Linux Arch
[Prev Page][Next Page]
Re: [PATCH RFC 01/26] netfilter: Replace spin_unlock_wait() with lock/unlock pair,
Alan Stern
[PATCH 3/8] signal/sparc: Document a conflict with SI_USER with SIGFPE,
Eric W. Biederman
[PATCH 5/8] signal/testing: Don't look for __SI_FAULT in userspace, Eric W. Biederman
[PATCH 8/8] signal: Remove kernel interal si_code magic,
Eric W. Biederman
[PATCH 6/8] signal/x86: Fix SIGSYS handling in copy_siginfo_to_user32, Eric W. Biederman
[PATCH 7/8] fcntl: Don't use ambiguous SIG_POLL si_codes, Eric W. Biederman
[PATCH 4/8] signal/mips: Document a conflict with SI_USER with SIGFPE, Eric W. Biederman
[PATCH 2/8] signal/ia64: Document a conflict with SI_USER with SIGFPE, Eric W. Biederman
[PATCH 1/8] signal/alpha: Document a conflict with SI_USER for SIGTRAP,
Eric W. Biederman
[PATCH 0/8] signal: Fix sending signals with siginfo,
Eric W. Biederman
[PATCH RFC 0/26] Remove spin_unlock_wait(),
Paul E. McKenney
- [PATCH RFC 25/26] tile: Remove spin_unlock_wait() arch-specific definitions, Paul E. McKenney
- [PATCH RFC 22/26] s390: Remove spin_unlock_wait() arch-specific definitions, Paul E. McKenney
- [PATCH RFC 23/26] sh: Remove spin_unlock_wait() arch-specific definitions, Paul E. McKenney
- [PATCH RFC 09/26] alpha: Remove spin_unlock_wait() arch-specific definitions, Paul E. McKenney
- [PATCH RFC 20/26] parisc: Remove spin_unlock_wait() arch-specific definitions, Paul E. McKenney
- [PATCH RFC 04/26] completion: Replace spin_unlock_wait() with lock/unlock pair, Paul E. McKenney
- [PATCH RFC 14/26] hexagon: Remove spin_unlock_wait() arch-specific definitions, Paul E. McKenney
- [PATCH RFC 13/26] blackfin: Remove spin_unlock_wait() arch-specific definitions, Paul E. McKenney
- [PATCH RFC 06/26] ipc: Replace spin_unlock_wait() with lock/unlock pair, Paul E. McKenney
- [PATCH RFC 18/26] mips: Remove spin_unlock_wait() arch-specific definitions, Paul E. McKenney
- [PATCH RFC 19/26] mn10300: Remove spin_unlock_wait() arch-specific definitions, Paul E. McKenney
- [PATCH RFC 26/26] xtensa: Remove spin_unlock_wait() arch-specific definitions, Paul E. McKenney
- [PATCH RFC 17/26] metag: Remove spin_unlock_wait() arch-specific definitions, Paul E. McKenney
- [PATCH RFC 01/26] netfilter: Replace spin_unlock_wait() with lock/unlock pair, Paul E. McKenney
[PATCH RFC 24/26] sparc: Remove spin_unlock_wait() arch-specific definitions, Paul E. McKenney
[PATCH RFC 21/26] powerpc: Remove spin_unlock_wait() arch-specific definitions, Paul E. McKenney
[PATCH RFC 07/26] drivers/ata: Replace spin_unlock_wait() with lock/unlock pair, Paul E. McKenney
[PATCH RFC 03/26] sched: Replace spin_unlock_wait() with lock/unlock pair, Paul E. McKenney
[PATCH RFC 05/26] exit: Replace spin_unlock_wait() with lock/unlock pair, Paul E. McKenney
[PATCH RFC 08/26] locking: Remove spin_unlock_wait() generic definitions, Paul E. McKenney
[PATCH RFC 11/26] arm: Remove spin_unlock_wait() arch-specific definitions, Paul E. McKenney
[PATCH RFC 10/26] arc: Remove spin_unlock_wait() arch-specific definitions, Paul E. McKenney
[PATCH RFC 12/26] arm64: Remove spin_unlock_wait() arch-specific definitions, Paul E. McKenney
[PATCH RFC 02/26] task_work: Replace spin_unlock_wait() with lock/unlock pair, Paul E. McKenney
[PATCH v2 0/9] Remove spin_unlock_wait(), Paul E. McKenney
- [PATCH v2 2/9] task_work: Replace spin_unlock_wait() with lock/unlock pair, Paul E. McKenney
- [PATCH v2 3/9] sched: Replace spin_unlock_wait() with lock/unlock pair, Paul E. McKenney
- [PATCH v2 6/9] ipc: Replace spin_unlock_wait() with lock/unlock pair, Paul E. McKenney
- [PATCH v2 1/9] net/netfilter/nf_conntrack_core: Fix net_conntrack_lock(), Paul E. McKenney
- [PATCH v2 5/9] exit: Replace spin_unlock_wait() with lock/unlock pair, Paul E. McKenney
- [PATCH v2 4/9] completion: Replace spin_unlock_wait() with lock/unlock pair, Paul E. McKenney
- [PATCH v2 7/9] drivers/ata: Replace spin_unlock_wait() with lock/unlock pair, Paul E. McKenney
- [PATCH v2 9/9] arch: Remove spin_unlock_wait() arch-specific definitions, Paul E. McKenney
- [PATCH v2 8/9] locking: Remove spin_unlock_wait() generic definitions, Paul E. McKenney
- RE: [PATCH v2 0/9] Remove spin_unlock_wait(), David Laight
- [PATCH v3 0/9] Remove spin_unlock_wait(), Paul E. McKenney
[PATCH v3 0/4] make io{read|write}64 more globally usable,
Logan Gunthorpe
[PATCH] arch: remove unused macro/function thread_saved_pc(),
Tobias Klauser
[PATCH v2 0/3] make io{read|write}64 more globally usable,
Logan Gunthorpe
[PATCH v8 RESEND 00/38] x86: Secure Memory Encryption (AMD),
Tom Lendacky
- [PATCH v8 RESEND 03/38] x86, mpparse, x86/acpi, x86/PCI, x86/dmi, SFI: Use memremap for RAM mappings, Tom Lendacky
- [PATCH v8 RESEND 02/38] x86/mm/pat: Set write-protect cache mode for full PAT support, Tom Lendacky
- [PATCH v8 RESEND 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature, Tom Lendacky
- [PATCH v8 RESEND 05/38] x86/CPU/AMD: Handle SME reduction in physical address size, Tom Lendacky
- [PATCH v8 RESEND 10/38] x86/mm: Provide general kernel support for memory encryption, Tom Lendacky
- [PATCH v8 RESEND 11/38] x86/mm: Add SME support for read_cr3_pa(), Tom Lendacky
- [PATCH v8 RESEND 16/38] efi: Add an EFI table address match function, Tom Lendacky
- [PATCH v8 RESEND 18/38] x86/efi: Update EFI pagetable creation to work with SME, Tom Lendacky
- [PATCH v8 RESEND 07/38] x86/mm: Remove phys_to_virt() usage in ioremap(), Tom Lendacky
- [PATCH v8 RESEND 17/38] efi: Update efi_mem_type() to return an error rather than 0, Tom Lendacky
- [PATCH v8 RESEND 20/38] x86, mpparse: Use memremap to map the mpf and mpc data, Tom Lendacky
- [PATCH v8 RESEND 01/38] x86: Document AMD Secure Memory Encryption (SME), Tom Lendacky
- [PATCH v8 RESEND 19/38] x86/mm: Add support to access boot related data in the clear, Tom Lendacky
- [PATCH v8 RESEND 15/38] x86/boot/e820: Add support to determine the E820 type of an address, Tom Lendacky
- [PATCH v8 RESEND 14/38] x86/mm: Insure that boot memory areas are mapped properly, Tom Lendacky
- [PATCH v8 RESEND 13/38] x86/mm: Add support for early encrypt/decrypt of memory, Tom Lendacky
- [PATCH v8 RESEND 22/38] x86/mm: Add support for changing the memory encryption attribute, Tom Lendacky
- [PATCH v8 RESEND 12/38] x86/mm: Extend early_memremap() support with additional attrs, Tom Lendacky
- [PATCH v8 RESEND 23/38] x86/realmode: Decrypt trampoline area if memory encryption is active, Tom Lendacky
- [PATCH v8 RESEND 21/38] x86/mm: Add support to access persistent memory in the clear, Tom Lendacky
- [PATCH v8 RESEND 09/38] x86/mm: Simplify p[g4um]d_page() macros, Tom Lendacky
- [PATCH v8 RESEND 08/38] x86/mm: Add support to enable SME in early boot processing, Tom Lendacky
- [PATCH v8 RESEND 06/38] x86/mm: Add Secure Memory Encryption (SME) support, Tom Lendacky
- [PATCH v8 RESEND 25/38] swiotlb: Add warnings for use of bounce buffers with SME, Tom Lendacky
- [PATCH v8 RESEND 24/38] x86, swiotlb: Add memory encryption support, Tom Lendacky
- [PATCH v8 RESEND 26/38] x86/CPU/AMD: Make the microcode level available earlier in the boot, Tom Lendacky
- [PATCH v8 RESEND 28/38] x86, realmode: Check for memory encryption on the APs, Tom Lendacky
- [PATCH v8 RESEND 29/38] x86, drm, fbdev: Do not specify encrypted memory for video mappings, Tom Lendacky
- [PATCH v8 RESEND 30/38] kvm: x86: svm: Support Secure Memory Encryption within KVM, Tom Lendacky
- [PATCH v8 RESEND 27/38] iommu/amd: Allow the AMD IOMMU to work with memory encryption, Tom Lendacky
- [PATCH v8 RESEND 31/38] x86/mm, kexec: Allow kexec to be used with SME, Tom Lendacky
- [PATCH v8 RESEND 33/38] x86/mm: Use proper encryption attributes with /dev/mem, Tom Lendacky
- [PATCH v8 RESEND 37/38] compiler-gcc.h: Introduce __nostackp function attribute, Tom Lendacky
- [PATCH v8 RESEND 36/38] x86/boot: Add early cmdline parsing for options with arguments, Tom Lendacky
- [PATCH v8 RESEND 35/38] x86/mm: Add support to encrypt the kernel in-place, Tom Lendacky
- [PATCH v8 RESEND 34/38] x86/mm: Create native_make_p4d() for PGTABLE_LEVELS <= 4, Tom Lendacky
- [PATCH v8 RESEND 32/38] xen/x86: Remove SME feature in PV guests, Tom Lendacky
- [PATCH v8 RESEND 38/38] x86/mm: Add support to make use of Secure Memory Encryption, Tom Lendacky
[PATCH v8 00/38] x86: Secure Memory Encryption (AMD),
Tom Lendacky
- [PATCH v8 03/38] x86, mpparse, x86/acpi, x86/PCI, x86/dmi, SFI: Use memremap for RAM mappings, Tom Lendacky
- [PATCH v8 01/38] x86: Document AMD Secure Memory Encryption (SME), Tom Lendacky
- [PATCH v8 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature, Tom Lendacky
- [PATCH v8 05/38] x86/CPU/AMD: Handle SME reduction in physical address size, Tom Lendacky
- [PATCH v8 02/38] x86/mm/pat: Set write-protect cache mode for full PAT support, Tom Lendacky
- [PATCH v8 06/38] x86/mm: Add Secure Memory Encryption (SME) support, Tom Lendacky
- [PATCH v8 09/38] x86/mm: Simplify p[g4um]d_page() macros, Tom Lendacky
- [PATCH v8 08/38] x86/mm: Add support to enable SME in early boot processing, Tom Lendacky
- [PATCH v8 14/38] x86/mm: Insure that boot memory areas are mapped properly, Tom Lendacky
- [PATCH v8 15/38] x86/boot/e820: Add support to determine the E820 type of an address, Tom Lendacky
- [PATCH v8 13/38] x86/mm: Add support for early encrypt/decrypt of memory, Tom Lendacky
- [PATCH v8 12/38] x86/mm: Extend early_memremap() support with additional attrs, Tom Lendacky
- [PATCH v8 11/38] x86/mm: Add SME support for read_cr3_pa(), Tom Lendacky
- [PATCH v8 10/38] x86/mm: Provide general kernel support for memory encryption, Tom Lendacky
- [PATCH v8 07/38] x86/mm: Remove phys_to_virt() usage in ioremap(), Tom Lendacky
- [PATCH v8 17/38] efi: Update efi_mem_type() to return an error rather than 0, Tom Lendacky
- [PATCH v8 18/38] x86/efi: Update EFI pagetable creation to work with SME, Tom Lendacky
- [PATCH v8 19/38] x86/mm: Add support to access boot related data in the clear, Tom Lendacky
- [PATCH v8 16/38] efi: Add an EFI table address match function, Tom Lendacky
- [PATCH v8 20/38] x86, mpparse: Use memremap to map the mpf and mpc data, Tom Lendacky
- [PATCH v8 22/38] x86/mm: Add support for changing the memory encryption attribute, Tom Lendacky
- [PATCH v8 24/38] x86, swiotlb: Add memory encryption support, Tom Lendacky
- [PATCH v8 30/38] kvm: x86: svm: Support Secure Memory Encryption within KVM, Tom Lendacky
- [PATCH v8 29/38] x86, drm, fbdev: Do not specify encrypted memory for video mappings, Tom Lendacky
- [PATCH v8 28/38] x86, realmode: Check for memory encryption on the APs, Tom Lendacky
- [PATCH v8 27/38] iommu/amd: Allow the AMD IOMMU to work with memory encryption, Tom Lendacky
- [PATCH v8 26/38] x86/CPU/AMD: Make the microcode level available earlier in the boot, Tom Lendacky
- [PATCH v8 25/38] swiotlb: Add warnings for use of bounce buffers with SME, Tom Lendacky
- [PATCH v8 21/38] x86/mm: Add support to access persistent memory in the clear, Tom Lendacky
- [PATCH v8 23/38] x86/realmode: Decrypt trampoline area if memory encryption is active, Tom Lendacky
[RFC v4 00/17] powerpc: Memory Protection Keys,
Ram Pai
- [RFC v4 16/17] Documentation: PowerPC specific updates to memory protection keys, Ram Pai
- [RFC v4 17/17] procfs: display the protection-key number associated with a vma, Ram Pai
- [RFC v4 14/17] selftest: PowerPC specific test updates to memory protection keys, Ram Pai
- [RFC v4 15/17] Documentation: Move protecton key documentation to arch neutral directory, Ram Pai
- [RFC v4 13/17] selftest: Move protecton key selftest to arch neutral directory, Ram Pai
- [RFC v4 11/17] powerpc: Handle exceptions caused by pkey violation, Ram Pai
- [RFC v4 03/17] x86: key creation with PKEY_DISABLE_EXECUTE disallowed, Ram Pai
- [RFC v4 08/17] powerpc: Program HPTE key protection bits, Ram Pai
- [RFC v4 10/17] powerpc: Macro the mask used for checking DSI exception, Ram Pai
- [RFC v4 12/17] powerpc: Deliver SEGV signal on pkey violation, Ram Pai
- [RFC v4 09/17] powerpc: call the hash functions with the correct pkey value, Ram Pai
- [RFC v4 05/17] powerpc: store and restore the pkey state across context switches, Ram Pai
- [RFC v4 06/17] powerpc: Implementation for sys_mprotect_pkey() system call, Ram Pai
- [RFC v4 04/17] powerpc: Implement sys_pkey_alloc and sys_pkey_free system call, Ram Pai
- [RFC v4 07/17] powerpc: make the hash functions protection-key aware, Ram Pai
- [RFC v4 02/17] mm: ability to disable execute permission on a key at creation, Ram Pai
- [RFC v4 01/17] mm: introduce an additional vma bit for powerpc pkey, Ram Pai
- Re: [RFC v4 00/17] powerpc: Memory Protection Keys, Balbir Singh
[RFC PATCH v2] arm64: signal: Make parse_user_sigframe() independent of rt_sigframe layout, Dave Martin
[RFC PATCH] arm64: signal: Make parse_user_sigframe() independent of rt_sigframe layout,
Dave Martin
[PATCH 0/4] Reduce ELF_ET_DYN_BASE,
Kees Cook
[REVERT] arm64: signal: Allow expansion of the signal frame,
Dave Martin
[PATCH 0/7] cleanup issues with io{read|write}64,
Logan Gunthorpe
[PATCH 0/5] Last bits for initial 5-level paging enabling,
Kirill A. Shutemov
[RFC v3 00/23] powerpc: Memory Protection Keys,
Ram Pai
- [RFC v3 12/23] powerpc: Implement sys_pkey_alloc and sys_pkey_free system call, Ram Pai
- [RFC v3 17/23] powerpc: Handle exceptions caused by violation of pkey protection, Ram Pai
- [RFC v3 23/23] procfs: display the protection-key number associated with a vma, Ram Pai
- [RFC v3 22/23] Documentation: PowerPC specific updates to memory protection keys, Ram Pai
- [RFC v3 21/23] Documentation: Move protecton key documentation to arch neutral directory, Ram Pai
- [RFC v3 20/23] selftest: PowerPC specific test updates to memory protection keys, Ram Pai
- [RFC v3 19/23] selftest: Move protecton key selftest to arch neutral directory, Ram Pai
- [RFC v3 16/23] powerpc: Macro the mask used for checking DSI exception, Ram Pai
- [RFC v3 15/23] powerpc: Program HPTE key protection bits, Ram Pai
- [RFC v3 18/23] powerpc: Deliver SEGV signal on pkey violation, Ram Pai
- [RFC v3 14/23] powerpc: Implementation for sys_mprotect_pkey() system call, Ram Pai
- [RFC v3 13/23] powerpc: store and restore the pkey state across context switches, Ram Pai
- [RFC v3 09/23] mm: introduce an additional vma bit for powerpc pkey, Ram Pai
- [RFC v3 11/23] x86: key creation with PKEY_DISABLE_EXECUTE is disallowed, Ram Pai
- [RFC v3 10/23] mm: provide the ability to disable execute on a key at creation, Ram Pai
- [RFC v3 08/23] powerpc: use helper functions in flush_hash_page(), Ram Pai
- [RFC v3 05/23] powerpc: capture the PTE format changes in the dump pte report, Ram Pai
- [RFC v3 04/23] powerpc: Free up four 64K PTE bits in 64K backed HPTE pages, Ram Pai
- [RFC v3 06/23] powerpc: use helper functions in __hash_page_4K() for 64K PTE, Ram Pai
- [RFC v3 03/23] powerpc: introduce get_hidx_gslot helper, Ram Pai
- [RFC v3 07/23] powerpc: use helper functions in __hash_page_4K() for 4K PTE, Ram Pai
- [RFC v3 02/23] powerpc: introduce set_hidx_slot helper, Ram Pai
- [RFC v3 01/23] powerpc: Free up four 64K PTE bits in 4K backed HPTE pages, Ram Pai
[PATCH v3] refcount: Create unchecked atomic_t implementation,
Kees Cook
[PATCH 1/1] futex: remove duplicated code and fix UB,
Jiri Slaby
[PATCH] arm64: signal: Allow expansion of the signal frame,
Dave Martin
[PATCH 0/7] rwsem: Implement down_read_killable(),
Kirill Tkhai
[PATCH v5 0/8] Support for contiguous pte hugepages,
Punit Agrawal
- [PATCH v5 2/8] arm64: hugetlb: Remove spurious calls to huge_ptep_offset, Punit Agrawal
- [PATCH v5 5/8] mm/hugetlb: add size parameter to huge_pte_offset(), Punit Agrawal
- [PATCH v5 7/8] mm/hugetlb: Introduce set_huge_swap_pte_at() helper, Punit Agrawal
- [PATCH v5 8/8] mm: rmap: Use correct helper when poisoning hugepages, Punit Agrawal
- [PATCH v5 6/8] mm/hugetlb: Allow architectures to override huge_pte_clear(), Punit Agrawal
- [PATCH v5 4/8] mm, gup: Ensure real head page is ref-counted when using hugepages, Punit Agrawal
- [PATCH v5 3/8] mm, gup: Remove broken VM_BUG_ON_PAGE compound check for hugepages, Punit Agrawal
- [PATCH v5 1/8] arm64: hugetlb: Refactor find_num_contig, Punit Agrawal
- Re: [PATCH v5 0/8] Support for contiguous pte hugepages, Andrew Morton
[PATCH v3 0/4] Generalize fncpy availability,
Florian Fainelli
[PATCH v2 0/4] Generalize fncpy availability,
Florian Fainelli
[PATCH v7 00/36] x86: Secure Memory Encryption (AMD),
Tom Lendacky
- [PATCH v7 02/36] x86/mm/pat: Set write-protect cache mode for full PAT support, Tom Lendacky
- [PATCH v7 04/36] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature, Tom Lendacky
- [PATCH v7 06/36] x86/mm: Add Secure Memory Encryption (SME) support, Tom Lendacky
- [PATCH v7 08/36] x86/mm: Add support to enable SME in early boot processing, Tom Lendacky
- [PATCH v7 11/36] x86/mm: Add SME support for read_cr3_pa(), Tom Lendacky
- [PATCH v7 16/36] efi: Add an EFI table address match function, Tom Lendacky
- [PATCH v7 21/36] x86/mm: Add support to access persistent memory in the clear, Tom Lendacky
- [PATCH v7 22/36] x86/mm: Add support for changing the memory encryption attribute, Tom Lendacky
- [PATCH v7 32/36] xen/x86: Remove SME feature in PV guests, Tom Lendacky
- [PATCH v7 35/36] x86/boot: Add early cmdline parsing for options with arguments, Tom Lendacky
- [PATCH v7 36/36] x86/mm: Add support to make use of Secure Memory Encryption, Tom Lendacky
- [PATCH v7 34/36] x86/mm: Add support to encrypt the kernel in-place, Tom Lendacky
- [PATCH v7 33/36] x86/mm: Use proper encryption attributes with /dev/mem, Tom Lendacky
- [PATCH v7 31/36] x86/mm, kexec: Allow kexec to be used with SME, Tom Lendacky
- [PATCH v7 30/36] kvm: x86: svm: Support Secure Memory Encryption within KVM, Tom Lendacky
- [PATCH v7 29/36] x86, drm, fbdev: Do not specify encrypted memory for video mappings, Tom Lendacky
- [PATCH v7 28/36] x86, realmode: Check for memory encryption on the APs, Tom Lendacky
- [PATCH v7 27/36] iommu/amd: Allow the AMD IOMMU to work with memory encryption, Tom Lendacky
- [PATCH v7 26/36] x86/CPU/AMD: Make the microcode level available earlier in the boot, Tom Lendacky
- [PATCH v7 25/36] swiotlb: Add warnings for use of bounce buffers with SME, Tom Lendacky
- [PATCH v7 24/36] x86, swiotlb: Add memory encryption support, Tom Lendacky
- [PATCH v7 23/36] x86, realmode: Decrypt trampoline area if memory encryption is active, Tom Lendacky
- [PATCH v7 20/36] x86, mpparse: Use memremap to map the mpf and mpc data, Tom Lendacky
- [PATCH v7 18/36] x86/efi: Update EFI pagetable creation to work with SME, Tom Lendacky
- [PATCH v7 19/36] x86/mm: Add support to access boot related data in the clear, Tom Lendacky
- [PATCH v7 17/36] efi: Update efi_mem_type() to return an error rather than 0, Tom Lendacky
- [PATCH v7 15/36] x86/boot/e820: Add support to determine the E820 type of an address, Tom Lendacky
- [PATCH v7 14/36] x86/mm: Insure that boot memory areas are mapped properly, Tom Lendacky
- [PATCH v7 13/36] x86/mm: Add support for early encrypt/decrypt of memory, Tom Lendacky
- [PATCH v7 12/36] x86/mm: Extend early_memremap() support with additional attrs, Tom Lendacky
- [PATCH v7 09/36] x86/mm: Simplify p[gum]d_page() macros, Tom Lendacky
- [PATCH v7 10/36] x86/mm: Provide general kernel support for memory encryption, Tom Lendacky
- [PATCH v7 07/36] x86/mm: Don't use phys_to_virt in ioremap() if SME is active, Tom Lendacky
- [PATCH v7 05/36] x86/CPU/AMD: Handle SME reduction in physical address size, Tom Lendacky
- [PATCH v7 03/36] x86, mpparse, x86/acpi, x86/PCI, x86/dmi, SFI: Use memremap for RAM mappings, Tom Lendacky
- [PATCH v7 01/36] x86: Document AMD Secure Memory Encryption (SME), Tom Lendacky
[PATCH 0/3] Generalize fncpy availability,
Florian Fainelli
[HELP-NEEDED, PATCHv2 0/3] Do not loose dirty bit on THP pages,
Kirill A. Shutemov
[PATCH 0/5] arm64: signal: Signal frame expansion support,
Dave Martin
[PATCH v2 00/13] trace: add the ability to parse sizeof(),
Jeremy Linton
- [PATCH v2 09/13] tracing: define TRACE_DEFINE_SIZEOF() macro to map sizeof's to their values, Jeremy Linton
- [PATCH v2 10/13] tracing: Update sample file to describe the new macro, Jeremy Linton
- [PATCH v2 13/13] tracing: Rename and update the enum_map file, Jeremy Linton
- [PATCH v2 12/13] tracing: Replace some magic constants with sizeof(), Jeremy Linton
- [PATCH v2 08/13] tracing: Rename enum_replace to eval_replace, Jeremy Linton
- [PATCH v2 11/13] tracing: Add TRACE_DEFINE_SIZEOF() macros, Jeremy Linton
- [PATCH v2 07/13] trace: rename enum_map functions, Jeremy Linton
- [PATCH v2 06/13] trace: rename trace.c enum functions, Jeremy Linton
- [PATCH v2 05/13] trace: rename trace_enum_mutex to trace_eval_mutex, Jeremy Linton
- [PATCH v2 04/13] trace: rename trace enum data structures in trace.c, Jeremy Linton
- [PATCH v2 03/13] trace: rename struct module entry for trace enums, Jeremy Linton
- [PATCH v2 01/13] trace: rename kernel enum section to eval, Jeremy Linton
- [PATCH v2 02/13] trace: rename trace_enum_map to trace_eval_map, Jeremy Linton
Re: [PATCH v6 23/34] x86, realmode: Decrypt trampoline area if memory encryption is active, Borislav Petkov
[HELP-NEEDED, PATCH 0/3] Do not loose dirty bit on THP pages,
Kirill A. Shutemov
[PATCH 16/23] clocksource/drivers: Rename CLKSRC_OF to TIMER_OF, Daniel Lezcano
[PATCH 15/23] clocksource/drivers: Rename clksrc table to timer, Daniel Lezcano
[Index of Archives]
[Kernel Announce]
[Kernel Newbies]
[Linux RAID]
[IETF Annouce]
[Security]
[Netdev]
[Linux Wireless]
[Netfilter]
[Bugtraq]