linux-arch.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2018-10-11 08:35:03 to 2018-10-12 07:56:25 UTC [more...]

[PATCH security-next v5 00/30] LSM: Explict ordering
 2018-10-12  1:19 UTC  (22+ messages)

[PATCH v2 0/7] Rlimit for module space
 2018-10-12  0:35 UTC  (19+ messages)
` [PATCH v2 1/7] modules: Create rlimit "
` [PATCH v2 2/7] x86/modules: Add rlimit checking for x86 modules
` [PATCH v2 3/7] arm/modules: Add rlimit checking for arm modules
` [PATCH v2 4/7] arm64/modules: Add rlimit checking for arm64 modules
` [PATCH v2 5/7] mips/modules: Add rlimit checking for mips modules
` [PATCH v2 6/7] sparc/modules: Add rlimit for sparc modules
` [PATCH v2 7/7] s390/modules: Add rlimit checking for s390 modules

[PATCH V8 00/21] C-SKY(csky) Linux Kernel Port
 2018-10-12  4:42 UTC  (22+ messages)
` [PATCH V8 01/21] csky: Build infrastructure
` [PATCH V8 02/21] csky: defconfig
` [PATCH V8 03/21] csky: Kernel booting
` [PATCH V8 04/21] csky: Exception handling and mm-fault
` [PATCH V8 05/21] csky: System Call
` [PATCH V8 06/21] csky: Cache and TLB routines
` [PATCH V8 07/21] csky: MMU and page table management
` [PATCH V8 08/21] csky: Process management and Signal
` [PATCH V8 09/21] csky: VDSO and rt_sigreturn
` [PATCH V8 10/21] csky: IRQ handling
` [PATCH V8 11/21] csky: Atomic operations
` [PATCH V8 12/21] csky: ELF and module probe
` [PATCH V8 13/21] csky: Library functions
` [PATCH V8 14/21] csky: User access
` [PATCH V8 15/21] csky: Debug and Ptrace GDB
` [PATCH V8 16/21] csky: SMP support
` [PATCH V8 17/21] csky: Misc headers
` [PATCH V8 18/21] dt-bindings: csky CPU Bindings
` [PATCH V8 19/21] dt-bindings: Add vendor prefix for csky
` [PATCH V8 20/21] MAINTAINERS: Add csky
` [PATCH V8 21/21] csky: add support get_user_size access dword

[PATCH v5 00/27] Control Flow Enforcement: Shadow Stack
 2018-10-11 20:55 UTC  (72+ messages)
` [PATCH v5 01/27] x86/cpufeatures: Add CPUIDs for Control Flow Enforcement Technology (CET)
` [PATCH v5 02/27] x86/fpu/xstate: Change names to separate XSAVES system and user states
` [PATCH v5 03/27] x86/fpu/xstate: Introduce XSAVES system states
` [PATCH v5 04/27] x86/fpu/xstate: Add XSAVES system states for shadow stack
` [PATCH v5 05/27] Documentation/x86: Add CET description
` [PATCH v5 06/27] x86/cet: Control protection exception handler
` [PATCH v5 07/27] mm/mmap: Create a guard area between VMAs
` [PATCH v5 08/27] x86/cet/shstk: Add Kconfig option for user-mode shadow stack
` [PATCH v5 09/27] mm: Introduce VM_SHSTK for shadow stack memory
` [PATCH v5 10/27] mm/mmap: Prevent Shadow Stack VMA merges
` [PATCH v5 11/27] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
` [PATCH v5 12/27] x86/mm: Introduce _PAGE_DIRTY_SW
` [PATCH v5 13/27] drm/i915/gvt: Update _PAGE_DIRTY to _PAGE_DIRTY_BITS
` [PATCH v5 14/27] x86/mm: Modify ptep_set_wrprotect and pmdp_set_wrprotect for _PAGE_DIRTY_SW
` [PATCH v5 15/27] x86/mm: Shadow stack page fault error checking
` [PATCH v5 16/27] mm: Handle shadow stack page fault
` [PATCH v5 17/27] mm: Handle THP/HugeTLB "
` [PATCH v5 18/27] mm: Update can_follow_write_pte/pmd for shadow stack
` [PATCH v5 19/27] mm: Introduce do_mmap_locked()
` [PATCH v5 20/27] x86/cet/shstk: User-mode shadow stack support
` [PATCH v5 21/27] x86/cet/shstk: Introduce WRUSS instruction
` [PATCH v5 22/27] x86/cet/shstk: Signal handling for shadow stack
` [PATCH v5 23/27] x86/cet/shstk: ELF header parsing of Shadow Stack
` [PATCH v5 24/27] x86/cet/shstk: Handle thread shadow stack
` [PATCH v5 25/27] mm/mmap: Add Shadow stack pages to memory accounting
` [PATCH v5 26/27] x86/cet/shstk: Add arch_prctl functions for Shadow Stack
` [PATCH v5 27/27] x86/cet/shstk: Add Shadow Stack instructions to opcode map

[PATCH v3 0/7] ia64: system call table generation support
 2018-10-12  4:01 UTC  (31+ messages)
` [PATCH v3 1/7] ia64: add __NR_old_getpagesize in uapi/asm/unistd.h
` [PATCH v3 2/7] ia64: replace NR_syscalls macro from asm/unistd.h
` [PATCH v3 3/7] ia64: add an offset for system call number
` [PATCH v3 4/7] ia64: replace the system call table entries from entry.S
` [PATCH v3 5/7] ia64: add system call table generation support
` [PATCH v3 6/7] ia64: uapi header and system call table file generation
` [PATCH v3 7/7] ia64: wire up system calls

[PATCH v2 0/3] namei: implement various lookup restriction AT_* flags
 2018-10-12  1:12 UTC  (5+ messages)
` [PATCH v2 1/3] namei: implement O_BENEATH-style "

[PATCH 00/17] ARMv8.3 pointer authentication support
 2018-10-11 16:28 UTC  (13+ messages)
` [PATCH v5 01/17] arm64: add pointer authentication register bits
` [PATCH v5 07/17] arm64: add basic pointer authentication support
` [RFC 17/17] arm64: compile the kernel with ptrauth -msign-return-address

[PATCH v5 00/11] Control Flow Enforcement: Branch Tracking, PTRACE
 2018-10-11 15:16 UTC  (24+ messages)
` [PATCH v5 01/11] x86/cet/ibt: Add Kconfig option for user-mode Indirect Branch Tracking
` [PATCH v5 02/11] x86/cet/ibt: User-mode indirect branch tracking support
` [PATCH v5 03/11] x86/cet/ibt: Add IBT legacy code bitmap allocation function
` [PATCH v5 04/11] mm/mmap: Add IBT bitmap size to address space limit check
` [PATCH v5 05/11] x86/cet/ibt: ELF header parsing for IBT
` [PATCH v5 06/11] x86/cet/ibt: Add arch_prctl functions "
` [PATCH v5 07/11] x86/cet/ibt: Add ENDBR to op-code-map
` [PATCH v5 08/11] x86: Insert endbr32/endbr64 to vDSO
` [PATCH v5 09/11] x86/vsyscall/32: Add ENDBR32 to vsyscall entry point
` [PATCH v5 10/11] x86/vsyscall/64: Add ENDBR64 to vsyscall entry points
` [PATCH v5 11/11] x86/cet: Add PTRACE interface for CET

[PATCH] percpu: include irqflags.h for raw_local_irq_save()
 2018-10-11 15:09 UTC 

[PATCH 00/18] my generic mmu_gather patches
 2018-10-11 15:04 UTC  (5+ messages)
` [PATCH 12/18] arch/tlb: Clean up simple architectures

[PATCH v3 0/6] System call table generation support
 2018-10-11 15:01 UTC  (19+ messages)
` [PATCH v3 4/6] parisc: uapi header and system call table file generation


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).