linux-arch.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-10-18 13:17:59 to 2021-10-26 00:22:02 UTC [more...]

[PATCH 00/20] exit cleanups
 2021-10-26  0:21 UTC  (77+ messages)
` [PATCH 01/20] exit/doublefault: Remove apparently bogus comment about rewind_stack_do_exit
` [PATCH 02/20] exit: Remove calls of do_exit after noreturn versions of die
` [PATCH 03/20] reboot: Remove the unreachable panic after do_exit in reboot(2)
` [PATCH 04/20] signal/sparc32: Remove unreachable do_exit in do_sparc_fault
` [PATCH 05/20] signal/mips: Update (_save|_restore)_fp_context to fail with -EFAULT
` [PATCH 06/20] signal/sh: Use force_sig(SIGKILL) instead of do_group_exit(SIGKILL)
` [PATCH 07/20] signal/powerpc: On swapcontext failure force SIGSEGV
` [PATCH 08/20] signal/sparc: In setup_tsb_params convert open coded BUG into BUG
` [PATCH 09/20] signal/vm86_32: Replace open coded BUG_ON with an actual BUG_ON
` [PATCH 10/20] signal/vm86_32: Properly send SIGSEGV when the vm86 state cannot be saved
    ` [PATCH v2 10/32] "
` [PATCH 11/20] signal/s390: Use force_sigsegv in default_trap_handler
` [PATCH 12/20] exit/kthread: Have kernel threads return instead of calling do_exit
` [PATCH 13/20] signal: Implement force_fatal_sig
` [PATCH 14/20] exit/syscall_user_dispatch: Send ordinary signals on failure
` [PATCH 15/20] signal/sparc32: Exit with a fatal signal when try_to_clear_window_buffer fails
` [PATCH 16/20] signal/sparc32: In setup_rt_frame and setup_fram use force_fatal_sig
` [PATCH 17/20] signal/x86: In emulate_vsyscall force a signal instead of calling do_exit
` [PATCH 18/20] exit/rtl8723bs: Replace the macro thread_exit with a simple return 0
` [PATCH 19/20] exit/rtl8712: "
` [PATCH 20/20] exit/r8188eu: "
` [PATCH 21/20] signal: Replace force_sigsegv(SIGSEGV) with force_fatal_sig(SIGSEGV)

[PATCH V9 0/9] x86/Hyper-V: Add Hyper-V Isolation VM support(First part)
 2021-10-25 20:55 UTC  (11+ messages)
` [PATCH V9 1/9] x86/hyperv: Initialize GHCB page in Isolation VM
` [PATCH V9 2/9] x86/hyperv: Initialize shared memory boundary in the "
` [PATCH V9 3/9] x86/hyperv: Add new hvcall guest address host visibility support
` [PATCH V9 4/9] Drivers: hv: vmbus: Mark vmbus ring buffer visible to host in Isolation VM
` [PATCH V9 5/9] x86/sev-es: Expose sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
` [PATCH V9 6/9] x86/hyperv: Add Write/Read MSR registers via ghcb page
` [PATCH V9 7/9] x86/hyperv: Add ghcb hvcall support for SNP VM
` [PATCH V9 8/9] Drivers: hv: vmbus: Add SNP support for VMbus channel initiate message
` [PATCH V9 9/9] Drivers: hv : vmbus: Initialize VMbus ring buffer for Isolation VM

[PATCH V8 0/9] x86/Hyper-V: Add Hyper-V Isolation VM support(First part)
 2021-10-25 20:54 UTC  (22+ messages)
` [PATCH V8 1/9] x86/hyperv: Initialize GHCB page in Isolation VM
` [PATCH V8 2/9] x86/hyperv: Initialize shared memory boundary in the "
` [PATCH V8 3/9] x86/hyperv: Add new hvcall guest address host visibility support
` [PATCH V8 4/9] Drivers: hv: vmbus: Mark vmbus ring buffer visible to host in Isolation VM
` [PATCH V8 5/9] x86/sev-es: Expose sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
  ` [PATCH V8.1 "
` [PATCH V8 6/9] x86/hyperv: Add Write/Read MSR registers via ghcb page
` [PATCH V8 7/9] x86/hyperv: Add ghcb hvcall support for SNP VM
` [PATCH V8 8/9] Drivers: hv: vmbus: Add SNP support for VMbus channel initiate message
` [PATCH V8 9/9] Drivers: hv : vmbus: Initialize VMbus ring buffer for Isolation VM
` [PATCH V8.1 6/9] x86/hyperv: Add Write/Read MSR registers via ghcb page

[PATCH 0/7] arch: More wchan fixes
 2021-10-25 20:52 UTC  (26+ messages)
` [PATCH 1/7] x86: Fix __get_wchan() for !STACKTRACE
` [PATCH 2/7] stacktrace,sched: Make stack_trace_save_tsk() more robust
` [PATCH 3/7] ARM: implement ARCH_STACKWALK
` [PATCH 4/7] arch: Make ARCH_STACKWALK independent of STACKTRACE
` [PATCH 5/7] powerpc, arm64: Mark __switch_to() as __sched
` [PATCH 6/7] arch: __get_wchan() || ARCH_STACKWALK
` [PATCH 7/7] selftests: proc: Make sure wchan works when it exists

[RFC v2 0/3] memory model: Make unlock(A)+lock(B) on the same CPU RCtso
 2021-10-25 14:54 UTC  (4+ messages)
` [RFC v2 1/3] tools/memory-model: Provide extra ordering for unlock+lock pair on the same CPU
` [RFC v2 2/3] tools/memory-model: doc: Describe the requirement of the litmus-tests directory
` [RFC v2 3/3] tools/memory-model: litmus: Add two tests for unlock(A)+lock(B) ordering

[PATCH v3 0/2] PCI: hv: Hyper-V vPCI for ARM64
 2021-10-24 12:54 UTC  (8+ messages)
` [PATCH v3 1/2] PCI: hv: Make the code arch neutral by adding arch specific interfaces
` [PATCH v3 2/2] arm64: PCI: hv: Add support for Hyper-V vPCI

[PATCH] locking: Generic ticket lock
 2021-10-22 15:19 UTC  (12+ messages)

[PATCH] selftests: proc: Make sure wchan works when it exists
 2021-10-22  3:35 UTC  (8+ messages)

[PATCH v2 0/2] MIPS: convert to generic entry
 2021-10-22  2:19 UTC  (10+ messages)

[PATCH 0/2] Nuke PAGE_KERNEL_IO
 2021-10-21 18:15 UTC  (3+ messages)
` [PATCH 1/2] drm/i915/gem: stop using PAGE_KERNEL_IO
` [PATCH 2/2] x86/mm: nuke PAGE_KERNEL_IO

[PATCH V7 0/9] x86/Hyper-V: Add Hyper-V Isolation VM support(First part)
 2021-10-21 15:42 UTC  (17+ messages)
` [PATCH V7 5/9] x86/sev-es: Expose __sev_es_ghcb_hv_call() to call ghcb hv call out of sev code
          ` [PATCH] "

[PATCH v5 00/16] Add TDX Guest Support (shared-mm support)
 2021-10-20 17:26 UTC  (22+ messages)
` [PATCH v5 01/16] x86/mm: Move force_dma_unencrypted() to common code
` [PATCH v5 04/16] x86/tdx: Make pages shared in ioremap()
` [PATCH v5 06/16] x86/tdx: Make DMA pages shared
` [PATCH v5 07/16] x86/kvm: Use bounce buffers for TD guest
` [PATCH v5 12/16] PCI: Add pci_iomap_host_shared(), pci_iomap_host_shared_range()

[RFC PATCH v2 00/11] riscv: Add DMA_COHERENT support for Allwinner D1
 2021-10-20  8:11 UTC  (4+ messages)
` [RFC PATCH v2 07/11] riscv: cmo: Add dma-noncoherency support

Another possible use for LKMM, or a subset (strengthening) thereof
 2021-10-19  3:50 UTC  (6+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).