Linux-arch Archive mirror
 help / color / mirror / Atom feed
 messages from 2017-07-16 03:59:40 to 2017-07-18 22:33:30 UTC [more...]

x86: PIE support and option to extend KASLR randomization
 2017-07-18 22:33 UTC  (20+ messages)
` [RFC 01/22] x86/crypto: Adapt assembly for PIE support
` [RFC 02/22] x86: Use symbol name on bug table "
` [RFC 03/22] x86: Use symbol name in jump "
` [RFC 04/22] x86: Add macro to get symbol address "
` [RFC 05/22] xen: Adapt assembly "
` [RFC 06/22] kvm: "
` [RFC 07/22] x86: relocate_kernel - "
` [RFC 08/22] x86/entry/64: "
` [RFC 09/22] x86: pm-trace - "
` [RFC 10/22] x86/CPU: "
` [RFC 11/22] x86/acpi: "
` [RFC 12/22] x86/boot/64: "
` [RFC 13/22] x86/power/64: "
` [RFC 14/22] x86/paravirt: "
` [RFC 15/22] x86/boot/64: Use _text in a global "
` [RFC 16/22] x86/percpu: Adapt percpu "
` [RFC 17/22] compiler: Option to default to hidden symbols
` [RFC 18/22] x86/relocs: Handle DYN relocations for PIE support
` [RFC 19/22] x86/pie: Add option to build the kernel as PIE for x86_64

[PATCH 0/8] signal: Fix sending signals with siginfo
 2017-07-18 18:22 UTC  (21+ messages)
                      ` [PATCH v2 0/7] "
                        ` [PATCH 1/7] signal/alpha: Document a conflict with SI_USER for SIGTRAP
                        ` [PATCH 4/7] signal/mips: Document a conflict with SI_USER with SIGFPE
                          ` [PATCH 2/7] signal/ia64: "
                          ` [PATCH 3/7] signal/sparc: "
                          ` [PATCH 5/7] signal/testing: Don't look for __SI_FAULT in userspace
                          ` [PATCH 6/7] fcntl: Don't use ambiguous SIG_POLL si_codes
                          ` [PATCH 7/7] signal: Remove kernel interal si_code magic

[PATCH v4 0/5] make io{read|write}64 globally usable
 2017-07-18 17:49 UTC  (13+ messages)
` [PATCH v4 1/5] powerpc: io.h: move iomap.h include so that it can use readq/writeq defs
` [PATCH v4 2/5] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
` [PATCH v4 3/5] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
` [PATCH v4 4/5] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
` [PATCH v4 5/5] crypto: caam: cleanup CONFIG_64BIT ifdefs when using io{read|write}64

[PATCH v10 00/38] x86: Secure Memory Encryption (AMD)
 2017-07-18 14:02 UTC  (86+ messages)
` [PATCH v10 01/38] x86: Document AMD Secure Memory Encryption (SME)
` [PATCH v10 02/38] x86/mm/pat: Set write-protect cache mode for full PAT support
` [PATCH v10 03/38] x86, mpparse, x86/acpi, x86/PCI, x86/dmi, SFI: Use memremap for RAM mappings
` [PATCH v10 04/38] x86/CPU/AMD: Add the Secure Memory Encryption CPU feature
` [PATCH v10 05/38] x86/CPU/AMD: Handle SME reduction in physical address size
` [PATCH v10 06/38] x86/mm: Add Secure Memory Encryption (SME) support
` [PATCH v10 07/38] x86/mm: Remove phys_to_virt() usage in ioremap()
` [PATCH v10 08/38] x86/mm: Add support to enable SME in early boot processing
` [PATCH v10 09/38] x86/mm: Simplify p[g4um]d_page() macros
` [PATCH v10 10/38] x86/mm: Provide general kernel support for memory encryption
` [PATCH v10 11/38] x86/mm: Add SME support for read_cr3_pa()
` [PATCH v10 12/38] x86/mm: Extend early_memremap() support with additional attrs
` [PATCH v10 13/38] x86/mm: Add support for early encrypt/decrypt of memory
` [PATCH v10 14/38] x86/mm: Insure that boot memory areas are mapped properly
` [PATCH v10 15/38] x86/boot/e820: Add support to determine the E820 type of an address
` [PATCH v10 16/38] efi: Add an EFI table address match function
` [PATCH v10 17/38] efi: Update efi_mem_type() to return an error rather than 0
` [PATCH v10 18/38] x86/efi: Update EFI pagetable creation to work with SME
` [PATCH v10 19/38] x86/mm: Add support to access boot related data in the clear
` [PATCH v10 20/38] x86, mpparse: Use memremap to map the mpf and mpc data
` [PATCH v10 21/38] x86/mm: Add support to access persistent memory in the clear
` [PATCH v10 22/38] x86/mm: Add support for changing the memory encryption attribute
` [PATCH v10 23/38] x86/realmode: Decrypt trampoline area if memory encryption is active
` [PATCH v10 24/38] x86, swiotlb: Add memory encryption support
` [PATCH v10 25/38] swiotlb: Add warnings for use of bounce buffers with SME
` [PATCH v10 26/38] x86/CPU/AMD: Make the microcode level available earlier in the boot
  ` [PATCH v10 27/38] iommu/amd: Allow the AMD IOMMU to work with memory encryption
` [PATCH v10 28/38] x86, realmode: Check for memory encryption on the APs
` [PATCH v10 29/38] x86, drm, fbdev: Do not specify encrypted memory for video mappings
` [PATCH v10 30/38] kvm: x86: svm: Support Secure Memory Encryption within KVM
` [PATCH v10 31/38] x86/mm, kexec: Allow kexec to be used with SME
` [PATCH v10 32/38] xen/x86: Remove SME feature in PV guests
` [PATCH v10 33/38] x86/mm: Use proper encryption attributes with /dev/mem
` [PATCH v10 34/38] x86/mm: Create native_make_p4d() for PGTABLE_LEVELS <= 4
` [PATCH v10 35/38] x86/mm: Add support to encrypt the kernel in-place
` [PATCH v10 36/38] x86/boot: Add early cmdline parsing for options with arguments
` [PATCH v10 37/38] compiler-gcc.h: Introduce __nostackp function attribute
` [PATCH v10 38/38] x86/mm: Add support to make use of Secure Memory Encryption

[PATCH 1/8] signal/alpha: Document a conflict with SI_USER for SIGTRAP
 2017-07-18 13:43 UTC  (12+ messages)
` [PATCH 3/8] signal/sparc: Document a conflict with SI_USER with SIGFPE

(unknown),
 2017-07-18  5:45 UTC 

semantics of dma_map_single()
 2017-07-17 16:46 UTC  (6+ messages)

(unknown),
 2017-07-17 15:42 UTC 

[PATCH] [PING] Fix TIOCGPTPEER ioctl definition
 2017-07-17 13:47 UTC  (4+ messages)

[PATCH 0/8] 5-level paging enabling for v4.14
 2017-07-17  5:45 UTC  (20+ messages)
` [PATCH 1/8] x86/dump_pagetables: Generalize address normalization
` [PATCH 2/8] x86/dump_pagetables: Fix printout of p4d level
` [PATCH 3/8] x86/xen: Redefine XEN_ELFNOTE_INIT_P2M using PUD_SIZE * PTRS_PER_PUD
` [PATCH 4/8] x86/mm: Rename tasksize_32bit/64bit to task_size_32bit/64bit
` [PATCH 5/8] x86/mpx: Do not allow MPX if we have mappings above 47-bit
` [PATCH 6/8] x86/mm: Prepare to expose larger address space to userspace
` [PATCH 7/8] x86/mm: Allow userspace have mapping above 47-bit
` [PATCH 8/8] x86: Enable 5-level paging support

(unknown),
 2017-07-17  1:20 UTC 

[RFC v6 00/62] powerpc: Memory Protection Keys
 2017-07-16  3:57 UTC  (45+ messages)
` [RFC v6 40/62] x86: delete arch_show_smap()
` [RFC v6 41/62] selftest/x86: Move protecton key selftest to arch neutral directory
` [RFC v6 42/62] selftest/vm: rename all references to pkru to a generic name
` [RFC v6 43/62] selftest/vm: move generic definitions to header file
` [RFC v6 44/62] selftest/vm: typecast the pkey register
` [RFC v6 45/62] selftest/vm: generics function to handle shadow key register
` [RFC v6 46/62] selftest/vm: fix the wrong assert in pkey_disable_set()
` [RFC v6 47/62] selftest/vm: fixed bugs in pkey_disable_clear()
` [RFC v6 48/62] selftest/vm: clear the bits in shadow reg when a pkey is freed
` [RFC v6 49/62] selftest/vm: fix alloc_random_pkey() to make it really random
` [RFC v6 50/62] selftest/vm: introduce two arch independent abstraction
` [RFC v6 51/62] selftest/vm: pkey register should match shadow pkey
` [RFC v6 52/62] selftest/vm: generic cleanup
` [RFC v6 53/62] selftest/vm: powerpc implementation for generic abstraction
` [RFC v6 54/62] selftest/vm: fix an assertion in test_pkey_alloc_exhaust()
` [RFC v6 55/62] selftest/vm: associate key on a mapped page and detect access violation
` [RFC v6 56/62] selftest/vm: detect no key violation on a freed key
` [RFC v6 57/62] selftest/vm: associate key on a mapped page and detect write violation
` [RFC v6 58/62] selftest/vm: detect no write key-violation on a freed key
` [RFC v6 59/62] selftest/vm: detect write violation on a mapped access-denied-key page
` [RFC v6 60/62] selftest/vm: sub-page allocator
` [RFC v6 61/62] Documentation/x86: Move protecton key documentation to arch neutral directory
` [RFC v6 62/62] Documentation/vm: PowerPC specific updates to memory protection keys


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).