messages from 2022-12-08 08:37:26 to 2022-12-21 00:06:39 UTC [more...]
[PATCH v4 00/39] Shadow stacks for userspace
2022-12-21 0:03 UTC (24+ messages)
` [PATCH v4 03/39] x86/cpufeatures: Add CPU feature flags for shadow stacks
` [PATCH v4 05/39] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
` [PATCH v4 06/39] x86/fpu: Add helper for modifying xstate
` [PATCH v4 07/39] x86: Add user control-protection fault handler
` [PATCH v4 08/39] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
` [PATCH v4 10/39] x86/mm: Introduce _PAGE_COW
` [PATCH v4 33/39] x86: Prevent 32 bit operations for 64 bit shstk tasks
` [PATCH v4 37/39] x86: Add PTRACE interface for shadow stack
[RFC][PATCH 00/12] Introduce cmpxchg128() -- aka. the demise of cmpxchg_double()
2022-12-20 15:09 UTC (26+ messages)
` [RFC][PATCH 01/12] crypto: Remove u128 usage
` [RFC][PATCH 02/12] crypto/ghash-clmulni: Use (struct) be128
` [RFC][PATCH 03/12] cyrpto/b128ops: Remove struct u128
` [RFC][PATCH 04/12] types: Introduce [us]128
` [RFC][PATCH 05/12] arch: Introduce arch_{,try_}_cmpxchg128{,_local}()
` [RFC][PATCH 06/12] instrumentation: Wire up cmpxchg128()
` [RFC][PATCH 07/12] percpu: Wire up cmpxchg128
` [RFC][PATCH 08/12] s390: Replace cmpxchg_double() with cmpxchg128()
` [RFC][PATCH 09/12] x86,amd_iommu: Replace cmpxchg_double()
` [RFC][PATCH 10/12] x86,intel_iommu: "
` [RFC][PATCH 11/12] slub: "
` [RFC][PATCH 12/12] arch: Remove cmpxchg_double
[GIT PULL] asm-generic bits for 6.2
2022-12-20 14:48 UTC (3+ messages)
[PATCH 0/3] crypto: x86/ghash cleanups
2022-12-20 10:09 UTC (6+ messages)
` [PATCH 1/3] crypto: x86/ghash - fix unaligned access in ghash_setkey()
` [PATCH 2/3] crypto: x86/ghash - use le128 instead of u128
` [PATCH 3/3] crypto: x86/ghash - add comment and fix broken link
[PATCH v10 0/9] KVM: mm: fd-based approach for supporting KVM
2022-12-20 9:55 UTC (48+ messages)
` [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
` [PATCH v10 2/9] KVM: Introduce per-page memory attributes
` [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
` [PATCH v10 5/9] KVM: Use gfn instead of hva for mmu_notifier_retry
` [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
` [PATCH v10 7/9] KVM: Update lpage info when private/shared memory are mixed
` [PATCH v10 8/9] KVM: Handle page fault for private memory
` [PATCH v10 9/9] KVM: Enable and expose KVM_MEM_PRIVATE
[GIT PULL, v2] asm-generic bits for 6.2
2022-12-20 7:16 UTC
[PATCH] cputime: remove cputime_to_nsecs fallback
2022-12-20 7:07 UTC
[GIT PULL] csky changes for v6.2-rc1
2022-12-19 14:30 UTC (2+ messages)
[GIT PULL] LoongArch changes for v6.2
2022-12-19 14:30 UTC (2+ messages)
BUG: arm64: missing build-id from vmlinux
2022-12-18 20:51 UTC
[PATCH] m68k: string: Make char intermediate in strcmp() signed
2022-12-15 18:43 UTC (2+ messages)
[RFC PATCH] Syscall tracing on PPC64_ELF_ABI_V1 without KALLSYMS_ALL
2022-12-14 20:26 UTC (2+ messages)
[RFC PATCH V2 00/18] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
2022-12-14 18:25 UTC (38+ messages)
` [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
` [RFC PATCH V2 02/18] x86/hyperv: Add sev-snp enlightened guest specific config
` [RFC PATCH V2 03/18] x86/hyperv: apic change for sev-snp enlightened guest
` [RFC PATCH V2 04/18] x86/hyperv: Decrypt hv vp assist page in "
` [RFC PATCH V2 05/18] x86/hyperv: Get Virtual Trust Level via hvcall
` [RFC PATCH V2 06/18] x86/hyperv: Use vmmcall to implement hvcall in sev-snp enlightened guest
` [RFC PATCH V2 07/18] clocksource: hyper-v: decrypt hyperv tsc page "
` [RFC PATCH V2 08/18] x86/hyperv: decrypt vmbus pages for "
` [RFC PATCH V2 09/18] x86/hyperv: set target vtl in the vmbus init message
` [RFC PATCH V2 10/18] drivers: hv: Decrypt percpu hvcall input arg page in sev-snp enlightened guest
` [RFC PATCH V2 11/18] Drivers: hv: vmbus: Decrypt vmbus ring buffer
` [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
` [RFC PATCH V2 18/18] x86/sev: Fix interrupt exit code paths from #HV exception
[PATCH v2 0/5] Add support running nested Microsoft Hypervisor
2022-12-14 17:25 UTC (18+ messages)
` [PATCH v8 "
` [PATCH v8 1/5] x86/hyperv: Add support for detecting nested hypervisor
` [PATCH v8 2/5] Drivers: hv: Setup synic registers in case of nested root partition
` [PATCH v8 3/5] x86/hyperv: Add an interface to do nested hypercalls
` [PATCH v8 4/5] Drivers: hv: Enable vmbus driver for nested root partition
` [PATCH v8 5/5] x86/hyperv: Change interrupt vector "
` [PATCH v9 0/5] Add support running nested Microsoft Hypervisor
` [PATCH v9 1/5] x86/hyperv: Add support for detecting nested hypervisor
` [PATCH v9 2/5] Drivers: hv: Setup synic registers in case of nested root partition
` [PATCH v9 3/5] x86/hyperv: Add an interface to do nested hypercalls
` [PATCH v9 4/5] Drivers: hv: Enable vmbus driver for nested root partition
` [PATCH v9 5/5] x86/hyperv: Change interrupt vector "
Słowa kluczowe do wypozycjonowania
2022-12-14 9:05 UTC
[PATCH] riscv: Fixup compile error with !MMU
2022-12-13 17:40 UTC (3+ messages)
[PATCH v3] riscv: Use PUD/P4D/PGD pages for the linear mapping
2022-12-13 16:38 UTC (2+ messages)
[PATCH] Documentation: raise minimum supported version of binutils to 2.25
2022-12-13 12:12 UTC (2+ messages)
[PATCH v2] riscv: Use PUD/P4D/PGD pages for the linear mapping
2022-12-13 7:56 UTC (3+ messages)
[PATCH v2 0/6] Support TDX guests on Hyper-V
2022-12-12 19:18 UTC (19+ messages)
` [PATCH v2 1/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
` [PATCH v2 3/6] x86/hyperv: Add hv_isolation_type_tdx() to detect TDX guests
` [PATCH v2 4/6] x86/tdx: Expand __tdx_hypercall() to handle more arguments
` [PATCH v2 5/6] x86/hyperv: Support hypercalls for TDX guests
` [PATCH v2 6/6] Drivers: hv: vmbus: Support "
[PATCH -next V11 0/7] riscv: Add GENERIC_ENTRY support
2022-12-12 7:47 UTC (10+ messages)
` [PATCH -next V11 1/7] compiler_types.h: Add __noinstr_section() for noinstr
` [PATCH -next V11 2/7] riscv: ptrace: Remove duplicate operation
` [PATCH -next V11 3/7] riscv: entry: Add noinstr to prevent instrumentation inserted
` [PATCH -next V11 4/7] riscv: entry: Convert to generic entry
` [PATCH -next V11 5/7] riscv: entry: Remove extra level wrappers of trace_hardirqs_{on,off}
` [PATCH -next V11 6/7] riscv: entry: Consolidate ret_from_kernel_thread into ret_from_fork
` [PATCH -next V11 7/7] riscv: entry: Consolidate general regs saving/restoring
[PATCH v2 00/24] Remove COMMAND_LINE_SIZE from uapi
2022-12-11 6:13 UTC (25+ messages)
` [PATCH v2 01/24] alpha: "
` [PATCH v2 02/24] arm: "
` [PATCH v2 03/24] arm64: "
` [PATCH v2 04/24] ia64: "
` [PATCH v2 05/24] m68k: "
` [PATCH v2 06/24] microblaze: "
` [PATCH v2 07/24] mips: "
` [PATCH v2 08/24] parisc: "
` [PATCH v2 09/24] powerpc: "
` [PATCH v2 10/24] sparc: "
` [PATCH v2 11/24] xtensa: "
` [PATCH v2 12/24] asm-generic: "
` [PATCH v2 13/24] alpha: Remove empty <uapi/asm/setup.h>
` [PATCH v2 14/24] arc: "
` [PATCH v2 15/24] arm64: "
` [PATCH v2 16/24] m68k: "
` [PATCH v2 17/24] microblaze: "
` [PATCH v2 18/24] mips: "
` [PATCH v2 19/24] parisc: "
` [PATCH v2 20/24] powerpc: "
` [PATCH v2 21/24] s390: "
` [PATCH v2 22/24] sparc: "
` [PATCH v2 23/24] x86: "
` [PATCH v2 24/24] xtensa: "
[PATCH -next V10 00/10] riscv: Add GENERIC_ENTRY support and related features
2022-12-10 16:05 UTC (22+ messages)
` [PATCH -next V10 04/10] riscv: entry: Convert to generic entry
` [PATCH -next V10 05/10] riscv: entry: Remove extra level wrappers of trace_hardirqs_{on,off}
` [PATCH -next V10 06/10] riscv: entry: Consolidate ret_from_kernel_thread into ret_from_fork
` [PATCH -next V10 08/10] riscv: stack: Support HAVE_IRQ_EXIT_ON_IRQ_STACK
` [PATCH -next V10 09/10] riscv: stack: Support HAVE_SOFTIRQ_ON_OWN_STACK
` [PATCH -next V10 10/10] riscv: stack: Add config of thread stack size
[GIT PULL] LoongArch fixes for v6.1-final
2022-12-08 19:26 UTC (2+ messages)
[PATCH] iopoll: Call cpu_relax() in busy loops
2022-12-08 10:43 UTC
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).