public inbox for linux-arch@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2022-10-27 09:59:05 to 2022-11-06 23:14:23 UTC [more...]

mm: delay rmap removal until after TLB flush
 2022-11-06 23:14 UTC  (18+ messages)

[PATCH v3 00/37] Shadow stacks for userspace
 2022-11-06  9:33 UTC  (40+ messages)
` [PATCH v3 01/37] Documentation/x86: Add CET description
` [PATCH v3 02/37] x86/cet/shstk: Add Kconfig option for Shadow Stack
` [PATCH v3 03/37] x86/cpufeatures: Add CPU feature flags for shadow stacks
` [PATCH v3 04/37] x86/cpufeatures: Enable CET CR4 bit for shadow stack
` [PATCH v3 05/37] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
` [PATCH v3 06/37] x86/fpu: Add helper for modifying xstate
` [PATCH v3 07/37] x86/cet: Add user control-protection fault handler
` [PATCH v3 08/37] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
` [PATCH v3 09/37] x86/mm: Move pmd_write(), pud_write() up in the file
` [PATCH v3 10/37] x86/mm: Introduce _PAGE_COW
` [PATCH v3 11/37] x86/mm: Update pte_modify for _PAGE_COW
` [PATCH v3 12/37] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
` [PATCH v3 13/37] mm: Move VM_UFFD_MINOR_BIT from 37 to 38
` [PATCH v3 14/37] mm: Introduce VM_SHADOW_STACK for shadow stack memory
` [PATCH v3 15/37] x86/mm: Check Shadow Stack page fault errors
` [PATCH v3 16/37] x86/mm: Update maybe_mkwrite() for shadow stack
` [PATCH v3 17/37] mm: Fixup places that call pte_mkwrite() directly
` [PATCH v3 18/37] mm: Add guard pages around a shadow stack
` [PATCH v3 19/37] mm/mmap: Add shadow stack pages to memory accounting
` [PATCH v3 20/37] mm/mprotect: Exclude shadow stack from preserve_write
` [PATCH v3 21/37] mm: Re-introduce vm_flags to do_mmap()
` [PATCH v3 22/37] mm: Don't allow write GUPs to shadow stack memory
` [PATCH v3 23/37] mm: Warn on shadow stack memory in wrong vma
` [PATCH v3 24/37] x86: Introduce userspace API for CET enabling
` [PATCH v3 25/37] x86/shstk: Add user-mode shadow stack support
` [PATCH v3 26/37] x86/shstk: Handle thread shadow stack
` [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
` [PATCH v3 28/37] x86/shstk: Handle signals for shadow stack
` [PATCH v3 29/37] x86/shstk: Introduce map_shadow_stack syscall
` [PATCH v3 30/37] x86/shstk: Support wrss for userspace
` [PATCH v3 31/37] x86: Expose thread features in /proc/$PID/status
` [PATCH v3 32/37] x86/cet/shstk: Wire in CET interface
` [PATCH v3 33/37] selftests/x86: Add shadow stack test
` [PATCH v3 34/37] x86/fpu: Add helper for initing features
` [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
` [PATCH v3 36/37] x86/cet/shstk: Add ARCH_CET_UNLOCK
` [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit

[RFC PATCH v1] riscv: support for hardware breakpoints/watchpoints
 2022-11-05  9:10 UTC  (4+ messages)

[PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
 2022-11-04 22:29 UTC  (42+ messages)
` [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
` [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
` [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
` [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
` [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
` [PATCH v9 6/8] KVM: Update lpage info when private/shared memory are mixed
` [PATCH v9 7/8] KVM: Handle page fault for private memory
` [PATCH v9 8/8] KVM: Enable and expose KVM_MEM_PRIVATE

[PATCH v3 0/5] Add support running nested Microsoft Hypervisor
 2022-11-04 10:49 UTC  (11+ messages)
  ` [PATCH v3 1/5] x86/hyperv: Add support for detecting nested hypervisor
  ` [PATCH v3 2/5] Drivers: hv: Setup synic registers in case of nested root partition
  ` [PATCH v3 3/5] x86/hyperv: Add an interface to do nested hypercalls
  ` [PATCH v3 4/5] Drivers: hv: Enable vmbus driver for nested root partition
  ` [PATCH v3 5/5] x86/hyperv: Change interrupt vector "

[PATCH] mm: swap the definition of CONFIG_SPARSEMEM_VMEMMAP and CONFIG_SPARSEMEM
 2022-11-04  7:58 UTC  (2+ messages)

[PATCH v2 00/39] Shadowstacks for userspace
 2022-11-03 17:39 UTC  (12+ messages)
` [PATCH v2 33/39] x86/cpufeatures: Limit shadow stack to Intel CPUs

[PATCH v2 0/2] Fix MSR access errors during kexec in root partition
 2022-11-03 15:30 UTC  (10+ messages)
` [PATCH v2 1/2] clocksource/drivers/hyperv: add data structure for reference TSC MSR
` [PATCH v2 2/2] x86/hyperv: fix invalid writes to MSRs during root partition kexec

[PATCH 00/12] Add PCI pass-thru support to Hyper-V Confidential VMs
 2022-11-03 15:25 UTC  (18+ messages)
` [PATCH 02/12] x86/ioapic: Gate decrypted mapping on cc_platform_has() attribute
` [PATCH 03/12] x86/hyperv: Reorder code in prep for subsequent patch
` [PATCH 04/12] Drivers: hv: Explicitly request decrypted in vmap_pfn() calls
` [PATCH 05/12] x86/hyperv: Change vTOM handling to use standard coco mechanisms
` [PATCH 07/12] Drivers: hv: vmbus: Remove second mapping of VMBus monitor pages
` [PATCH 08/12] Drivers: hv: vmbus: Remove second way of mapping ring buffers
` [PATCH 09/12] hv_netvsc: Remove second mapping of send and recv buffers
` [PATCH 10/12] Drivers: hv: Don't remap addresses that are above shared_gpa_boundary

[PATCH v2 0/5] Add support running nested Microsoft Hypervisor
 2022-11-03 14:16 UTC  (12+ messages)
  ` [PATCH v2 1/5] mshv: Add support for detecting nested hypervisor
  ` [PATCH v2 2/5] hv: Setup synic registers in case of nested root partition
  ` [PATCH v2 3/5] hv: Add an interface to do nested hypercalls
  ` [PATCH v2 4/5] hv: Enable vmbus driver for nested root partition
  ` [PATCH v2 5/5] hv, mshv : Change interrupt vector "

[PATCH V2] selftests/vDSO: Add riscv getcpu & gettimeofday test
 2022-11-03  8:04 UTC 

[PATCH -next V8 00/14] riscv: Add GENERIC_ENTRY support and related features
 2022-11-03  7:50 UTC  (15+ messages)
` [PATCH -next V8 01/14] compiler_types.h: Add __noinstr_section() for noinstr
` [PATCH -next V8 02/14] riscv: elf_kexec: Fixup compile warning
` [PATCH -next V8 03/14] riscv: compat_syscall_table: "
` [PATCH -next V8 04/14] riscv: ptrace: Remove duplicate operation
` [PATCH -next V8 05/14] riscv: traps: Add noinstr to prevent instrumentation inserted
` [PATCH -next V8 06/14] riscv: convert to generic entry
` [PATCH -next V8 07/14] riscv: Support HAVE_IRQ_EXIT_ON_IRQ_STACK
` [PATCH -next V8 08/14] riscv: Support HAVE_SOFTIRQ_ON_OWN_STACK
` [PATCH -next V8 09/14] riscv: Add config of thread stack size
` [PATCH -next V8 10/14] riscv: Typo fixup for addi -> andi in comment
` [PATCH -next V8 11/14] riscv: Add support for STACKLEAK gcc plugin
` [PATCH -next V8 12/14] riscv: remove extra level wrappers of trace_hardirqs_{on,off}
` [PATCH -next V8 13/14] riscv: consolidate ret_from_kernel_thread into ret_from_fork
` [PATCH -next V8 14/14] riscv: entry: consolidate general regs saving/restoring

[PATCH V14 0/4] mm/sparse-vmemmap: Generalise helpers and enable for LoongArch
 2022-11-03  2:49 UTC  (6+ messages)
` [PATCH V14 1/4] MIPS&LoongArch&NIOS2: Adjust prototypes of p?d_init()
` [PATCH V14 2/4] LoongArch: Add sparse memory vmemmap support
` [PATCH V14 3/4] mm/sparse-vmemmap: Generalise vmemmap_populate_hugepages()
` [PATCH V14 4/4] LoongArch: Enable ARCH_WANT_HUGETLB_PAGE_OPTIMIZE_VMEMMAP

[PATCH 0/3] bitmap: optimize small_const path for
 2022-11-03  2:09 UTC  (2+ messages)

[PATCH v5] locking/memory-barriers.txt: Improve documentation for writel() example
 2022-11-02 20:30 UTC  (5+ messages)

[linux-next:master] BUILD REGRESSION 61c3426aca2c71052ddcd06c32e29d92304990fd
 2022-11-02 17:16 UTC 

[PATCH 0/6] Add support running nested Microsoft Hypervisor
 2022-11-02 15:46 UTC  (9+ messages)
` [PATCH 1/6] mshv: Add support for detecting nested hypervisor
` [PATCH 2/6] hv: Setup synic registers in case of nested root partition
` [PATCH 3/6] hv: Set the correct EOM register in case of nested hypervisor
` [PATCH 4/6] hv: Add an interface to do nested hypercalls
` [PATCH 5/6] hv: Enable vmbus driver for nested root partition
` [PATCH 6/6] hv, mshv : Change interrupt vector "

[PATCH] selftests/vDSO: Add riscv getcpu & gettimeofday test
 2022-11-02  9:01 UTC  (2+ messages)

[linux-next:master] BUILD REGRESSION e9d267f752f8ff62f0111cea90e3ced4fc595b4f
 2022-11-01 18:43 UTC 

[linux-next:master] BUILD REGRESSION 6fbda10ec6f8d70d0f4446f861f7db726c2f2e7c
 2022-11-01  1:42 UTC 

[GIT PULL] LoongArch fixes for v6.1-rc3
 2022-10-30 18:34 UTC  (2+ messages)

[RFC][PATCHSET] coredump unification for regset and non-regset architectures
 2022-10-29 23:18 UTC  (11+ messages)
` [PATCH 01/10] kill signal_pt_regs()
  ` [PATCH 02/10] kill coredump_params->regs
  ` [PATCH 03/10] kill extern of vsyscall32_sysctl
  ` [PATCH 04/10] [elf][regset] clean fill_note_info() a bit
  ` [PATCH 05/10] [elf][regset] simplify thread list handling in fill_note_info()
  ` [PATCH 06/10] elf_core_copy_task_regs(): task_pt_regs is defined everywhere
  ` [PATCH 07/10] [elf][non-regset] uninline elf_core_copy_task_fpregs() (and lose pt_regs argument)
  ` [PATCH 08/10] [elf][non-regset] use elf_core_copy_task_regs() for dumper as well
  ` [PATCH 09/10] [elf] unify regset and non-regset cases
  ` [PATCH 10/10] [elf] get rid of get_note_info_size()

[linux-next:master] BUILD REGRESSION fd8dab197cca2746e1fcd399a218eec5164726d4
 2022-10-28 16:56 UTC 

[PATCH V2] uapi: Fixup strace compile error
 2022-10-28  0:41 UTC  (3+ messages)

[PATCH] kbuild: treat char as always signed
 2022-10-27 18:28 UTC  (6+ messages)
  ` make ctype ascii only? (was [PATCH] kbuild: treat char as always signed)

[PATCH v4] locking/memory-barriers.txt: Improve documentation for writel() example
 2022-10-27 18:24 UTC  (7+ messages)

[linux-next:master] BUILD SUCCESS WITH WARNING ecc4eeb2208ab537a3f3744984cd7f30ac971db8
 2022-10-27 16:34 UTC 

[PATCH V13 0/4] mm/sparse-vmemmap: Generalise helpers and enable for LoongArch
 2022-10-27 12:49 UTC  (6+ messages)
` [PATCH V13 4/4] LoongArch: Enable ARCH_WANT_HUGETLB_PAGE_OPTIMIZE_VMEMMAP

[PATCH 0/2] Fix MSR access errors during kexec in root partition
 2022-10-27 10:03 UTC  (6+ messages)
` [PATCH 1/2] x86/hyperv: fix invalid writes to MSRs during root partition kexec


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox