Series |
Control Flow Enforcement: Shadow Stack
|
expand
-
[RFC,v3,00/24] Control Flow Enforcement: Shadow Stack
-
[RFC,v3,01/24] x86/cpufeatures: Add CPUIDs for Control-flow Enforcement Technology (CET)
-
[RFC,v3,02/24] x86/fpu/xstate: Change some names to separate XSAVES system and user states
-
[RFC,v3,03/24] x86/fpu/xstate: Enable XSAVES system states
-
[RFC,v3,04/24] x86/fpu/xstate: Add XSAVES system states for shadow stack
-
[RFC,v3,05/24] Documentation/x86: Add CET description
-
[RFC,v3,06/24] x86/cet: Control protection exception handler
-
[RFC,v3,07/24] x86/cet/shstk: Add Kconfig option for user-mode shadow stack
-
[RFC,v3,08/24] mm: Introduce VM_SHSTK for shadow stack memory
-
[RFC,v3,09/24] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
-
[RFC,v3,10/24] x86/mm: Introduce _PAGE_DIRTY_SW
-
[RFC,v3,11/24] drm/i915/gvt: Update _PAGE_DIRTY to _PAGE_DIRTY_BITS
-
[RFC,v3,12/24] x86/mm: Modify ptep_set_wrprotect and pmdp_set_wrprotect for _PAGE_DIRTY_SW
-
[RFC,v3,13/24] x86/mm: Shadow stack page fault error checking
-
[RFC,v3,14/24] mm: Handle shadow stack page fault
-
[RFC,v3,15/24] mm: Handle THP/HugeTLB shadow stack page fault
-
[RFC,v3,16/24] mm: Update can_follow_write_pte/pmd for shadow stack
-
[RFC,v3,17/24] mm: Introduce do_mmap_locked()
-
[RFC,v3,18/24] x86/cet/shstk: User-mode shadow stack support
-
[RFC,v3,19/24] x86/cet/shstk: Introduce WRUSS instruction
-
[RFC,v3,20/24] x86/cet/shstk: Signal handling for shadow stack
-
[RFC,v3,21/24] x86/cet/shstk: ELF header parsing of Shadow Stack
-
[RFC,v3,22/24] x86/cet/shstk: Handle thread shadow stack
-
[RFC,v3,23/24] x86/cet/shstk: Add arch_prctl functions for Shadow Stack
-
[RFC,v3,24/24] x86/cet/shstk: Add Shadow Stack instructions to opcode map
|