<feed xmlns='http://www.w3.org/2005/Atom'>
<title>pm24.git/arch/csky/kernel/process.c, branch v5.6</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<id>https://git.kobert.dev/pm24.git/atom?h=v5.6</id>
<link rel='self' href='https://git.kobert.dev/pm24.git/atom?h=v5.6'/>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/'/>
<updated>2020-02-21T07:43:25Z</updated>
<entry>
<title>csky: Implement copy_thread_tls</title>
<updated>2020-02-21T07:43:25Z</updated>
<author>
<name>Guo Ren</name>
<email>guoren@linux.alibaba.com</email>
</author>
<published>2020-02-12T02:24:52Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=0b9f386c4be6493d282aab0af6f9b70c62142777'/>
<id>urn:sha1:0b9f386c4be6493d282aab0af6f9b70c62142777</id>
<content type='text'>
This is required for clone3 which passes the TLS value through a
struct rather than a register.

Cc: Amanieu d'Antras &lt;amanieu@gmail.com&gt;
Signed-off-by: Guo Ren &lt;guoren@linux.alibaba.com&gt;
</content>
</entry>
<entry>
<title>csky: Initial stack protector support</title>
<updated>2020-02-21T07:43:24Z</updated>
<author>
<name>Mao Han</name>
<email>han_mao@c-sky.com</email>
</author>
<published>2019-10-11T02:56:55Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=2f78c73f78c39dabc5c44ad8dd61fd6ec65636d6'/>
<id>urn:sha1:2f78c73f78c39dabc5c44ad8dd61fd6ec65636d6</id>
<content type='text'>
This is a basic -fstack-protector support without per-task canary
switching. The protector will report something like when stack
corruption is detected:

It's tested with strcpy local array overflow in sys_kill and get:
stack-protector: Kernel stack is corrupted in: sys_kill+0x23c/0x23c

TODO:
 - Support task switch for different cannary

Signed-off-by: Mao Han &lt;han_mao@c-sky.com&gt;
Signed-off-by: Guo Ren &lt;guoren@linux.alibaba.com&gt;
</content>
</entry>
<entry>
<title>csky: Fixup add zero_fp fixup perf backtrace panic</title>
<updated>2019-09-30T02:26:32Z</updated>
<author>
<name>Guo Ren</name>
<email>ren_guo@c-sky.com</email>
</author>
<published>2019-09-25T11:56:16Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=48ede51fd94fe9251058fc85626b2aeb5cbb5884'/>
<id>urn:sha1:48ede51fd94fe9251058fc85626b2aeb5cbb5884</id>
<content type='text'>
We need set fp zero to let backtrace know the end. The patch fixup perf
callchain panic problem, because backtrace didn't know what is the end
of fp.

Signed-off-by: Guo Ren &lt;ren_guo@c-sky.com&gt;
Reported-by: Mao Han &lt;han_mao@c-sky.com&gt;
</content>
</entry>
<entry>
<title>csky: stacktrace supported.</title>
<updated>2018-12-31T15:12:22Z</updated>
<author>
<name>Guo Ren</name>
<email>ren_guo@c-sky.com</email>
</author>
<published>2018-12-09T06:18:05Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=0ea2dc7cd668be5475babecaf6fdeaa464e2847b'/>
<id>urn:sha1:0ea2dc7cd668be5475babecaf6fdeaa464e2847b</id>
<content type='text'>
The gcc option "-mbacktrace" will push fp(r8),lr into stack and we could
unwind the stack with:
	fp = *fp
	lr = (unsigned int *)fp[1]

Signed-off-by: Guo Ren &lt;ren_guo@c-sky.com&gt;
</content>
</entry>
<entry>
<title>csky: Process management and Signal</title>
<updated>2018-10-25T16:54:13Z</updated>
<author>
<name>Guo Ren</name>
<email>ren_guo@c-sky.com</email>
</author>
<published>2018-09-05T06:25:14Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=e9564df753fd547fcbcd4fd10015c3b1213ef452'/>
<id>urn:sha1:e9564df753fd547fcbcd4fd10015c3b1213ef452</id>
<content type='text'>
This patch adds files related to task_switch, sigcontext, signal,
fpu context switch.

Signed-off-by: Guo Ren &lt;ren_guo@c-sky.com&gt;
Cc: Arnd Bergmann &lt;arnd@arndb.de&gt;
Cc: Eric W. Biederman &lt;ebiederm@xmission.com&gt;
</content>
</entry>
</feed>
