messages from 2018-06-04 15:56:15 to 2018-06-07 16:37:19 UTC [more...]
[PATCH 00/10] Control Flow Enforcement - Part (3)
2018-06-07 16:37 UTC (24+ messages)
` [PATCH 01/10] x86/cet: User-mode shadow stack support
` [PATCH 02/10] x86/cet: Introduce WRUSS instruction
` [PATCH 03/10] x86/cet: Signal handling for shadow stack
` [PATCH 04/10] x86/cet: Handle thread "
` [PATCH 05/10] x86/cet: ELF header parsing of Control Flow Enforcement
` [PATCH 06/10] x86/cet: Add arch_prctl functions for shadow stack
` [PATCH 07/10] mm: Prevent mprotect from changing "
` [PATCH 08/10] mm: Prevent mremap of "
` [PATCH 09/10] mm: Prevent madvise from changing "
` [PATCH 10/10] mm: Prevent munmap and remap_file_pages of "
[PATCH 0/9] Control Flow Enforcement - Part (2)
2018-06-07 16:28 UTC (34+ messages)
` [PATCH 1/9] x86/cet: Control protection exception handler
` [PATCH 2/9] x86/cet: Add Kconfig option for user-mode shadow stack
` [PATCH 3/9] mm: Introduce VM_SHSTK for shadow stack memory
` [PATCH 4/9] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
` [PATCH 5/9] x86/mm: Introduce _PAGE_DIRTY_SW
` [PATCH 6/9] x86/mm: Introduce ptep_set_wrprotect_flush and related functions
` [PATCH 7/9] x86/mm: Shadow stack page fault error checking
` [PATCH 8/9] x86/cet: Handle shadow stack page fault
` [PATCH 9/9] x86/cet: Handle THP/HugeTLB shadow stack page copying
[PATCH 0/5] Control Flow Enforcement - Part (1)
2018-06-07 15:49 UTC (20+ messages)
` [PATCH 1/5] x86/cpufeatures: Add CPUIDs for Control-flow Enforcement Technology (CET)
` [PATCH 2/5] x86/fpu/xstate: Change some names to separate XSAVES system and user states
` [PATCH 3/5] x86/fpu/xstate: Enable XSAVES system states
` [PATCH 4/5] x86/fpu/xstate: Add XSAVES system states for shadow stack
` [PATCH 5/5] Documentation/x86: Add CET description
LKMM litmus test for Roman Penyaev's rcu-rr
2018-06-07 15:40 UTC (22+ messages)
[PATCH 3.16 258/410] nospec: Allow index argument to have const-qualified type
2018-06-07 14:05 UTC (2+ messages)
[PATCH 0/7] Control Flow Enforcement - Part (4)
2018-06-07 14:38 UTC (16+ messages)
` [PATCH 1/7] x86/cet: Add Kconfig option for user-mode Indirect Branch Tracking
` [PATCH 2/7] x86/cet: User-mode indirect branch tracking support
` [PATCH 3/7] mm/mmap: Add IBT bitmap size to address space limit check
` [PATCH 4/7] x86/cet: add arcp_prctl functions for indirect branch tracking
` [PATCH 5/7] x86: Insert endbr32/endbr64 to vDSO
` [PATCH 6/7] tools: Add cetcmd
` [PATCH 7/7] x86/cet: Add PTRACE interface for CET
[RFC PATCH -tip v5 00/27] kprobes: Cleanup jprobe implementation
2018-06-07 14:28 UTC (43+ messages)
` [RFC PATCH -tip v5 06/27] arm64: kprobes: Remove "
` [RFC PATCH -tip v5 07/27] powerpc/kprobes: Remove jprobe powerpc implementation
` [RFC PATCH -tip v5 16/27] ARM: kprobes: Don't call the ->break_handler() in arm kprobes code
` [RFC PATCH -tip v5 17/27] arm64: "
` [RFC PATCH -tip v5 18/27] powerpc/kprobes: "
` [RFC PATCH -tip v5 19/27] ia64: kprobes: Don't call the ->break_handler() in ia64 "
` [RFC PATCH -tip v5 20/27] MIPS: kprobes: Don't call the ->break_handler() in MIPS "
` [RFC PATCH -tip v5 21/27] s390/kprobes: Don't call the ->break_handler() in s390 "
` [RFC PATCH -tip v5 22/27] sh: kprobes: Don't call the ->break_handler() in SH "
` [RFC PATCH -tip v5 23/27] sparc64: kprobes: Don't call the ->break_handler() in sparc64 "
` [RFC PATCH -tip v5 24/27] bpf: error-inject: kprobes: Clear current_kprobe and enable preempt in kprobe
` [RFC PATCH -tip v5 25/27] kprobes/x86: Do not disable preempt on int3 path
` [RFC PATCH -tip v5 26/27] Documentation: kprobes: Add how to change the execution path
` [RFC PATCH -tip v5 27/27] kprobes: Remove jprobe stub API
[RESEND PATCH v5 0/4] kernel hacking: GCC optimization for better debug experience (-Og)
2018-06-07 10:27 UTC (42+ messages)
` [PATCH v5 1/4] x86/mm: surround level4_kernel_pgt with #ifdef CONFIG_X86_5LEVEL...#endif
` [PATCH v5 2/4] kernel hacking: new config NO_AUTO_INLINE to disable compiler auto-inline optimizations
` [PATCH v5 3/4] ARM: mm: fix build error in fix_to_virt with CONFIG_CC_OPTIMIZE_FOR_DEBUGGING
` [PATCH v5 4/4] kernel hacking: new config CC_OPTIMIZE_FOR_DEBUGGING to apply GCC -Og optimization
LKMM litmus test for Roman Penyaev's rcu-rr
2018-06-04 16:01 UTC (4+ messages)
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).