linux-arch.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2024-09-25 15:02:36 to 2024-10-02 01:10:34 UTC [more...]

[RFC PATCH 0/3] Enable measuring the kernel's Source-based Code Coverage and MC/DC with Clang
 2024-10-02  1:10 UTC  (6+ messages)
` [PATCH v2 0/4] "
  ` [PATCH v2 1/4] llvm-cov: add Clang's Source-based Code Coverage support
  ` [PATCH v2 2/4] llvm-cov: add Clang's MC/DC support

[RFC][PATCHES] asm/unaligned.h removal
 2024-10-02  0:57 UTC  (6+ messages)
` [PATCH 1/3] parisc: get rid of private asm/unaligned.h
` [PATCH 2/3] arc: "
` [PATCH 3/3] move asm/unaligned.h to linux/unaligned.h

[PATCH v13 00/40] arm64/gcs: Provide support for GCS in userspace
 2024-10-02  0:24 UTC  (43+ messages)
` [PATCH v13 01/40] mm: Introduce ARCH_HAS_USER_SHADOW_STACK
` [PATCH v13 02/40] mm: Define VM_HIGH_ARCH_6
` [PATCH v13 03/40] arm64/mm: Restructure arch_validate_flags() for extensibility
` [PATCH v13 04/40] prctl: arch-agnostic prctl for shadow stack
` [PATCH v13 05/40] mman: Add map_shadow_stack() flags
` [PATCH v13 06/40] arm64: Document boot requirements for Guarded Control Stacks
` [PATCH v13 07/40] arm64/gcs: Document the ABI "
` [PATCH v13 08/40] arm64/sysreg: Add definitions for architected GCS caps
` [PATCH v13 09/40] arm64/gcs: Add manual encodings of GCS instructions
` [PATCH v13 10/40] arm64/gcs: Provide put_user_gcs()
` [PATCH v13 11/40] arm64/gcs: Provide basic EL2 setup to allow GCS usage at EL0 and EL1
` [PATCH v13 12/40] arm64/cpufeature: Runtime detection of Guarded Control Stack (GCS)
` [PATCH v13 13/40] arm64/mm: Allocate PIE slots for EL0 guarded control stack
` [PATCH v13 14/40] mm: Define VM_SHADOW_STACK for arm64 when we support GCS
` [PATCH v13 15/40] arm64/mm: Map pages for guarded control stack
` [PATCH v13 16/40] KVM: arm64: Manage GCS access and registers for guests
` [PATCH v13 17/40] arm64/idreg: Add overrride for GCS
` [PATCH v13 18/40] arm64/hwcap: Add hwcap "
` [PATCH v13 19/40] arm64/traps: Handle GCS exceptions
` [PATCH v13 20/40] arm64/mm: Handle GCS data aborts
` [PATCH v13 21/40] arm64/gcs: Context switch GCS state for EL0
` [PATCH v13 22/40] arm64/gcs: Ensure that new threads have a GCS
` [PATCH v13 23/40] arm64/gcs: Implement shadow stack prctl() interface
` [PATCH v13 24/40] arm64/mm: Implement map_shadow_stack()
` [PATCH v13 25/40] arm64/signal: Set up and restore the GCS context for signal handlers
` [PATCH v13 26/40] arm64/signal: Expose GCS state in signal frames
` [PATCH v13 27/40] arm64/ptrace: Expose GCS via ptrace and core files
` [PATCH v13 28/40] arm64: Add Kconfig for Guarded Control Stack (GCS)
` [PATCH v13 29/40] kselftest/arm64: Verify the GCS hwcap
` [PATCH v13 30/40] kselftest/arm64: Add GCS as a detected feature in the signal tests
` [PATCH v13 31/40] kselftest/arm64: Add framework support for GCS to signal handling tests
` [PATCH v13 32/40] kselftest/arm64: Allow signals tests to specify an expected si_code
` [PATCH v13 33/40] kselftest/arm64: Always run signals tests with GCS enabled
` [PATCH v13 34/40] kselftest/arm64: Add very basic GCS test program
` [PATCH v13 35/40] kselftest/arm64: Add a GCS test program built with the system libc
` [PATCH v13 36/40] kselftest/arm64: Add test coverage for GCS mode locking
` [PATCH v13 37/40] kselftest/arm64: Add GCS signal tests
` [PATCH v13 38/40] kselftest/arm64: Add a GCS stress test
` [PATCH v13 39/40] kselftest/arm64: Enable GCS for the FP stress tests
` [PATCH v13 40/40] KVM: selftests: arm64: Add GCS registers to get-reg-list

[PATCH v9 0/5] Tracepoints and static branch in Rust
 2024-10-01 22:28 UTC  (14+ messages)
` [PATCH v9 1/5] rust: add generic static_key_false
` [PATCH v9 2/5] rust: add tracepoint support
` [PATCH v9 3/5] rust: samples: add tracepoint to Rust sample
` [PATCH v9 4/5] jump_label: adjust inline asm to be consistent
` [PATCH v9 5/5] rust: add arch_static_branch

[PATCH 00/33] riscv control-flow integrity for usermode
 2024-10-01 21:46 UTC  (36+ messages)
` [PATCH 01/33] mm: Introduce ARCH_HAS_USER_SHADOW_STACK
` [PATCH 02/33] mm: helper `is_shadow_stack_vma` to check shadow stack vma
` [PATCH 03/33] riscv: Enable cbo.zero only when all harts support Zicboz
` [PATCH 04/33] riscv: Add support for per-thread envcfg CSR values
` [PATCH 05/33] riscv: Call riscv_user_isa_enable() only on the boot hart
` [PATCH 06/33] riscv/Kconfig: enable HAVE_EXIT_THREAD for riscv
` [PATCH 07/33] riscv: zicfilp / zicfiss in dt-bindings (extensions.yaml)
` [PATCH 08/33] riscv: zicfiss / zicfilp enumeration
` [PATCH 09/33] riscv: zicfiss / zicfilp extension csr and bit definitions
` [PATCH 10/33] riscv: usercfi state for task and save/restore of CSR_SSP on trap entry/exit
` [PATCH 11/33] riscv/mm : ensure PROT_WRITE leads to VM_READ | VM_WRITE
` [PATCH 12/33] riscv mm: manufacture shadow stack pte
` [PATCH 13/33] riscv mmu: teach pte_mkwrite to manufacture shadow stack PTEs
` [PATCH 14/33] riscv mmu: write protect and shadow stack
` [PATCH 15/33] riscv/mm: Implement map_shadow_stack() syscall
` [PATCH 16/33] riscv/shstk: If needed allocate a new shadow stack on clone
` [PATCH 17/33] prctl: arch-agnostic prctl for shadow stack
` [PATCH 18/33] prctl: arch-agnostic prctl for indirect branch tracking
` [PATCH 19/33] riscv: Implements arch agnostic shadow stack prctls
` [PATCH 20/33] riscv: Implements arch agnostic indirect branch tracking prctls
` [PATCH 21/33] riscv/traps: Introduce software check exception
` [PATCH 22/33] riscv: signal: abstract header saving for setup_sigcontext
` [PATCH 23/33] riscv signal: save and restore of shadow stack for signal
` [PATCH 24/33] riscv/kernel: update __show_regs to print shadow stack register
` [PATCH 25/33] riscv/ptrace: riscv cfi status and state via ptrace and in core files
` [PATCH 26/33] riscv/hwprobe: zicfilp / zicfiss enumeration in hwprobe
` [PATCH 27/33] riscv: Add Firmware Feature SBI extensions definitions
` [PATCH 28/33] riscv: enable kernel access to shadow stack memory via FWFT sbi call
` [PATCH 29/33] riscv: kernel command line option to opt out of user cfi
` [PATCH 30/33] riscv: create a config for shadow stack and landing pad instr support
` [PATCH 31/33] riscv: Documentation for landing pad / indirect branch tracking
` [PATCH 32/33] riscv: Documentation for shadow stack on riscv
` [PATCH 33/33] kselftest/riscv: kselftest for user mode cfi

[RFC PATCH 00/28] x86: Rely on toolchain for relocatable code
 2024-10-01 21:13 UTC  (46+ messages)
` [RFC PATCH 01/28] x86/pvh: Call C code via the kernel virtual mapping
` [RFC PATCH 02/28] Documentation: Bump minimum GCC version to 8.1
` [RFC PATCH 04/28] x86/boot: Permit GOTPCREL relocations for x86_64 builds
` [RFC PATCH 05/28] x86: Define the stack protector guard symbol explicitly
` [RFC PATCH 06/28] x86/percpu: Get rid of absolute per-CPU variable placement
` [RFC PATCH 11/28] x86/pvh: Avoid absolute symbol references in .head.text
` [RFC PATCH 14/28] x86/rethook: Use RIP-relative reference for return address
` [RFC PATCH 18/28] x86/boot/64: Determine VA/PA offset before entering C code
` [RFC PATCH 19/28] x86/boot/64: Avoid intentional absolute symbol references in .head.text
` [RFC PATCH 20/28] x64/acpi: Use PIC-compatible references in wakeup_64.S
` [RFC PATCH 21/28] x86/head: Use PIC-compatible symbol references in startup code
` [RFC PATCH 22/28] asm-generic: Treat PIC .data.rel.ro sections as .rodata
` [RFC PATCH 23/28] tools/objtool: Mark generated sections as writable
` [RFC PATCH 24/28] tools/objtool: Treat indirect ftrace calls as direct calls
` [RFC PATCH 25/28] x86: Use PIE codegen for the core kernel
` [RFC PATCH 26/28] x86/boot: Implement support for ELF RELA/RELR relocations
` [RFC PATCH 27/28] x86/kernel: Switch to PIE linking for the core kernel
` [RFC PATCH 28/28] x86/tools: Drop x86_64 support from 'relocs' tool

[PATCH v8 0/5] Tracepoints and static branch in Rust
 2024-10-01 13:32 UTC  (3+ messages)

[PATCH v7 00/10] Consolidate IO memcpy functions
 2024-10-01 12:53 UTC  (16+ messages)
` [PATCH v7 01/10] Consolidate IO memcpy/memset into iomap_copy.c
` [PATCH v7 02/10] arm64: Use generic IO memcpy/memset
` [PATCH v7 03/10] csky: "
` [PATCH v7 04/10] loongarch: "
` [PATCH v7 05/10] m68k: Align prototypes of "
` [PATCH v7 06/10] alpha: "
` [PATCH v7 07/10] parisc: "
` [PATCH v7 08/10] sh: "
` [PATCH v7 09/10] um: Add dummy implementation for "
` [PATCH v7 10/10] arm: Align prototype of IO memset

[PATCH 0/6] Add AutoFDO and Propeller support for Clang build
 2024-09-30 22:49 UTC  (9+ messages)
` [PATCH 6/6] Add Propeller configuration for kernel build

[RFC PATCH 0/4] implement lightweight guard pages
 2024-09-30 16:05 UTC  (8+ messages)
` [RFC PATCH 1/4] mm: pagewalk: add the ability to install PTEs
` [RFC PATCH 2/4] mm: add PTE_MARKER_GUARD PTE marker
` [RFC PATCH 3/4] mm: madvise: implement lightweight guard page mechanism
` [RFC PATCH 4/4] selftests/mm: add self tests for guard page feature

[PATCH V2] LoongArch: Set correct size for VDSO code mapping
 2024-09-30  4:54 UTC 

[PATCH v1] asm-generic: introduce be56 unaligned accessors
 2024-09-29 21:16 UTC  (2+ messages)

[PATCH] LoongArch: Set correct size for VDSO code mapping
 2024-09-29  8:19 UTC  (2+ messages)

[PATCH 03/11] PCI: of_property: Sanitize 32 bit PCI address parsed from DT
 2024-09-28 20:17 UTC  (4+ messages)

[GIT PULL] LoongArch changes for v6.12
 2024-09-27 17:24 UTC  (2+ messages)

[PATCH V2 1/3] MIPS: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK
 2024-09-27 16:21 UTC  (8+ messages)
` [PATCH V2 3/3] SH: "

[PATCH v2 0/8] vdso: Use only headers from the vdso/ namespace
 2024-09-27 13:09 UTC  (7+ messages)
` [PATCH v2 1/8] x86: vdso: Introduce asm/vdso/mman.h

[GIT PULL] asm-generic updates for 6.12
 2024-09-26 19:09 UTC  (2+ messages)

[PATCH 0/5] asm-generic: clean up asm/mman.h
 2024-09-26 13:54 UTC  (11+ messages)
` [PATCH 1/5] asm-generic: cosmetic updates to uapi/asm/mman.h
` [PATCH 2/5] asm-generic: move MAP_* flags from mman-common.h to mman.h
` [PATCH 3/5] asm-generic: use asm-generic/mman-common.h on mips and xtensa
` [PATCH 4/5] asm-generic: use asm-generic/mman-common.h on parisc and alpha
` [PATCH 5/5] [RFC] mm: Remove MAP_UNINITIALIZED support


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).