linux-api.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2023-02-19 20:47:24 to 2023-03-07 11:12:53 UTC [more...]

Fotowoltaika - nowe warunki
 2023-03-06  9:00 UTC 

[PATCH v7 00/41] Shadow stacks for userspace
 2023-03-07 10:44 UTC  (92+ messages)
` [PATCH v7 01/41] Documentation/x86: Add CET shadow stack description
` [PATCH v7 02/41] x86/shstk: Add Kconfig option for shadow stack
` [PATCH v7 03/41] x86/cpufeatures: Add CPU feature flags for shadow stacks
` [PATCH v7 04/41] x86/cpufeatures: Enable CET CR4 bit for shadow stack
` [PATCH v7 05/41] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
` [PATCH v7 06/41] x86/fpu: Add helper for modifying xstate
` [PATCH v7 07/41] x86: Move control protection handler to separate file
` [PATCH v7 08/41] x86/shstk: Add user control-protection fault handler
` [PATCH v7 09/41] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
` [PATCH v7 10/41] x86/mm: Move pmd_write(), pud_write() up in the file
` [PATCH v7 11/41] mm: Introduce pte_mkwrite_kernel()
` [PATCH v7 12/41] s390/mm: Introduce pmd_mkwrite_kernel()
` [PATCH v7 13/41] mm: Make pte_mkwrite() take a VMA
` [PATCH v7 14/41] x86/mm: Introduce _PAGE_SAVED_DIRTY
` [PATCH v7 15/41] x86/mm: Update ptep/pmdp_set_wrprotect() for _PAGE_SAVED_DIRTY
` [PATCH v7 16/41] x86/mm: Start actually marking _PAGE_SAVED_DIRTY
` [PATCH v7 17/41] mm: Move VM_UFFD_MINOR_BIT from 37 to 38
` [PATCH v7 18/41] mm: Introduce VM_SHADOW_STACK for shadow stack memory
` [PATCH v7 19/41] x86/mm: Check shadow stack page fault errors
` [PATCH v7 20/41] x86/mm: Teach pte_mkwrite() about stack memory
` [PATCH v7 21/41] mm: Add guard pages around a shadow stack
` [PATCH v7 22/41] mm/mmap: Add shadow stack pages to memory accounting
` [PATCH v7 23/41] mm: Re-introduce vm_flags to do_mmap()
` [PATCH v7 24/41] mm: Don't allow write GUPs to shadow stack memory
` [PATCH v7 25/41] x86/mm: Introduce MAP_ABOVE4G
` [PATCH v7 26/41] mm: Warn on shadow stack memory in wrong vma
` [PATCH v7 27/41] x86/mm: Warn if create Write=0,Dirty=1 with raw prot
` [PATCH v7 28/41] x86: Introduce userspace API for shadow stack
` [PATCH v7 29/41] x86/shstk: Add user-mode shadow stack support
` [PATCH v7 30/41] x86/shstk: Handle thread shadow stack
` [PATCH v7 31/41] x86/shstk: Introduce routines modifying shstk
` [PATCH v7 32/41] x86/shstk: Handle signals for shadow stack
` [PATCH v7 33/41] x86/shstk: Introduce map_shadow_stack syscall
` [PATCH v7 34/41] x86/shstk: Support WRSS for userspace
` [PATCH v7 35/41] x86: Expose thread features in /proc/$PID/status
` [PATCH v7 36/41] x86/shstk: Wire in shadow stack interface
` [PATCH v7 37/41] selftests/x86: Add shadow stack test
` [PATCH v7 38/41] x86/fpu: Add helper for initing features
` [PATCH v7 39/41] x86: Add PTRACE interface for shadow stack
` [PATCH v7 40/41] x86/shstk: Add ARCH_SHSTK_UNLOCK
` [PATCH v7 41/41] x86/shstk: Add ARCH_SHSTK_STATUS

selftests: sigaltstack: sas # exit=1 - # Bail out! SP is not on sigaltstack - on clang build
 2023-03-07  6:57 UTC 

[PATCH 0/1] process attribute support for Landlock
 2023-03-06 19:18 UTC 

[PATCH v10 0/3] cachestat: a new syscall for page cache state of files
 2023-03-05 10:32 UTC  (10+ messages)
` [PATCH v10 1/3] workingset: refactor LRU refault to expose refault recency check
` [PATCH v10 2/3] cachestat: implement cachestat syscall

[PATCH v6 00/11] LSM: Three basic syscalls
 2023-03-03 18:41 UTC  (20+ messages)
  ` [PATCH v6 01/11] LSM: Identify modules by more than name
  ` [PATCH v6 02/11] LSM: Maintain a table of LSM attribute data
  ` [PATCH v6 03/11] proc: Use lsmids instead of lsm names for attrs
  ` [PATCH v6 04/11] LSM: syscalls for current process attributes
  ` [PATCH v6 05/11] LSM: Create lsm_module_list system call
  ` [PATCH v6 06/11] LSM: wireup Linux Security Module syscalls
  ` [PATCH v6 07/11] LSM: Helpers for attribute names and filling an lsm_ctx
  ` [PATCH v6 08/11] Smack: implement setselfattr and getselfattr hooks
  ` [PATCH v6 09/11] AppArmor: Add selfattr hooks
  ` [PATCH v6 10/11] SELinux: "
  ` [PATCH v6 11/11] LSM: selftests for Linux Security Module syscalls

[PATCH] riscv: Bump COMMAND_LINE_SIZE value to 1024
 2023-03-02  3:17 UTC  (2+ messages)

[PATCH v6 00/41] Shadow stacks for userspace
 2023-03-01 15:42 UTC  (88+ messages)
` [PATCH v6 11/41] mm: Introduce pte_mkwrite_kernel()
` [PATCH v6 12/41] s390/mm: Introduce pmd_mkwrite_kernel()
` [PATCH v6 13/41] mm: Make pte_mkwrite() take a VMA
` [PATCH v6 14/41] x86/mm: Introduce _PAGE_SAVED_DIRTY
` [PATCH v6 18/41] mm: Introduce VM_SHADOW_STACK for shadow stack memory
` [PATCH v6 19/41] x86/mm: Check shadow stack page fault errors
` [PATCH v6 20/41] x86/mm: Teach pte_mkwrite() about stack memory
` [PATCH v6 22/41] mm/mmap: Add shadow stack pages to memory accounting
` [PATCH v6 24/41] mm: Don't allow write GUPs to shadow stack memory
` [PATCH v6 25/41] x86/mm: Introduce MAP_ABOVE4G
` [PATCH v6 27/41] x86/mm: Warn if create Write=0,Dirty=1 with raw prot
` [PATCH v6 28/41] x86: Introduce userspace API for shadow stack
` [PATCH v6 29/41] x86/shstk: Add user-mode shadow stack support
` [PATCH v6 33/41] x86/shstk: Introduce map_shadow_stack syscall
` [PATCH v6 37/41] selftests/x86: Add shadow stack test
` [PATCH v6 38/41] x86/fpu: Add helper for initing features

[PATCH v2 1/2] binfmt_misc: cleanup on filesystem umount
 2023-02-28  6:20 UTC  (8+ messages)
` [PATCH v2 2/2] binfmt_misc: enable sandboxed mounts

[PATCH v2] rseq.2: New man page for the rseq(2) API
 2023-02-27 19:56 UTC  (3+ messages)

[RFC PATCH 1/2] mm: restrictedmem: Allow userspace to specify mount_path for memfd_restricted
 2023-02-24  9:36 UTC  (3+ messages)

[PATCH v10 0/9] KVM: mm: fd-based approach for supporting KVM
 2023-02-24  5:42 UTC  (15+ messages)
` [PATCH v10 1/9] mm: Introduce memfd_restricted system call to create restricted user memory

[RFC PATCH 0/2] Add flag as THP allocation hint for memfd_restricted() syscall
 2023-02-23  1:31 UTC  (3+ messages)

copy on write for splice() from file to pipe?
 2023-02-20  4:54 UTC  (6+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).