public inbox for linux-arch@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2017-06-27 14:57:08 to 2017-06-29 07:52:04 UTC [more...]

[PATCH v2 0/3] make io{read|write}64 more globally usable
 2017-06-29  7:52 UTC  (15+ messages)
` [PATCH v2 1/3] io-64-nonatomic: add io{read|write}64[be] macros
` [PATCH v2 2/3] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
` [PATCH v2 3/3] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64

[PATCH v5 0/3] Implement fast refcount overflow protection
 2017-06-29  4:13 UTC  (4+ messages)
` [PATCH v5 3/3] x86/refcount: "
  ` [kernel-hardening] "

RISC-V Linux Port v2
 2017-06-28 23:32 UTC  (27+ messages)
` RISC-V Linux Port v3
  ` [PATCH 1/9] RISC-V: Init and Halt Code
  ` [PATCH 2/9] RISC-V: Atomic and Locking Code
  ` [PATCH 3/9] RISC-V: Generic library routines and assembly
  ` [PATCH 4/9] RISC-V: ELF and module implementation
  ` [PATCH 5/9] RISC-V: Task implementation
  ` [PATCH 6/9] RISC-V: Device, timer, IRQs, and the SBI
  ` [PATCH 7/9] RISC-V: Paging and MMU
  ` [PATCH 8/9] RISC-V: User-facing API
  ` [PATCH 9/9] RISC-V: Build Infastructure

[PATCH] arch: remove unused macro/function thread_saved_pc()
 2017-06-28 23:14 UTC  (5+ messages)

[PATCH v3] refcount: Create unchecked atomic_t implementation
 2017-06-28 16:58 UTC  (2+ messages)
` [tip:locking/core] locking/refcount: "

[PATCH 0/5] Last bits for initial 5-level paging enabling
 2017-06-28 16:39 UTC  (5+ messages)
` [PATCH 6/5] x86/KASLR: Fix detection 32/64 bit bootloaders for 5-level paging

[PATCH v3 0/4] Generalize fncpy availability
 2017-06-28 14:55 UTC  (4+ messages)
` [PATCH v3 4/4] misc: sram: Allow ARM64 to select SRAM_EXEC

(unknown),
 2017-06-28 14:22 UTC 

[PATCH v8 RESEND 00/38] x86: Secure Memory Encryption (AMD)
 2017-06-28 14:05 UTC  (82+ messages)
` [PATCH v8 RESEND 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
` [PATCH v8 RESEND 09/38] x86/mm: Simplify p[g4um]d_page() macros
  ` [PATCH v8 RESEND 01/38] x86: Document AMD Secure Memory Encryption (SME)
  ` [PATCH v8 RESEND 02/38] x86/mm/pat: Set write-protect cache mode for full PAT support
  ` [PATCH v8 RESEND 03/38] x86, mpparse, x86/acpi, x86/PCI, x86/dmi, SFI: Use memremap for RAM mappings
  ` [PATCH v8 RESEND 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
  ` [PATCH v8 RESEND 05/38] x86/CPU/AMD: Handle SME reduction in physical address size
  ` [PATCH v8 RESEND 06/38] x86/mm: Add Secure Memory Encryption (SME) support
  ` [PATCH v8 RESEND 08/38] x86/mm: Add support to enable SME in early boot processing
  ` [PATCH v8 RESEND 10/38] x86/mm: Provide general kernel support for memory encryption
  ` [PATCH v8 RESEND 11/38] x86/mm: Add SME support for read_cr3_pa()
  ` [PATCH v8 RESEND 12/38] x86/mm: Extend early_memremap() support with additional attrs
  ` [PATCH v8 RESEND 27/38] iommu/amd: Allow the AMD IOMMU to work with memory encryption
  ` [PATCH v8 RESEND 28/38] x86, realmode: Check for memory encryption on the APs
  ` [PATCH v8 RESEND 29/38] x86, drm, fbdev: Do not specify encrypted memory for video mappings
  ` [PATCH v8 RESEND 30/38] kvm: x86: svm: Support Secure Memory Encryption within KVM
` [PATCH v8 RESEND 13/38] x86/mm: Add support for early encrypt/decrypt of memory
` [PATCH v8 RESEND 14/38] x86/mm: Insure that boot memory areas are mapped properly
` [PATCH v8 RESEND 15/38] x86/boot/e820: Add support to determine the E820 type of an address
` [PATCH v8 RESEND 16/38] efi: Add an EFI table address match function
` [PATCH v8 RESEND 17/38] efi: Update efi_mem_type() to return an error rather than 0
` [PATCH v8 RESEND 18/38] x86/efi: Update EFI pagetable creation to work with SME
` [PATCH v8 RESEND 19/38] x86/mm: Add support to access boot related data in the clear
` [PATCH v8 RESEND 20/38] x86, mpparse: Use memremap to map the mpf and mpc data
` [PATCH v8 RESEND 21/38] x86/mm: Add support to access persistent memory in the clear
` [PATCH v8 RESEND 22/38] x86/mm: Add support for changing the memory encryption attribute
` [PATCH v8 RESEND 23/38] x86/realmode: Decrypt trampoline area if memory encryption is active
` [PATCH v8 RESEND 24/38] x86, swiotlb: Add memory encryption support
` [PATCH v8 RESEND 25/38] swiotlb: Add warnings for use of bounce buffers with SME
` [PATCH v8 RESEND 26/38] x86/CPU/AMD: Make the microcode level available earlier in the boot
` [PATCH v8 RESEND 31/38] x86/mm, kexec: Allow kexec to be used with SME
` [PATCH v8 RESEND 32/38] xen/x86: Remove SME feature in PV guests
` [PATCH v8 RESEND 33/38] x86/mm: Use proper encryption attributes with /dev/mem
` [PATCH v8 RESEND 34/38] x86/mm: Create native_make_p4d() for PGTABLE_LEVELS <= 4
` [PATCH v8 RESEND 35/38] x86/mm: Add support to encrypt the kernel in-place
` [PATCH v8 RESEND 36/38] x86/boot: Add early cmdline parsing for options with arguments
` [PATCH v8 RESEND 37/38] compiler-gcc.h: Introduce __nostackp function attribute
` [PATCH v8 RESEND 38/38] x86/mm: Add support to make use of Secure Memory Encryption

[RFC v4 00/17] powerpc: Memory Protection Keys
 2017-06-28  7:12 UTC  (8+ messages)
` [RFC v4 09/17] powerpc: call the hash functions with the correct pkey value
` [RFC v4 17/17] procfs: display the protection-key number associated with a vma

[PATCH v2] spin loop primitives for busy waiting
 2017-06-28  6:33 UTC  (3+ messages)

[PATCH 0/7] cleanup issues with io{read|write}64
 2017-06-27 20:40 UTC  (6+ messages)
` [PATCH 6/7] drm/tilcdc: clean up ifdef hacks around iowrite64

[PATCH 1/5] kbuild: thin archives final link close --whole-archives option
 2017-06-27 15:42 UTC  (11+ messages)

[PATCH v8 00/38] x86: Secure Memory Encryption (AMD)
 2017-06-27 15:01 UTC  (55+ messages)
` [PATCH v8 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
` [PATCH v8 05/38] x86/CPU/AMD: Handle SME reduction in physical address size
` [PATCH v8 11/38] x86/mm: Add SME support for read_cr3_pa()
` [PATCH v8 12/38] x86/mm: Extend early_memremap() support with additional attrs
` [PATCH v8 15/38] x86/boot/e820: Add support to determine the E820 type of an address
` [PATCH v8 16/38] efi: Add an EFI table address match function
` [PATCH v8 19/38] x86/mm: Add support to access boot related data in the clear
` [PATCH v8 20/38] x86, mpparse: Use memremap to map the mpf and mpc data
` [PATCH v8 21/38] x86/mm: Add support to access persistent memory in the clear
` [PATCH v8 23/38] x86/realmode: Decrypt trampoline area if memory encryption is active
` [PATCH v8 27/38] iommu/amd: Allow the AMD IOMMU to work with memory encryption
` [PATCH v8 28/38] x86, realmode: Check for memory encryption on the APs
  ` [PATCH v8 06/38] x86/mm: Add Secure Memory Encryption (SME) support
  ` [PATCH v8 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
  ` [PATCH v8 08/38] x86/mm: Add support to enable SME in early boot processing
  ` [PATCH v8 09/38] x86/mm: Simplify p[g4um]d_page() macros
  ` [PATCH v8 10/38] x86/mm: Provide general kernel support for memory encryption
  ` [PATCH v8 13/38] x86/mm: Add support for early encrypt/decrypt of memory
  ` [PATCH v8 14/38] x86/mm: Insure that boot memory areas are mapped properly
  ` [PATCH v8 17/38] efi: Update efi_mem_type() to return an error rather than 0
  ` [PATCH v8 18/38] x86/efi: Update EFI pagetable creation to work with SME
  ` [PATCH v8 22/38] x86/mm: Add support for changing the memory encryption attribute
  ` [PATCH v8 24/38] x86, swiotlb: Add memory encryption support
  ` [PATCH v8 25/38] swiotlb: Add warnings for use of bounce buffers with SME
  ` [PATCH v8 26/38] x86/CPU/AMD: Make the microcode level available earlier in the boot
  ` [PATCH v8 29/38] x86, drm, fbdev: Do not specify encrypted memory for video mappings
  ` [PATCH v8 30/38] kvm: x86: svm: Support Secure Memory Encryption within KVM


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox