Linux Arch
[Prev Page][Next Page]
- [PATCH 06/27] arm64/sve: System register and exception syndrome definitions, (continued)
- [PATCH 06/27] arm64/sve: System register and exception syndrome definitions, Dave Martin
- [PATCH 07/27] arm64/sve: Low-level SVE architectural state manipulation functions, Dave Martin
- [PATCH 08/27] arm64/sve: Kconfig update and conditional compilation support, Dave Martin
- [PATCH 09/27] arm64/sve: Signal frame and context structure definition, Dave Martin
- [PATCH 10/27] arm64/sve: Low-level CPU setup, Dave Martin
- [PATCH 11/27] arm64/sve: Core task context handling, Dave Martin
- [PATCH 12/27] arm64/sve: Support vector length resetting for new processes, Dave Martin
- [PATCH 13/27] arm64/sve: Signal handling support, Dave Martin
- [PATCH 14/27] arm64/sve: Backend logic for setting the vector length, Dave Martin
- [PATCH 15/27] arm64/sve: Probe SVE capabilities and usable vector lengths, Dave Martin
- [PATCH 16/27] arm64/sve: Preserve SVE registers around kernel-mode NEON use, Dave Martin
- [PATCH 17/27] arm64/sve: Preserve SVE registers around EFI runtime service calls, Dave Martin
- [PATCH 18/27] arm64/sve: ptrace and ELF coredump support, Dave Martin
- [PATCH 19/27] arm64/sve: Add prctl controls for userspace vector length management, Dave Martin
- [PATCH 20/27] arm64/sve: Add sysctl to set the default vector length for new processes, Dave Martin
- [PATCH 21/27] arm64/sve: KVM: Prevent guests from using SVE, Dave Martin
- [PATCH 22/27] arm64/sve: KVM: Treat guest SVE use as undefined instruction execution, Dave Martin
- [PATCH 23/27] arm64/sve: KVM: Hide SVE from CPU features exposed to guests, Dave Martin
- [PATCH 24/27] arm64/sve: Detect SVE and activate runtime support, Dave Martin
- [PATCH 25/27] arm64/sve: Add documentation, Dave Martin
- [RFC PATCH 26/27] arm64: signal: Report signal frame size to userspace via auxv, Dave Martin
- [RFC PATCH 27/27] arm64/sve: signal: Include SVE when computing AT_MINSIGSTKSZ, Dave Martin
- Re: [PATCH v06 05/36] uapi linux/sysctl.h: use __kernel_size_t instead of size_t, Mikko Rapeli
- [PATCH v06 09/36] uapi asm-generic/sembuf.h: include asm/posix_types.h and asm/ipcbuf.h,
Mikko Rapeli
- [PATCH v06 06/36] uapi asm-generic/ipcbuf.h: include linux/posix_types.h, Mikko Rapeli
- [PATCH v06 07/36] uapi asm-generic/msgbuf.h: include asm/ipcbuf.h, Mikko Rapeli
- [PATCH v06 10/36] uapi asm-generic/signal.h: use __kernel_size_t instead of size_t, Mikko Rapeli
- [PATCH v06 11/36] uapi asm-generic/ucontext.h: include asm/signal.h and asm/sigcontext.h, Mikko Rapeli
- [PATCH v06 08/36] uapi asm-generic/shmbuf.h: include fixes,
Mikko Rapeli
- [PATCH v2] module: use relative references for __ksymtab entries,
Ard Biesheuvel
- [PATCH v6 0/7] make io{read|write}64 globally usable,
Logan Gunthorpe
- [PATCH -tip v9 0/5] kprobes related bugfix,
Masami Hiramatsu
- [RFC PATCH] module: use relative references for __ksymtab entries, Ard Biesheuvel
- [PATCH v6 4/7] mm: refactoring TLB gathering API,
Nadav Amit
- [PATCH v6 6/7] mm: fix MADV_[FREE|DONTNEED] TLB flush miss problem,
Nadav Amit
- Re: [PATCH v6 6/7] mm: fix MADV_[FREE|DONTNEED] TLB flush miss problem, Peter Zijlstra
[PATCH v2 3/4] mm: fix MADV_[FREE|DONTNEED] TLB flush miss problem,
Minchan Kim
[PATCH v2 1/4] mm: refactoring TLB gathering API,
Minchan Kim
[PATCH v2 tip/core/rcu 10/10] arch: Remove spin_unlock_wait() arch-specific definitions, Paul E. McKenney
[PATCH 0/3] Consolidate system call hugetlb page size encodings,
Mike Kravetz
[PATCH 2/3] mm: fix MADV_[FREE|DONTNEED] TLB flush miss problem,
Minchan Kim
[PATCH v5 0/6] make io{read|write}64 globally usable,
Logan Gunthorpe
[PATCH 11/11] asm-generic: numa: Remove the unused parent_node() macro, Dou Liyang
[PATCH v9] x86/asm: Implement fast refcount overflow protection,
Kees Cook
[PATCH 0/1] Clarify huge_pte_offset() semantics,
Punit Agrawal
[PATCH 0/3] devicetree: cleanup and improve DT cross-arch reference,
Masahiro Yamada
[PATCH tip/core/rcu 9/9] arch: Remove spin_unlock_wait() arch-specific definitions, Paul E. McKenney
[PATCH v8 0/3] x86: Implement fast refcount overflow protection,
Kees Cook
[RFC PATCH 0/2] Clarify huge_pte_offset() semantics,
Punit Agrawal
[PATCH v7 0/3] x86: Implement fast refcount overflow protection,
Kees Cook
[PATCH] [RESEND] mtd: only use __xipram annotation when XIP_KERNEL is set,
Arnd Bergmann
[PATCH 0/5] Consolidate init_task handling,
David Howells
Re: [RFC 06/22] kvm: Adapt assembly for PIE support, H. Peter Anvin
Re: [RFC 20/22] x86/relocs: Add option to generate 64-bit relocations, H. Peter Anvin
[PATCH 00/11] ARMv8.3 pointer authentication userspace support,
Mark Rutland
- [PATCH 05/11] arm64/cpufeature: detect pointer authentication, Mark Rutland
- [PATCH 07/11] arm64: add basic pointer authentication support, Mark Rutland
- [PATCH 11/11] arm64: docs: document pointer authentication, Mark Rutland
- [PATCH 10/11] arm64/kvm: context-switch ptrauth registers, Mark Rutland
- [PATCH 06/11] arm64: Don't trap host pointer auth use to EL2, Mark Rutland
- [PATCH 08/11] arm64: expose user PAC bit positions via ptrace, Mark Rutland
- [PATCH 09/11] arm64/kvm: preserve host HCR_EL2 value, Mark Rutland
- [PATCH 03/11] arm64: add pointer authentication register bits, Mark Rutland
- [PATCH 04/11] arm64/cpufeature: add ARMv8.3 id_aa64isar1 bits, Mark Rutland
- [PATCH 01/11] arm64: docs: describe ELF hwcaps, Mark Rutland
- [PATCH 02/11] asm-generic: mm_hooks: allow hooks to be overridden individually, Mark Rutland
- Re: [PATCH 00/11] ARMv8.3 pointer authentication userspace support, Dave Martin
- Re: [PATCH 00/11] ARMv8.3 pointer authentication userspace support, Yao Qi
- Re: [PATCH 00/11] ARMv8.3 pointer authentication userspace support, Yao Qi
- Re: [kernel-hardening] [PATCH 00/11] ARMv8.3 pointer authentication userspace support, Li Kun
[PATCH v6 0/2] x86: Implement fast refcount overflow protection,
Kees Cook
[PATCH v4 0/5] make io{read|write}64 globally usable,
Logan Gunthorpe
[PATCH v10 00/38] x86: Secure Memory Encryption (AMD),
Tom Lendacky
- [PATCH v10 12/38] x86/mm: Extend early_memremap() support with additional attrs, Tom Lendacky
- [PATCH v10 28/38] x86, realmode: Check for memory encryption on the APs, Tom Lendacky
- [PATCH v10 32/38] xen/x86: Remove SME feature in PV guests, Tom Lendacky
- [PATCH v10 37/38] compiler-gcc.h: Introduce __nostackp function attribute, Tom Lendacky
- [PATCH v10 38/38] x86/mm: Add support to make use of Secure Memory Encryption, Tom Lendacky
- [PATCH v10 36/38] x86/boot: Add early cmdline parsing for options with arguments, Tom Lendacky
- [PATCH v10 34/38] x86/mm: Create native_make_p4d() for PGTABLE_LEVELS <= 4, Tom Lendacky
- [PATCH v10 35/38] x86/mm: Add support to encrypt the kernel in-place, Tom Lendacky
- [PATCH v10 31/38] x86/mm, kexec: Allow kexec to be used with SME, Tom Lendacky
- [PATCH v10 33/38] x86/mm: Use proper encryption attributes with /dev/mem, Tom Lendacky
- [PATCH v10 30/38] kvm: x86: svm: Support Secure Memory Encryption within KVM, Tom Lendacky
- [PATCH v10 29/38] x86, drm, fbdev: Do not specify encrypted memory for video mappings, Tom Lendacky
- [PATCH v10 27/38] iommu/amd: Allow the AMD IOMMU to work with memory encryption, Tom Lendacky
- [PATCH v10 25/38] swiotlb: Add warnings for use of bounce buffers with SME, Tom Lendacky
- [PATCH v10 24/38] x86, swiotlb: Add memory encryption support, Tom Lendacky
- [PATCH v10 26/38] x86/CPU/AMD: Make the microcode level available earlier in the boot, Tom Lendacky
- [PATCH v10 23/38] x86/realmode: Decrypt trampoline area if memory encryption is active, Tom Lendacky
- [PATCH v10 20/38] x86, mpparse: Use memremap to map the mpf and mpc data, Tom Lendacky
- [PATCH v10 21/38] x86/mm: Add support to access persistent memory in the clear, Tom Lendacky
- [PATCH v10 22/38] x86/mm: Add support for changing the memory encryption attribute, Tom Lendacky
- [PATCH v10 16/38] efi: Add an EFI table address match function, Tom Lendacky
- [PATCH v10 19/38] x86/mm: Add support to access boot related data in the clear, Tom Lendacky
- [PATCH v10 15/38] x86/boot/e820: Add support to determine the E820 type of an address, Tom Lendacky
- [PATCH v10 18/38] x86/efi: Update EFI pagetable creation to work with SME, Tom Lendacky
- [PATCH v10 17/38] efi: Update efi_mem_type() to return an error rather than 0, Tom Lendacky
- [PATCH v10 09/38] x86/mm: Simplify p[g4um]d_page() macros, Tom Lendacky
- [PATCH v10 11/38] x86/mm: Add SME support for read_cr3_pa(), Tom Lendacky
- [PATCH v10 13/38] x86/mm: Add support for early encrypt/decrypt of memory, Tom Lendacky
- [PATCH v10 14/38] x86/mm: Insure that boot memory areas are mapped properly, Tom Lendacky
- [PATCH v10 10/38] x86/mm: Provide general kernel support for memory encryption, Tom Lendacky
- [PATCH v10 06/38] x86/mm: Add Secure Memory Encryption (SME) support, Tom Lendacky
- [PATCH v10 08/38] x86/mm: Add support to enable SME in early boot processing, Tom Lendacky
- [PATCH v10 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature, Tom Lendacky
- [PATCH v10 07/38] x86/mm: Remove phys_to_virt() usage in ioremap(), Tom Lendacky
- [PATCH v10 03/38] x86, mpparse, x86/acpi, x86/PCI, x86/dmi, SFI: Use memremap for RAM mappings, Tom Lendacky
- [PATCH v10 05/38] x86/CPU/AMD: Handle SME reduction in physical address size, Tom Lendacky
- [PATCH v10 02/38] x86/mm/pat: Set write-protect cache mode for full PAT support, Tom Lendacky
- [PATCH v10 01/38] x86: Document AMD Secure Memory Encryption (SME), Tom Lendacky
- Re: [PATCH v10 00/38] x86: Secure Memory Encryption (AMD), Thomas Gleixner
[PATCH] [PING] Fix TIOCGPTPEER ioctl definition,
Gleb Fotengauer-Malinovskiy
[PATCH 0/8] 5-level paging enabling for v4.14,
Kirill A. Shutemov
[RFC v6 00/62] powerpc: Memory Protection Keys,
Ram Pai
- [RFC v6 15/62] powerpc: helper functions to initialize AMR, IAMR and UMOR registers, Ram Pai
- [RFC v6 22/62] powerpc: ability to associate pkey to a vma, Ram Pai
- [RFC v6 51/62] selftest/vm: pkey register should match shadow pkey, Ram Pai
- [RFC v6 53/62] selftest/vm: powerpc implementation for generic abstraction, Ram Pai
- [RFC v6 61/62] Documentation/x86: Move protecton key documentation to arch neutral directory, Ram Pai
- [RFC v6 62/62] Documentation/vm: PowerPC specific updates to memory protection keys, Ram Pai
- [RFC v6 60/62] selftest/vm: sub-page allocator, Ram Pai
- [RFC v6 59/62] selftest/vm: detect write violation on a mapped access-denied-key page, Ram Pai
- [RFC v6 58/62] selftest/vm: detect no write key-violation on a freed key, Ram Pai
- [RFC v6 56/62] selftest/vm: detect no key violation on a freed key, Ram Pai
- [RFC v6 57/62] selftest/vm: associate key on a mapped page and detect write violation, Ram Pai
- [RFC v6 54/62] selftest/vm: fix an assertion in test_pkey_alloc_exhaust(), Ram Pai
- [RFC v6 55/62] selftest/vm: associate key on a mapped page and detect access violation, Ram Pai
- [RFC v6 52/62] selftest/vm: generic cleanup, Ram Pai
- [RFC v6 49/62] selftest/vm: fix alloc_random_pkey() to make it really random, Ram Pai
- [RFC v6 50/62] selftest/vm: introduce two arch independent abstraction, Ram Pai
- [RFC v6 47/62] selftest/vm: fixed bugs in pkey_disable_clear(), Ram Pai
- [RFC v6 48/62] selftest/vm: clear the bits in shadow reg when a pkey is freed., Ram Pai
- [RFC v6 46/62] selftest/vm: fix the wrong assert in pkey_disable_set(), Ram Pai
- [RFC v6 45/62] selftest/vm: generics function to handle shadow key register, Ram Pai
- [RFC v6 43/62] selftest/vm: move generic definitions to header file, Ram Pai
- [RFC v6 42/62] selftest/vm: rename all references to pkru to a generic name, Ram Pai
- [RFC v6 44/62] selftest/vm: typecast the pkey register, Ram Pai
- [RFC v6 41/62] selftest/x86: Move protecton key selftest to arch neutral directory, Ram Pai
- [RFC v6 40/62] x86: delete arch_show_smap(), Ram Pai
- [RFC v6 35/62] powerpc: Deliver SEGV signal on pkey violation, Ram Pai
- [RFC v6 36/62] mm: introduce arch_pkeys_enabled(), Ram Pai
- [RFC v6 39/62] mm: display pkey in smaps if arch_pkeys_enabled() is true, Ram Pai
- [RFC v6 38/62] powerpc: implementation for arch_pkeys_enabled(), Ram Pai
- [RFC v6 37/62] x86: implementation for arch_pkeys_enabled(), Ram Pai
- [RFC v6 33/62] powerpc: introduce get_pte_pkey() helper, Ram Pai
- [RFC v6 34/62] powerpc: capture the violated protection key on fault, Ram Pai
- [RFC v6 32/62] powerpc: capture AMR register content on pkey violation, Ram Pai
- [RFC v6 31/62] powerpc: Handle exceptions caused by pkey violation, Ram Pai
- [RFC v6 29/62] powerpc: Macro the mask used for checking DSI exception, Ram Pai
- [RFC v6 30/62] powerpc: implementation for arch_vma_access_permitted(), Ram Pai
- [RFC v6 28/62] powerpc: check key protection for user page access, Ram Pai
- [RFC v6 26/62] powerpc: Program HPTE key protection bits, Ram Pai
- [RFC v6 27/62] powerpc: helper to validate key-access permissions of a pte, Ram Pai
- [RFC v6 24/62] powerpc: map vma key-protection bits to pte key bits., Ram Pai
- [RFC v6 25/62] powerpc: sys_pkey_mprotect() system call, Ram Pai
- [RFC v6 23/62] powerpc: implementation for arch_override_mprotect_pkey(), Ram Pai
- [RFC v6 21/62] powerpc: introduce execute-only pkey, Ram Pai
[RFC v6 19/62] powerpc: ability to create execute-disabled pkeys, Ram Pai
[RFC v6 20/62] powerpc: store and restore the pkey state across context switches, Ram Pai
[RFC v6 17/62] powerpc: implementation for arch_set_user_pkey_access(), Ram Pai
[RFC v6 18/62] powerpc: sys_pkey_alloc() and sys_pkey_free() system calls, Ram Pai
[RFC v6 16/62] powerpc: cleaup AMR,iAMR when a key is allocated or freed, Ram Pai
[RFC v6 13/62] powerpc: track allocation status of all pkeys, Ram Pai
[RFC v6 14/62] powerpc: helper function to read,write AMR,IAMR,UAMOR registers, Ram Pai
[RFC v6 11/62] powerpc: initial pkey plumbing, Ram Pai
[RFC v6 12/62] mm: introduce an additional vma bit for powerpc pkey, Ram Pai
[RFC v6 10/62] powerpc: use helper functions in flush_hash_page(), Ram Pai
[RFC v6 09/62] powerpc: use helper functions in __hash_page_4K() for 4K PTE, Ram Pai
[RFC v6 06/62] powerpc: use helper functions in __hash_page_64K() for 64K PTE, Ram Pai
[RFC v6 08/62] powerpc: use helper functions in __hash_page_4K() for 64K PTE, Ram Pai
[RFC v6 07/62] powerpc: use helper functions in __hash_page_huge() for 64K PTE, Ram Pai
[RFC v6 05/62] powerpc: capture the PTE format changes in the dump pte report, Ram Pai
[RFC v6 04/62] powerpc: introduce pte_get_hash_gslot() helper, Ram Pai
[RFC v6 02/62] powerpc: Free up four 64K PTE bits in 64K backed HPTE pages, Ram Pai
[RFC v6 03/62] powerpc: introduce pte_set_hash_slot() helper, Ram Pai
[RFC v6 01/62] powerpc: Free up four 64K PTE bits in 4K backed HPTE pages, Ram Pai
semantics of dma_map_single(),
Vineet Gupta
[PATCH 0/2] Fatal signal handing within uaccess faults,
Mark Rutland
[PATCH] tty: Fix TIOCGPTPEER ioctl definition,
Gleb Fotengauer-Malinovskiy
Re: [PATCH 8/9] RISC-V: User-facing API, Palmer Dabbelt
[PATCH v2 00/28] kbuild: complete UAPI de-coupling and cleanup scripts/Makefile.headersinst,
Masahiro Yamada
- [PATCH v2 02/28] kbuild: fix comment about dst of headers_{install,check}_all, Masahiro Yamada
- [PATCH v2 14/28] m68k: move generic-y of exported headers to uapi/asm/Kbuild, Masahiro Yamada
- [PATCH v2 19/28] openrisc: move generic-y of exported headers to uapi/asm/Kbuild, Masahiro Yamada
- [PATCH v2 27/28] kbuild: split exported generic header creation into uapi-asm-generic, Masahiro Yamada
- [PATCH v2 28/28] kbuild: remove wrapper files handling from Makefile.headersinst, Masahiro Yamada
- [PATCH v2 23/28] tile: move generic-y of exported headers to uapi/asm/Kbuild, Masahiro Yamada
- [PATCH v2 25/28] xtensa: move generic-y of exported headers to uapi/asm/Kbuild, Masahiro Yamada
- [PATCH v2 15/28] metag: move generic-y of exported headers to uapi/asm/Kbuild, Masahiro Yamada
- [PATCH v2 24/28] unicore32: move generic-y of exported headers to uapi/asm/Kbuild, Masahiro Yamada
- [PATCH v2 22/28] sparc: move generic-y of exported headers to uapi/asm/Kbuild, Masahiro Yamada
- [PATCH v2 18/28] nios2: move generic-y of exported headers to uapi/asm/Kbuild, Masahiro Yamada
- [PATCH v2 26/28] kbuild: do not include old-kbuild-file from Makefile.headersinst, Masahiro Yamada
- [PATCH v2 20/28] parisc: move generic-y of exported headers to uapi/asm/Kbuild, Masahiro Yamada
- [PATCH v2 17/28] nios2: remove unneeded arch/nios2/include/(generated/)asm/signal.h, Masahiro Yamada
- [PATCH v2 16/28] microblaze: move generic-y of exported headers to uapi/asm/Kbuild, Masahiro Yamada
- [PATCH v2 21/28] sh: move generic-y of exported headers to uapi/asm/Kbuild, Masahiro Yamada
- [PATCH v2 10/28] h8300: move generic-y of exported headers to uapi/asm/Kbuild, Masahiro Yamada
- [PATCH v2 08/28] c6x: move generic-y of exported headers to uapi/asm/Kbuild, Masahiro Yamada
- [PATCH v2 11/28] hexagon: move generic-y of exported headers to uapi/asm/Kbuild, Masahiro Yamada
- [PATCH v2 04/28] arm64: move generic-y of exported headers to uapi/asm/Kbuild, Masahiro Yamada
- [PATCH v2 09/28] cris: move generic-y of exported headers to uapi/asm/Kbuild, Masahiro Yamada
- [PATCH v2 03/28] kbuild: pass dst= to Makefile.headersinst from top Makefile, Masahiro Yamada
- [PATCH v2 13/28] m32r: move generic-y of exported headers to uapi/asm/Kbuild, Masahiro Yamada
- [PATCH v2 06/28] arc: move generic-y of exported headers to uapi/asm/Kbuild, Masahiro Yamada
- [PATCH v2 05/28] ARM: move generic-y of exported headers to uapi/asm/Kbuild, Masahiro Yamada
- [PATCH v2 01/28] kbuild: remove useless $(gen) variable in Makefile.headersinst, Masahiro Yamada
- [PATCH v2 07/28] blackfin: move generic-y of exported headers to uapi/asm/Kbuild, Masahiro Yamada
- [PATCH v2 12/28] ia64: remove redundant generic-y += kvm_para.h from asm/Kbuild, Masahiro Yamada
- Re: [PATCH v2 00/28] kbuild: complete UAPI de-coupling and cleanup scripts/Makefile.headersinst, Sam Ravnborg
[RFC PATCH] x86: enable dead code and data elimination (LTO),
Nicholas Piggin
[PATCH v9 00/38] x86: Secure Memory Encryption (AMD),
Tom Lendacky
- [PATCH v9 09/38] x86/mm: Simplify p[g4um]d_page() macros, Tom Lendacky
- [PATCH v9 12/38] x86/mm: Extend early_memremap() support with additional attrs, Tom Lendacky
- [PATCH v9 13/38] x86/mm: Add support for early encrypt/decrypt of memory, Tom Lendacky
- [PATCH v9 16/38] efi: Add an EFI table address match function, Tom Lendacky
- [PATCH v9 18/38] x86/efi: Update EFI pagetable creation to work with SME, Tom Lendacky
- [PATCH v9 23/38] x86/realmode: Decrypt trampoline area if memory encryption is active, Tom Lendacky
- [PATCH v9 25/38] swiotlb: Add warnings for use of bounce buffers with SME, Tom Lendacky
- [PATCH v9 32/38] xen/x86: Remove SME feature in PV guests, Tom Lendacky
- [PATCH v9 34/38] x86/mm: Create native_make_p4d() for PGTABLE_LEVELS <= 4, Tom Lendacky
- [PATCH v9 37/38] compiler-gcc.h: Introduce __nostackp function attribute, Tom Lendacky
- [PATCH v9 38/38] x86/mm: Add support to make use of Secure Memory Encryption, Tom Lendacky
- [PATCH v9 35/38] x86/mm: Add support to encrypt the kernel in-place, Tom Lendacky
- [PATCH v9 36/38] x86/boot: Add early cmdline parsing for options with arguments, Tom Lendacky
- [PATCH v9 29/38] x86, drm, fbdev: Do not specify encrypted memory for video mappings, Tom Lendacky
- [PATCH v9 31/38] x86/mm, kexec: Allow kexec to be used with SME, Tom Lendacky
- [PATCH v9 33/38] x86/mm: Use proper encryption attributes with /dev/mem, Tom Lendacky
- [PATCH v9 27/38] iommu/amd: Allow the AMD IOMMU to work with memory encryption, Tom Lendacky
- [PATCH v9 28/38] x86, realmode: Check for memory encryption on the APs, Tom Lendacky
- [PATCH v9 30/38] kvm: x86: svm: Support Secure Memory Encryption within KVM, Tom Lendacky
- [PATCH v9 24/38] x86, swiotlb: Add memory encryption support, Tom Lendacky
- [PATCH v9 26/38] x86/CPU/AMD: Make the microcode level available earlier in the boot, Tom Lendacky
- [PATCH v9 20/38] x86, mpparse: Use memremap to map the mpf and mpc data, Tom Lendacky
- [PATCH v9 21/38] x86/mm: Add support to access persistent memory in the clear, Tom Lendacky
- [PATCH v9 22/38] x86/mm: Add support for changing the memory encryption attribute, Tom Lendacky
- [PATCH v9 17/38] efi: Update efi_mem_type() to return an error rather than 0, Tom Lendacky
- [PATCH v9 19/38] x86/mm: Add support to access boot related data in the clear, Tom Lendacky
- [PATCH v9 14/38] x86/mm: Insure that boot memory areas are mapped properly, Tom Lendacky
- [PATCH v9 15/38] x86/boot/e820: Add support to determine the E820 type of an address, Tom Lendacky
- [PATCH v9 10/38] x86/mm: Provide general kernel support for memory encryption, Tom Lendacky
- [PATCH v9 11/38] x86/mm: Add SME support for read_cr3_pa(), Tom Lendacky
- [PATCH v9 07/38] x86/mm: Remove phys_to_virt() usage in ioremap(), Tom Lendacky
- [PATCH v9 06/38] x86/mm: Add Secure Memory Encryption (SME) support, Tom Lendacky
- [PATCH v9 08/38] x86/mm: Add support to enable SME in early boot processing, Tom Lendacky
- [PATCH v9 05/38] x86/CPU/AMD: Handle SME reduction in physical address size, Tom Lendacky
- [PATCH v9 03/38] x86, mpparse, x86/acpi, x86/PCI, x86/dmi, SFI: Use memremap for RAM mappings, Tom Lendacky
- [PATCH v9 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature, Tom Lendacky
- [PATCH v9 02/38] x86/mm/pat: Set write-protect cache mode for full PAT support, Tom Lendacky
- [PATCH v9 01/38] x86: Document AMD Secure Memory Encryption (SME), Tom Lendacky
- Re: [PATCH v9 00/38] x86: Secure Memory Encryption (AMD), Ingo Molnar
[RFC v5 00/38] powerpc: Memory Protection Keys,
Ram Pai
- [RFC v5 04/38] powerpc: introduce pte_get_hash_gslot() helper, Ram Pai
- [RFC v5 12/38] mm: ability to disable execute permission on a key at creation, Ram Pai
- [RFC v5 30/38] powerpc: capture AMR register content on pkey violation, Ram Pai
- [RFC v5 35/38] selftest: Move protecton key selftest to arch neutral directory, Ram Pai
- [RFC v5 38/38] Documentation: PowerPC specific updates to memory protection keys, Ram Pai
- [RFC v5 37/38] Documentation: Move protecton key documentation to arch neutral directory, Ram Pai
- [RFC v5 34/38] procfs: display the protection-key number associated with a vma, Ram Pai
- [RFC v5 32/38] powerpc: capture the violated protection key on fault, Ram Pai
- [RFC v5 36/38] selftest: PowerPC specific test updates to memory protection keys, Ram Pai
- [RFC v5 28/38] powerpc: implementation for arch_vma_access_permitted(), Ram Pai
- [RFC v5 31/38] powerpc: introduce get_pte_pkey() helper, Ram Pai
- [RFC v5 33/38] powerpc: Deliver SEGV signal on pkey violation, Ram Pai
- [RFC v5 29/38] powerpc: Handle exceptions caused by pkey violation, Ram Pai
- [RFC v5 26/38] powerpc: check key protection for user page access, Ram Pai
- [RFC v5 27/38] powerpc: Macro the mask used for checking DSI exception, Ram Pai
- [RFC v5 25/38] powerpc: helper to validate key-access permissions of a pte, Ram Pai
- [RFC v5 24/38] powerpc: Program HPTE key protection bits, Ram Pai
- [RFC v5 20/38] powerpc: ability to associate pkey to a vma, Ram Pai
- [RFC v5 23/38] powerpc: sys_pkey_mprotect() system call, Ram Pai
- [RFC v5 19/38] powerpc: introduce execute-only pkey, Ram Pai
- [RFC v5 21/38] powerpc: implementation for arch_override_mprotect_pkey(), Ram Pai
- [RFC v5 22/38] powerpc: map vma key-protection bits to pte key bits., Ram Pai
- [RFC v5 16/38] powerpc: implementation for arch_set_user_pkey_access(), Ram Pai
- [RFC v5 18/38] powerpc: store and restore the pkey state across context switches, Ram Pai
- [RFC v5 14/38] powerpc: initial plumbing for key management, Ram Pai
- [RFC v5 11/38] mm: introduce an additional vma bit for powerpc pkey, Ram Pai
- [RFC v5 17/38] powerpc: sys_pkey_alloc() and sys_pkey_free() system calls, Ram Pai
- [RFC v5 15/38] powerpc: helper function to read,write AMR,IAMR,UAMOR registers, Ram Pai
- [RFC v5 09/38] powerpc: use helper functions in __hash_page_4K() for 4K PTE, Ram Pai
- [RFC v5 13/38] x86: disallow pkey creation with PKEY_DISABLE_EXECUTE, Ram Pai
- [RFC v5 06/38] powerpc: use helper functions in __hash_page_64K() for 64K PTE, Ram Pai
- [RFC v5 07/38] powerpc: use helper functions in __hash_page_huge() for 64K PTE, Ram Pai
- [RFC v5 08/38] powerpc: use helper functions in __hash_page_4K() for 64K PTE, Ram Pai
- [RFC v5 10/38] powerpc: use helper functions in flush_hash_page(), Ram Pai
- [RFC v5 05/38] powerpc: capture the PTE format changes in the dump pte report, Ram Pai
- [RFC v5 03/38] powerpc: introduce pte_set_hash_slot() helper, Ram Pai
- [RFC v5 02/38] powerpc: Free up four 64K PTE bits in 64K backed HPTE pages, Ram Pai
- [RFC v5 01/38] powerpc: Free up four 64K PTE bits in 4K backed HPTE pages, Ram Pai
- Re: [RFC v5 00/38] powerpc: Memory Protection Keys, Anshuman Khandual
- Re: [RFC v5 00/38] powerpc: Memory Protection Keys, Michal Hocko
RISC-V Linux Port v4,
Palmer Dabbelt
[Index of Archives]
[Kernel Announce]
[Kernel Newbies]
[Linux RAID]
[IETF Annouce]
[Security]
[Netdev]
[Linux Wireless]
[Netfilter]
[Bugtraq]