linux-api.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2022-09-29 14:12:01 to 2022-10-05 13:04:09 UTC [more...]

[PATCH v8 0/8] KVM: mm: fd-based approach for supporting KVM
 2022-10-05 13:04 UTC  (23+ messages)
` [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
` [PATCH v8 2/8] KVM: Extend the memslot to support fd-based private memory
` [PATCH v8 6/8] KVM: Update lpage info when private/shared memory are mixed
` [PATCH v8 8/8] KVM: Enable and expose KVM_MEM_PRIVATE

[PATCH v2 00/39] Shadowstacks for userspace
 2022-10-05 12:34 UTC  (182+ messages)
` [PATCH v2 01/39] Documentation/x86: Add CET description
` [PATCH v2 02/39] x86/cet/shstk: Add Kconfig option for Shadow Stack
` [PATCH v2 03/39] x86/cpufeatures: Add CPU feature flags for shadow stacks
` [PATCH v2 04/39] x86/cpufeatures: Enable CET CR4 bit for shadow stack
` [PATCH v2 05/39] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
` [PATCH v2 06/39] x86/fpu: Add helper for modifying xstate
` [PATCH v2 07/39] x86/cet: Add user control-protection fault handler
` [PATCH v2 08/39] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
` [PATCH v2 09/39] x86/mm: Move pmd_write(), pud_write() up in the file
` [PATCH v2 10/39] x86/mm: Introduce _PAGE_COW
` [PATCH v2 11/39] x86/mm: Update pte_modify for _PAGE_COW
` [PATCH v2 12/39] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
` [PATCH v2 13/39] mm: Move VM_UFFD_MINOR_BIT from 37 to 38
` [PATCH v2 14/39] mm: Introduce VM_SHADOW_STACK for shadow stack memory
` [PATCH v2 15/39] x86/mm: Check Shadow Stack page fault errors
` [PATCH v2 16/39] x86/mm: Update maybe_mkwrite() for shadow stack
` [PATCH v2 17/39] mm: Fixup places that call pte_mkwrite() directly
` [PATCH v2 18/39] mm: Add guard pages around a shadow stack
` [PATCH v2 19/39] mm/mmap: Add shadow stack pages to memory accounting
` [PATCH v2 20/39] mm/mprotect: Exclude shadow stack from preserve_write
` [PATCH v2 21/39] mm: Re-introduce vm_flags to do_mmap()
` [PATCH v2 22/39] mm: Don't allow write GUPs to shadow stack memory
` [PATCH v2 23/39] x86: Introduce userspace API for CET enabling
` [PATCH v2 24/39] x86/cet/shstk: Add user-mode shadow stack support
` [PATCH v2 25/39] x86/cet/shstk: Handle thread shadow stack
` [PATCH v2 26/39] x86/cet/shstk: Introduce routines modifying shstk
` [PATCH v2 27/39] x86/cet/shstk: Handle signals for shadow stack
` [PATCH v2 28/39] x86/cet/shstk: Introduce map_shadow_stack syscall
` [PATCH v2 29/39] x86/cet/shstk: Support wrss for userspace
` [PATCH v2 30/39] x86: Expose thread features status in /proc/$PID/arch_status
` [PATCH v2 31/39] x86/cet/shstk: Wire in CET interface
` [PATCH v2 32/39] selftests/x86: Add shadow stack test
` [PATCH v2 33/39] x86/cpufeatures: Limit shadow stack to Intel CPUs
` [OPTIONAL/CLEANUP v2 34/39] x86: Separate out x86_regset for 32 and 64 bit
` [OPTIONAL/CLEANUP v2 35/39] x86: Improve formatting of user_regset arrays
` [OPTIONAL/RFC v2 36/39] x86/fpu: Add helper for initing features
` [OPTIONAL/RFC v2 37/39] x86/cet: Add PTRACE interface for CET
` [OPTIONAL/RFC v2 38/39] x86/cet/shstk: Add ARCH_CET_UNLOCK
` [OPTIONAL/RFC v2 39/39] x86: Add alt shadow stack support

[man-pages PATCH v3] statx.2, open.2: document STATX_DIOALIGN
 2022-10-04 17:43 UTC 

[GIT PULL] STATX_DIOALIGN for 6.1
 2022-10-04  3:44 UTC  (2+ messages)

[RFC PATCH] rseq: Use pr_warn_once() when deprecated/unknown ABI flags are encountered
 2022-09-29 16:11 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).