messages from 2017-06-27 14:57:08 to 2017-06-29 07:52:04 UTC [more...]
[PATCH v2 0/3] make io{read|write}64 more globally usable
2017-06-29 7:52 UTC (15+ messages)
` [PATCH v2 1/3] io-64-nonatomic: add io{read|write}64[be] macros
` [PATCH v2 2/3] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
` [PATCH v2 3/3] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64
[PATCH v5 0/3] Implement fast refcount overflow protection
2017-06-29 4:13 UTC (4+ messages)
` [PATCH v5 3/3] x86/refcount: "
` [kernel-hardening] "
RISC-V Linux Port v2
2017-06-28 23:32 UTC (27+ messages)
` RISC-V Linux Port v3
` [PATCH 1/9] RISC-V: Init and Halt Code
` [PATCH 2/9] RISC-V: Atomic and Locking Code
` [PATCH 3/9] RISC-V: Generic library routines and assembly
` [PATCH 4/9] RISC-V: ELF and module implementation
` [PATCH 5/9] RISC-V: Task implementation
` [PATCH 6/9] RISC-V: Device, timer, IRQs, and the SBI
` [PATCH 7/9] RISC-V: Paging and MMU
` [PATCH 8/9] RISC-V: User-facing API
` [PATCH 9/9] RISC-V: Build Infastructure
[PATCH] arch: remove unused macro/function thread_saved_pc()
2017-06-28 23:14 UTC (5+ messages)
[PATCH v3] refcount: Create unchecked atomic_t implementation
2017-06-28 16:58 UTC (2+ messages)
` [tip:locking/core] locking/refcount: "
[PATCH 0/5] Last bits for initial 5-level paging enabling
2017-06-28 16:39 UTC (5+ messages)
` [PATCH 6/5] x86/KASLR: Fix detection 32/64 bit bootloaders for 5-level paging
[PATCH v3 0/4] Generalize fncpy availability
2017-06-28 14:55 UTC (4+ messages)
` [PATCH v3 4/4] misc: sram: Allow ARM64 to select SRAM_EXEC
(unknown),
2017-06-28 14:22 UTC
[PATCH v8 RESEND 00/38] x86: Secure Memory Encryption (AMD)
2017-06-28 14:05 UTC (82+ messages)
` [PATCH v8 RESEND 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
` [PATCH v8 RESEND 09/38] x86/mm: Simplify p[g4um]d_page() macros
` [PATCH v8 RESEND 01/38] x86: Document AMD Secure Memory Encryption (SME)
` [PATCH v8 RESEND 02/38] x86/mm/pat: Set write-protect cache mode for full PAT support
` [PATCH v8 RESEND 03/38] x86, mpparse, x86/acpi, x86/PCI, x86/dmi, SFI: Use memremap for RAM mappings
` [PATCH v8 RESEND 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
` [PATCH v8 RESEND 05/38] x86/CPU/AMD: Handle SME reduction in physical address size
` [PATCH v8 RESEND 06/38] x86/mm: Add Secure Memory Encryption (SME) support
` [PATCH v8 RESEND 08/38] x86/mm: Add support to enable SME in early boot processing
` [PATCH v8 RESEND 10/38] x86/mm: Provide general kernel support for memory encryption
` [PATCH v8 RESEND 11/38] x86/mm: Add SME support for read_cr3_pa()
` [PATCH v8 RESEND 12/38] x86/mm: Extend early_memremap() support with additional attrs
` [PATCH v8 RESEND 27/38] iommu/amd: Allow the AMD IOMMU to work with memory encryption
` [PATCH v8 RESEND 28/38] x86, realmode: Check for memory encryption on the APs
` [PATCH v8 RESEND 29/38] x86, drm, fbdev: Do not specify encrypted memory for video mappings
` [PATCH v8 RESEND 30/38] kvm: x86: svm: Support Secure Memory Encryption within KVM
` [PATCH v8 RESEND 13/38] x86/mm: Add support for early encrypt/decrypt of memory
` [PATCH v8 RESEND 14/38] x86/mm: Insure that boot memory areas are mapped properly
` [PATCH v8 RESEND 15/38] x86/boot/e820: Add support to determine the E820 type of an address
` [PATCH v8 RESEND 16/38] efi: Add an EFI table address match function
` [PATCH v8 RESEND 17/38] efi: Update efi_mem_type() to return an error rather than 0
` [PATCH v8 RESEND 18/38] x86/efi: Update EFI pagetable creation to work with SME
` [PATCH v8 RESEND 19/38] x86/mm: Add support to access boot related data in the clear
` [PATCH v8 RESEND 20/38] x86, mpparse: Use memremap to map the mpf and mpc data
` [PATCH v8 RESEND 21/38] x86/mm: Add support to access persistent memory in the clear
` [PATCH v8 RESEND 22/38] x86/mm: Add support for changing the memory encryption attribute
` [PATCH v8 RESEND 23/38] x86/realmode: Decrypt trampoline area if memory encryption is active
` [PATCH v8 RESEND 24/38] x86, swiotlb: Add memory encryption support
` [PATCH v8 RESEND 25/38] swiotlb: Add warnings for use of bounce buffers with SME
` [PATCH v8 RESEND 26/38] x86/CPU/AMD: Make the microcode level available earlier in the boot
` [PATCH v8 RESEND 31/38] x86/mm, kexec: Allow kexec to be used with SME
` [PATCH v8 RESEND 32/38] xen/x86: Remove SME feature in PV guests
` [PATCH v8 RESEND 33/38] x86/mm: Use proper encryption attributes with /dev/mem
` [PATCH v8 RESEND 34/38] x86/mm: Create native_make_p4d() for PGTABLE_LEVELS <= 4
` [PATCH v8 RESEND 35/38] x86/mm: Add support to encrypt the kernel in-place
` [PATCH v8 RESEND 36/38] x86/boot: Add early cmdline parsing for options with arguments
` [PATCH v8 RESEND 37/38] compiler-gcc.h: Introduce __nostackp function attribute
` [PATCH v8 RESEND 38/38] x86/mm: Add support to make use of Secure Memory Encryption
[RFC v4 00/17] powerpc: Memory Protection Keys
2017-06-28 7:12 UTC (8+ messages)
` [RFC v4 09/17] powerpc: call the hash functions with the correct pkey value
` [RFC v4 17/17] procfs: display the protection-key number associated with a vma
[PATCH v2] spin loop primitives for busy waiting
2017-06-28 6:33 UTC (3+ messages)
[PATCH 0/7] cleanup issues with io{read|write}64
2017-06-27 20:40 UTC (6+ messages)
` [PATCH 6/7] drm/tilcdc: clean up ifdef hacks around iowrite64
[PATCH 1/5] kbuild: thin archives final link close --whole-archives option
2017-06-27 15:42 UTC (11+ messages)
[PATCH v8 00/38] x86: Secure Memory Encryption (AMD)
2017-06-27 15:01 UTC (55+ messages)
` [PATCH v8 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
` [PATCH v8 05/38] x86/CPU/AMD: Handle SME reduction in physical address size
` [PATCH v8 11/38] x86/mm: Add SME support for read_cr3_pa()
` [PATCH v8 12/38] x86/mm: Extend early_memremap() support with additional attrs
` [PATCH v8 15/38] x86/boot/e820: Add support to determine the E820 type of an address
` [PATCH v8 16/38] efi: Add an EFI table address match function
` [PATCH v8 19/38] x86/mm: Add support to access boot related data in the clear
` [PATCH v8 20/38] x86, mpparse: Use memremap to map the mpf and mpc data
` [PATCH v8 21/38] x86/mm: Add support to access persistent memory in the clear
` [PATCH v8 23/38] x86/realmode: Decrypt trampoline area if memory encryption is active
` [PATCH v8 27/38] iommu/amd: Allow the AMD IOMMU to work with memory encryption
` [PATCH v8 28/38] x86, realmode: Check for memory encryption on the APs
` [PATCH v8 06/38] x86/mm: Add Secure Memory Encryption (SME) support
` [PATCH v8 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
` [PATCH v8 08/38] x86/mm: Add support to enable SME in early boot processing
` [PATCH v8 09/38] x86/mm: Simplify p[g4um]d_page() macros
` [PATCH v8 10/38] x86/mm: Provide general kernel support for memory encryption
` [PATCH v8 13/38] x86/mm: Add support for early encrypt/decrypt of memory
` [PATCH v8 14/38] x86/mm: Insure that boot memory areas are mapped properly
` [PATCH v8 17/38] efi: Update efi_mem_type() to return an error rather than 0
` [PATCH v8 18/38] x86/efi: Update EFI pagetable creation to work with SME
` [PATCH v8 22/38] x86/mm: Add support for changing the memory encryption attribute
` [PATCH v8 24/38] x86, swiotlb: Add memory encryption support
` [PATCH v8 25/38] swiotlb: Add warnings for use of bounce buffers with SME
` [PATCH v8 26/38] x86/CPU/AMD: Make the microcode level available earlier in the boot
` [PATCH v8 29/38] x86, drm, fbdev: Do not specify encrypted memory for video mappings
` [PATCH v8 30/38] kvm: x86: svm: Support Secure Memory Encryption within KVM
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox