linux-arch.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-06-06 17:42:24 to 2019-06-07 22:27:20 UTC [more...]

[PATCH v7 00/14] Control-flow Enforcement: Branch Tracking, PTRACE
 2019-06-07 22:27 UTC  (82+ messages)
` [PATCH v7 01/14] x86/cet/ibt: Add Kconfig option for user-mode Indirect Branch Tracking
` [PATCH v7 02/14] x86/cet/ibt: User-mode indirect branch tracking support
` [PATCH v7 03/14] x86/cet/ibt: Add IBT legacy code bitmap setup function
` [PATCH v7 04/14] x86/cet/ibt: Handle signals for IBT
` [PATCH v7 05/14] mm/mmap: Add IBT bitmap size to address space limit check
` [PATCH v7 06/14] x86/cet/ibt: ELF header parsing for IBT
` [PATCH v7 07/14] x86/cet/ibt: Add arch_prctl functions "
` [PATCH v7 08/14] x86/cet/ibt: Add ENDBR to op-code-map
` [PATCH v7 09/14] x86/vdso: Insert endbr32/endbr64 to vDSO
` [PATCH v7 10/14] x86/vdso/32: Add ENDBR32 to __kernel_vsyscall entry point
` [PATCH v7 11/14] x86/vsyscall/64: Add ENDBR64 to vsyscall entry points
` [PATCH v7 12/14] x86/vsyscall/64: Fixup shadow stack and branch tracking for vsyscall
` [PATCH v7 13/14] x86/cet: Add PTRACE interface for CET
` [PATCH v7 14/14] x86: Discard .note.gnu.property sections

[RFC PATCH 0/5]: Removing saved_sigmask
 2019-06-07 22:07 UTC  (14+ messages)
        ` [RFC PATCH 1/5] signal: Teach sigsuspend to use set_user_sigmask
        ` [RFC PATCH 2/5] signal/kvm: Stop using sigprocmask in kvm_sigset_(activate|deactivate)
        ` [RFC PATCH 3/5] signal: Always keep real_blocked in sync with blocked
        ` [RFC PATCH 4/5] signal: Remove saved_sigmask
        ` [RFC PATCH 5/5] signal: Remove the unnecessary restore_sigmask flag

[PATCH] uapi: avoid namespace conflict in linux/posix_types.h
 2019-06-07 18:56 UTC  (10+ messages)

[PATCH v3 20/20] docs: pci: fix broken links due to conversion from pci.txt to pci.rst
 2019-06-07 18:54 UTC  (2+ messages)

[PATCH v7 00/27] Control-flow Enforcement: Shadow Stack
 2019-06-07 18:01 UTC  (86+ messages)
` [PATCH v7 01/27] Documentation/x86: Add CET description
` [PATCH v7 02/27] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
` [PATCH v7 03/27] x86/fpu/xstate: Change names to separate XSAVES system and user states
` [PATCH v7 04/27] x86/fpu/xstate: Introduce XSAVES system states
` [PATCH v7 05/27] x86/fpu/xstate: Add XSAVES system states for shadow stack
` [PATCH v7 06/27] x86/cet: Add control protection exception handler
` [PATCH v7 07/27] x86/cet/shstk: Add Kconfig option for user-mode shadow stack
` [PATCH v7 08/27] mm: Introduce VM_SHSTK for shadow stack memory
` [PATCH v7 09/27] mm/mmap: Prevent Shadow Stack VMA merges
` [PATCH v7 10/27] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
` [PATCH v7 11/27] x86/mm: Introduce _PAGE_DIRTY_SW
` [PATCH v7 12/27] drm/i915/gvt: Update _PAGE_DIRTY to _PAGE_DIRTY_BITS
` [PATCH v7 13/27] x86/mm: Modify ptep_set_wrprotect and pmdp_set_wrprotect for _PAGE_DIRTY_SW
` [PATCH v7 14/27] x86/mm: Shadow stack page fault error checking
` [PATCH v7 15/27] mm: Handle shadow stack page fault
` [PATCH v7 16/27] mm: Handle THP/HugeTLB "
` [PATCH v7 17/27] mm: Update can_follow_write_pte/pmd for shadow stack
` [PATCH v7 18/27] mm: Introduce do_mmap_locked()
` [PATCH v7 19/27] x86/cet/shstk: User-mode shadow stack support
` [PATCH v7 20/27] x86/cet/shstk: Introduce WRUSS instruction
` [PATCH v7 21/27] x86/cet/shstk: Handle signals for shadow stack
` [PATCH v7 22/27] binfmt_elf: Extract .note.gnu.property from an ELF file
` [PATCH v7 23/27] x86/cet/shstk: ELF header parsing of Shadow Stack
` [PATCH v7 24/27] x86/cet/shstk: Handle thread shadow stack
` [PATCH v7 25/27] mm/mmap: Add Shadow stack pages to memory accounting
` [PATCH v7 26/27] x86/cet/shstk: Add arch_prctl functions for Shadow Stack
` [PATCH v7 27/27] x86/cet/shstk: Add Shadow Stack instructions to opcode map

[PATCH v3 0/3] Bitops instrumentation for KASAN
 2019-06-07  9:43 UTC  (4+ messages)
` [PATCH v3 2/3] x86: Use static_cpu_has in uaccess region to avoid instrumentation

Thanks and I wait for your answer
 2019-06-07  6:31 UTC 

single copy atomicity for double load/stores on 32-bit systems
 2019-06-06 21:17 UTC  (9+ messages)

[PATCH 0/8] arm64: ARMv8.5-A: Branch Target Identification support
 2019-06-06 17:56 UTC  (10+ messages)
` [PATCH 4/8] arm64: Basic "


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).