Toggle navigation
Patchwork
linux-kselftest
Patches
Bundles
About this project
Login
Register
Mail settings
Show patches with
: Submitter =
Mark Brown
| Archived =
No
| 1312 patches
Series
Submitter
State
any
Action Required
New
Under Review
Accepted
Rejected
RFC
Not Applicable
Changes Requested
Awaiting Upstream
Superseded
Deferred
Search
Archived
No
Yes
Both
Delegate
------
Nobody
andy.doan@linaro.org
andy.doan@linaro.org
Apply
«
1
2
...
3
4
5
…
13
14
»
Patch
Series
S/W/F
Date
Submitter
Delegate
State
[v9,23/39] arm64/signal: Set up and restore the GCS context for signal handlers
[v9,01/39] arm64/mm: Restructure arch_validate_flags() for extensibility
-
-
-
2024-06-25
Mark Brown
Superseded
[v9,21/39] arm64/gcs: Implement shadow stack prctl() interface
[v9,01/39] arm64/mm: Restructure arch_validate_flags() for extensibility
-
-
-
2024-06-25
Mark Brown
Superseded
[v9,19/39] arm64/gcs: Context switch GCS state for EL0
[v9,01/39] arm64/mm: Restructure arch_validate_flags() for extensibility
-
-
-
2024-06-25
Mark Brown
Superseded
[v9,17/39] arm64/traps: Handle GCS exceptions
[v9,01/39] arm64/mm: Restructure arch_validate_flags() for extensibility
-
-
-
2024-06-25
Mark Brown
Superseded
[v9,15/39] arm64/idreg: Add overrride for GCS
[v9,01/39] arm64/mm: Restructure arch_validate_flags() for extensibility
-
-
-
2024-06-25
Mark Brown
Superseded
[v9,13/39] KVM: arm64: Manage GCS registers for guests
[v9,01/39] arm64/mm: Restructure arch_validate_flags() for extensibility
-
-
-
2024-06-25
Mark Brown
New
[v9,11/39] mm: Define VM_SHADOW_STACK for arm64 when we support GCS
[v9,01/39] arm64/mm: Restructure arch_validate_flags() for extensibility
-
-
-
2024-06-25
Mark Brown
New
[v9,09/39] arm64/cpufeature: Runtime detection of Guarded Control Stack (GCS)
[v9,01/39] arm64/mm: Restructure arch_validate_flags() for extensibility
-
-
-
2024-06-25
Mark Brown
New
[v9,07/39] arm64/gcs: Add manual encodings of GCS instructions
[v9,01/39] arm64/mm: Restructure arch_validate_flags() for extensibility
-
-
-
2024-06-25
Mark Brown
Superseded
[v9,05/39] arm64/gcs: Document the ABI for Guarded Control Stacks
[v9,01/39] arm64/mm: Restructure arch_validate_flags() for extensibility
-
-
-
2024-06-25
Mark Brown
Superseded
[v9,03/39] mman: Add map_shadow_stack() flags
[v9,01/39] arm64/mm: Restructure arch_validate_flags() for extensibility
-
-
-
2024-06-25
Mark Brown
Superseded
[v9,01/39] arm64/mm: Restructure arch_validate_flags() for extensibility
[v9,01/39] arm64/mm: Restructure arch_validate_flags() for extensibility
-
-
-
2024-06-25
Mark Brown
Superseded
[RFT,v6,9/9] selftests/clone3: Test shadow stack support
fork: Support shadow stacks in clone3()
-
-
-
2024-06-23
Mark Brown
Superseded
[RFT,v6,8/9] selftests/clone3: Allow tests to flag if -E2BIG is a valid error code
fork: Support shadow stacks in clone3()
-
-
-
2024-06-23
Mark Brown
Superseded
[RFT,v6,7/9] selftests/clone3: Explicitly handle child exits due to signals
fork: Support shadow stacks in clone3()
-
-
-
2024-06-23
Mark Brown
Superseded
[RFT,v6,6/9] selftests/clone3: Factor more of main loop into test_clone3()
fork: Support shadow stacks in clone3()
-
-
-
2024-06-23
Mark Brown
Superseded
[RFT,v6,5/9] selftests/clone3: Remove redundant flushes of output streams
fork: Support shadow stacks in clone3()
-
-
-
2024-06-23
Mark Brown
Superseded
[RFT,v6,4/9] fork: Add shadow stack support to clone3()
fork: Support shadow stacks in clone3()
-
-
-
2024-06-23
Mark Brown
Superseded
[RFT,v6,3/9] mm: Introduce ARCH_HAS_USER_SHADOW_STACK
fork: Support shadow stacks in clone3()
-
-
-
2024-06-23
Mark Brown
Superseded
[RFT,v6,2/9] selftests: Provide helper header for shadow stack testing
fork: Support shadow stacks in clone3()
-
-
-
2024-06-23
Mark Brown
Superseded
[RFT,v6,1/9] Documentation: userspace-api: Add shadow stack API documentation
fork: Support shadow stacks in clone3()
-
-
-
2024-06-23
Mark Brown
Superseded
kselftest/alsa: Fix validation of writes to volatile controls
kselftest/alsa: Fix validation of writes to volatile controls
-
-
-
2024-06-14
Mark Brown
Superseded
selftests: mm: Make map_fixed_noreplace test names stable
selftests: mm: Make map_fixed_noreplace test names stable
-
-
-
2024-06-05
Mark Brown
Accepted
kselftest/arm64: Include kernel mode NEON in fp-stress
kselftest/arm64: Include kernel mode NEON in fp-stress
-
-
-
2024-05-21
Mark Brown
Accepted
kselftest: Desecalate reporting of missing _GNU_SOURCE
kselftest: Desecalate reporting of missing _GNU_SOURCE
-
-
-
2024-05-16
Mark Brown
New
kselftest/alsa: Ensure _GNU_SOURCE is defined
kselftest/alsa: Ensure _GNU_SOURCE is defined
-
-
-
2024-05-16
Mark Brown
Accepted
selftests/clone3: Correct log message for waitpid() failures
selftests/clone3: Correct log message for waitpid() failures
-
-
-
2024-04-09
Mark Brown
Accepted
[v6,5/5] KVM: arm64: selftests: Teach get-reg-list about FPMR
KVM: arm64: Support for 2023 dpISA extensions
-
-
-
2024-03-29
Mark Brown
New
[v6,4/5] KVM: arm64: selftests: Document feature registers added in 2023 extensions
KVM: arm64: Support for 2023 dpISA extensions
-
-
-
2024-03-29
Mark Brown
New
[v6,3/5] KVM: arm64: Support FEAT_FPMR for guests
KVM: arm64: Support for 2023 dpISA extensions
-
-
-
2024-03-29
Mark Brown
New
[v6,2/5] KVM: arm64: Add newly allocated ID registers to register descriptions
KVM: arm64: Support for 2023 dpISA extensions
-
-
-
2024-03-29
Mark Brown
New
[v6,1/5] KVM: arm64: Share all userspace hardened thread data with the hypervisor
KVM: arm64: Support for 2023 dpISA extensions
-
-
-
2024-03-29
Mark Brown
New
[2/2] tracing/selftests: Default to verbose mode when running in kselftest
tracing/selftests: Verbosity improvements to KTAP output
-
-
-
2024-03-25
Mark Brown
Accepted
[v3] kselftest/clone3: Make test names for set_tid test stable
[v3] kselftest/clone3: Make test names for set_tid test stable
-
-
-
2024-03-25
Mark Brown
Accepted
[v5,8/9] kselftest/arm64: Add basic FPMR test
arm64: Support for 2023 DPISA extensions
-
-
-
2024-03-06
Mark Brown
Accepted
[v5,6/9] arm64/hwcap: Define hwcaps for 2023 DPISA features
arm64: Support for 2023 DPISA extensions
-
-
-
2024-03-06
Mark Brown
Accepted
[v5,4/9] arm64/signal: Add FPMR signal handling
arm64: Support for 2023 DPISA extensions
-
-
-
2024-03-06
Mark Brown
Accepted
[v5,2/9] arm64/fpsimd: Enable host kernel access to FPMR
arm64: Support for 2023 DPISA extensions
-
-
-
2024-03-06
Mark Brown
Accepted
[2/2] kselftest/tty: Report a consistent test name for the one test we run
kselftest/tty: Improve integration with automated systems
-
-
-
2024-03-06
Mark Brown
Accepted
selftests: fuxex: Report a unique test name per run of futex_requeue_pi
selftests: fuxex: Report a unique test name per run of futex_requeue_pi
-
-
-
2024-02-13
Mark Brown
Accepted
selftests/mm: Don't needlessly use sudo to obtain root in run_vmtests.sh
selftests/mm: Don't needlessly use sudo to obtain root in run_vmtests.sh
-
-
-
2024-02-09
Mark Brown
New
[1/2] selftests/mm: Log skipped compaction test as a skip
[1/2] selftests/mm: Log skipped compaction test as a skip
-
-
-
2024-02-09
Mark Brown
Accepted
[v8,38/38] kselftest: Provide shadow stack enable helpers for arm64
arm64/gcs: Provide support for GCS in userspace
-
-
-
2024-02-03
Mark Brown
New
[v8,36/38] kselftest/arm64: Add a GCS stress test
arm64/gcs: Provide support for GCS in userspace
-
-
-
2024-02-03
Mark Brown
Superseded
[v8,34/38] kselftest/arm64: Add test coverage for GCS mode locking
arm64/gcs: Provide support for GCS in userspace
-
-
-
2024-02-03
Mark Brown
Superseded
[v8,32/38] kselftest/arm64: Add very basic GCS test program
arm64/gcs: Provide support for GCS in userspace
-
-
-
2024-02-03
Mark Brown
New
[v8,30/38] kselftest/arm64: Allow signals tests to specify an expected si_code
arm64/gcs: Provide support for GCS in userspace
-
-
-
2024-02-03
Mark Brown
Superseded
[v8,28/38] kselftest/arm64: Add GCS as a detected feature in the signal tests
arm64/gcs: Provide support for GCS in userspace
-
-
-
2024-02-03
Mark Brown
Superseded
[v8,26/38] arm64: Add Kconfig for Guarded Control Stack (GCS)
arm64/gcs: Provide support for GCS in userspace
-
-
-
2024-02-03
Mark Brown
Superseded
[v8,24/38] arm64/signal: Expose GCS state in signal frames
arm64/gcs: Provide support for GCS in userspace
-
-
-
2024-02-03
Mark Brown
New
[v8,22/38] arm64/mm: Implement map_shadow_stack()
arm64/gcs: Provide support for GCS in userspace
-
-
-
2024-02-03
Mark Brown
Superseded
[v8,20/38] arm64/gcs: Ensure that new threads have a GCS
arm64/gcs: Provide support for GCS in userspace
-
-
-
2024-02-03
Mark Brown
New
[v8,18/38] arm64/mm: Handle GCS data aborts
arm64/gcs: Provide support for GCS in userspace
-
-
-
2024-02-03
Mark Brown
New
[v8,16/38] arm64/hwcap: Add hwcap for GCS
arm64/gcs: Provide support for GCS in userspace
-
-
-
2024-02-03
Mark Brown
New
[v8,14/38] arm64/gcs: Allow GCS usage at EL0 and EL1
arm64/gcs: Provide support for GCS in userspace
-
-
-
2024-02-03
Mark Brown
New
[v8,12/38] arm64/mm: Map pages for guarded control stack
arm64/gcs: Provide support for GCS in userspace
-
-
-
2024-02-03
Mark Brown
New
[v8,10/38] arm64/mm: Allocate PIE slots for EL0 guarded control stack
arm64/gcs: Provide support for GCS in userspace
-
-
-
2024-02-03
Mark Brown
Superseded
[v8,08/38] arm64/gcs: Provide put_user_gcs()
arm64/gcs: Provide support for GCS in userspace
-
-
-
2024-02-03
Mark Brown
Superseded
[v8,06/38] arm64/sysreg: Add definitions for architected GCS caps
arm64/gcs: Provide support for GCS in userspace
-
-
-
2024-02-03
Mark Brown
Superseded
[v8,04/38] arm64: Document boot requirements for Guarded Control Stacks
arm64/gcs: Provide support for GCS in userspace
-
-
-
2024-02-03
Mark Brown
Superseded
[v8,02/38] prctl: arch-agnostic prctl for shadow stack
arm64/gcs: Provide support for GCS in userspace
-
-
-
2024-02-03
Mark Brown
Superseded
[RFT,v5,7/7] selftests/clone3: Test shadow stack support
[RFT,v5,1/7] Documentation: userspace-api: Add shadow stack API documentation
-
-
-
2024-02-03
Mark Brown
New
[RFT,v5,5/7] selftests/clone3: Factor more of main loop into test_clone3()
[RFT,v5,1/7] Documentation: userspace-api: Add shadow stack API documentation
-
-
-
2024-02-03
Mark Brown
Superseded
[RFT,v5,3/7] mm: Introduce ARCH_HAS_USER_SHADOW_STACK
[RFT,v5,1/7] Documentation: userspace-api: Add shadow stack API documentation
-
-
-
2024-02-03
Mark Brown
Superseded
[RFT,v5,1/7] Documentation: userspace-api: Add shadow stack API documentation
[RFT,v5,1/7] Documentation: userspace-api: Add shadow stack API documentation
-
-
-
2024-02-03
Mark Brown
Superseded
[v4,2/2] kselftest/seccomp: Report each expectation we assert as a KTAP test
kselftest/seccomp: Convert to KTAP output
-
-
-
2024-01-24
Mark Brown
Accepted
[v4,1/2] kselftest/seccomp: Use kselftest output functions for benchmark
kselftest/seccomp: Convert to KTAP output
-
-
-
2024-01-24
Mark Brown
Accepted
[v3,2/2] kselftest/seccomp: Report each expectation we assert as a KTAP test
kselftest/seccomp: Convert to KTAP output
-
-
-
2024-01-22
Mark Brown
Superseded
[v4,14/14] KVM: arm64: selftests: Teach get-reg-list about FPMR
arm64: Support for 2023 DPISA extensions
-
-
-
2024-01-22
Mark Brown
Superseded
[v4,12/14] KVM: arm64: Support FEAT_FPMR for guests
arm64: Support for 2023 DPISA extensions
-
-
-
2024-01-22
Mark Brown
New
[v4,10/14] KVM: arm64: Share all userspace hardened thread data with the hypervisor
arm64: Support for 2023 DPISA extensions
-
-
-
2024-01-22
Mark Brown
Superseded
[v4,08/14] kselftest/arm64: Add basic FPMR test
arm64: Support for 2023 DPISA extensions
-
-
-
2024-01-22
Mark Brown
Superseded
[v4,06/14] arm64/hwcap: Define hwcaps for 2023 DPISA features
arm64: Support for 2023 DPISA extensions
-
-
-
2024-01-22
Mark Brown
Superseded
[v4,04/14] arm64/signal: Add FPMR signal handling
arm64: Support for 2023 DPISA extensions
-
-
-
2024-01-22
Mark Brown
Superseded
[v4,02/14] arm64/fpsimd: Enable host kernel access to FPMR
arm64: Support for 2023 DPISA extensions
-
-
-
2024-01-22
Mark Brown
Superseded
[v2,1/2] kselftest/seccomp: Use kselftest output functions for benchmark
[v2,1/2] kselftest/seccomp: Use kselftest output functions for benchmark
-
-
-
2024-01-22
Mark Brown
Superseded
[RFC,v2,22/22] KVM: arm64: selftests: Add SME system registers to get-reg-list
KVM: arm64: Implement support for SME in non-protected guests
-
-
-
2023-12-22
Mark Brown
Superseded
[RFC,v2,21/22] KVM: arm64: Provide userspace ABI for enabling SME
KVM: arm64: Implement support for SME in non-protected guests
-
-
-
2023-12-22
Mark Brown
New
[RFC,v2,20/22] KVM: arm64: Support SME version configuration via ID registers
KVM: arm64: Implement support for SME in non-protected guests
-
-
-
2023-12-22
Mark Brown
New
[RFC,v2,19/22] KVM: arm64: Provide userspace access to ZT0
KVM: arm64: Implement support for SME in non-protected guests
-
-
-
2023-12-22
Mark Brown
New
[RFC,v2,18/22] KVM: arm64: Expose ZA to userspace
KVM: arm64: Implement support for SME in non-protected guests
-
-
-
2023-12-22
Mark Brown
New
[RFC,v2,17/22] KVM: arm64: Support userspace access to streaming mode SVE registers
KVM: arm64: Implement support for SME in non-protected guests
-
-
-
2023-12-22
Mark Brown
New
[RFC,v2,16/22] KVM: arm64: Rename sve_state_reg_region
KVM: arm64: Implement support for SME in non-protected guests
-
-
-
2023-12-22
Mark Brown
Superseded
[RFC,v2,15/22] KVM: arm64: Implement SME vector length configuration
KVM: arm64: Implement support for SME in non-protected guests
-
-
-
2023-12-22
Mark Brown
New
[RFC,v2,14/22] KVM: arm64: Manage and handle SME traps
KVM: arm64: Implement support for SME in non-protected guests
-
-
-
2023-12-22
Mark Brown
New
[RFC,v2,13/22] KVM: arm64: Context switch SME state for guest
KVM: arm64: Implement support for SME in non-protected guests
-
-
-
2023-12-22
Mark Brown
New
[RFC,v2,12/22] KVM: arm64: Make SVCR a normal system register
KVM: arm64: Implement support for SME in non-protected guests
-
-
-
2023-12-22
Mark Brown
New
[RFC,v2,11/22] KVM: arm64: Make SMPRI_EL1 RES0 for SME guests
KVM: arm64: Implement support for SME in non-protected guests
-
-
-
2023-12-22
Mark Brown
New
[RFC,v2,10/22] KVM: arm64: Add support for TPIDR2_EL0
KVM: arm64: Implement support for SME in non-protected guests
-
-
-
2023-12-22
Mark Brown
New
[RFC,v2,09/22] KVM: arm64: Basic SME system register descriptions
KVM: arm64: Implement support for SME in non-protected guests
-
-
-
2023-12-22
Mark Brown
New
[RFC,v2,08/22] KVM: arm64: Rename SVE finalization constants to be more general
KVM: arm64: Implement support for SME in non-protected guests
-
-
-
2023-12-22
Mark Brown
New
[RFC,v2,07/22] KVM: arm64: Define guest flags for SME
KVM: arm64: Implement support for SME in non-protected guests
-
-
-
2023-12-22
Mark Brown
New
[RFC,v2,06/22] KVM: arm64: Make FFR restore optional in __sve_restore_state()
KVM: arm64: Implement support for SME in non-protected guests
-
-
-
2023-12-22
Mark Brown
New
[RFC,v2,05/22] KVM: arm64: Document the KVM ABI for SME
KVM: arm64: Implement support for SME in non-protected guests
-
-
-
2023-12-22
Mark Brown
Superseded
[RFC,v2,04/22] KVM: arm64: Store vector lengths in an array
KVM: arm64: Implement support for SME in non-protected guests
-
-
-
2023-12-22
Mark Brown
New
[RFC,v2,03/22] KVM: arm64: Move SVE state access macros after feature test macros
KVM: arm64: Implement support for SME in non-protected guests
-
-
-
2023-12-22
Mark Brown
Superseded
[RFC,v2,02/22] arm64/fpsimd: Make SVE<->FPSIMD rewriting available to KVM
KVM: arm64: Implement support for SME in non-protected guests
-
-
-
2023-12-22
Mark Brown
New
[RFC,v2,01/22] KVM: arm64: Document why we trap SVE access from the host
KVM: arm64: Implement support for SME in non-protected guests
-
-
-
2023-12-22
Mark Brown
New
[2/2] kselftest/seccomp: Report each expectation we assert as a KTAP test
kselftest/seccomp: Convert to KTAP output
-
-
-
2023-12-19
Mark Brown
Superseded
[1/2] kselftest/seccomp: Use kselftest output functions for benchmark
kselftest/seccomp: Convert to KTAP output
-
-
-
2023-12-19
Mark Brown
Superseded
«
1
2
...
3
4
5
…
13
14
»