messages from 2022-11-27 20:27:55 to 2022-12-03 22:50:16 UTC [more...]
[PATCH v4 00/39] Shadow stacks for userspace
2022-12-03 22:49 UTC (72+ messages)
` [PATCH v4 01/39] Documentation/x86: Add CET shadow stack description
` [PATCH v4 02/39] x86/shstk: Add Kconfig option for Shadow Stack
` [PATCH v4 03/39] x86/cpufeatures: Add CPU feature flags for shadow stacks
` [PATCH v4 04/39] x86/cpufeatures: Enable CET CR4 bit for shadow stack
` [PATCH v4 05/39] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
` [PATCH v4 06/39] x86/fpu: Add helper for modifying xstate
` [PATCH v4 07/39] x86: Add user control-protection fault handler
` [PATCH v4 08/39] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
` [PATCH v4 09/39] x86/mm: Move pmd_write(), pud_write() up in the file
` [PATCH v4 10/39] x86/mm: Introduce _PAGE_COW
` [PATCH v4 11/39] x86/mm: Update pte_modify for _PAGE_COW
` [PATCH v4 12/39] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
` [PATCH v4 13/39] x86/mm: Start actually marking _PAGE_COW
` [PATCH v4 14/39] mm: Move VM_UFFD_MINOR_BIT from 37 to 38
` [PATCH v4 15/39] mm: Introduce VM_SHADOW_STACK for shadow stack memory
` [PATCH v4 16/39] x86/mm: Check Shadow Stack page fault errors
` [PATCH v4 17/39] x86/mm: Update maybe_mkwrite() for shadow stack
` [PATCH v4 18/39] mm: Fixup places that call pte_mkwrite() directly
` [PATCH v4 19/39] mm: Add guard pages around a shadow stack
` [PATCH v4 20/39] mm/mmap: Add shadow stack pages to memory accounting
` [PATCH v4 21/39] mm/mprotect: Exclude shadow stack from preserve_write
` [PATCH v4 22/39] mm: Re-introduce vm_flags to do_mmap()
` [PATCH v4 23/39] mm: Don't allow write GUPs to shadow stack memory
` [PATCH v4 24/39] mm: Warn on shadow stack memory in wrong vma
` [PATCH v4 25/39] x86: Introduce userspace API for shadow stack
` [PATCH v4 26/39] x86/shstk: Add user-mode shadow stack support
` [PATCH v4 27/39] x86/shstk: Handle thread shadow stack
` [PATCH v4 28/39] x86/shstk: Introduce routines modifying shstk
` [PATCH v4 29/39] x86/shstk: Handle signals for shadow stack
` [PATCH v4 30/39] x86/shstk: Introduce map_shadow_stack syscall
` [PATCH v4 31/39] x86/shstk: Support wrss for userspace
` [PATCH v4 32/39] x86: Expose thread features in /proc/$PID/status
` [PATCH v4 33/39] x86: Prevent 32 bit operations for 64 bit shstk tasks
` [PATCH v4 34/39] x86/shstk: Wire in shadow stack interface
` [PATCH v4 35/39] selftests/x86: Add shadow stack test
` [PATCH v4 36/39] x86/fpu: Add helper for initing features
` [PATCH v4 37/39] x86: Add PTRACE interface for shadow stack
` [PATCH v4 38/39] x86/shstk: Add ARCH_SHSTK_UNLOCK
` [PATCH v4 39/39] x86/shstk: Add ARCH_SHSTK_STATUS
[PATCH RFC v2 0/3] riscv: support for hardware breakpoints/watchpoints
2022-12-03 21:55 UTC (4+ messages)
` [PATCH RFC v2 1/3] riscv: add "
` [PATCH RFC v2 2/3] riscv: ptrace: expose hardware breakpoints to debuggers
` [PATCH RFC v2 3/3] riscv: hw-breakpoints: add more trigger controls
[PATCH 0/6] Support TDX guests on Hyper-V
2022-12-02 21:47 UTC (33+ messages)
` [PATCH 1/6] x86/tdx: Support hypercalls for "
` [PATCH 2/6] x86/tdx: Retry TDVMCALL_MAP_GPA() when needed
` [PATCH 3/6] x86/tdx: Support vmalloc() for tdx_enc_status_changed()
` [PATCH 5/6] x86/hyperv: Support hypercalls for TDX guests
[PATCH V2] selftests/vDSO: Add riscv getcpu & gettimeofday test
2022-12-02 18:03 UTC (2+ messages)
[PATCH v2 0/5] Add support running nested Microsoft Hypervisor
2022-12-02 15:27 UTC (10+ messages)
` [PATCH v7 "
` [PATCH v7 1/5] x86/hyperv: Add support for detecting nested hypervisor
` [PATCH v7 2/5] Drivers: hv: Setup synic registers in case of nested root partition
` [PATCH v7 3/5] x86/hyperv: Add an interface to do nested hypercalls
` [PATCH v7 4/5] Drivers: hv: Enable vmbus driver for nested root partition
` [PATCH v7 5/5] x86/hyperv: Change interrupt vector "
[PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
2022-12-02 13:44 UTC (17+ messages)
` [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
[PATCH v10 0/9] KVM: mm: fd-based approach for supporting KVM
2022-12-02 6:13 UTC (10+ messages)
` [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
` [PATCH v10 2/9] KVM: Introduce per-page memory attributes
` [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
` [PATCH v10 4/9] KVM: Add KVM_EXIT_MEMORY_FAULT exit
` [PATCH v10 5/9] KVM: Use gfn instead of hva for mmu_notifier_retry
` [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
` [PATCH v10 7/9] KVM: Update lpage info when private/shared memory are mixed
` [PATCH v10 8/9] KVM: Handle page fault for private memory
` [PATCH v10 9/9] KVM: Enable and expose KVM_MEM_PRIVATE
[arnd-asm-generic:asm-generic] BUILD SUCCESS 32975c491ee410598b33201344c123fcc81a7c33
2022-12-02 4:52 UTC
[Patch v4 00/13] Add PCI pass-thru support to Hyper-V Confidential VMs
2022-12-02 3:30 UTC (14+ messages)
` [Patch v4 01/13] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
` [Patch v4 02/13] x86/hyperv: Reorder code in prep for subsequent patch
` [Patch v4 03/13] Drivers: hv: Explicitly request decrypted in vmap_pfn() calls
` [Patch v4 04/13] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
` [Patch v4 05/13] init: Call mem_encrypt_init() after Hyper-V hypercall init is done
` [Patch v4 06/13] x86/hyperv: Change vTOM handling to use standard coco mechanisms
` [Patch v4 07/13] swiotlb: Remove bounce buffer remapping for Hyper-V
` [Patch v4 08/13] Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages
` [Patch v4 09/13] Drivers: hv: vmbus: Remove second way of mapping ring buffers
` [Patch v4 10/13] hv_netvsc: Remove second mapping of send and recv buffers
` [Patch v4 11/13] Drivers: hv: Don't remap addresses that are above shared_gpa_boundary
` [Patch v4 12/13] PCI: hv: Add hypercalls to read/write MMIO space
` [Patch v4 13/13] PCI: hv: Enable PCI pass-thru devices in Confidential VMs
[PATCH resend] uapi: Add missing _UAPI prefix to <asm-generic/types.h> include guard
2022-12-01 15:22 UTC (2+ messages)
[Patch v3 00/14] Add PCI pass-thru support to Hyper-V Confidential VMs
2022-11-30 16:11 UTC (27+ messages)
` [Patch v3 05/14] x86/mm: Handle decryption/re-encryption of bss_decrypted consistently
` [Patch v3 07/14] x86/hyperv: Change vTOM handling to use standard coco mechanisms
[PATCH -next V9 00/14] riscv: Add GENERIC_ENTRY support and related features
2022-11-30 3:40 UTC (15+ messages)
` [PATCH -next V9 01/14] compiler_types.h: Add __noinstr_section() for noinstr
` [PATCH -next V9 02/14] riscv: elf_kexec: Fixup compile warning
` [PATCH -next V9 03/14] riscv: compat_syscall_table: "
` [PATCH -next V9 04/14] riscv: ptrace: Remove duplicate operation
` [PATCH -next V9 05/14] riscv: traps: Add noinstr to prevent instrumentation inserted
` [PATCH -next V9 06/14] riscv: convert to generic entry
` [PATCH -next V9 07/14] riscv: Support HAVE_IRQ_EXIT_ON_IRQ_STACK
` [PATCH -next V9 08/14] riscv: Support HAVE_SOFTIRQ_ON_OWN_STACK
` [PATCH -next V9 09/14] riscv: Add config of thread stack size
` [PATCH -next V9 10/14] riscv: Typo fixup for addi -> andi in comment
` [PATCH -next V9 11/14] riscv: Add support for STACKLEAK gcc plugin
` [PATCH -next V9 12/14] riscv: remove extra level wrappers of trace_hardirqs_{on,off}
` [PATCH -next V9 13/14] riscv: consolidate ret_from_kernel_thread into ret_from_fork
` [PATCH -next V9 14/14] riscv: entry: consolidate general regs saving/restoring
[PATCH] Documentation: Fixed a typo in atomic_t.txt
2022-11-29 18:45 UTC (2+ messages)
[PATCH 0/3] kprobes: notrace enhancements
2022-11-29 18:02 UTC (9+ messages)
` [PATCH 3/3] compiler: inline does not imply notrace
[RFC PATCH V2 00/18] x86/hyperv/sev: Add AMD sev-snp enlightened guest support on hyperv
2022-11-29 15:22 UTC (8+ messages)
` [RFC PATCH V2 01/18] x86/sev: Pvalidate memory gab for decompressing kernel
` [RFC PATCH V2 16/18] x86/sev: Initialize #HV doorbell and handle interrupt requests
[PATCH V2 1/3] MIPS: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK
2022-11-29 14:18 UTC (10+ messages)
` [PATCH V2 2/3] LoongArch: "
` [PATCH V2 3/3] SH: "
[PATCH 2/3] powerpc/book3e: remove #include <generated/utsrelease.h>
2022-11-29 9:34 UTC (4+ messages)
Napływ Klientów ze strony
2022-11-29 8:50 UTC
[PATCH V14 0/4] mm/sparse-vmemmap: Generalise helpers and enable for LoongArch
2022-11-29 3:26 UTC (6+ messages)
[PATCH v6 0/5] Add support running nested Microsoft Hypervisor
2022-11-28 19:45 UTC (3+ messages)
` [PATCH v6 2/5] Drivers: hv: Setup synic registers in case of nested root partition
[PATCH v4 1/1] x86/ioremap: Fix page aligned size calculation in __ioremap_caller()
2022-11-28 16:04 UTC (5+ messages)
[PATCH -next V8 00/14] riscv: Add GENERIC_ENTRY support and related features
2022-11-28 2:42 UTC (4+ messages)
` [PATCH -next V8 06/14] riscv: convert to generic entry
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).