linux-api.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2018-11-12 14:26:54 to 2018-11-19 21:48:02 UTC [more...]

[RFC PATCH v6 00/26] Control-flow Enforcement: Shadow Stack
 2018-11-19 21:48 UTC  (20+ messages)
` [RFC PATCH v6 01/26] Documentation/x86: Add CET description
` [RFC PATCH v6 02/26] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
` [RFC PATCH v6 03/26] x86/fpu/xstate: Change names to separate XSAVES system and user states
` [RFC PATCH v6 04/26] x86/fpu/xstate: Introduce XSAVES system states
` [RFC PATCH v6 05/26] x86/fpu/xstate: Add XSAVES system states for shadow stack
` [RFC PATCH v6 06/26] x86/cet: Add control protection exception handler
` [RFC PATCH v6 07/26] x86/cet/shstk: Add Kconfig option for user-mode shadow stack
` [RFC PATCH v6 08/26] mm: Introduce VM_SHSTK for shadow stack memory
` [RFC PATCH v6 09/26] mm/mmap: Prevent Shadow Stack VMA merges
` [RFC PATCH v6 10/26] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
` [RFC PATCH v6 11/26] x86/mm: Introduce _PAGE_DIRTY_SW
` [RFC PATCH v6 12/26] drm/i915/gvt: Update _PAGE_DIRTY to _PAGE_DIRTY_BITS
` [RFC PATCH v6 13/26] x86/mm: Modify ptep_set_wrprotect and pmdp_set_wrprotect for _PAGE_DIRTY_SW
` [RFC PATCH v6 14/26] x86/mm: Shadow stack page fault error checking
` [RFC PATCH v6 15/26] mm: Handle shadow stack page fault
` [RFC PATCH v6 16/26] mm: Handle THP/HugeTLB "
` [RFC PATCH v6 17/26] mm: Update can_follow_write_pte/pmd for shadow stack
` [RFC PATCH v6 18/26] mm: Introduce do_mmap_locked()
` [RFC PATCH v6 19/26] x86/cet/shstk: User-mode shadow stack support

[PATCH v1 0/2] proc: allow signaling processes via file descriptors
 2018-11-19 21:41 UTC  (29+ messages)
` [PATCH v1 1/2] proc: get process file descriptor from /proc/<pid>
` [PATCH v1 2/2] signal: add procfd_signal() syscall
` [PATCH] procfd_signal.2: document procfd_signal syscall

[PATCH v9 00/24] ILP32 for ARM64
 2018-11-19 21:29 UTC  (2+ messages)

[PATCH] proc: allow killing processes via file descriptors
 2018-11-19 20:21 UTC  (53+ messages)
                        ` [PATCH] proc: allow killing processes via file descriptors (Larger pids)

RFC: userspace exception fixups
 2018-11-19 17:00 UTC  (10+ messages)

[PATCH 0/3] Fix unsafe BPF_PROG_TEST_RUN interface
 2018-11-19 14:30 UTC  (9+ messages)
` [PATCH 1/3] bpf: respect size hint to BPF_PROG_TEST_RUN if present
` [PATCH 2/3] libbpf: require size hint in bpf_prog_test_run
` [PATCH 3/3] selftests: add a test for bpf_prog_test_run output size

extending wait4(2) or waitid(2) linux syscall
 2018-11-17  1:50 UTC  (13+ messages)

Official Linux system wrapper library?
 2018-11-16 21:24 UTC  (61+ messages)

[PATCH 0/3] bpf: allow zero-initialising hash map seed
 2018-11-16 17:34 UTC  (8+ messages)
` [PATCH v3 0/4] "
  ` [PATCH v3 1/4] bpf: allow zero-initializing "
  ` [PATCH v3 2/4] bpf: move BPF_F_QUERY_EFFECTIVE after map flags
  ` [PATCH v3 3/4] tools: sync linux/bpf.h
  ` [PATCH v3 4/4] tools: add selftest for BPF_F_ZERO_SEED

[RFC PATCH] mm, proc: report PR_SET_THP_DISABLE in proc
 2018-11-15  9:22 UTC  (14+ messages)

[PATCH v5 00/27] Control Flow Enforcement: Shadow Stack
 2018-11-14 20:28 UTC  (8+ messages)
` [PATCH v5 05/27] Documentation/x86: Add CET description
` [PATCH v5 06/27] x86/cet: Control protection exception handler

[PATCH v2] UAPI: move RENAME_* definitions to separated file
 2018-11-14  7:26 UTC  (2+ messages)

[PATCH RESEND] UAPI: move RENAME_* definitions to separated file
 2018-11-13 11:09 UTC  (2+ messages)

[PATCH v4 0/4] namei: O_* flags to restrict path resolution
 2018-11-12 14:26 UTC  (2+ messages)
` [PATCH v4 4/4] namei: aggressively check for nd->root escape on ".." resolution


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).