DMA devices simultaneously
- From: Christoph Hellwig <hch@xxxxxx>
- [RFC] ARC: allow to use IOC and non-IOC DMA devices simultaneously
- From: Eugeniy Paltsev <Eugeniy.Paltsev@xxxxxxxxxxxx>
- Re: [PATCH 5/5] Documentation/x86: Add CET description
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v13 00/24] selftests, powerpc, x86 : Memory Protection Keys
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [PATCH v13 00/24] selftests, powerpc, x86 : Memory Protection Keys
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH 00/10] Control Flow Enforcement - Part (3)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 02/10] x86/cet: Introduce WRUSS instruction
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [RFC PATCH 3/3] powerpc/64s/radix: optimise TLB flush with precise TLB ranges in mmu_gather
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [RFC PATCH 3/3] powerpc/64s/radix: optimise TLB flush with precise TLB ranges in mmu_gather
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] powerpc/64s/radix: optimise TLB flush with precise TLB ranges in mmu_gather
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH 02/10] x86/cet: Introduce WRUSS instruction
- From: Balbir Singh <bsingharora@xxxxxxxxx>
- Re: [PATCH 00/10] Control Flow Enforcement - Part (3)
- From: Balbir Singh <bsingharora@xxxxxxxxx>
- [PATCH v13 23/24] selftests/vm: sub-page allocator
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 24/24] selftests/vm: test correct behavior of pkey-0
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 21/24] selftests/vm: detect write violation on a mapped access-denied-key page
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 22/24] selftests/vm: testcases must restore pkey-permissions
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 20/24] selftests/vm: associate key on a mapped page and detect write violation
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 19/24] selftests/vm: associate key on a mapped page and detect access violation
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 18/24] selftests/vm: fix an assertion in test_pkey_alloc_exhaust()
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 17/24] selftests/vm: powerpc implementation to check support for pkey
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 16/24] selftests/vm: clear the bits in shadow reg when a pkey is freed.
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 15/24] selftests/vm: powerpc implementation for generic abstraction
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 14/24] selftests/vm: generic cleanup
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 13/24] selftests/vm: pkey register should match shadow pkey
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 12/24] selftests/vm: introduce two arch independent abstraction
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 11/24] selftests/vm: fix alloc_random_pkey() to make it really random
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 06/24] selftests/vm: typecast the pkey register
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 10/24] selftests/vm: clear the bits in shadow reg when a pkey is freed.
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 09/24] selftests/vm: fixed bugs in pkey_disable_clear()
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 08/24] selftests/vm: fix the wrong assert in pkey_disable_set()
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 07/24] selftests/vm: generic function to handle shadow key register
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 04/24] selftests/vm: move arch-specific definitions to arch-specific header
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 05/24] selftests/vm: Make gcc check arguments of sigsafe_printf()
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 03/24] selftests/vm: move generic definitions to header file
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 02/24] selftests/vm: rename all references to pkru to a generic name
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 01/24] selftests/x86: Move protecton key selftest to arch neutral directory
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [PATCH v13 00/24] selftests, powerpc, x86 : Memory Protection Keys
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [PATCH 00/11] Add support for Hygon's Dhyana Family 18h processor
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] sh: remove no-op macro VMLINUX_SYMBOL()
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] powerpc/64s/radix: optimise TLB flush with precise TLB ranges in mmu_gather
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] powerpc/64s/radix: optimise TLB flush with precise TLB ranges in mmu_gather
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [RFC PATCH 3/3] powerpc/64s/radix: optimise TLB flush with precise TLB ranges in mmu_gather
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [RFC PATCH 3/3] powerpc/64s/radix: optimise TLB flush with precise TLB ranges in mmu_gather
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] powerpc/64s/radix: optimise TLB flush with precise TLB ranges in mmu_gather
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] powerpc/64s/radix: optimise TLB flush with precise TLB ranges in mmu_gather
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [RFC PATCH 3/3] powerpc/64s/radix: optimise TLB flush with precise TLB ranges in mmu_gather
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 3/3] powerpc/64s/radix: optimise TLB flush with precise TLB ranges in mmu_gather
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH 00/10] Control Flow Enforcement - Part (3)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [RFC PATCH 1/3] Revert "mm: always flush VMA ranges affected by zap_page_range"
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [RFC PATCH 3/3] powerpc/64s/radix: optimise TLB flush with precise TLB ranges in mmu_gather
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/3] mm: mmu_gather track of invalidated TLB ranges explicitly for more precise flushing
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/10] Control Flow Enforcement - Part (3)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 00/10] Control Flow Enforcement - Part (3)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 00/10] Control Flow Enforcement - Part (3)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 00/10] Control Flow Enforcement - Part (3)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 00/10] Control Flow Enforcement - Part (3)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 01/10] x86/cet: User-mode shadow stack support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [RFC PATCH 1/3] Revert "mm: always flush VMA ranges affected by zap_page_range"
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxxxxx>
- Re: [PATCH 01/10] x86/cet: User-mode shadow stack support
- From: Balbir Singh <bsingharora@xxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH 00/10] Control Flow Enforcement - Part (3)
- From: Balbir Singh <bsingharora@xxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- [RFC PATCH 3/3] powerpc/64s/radix: optimise TLB flush with precise TLB ranges in mmu_gather
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [RFC PATCH 2/3] mm: mmu_gather track of invalidated TLB ranges explicitly for more precise flushing
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [RFC PATCH 1/3] Revert "mm: always flush VMA ranges affected by zap_page_range"
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [RFC PATCH 0/3] couple of TLB flush optimisations
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH v5 4/4] kernel hacking: new config CC_OPTIMIZE_FOR_DEBUGGING to apply GCC -Og optimization
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v5 2/4] kernel hacking: new config NO_AUTO_INLINE to disable compiler auto-inline optimizations
- From: Johan Hovold <johan@xxxxxxxxxx>
- Re: [PATCH 02/10] x86/cet: Introduce WRUSS instruction
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 04/24] 32-bit userspace ABI: introduce ARCH_32BIT_OFF_T config option
- From: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/10] x86/cet: Introduce WRUSS instruction
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 04/24] 32-bit userspace ABI: introduce ARCH_32BIT_OFF_T config option
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v5 4/4] kernel hacking: new config CC_OPTIMIZE_FOR_DEBUGGING to apply GCC -Og optimization
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v5 4/4] kernel hacking: new config CC_OPTIMIZE_FOR_DEBUGGING to apply GCC -Og optimization
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 04/24] 32-bit userspace ABI: introduce ARCH_32BIT_OFF_T config option
- From: Adam Borowski <kilobyte@xxxxxxxxxx>
- [PATCH 10/11] driver/edac: Add support for Hygon's Dhyana Family 18h processor
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH 04/11] x86/perf: Add support for Hygon's Dhyana Family 18h processor
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH 08/11] driver/acpi: Add support for Hygon's Dhyana Family 18h processor
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH 09/11] driver/cpufreq: Add support for Hygon's Dhyana Family 18h processor
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH 07/11] x86/xen: Add support for Hygon's Dhyana Family 18h processor
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH 06/11] x86/kvm: Add support for Hygon's Dhyana Family 18h processor
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH 05/11] x86/mce: Add support for Hygon's Dhyana Family 18h processor
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH 03/11] x86/cpu/bug: Add support for Hygon's Dhyana Family 18h processor
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH 02/11] x86/pci: Add support for Hygon's Dhyana Family 18h processor
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH 00/11] Add support for Hygon's Dhyana Family 18h processor
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH 01/11] x86/cpu: Add support for Hygon's Dhyana Family 18h processor
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH 11/11] tools/cpupower: Add support for Hygon's Dhyana Family 18h processor
- From: Pu Wen <puwen@xxxxxxxx>
- Re: [PATCH 04/24] 32-bit userspace ABI: introduce ARCH_32BIT_OFF_T config option
- From: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 04/24] 32-bit userspace ABI: introduce ARCH_32BIT_OFF_T config option
- From: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/5] Documentation/x86: Add CET description
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH 04/24] 32-bit userspace ABI: introduce ARCH_32BIT_OFF_T config option
- From: Palmer Dabbelt <palmer@xxxxxxxxxx>
- Re: [PATCH v5 2/4] kernel hacking: new config NO_AUTO_INLINE to disable compiler auto-inline optimizations
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH 04/24] 32-bit userspace ABI: introduce ARCH_32BIT_OFF_T config option
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 04/10] x86/cet: Handle thread shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [PATCH 04/10] x86/cet: Handle thread shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 04/10] x86/cet: Handle thread shadow stack
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH 03/10] x86/cet: Signal handling for shadow stack
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [PATCH 6/9] x86/mm: Introduce ptep_set_wrprotect_flush and related functions
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 5/9] x86/mm: Introduce _PAGE_DIRTY_SW
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 6/9] x86/mm: Introduce ptep_set_wrprotect_flush and related functions
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH 1/9] x86/cet: Control protection exception handler
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/9] x86/cet: Control protection exception handler
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH 4/9] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 6/9] x86/mm: Introduce ptep_set_wrprotect_flush and related functions
- From: Dave Hansen <dave.hansen@xxxxxxxxxxxxxxx>
- Re: [PATCH 6/9] x86/mm: Introduce ptep_set_wrprotect_flush and related functions
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 5/7] x86: Insert endbr32/endbr64 to vDSO
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC PATCH -tip v5 18/27] powerpc/kprobes: Don't call the ->break_handler() in arm kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- Re: [PATCH 5/7] x86: Insert endbr32/endbr64 to vDSO
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 5/7] x86: Insert endbr32/endbr64 to vDSO
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 5/7] x86: Insert endbr32/endbr64 to vDSO
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH 09/10] mm: Prevent madvise from changing shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 09/10] mm: Prevent madvise from changing shadow stack
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 03/10] x86/cet: Signal handling for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 09/10] mm: Prevent madvise from changing shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 04/10] x86/cet: Handle thread shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 5/7] x86: Insert endbr32/endbr64 to vDSO
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 05/10] x86/cet: ELF header parsing of Control Flow Enforcement
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 6/9] x86/mm: Introduce ptep_set_wrprotect_flush and related functions
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 02/10] x86/cet: Introduce WRUSS instruction
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 6/9] x86/mm: Introduce ptep_set_wrprotect_flush and related functions
- From: Dave Hansen <dave.hansen@xxxxxxxxxxxxxxx>
- Re: [PATCH 08/10] mm: Prevent mremap of shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 03/10] x86/cet: Signal handling for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxxxxxxxx>
- Re: [PATCH 10/10] mm: Prevent munmap and remap_file_pages of shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 03/10] x86/cet: Signal handling for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 03/10] x86/cet: Signal handling for shadow stack
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 03/10] x86/cet: Signal handling for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 04/10] x86/cet: Handle thread shadow stack
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH 03/10] x86/cet: Signal handling for shadow stack
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH 10/10] mm: Prevent munmap and remap_file_pages of shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 08/10] mm: Prevent mremap of shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 02/10] x86/cet: Introduce WRUSS instruction
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 3/7] mm/mmap: Add IBT bitmap size to address space limit check
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 05/10] x86/cet: ELF header parsing of Control Flow Enforcement
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 7/7] x86/cet: Add PTRACE interface for CET
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 03/10] x86/cet: Signal handling for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 6/9] x86/mm: Introduce ptep_set_wrprotect_flush and related functions
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 01/10] x86/cet: User-mode shadow stack support
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 6/9] x86/mm: Introduce ptep_set_wrprotect_flush and related functions
- From: Dave Hansen <dave.hansen@xxxxxxxxxxxxxxx>
- Re: [PATCH 04/10] x86/cet: Handle thread shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 01/10] x86/cet: User-mode shadow stack support
- From: Dave Hansen <dave.hansen@xxxxxxxxxxxxxxx>
- Re: [PATCH 01/10] x86/cet: User-mode shadow stack support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 7/9] x86/mm: Shadow stack page fault error checking
- From: Dave Hansen <dave.hansen@xxxxxxxxxxxxxxx>
- Re: [PATCH 02/10] x86/cet: Introduce WRUSS instruction
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 7/9] x86/mm: Shadow stack page fault error checking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 1/7] x86/cet: Add Kconfig option for user-mode Indirect Branch Tracking
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH 02/10] x86/cet: Introduce WRUSS instruction
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC PATCH -tip v5 18/27] powerpc/kprobes: Don't call the ->break_handler() in arm kprobes code
- From: "Naveen N. Rao" <naveen.n.rao@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 01/10] x86/cet: User-mode shadow stack support
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 2/9] x86/cet: Add Kconfig option for user-mode shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 1/9] x86/cet: Control protection exception handler
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 7/9] x86/mm: Shadow stack page fault error checking
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 6/9] x86/mm: Introduce ptep_set_wrprotect_flush and related functions
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 2/9] x86/cet: Add Kconfig option for user-mode shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 5/5] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 2/5] x86/fpu/xstate: Change some names to separate XSAVES system and user states
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 2/5] x86/fpu/xstate: Change some names to separate XSAVES system and user states
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 1/5] x86/cpufeatures: Add CPUIDs for Control-flow Enforcement Technology (CET)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 0/5] Control Flow Enforcement - Part (1)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 4/5] x86/fpu/xstate: Add XSAVES system states for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 3/5] x86/fpu/xstate: Enable XSAVES system states
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 5/5] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 2/9] x86/cet: Add Kconfig option for user-mode shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 1/9] x86/cet: Control protection exception handler
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 2/9] x86/cet: Add Kconfig option for user-mode shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 1/9] x86/cet: Control protection exception handler
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 3/9] mm: Introduce VM_SHSTK for shadow stack memory
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 0/9] Control Flow Enforcement - Part (2)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 4/9] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 7/9] x86/mm: Shadow stack page fault error checking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 5/9] x86/mm: Introduce _PAGE_DIRTY_SW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 6/9] x86/mm: Introduce ptep_set_wrprotect_flush and related functions
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 8/9] x86/cet: Handle shadow stack page fault
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 9/9] x86/cet: Handle THP/HugeTLB shadow stack page copying
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 00/10] Control Flow Enforcement - Part (3)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 01/10] x86/cet: User-mode shadow stack support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 03/10] x86/cet: Signal handling for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 02/10] x86/cet: Introduce WRUSS instruction
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 10/10] mm: Prevent munmap and remap_file_pages of shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 09/10] mm: Prevent madvise from changing shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 05/10] x86/cet: ELF header parsing of Control Flow Enforcement
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 04/10] x86/cet: Handle thread shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 07/10] mm: Prevent mprotect from changing shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 08/10] mm: Prevent mremap of shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 5/5] Documentation/x86: Add CET description
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 2/5] x86/fpu/xstate: Change some names to separate XSAVES system and user states
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 5/7] x86: Insert endbr32/endbr64 to vDSO
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 6/7] tools: Add cetcmd
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 2/7] x86/cet: User-mode indirect branch tracking support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 3/7] mm/mmap: Add IBT bitmap size to address space limit check
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 7/7] x86/cet: Add PTRACE interface for CET
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 4/7] x86/cet: add arcp_prctl functions for indirect branch tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH 0/7] Control Flow Enforcement - Part (4)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 3.16 258/410] nospec: Allow index argument to have const-qualified type
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- [PATCH 1/7] x86/cet: Add Kconfig option for user-mode Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [RFC PATCH -tip v5 18/27] powerpc/kprobes: Don't call the ->break_handler() in arm kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- Re: [RFC PATCH -tip v5 07/27] powerpc/kprobes: Remove jprobe powerpc implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- Re: [RFC PATCH -tip v5 24/27] bpf: error-inject: kprobes: Clear current_kprobe and enable preempt in kprobe
- From: "Naveen N. Rao" <naveen.n.rao@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH -tip v5 18/27] powerpc/kprobes: Don't call the ->break_handler() in arm kprobes code
- From: "Naveen N. Rao" <naveen.n.rao@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH -tip v5 07/27] powerpc/kprobes: Remove jprobe powerpc implementation
- From: "Naveen N. Rao" <naveen.n.rao@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] kernel hacking: new config NO_AUTO_INLINE to disable compiler auto-inline optimizations
- From: Johan Hovold <johan@xxxxxxxxxx>
- Re: [PATCH v5 2/4] kernel hacking: new config NO_AUTO_INLINE to disable compiler auto-inline optimizations
- From: Alex Elder <elder@xxxxxxxxxx>
- Re: [PATCH v5 2/4] kernel hacking: new config NO_AUTO_INLINE to disable compiler auto-inline optimizations
- From: Bernd Petrovitsch <bernd@xxxxxxxxxxxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] kernel hacking: new config NO_AUTO_INLINE to disable compiler auto-inline optimizations
- From: Viresh Kumar <viresh.kumar@xxxxxxxxxx>
- Re: [PATCH v5 2/4] kernel hacking: new config NO_AUTO_INLINE to disable compiler auto-inline optimizations
- From: Johan Hovold <johan@xxxxxxxxxx>
- Re: [PATCH v5 2/4] kernel hacking: new config NO_AUTO_INLINE to disable compiler auto-inline optimizations
- From: Viresh Kumar <viresh.kumar@xxxxxxxxxx>
- Re: [PATCH v5 2/4] kernel hacking: new config NO_AUTO_INLINE to disable compiler auto-inline optimizations
- From: Viresh Kumar <viresh.kumar@xxxxxxxxxx>
- Re: [PATCH v5 2/4] kernel hacking: new config NO_AUTO_INLINE to disable compiler auto-inline optimizations
- From: Johan Hovold <johan@xxxxxxxxxx>
- Re: [PATCH v5 2/4] kernel hacking: new config NO_AUTO_INLINE to disable compiler auto-inline optimizations
- From: "Du, Changbin" <changbin.du@xxxxxxxxx>
- Re: [PATCH v5 2/4] kernel hacking: new config NO_AUTO_INLINE to disable compiler auto-inline optimizations
- From: Viresh Kumar <viresh.kumar@xxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] kernel hacking: new config NO_AUTO_INLINE to disable compiler auto-inline optimizations
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: Roman Penyaev <roman.penyaev@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] kernel hacking: new config NO_AUTO_INLINE to disable compiler auto-inline optimizations
- From: Johan Hovold <johan@xxxxxxxxxx>
- Re: [PATCH v5 2/4] kernel hacking: new config NO_AUTO_INLINE to disable compiler auto-inline optimizations
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v5 2/4] kernel hacking: new config NO_AUTO_INLINE to disable compiler auto-inline optimizations
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: Roman Penyaev <roman.penyaev@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH -tip v5 06/27] arm64: kprobes: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- Re: [PATCH v5 2/4] kernel hacking: new config NO_AUTO_INLINE to disable compiler auto-inline optimizations
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v5 2/4] kernel hacking: new config NO_AUTO_INLINE to disable compiler auto-inline optimizations
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH -tip v5 17/27] arm64: kprobes: Don't call the ->break_handler() in arm kprobes code
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [RFC PATCH -tip v5 06/27] arm64: kprobes: Remove jprobe implementation
- From: Will Deacon <will.deacon@xxxxxxx>
- [RESEND PATCH v5 0/4] kernel hacking: GCC optimization for better debug experience (-Og)
- From: changbin.du@xxxxxxxxx
- [PATCH v5 1/4] x86/mm: surround level4_kernel_pgt with #ifdef CONFIG_X86_5LEVEL...#endif
- From: changbin.du@xxxxxxxxx
- [PATCH v5 2/4] kernel hacking: new config NO_AUTO_INLINE to disable compiler auto-inline optimizations
- From: changbin.du@xxxxxxxxx
- [PATCH v5 3/4] ARM: mm: fix build error in fix_to_virt with CONFIG_CC_OPTIMIZE_FOR_DEBUGGING
- From: changbin.du@xxxxxxxxx
- [PATCH v5 4/4] kernel hacking: new config CC_OPTIMIZE_FOR_DEBUGGING to apply GCC -Og optimization
- From: changbin.du@xxxxxxxxx
- [RFC PATCH -tip v5 27/27] kprobes: Remove jprobe stub API
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 26/27] Documentation: kprobes: Add how to change the execution path
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 25/27] kprobes/x86: Do not disable preempt on int3 path
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 24/27] bpf: error-inject: kprobes: Clear current_kprobe and enable preempt in kprobe
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 23/27] sparc64: kprobes: Don't call the ->break_handler() in sparc64 kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- [RFC PATCH -tip v5 22/27] sh: kprobes: Don't call the ->break_handler() in SH kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 21/27] s390/kprobes: Don't call the ->break_handler() in s390 kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 20/27] MIPS: kprobes: Don't call the ->break_handler() in MIPS kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 19/27] ia64: kprobes: Don't call the ->break_handler() in ia64 kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 18/27] powerpc/kprobes: Don't call the ->break_handler() in arm kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 17/27] arm64: kprobes: Don't call the ->break_handler() in arm kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 16/27] ARM: kprobes: Don't call the ->break_handler() in arm kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 15/27] ARC: kprobes: Don't call the ->break_handler() in ARC kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 14/27] kprobes/x86: Don't call ->break_handler() in x86 kprobes
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 13/27] kprobes: Don't check the ->break_handler() in generic kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 12/27] sparc64: kprobes: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 11/27] sh: kprobes: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 10/27] s390/kprobes: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 09/27] MIPS: kprobes: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 08/27] ia64: kprobes: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 07/27] powerpc/kprobes: Remove jprobe powerpc implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 06/27] arm64: kprobes: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 05/27] ARM: kprobes: Remove jprobe arm implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 04/27] ARC: kprobes: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 03/27] kprobes/x86: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 02/27] kprobes: Remove jprobe API implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 01/27] Documentation/kprobes: Fix to remove remaining jprobe
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [RFC PATCH -tip v5 00/27] kprobes: Cleanup jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- [GIT PULL] siginfo work for v4.18-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [GIT PULL] siginfo work for v4.18-rc1
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] introduce support for early platform drivers
- From: Tony Lindgren <tony@xxxxxxxxxxx>
- Re: [PATCH -tip v4 00/27] kprobes: Cleanup jprobe implementation
- From: "Naveen N. Rao" <naveen.n.rao@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] introduce support for early platform drivers
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] introduce support for early platform drivers
- From: Rob Herring <robh+dt@xxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] mm: PAGE_KERNEL_* fallbacks
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH v3 0/2] mm: PAGE_KERNEL_* fallbacks
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] mm: PAGE_KERNEL_* fallbacks
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/12] introduce support for early platform drivers
- From: Michael Turquette <mturquette@xxxxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- [PATCH 3.2 098/153] nospec: Allow index argument to have const-qualified type
- From: Ben Hutchings <ben@xxxxxxxxxxxxxxx>
- Re: [PATCH -tip v4 00/27] kprobes: Cleanup jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- Re: [PATCH] signal/sh: Stop gcc warning about an impossible case in do_divide_error
- From: Sergei Shtylyov <sergei.shtylyov@xxxxxxxxxxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- [PATCH v4 15/27] compiler: Option to default to hidden symbols
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- [PATCH v4 24/27] x86/mm: Make the x86 GOT read-only
- From: Thomas Garnier <thgarnie@xxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC tools/memory-model] Add litmus-test naming scheme
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: LKMM litmus test for Roman Penyaev's rcu-rr
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- [PATCH] signal/sh: Stop gcc warning about an impossible case in do_divide_error
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH RFC tools/memory-model] Add litmus-test naming scheme
- From: Andrea Parri <andrea.parri@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC tools/memory-model] Add litmus-test naming scheme
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC tools/memory-model] Add litmus-test naming scheme
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC tools/memory-model] Add litmus-test naming scheme
- From: Andrea Parri <andrea.parri@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC tools/memory-model] Add litmus-test naming scheme
- From: Will Deacon <will.deacon@xxxxxxx>
- LKMM litmus test for Roman Penyaev's rcu-rr
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC tools/memory-model] Add litmus-test naming scheme
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC tools/memory-model] Add litmus-test naming scheme
- From: Andrea Parri <andrea.parri@xxxxxxxxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 16/22] signal/sh: Use force_sig_fault where appropriate
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH -tip v4 27/27] kprobes: Remove jprobe stub API
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 26/27] Documentation: kprobes: Add how to change the execution path
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 25/27] x86: kprobes: Do not disable preempt on int3 path
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 24/27] bpf: error-inject: kprobes: Clear current_kprobe and enable preempt in kprobe
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 23/27] sparc64: kprobes: Don't call the ->break_handler() in sparc64 kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 22/27] sh: kprobes: Don't call the ->break_handler() in SH kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 18/27] powerpc/kprobes: Don't call the ->break_handler() in arm kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 21/27] s390/kprobes: Don't call the ->break_handler() in s390 kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 20/27] MIPS: kprobes: Don't call the ->break_handler() in MIPS kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 19/27] ia64: kprobes: Don't call the ->break_handler() in ia64 kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 17/27] arm64: kprobes: Don't call the ->break_handler() in arm kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 16/27] ARM: kprobes: Don't call the ->break_handler() in arm kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 15/27] ARC: kprobes: Don't call the ->break_handler() in ARC kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 14/27] kprobes/x86: Don't call ->break_handler() in x86 kprobes
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 13/27] kprobes: Don't check the ->break_handler() in generic kprobes code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 12/27] sparc64: kprobes: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 11/27] sh: kprobes: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 10/27] s390/kprobes: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 09/27] MIPS: kprobes: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 08/27] ia64: kprobes: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 07/27] powerpc/kprobes: Remove jprobe powerpc implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 05/27] ARM: kprobes: Remove jprobe arm implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 06/27] arm64: kprobes: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 04/27] ARC: kprobes: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 03/27] kprobes/x86: Remove jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 02/27] kprobes: Remove jprobe API implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 01/27] Documentation/kprobes: Fix to remove remaining jprobe
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v4 00/27] kprobes: Cleanup jprobe implementation
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH RFC tools/memory-model] Add litmus-test naming scheme
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- [PATCH v3 1/6] arm64: add type casts to untagged_addr macro
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v3 4/6] mm, arm64: untag user addresses in mm/gup.c
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v3 5/6] lib, arm64: untag addrs passed to strncpy_from_user and strnlen_user
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v3 6/6] arm64: update Documentation/arm64/tagged-pointers.txt
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v3 3/6] arm64: untag user addresses in access_ok and __uaccess_mask_ptr
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v3 2/6] uaccess: add untagged_addr definition for other arches
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v3 0/6] arm64: untag user pointers passed to the kernel
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v11 00/19] KVM: arm64: Optimise FPSIMD context switching
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 07/24] arm64: ilp32: add documentation on the ILP32 ABI for ARM64
- From: "Dr. Philipp Tomsich" <philipp.tomsich@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/24] arm64: ilp32: add documentation on the ILP32 ABI for ARM64
- From: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
- [PATCH 4.4 25/92] futex: Remove duplicated code and fix undefined behaviour
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/4] arm64: Implement page table free interfaces
- From: Chintan Pandya <cpandya@xxxxxxxxxxxxxx>
- Re: [PATCH v9 3/4] arm64: Implement page table free interfaces
- From: Chintan Pandya <cpandya@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] mm: PAGE_KERNEL_* fallbacks
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH v9 3/4] arm64: Implement page table free interfaces
- From: "Kani, Toshi" <toshi.kani@xxxxxxx>
- Re: [PATCH 07/24] arm64: ilp32: add documentation on the ILP32 ABI for ARM64
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v9 3/4] arm64: Implement page table free interfaces
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [RFC PATCH 3/6] arm64: Use update{,_tsk}_thread_flag()
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [RFC PATCH 1/6] thread_info: Add update_thread_flag() helpers
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [RFC PATCH 01/11] prctl: Support movement of arch prctls out of common code
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCHv2 06/12] arm64: add basic pointer authentication support
- From: Adam Wallis <awallis@xxxxxxxxxxxxxx>
- [PATCH v10 00/18] KVM: arm64: Optimise FPSIMD context switching
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 03/25] hexagon: use generic dma_noncoherent_ops
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 04/25] m68k: use generic dma_noncoherent_ops
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 02/25] hexagon: implement the sync_sg_for_device DMA operation
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 08/25] nds32: consolidate DMA cache maintainance routines
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 06/25] microblaze: remove the consistent_sync and consistent_sync_page
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 07/25] nds32: remove the broken kmap code in nds32_dma_map_sg
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 09/25] nds32: implement the unmap_sg DMA operation
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 11/25] nios2: use generic dma_noncoherent_ops
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 10/25] nds32: use generic dma_noncoherent_ops
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 12/25] openrisc: remove the sync_single_for_cpu DMA operation
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 15/25] openrisc: use generic dma_noncoherent_ops
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 16/25] sh: simplify get_arch_dma_ops
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 17/25] sh: introduce a sh_cacheop_vaddr helper
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 19/25] sh: split arch/sh/mm/consistent.c
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 18/25] sh: use dma_direct_ops for the CONFIG_DMA_COHERENT case
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 20/25] sh: use generic dma_noncoherent_ops
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 23/25] parisc: merge pcx_dma_ops and pcxl_dma_ops
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 24/25] parisc: always use flush_kernel_dcache_range for DMA cache maintainance
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 25/25] parisc: use generic dma_noncoherent_ops
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 22/25] sparc: use generic dma_noncoherent_ops
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 21/25] xtensa: use generic dma_noncoherent_ops
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 14/25] openrisc: fix cache maintainance the the sync_single_for_device DMA operation
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 13/25] openrisc: remove the no-op unmap_page and unmap_sg DMA operations
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 05/25] microblaze: use generic dma_noncoherent_ops
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 01/25] hexagon: remove the sync_single_for_cpu DMA operation
- From: Christoph Hellwig <hch@xxxxxx>
- common non-cache coherent direct dma mapping ops v2
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 04/20] arm-nommu: use generic dma_noncoherent_ops
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [RFC PATCH 02/11] arm64: Move arch-specific prctls out of core code
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [RFC PATCH 01/11] prctl: Support movement of arch prctls out of common code
- From: Will Deacon <will.deacon@xxxxxxx>
- [PATCH v9 00/16] KVM: arm64: Optimise FPSIMD context switching
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v6 17/28] x86/asm: use SYM_INNER_LABEL instead of GLOBAL
- From: Jiri Slaby <jslaby@xxxxxxx>
[Index of Archives]
[Kernel Announce]
[IETF Annouce]
[Netdev]
[Netfilter]
[Bugtraq]