aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/tools/perf/scripts/python/export-to-postgresql.py (unfollow)
AgeCommit message (Expand)AuthorFilesLines
2024-11-01arm64/gcs: Fix outdated ptrace documentationMark Brown1-5/+2
2024-10-16kselftest/arm64: Ensure stable names for GCS stress test resultsMark Brown1-3/+3
2024-10-16kselftest/arm64: Validate that GCS push and write permissions workMark Brown4-1/+204
2024-10-04kselftest/arm64: Enable GCS for the FP stress testsMark Brown5-0/+23
2024-10-04kselftest/arm64: Add a GCS stress testMark Brown5-1/+848
2024-10-04kselftest/arm64: Add GCS signal testsMark Brown5-0/+228
2024-10-04kselftest/arm64: Add test coverage for GCS mode lockingMark Brown3-1/+202
2024-10-04kselftest/arm64: Add a GCS test program built with the system libcMark Brown4-1/+742
2024-10-04kselftest/arm64: Add very basic GCS test programMark Brown5-1/+467
2024-10-04kselftest/arm64: Always run signals tests with GCS enabledMark Brown2-1/+45
2024-10-04kselftest/arm64: Allow signals tests to specify an expected si_codeMark Brown2-10/+23
2024-10-04kselftest/arm64: Add framework support for GCS to signal handling testsMark Brown2-0/+8
2024-10-04kselftest/arm64: Add GCS as a detected feature in the signal testsMark Brown2-0/+5
2024-10-04kselftest/arm64: Verify the GCS hwcapMark Brown1-0/+19
2024-10-04arm64: Add Kconfig for Guarded Control Stack (GCS)Mark Brown1-0/+21
2024-10-04arm64/ptrace: Expose GCS via ptrace and core filesMark Brown3-1/+70
2024-10-04arm64/signal: Expose GCS state in signal framesMark Brown2-0/+118
2024-10-04arm64/signal: Set up and restore the GCS context for signal handlersMark Brown2-5/+114
2024-10-04arm64/mm: Implement map_shadow_stack()Mark Brown1-0/+64
2024-10-04arm64/gcs: Implement shadow stack prctl() interfaceMark Brown3-0/+102
2024-10-04arm64/gcs: Ensure that new threads have a GCSMark Brown4-0/+119
2024-10-04arm64/gcs: Context switch GCS state for EL0Mark Brown5-0/+135
2024-10-04arm64/mm: Handle GCS data abortsMark Brown1-0/+40
2024-10-04arm64/traps: Handle GCS exceptionsMark Brown4-1/+63
2024-10-04arm64/hwcap: Add hwcap for GCSMark Brown5-1/+11
2024-10-04arm64/idreg: Add overrride for GCSMark Brown2-0/+5
2024-10-04arm64/mm: Map pages for guarded control stackMark Brown2-1/+17
2024-10-04mm: Define VM_SHADOW_STACK for arm64 when we support GCSMark Brown2-2/+12
2024-10-04arm64/mm: Allocate PIE slots for EL0 guarded control stackMark Brown1-2/+12
2024-10-04arm64/cpufeature: Runtime detection of Guarded Control Stack (GCS)Mark Brown3-0/+27
2024-10-04arm64/gcs: Provide basic EL2 setup to allow GCS usage at EL0 and EL1Mark Brown1-0/+30
2024-10-04arm64/gcs: Provide put_user_gcs()Mark Brown1-0/+18
2024-10-04arm64/gcs: Add manual encodings of GCS instructionsMark Brown2-0/+73
2024-10-04arm64/sysreg: Add definitions for architected GCS capsMark Brown1-0/+20
2024-10-04arm64/gcs: Document the ABI for Guarded Control StacksMark Brown2-0/+231
2024-10-04arm64: Document boot requirements for Guarded Control StacksMark Brown1-0/+32
2024-10-04mman: Add map_shadow_stack() flagsMark Brown2-3/+4
2024-10-04prctl: arch-agnostic prctl for shadow stackMark Brown3-0/+56
2024-10-04arm64/mm: Restructure arch_validate_flags() for extensibilityMark Brown1-4/+10
2024-10-04mm: Define VM_HIGH_ARCH_6Mark Brown1-0/+2
2024-10-04mm: Introduce ARCH_HAS_USER_SHADOW_STACKMark Brown3-1/+8
2024-09-29Linux 6.12-rc1Linus Torvalds1-2/+2
2024-09-29x86: kvm: fix build errorLinus Torvalds1-0/+2
2024-09-28Reduce Coccinelle choices in string_choices.cocciJulia Lawall1-50/+41
2024-09-28coccinelle: Remove unnecessary parentheses for only one possible change.Hongbo Li1-8/+0
2024-09-28coccinelle: Add rules to find str_yes_no() replacementsHongbo Li1-0/+19
2024-09-28coccinelle: Add rules to find str_on_off() replacementsHongbo Li1-0/+19
2024-09-28coccinelle: Add rules to find str_write_read() replacementsHongbo Li1-0/+19
2024-09-28coccinelle: Add rules to find str_read_write() replacementsHongbo Li1-0/+19
2024-09-28coccinelle: Add rules to find str_enable{d}_disable{d}() replacementsHongbo Li1-0/+38