Linux-arch Archive mirror
 help / color / mirror / Atom feed
 messages from 2022-09-29 22:29:56 to 2022-10-04 11:08:49 UTC [more...]

[PATCH v2 00/44] cpuidle,rcu: Clean up the mess
 2022-10-04 11:08 UTC  (7+ messages)
` [PATCH v2 12/44] cpuidle,dt: Push RCU-idle into driver
` [PATCH v2 14/44] cpuidle,cpu_pm: Remove RCU fiddling from cpu_pm_{enter,exit}()
` [PATCH v2 23/44] arm,smp: Remove trace_.*_rcuidle() usage

[PATCH v2 00/39] Shadowstacks for userspace
 2022-10-04 10:17 UTC  (146+ messages)
` [PATCH v2 01/39] Documentation/x86: Add CET description
` [PATCH v2 02/39] x86/cet/shstk: Add Kconfig option for Shadow Stack
` [PATCH v2 03/39] x86/cpufeatures: Add CPU feature flags for shadow stacks
` [PATCH v2 04/39] x86/cpufeatures: Enable CET CR4 bit for shadow stack
` [PATCH v2 05/39] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
` [PATCH v2 06/39] x86/fpu: Add helper for modifying xstate
` [PATCH v2 07/39] x86/cet: Add user control-protection fault handler
` [PATCH v2 08/39] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
` [PATCH v2 09/39] x86/mm: Move pmd_write(), pud_write() up in the file
` [PATCH v2 10/39] x86/mm: Introduce _PAGE_COW
` [PATCH v2 11/39] x86/mm: Update pte_modify for _PAGE_COW
` [PATCH v2 12/39] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
` [PATCH v2 13/39] mm: Move VM_UFFD_MINOR_BIT from 37 to 38
` [PATCH v2 14/39] mm: Introduce VM_SHADOW_STACK for shadow stack memory
` [PATCH v2 15/39] x86/mm: Check Shadow Stack page fault errors
` [PATCH v2 16/39] x86/mm: Update maybe_mkwrite() for shadow stack
` [PATCH v2 17/39] mm: Fixup places that call pte_mkwrite() directly
` [PATCH v2 18/39] mm: Add guard pages around a shadow stack
` [PATCH v2 19/39] mm/mmap: Add shadow stack pages to memory accounting
` [PATCH v2 20/39] mm/mprotect: Exclude shadow stack from preserve_write
` [PATCH v2 21/39] mm: Re-introduce vm_flags to do_mmap()
` [PATCH v2 22/39] mm: Don't allow write GUPs to shadow stack memory
` [PATCH v2 23/39] x86: Introduce userspace API for CET enabling
` [PATCH v2 24/39] x86/cet/shstk: Add user-mode shadow stack support
` [PATCH v2 25/39] x86/cet/shstk: Handle thread shadow stack
` [PATCH v2 26/39] x86/cet/shstk: Introduce routines modifying shstk
` [PATCH v2 27/39] x86/cet/shstk: Handle signals for shadow stack
` [PATCH v2 28/39] x86/cet/shstk: Introduce map_shadow_stack syscall
` [PATCH v2 29/39] x86/cet/shstk: Support wrss for userspace
` [PATCH v2 30/39] x86: Expose thread features status in /proc/$PID/arch_status
` [PATCH v2 31/39] x86/cet/shstk: Wire in CET interface
` [PATCH v2 32/39] selftests/x86: Add shadow stack test
` [PATCH v2 33/39] x86/cpufeatures: Limit shadow stack to Intel CPUs
` [OPTIONAL/CLEANUP v2 34/39] x86: Separate out x86_regset for 32 and 64 bit
` [OPTIONAL/CLEANUP v2 35/39] x86: Improve formatting of user_regset arrays
` [OPTIONAL/RFC v2 36/39] x86/fpu: Add helper for initing features
` [OPTIONAL/RFC v2 37/39] x86/cet: Add PTRACE interface for CET
` [OPTIONAL/RFC v2 38/39] x86/cet/shstk: Add ARCH_CET_UNLOCK
` [OPTIONAL/RFC v2 39/39] x86: Add alt shadow stack support

[arnd-asm-generic:asm-generic] BUILD REGRESSION 52c747bd814f599ada7a6cdb38e282090629e64e
 2022-10-04  8:36 UTC 

[RFC PATCH 3/3] Remove HAVE_VIRT_CPU_ACCOUNTING_GEN option
 2022-10-04  6:33 UTC 

[RFC UKL 00/10] Unikernel Linux (UKL)
 2022-10-04  2:11 UTC  (12+ messages)
` [RFC UKL 01/10] kbuild: Add sections and symbols to linker script for UKL support
` [RFC UKL 02/10] x86/boot: Load the PT_TLS segment for Unikernel configs
` [RFC UKL 03/10] sched: Add task_struct tracking of kernel or application execution
` [RFC UKL 04/10] x86/entry: Create alternate entry path for system calls
` [RFC UKL 05/10] x86/uaccess: Make access_ok UKL aware
` [RFC UKL 06/10] x86/fault: Skip checking kernel mode access to user address space for UKL
` [RFC UKL 07/10] x86/signal: Adjust signal handler register values and return frame
` [RFC UKL 08/10] exec: Make exec path for starting UKL application
` [RFC UKL 09/10] exec: Give userspace a method for starting UKL process
` [RFC UKL 10/10] Kconfig: Add config option for enabling and sample for testing UKL

[PATCH] alpha: Use generic <asm-generic/io.h>
 2022-10-03 18:49 UTC  (5+ messages)

[PATCH] alpha: Fix ioread64/iowrite64 helpers
 2022-10-03 18:47 UTC  (3+ messages)

[GIT PULL] LKMM changes for v6.1
 2022-10-03 17:32 UTC  (2+ messages)

[arnd-asm-generic:master 9/9] arch/alpha/include/asm/core_t2.h:587:23: warning: no previous prototype for 't2_ioread64'
 2022-10-03 16:44 UTC 

[PATCH] alpha: Fix ioread64/iowrite64 helpers
 2022-10-03 16:07 UTC 

[PATCH V6 00/11] riscv: Add GENERIC_ENTRY support and related features
 2022-10-03 11:40 UTC  (15+ messages)
` [PATCH V6 01/11] riscv: elf_kexec: Fixup compile warning
` [PATCH V6 02/11] riscv: compat_syscall_table: "
` [PATCH V6 03/11] riscv: ptrace: Remove duplicate operation
` [PATCH V6 04/11] compiler_types.h: Add __noinstr_section() for noinstr
` [PATCH V6 05/11] riscv: traps: Add noinstr to prevent instrumentation inserted
` [PATCH V6 06/11] riscv: convert to generic entry
` [PATCH V6 07/11] riscv: Support HAVE_IRQ_EXIT_ON_IRQ_STACK
` [PATCH V6 08/11] riscv: Support HAVE_SOFTIRQ_ON_OWN_STACK
` [PATCH V6 09/11] riscv: Add support for STACKLEAK gcc plugin
` [PATCH V6 10/11] riscv: Add config of thread stack size
` [PATCH V6 11/11] riscv: remove extra level wrappers of trace_hardirqs_{on,off}

[PATCH v1] locking/memory-barriers.txt: Improve documentation for writel() usage
 2022-10-03  6:03 UTC  (5+ messages)

[PATCH 1/2] Input: i8042: Rename i8042-x86ia64io.h to i8042-acpipnpio.h
 2022-10-01 22:11 UTC  (6+ messages)
` [PATCH 2/2] Input: i8042: Add LoongArch support in i8042-acpipnpio.h

[PATCH v3] ARM: kprobes: move __kretprobe_trampoline to out of line assembler
 2022-09-30 21:15 UTC 

[PATCH V5 00/11] riscv: Add GENERIC_ENTRY support and related features
 2022-09-30 12:27 UTC  (10+ messages)
` [PATCH V5 06/11] entry: Prevent DEBUG_PREEMPT warning
` [PATCH V5 07/11] riscv: convert to generic entry


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).