Linux Arch
[Prev Page][Next Page]
- [PATCH v3 5/5] kernel: tracepoints: add support for relative references
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 2/5] module: use relative references for __ksymtab entries
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v3 0/5] add support for relative references in special sections
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v8 02/28] x86/boot: Relocate definition of the initial state of CR0
- From: Ricardo Neri <ricardo.neri-calderon@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] mm/hugetlb.c: make huge_pte_offset() consistent and document behaviour
- From: Mike Kravetz <mike.kravetz@xxxxxxxxxx>
- Re: [PATCH -tip v9 3/5] cris: mark _stext and _end as char-arrays, not single char
- From: Jesper Nilsson <jesper.nilsson@xxxxxxxx>
- Re: [PATCH -tip v9 3/5] cris: mark _stext and _end as char-arrays, not single char
- From: Jesper Nilsson <jesper.nilsson@xxxxxxxx>
- Re: [PATCH 5/5] kernel: tracepoints: add support for relative references
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 5/5] kernel: tracepoints: add support for relative references
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [GIT PULL rcu/next] RCU commits for 4.14
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 05/27] arm64: fpsimd: Simplify uses of {set, clear}_ti_thread_flag()
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- [PATCH v2] mm/hugetlb.c: make huge_pte_offset() consistent and document behaviour
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- Re: [PATCH v2 6/6] kernel: tracepoints: add support for relative references
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 6/6] kernel: tracepoints: add support for relative references
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v2 6/6] kernel: tracepoints: add support for relative references
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 6/6] kernel: tracepoints: add support for relative references
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH 04/27] arm64: Port deprecated instruction emulation to new sysctl interface
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH 03/27] arm64: efi: Add missing Kconfig dependency on KERNEL_MODE_NEON
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH 01/27] regset: Add support for dynamically sized regsets
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v2 6/6] kernel: tracepoints: add support for relative references
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 2/6] module: use relative references for __ksymtab entries
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 3/6] treewide: add missing trailing semicolons to initcall() invocations
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 5/6] drivers: pci: add support for relative addressing in quirk tables
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 6/6] kernel: tracepoints: add support for relative references
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 4/6] init: allow initcall tables to be emitted using relative references
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 1/6] arch: enable relative relocations for arm64, power, x86, s390 and x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH v2 0/6] add support for relative references in special sections
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 5/5] kernel: tracepoints: add support for relative references
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 5/5] kernel: tracepoints: add support for relative references
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 5/5] kernel: tracepoints: add support for relative references
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 0/5] add support for relative references in special sections
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/5] add support for relative references in special sections
- From: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
- Re: [PATCH 0/5] add support for relative references in special sections
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/5] add support for relative references in special sections
- From: Sergey Senozhatsky <sergey.senozhatsky.work@xxxxxxxxx>
- Re: [RFC v6 21/62] powerpc: introduce execute-only pkey
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [PATCH 11/27] arm64/sve: Core task context handling
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 11/27] arm64/sve: Core task context handling
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH] [RESEND] mtd: only use __xipram annotation when XIP_KERNEL is set
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 15/27] arm64/sve: Probe SVE capabilities and usable vector lengths
- From: Suzuki K Poulose <Suzuki.Poulose@xxxxxxx>
- [tip:locking/core] locking/refcounts, x86/asm: Implement fast refcount overflow protection
- From: tip-bot for Kees Cook <tipbot@xxxxxxxxx>
- Re: [PATCH 15/27] arm64/sve: Probe SVE capabilities and usable vector lengths
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 24/27] arm64/sve: Detect SVE and activate runtime support
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 02/27] arm64: KVM: Hide unsupported AArch64 CPU features from guests
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 02/27] arm64: KVM: Hide unsupported AArch64 CPU features from guests
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [PATCH -tip 4/4] extable: kallsyms: Add in_init_text() and in_core_text() helper
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip 3/4] arm64: Cleanup in_exception_text() and move it in asm/sections.h
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip 2/4] arm: Cleanup in_exception_text() and move it in asm/sections.h
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip 1/4] x86: Add in_entry_text() helper function
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip 0/4] Add section address checking helper
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- Re: [PATCH 02/27] arm64: KVM: Hide unsupported AArch64 CPU features from guests
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 24/27] arm64/sve: Detect SVE and activate runtime support
- From: Suzuki K Poulose <Suzuki.Poulose@xxxxxxx>
- Re: [PATCH 15/27] arm64/sve: Probe SVE capabilities and usable vector lengths
- From: Suzuki K Poulose <Suzuki.Poulose@xxxxxxx>
- Re: [PATCH v7 2/9] mm, swap: Add infrastructure for saving page metadata on swap
- From: Khalid Aziz <khalid.aziz@xxxxxxxxxx>
- Re: [PATCH 21/27] arm64/sve: KVM: Prevent guests from using SVE
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 21/27] arm64/sve: KVM: Prevent guests from using SVE
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 23/27] arm64/sve: KVM: Hide SVE from CPU features exposed to guests
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 21/27] arm64/sve: KVM: Prevent guests from using SVE
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 23/27] arm64/sve: KVM: Hide SVE from CPU features exposed to guests
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 02/27] arm64: KVM: Hide unsupported AArch64 CPU features from guests
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH -tip v9 3/5] cris: mark _stext and _end as char-arrays, not single char
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- Re: [PATCH 23/27] arm64/sve: KVM: Hide SVE from CPU features exposed to guests
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 21/27] arm64/sve: KVM: Prevent guests from using SVE
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 11/27] arm64/sve: Core task context handling
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 17/27] arm64/sve: Preserve SVE registers around EFI runtime service calls
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v7 2/9] mm, swap: Add infrastructure for saving page metadata on swap
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 17/27] arm64/sve: Preserve SVE registers around EFI runtime service calls
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 16/27] arm64/sve: Preserve SVE registers around kernel-mode NEON use
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 11/27] arm64/sve: Core task context handling
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 05/27] arm64: fpsimd: Simplify uses of {set,clear}_ti_thread_flag()
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 23/27] arm64/sve: KVM: Hide SVE from CPU features exposed to guests
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- Re: [PATCH 21/27] arm64/sve: KVM: Prevent guests from using SVE
- From: Marc Zyngier <marc.zyngier@xxxxxxx>
- [RESEND][PATCH v9] x86/asm: Implement fast refcount overflow protection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 5/5] kernel: tracepoints: add support for relative references
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 5/5] kernel: tracepoints: add support for relative references
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: Fwd: struct pt_regs missing in /usr/include/ tree for eBPF program compile
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: Fwd: struct pt_regs missing in /usr/include/ tree for eBPF program compile
- From: Heiko Carstens <heiko.carstens@xxxxxxxxxx>
- [PATCH 1/5] arch: enable relative relocations for arm64, power, x86, s390 and x86
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 2/5] module: use relative references for __ksymtab entries
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 3/5] init: allow initcall tables to be emitted using relative references
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 4/5] drivers: pci: add support for relative addressing in quirk tables
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 5/5] kernel: tracepoints: add support for relative references
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH 0/5] add support for relative references in special sections
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v6 6/7] mm: fix MADV_[FREE|DONTNEED] TLB flush miss problem
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v6 4/7] mm: refactoring TLB gathering API
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v6 6/7] mm: fix MADV_[FREE|DONTNEED] TLB flush miss problem
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v6 6/7] mm: fix MADV_[FREE|DONTNEED] TLB flush miss problem
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH] [RFC] vm: add a syscall to map a process memory into a pipe
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/7] mm: refactoring TLB gathering API
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH v6 6/7] mm: fix MADV_[FREE|DONTNEED] TLB flush miss problem
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/11] ARMv8.3 pointer authentication userspace support
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v6 4/7] mm: refactoring TLB gathering API
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 07/11] arm64: add basic pointer authentication support
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 07/11] arm64: add basic pointer authentication support
- From: Yao Qi <yao.qi@xxxxxxx>
- Re: [PATCH] [RFC] vm: add a syscall to map a process memory into a pipe
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH] [RFC] vm: add a syscall to map a process memory into a pipe
- From: Andrei Vagin <avagin@xxxxxxxxxx>
- Re: [lkp-robot] [mm] 7674270022: will-it-scale.per_process_ops -19.3% regression
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [lkp-robot] [mm] 7674270022: will-it-scale.per_process_ops -19.3% regression
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [lkp-robot] [mm] 7674270022: will-it-scale.per_process_ops -19.3% regression
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v7 2/9] mm, swap: Add infrastructure for saving page metadata on swap
- From: Khalid Aziz <khalid.aziz@xxxxxxxxxx>
- [PATCH v7 0/9] Application Data Integrity feature introduced by SPARC M7
- From: Khalid Aziz <khalid.aziz@xxxxxxxxxx>
- [PATCH v7 1/9] signals, sparc: Add signal codes for ADI violations
- From: Khalid Aziz <khalid.aziz@xxxxxxxxxx>
- [RFC PATCH 27/27] arm64/sve: signal: Include SVE when computing AT_MINSIGSTKSZ
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [RFC PATCH 26/27] arm64: signal: Report signal frame size to userspace via auxv
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 25/27] arm64/sve: Add documentation
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 24/27] arm64/sve: Detect SVE and activate runtime support
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 23/27] arm64/sve: KVM: Hide SVE from CPU features exposed to guests
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 22/27] arm64/sve: KVM: Treat guest SVE use as undefined instruction execution
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 21/27] arm64/sve: KVM: Prevent guests from using SVE
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 20/27] arm64/sve: Add sysctl to set the default vector length for new processes
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 19/27] arm64/sve: Add prctl controls for userspace vector length management
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 18/27] arm64/sve: ptrace and ELF coredump support
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 17/27] arm64/sve: Preserve SVE registers around EFI runtime service calls
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 16/27] arm64/sve: Preserve SVE registers around kernel-mode NEON use
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 15/27] arm64/sve: Probe SVE capabilities and usable vector lengths
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 14/27] arm64/sve: Backend logic for setting the vector length
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 13/27] arm64/sve: Signal handling support
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 12/27] arm64/sve: Support vector length resetting for new processes
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 11/27] arm64/sve: Core task context handling
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 10/27] arm64/sve: Low-level CPU setup
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 09/27] arm64/sve: Signal frame and context structure definition
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 08/27] arm64/sve: Kconfig update and conditional compilation support
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 07/27] arm64/sve: Low-level SVE architectural state manipulation functions
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 06/27] arm64/sve: System register and exception syndrome definitions
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 05/27] arm64: fpsimd: Simplify uses of {set,clear}_ti_thread_flag()
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 04/27] arm64: Port deprecated instruction emulation to new sysctl interface
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 03/27] arm64: efi: Add missing Kconfig dependency on KERNEL_MODE_NEON
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 01/27] regset: Add support for dynamically sized regsets
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 02/27] arm64: KVM: Hide unsupported AArch64 CPU features from guests
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH 00/27] ARM Scalable Vector Extension (SVE)
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v06 05/36] uapi linux/sysctl.h: use __kernel_size_t instead of size_t
- From: Mikko Rapeli <mikko.rapeli@xxxxxx>
- Re: [lkp-robot] [mm] 7674270022: will-it-scale.per_process_ops -19.3% regression
- From: Ye Xiaolong <xiaolong.ye@xxxxxxxxx>
- Re: [lkp-robot] [mm] 7674270022: will-it-scale.per_process_ops -19.3% regression
- From: Ye Xiaolong <xiaolong.ye@xxxxxxxxx>
- Re: [PATCH 4/7] signal/mips: Document a conflict with SI_USER with SIGFPE
- From: "Maciej W. Rozycki" <macro@xxxxxxxxxx>
- Re: [PATCH v06 09/36] uapi asm-generic/sembuf.h: include asm/posix_types.h and asm/ipcbuf.h
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [PATCH v06 08/36] uapi asm-generic/shmbuf.h: include fixes
- From: "Dmitry V. Levin" <ldv@xxxxxxxxxxxx>
- Re: [PATCH 4/7] signal/mips: Document a conflict with SI_USER with SIGFPE
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [lkp-robot] [mm] 7674270022: will-it-scale.per_process_ops -19.3% regression
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [lkp-robot] [mm] 7674270022: will-it-scale.per_process_ops -19.3% regression
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [lkp-robot] [mm] 7674270022: will-it-scale.per_process_ops -19.3% regression
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [lkp-robot] [mm] 7674270022: will-it-scale.per_process_ops -19.3% regression
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH 4/7] signal/mips: Document a conflict with SI_USER with SIGFPE
- From: Ralf Baechle <ralf@xxxxxxxxxxxxxx>
- Re: [PATCH 4/7] signal/mips: Document a conflict with SI_USER with SIGFPE
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] signal/mips: Document a conflict with SI_USER with SIGFPE
- From: "Maciej W. Rozycki" <macro@xxxxxxxxxx>
- [PATCH v06 09/36] uapi asm-generic/sembuf.h: include asm/posix_types.h and asm/ipcbuf.h
- From: Mikko Rapeli <mikko.rapeli@xxxxxx>
- [PATCH v06 06/36] uapi asm-generic/ipcbuf.h: include linux/posix_types.h
- From: Mikko Rapeli <mikko.rapeli@xxxxxx>
- [PATCH v06 07/36] uapi asm-generic/msgbuf.h: include asm/ipcbuf.h
- From: Mikko Rapeli <mikko.rapeli@xxxxxx>
- [PATCH v06 10/36] uapi asm-generic/signal.h: use __kernel_size_t instead of size_t
- From: Mikko Rapeli <mikko.rapeli@xxxxxx>
- [PATCH v06 11/36] uapi asm-generic/ucontext.h: include asm/signal.h and asm/sigcontext.h
- From: Mikko Rapeli <mikko.rapeli@xxxxxx>
- [PATCH v06 08/36] uapi asm-generic/shmbuf.h: include fixes
- From: Mikko Rapeli <mikko.rapeli@xxxxxx>
- Re: [PATCH v2] module: use relative references for __ksymtab entries
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] module: use relative references for __ksymtab entries
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v2] module: use relative references for __ksymtab entries
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v6 1/7] drm/tilcdc: ensure nonatomic iowrite64 is not used
- From: Jyri Sarha <jsarha@xxxxxx>
- Re: [PATCH v6 1/7] drm/tilcdc: ensure nonatomic iowrite64 is not used
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH] uapi: fix another asm/shmbuf.h userspace compilation error
- From: James Hogan <james.hogan@xxxxxxxxxx>
- Re: [PATCH v6 1/7] drm/tilcdc: ensure nonatomic iowrite64 is not used
- From: Tomi Valkeinen <tomi.valkeinen@xxxxxx>
- Re: [PATCH] [RESEND] mtd: only use __xipram annotation when XIP_KERNEL is set
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] [RESEND] mtd: only use __xipram annotation when XIP_KERNEL is set
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] [RESEND] mtd: only use __xipram annotation when XIP_KERNEL is set
- From: Boris Brezillon <boris.brezillon@xxxxxxxxxxxxxxxxxx>
- [PATCH v6 6/7] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v6 1/7] drm/tilcdc: ensure nonatomic iowrite64 is not used
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v6 5/7] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v6 4/7] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v6 3/7] powerpc: iomap.c: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v6 7/7] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v6 2/7] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v6 0/7] make io{read|write}64 globally usable
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH 01/11] arm64: docs: describe ELF hwcaps
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 01/11] arm64: docs: describe ELF hwcaps
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH -tip v9 5/5] [BUGFIX] kprobes/x86: Do not jump-optimize kprobes on irq entry code
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v9 4/5] irq: Make irqentry text section unconditional
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v9 3/5] cris: mark _stext and _end as char-arrays, not single char
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v9 2/5] xtensa: mark _stext and _end as char-arrays, not single char
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v9 1/5] h8300: mark _stext and _etext as char-arrays, not single char
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- [PATCH -tip v9 0/5] kprobes related bugfix
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- Re: [PATCH v9] x86/asm: Implement fast refcount overflow protection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [RFC PATCH] module: use relative references for __ksymtab entries
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [RFC v6 21/62] powerpc: introduce execute-only pkey
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH v6 4/7] mm: refactoring TLB gathering API
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v6 6/7] mm: fix MADV_[FREE|DONTNEED] TLB flush miss problem
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH v2 1/4] mm: refactoring TLB gathering API
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v2 1/4] mm: refactoring TLB gathering API
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v2 1/4] mm: refactoring TLB gathering API
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH v5 5/6] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Jon Mason <jdmason@xxxxxxxx>
- Re: [PATCH 10/11] arm64/kvm: context-switch ptrauth registers
- From: Christoffer Dall <christoffer.dall@xxxxxxxxxx>
- Re: [RFC v6 21/62] powerpc: introduce execute-only pkey
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 10/11] arm64/kvm: context-switch ptrauth registers
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 10/11] arm64/kvm: context-switch ptrauth registers
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 09/11] arm64/kvm: preserve host HCR_EL2 value
- From: Christoffer Dall <cdall@xxxxxxxxxx>
- Re: [PATCH 10/11] arm64/kvm: context-switch ptrauth registers
- From: Christoffer Dall <cdall@xxxxxxxxxx>
- Re: [PATCH v2 3/4] mm: fix MADV_[FREE|DONTNEED] TLB flush miss problem
- From: Mel Gorman <mgorman@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] mm: refactoring TLB gathering API
- From: Mel Gorman <mgorman@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] mm:shm: Use new hugetlb size encoding definitions
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH 2/3] mm: arch: Consolidate mmap hugetlb size encodings
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH 1/3] mm:hugetlb: Define system call hugetlb size encodings in single file
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [RFC v6 21/62] powerpc: introduce execute-only pkey
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH v2 3/4] mm: fix MADV_[FREE|DONTNEED] TLB flush miss problem
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v2 1/4] mm: refactoring TLB gathering API
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v2 tip/core/rcu 10/10] arch: Remove spin_unlock_wait() arch-specific definitions
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- [PATCH 3/3] mm:shm: Use new hugetlb size encoding definitions
- From: Mike Kravetz <mike.kravetz@xxxxxxxxxx>
- [PATCH 0/3] Consolidate system call hugetlb page size encodings
- From: Mike Kravetz <mike.kravetz@xxxxxxxxxx>
- [PATCH 1/3] mm:hugetlb: Define system call hugetlb size encodings in single file
- From: Mike Kravetz <mike.kravetz@xxxxxxxxxx>
- [PATCH 2/3] mm: arch: Consolidate mmap hugetlb size encodings
- From: Mike Kravetz <mike.kravetz@xxxxxxxxxx>
- Re: [RFC v6 13/62] powerpc: track allocation status of all pkeys
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v5 3/6] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v5 3/6] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v5 3/6] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH v5 3/6] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: Simplfying copy_siginfo_to_user
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v5 3/6] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [RFC v6 21/62] powerpc: introduce execute-only pkey
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [PATCH v5 3/6] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [RFC v6 20/62] powerpc: store and restore the pkey state across context switches
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [RFC v6 19/62] powerpc: ability to create execute-disabled pkeys
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] make io{read|write}64 globally usable
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v5 3/6] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- Re: [RFC v6 21/62] powerpc: introduce execute-only pkey
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v6 27/62] powerpc: helper to validate key-access permissions of a pte
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v6 15/62] powerpc: helper functions to initialize AMR, IAMR and UMOR registers
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v6 20/62] powerpc: store and restore the pkey state across context switches
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v6 19/62] powerpc: ability to create execute-disabled pkeys
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v6 17/62] powerpc: implementation for arch_set_user_pkey_access()
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v6 13/62] powerpc: track allocation status of all pkeys
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v6 21/62] powerpc: introduce execute-only pkey
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Re: [RFC v6 27/62] powerpc: helper to validate key-access permissions of a pte
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] mm: fix MADV_[FREE|DONTNEED] TLB flush miss problem
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH 2/3] mm: fix MADV_[FREE|DONTNEED] TLB flush miss problem
- From: Mel Gorman <mgorman@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] mm: fix MADV_[FREE|DONTNEED] TLB flush miss problem
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [RFC v6 15/62] powerpc: helper functions to initialize AMR, IAMR and UMOR registers
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Re: [RFC v6 20/62] powerpc: store and restore the pkey state across context switches
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Re: [RFC v6 19/62] powerpc: ability to create execute-disabled pkeys
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Re: [RFC v6 19/62] powerpc: ability to create execute-disabled pkeys
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Re: [RFC v6 17/62] powerpc: implementation for arch_set_user_pkey_access()
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Re: [RFC v6 13/62] powerpc: track allocation status of all pkeys
- From: Thiago Jung Bauermann <bauerman@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] mm/hugetlb: Make huge_pte_offset() consistent and document behaviour
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- Re: [PATCH 1/1] mm/hugetlb: Make huge_pte_offset() consistent and document behaviour
- From: Mike Kravetz <mike.kravetz@xxxxxxxxxx>
- [PATCH v5 5/6] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v5 2/6] powerpc: iomap.c: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v5 6/6] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v5 4/6] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v5 1/6] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v5 3/6] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v5 0/6] make io{read|write}64 globally usable
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH 11/11] asm-generic: numa: Remove the unused parent_node() macro
- From: Dou Liyang <douly.fnst@xxxxxxxxxxxxxx>
- Re: [PATCH 1/1] mm/hugetlb: Make huge_pte_offset() consistent and document behaviour
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- Re: [PATCH 1/1] mm/hugetlb: Make huge_pte_offset() consistent and document behaviour
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH 1/1] mm/hugetlb: Make huge_pte_offset() consistent and document behaviour
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH 1/1] mm/hugetlb: Make huge_pte_offset() consistent and document behaviour
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- Re: [PATCH 1/1] mm/hugetlb: Make huge_pte_offset() consistent and document behaviour
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH 1/1] mm/hugetlb: Make huge_pte_offset() consistent and document behaviour
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH 1/1] mm/hugetlb: Make huge_pte_offset() consistent and document behaviour
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH v9] x86/asm: Implement fast refcount overflow protection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [kernel-hardening] [PATCH v8 3/3] x86/refcount: Implement fast refcount overflow protection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 00/11] ARMv8.3 pointer authentication userspace support
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 1/1] mm/hugetlb: Make huge_pte_offset() consistent and document behaviour
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- [PATCH 0/1] Clarify huge_pte_offset() semantics
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- Re: [PATCH 07/11] arm64: add basic pointer authentication support
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [kernel-hardening] [PATCH 00/11] ARMv8.3 pointer authentication userspace support
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [RFC 7/9] arm64: expose PAC bit positions via ptrace
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [RFC 7/9] arm64: expose PAC bit positions via ptrace
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [RFC PATCH 1/2] mm/hugetlb: Make huge_pte_offset() consistent between PUD and PMD entries
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- Re: [kernel-hardening] [PATCH 00/11] ARMv8.3 pointer authentication userspace support
- From: Li Kun <hw.likun@xxxxxxxxxx>
- Re: [PATCH 00/11] ARMv8.3 pointer authentication userspace support
- From: Jiong Wang <Jiong.Wang@xxxxxxx>
- [tip:x86/asm] x86/asm: Add ASM_UNREACHABLE
- From: tip-bot for Kees Cook <tipbot@xxxxxxxxx>
- [tip:x86/asm] x86/asm: Add suffix macro for GEN_*_RMWcc()
- From: tip-bot for Kees Cook <tipbot@xxxxxxxxx>
- Re: [RFC PATCH 1/2] mm/hugetlb: Make huge_pte_offset() consistent between PUD and PMD entries
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [RFC 7/9] arm64: expose PAC bit positions via ptrace
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 00/11] ARMv8.3 pointer authentication userspace support
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [kernel-hardening] [PATCH v8 3/3] x86/refcount: Implement fast refcount overflow protection
- From: Li Kun <hw.likun@xxxxxxxxxx>
- Re: [PATCH 00/11] ARMv8.3 pointer authentication userspace support
- From: Yao Qi <yao.qi@xxxxxxx>
- [PATCH 3/3] of: search scripts/dtc/include-prefixes path for both CPP and DTC
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH 1/3] of: remove drivers/of/testcase-data from include search path for CPP
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH 2/3] of: remove arch/$(SRCARCH)/boot/dts from include search path for CPP
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH 0/3] devicetree: cleanup and improve DT cross-arch reference
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: Simplfying copy_siginfo_to_user
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH tip/core/rcu 9/9] arch: Remove spin_unlock_wait() arch-specific definitions
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: Simplfying copy_siginfo_to_user
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v8 3/3] x86/refcount: Implement fast refcount overflow protection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v8 1/3] x86/asm: Add suffix macro for GEN_*_RMWcc()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v8 2/3] x86/asm: add ASM_UNREACHABLE
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v8 0/3] x86: Implement fast refcount overflow protection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 3/3] x86/refcount: Implement fast refcount overflow protection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Simplfying copy_siginfo_to_user
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [RFC PATCH 1/2] mm/hugetlb: Make huge_pte_offset() consistent between PUD and PMD entries
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- [RFC PATCH 0/2] Clarify huge_pte_offset() semantics
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- [RFC PATCH 2/2] mm/hugetlb: Support swap entries in huge_pte_offset()
- From: Punit Agrawal <punit.agrawal@xxxxxxx>
- Re: KASAN vs. boot-time switching between 4- and 5-level paging
- From: Andrey Ryabinin <aryabinin@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/2] x86: Implement fast refcount overflow protection
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: KASAN vs. boot-time switching between 4- and 5-level paging
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/2] x86: Implement fast refcount overflow protection
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 00/11] ARMv8.3 pointer authentication userspace support
- From: Yao Qi <yao.qi@xxxxxxx>
- Re: [PATCH 04/11] arm64/cpufeature: add ARMv8.3 id_aa64isar1 bits
- From: Suzuki K Poulose <Suzuki.Poulose@xxxxxxx>
- Re: [PATCH 01/11] arm64: docs: describe ELF hwcaps
- From: Suzuki K Poulose <Suzuki.Poulose@xxxxxxx>
- Re: [PATCH 06/11] arm64: Don't trap host pointer auth use to EL2
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v7 3/3] x86/refcount: Implement fast refcount overflow protection
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v6 0/2] x86: Implement fast refcount overflow protection
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/2] x86: Implement fast refcount overflow protection
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH v7 3/3] x86/refcount: Implement fast refcount overflow protection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v7 0/3] x86: Implement fast refcount overflow protection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v7 2/3] x86/asm: add ASM_UNREACHABLE
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v7 1/3] x86/asm: Add suffix macro for GEN_*_RMWcc()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Simplfying copy_siginfo_to_user
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v6 0/2] x86: Implement fast refcount overflow protection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 0/2] x86: Implement fast refcount overflow protection
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] [RESEND] mtd: only use __xipram annotation when XIP_KERNEL is set
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 01/11] arm64: docs: describe ELF hwcaps
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 00/11] ARMv8.3 pointer authentication userspace support
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [RFC v6 27/62] powerpc: helper to validate key-access permissions of a pte
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [PATCH v6 0/2] x86: Implement fast refcount overflow protection
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [RFC v6 27/62] powerpc: helper to validate key-access permissions of a pte
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/7] fcntl: Don't use ambiguous SIG_POLL si_codes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v6 0/2] x86: Implement fast refcount overflow protection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC v6 27/62] powerpc: helper to validate key-access permissions of a pte
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v6 11/62] powerpc: initial pkey plumbing
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v6 01/62] powerpc: Free up four 64K PTE bits in 4K backed HPTE pages
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [PATCH v6 0/2] x86: Implement fast refcount overflow protection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 6/7] fcntl: Don't use ambiguous SIG_POLL si_codes
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v4 1/5] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH 1/5] Construct init thread stack in the linker script rather than by union
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/5] Unroll INIT_TASK() in init/init_task.c
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/5] Unroll various INIT_* macros
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 4/5] Unroll the INIT_SIGNALS and INIT_SIGHAND macros
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 5/5] Unroll INIT_STRUCT_PID
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 0/5] Consolidate init_task handling
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v4 1/5] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v4 1/5] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v4 1/5] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
- From: Horia Geantă <horia.geanta@xxxxxxx>
- Re: [PATCH v6 0/2] x86: Implement fast refcount overflow protection
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 0/8] 5-level paging enabling for v4.14
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC v6 27/62] powerpc: helper to validate key-access permissions of a pte
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC v6 26/62] powerpc: Program HPTE key protection bits
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC v6 11/62] powerpc: initial pkey plumbing
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC v6 07/62] powerpc: use helper functions in __hash_page_huge() for 64K PTE
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC v6 06/62] powerpc: use helper functions in __hash_page_64K() for 64K PTE
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC v6 04/62] powerpc: introduce pte_get_hash_gslot() helper
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC v6 03/62] powerpc: introduce pte_set_hash_slot() helper
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC v6 05/62] powerpc: capture the PTE format changes in the dump pte report
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC v6 02/62] powerpc: Free up four 64K PTE bits in 64K backed HPTE pages
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC v6 01/62] powerpc: Free up four 64K PTE bits in 4K backed HPTE pages
- From: "Aneesh Kumar K.V" <aneesh.kumar@xxxxxxxxxxxxxxxxxx>
- Re: [RFC 06/22] kvm: Adapt assembly for PIE support
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [RFC 20/22] x86/relocs: Add option to generate 64-bit relocations
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v6 2/2] x86/refcount: Implement fast refcount overflow protection
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v6 2/2] x86/refcount: Implement fast refcount overflow protection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 2/2] x86/refcount: Implement fast refcount overflow protection
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v6 2/2] x86/refcount: Implement fast refcount overflow protection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 2/2] x86/refcount: Implement fast refcount overflow protection
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v6 2/2] x86/refcount: Implement fast refcount overflow protection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 2/2] x86/refcount: Implement fast refcount overflow protection
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- [PATCH 00/11] ARMv8.3 pointer authentication userspace support
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 02/11] asm-generic: mm_hooks: allow hooks to be overridden individually
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 01/11] arm64: docs: describe ELF hwcaps
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 04/11] arm64/cpufeature: add ARMv8.3 id_aa64isar1 bits
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 03/11] arm64: add pointer authentication register bits
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v4 1/5] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH 09/11] arm64/kvm: preserve host HCR_EL2 value
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 08/11] arm64: expose user PAC bit positions via ptrace
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 06/11] arm64: Don't trap host pointer auth use to EL2
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 10/11] arm64/kvm: context-switch ptrauth registers
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 11/11] arm64: docs: document pointer authentication
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 07/11] arm64: add basic pointer authentication support
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 05/11] arm64/cpufeature: detect pointer authentication
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v4 1/5] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH v6 1/2] x86/asm: Add suffix macro for GEN_*_RMWcc()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 2/2] x86/refcount: Implement fast refcount overflow protection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 0/2] x86: Implement fast refcount overflow protection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/7] signal/alpha: Document a conflict with SI_USER for SIGTRAP
- From: Richard Henderson <rth@xxxxxxxxxxx>
- RE: [PATCH v4 4/5] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: "Allen Hubbe" <Allen.Hubbe@xxxxxxxx>
- Re: [PATCH 7/7] signal: Remove kernel interal si_code magic
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v4 0/5] make io{read|write}64 globally usable
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v4 5/5] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH 7/7] signal: Remove kernel interal si_code magic
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 4/5] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v4 2/5] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v4 1/5] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v4 3/5] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH 2/7] signal/ia64: Document a conflict with SI_USER with SIGFPE
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 3/7] signal/sparc: Document a conflict with SI_USER with SIGFPE
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 5/7] signal/testing: Don't look for __SI_FAULT in userspace
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 6/7] fcntl: Don't use ambiguous SIG_POLL si_codes
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 7/7] signal: Remove kernel interal si_code magic
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 4/7] signal/mips: Document a conflict with SI_USER with SIGFPE
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 1/7] signal/alpha: Document a conflict with SI_USER for SIGTRAP
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH v2 0/7] signal: Fix sending signals with siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v10 00/38] x86: Secure Memory Encryption (AMD)
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v10 37/38] compiler-gcc.h: Introduce __nostackp function attribute
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 3/8] signal/sparc: Document a conflict with SI_USER with SIGFPE
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 1/8] signal/alpha: Document a conflict with SI_USER for SIGTRAP
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v10 00/38] x86: Secure Memory Encryption (AMD)
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v10 37/38] compiler-gcc.h: Introduce __nostackp function attribute
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH v10 01/38] x86: Document AMD Secure Memory Encryption (SME)
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 02/38] x86/mm/pat: Set write-protect cache mode for full PAT support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 05/38] x86/CPU/AMD: Handle SME reduction in physical address size
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 03/38] x86, mpparse, x86/acpi, x86/PCI, x86/dmi, SFI: Use memremap for RAM mappings
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 08/38] x86/mm: Add support to enable SME in early boot processing
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 06/38] x86/mm: Add Secure Memory Encryption (SME) support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 10/38] x86/mm: Provide general kernel support for memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 14/38] x86/mm: Insure that boot memory areas are mapped properly
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 13/38] x86/mm: Add support for early encrypt/decrypt of memory
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 11/38] x86/mm: Add SME support for read_cr3_pa()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 09/38] x86/mm: Simplify p[g4um]d_page() macros
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 17/38] efi: Update efi_mem_type() to return an error rather than 0
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 18/38] x86/efi: Update EFI pagetable creation to work with SME
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 15/38] x86/boot/e820: Add support to determine the E820 type of an address
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 19/38] x86/mm: Add support to access boot related data in the clear
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 16/38] efi: Add an EFI table address match function
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 22/38] x86/mm: Add support for changing the memory encryption attribute
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 21/38] x86/mm: Add support to access persistent memory in the clear
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 20/38] x86, mpparse: Use memremap to map the mpf and mpc data
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 23/38] x86/realmode: Decrypt trampoline area if memory encryption is active
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 26/38] x86/CPU/AMD: Make the microcode level available earlier in the boot
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 24/38] x86, swiotlb: Add memory encryption support
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 25/38] swiotlb: Add warnings for use of bounce buffers with SME
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 27/38] iommu/amd: Allow the AMD IOMMU to work with memory encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 29/38] x86, drm, fbdev: Do not specify encrypted memory for video mappings
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 30/38] kvm: x86: svm: Support Secure Memory Encryption within KVM
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 33/38] x86/mm: Use proper encryption attributes with /dev/mem
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 31/38] x86/mm, kexec: Allow kexec to be used with SME
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 35/38] x86/mm: Add support to encrypt the kernel in-place
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 34/38] x86/mm: Create native_make_p4d() for PGTABLE_LEVELS <= 4
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 36/38] x86/boot: Add early cmdline parsing for options with arguments
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 38/38] x86/mm: Add support to make use of Secure Memory Encryption
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 37/38] compiler-gcc.h: Introduce __nostackp function attribute
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 32/38] xen/x86: Remove SME feature in PV guests
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 28/38] x86, realmode: Check for memory encryption on the APs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 12/38] x86/mm: Extend early_memremap() support with additional attrs
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- [PATCH v10 00/38] x86: Secure Memory Encryption (AMD)
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: semantics of dma_map_single()
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: semantics of dma_map_single()
- From: Vineet Gupta <Vineet.Gupta1@xxxxxxxxxxxx>
- Re: [PATCH] [PING] Fix TIOCGPTPEER ioctl definition
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] [PING] Fix TIOCGPTPEER ioctl definition
- From: Gleb Fotengauer-Malinovskiy <glebfm@xxxxxxxxxxxx>
- Re: [PATCH 1/8] signal/alpha: Document a conflict with SI_USER for SIGTRAP
- From: Michael Cree <mcree@xxxxxxxxxxxx>
- Re: semantics of dma_map_single()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 3/8] x86/xen: Redefine XEN_ELFNOTE_INIT_P2M using PUD_SIZE * PTRS_PER_PUD
- From: Juergen Gross <jgross@xxxxxxxx>
- [PATCH 0/8] 5-level paging enabling for v4.14
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCH 2/8] x86/dump_pagetables: Fix printout of p4d level
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCH 1/8] x86/dump_pagetables: Generalize address normalization
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCH 4/8] x86/mm: Rename tasksize_32bit/64bit to task_size_32bit/64bit
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCH 5/8] x86/mpx: Do not allow MPX if we have mappings above 47-bit
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCH 7/8] x86/mm: Allow userspace have mapping above 47-bit
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCH 6/8] x86/mm: Prepare to expose larger address space to userspace
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCH 8/8] x86: Enable 5-level paging support
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [PATCH 3/8] x86/xen: Redefine XEN_ELFNOTE_INIT_P2M using PUD_SIZE * PTRS_PER_PUD
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- [RFC v6 01/62] powerpc: Free up four 64K PTE bits in 4K backed HPTE pages
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 03/62] powerpc: introduce pte_set_hash_slot() helper
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 02/62] powerpc: Free up four 64K PTE bits in 64K backed HPTE pages
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 04/62] powerpc: introduce pte_get_hash_gslot() helper
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 05/62] powerpc: capture the PTE format changes in the dump pte report
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 07/62] powerpc: use helper functions in __hash_page_huge() for 64K PTE
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 08/62] powerpc: use helper functions in __hash_page_4K() for 64K PTE
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 06/62] powerpc: use helper functions in __hash_page_64K() for 64K PTE
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 09/62] powerpc: use helper functions in __hash_page_4K() for 4K PTE
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 10/62] powerpc: use helper functions in flush_hash_page()
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 12/62] mm: introduce an additional vma bit for powerpc pkey
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 11/62] powerpc: initial pkey plumbing
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 14/62] powerpc: helper function to read,write AMR,IAMR,UAMOR registers
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 13/62] powerpc: track allocation status of all pkeys
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 16/62] powerpc: cleaup AMR,iAMR when a key is allocated or freed
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 18/62] powerpc: sys_pkey_alloc() and sys_pkey_free() system calls
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 17/62] powerpc: implementation for arch_set_user_pkey_access()
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 20/62] powerpc: store and restore the pkey state across context switches
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 19/62] powerpc: ability to create execute-disabled pkeys
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 21/62] powerpc: introduce execute-only pkey
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 23/62] powerpc: implementation for arch_override_mprotect_pkey()
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 25/62] powerpc: sys_pkey_mprotect() system call
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 24/62] powerpc: map vma key-protection bits to pte key bits.
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 27/62] powerpc: helper to validate key-access permissions of a pte
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 26/62] powerpc: Program HPTE key protection bits
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 28/62] powerpc: check key protection for user page access
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 30/62] powerpc: implementation for arch_vma_access_permitted()
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 29/62] powerpc: Macro the mask used for checking DSI exception
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 31/62] powerpc: Handle exceptions caused by pkey violation
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 32/62] powerpc: capture AMR register content on pkey violation
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 34/62] powerpc: capture the violated protection key on fault
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 33/62] powerpc: introduce get_pte_pkey() helper
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 37/62] x86: implementation for arch_pkeys_enabled()
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 38/62] powerpc: implementation for arch_pkeys_enabled()
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 39/62] mm: display pkey in smaps if arch_pkeys_enabled() is true
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 36/62] mm: introduce arch_pkeys_enabled()
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 35/62] powerpc: Deliver SEGV signal on pkey violation
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 40/62] x86: delete arch_show_smap()
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 41/62] selftest/x86: Move protecton key selftest to arch neutral directory
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 44/62] selftest/vm: typecast the pkey register
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 42/62] selftest/vm: rename all references to pkru to a generic name
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 43/62] selftest/vm: move generic definitions to header file
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 45/62] selftest/vm: generics function to handle shadow key register
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 46/62] selftest/vm: fix the wrong assert in pkey_disable_set()
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 48/62] selftest/vm: clear the bits in shadow reg when a pkey is freed.
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 47/62] selftest/vm: fixed bugs in pkey_disable_clear()
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 50/62] selftest/vm: introduce two arch independent abstraction
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 49/62] selftest/vm: fix alloc_random_pkey() to make it really random
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 52/62] selftest/vm: generic cleanup
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 55/62] selftest/vm: associate key on a mapped page and detect access violation
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 54/62] selftest/vm: fix an assertion in test_pkey_alloc_exhaust()
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 57/62] selftest/vm: associate key on a mapped page and detect write violation
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 56/62] selftest/vm: detect no key violation on a freed key
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 58/62] selftest/vm: detect no write key-violation on a freed key
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 59/62] selftest/vm: detect write violation on a mapped access-denied-key page
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 60/62] selftest/vm: sub-page allocator
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 62/62] Documentation/vm: PowerPC specific updates to memory protection keys
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 61/62] Documentation/x86: Move protecton key documentation to arch neutral directory
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 53/62] selftest/vm: powerpc implementation for generic abstraction
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 51/62] selftest/vm: pkey register should match shadow pkey
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 22/62] powerpc: ability to associate pkey to a vma
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 15/62] powerpc: helper functions to initialize AMR, IAMR and UMOR registers
- From: Ram Pai <linuxram@xxxxxxxxxx>
- [RFC v6 00/62] powerpc: Memory Protection Keys
- From: Ram Pai <linuxram@xxxxxxxxxx>
- semantics of dma_map_single()
- From: Vineet Gupta <Vineet.Gupta1@xxxxxxxxxxxx>
- Re: [PATCH 1/8] signal/alpha: Document a conflict with SI_USER for SIGTRAP
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC v5 15/38] powerpc: helper function to read,write AMR,IAMR,UAMOR registers
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v5 14/38] powerpc: initial plumbing for key management
- From: Balbir Singh <bsingharora@xxxxxxxxx>
- Re: [RFC v5 14/38] powerpc: initial plumbing for key management
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v5 38/38] Documentation: PowerPC specific updates to memory protection keys
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v5 34/38] procfs: display the protection-key number associated with a vma
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: KASAN vs. boot-time switching between 4- and 5-level paging
- From: Andrey Ryabinin <aryabinin@xxxxxxxxxxxxx>
- Re: KASAN vs. boot-time switching between 4- and 5-level paging
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [RFC v5 34/38] procfs: display the protection-key number associated with a vma
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: KASAN vs. boot-time switching between 4- and 5-level paging
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: KASAN vs. boot-time switching between 4- and 5-level paging
- From: Andrey Ryabinin <aryabinin@xxxxxxxxxxxxx>
- Re: [RFC v5 15/38] powerpc: helper function to read,write AMR,IAMR,UAMOR registers
- From: Balbir Singh <bsingharora@xxxxxxxxx>
- Re: [RFC v5 34/38] procfs: display the protection-key number associated with a vma
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v5 15/38] powerpc: helper function to read,write AMR,IAMR,UAMOR registers
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v5 14/38] powerpc: initial plumbing for key management
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v5 02/38] powerpc: Free up four 64K PTE bits in 64K backed HPTE pages
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v5 00/38] powerpc: Memory Protection Keys
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH 8/8] signal: Remove kernel interal si_code magic
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC v5 00/38] powerpc: Memory Protection Keys
- From: Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC v5 11/38] mm: introduce an additional vma bit for powerpc pkey
- From: Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 8/8] signal: Remove kernel interal si_code magic
- From: Andrei Vagin <avagin@xxxxxxxxxxxxx>
- Re: [RFC v5 11/38] mm: introduce an additional vma bit for powerpc pkey
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v5 36/38] selftest: PowerPC specific test updates to memory protection keys
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [PATCH 1/2] arm64: mm: abort uaccess retries upon fatal signal
- From: James Morse <james.morse@xxxxxxx>
- Re: [RFC v5 00/38] powerpc: Memory Protection Keys
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [RFC v5 00/38] powerpc: Memory Protection Keys
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [RFC v5 15/38] powerpc: helper function to read,write AMR,IAMR,UAMOR registers
- From: Balbir Singh <bsingharora@xxxxxxxxx>
- Re: [RFC v5 14/38] powerpc: initial plumbing for key management
- From: Balbir Singh <bsingharora@xxxxxxxxx>
- Re: [RFC v5 02/38] powerpc: Free up four 64K PTE bits in 64K backed HPTE pages
- From: Balbir Singh <bsingharora@xxxxxxxxx>
- Re: [RFC v5 12/38] mm: ability to disable execute permission on a key at creation
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v5 12/38] mm: ability to disable execute permission on a key at creation
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC v5 12/38] mm: ability to disable execute permission on a key at creation
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v5 12/38] mm: ability to disable execute permission on a key at creation
- From: Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC v5 00/38] powerpc: Memory Protection Keys
- From: Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC v5 12/38] mm: ability to disable execute permission on a key at creation
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC v5 12/38] mm: ability to disable execute permission on a key at creation
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v5 12/38] mm: ability to disable execute permission on a key at creation
- From: Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC v5 00/38] powerpc: Memory Protection Keys
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: KASAN vs. boot-time switching between 4- and 5-level paging
- From: "Kirill A. Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [RFC v5 38/38] Documentation: PowerPC specific updates to memory protection keys
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC v5 34/38] procfs: display the protection-key number associated with a vma
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC v5 13/38] x86: disallow pkey creation with PKEY_DISABLE_EXECUTE
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC v5 12/38] mm: ability to disable execute permission on a key at creation
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC v5 11/38] mm: introduce an additional vma bit for powerpc pkey
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC v5 36/38] selftest: PowerPC specific test updates to memory protection keys
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 8/9] RISC-V: User-facing API
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: KASAN vs. boot-time switching between 4- and 5-level paging
- From: Andrey Ryabinin <aryabinin@xxxxxxxxxxxxx>
- Re: [PATCH 8/9] RISC-V: User-facing API
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: KASAN vs. boot-time switching between 4- and 5-level paging
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: KASAN vs. boot-time switching between 4- and 5-level paging
- From: Andrey Ryabinin <aryabinin@xxxxxxxxxxxxx>
- Re: [PATCH v9 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [RFC v5 02/38] powerpc: Free up four 64K PTE bits in 64K backed HPTE pages
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [PATCH v9 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
- From: Brian Gerst <brgerst@xxxxxxxxx>
- Re: [PATCH v9 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: KASAN vs. boot-time switching between 4- and 5-level paging
- From: Andrey Ryabinin <aryabinin@xxxxxxxxxxxxx>
- Re: [PATCH v9 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 0/2] Fatal signal handing within uaccess faults
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: KASAN vs. boot-time switching between 4- and 5-level paging
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 0/2] Fatal signal handing within uaccess faults
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v9 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH 1/2] arm64: mm: abort uaccess retries upon fatal signal
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [RFC v5 00/38] powerpc: Memory Protection Keys
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH] tty: Fix TIOCGPTPEER ioctl definition
- From: Aleksa Sarai <asarai@xxxxxxx>
- RE: [PATCH] tty: Fix TIOCGPTPEER ioctl definition
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH 2/2] arm: mm: abort uaccess retries upon fatal signal
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 1/2] arm64: mm: abort uaccess retries upon fatal signal
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 0/2] Fatal signal handing within uaccess faults
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 0/2] Fatal signal handing within uaccess faults
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 1/2] arm64: mm: abort uaccess retries upon fatal signal
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 2/2] arm: mm: abort uaccess retries upon fatal signal
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 0/2] Fatal signal handing within uaccess faults
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 8/9] RISC-V: User-facing API
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 8/9] RISC-V: User-facing API
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH v9 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
- From: Brian Gerst <brgerst@xxxxxxxxx>
- Re: [RFC v5 31/38] powerpc: introduce get_pte_pkey() helper
- From: Anshuman Khandual <khandual@xxxxxxxxxxxxxxxxxx>
- Re: KASAN vs. boot-time switching between 4- and 5-level paging
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH] tty: Fix TIOCGPTPEER ioctl definition
- From: James Hogan <james.hogan@xxxxxxxxxx>
- Re: [PATCH v2 18/28] nios2: move generic-y of exported headers to uapi/asm/Kbuild
- From: Tobias Klauser <tklauser@xxxxxxxxxx>
- Re: [PATCH v2 17/28] nios2: remove unneeded arch/nios2/include/(generated/)asm/signal.h
- From: Tobias Klauser <tklauser@xxxxxxxxxx>
- Re: [PATCH v9 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] tty: Fix TIOCGPTPEER ioctl definition
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC v5 02/38] powerpc: Free up four 64K PTE bits in 64K backed HPTE pages
- From: Balbir Singh <bsingharora@xxxxxxxxx>
- Re: [PATCH v9 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v9 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
- From: Brian Gerst <brgerst@xxxxxxxxx>
- Re: [PATCH v9 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
- From: Brian Gerst <brgerst@xxxxxxxxx>
- Re: [PATCH] tty: Fix TIOCGPTPEER ioctl definition
- From: Aleksa Sarai <asarai@xxxxxxx>
- Re: KASAN vs. boot-time switching between 4- and 5-level paging
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH] tty: Fix TIOCGPTPEER ioctl definition
- From: Gleb Fotengauer-Malinovskiy <glebfm@xxxxxxxxxxxx>
- Re: KASAN vs. boot-time switching between 4- and 5-level paging
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH 2/9] RISC-V: Atomic and Locking Code
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [patches] [PATCH 1/9] RISC-V: Init and Halt Code
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH 2/9] RISC-V: Atomic and Locking Code
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [patches] [PATCH 2/9] RISC-V: Atomic and Locking Code
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH v2 19/28] openrisc: move generic-y of exported headers to uapi/asm/Kbuild
- From: Stafford Horne <shorne@xxxxxxxxx>
- Re: [PATCH 8/9] RISC-V: User-facing API
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: KASAN vs. boot-time switching between 4- and 5-level paging
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v9 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v9 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: KASAN vs. boot-time switching between 4- and 5-level paging
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v9 00/38] x86: Secure Memory Encryption (AMD)
- From: Tom Lendacky <thomas.lendacky@xxxxxxx>
- Re: [PATCH v2 0/9] Remove spin_unlock_wait()
- From: Manfred Spraul <manfred@xxxxxxxxxxxxxxxx>
- Re: [RFC v5 00/38] powerpc: Memory Protection Keys
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: KASAN vs. boot-time switching between 4- and 5-level paging
- From: Andrey Ryabinin <aryabinin@xxxxxxxxxxxxx>
- Re: KASAN vs. boot-time switching between 4- and 5-level paging
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: KASAN vs. boot-time switching between 4- and 5-level paging
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: KASAN vs. boot-time switching between 4- and 5-level paging
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: KASAN vs. boot-time switching between 4- and 5-level paging
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/28] kbuild: complete UAPI de-coupling and cleanup scripts/Makefile.headersinst
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/28] kbuild: complete UAPI de-coupling and cleanup scripts/Makefile.headersinst
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [RFC v5 00/38] powerpc: Memory Protection Keys
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v5 34/38] procfs: display the protection-key number associated with a vma
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v5 38/38] Documentation: PowerPC specific updates to memory protection keys
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v5 31/38] powerpc: introduce get_pte_pkey() helper
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v5 32/38] powerpc: capture the violated protection key on fault
- From: Ram Pai <linuxram@xxxxxxxxxx>
- Re: [RFC v5 00/38] powerpc: Memory Protection Keys
- From: Anshuman Khandual <khandual@xxxxxxxxxxxxxxxxxx>
- Re: [RFC v5 33/38] powerpc: Deliver SEGV signal on pkey violation
- From: Anshuman Khandual <khandual@xxxxxxxxxxxxxxxxxx>
- Re: [RFC v5 31/38] powerpc: introduce get_pte_pkey() helper
- From: Anshuman Khandual <khandual@xxxxxxxxxxxxxxxxxx>
- Re: [RFC v5 32/38] powerpc: capture the violated protection key on fault
- From: Anshuman Khandual <khandual@xxxxxxxxxxxxxxxxxx>
- Re: [RFC v5 34/38] procfs: display the protection-key number associated with a vma
- From: Anshuman Khandual <khandual@xxxxxxxxxxxxxxxxxx>
- Re: [RFC v5 38/38] Documentation: PowerPC specific updates to memory protection keys
- From: Anshuman Khandual <khandual@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] x86: enable dead code and data elimination (LTO)
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH v2 12/28] ia64: remove redundant generic-y += kvm_para.h from asm/Kbuild
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 07/28] blackfin: move generic-y of exported headers to uapi/asm/Kbuild
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 01/28] kbuild: remove useless $(gen) variable in Makefile.headersinst
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 05/28] ARM: move generic-y of exported headers to uapi/asm/Kbuild
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 06/28] arc: move generic-y of exported headers to uapi/asm/Kbuild
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 13/28] m32r: move generic-y of exported headers to uapi/asm/Kbuild
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 03/28] kbuild: pass dst= to Makefile.headersinst from top Makefile
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 09/28] cris: move generic-y of exported headers to uapi/asm/Kbuild
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 04/28] arm64: move generic-y of exported headers to uapi/asm/Kbuild
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 00/28] kbuild: complete UAPI de-coupling and cleanup scripts/Makefile.headersinst
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 11/28] hexagon: move generic-y of exported headers to uapi/asm/Kbuild
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 08/28] c6x: move generic-y of exported headers to uapi/asm/Kbuild
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 10/28] h8300: move generic-y of exported headers to uapi/asm/Kbuild
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 21/28] sh: move generic-y of exported headers to uapi/asm/Kbuild
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 16/28] microblaze: move generic-y of exported headers to uapi/asm/Kbuild
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 17/28] nios2: remove unneeded arch/nios2/include/(generated/)asm/signal.h
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 20/28] parisc: move generic-y of exported headers to uapi/asm/Kbuild
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 26/28] kbuild: do not include old-kbuild-file from Makefile.headersinst
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 18/28] nios2: move generic-y of exported headers to uapi/asm/Kbuild
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 22/28] sparc: move generic-y of exported headers to uapi/asm/Kbuild
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 24/28] unicore32: move generic-y of exported headers to uapi/asm/Kbuild
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 15/28] metag: move generic-y of exported headers to uapi/asm/Kbuild
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 25/28] xtensa: move generic-y of exported headers to uapi/asm/Kbuild
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 23/28] tile: move generic-y of exported headers to uapi/asm/Kbuild
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 28/28] kbuild: remove wrapper files handling from Makefile.headersinst
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 27/28] kbuild: split exported generic header creation into uapi-asm-generic
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 19/28] openrisc: move generic-y of exported headers to uapi/asm/Kbuild
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 14/28] m68k: move generic-y of exported headers to uapi/asm/Kbuild
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- [PATCH v2 02/28] kbuild: fix comment about dst of headers_{install,check}_all
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [RFC PATCH] x86: enable dead code and data elimination (LTO)
- From: Nicolas Pitre <nicolas.pitre@xxxxxxxxxx>
- Re: [RFC PATCH] x86: enable dead code and data elimination (LTO)
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [RFC PATCH] x86: enable dead code and data elimination (LTO)
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [RFC PATCH] x86: enable dead code and data elimination (LTO)
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH v2 0/9] Remove spin_unlock_wait()
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] Remove spin_unlock_wait()
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
[Index of Archives]
[Kernel Announce]
[IETF Annouce]
[Netdev]
[Netfilter]
[Bugtraq]