linux-api.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2022-12-02 02:54:11 to 2022-12-20 09:58:29 UTC [more...]

[PATCH v10 0/9] KVM: mm: fd-based approach for supporting KVM
 2022-12-20  9:55 UTC  (63+ messages)
` [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory
` [PATCH v10 2/9] KVM: Introduce per-page memory attributes
` [PATCH v10 3/9] KVM: Extend the memslot to support fd-based private memory
` [PATCH v10 4/9] KVM: Add KVM_EXIT_MEMORY_FAULT exit
` [PATCH v10 5/9] KVM: Use gfn instead of hva for mmu_notifier_retry
` [PATCH v10 6/9] KVM: Unmap existing mappings when change the memory attributes
` [PATCH v10 7/9] KVM: Update lpage info when private/shared memory are mixed
` [PATCH v10 8/9] KVM: Handle page fault for private memory
` [PATCH v10 9/9] KVM: Enable and expose KVM_MEM_PRIVATE

[PATCH v5 0/3] fanotify: Allow user space to pass back additional audit info
 2022-12-19 10:10 UTC  (7+ messages)
` [PATCH v5 1/3] fanotify: Ensure consistent variable type for response
` [PATCH v5 2/3] fanotify: define struct members to hold response decision context
` [PATCH v5 3/3] fanotify,audit: Allow audit to use the full permission event response

[PATCH 1/2] mm/mempolicy: Fix memory leak in set_mempolicy_home_node system call
 2022-12-16 19:45 UTC  (2+ messages)
` [PATCH 2/2] mm/mempolicy: do not duplicate policy if it is not applicable for set_mempolicy_home_node

[PATCH for tip queue/sched/core] selftests/rseq: Add mm_numa_cid to test script
 2022-12-16 14:53 UTC 

[RFC PATCH] mm/mempolicy: Fix memory leak in set_mempolicy_home_node system call
 2022-12-15 20:00 UTC  (9+ messages)
    ` [PATCH] mm/mempolicy: do not duplicate policy if it is not applicable for set_mempolicy_home_node

[PATCH] mm/mempolicy: Fix memory leak in set_mempolicy_home_node system call
 2022-12-15 19:46 UTC 

[PATCH v4 00/39] Shadow stacks for userspace
 2022-12-15  0:25 UTC  (83+ messages)
` [PATCH v4 01/39] Documentation/x86: Add CET shadow stack description
` [PATCH v4 02/39] x86/shstk: Add Kconfig option for Shadow Stack
` [PATCH v4 03/39] x86/cpufeatures: Add CPU feature flags for shadow stacks
` [PATCH v4 04/39] x86/cpufeatures: Enable CET CR4 bit for shadow stack
` [PATCH v4 05/39] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
` [PATCH v4 06/39] x86/fpu: Add helper for modifying xstate
` [PATCH v4 07/39] x86: Add user control-protection fault handler
` [PATCH v4 08/39] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
` [PATCH v4 09/39] x86/mm: Move pmd_write(), pud_write() up in the file
` [PATCH v4 10/39] x86/mm: Introduce _PAGE_COW
` [PATCH v4 11/39] x86/mm: Update pte_modify for _PAGE_COW
` [PATCH v4 12/39] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
` [PATCH v4 13/39] x86/mm: Start actually marking _PAGE_COW
` [PATCH v4 14/39] mm: Move VM_UFFD_MINOR_BIT from 37 to 38
` [PATCH v4 15/39] mm: Introduce VM_SHADOW_STACK for shadow stack memory
` [PATCH v4 16/39] x86/mm: Check Shadow Stack page fault errors
` [PATCH v4 17/39] x86/mm: Update maybe_mkwrite() for shadow stack
` [PATCH v4 18/39] mm: Fixup places that call pte_mkwrite() directly
` [PATCH v4 19/39] mm: Add guard pages around a shadow stack
` [PATCH v4 20/39] mm/mmap: Add shadow stack pages to memory accounting
` [PATCH v4 21/39] mm/mprotect: Exclude shadow stack from preserve_write
` [PATCH v4 22/39] mm: Re-introduce vm_flags to do_mmap()
` [PATCH v4 23/39] mm: Don't allow write GUPs to shadow stack memory
` [PATCH v4 24/39] mm: Warn on shadow stack memory in wrong vma
` [PATCH v4 25/39] x86: Introduce userspace API for shadow stack
` [PATCH v4 26/39] x86/shstk: Add user-mode shadow stack support
` [PATCH v4 27/39] x86/shstk: Handle thread shadow stack
` [PATCH v4 28/39] x86/shstk: Introduce routines modifying shstk
` [PATCH v4 29/39] x86/shstk: Handle signals for shadow stack
` [PATCH v4 30/39] x86/shstk: Introduce map_shadow_stack syscall
` [PATCH v4 31/39] x86/shstk: Support wrss for userspace
` [PATCH v4 32/39] x86: Expose thread features in /proc/$PID/status
` [PATCH v4 33/39] x86: Prevent 32 bit operations for 64 bit shstk tasks
` [PATCH v4 34/39] x86/shstk: Wire in shadow stack interface
` [PATCH v4 35/39] selftests/x86: Add shadow stack test
` [PATCH v4 36/39] x86/fpu: Add helper for initing features
` [PATCH v4 37/39] x86: Add PTRACE interface for shadow stack
` [PATCH v4 38/39] x86/shstk: Add ARCH_SHSTK_UNLOCK
` [PATCH v4 39/39] x86/shstk: Add ARCH_SHSTK_STATUS

Słowa kluczowe do wypozycjonowania
 2022-12-14  9:05 UTC 

[PATCH v12 0/6] implement getrandom() in vDSO
 2022-12-12 21:01 UTC  (8+ messages)
` [PATCH RFC v12 1/6] mm: add VM_DROPPABLE for designating always lazily freeable mappings
` [PATCH RFC v12 2/6] x86: mm: Skip faulting instruction for VM_DROPPABLE faults
` [PATCH v12 3/6] random: add vgetrandom_alloc() syscall
` [PATCH v12 4/6] arch: allocate vgetrandom_alloc() syscall number
` [PATCH v12 5/6] random: introduce generic vDSO getrandom() implementation
` [PATCH v12 6/6] x86: vdso: Wire up getrandom() vDSO implementation

[PATCH v11 0/4] implement getrandom() in vDSO
 2022-12-06 12:57 UTC  (14+ messages)
` [PATCH v11 1/4] random: add vgetrandom_alloc() syscall
` [PATCH v11 2/4] arch: allocate vgetrandom_alloc() syscall number
` [PATCH v11 3/4] random: introduce generic vDSO getrandom() implementation
` [PATCH v11 4/4] x86: vdso: Wire up getrandom() vDSO implementation

[PATCH v8 07/12] landlock: Add network rules support
 2022-12-05 13:18 UTC  (11+ messages)
  ` [PATCH v8 08/12] landlock: Implement TCP network hooks

[PATCH v3 5/9] LSM: lsm_get_self_attr syscall for LSM self attributes
 2022-12-04  2:16 UTC  (2+ messages)

[PATCH v10 0/4] implement getrandom() in vDSO
 2022-12-02 18:29 UTC  (8+ messages)
` [PATCH v10 1/4] random: add vgetrandom_alloc() syscall

[PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
 2022-12-02 13:44 UTC  (5+ messages)
` [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).