Linux Arch
[Prev Page][Next Page]
- Re: [PATCH v4 04/12] dcssblk: Handle alloc_dax() -EOPNOTSUPP failure, (continued)
- [GIT PULL] LoongArch fixes for v6.8-rc4,
Huacai Chen
- [PATCH v2 0/5] jump_label: Fix __ro_after_init keys for modules & annotate some keys,
Valentin Schneider
- [PATCH v4] ELF: AT_PAGE_SHIFT_MASK -- supply userspace with available page shifts,
Alexey Dobriyan
- [PATCH v8 00/38] arm64/gcs: Provide support for GCS in userspace,
Mark Brown
- [PATCH v8 01/38] arm64/mm: Restructure arch_validate_flags() for extensibility, Mark Brown
- [PATCH v8 02/38] prctl: arch-agnostic prctl for shadow stack, Mark Brown
- [PATCH v8 03/38] mman: Add map_shadow_stack() flags, Mark Brown
- [PATCH v8 04/38] arm64: Document boot requirements for Guarded Control Stacks, Mark Brown
- [PATCH v8 05/38] arm64/gcs: Document the ABI for Guarded Control Stacks, Mark Brown
- [PATCH v8 06/38] arm64/sysreg: Add definitions for architected GCS caps, Mark Brown
- [PATCH v8 07/38] arm64/gcs: Add manual encodings of GCS instructions, Mark Brown
- [PATCH v8 08/38] arm64/gcs: Provide put_user_gcs(), Mark Brown
- [PATCH v8 09/38] arm64/cpufeature: Runtime detection of Guarded Control Stack (GCS), Mark Brown
- [PATCH v8 10/38] arm64/mm: Allocate PIE slots for EL0 guarded control stack, Mark Brown
- [PATCH v8 11/38] mm: Define VM_SHADOW_STACK for arm64 when we support GCS, Mark Brown
- [PATCH v8 12/38] arm64/mm: Map pages for guarded control stack, Mark Brown
- [PATCH v8 13/38] KVM: arm64: Manage GCS registers for guests, Mark Brown
- [PATCH v8 14/38] arm64/gcs: Allow GCS usage at EL0 and EL1, Mark Brown
- [PATCH v8 15/38] arm64/idreg: Add overrride for GCS, Mark Brown
- [PATCH v8 16/38] arm64/hwcap: Add hwcap for GCS, Mark Brown
- [PATCH v8 17/38] arm64/traps: Handle GCS exceptions, Mark Brown
- [PATCH v8 18/38] arm64/mm: Handle GCS data aborts, Mark Brown
- [PATCH v8 19/38] arm64/gcs: Context switch GCS state for EL0, Mark Brown
- [PATCH v8 20/38] arm64/gcs: Ensure that new threads have a GCS, Mark Brown
- [PATCH v8 21/38] arm64/gcs: Implement shadow stack prctl() interface, Mark Brown
- [PATCH v8 22/38] arm64/mm: Implement map_shadow_stack(), Mark Brown
- [PATCH v8 23/38] arm64/signal: Set up and restore the GCS context for signal handlers, Mark Brown
- [PATCH v8 24/38] arm64/signal: Expose GCS state in signal frames, Mark Brown
- [PATCH v8 25/38] arm64/ptrace: Expose GCS via ptrace and core files, Mark Brown
- [PATCH v8 26/38] arm64: Add Kconfig for Guarded Control Stack (GCS), Mark Brown
- [PATCH v8 27/38] kselftest/arm64: Verify the GCS hwcap, Mark Brown
- [PATCH v8 28/38] kselftest/arm64: Add GCS as a detected feature in the signal tests, Mark Brown
- [PATCH v8 29/38] kselftest/arm64: Add framework support for GCS to signal handling tests, Mark Brown
- [PATCH v8 30/38] kselftest/arm64: Allow signals tests to specify an expected si_code, Mark Brown
- [PATCH v8 31/38] kselftest/arm64: Always run signals tests with GCS enabled, Mark Brown
- [PATCH v8 32/38] kselftest/arm64: Add very basic GCS test program, Mark Brown
- [PATCH v8 33/38] kselftest/arm64: Add a GCS test program built with the system libc, Mark Brown
- [PATCH v8 34/38] kselftest/arm64: Add test coverage for GCS mode locking, Mark Brown
- [PATCH v8 35/38] selftests/arm64: Add GCS signal tests, Mark Brown
- [PATCH v8 36/38] kselftest/arm64: Add a GCS stress test, Mark Brown
- [PATCH v8 37/38] kselftest/arm64: Enable GCS for the FP stress tests, Mark Brown
- [PATCH v8 38/38] kselftest: Provide shadow stack enable helpers for arm64, Mark Brown
- Re: [PATCH v8 00/38] arm64/gcs: Provide support for GCS in userspace, Thiago Jung Bauermann
- Re: [PATCH v8 00/38] arm64/gcs: Provide support for GCS in userspace, Stefan O'Rear
- [RFC PATCH v4 00/12] Introduce cpu_dcache_is_aliasing() to fix DAX regression,
Mathieu Desnoyers
- [RFC PATCH v4 02/12] nvdimm/pmem: Treat alloc_dax() -EOPNOTSUPP failure as non-fatal, Mathieu Desnoyers
- [RFC PATCH v4 03/12] dm: Treat alloc_dax() -EOPNOTSUPP failure as non-fatal, Mathieu Desnoyers
- [RFC PATCH v4 04/12] dcssblk: Handle alloc_dax() -EOPNOTSUPP failure, Mathieu Desnoyers
- [RFC PATCH v4 01/12] nvdimm/pmem: Fix leak on dax_add_host() failure, Mathieu Desnoyers
- [RFC PATCH v4 06/12] dax: Check for data cache aliasing at runtime, Mathieu Desnoyers
- [RFC PATCH v4 05/12] virtio: Treat alloc_dax() -EOPNOTSUPP failure as non-fatal, Mathieu Desnoyers
- [RFC PATCH v4 09/12] nvdimm/pmem: Cleanup alloc_dax() error handling, Mathieu Desnoyers
- [RFC PATCH v4 10/12] dm: Cleanup alloc_dax() error handling, Mathieu Desnoyers
- [RFC PATCH v4 07/12] Introduce cpu_dcache_is_aliasing() across all architectures, Mathieu Desnoyers
- [RFC PATCH v4 12/12] virtio: Cleanup alloc_dax() error handling, Mathieu Desnoyers
- [RFC PATCH v4 08/12] dax: Fix incorrect list of data cache aliasing architectures, Mathieu Desnoyers
- [RFC PATCH v4 11/12] dcssblk: Cleanup alloc_dax() error handling, Mathieu Desnoyers
- [PATCH] mm: Remove broken pfn_to_virt() on arch csky/hexagon/openrisc,
Yan Zhao
- [PATCH v2 0/3] Handle delay slot for extable lookup,
Jiaxun Yang
- [PATCH 0/3] Handle delay slot for extable lookup,
Jiaxun Yang
- Website performance, Roe Heyer
- [PATCH 1/2] mm: pgtable: add missing flag and statistics for kernel PTE page,
Qi Zheng
- [RFC PATCH v4 00/15] ACPI/arm64: add support for virtual cpu hotplug,
Russell King (Oracle)
- [PATCH RFC v4 01/15] ACPI: Only enumerate enabled (or functional) processor devices, Oracle
- [PATCH RFC v4 02/15] ACPI: processor: Register all CPUs from acpi_processor_get_info(), Oracle
- [PATCH RFC v4 04/15] ACPI: Rename acpi_processor_hotadd_init and remove pre-processor guards, Oracle
- [PATCH RFC v4 05/15] ACPI: Add post_eject to struct acpi_scan_handler for cpu hotplug, Oracle
- [PATCH RFC v4 03/15] ACPI: Move acpi_bus_trim_one() before acpi_scan_hot_remove(), Oracle
- [PATCH RFC v4 07/15] ACPI: Check _STA present bit before making CPUs not present, Oracle
- [PATCH RFC v4 08/15] ACPI: Warn when the present bit changes but the feature is not enabled, Oracle
- [PATCH RFC v4 09/15] arm64: acpi: Move get_cpu_for_acpi_id() to a header, Oracle
- [PATCH RFC v4 10/15] irqchip/gic-v3: Don't return errors from gic_acpi_match_gicc(), Oracle
- [PATCH RFC v4 06/15] ACPI: convert acpi_processor_post_eject() to use IS_ENABLED(), Russell King (Oracle)
- [PATCH RFC v4 12/15] arm64: psci: Ignore DENIED CPUs, Oracle
- [PATCH RFC v4 13/15] ACPI: add support to (un)register CPUs based on the _STA enabled bit, Oracle
- [PATCH RFC v4 11/15] irqchip/gic-v3: Add support for ACPI's disabled but 'online capable' CPUs, Oracle
- [PATCH RFC v4 15/15] cpumask: Add enabled cpumask for present CPUs that can be brought online, Oracle
- [PATCH RFC v4 14/15] arm64: document virtual CPU hotplug's expectations, Oracle
- [RFC PATCH v3 0/4] Introduce cpu_dcache_is_aliasing() to fix DAX regression,
Mathieu Desnoyers
- [PATCH v6 0/4] Regather scattered PCI-Code,
Philipp Stanner
- [PATCH 0/4] apply page shift to PFN instead of VA in pfn_to_virt,
Yan Zhao
- [RFC PATCH v2 0/8] Introduce dcache_is_aliasing() to fix DAX regression,
Mathieu Desnoyers
- [PATCH doc] Emphasize that failed atomic operations give no ordering,
Paul E. McKenney
- [RFC PATCH 0/7] Introduce cache_is_aliasing() to fix DAX regression,
Mathieu Desnoyers
- [PATCH v2 0/3] modules: few of alignment fixes,
Luis Chamberlain
- [PATCH v3 00/19] x86: Confine early 1:1 mapped startup code,
Ard Biesheuvel
- [PATCH v3 01/19] efi/libstub: Add generic support for parsing mem_encrypt=, Ard Biesheuvel
- [PATCH v3 02/19] x86/boot: Move mem_encrypt= parsing to the decompressor, Ard Biesheuvel
- [PATCH v3 03/19] x86/startup_64: Drop long return to initial_code pointer, Ard Biesheuvel
- [PATCH v3 04/19] x86/startup_64: Simplify calculation of initial page table address, Ard Biesheuvel
- [PATCH v3 05/19] x86/startup_64: Simplify CR4 handling in startup code, Ard Biesheuvel
- [PATCH v3 06/19] x86/startup_64: Drop global variables keeping track of LA57 state, Ard Biesheuvel
- [PATCH v3 07/19] x86/startup_64: Simplify virtual switch on primary boot, Ard Biesheuvel
- [PATCH v3 08/19] x86/head64: Replace pointer fixups with PIE codegen, Ard Biesheuvel
- [PATCH v3 09/19] x86/head64: Simplify GDT/IDT initialization code, Ard Biesheuvel
- [PATCH v3 10/19] asm-generic: Add special .pi.text section for position independent code, Ard Biesheuvel
- [PATCH v3 11/19] x86: Move return_thunk to __pitext section, Ard Biesheuvel
- [PATCH v3 12/19] x86/head64: Move early startup code into __pitext, Ard Biesheuvel
- [PATCH v3 13/19] modpost: Warn about calls from __pitext into other text sections, Ard Biesheuvel
- [PATCH v3 14/19] x86/coco: Make cc_set_mask() static inline, Ard Biesheuvel
- [PATCH v3 15/19] x86/sev: Make all code reachable from 1:1 mapping __pitext, Ard Biesheuvel
- [PATCH v3 16/19] x86/sev: Avoid WARN() in early code, Ard Biesheuvel
- [PATCH v3 17/19] x86/sev: Use PIC codegen for early SEV startup code, Ard Biesheuvel
- [PATCH v3 18/19] x86/sev: Drop inline asm LEA instructions for RIP-relative references, Ard Biesheuvel
- [PATCH v3 19/19] x86/startup_64: Don't bother setting up GS before the kernel is mapped, Ard Biesheuvel
- [PATCH v1 0/9] mm/memory: optimize unmap/zap with PTE-mapped THP,
David Hildenbrand
- [PATCH v1 1/9] mm/memory: factor out zapping of present pte into zap_present_pte(), David Hildenbrand
- [PATCH v1 2/9] mm/memory: handle !page case in zap_present_pte() separately, David Hildenbrand
- [PATCH v1 3/9] mm/memory: further separate anon and pagecache folio handling in zap_present_pte(), David Hildenbrand
- [PATCH v1 4/9] mm/memory: factor out zapping folio pte into zap_present_folio_pte(), David Hildenbrand
- [PATCH v1 5/9] mm/mmu_gather: pass "delay_rmap" instead of encoded page to __tlb_remove_page_size(), David Hildenbrand
- [PATCH v1 6/9] mm/mmu_gather: define ENCODED_PAGE_FLAG_DELAY_RMAP, David Hildenbrand
- [PATCH v1 7/9] mm/mmu_gather: add __tlb_remove_folio_pages(), David Hildenbrand
- [PATCH v1 8/9] mm/mmu_gather: add tlb_remove_tlb_entries(), David Hildenbrand
- [PATCH v1 9/9] mm/memory: optimize unmap/zap with PTE-mapped THP, David Hildenbrand
- Re: [PATCH v1 0/9] mm/memory: optimize unmap/zap with PTE-mapped THP, Yin Fengwei
- [PATCH -fixes] riscv: Flush the tlb when a page directory is freed,
Alexandre Ghiti
- [arnd-asm-generic:asm-generic] BUILD SUCCESS 34b2321cc648a246d08cc51e423532eac690ccf1, kernel test robot
- [GIT PULL] LoongArch fixes for v6.8-rc2,
Huacai Chen
- [REGRESSION] v5.13: FS_DAX unavailable on 32-bit ARM,
Mathieu Desnoyers
- [GIT PULL] asm-generic updates for 6.8, part 2,
Arnd Bergmann
- [PATCH 5/8] doc: Add EARLY flag to early-parsed kernel boot parameters, Boqun Feng
- [PATCH RFC v3 00/35] Add support for arm64 MTE dynamic tag storage reuse,
Alexandru Elisei
- [PATCH RFC v3 01/35] mm: page_alloc: Add gfp_flags parameter to arch_alloc_page(), Alexandru Elisei
- [PATCH RFC v3 02/35] mm: page_alloc: Add an arch hook early in free_pages_prepare(), Alexandru Elisei
- [PATCH RFC v3 03/35] mm: page_alloc: Add an arch hook to filter MIGRATE_CMA allocations, Alexandru Elisei
- [PATCH RFC v3 04/35] mm: page_alloc: Partially revert "mm: page_alloc: remove stale CMA guard code", Alexandru Elisei
- [PATCH RFC v3 05/35] mm: cma: Don't append newline when generating CMA area name, Alexandru Elisei
- [PATCH RFC v3 06/35] mm: cma: Make CMA_ALLOC_SUCCESS/FAIL count the number of pages, Alexandru Elisei
- [PATCH RFC v3 07/35] mm: cma: Add CMA_RELEASE_{SUCCESS,FAIL} events, Alexandru Elisei
- [PATCH RFC v3 08/35] mm: cma: Introduce cma_alloc_range(), Alexandru Elisei
- [PATCH RFC v3 09/35] mm: cma: Introduce cma_remove_mem(), Alexandru Elisei
- [PATCH RFC v3 10/35] mm: cma: Fast track allocating memory when the pages are free, Alexandru Elisei
- [PATCH RFC v3 11/35] mm: Allow an arch to hook into folio allocation when VMA is known, Alexandru Elisei
- [PATCH RFC v3 12/35] mm: Call arch_swap_prepare_to_restore() before arch_swap_restore(), Alexandru Elisei
- [PATCH RFC v3 13/35] mm: memory: Introduce fault-on-access mechanism for pages, Alexandru Elisei
- [PATCH RFC v3 14/35] of: fdt: Return the region size in of_flat_dt_translate_address(), Alexandru Elisei
- [PATCH RFC v3 15/35] of: fdt: Add of_flat_read_u32(), Alexandru Elisei
- [PATCH RFC v3 16/35] KVM: arm64: Don't deny VM_PFNMAP VMAs when kvm_has_mte(), Alexandru Elisei
- [PATCH RFC v3 17/35] arm64: mte: Rework naming for tag manipulation functions, Alexandru Elisei
- [PATCH RFC v3 18/35] arm64: mte: Rename __GFP_ZEROTAGS to __GFP_TAGGED, Alexandru Elisei
- [PATCH RFC v3 19/35] arm64: mte: Discover tag storage memory, Alexandru Elisei
- [PATCH RFC v3 20/35] arm64: mte: Add tag storage memory to CMA, Alexandru Elisei
- [PATCH RFC v3 21/35] arm64: mte: Disable dynamic tag storage management if HW KASAN is enabled, Alexandru Elisei
- [PATCH RFC v3 22/35] arm64: mte: Enable tag storage if CMA areas have been activated, Alexandru Elisei
- [PATCH RFC v3 23/35] arm64: mte: Try to reserve tag storage in arch_alloc_page(), Alexandru Elisei
- [PATCH RFC v3 24/35] arm64: mte: Perform CMOs for tag blocks, Alexandru Elisei
- [PATCH RFC v3 25/35] arm64: mte: Reserve tag block for the zero page, Alexandru Elisei
- [PATCH RFC v3 26/35] arm64: mte: Use fault-on-access to reserve missing tag storage, Alexandru Elisei
- [PATCH RFC v3 27/35] arm64: mte: Handle tag storage pages mapped in an MTE VMA, Alexandru Elisei
- [PATCH RFC v3 28/35] arm64: mte: swap: Handle tag restoring when missing tag storage, Alexandru Elisei
- [PATCH RFC v3 29/35] arm64: mte: copypage: Handle tag restoring when missing tag storage, Alexandru Elisei
- [PATCH RFC v3 30/35] arm64: mte: ptrace: Handle pages with missing tag storage, Alexandru Elisei
- [PATCH RFC v3 31/35] khugepaged: arm64: Don't collapse MTE enabled VMAs, Alexandru Elisei
- [PATCH RFC v3 32/35] KVM: arm64: mte: Reserve tag storage for virtual machines with MTE, Alexandru Elisei
- [PATCH RFC v3 33/35] KVM: arm64: mte: Introduce VM_MTE_KVM VMA flag, Alexandru Elisei
- [PATCH RFC v3 34/35] arm64: mte: Enable dynamic tag storage management, Alexandru Elisei
- [PATCH RFC v3 35/35] HACK! arm64: dts: Add fake tag storage to fvp-base-revc.dts, Alexandru Elisei
- Re: [PATCH RFC v3 00/35] Add support for arm64 MTE dynamic tag storage reuse, Steven Rostedt
- [PATCH v2 00/28] spi: s3c64xx: winter cleanup and gs101 support,
Tudor Ambarus
- [PATCH v2 01/28] spi: s3c64xx: explicitly include <linux/io.h>, Tudor Ambarus
- [PATCH v2 02/28] spi: s3c64xx: explicitly include <linux/bits.h>, Tudor Ambarus
- [PATCH v2 03/28] spi: s3c64xx: avoid possible negative array index, Tudor Ambarus
- [PATCH v2 04/28] spi: dt-bindings: samsung: add google,gs101-spi compatible, Tudor Ambarus
- [PATCH v2 05/28] spi: dt-bindings: samsung: add samsung,spi-fifosize property, Tudor Ambarus
- [PATCH v2 06/28] spi: s3c64xx: sort headers alphabetically, Tudor Ambarus
- [PATCH v2 07/28] spi: s3c64xx: remove unneeded (void *) casts in of_match_table, Tudor Ambarus
- [PATCH v2 08/28] spi: s3c64xx: remove else after return, Tudor Ambarus
- [PATCH v2 10/28] spi: s3c64xx: use full mask for {RX, TX}_FIFO_LVL, Tudor Ambarus
- [PATCH v2 09/28] spi: s3c64xx: use bitfield access macros, Tudor Ambarus
- [PATCH v2 11/28] spi: s3c64xx: move common code outside if else, Tudor Ambarus
- [PATCH v2 12/28] spi: s3c64xx: check return code of dmaengine_slave_config(), Tudor Ambarus
- [PATCH v2 13/28] spi: s3c64xx: propagate the dma_submit_error() error code, Tudor Ambarus
- [PATCH v2 14/28] spi: s3c64xx: rename prepare_dma() to s3c64xx_prepare_dma(), Tudor Ambarus
- [PATCH v2 15/28] spi: s3c64xx: return ETIMEDOUT for wait_for_completion_timeout(), Tudor Ambarus
- [PATCH v2 16/28] spi: s3c64xx: simplify s3c64xx_wait_for_pio(), Tudor Ambarus
- [PATCH v2 17/28] spi: s3c64xx: drop blank line between declarations, Tudor Ambarus
- [PATCH v2 18/28] spi: s3c64xx: fix typo, s/configuartion/configuration, Tudor Ambarus
- [PATCH v2 19/28] spi: s3c64xx: downgrade dev_warn to dev_dbg for optional dt props, Tudor Ambarus
- [PATCH v2 20/28] spi: s3c64xx: add support for inferring fifosize from the compatible, Tudor Ambarus
- [PATCH v2 21/28] spi: s3c64xx: infer fifosize from the compatible, Tudor Ambarus
- [PATCH v2 22/28] spi: s3c64xx: drop dependency on of_alias where possible, Tudor Ambarus
- [PATCH v2 23/28] spi: s3c64xx: retrieve the FIFO size from the device tree, Tudor Ambarus
- [PATCH v2 24/28] spi: s3c64xx: mark fifo_lvl_mask as deprecated, Tudor Ambarus
- [PATCH v2 25/28] asm-generic/io.h: add iowrite{8,16}_32 accessors, Tudor Ambarus
- [PATCH v2 26/28] spi: s3c64xx: add iowrite{8,16}_32_rep accessors, Tudor Ambarus
- [PATCH v2 27/28] spi: s3c64xx: add support for google,gs101-spi, Tudor Ambarus
- [PATCH v2 28/28] MAINTAINERS: add Tudor Ambarus as R for the samsung SPI driver, Tudor Ambarus
- [PATCH v2 00/17] x86: Confine early 1:1 mapped startup code,
Ard Biesheuvel
- [PATCH v2 01/17] x86/startup_64: Drop long return to initial_code pointer, Ard Biesheuvel
- [PATCH v2 02/17] x86/startup_64: Simplify calculation of initial page table address, Ard Biesheuvel
- [PATCH v2 03/17] x86/startup_64: Simplify CR4 handling in startup code, Ard Biesheuvel
- [PATCH v2 04/17] x86/startup_64: Drop global variables to keep track of LA57 state, Ard Biesheuvel
- [PATCH v2 05/17] x86/startup_64: Simplify virtual switch on primary boot, Ard Biesheuvel
- [PATCH v2 06/17] x86/head64: Replace pointer fixups with PIE codegen, Ard Biesheuvel
- [PATCH v2 07/17] x86/head64: Simplify GDT/IDT initialization code, Ard Biesheuvel
- [PATCH v2 08/17] asm-generic: Add special .pi.text section for position independent code, Ard Biesheuvel
- [PATCH v2 09/17] x86: Move return_thunk to __pitext section, Ard Biesheuvel
- [PATCH v2 10/17] x86/head64: Move early startup code into __pitext, Ard Biesheuvel
- [PATCH v2 11/17] modpost: Warn about calls from __pitext into other text sections, Ard Biesheuvel
- [PATCH v2 13/17] x86/sev: Make all code reachable from 1:1 mapping __pitext, Ard Biesheuvel
- [PATCH v2 14/17] x86/sev: Avoid WARN() in early code, Ard Biesheuvel
- [PATCH v2 12/17] x86/coco: Make cc_set_mask() static inline, Ard Biesheuvel
- [PATCH v2 15/17] x86/sev: Use PIC codegen for early SEV startup code, Ard Biesheuvel
- [PATCH v2 16/17] x86/sev: Drop inline asm LEA instructions for RIP-relative references, Ard Biesheuvel
- [PATCH v2 17/17] x86/startup_64: Don't bother setting up GS before the kernel is mapped, Ard Biesheuvel
- Re: [PATCH v2 00/17] x86: Confine early 1:1 mapped startup code, Nathan Chancellor
- [RFC PATCH v1 00/28] riscv control-flow integrity for usermode,
debug
- [RFC PATCH v1 01/28] riscv: abstract envcfg CSR, debug
- [RFC PATCH v1 02/28] riscv: envcfg save and restore on trap entry/exit, debug
- [RFC PATCH v1 03/28] riscv: define default value for envcfg, debug
- [RFC PATCH v1 04/28] riscv/Kconfig: enable HAVE_EXIT_THREAD for riscv, debug
- [RFC PATCH v1 05/28] riscv: zicfiss/zicfilp enumeration, debug
- [RFC PATCH v1 06/28] riscv: zicfiss/zicfilp extension csr and bit definitions, debug
- [RFC PATCH v1 07/28] riscv: kernel handling on trap entry/exit for user cfi, debug
- [RFC PATCH v1 08/28] mm: Define VM_SHADOW_STACK for RISC-V, debug
- [RFC PATCH v1 09/28] mm: abstract shadow stack vma behind `arch_is_shadow_stack`, debug
- [RFC PATCH v1 10/28] riscv/mm : Introducing new protection flag "PROT_SHADOWSTACK", debug
- [RFC PATCH v1 11/28] riscv: Implementing "PROT_SHADOWSTACK" on riscv, debug
- [RFC PATCH v1 12/28] riscv mm: manufacture shadow stack pte, debug
- [RFC PATCH v1 13/28] riscv mmu: teach pte_mkwrite to manufacture shadow stack PTEs, debug
- [RFC PATCH v1 14/28] riscv mmu: write protect and shadow stack, debug
- [RFC PATCH v1 15/28] riscv/mm: Implement map_shadow_stack() syscall, debug
- [RFC PATCH v1 16/28] riscv/shstk: If needed allocate a new shadow stack on clone, debug
- [RFC PATCH v1 17/28] prctl: arch-agnostic prctl for shadow stack, debug
- [RFC PATCH v1 18/28] prctl: arch-agnostic prtcl for indirect branch tracking, debug
- [RFC PATCH v1 19/28] riscv: Implements arch agnostic shadow stack prctls, debug
- [RFC PATCH v1 20/28] riscv: Implements arch argnostic indirect branch tracking prctls, debug
- [RFC PATCH v1 21/28] riscv/traps: Introduce software check exception, debug
- [RFC PATCH v1 22/28] riscv sigcontext: adding cfi state field in sigcontext, debug
- [RFC PATCH v1 23/28] riscv signal: Save and restore of shadow stack for signal, debug
[Index of Archives]
[Kernel Announce]
[Kernel Newbies]
[Linux RAID]
[IETF Annouce]
[Security]
[Netdev]
[Linux Wireless]
[Netfilter]
[Bugtraq]