linux-arch.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2017-06-27 01:09:30 to 2017-06-28 01:50:17 UTC [more...]

[RFC v4 00/17] powerpc: Memory Protection Keys
 2017-06-28  1:50 UTC  (46+ messages)
` [RFC v4 01/17] mm: introduce an additional vma bit for powerpc pkey
` [RFC v4 02/17] mm: ability to disable execute permission on a key at creation
` [RFC v4 03/17] x86: key creation with PKEY_DISABLE_EXECUTE disallowed
` [RFC v4 04/17] powerpc: Implement sys_pkey_alloc and sys_pkey_free system call
` [RFC v4 05/17] powerpc: store and restore the pkey state across context switches
` [RFC v4 06/17] powerpc: Implementation for sys_mprotect_pkey() system call
` [RFC v4 07/17] powerpc: make the hash functions protection-key aware
` [RFC v4 08/17] powerpc: Program HPTE key protection bits
` [RFC v4 09/17] powerpc: call the hash functions with the correct pkey value
` [RFC v4 10/17] powerpc: Macro the mask used for checking DSI exception
` [RFC v4 11/17] powerpc: Handle exceptions caused by pkey violation
` [RFC v4 12/17] powerpc: Deliver SEGV signal on "
` [RFC v4 13/17] selftest: Move protecton key selftest to arch neutral directory
` [RFC v4 14/17] selftest: PowerPC specific test updates to memory protection keys
` [RFC v4 15/17] Documentation: Move protecton key documentation to arch neutral directory
` [RFC v4 16/17] Documentation: PowerPC specific updates to memory protection keys
` [RFC v4 17/17] procfs: display the protection-key number associated with a vma

[PATCH v2 0/3] make io{read|write}64 more globally usable
 2017-06-27 23:02 UTC  (7+ messages)
` [PATCH v2 1/3] io-64-nonatomic: add io{read|write}64[be] macros
` [PATCH v2 2/3] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
` [PATCH v2 3/3] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64

[PATCH 0/7] cleanup issues with io{read|write}64
 2017-06-27 20:40 UTC  (6+ messages)
` [PATCH 6/7] drm/tilcdc: clean up ifdef hacks around iowrite64

[PATCH 1/5] kbuild: thin archives final link close --whole-archives option
 2017-06-27 15:42 UTC  (11+ messages)

[PATCH v8 RESEND 00/38] x86: Secure Memory Encryption (AMD)
 2017-06-27 15:14 UTC  (78+ messages)
  ` [PATCH v8 RESEND 01/38] x86: Document AMD Secure Memory Encryption (SME)
  ` [PATCH v8 RESEND 02/38] x86/mm/pat: Set write-protect cache mode for full PAT support
  ` [PATCH v8 RESEND 03/38] x86, mpparse, x86/acpi, x86/PCI, x86/dmi, SFI: Use memremap for RAM mappings
  ` [PATCH v8 RESEND 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
  ` [PATCH v8 RESEND 05/38] x86/CPU/AMD: Handle SME reduction in physical address size
  ` [PATCH v8 RESEND 06/38] x86/mm: Add Secure Memory Encryption (SME) support
  ` [PATCH v8 RESEND 08/38] x86/mm: Add support to enable SME in early boot processing
  ` [PATCH v8 RESEND 10/38] x86/mm: Provide general kernel support for memory encryption
  ` [PATCH v8 RESEND 11/38] x86/mm: Add SME support for read_cr3_pa()
  ` [PATCH v8 RESEND 12/38] x86/mm: Extend early_memremap() support with additional attrs
  ` [PATCH v8 RESEND 27/38] iommu/amd: Allow the AMD IOMMU to work with memory encryption
  ` [PATCH v8 RESEND 28/38] x86, realmode: Check for memory encryption on the APs
  ` [PATCH v8 RESEND 29/38] x86, drm, fbdev: Do not specify encrypted memory for video mappings
  ` [PATCH v8 RESEND 30/38] kvm: x86: svm: Support Secure Memory Encryption within KVM
` [PATCH v8 RESEND 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
` [PATCH v8 RESEND 09/38] x86/mm: Simplify p[g4um]d_page() macros
` [PATCH v8 RESEND 13/38] x86/mm: Add support for early encrypt/decrypt of memory
` [PATCH v8 RESEND 14/38] x86/mm: Insure that boot memory areas are mapped properly
` [PATCH v8 RESEND 15/38] x86/boot/e820: Add support to determine the E820 type of an address
` [PATCH v8 RESEND 16/38] efi: Add an EFI table address match function
` [PATCH v8 RESEND 17/38] efi: Update efi_mem_type() to return an error rather than 0
` [PATCH v8 RESEND 18/38] x86/efi: Update EFI pagetable creation to work with SME
` [PATCH v8 RESEND 19/38] x86/mm: Add support to access boot related data in the clear
` [PATCH v8 RESEND 20/38] x86, mpparse: Use memremap to map the mpf and mpc data
` [PATCH v8 RESEND 21/38] x86/mm: Add support to access persistent memory in the clear
` [PATCH v8 RESEND 22/38] x86/mm: Add support for changing the memory encryption attribute
` [PATCH v8 RESEND 23/38] x86/realmode: Decrypt trampoline area if memory encryption is active
` [PATCH v8 RESEND 24/38] x86, swiotlb: Add memory encryption support
` [PATCH v8 RESEND 25/38] swiotlb: Add warnings for use of bounce buffers with SME
` [PATCH v8 RESEND 26/38] x86/CPU/AMD: Make the microcode level available earlier in the boot
` [PATCH v8 RESEND 31/38] x86/mm, kexec: Allow kexec to be used with SME
` [PATCH v8 RESEND 32/38] xen/x86: Remove SME feature in PV guests
` [PATCH v8 RESEND 33/38] x86/mm: Use proper encryption attributes with /dev/mem
` [PATCH v8 RESEND 34/38] x86/mm: Create native_make_p4d() for PGTABLE_LEVELS <= 4
` [PATCH v8 RESEND 35/38] x86/mm: Add support to encrypt the kernel in-place
` [PATCH v8 RESEND 36/38] x86/boot: Add early cmdline parsing for options with arguments
` [PATCH v8 RESEND 37/38] compiler-gcc.h: Introduce __nostackp function attribute
` [PATCH v8 RESEND 38/38] x86/mm: Add support to make use of Secure Memory Encryption

[PATCH v8 00/38] x86: Secure Memory Encryption (AMD)
 2017-06-27 15:01 UTC  (62+ messages)
` [PATCH v8 01/38] x86: Document AMD Secure Memory Encryption (SME)
` [PATCH v8 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
` [PATCH v8 05/38] x86/CPU/AMD: Handle SME reduction in physical address size
  ` [PATCH v8 02/38] x86/mm/pat: Set write-protect cache mode for full PAT support
  ` [PATCH v8 03/38] x86, mpparse, x86/acpi, x86/PCI, x86/dmi, SFI: Use memremap for RAM mappings
  ` [PATCH v8 06/38] x86/mm: Add Secure Memory Encryption (SME) support
  ` [PATCH v8 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
  ` [PATCH v8 08/38] x86/mm: Add support to enable SME in early boot processing
  ` [PATCH v8 09/38] x86/mm: Simplify p[g4um]d_page() macros
  ` [PATCH v8 10/38] x86/mm: Provide general kernel support for memory encryption
  ` [PATCH v8 13/38] x86/mm: Add support for early encrypt/decrypt of memory
  ` [PATCH v8 14/38] x86/mm: Insure that boot memory areas are mapped properly
  ` [PATCH v8 17/38] efi: Update efi_mem_type() to return an error rather than 0
  ` [PATCH v8 18/38] x86/efi: Update EFI pagetable creation to work with SME
  ` [PATCH v8 22/38] x86/mm: Add support for changing the memory encryption attribute
  ` [PATCH v8 24/38] x86, swiotlb: Add memory encryption support
  ` [PATCH v8 25/38] swiotlb: Add warnings for use of bounce buffers with SME
  ` [PATCH v8 26/38] x86/CPU/AMD: Make the microcode level available earlier in the boot
  ` [PATCH v8 29/38] x86, drm, fbdev: Do not specify encrypted memory for video mappings
  ` [PATCH v8 30/38] kvm: x86: svm: Support Secure Memory Encryption within KVM
` [PATCH v8 11/38] x86/mm: Add SME support for read_cr3_pa()
` [PATCH v8 12/38] x86/mm: Extend early_memremap() support with additional attrs
` [PATCH v8 15/38] x86/boot/e820: Add support to determine the E820 type of an address
` [PATCH v8 16/38] efi: Add an EFI table address match function
` [PATCH v8 19/38] x86/mm: Add support to access boot related data in the clear
` [PATCH v8 20/38] x86, mpparse: Use memremap to map the mpf and mpc data
` [PATCH v8 21/38] x86/mm: Add support to access persistent memory in the clear
` [PATCH v8 23/38] x86/realmode: Decrypt trampoline area if memory encryption is active
` [PATCH v8 27/38] iommu/amd: Allow the AMD IOMMU to work with memory encryption
` [PATCH v8 28/38] x86, realmode: Check for memory encryption on the APs

[PATCH 13/17] RISC-V: Add include subdirectory
 2017-06-27  8:48 UTC  (5+ messages)

Product Inquiry
 2017-06-26 21:50 UTC 

[PATCH 10/17] irqchip: New RISC-V PLIC Driver
 2017-06-27  1:09 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).