{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":64842136,"defaultBranch":"master","name":"criu","ownerLogin":"rppt","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2016-08-03T11:49:28.000Z","ownerAvatar":"https://github.com/avatars/u/19757326?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1690037088.0","currentOid":""},"activityList":{"items":[{"before":"ad4c7cc1349ed0ba37594b057bd963f529b53b27","after":"394dab0b0344d7579f8e58df134b614d0efe7d84","ref":"refs/heads/shstk/v1","pushedAt":"2023-11-30T09:42:53.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rppt","name":"Mike Rapoport","path":"/rppt","primaryAvatarUrl":"https://github.com/avatars/u/19757326?s=80&v=4"},"commit":{"message":"restorer: shstk: implement shadow stack restore\n\nThe restore of a task with shadow stack enabled adds these steps:\n\n* switch from the default shadow stack to a temporary shadow stack\n allocated in the premmaped area\n* unmap CRIU mappings; nothing changed here, but it's important that\n CRIU mappings can be removed only after switching to a temporary\n shadow stack\n* create shadow stack VMA with map_shadow_stack()\n* restore shadow stack contents with wrss\n* switch to \"real\" shadow stack\n* lock shadow stack features\n\nSigned-off-by: Mike Rapoport (IBM) ","shortMessageHtmlLink":"restorer: shstk: implement shadow stack restore"}},{"before":"9cd953cfc192c933932793043fc4f999dccd2ad4","after":"ad4c7cc1349ed0ba37594b057bd963f529b53b27","ref":"refs/heads/shstk/v1","pushedAt":"2023-11-30T06:51:44.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rppt","name":"Mike Rapoport","path":"/rppt","primaryAvatarUrl":"https://github.com/avatars/u/19757326?s=80&v=4"},"commit":{"message":"restorer: shstk: implement shadow stack restore\n\nThe restore of a task with shadow stack enabled adds these steps:\n\n* switch from the default shadow stack to a temporary shadow stack\n allocated in the premmaped area\n* unmap CRIU mappings; nothing changed here, but it's important that\n CRIU mappings can be removed only after switching to a temporary\n shadow stack\n* create shadow stack VMA with map_shadow_stack()\n* restore shadow stack contents with wrss\n* switch to \"real\" shadow stack\n* lock shadow stack features\n\nSigned-off-by: Mike Rapoport (IBM) ","shortMessageHtmlLink":"restorer: shstk: implement shadow stack restore"}},{"before":"b126e068579a6380218c9125f0c9a6e7af6b4f4b","after":"9cd953cfc192c933932793043fc4f999dccd2ad4","ref":"refs/heads/shstk/v1","pushedAt":"2023-11-30T06:40:03.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rppt","name":"Mike Rapoport","path":"/rppt","primaryAvatarUrl":"https://github.com/avatars/u/19757326?s=80&v=4"},"commit":{"message":"restorer: shstk: implement shadow stack restore\n\nThe restore of a task with shadow stack enabled adds these steps:\n\n* switch from the default shadow stack to a temporary shadow stack\n allocated in the premmaped area\n* unmap CRIU mappings; nothing changed here, but it's important that\n CRIU mappings can be removed only after switching to a temporary\n shadow stack\n* create shadow stack VMA with map_shadow_stack()\n* restore shadow stack contents with wrss\n* switch to \"real\" shadow stack\n* lock shadow stack features\n\nSigned-off-by: Mike Rapoport (IBM) ","shortMessageHtmlLink":"restorer: shstk: implement shadow stack restore"}},{"before":"8fad7b311acef1852c62aa1ef1dcde9eaaff3ac8","after":"b126e068579a6380218c9125f0c9a6e7af6b4f4b","ref":"refs/heads/shstk/v1","pushedAt":"2023-11-30T06:08:02.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rppt","name":"Mike Rapoport","path":"/rppt","primaryAvatarUrl":"https://github.com/avatars/u/19757326?s=80&v=4"},"commit":{"message":"restorer: shstk: impolement shadow stack restore\n\nThe restore of a task with shadow stack enabled adds these steps:\n\n* switch from the default shadow stack to a temporary shadow stack\n allocated in the premmaped area\n* unmap CRIU mappings; nothing changed here, but it's important that\n CRIU mappings can be removed only after switching to a temporary\n shadow stack\n* create shadow stack VMA with map_shadow_stack()\n* restore shadow stack contents with wrss\n* switch to \"real\" shadow stack\n* lock shadow stack features\n\nSigned-off-by: Mike Rapoport (IBM) ","shortMessageHtmlLink":"restorer: shstk: impolement shadow stack restore"}},{"before":"f924d36812d545cdd5ce928a384b72de70d22842","after":"8fad7b311acef1852c62aa1ef1dcde9eaaff3ac8","ref":"refs/heads/shstk/v1","pushedAt":"2023-11-29T20:45:36.000Z","pushType":"push","commitsCount":4,"pusher":{"login":"rppt","name":"Mike Rapoport","path":"/rppt","primaryAvatarUrl":"https://github.com/avatars/u/19757326?s=80&v=4"},"commit":{"message":"treat EINVAL from prtace(ARCH_SHSTK_STATUS) as no kernel support for shstk","shortMessageHtmlLink":"treat EINVAL from prtace(ARCH_SHSTK_STATUS) as no kernel support for …"}},{"before":"349f22a9c41b4e0662aea334a4a495a24cf93c09","after":"f924d36812d545cdd5ce928a384b72de70d22842","ref":"refs/heads/shstk/v1","pushedAt":"2023-11-29T20:34:06.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rppt","name":"Mike Rapoport","path":"/rppt","primaryAvatarUrl":"https://github.com/avatars/u/19757326?s=80&v=4"},"commit":{"message":"restorer: shstk: impolement shadow stack restore\n\nThe restore of a task with shadow stack enabled adds these steps:\n\n* switch from the default shadow stack to a temporary shadow stack\n allocated in the premmaped area\n* unmap CRIU mappings; nothing changed here, but it's important that\n CRIU mappings can be removed only after switching to a temporary\n shadow stack\n* create shadow stack VMA with map_shadow_stack()\n* restore shadow stack contents with wrss\n* switch to \"real\" shadow stack\n* lock shadow stack features\n\nSigned-off-by: Mike Rapoport (IBM) ","shortMessageHtmlLink":"restorer: shstk: impolement shadow stack restore"}},{"before":"2ec0562231fdd8395d8f6a94c079ec8ed05939b1","after":"349f22a9c41b4e0662aea334a4a495a24cf93c09","ref":"refs/heads/shstk/v1","pushedAt":"2023-09-27T08:37:19.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rppt","name":"Mike Rapoport","path":"/rppt","primaryAvatarUrl":"https://github.com/avatars/u/19757326?s=80&v=4"},"commit":{"message":"x86/shstk: don't unlock shadow stack for zombies\n\nSigned-off-by: Mike Rapoport (IBM) ","shortMessageHtmlLink":"x86/shstk: don't unlock shadow stack for zombies"}},{"before":"9948a5d5c4fa86edfab85956d5e0721f488def04","after":"2ec0562231fdd8395d8f6a94c079ec8ed05939b1","ref":"refs/heads/shstk/v1","pushedAt":"2023-09-20T06:49:19.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"rppt","name":"Mike Rapoport","path":"/rppt","primaryAvatarUrl":"https://github.com/avatars/u/19757326?s=80&v=4"},"commit":{"message":"x86/shstk: don't check fpregs if there is no X86_FEATURE_FPU\n\nSigned-off-by: Mike Rapoport (IBM) ","shortMessageHtmlLink":"x86/shstk: don't check fpregs if there is no X86_FEATURE_FPU"}},{"before":"c69ad34f76a8993588bcca347e2a909b5fb682f7","after":"9948a5d5c4fa86edfab85956d5e0721f488def04","ref":"refs/heads/shstk/v1","pushedAt":"2023-09-20T05:58:53.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rppt","name":"Mike Rapoport","path":"/rppt","primaryAvatarUrl":"https://github.com/avatars/u/19757326?s=80&v=4"},"commit":{"message":"shstk: complel fix SIGRETURN_DUMP for 32-bit compatibility mode\n\nSigned-off-by: Mike Rapoport (IBM) ","shortMessageHtmlLink":"shstk: complel fix SIGRETURN_DUMP for 32-bit compatibility mode"}},{"before":"f8da36d821652fec9e7a711dbb9f9f66e0837291","after":"c69ad34f76a8993588bcca347e2a909b5fb682f7","ref":"refs/heads/shstk/v1","pushedAt":"2023-07-23T14:55:33.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"rppt","name":"Mike Rapoport","path":"/rppt","primaryAvatarUrl":"https://github.com/avatars/u/19757326?s=80&v=4"},"commit":{"message":"shstk: complel fix SIGRETURN_DUMP for 32-bit compatibility mode\n\nSigned-off-by: Mike Rapoport (IBM) ","shortMessageHtmlLink":"shstk: complel fix SIGRETURN_DUMP for 32-bit compatibility mode"}},{"before":"868cc44853581f0e756c8e499fdce62589002305","after":"f8da36d821652fec9e7a711dbb9f9f66e0837291","ref":"refs/heads/shstk/v1","pushedAt":"2023-07-23T06:06:55.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"rppt","name":"Mike Rapoport","path":"/rppt","primaryAvatarUrl":"https://github.com/avatars/u/19757326?s=80&v=4"},"commit":{"message":"shstk/restore: don't try to unlock unless CPU feature is set\n\nSigned-off-by: Mike Rapoport (IBM) ","shortMessageHtmlLink":"shstk/restore: don't try to unlock unless CPU feature is set"}},{"before":"27901239da432dfe61c636586aa342b11cc6068e","after":"868cc44853581f0e756c8e499fdce62589002305","ref":"refs/heads/shstk/v1","pushedAt":"2023-07-22T15:21:53.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rppt","name":"Mike Rapoport","path":"/rppt","primaryAvatarUrl":"https://github.com/avatars/u/19757326?s=80&v=4"},"commit":{"message":"build: x86: add -mshstk -fcf-protection to CFLAGS\n\nAlways build CRIU with shadow stack enabled.\n\nSigned-off-by: Mike Rapoport (IBM) ","shortMessageHtmlLink":"build: x86: add -mshstk -fcf-protection to CFLAGS"}},{"before":null,"after":"27901239da432dfe61c636586aa342b11cc6068e","ref":"refs/heads/shstk/v1","pushedAt":"2023-07-22T14:44:48.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"rppt","name":"Mike Rapoport","path":"/rppt","primaryAvatarUrl":"https://github.com/avatars/u/19757326?s=80&v=4"},"commit":{"message":"build: x86: add -mshstk -fcf-protection to CFLAGS\n\nAlways build CRIU with shadow stack enabled.\n\nSigned-off-by: Mike Rapoport (IBM) ","shortMessageHtmlLink":"build: x86: add -mshstk -fcf-protection to CFLAGS"}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"startCursor":"Y3Vyc29yOnYyOpK7MjAyMy0xMS0zMFQwOTo0Mjo1My4wMDAwMDBazwAAAAO70wDj","endCursor":"Y3Vyc29yOnYyOpK7MjAyMy0wNy0yMlQxNDo0NDo0OC4wMDAwMDBazwAAAANa9qCY"}},"title":"Activity · rppt/criu"}