Kernel Hardening
[Prev Page][Next Page]
- Re: [PATCH v2 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 5/4] mm: Introduce SLAB_NO_FREE_INIT and mark excluded caches
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 4/4] net: apply __GFP_NO_AUTOINIT to AF_UNIX sk_buff allocations
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 4/4] net: apply __GFP_NO_AUTOINIT to AF_UNIX sk_buff allocations
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v2 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] gcc-plugins: arm_ssp_per_task_plugin: Fix for older GCC < 6
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v2 2/4] lib: introduce test_meminit module
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 3/4] gfp: mm: introduce __GFP_NOINIT
- From: Souptick Joarder <jrdr.linux@xxxxxxxxx>
- [PATCH v2 4/4] net: apply __GFP_NO_AUTOINIT to AF_UNIX sk_buff allocations
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH v2 3/4] gfp: mm: introduce __GFP_NO_AUTOINIT
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH v2 2/4] lib: introduce test_meminit module
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH v2 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH v2 0/4] RFC: add init_on_alloc/init_on_free boot options
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH 3/4] gfp: mm: introduce __GFP_NOINIT
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH 3/4] gfp: mm: introduce __GFP_NOINIT
- From: Souptick Joarder <jrdr.linux@xxxxxxxxx>
- Re: [PATCH] gcc-plugins: arm_ssp_per_task_plugin: Fix for older GCC < 6
- From: Doug Anderson <dianders@xxxxxxxxxxxx>
- Re: [PATCH] gcc-plugins: arm_ssp_per_task_plugin: Fix for older GCC < 6
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] gcc-plugins: arm_ssp_per_task_plugin: Fix for older GCC < 6
- From: Chris Packham <chris.packham@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH 3/4] gfp: mm: introduce __GFP_NOINIT
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Joao Moreira <jmoreira@xxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 3/4] gfp: mm: introduce __GFP_NOINIT
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 4/4] net: apply __GFP_NOINIT to AF_UNIX sk_buff allocations
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH 3/4] gfp: mm: introduce __GFP_NOINIT
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH 2/4] lib: introduce test_meminit module
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH 1/4] mm: security: introduce init_on_alloc=1 and init_on_free=1 boot options
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH 0/4] RFC: add init_on_alloc/init_on_free boot options
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v3 5/7] crypto: x86/cast6: Use new glue function macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 6/7] crypto: x86/aesni: Use new glue function macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 3/7] crypto: x86/camellia: Use new glue function macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 7/7] crypto: x86/glue_helper: Remove function prototype cast helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 4/7] crypto: x86/twofish: Use new glue function macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 1/7] crypto: x86/glue_helper: Add static inline function glue macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 2/7] crypto: x86/crypto: Use new glue function macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 0/7] crypto: x86: Fix indirect function call casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC] refactor tasklets to avoid unsigned long argument
- From: Allen <allen.lkml@xxxxxxxxx>
- Re: [RFC PATCH v2 3/4] Fix twofish crypto functions prototype casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH v2 0/4] x86/crypto: Fix crypto function casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [RFC PATCH v2 4/4] Fix cast6 crypto functions prototype casts
- From: Joao Moreira <jmoreira@xxxxxxx>
- [RFC PATCH v2 3/4] Fix twofish crypto functions prototype casts
- From: Joao Moreira <jmoreira@xxxxxxx>
- [RFC PATCH v2 2/4] Fix camellia crypto functions prototype casts
- From: Joao Moreira <jmoreira@xxxxxxx>
- [RFC PATCH v2 1/4] Fix serpent crypto functions prototype casts
- From: Joao Moreira <jmoreira@xxxxxxx>
- [RFC PATCH v2 0/4] x86/crypto: Fix crypto function casts
- From: Joao Moreira <jmoreira@xxxxxxx>
- Re: [RFC] refactor tasklets to avoid unsigned long argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: race-free process signaling
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: race-free process signaling
- From: Jann Horn <jannh@xxxxxxxxxx>
- race-free process signaling
- From: Solar Designer <solar@xxxxxxxxxxxx>
- [RFC] refactor tasklets to avoid unsigned long argument
- From: Allen <allen.lkml@xxxxxxxxx>
- Re: [PATCH v2] binfmt_elf: Update READ_IMPLIES_EXEC logic for modern CPUs
- From: Hector Marco-Gisbert <hecmargi@xxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit Europe 2019
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: [RFC] Handle mapcount overflows
- From: Jann Horn <jannh@xxxxxxxxxx>
- [tip:x86/mm] x86/kprobes: Use vmalloc special flag
- From: tip-bot for Rick Edgecombe <tipbot@xxxxxxxxx>
- [tip:x86/mm] x86/alternatives: Add comment about module removal races
- From: tip-bot for Nadav Amit <tipbot@xxxxxxxxx>
- [tip:x86/mm] x86/modules: Avoid breaking W^X while loading modules
- From: tip-bot for Nadav Amit <tipbot@xxxxxxxxx>
- [tip:x86/mm] x86/kprobes: Set instruction page as executable
- From: tip-bot for Nadav Amit <tipbot@xxxxxxxxx>
- [tip:x86/mm] x86/mm/cpa: Add set_direct_map_*() functions
- From: tip-bot for Rick Edgecombe <tipbot@xxxxxxxxx>
- [tip:x86/mm] x86/ftrace: Set trampoline pages as executable
- From: tip-bot for Nadav Amit <tipbot@xxxxxxxxx>
- [tip:x86/mm] x86/ftrace: Use vmalloc special flag
- From: tip-bot for Rick Edgecombe <tipbot@xxxxxxxxx>
- [tip:x86/mm] x86/kgdb: Avoid redundant comparison of patched code
- From: tip-bot for Nadav Amit <tipbot@xxxxxxxxx>
- [tip:x86/mm] x86/jump-label: Remove support for custom text poker
- From: tip-bot for Nadav Amit <tipbot@xxxxxxxxx>
- [tip:x86/mm] x86/alternatives: Use temporary mm for text poking
- From: tip-bot for Nadav Amit <tipbot@xxxxxxxxx>
- [tip:x86/mm] x86/alternatives: Remove the return value of text_poke_*()
- From: tip-bot for Nadav Amit <tipbot@xxxxxxxxx>
- [tip:x86/mm] modules: Use vmalloc special flag
- From: tip-bot for Rick Edgecombe <tipbot@xxxxxxxxx>
- [tip:x86/mm] mm/vmalloc: Add flag for freeing of special permsissions
- From: tip-bot for Rick Edgecombe <tipbot@xxxxxxxxx>
- [tip:x86/mm] mm/hibernation: Make hibernation handle unmapped pages
- From: tip-bot for Rick Edgecombe <tipbot@xxxxxxxxx>
- [tip:x86/mm] fork: Provide a function for copying init_mm
- From: tip-bot for Nadav Amit <tipbot@xxxxxxxxx>
- [tip:x86/mm] bpf: Use vmalloc special flag
- From: tip-bot for Rick Edgecombe <tipbot@xxxxxxxxx>
- [tip:x86/mm] x86/mm: Save debug registers when loading a temporary mm
- From: tip-bot for Nadav Amit <tipbot@xxxxxxxxx>
- [tip:x86/mm] bpf: Fail bpf_probe_write_user() while mm is switched
- From: tip-bot for Nadav Amit <tipbot@xxxxxxxxx>
- [tip:x86/mm] x86/mm: Introduce temporary mm structs
- From: tip-bot for Andy Lutomirski <tipbot@xxxxxxxxx>
- [tip:x86/mm] x86/jump_label: Use text_poke_early() during early init
- From: tip-bot for Nadav Amit <tipbot@xxxxxxxxx>
- [tip:x86/mm] mm/tlb: Provide default nmi_uaccess_okay()
- From: tip-bot for Nadav Amit <tipbot@xxxxxxxxx>
- [tip:x86/mm] x86/alternatives: Add text_poke_kgdb() to not assert the lock when debugging
- From: tip-bot for Nadav Amit <tipbot@xxxxxxxxx>
- Re: [PATCH v6 00/24] x86: text_poke() fixes and executable lockdowns
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v6 00/24] x86: text_poke() fixes and executable lockdowns
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH v6 24/24] bpf: Fail bpf_probe_write_user() while mm is switched
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 23/24] mm/tlb: Provide default nmi_uaccess_okay()
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 22/24] x86/alternative: Comment about module removal races
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 21/24] x86/kprobes: Use vmalloc special flag
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 20/24] x86/ftrace: Use vmalloc special flag
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 19/24] bpf: Use vmalloc special flag
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 18/24] modules: Use vmalloc special flag
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 17/24] vmalloc: Add flag for free of special permsissions
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 16/24] mm: Make hibernate handle unmapped pages
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 15/24] x86/mm/cpa: Add set_direct_map_ functions
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 14/24] x86/alternative: Remove the return value of text_poke_*()
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 13/24] x86/jump-label: Remove support for custom poker
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 12/24] x86/module: Avoid breaking W^X while loading modules
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 11/24] x86/kprobes: Set instruction page as executable
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 10/24] x86/ftrace: Set trampoline pages as executable
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 09/24] x86/kgdb: Avoid redundant comparison of patched code
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 08/24] x86/alternative: Use temporary mm for text poking
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 07/24] x86/alternative: Initialize temporary mm for patching
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 06/24] fork: Provide a function for copying init_mm
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 05/24] uprobes: Initialize uprobes earlier
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 04/24] x86/mm: Save debug registers when loading a temporary mm
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 03/24] x86/mm: Introduce temporary mm structs
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 02/24] x86/jump_label: Use text_poke_early() during early init
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 01/24] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
- From: nadav.amit@xxxxxxxxx
- [PATCH v6 00/24] x86: text_poke() fixes and executable lockdowns
- From: nadav.amit@xxxxxxxxx
- Re: [PATCH v5 14/23] x86/mm/cpa: Add set_direct_map_ functions
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] mm: security: introduce the init_allocations=1 boot option
- From: Christopher Lameter <cl@xxxxxxxxx>
- Re: [PATCH 1/3] mm: security: introduce the init_allocations=1 boot option
- From: Christopher Lameter <cl@xxxxxxxxx>
- Re: [PATCH v5 14/23] x86/mm/cpa: Add set_direct_map_ functions
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH 1/3] mm: security: introduce the init_allocations=1 boot option
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v2] binfmt_elf: Update READ_IMPLIES_EXEC logic for modern CPUs
- From: Jason Gunthorpe <jgg@xxxxxxxxxxxx>
- Re: [PATCH 0/3] RFC: add init_allocations=1 boot option
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v5 00/23] x86: text_poke() fixes and executable lockdowns
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] mm: security: introduce the init_allocations=1 boot option
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH v5 23/23] bpf: Fail bpf_probe_write_user() while mm is switched
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 21/23] x86/alternative: Comment about module removal races
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 20/23] x86/kprobes: Use vmalloc special flag
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 18/23] bpf: Use vmalloc special flag
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 16/23] vmalloc: Add flag for free of special permsissions
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 17/23] modules: Use vmalloc special flag
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 12/23] x86/jump-label: Remove support for custom poker
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 13/23] x86/alternative: Remove the return value of text_poke_*()
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 10/23] x86/kprobes: Set instruction page as executable
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 14/23] x86/mm/cpa: Add set_direct_map_ functions
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 22/23] mm/tlb: Provide default nmi_uaccess_okay()
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 09/23] x86/ftrace: Set trampoline pages as executable
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 19/23] x86/ftrace: Use vmalloc special flag
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 08/23] x86/kgdb: Avoid redundant comparison of patched code
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 15/23] mm: Make hibernate handle unmapped pages
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 06/23] x86/alternative: Initialize temporary mm for patching
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 05/23] fork: Provide a function for copying init_mm
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 07/23] x86/alternative: Use temporary mm for text poking
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 04/23] x86/mm: Save debug registers when loading a temporary mm
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 11/23] x86/module: Avoid breaking W^X while loading modules
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 02/23] x86/jump_label: Use text_poke_early() during early init
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 01/23] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 00/23] x86: text_poke() fixes and executable lockdowns
- From: Nadav Amit <namit@xxxxxxxxxx>
- [PATCH v5 03/23] x86/mm: Introduce temporary mm structs
- From: Nadav Amit <namit@xxxxxxxxxx>
- Re: [PATCH v4 16/23] vmalloc: Add flag for free of special permsissions
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v4 00/23] Merge text_poke fixes and executable lockdowns
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/23] Merge text_poke fixes and executable lockdowns
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 16/23] vmalloc: Add flag for free of special permsissions
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2] binfmt_elf: Update READ_IMPLIES_EXEC logic for modern CPUs
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v4 19/23] x86/ftrace: Use vmalloc special flag
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v4 19/23] x86/ftrace: Use vmalloc special flag
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v4 04/23] x86/mm: Save DRs when loading a temporary mm
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 03/23] x86/mm: Introduce temporary mm structs
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v4 03/23] x86/mm: Introduce temporary mm structs
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH v2] binfmt_elf: Update READ_IMPLIES_EXEC logic for modern CPUs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 04/23] x86/mm: Save DRs when loading a temporary mm
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 03/23] x86/mm: Introduce temporary mm structs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] binfmt_elf: Update READ_IMPLIES_EXEC logic for modern CPUs
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [to-be-updated] binfmt_elf-update-read_implies_exec-logic-for-modern-cpus.patch removed from -mm tree
- From: akpm@xxxxxxxxxxxxxxxxxxxx
- Re: [PATCH v2] binfmt_elf: Update READ_IMPLIES_EXEC logic for modern CPUs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 2/3] security: Move stackleak config to Kconfig.hardening
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] binfmt_elf: Update READ_IMPLIES_EXEC logic for modern CPUs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 0/3] Refactor memory initialization hardening
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] binfmt_elf: Update READ_IMPLIES_EXEC logic for modern CPUs
- From: Will Deacon <will.deacon@xxxxxxx>
- [PATCH v2] binfmt_elf: Update READ_IMPLIES_EXEC logic for modern CPUs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH v3 2/3] security: Move stackleak config to Kconfig.hardening
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/3] Refactor memory initialization hardening
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] security: Create "kernel hardening" config area
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] lib: Introduce test_stackinit module
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 2/3] gfp: mm: introduce __GFP_NOINIT
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/3] mm: security: introduce the init_allocations=1 boot option
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- [PATCH v3 3/3] security: Implement Clang's stack initialization
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 2/3] security: Move stackleak config to Kconfig.hardening
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 1/3] security: Create "kernel hardening" config area
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 0/3] Refactor memory initialization hardening
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 1/3] security: Create "kernel hardening" config area
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [musl] Re: [PATCH] binfmt_elf: Update READ_IMPLIES_EXEC logic for modern CPUs
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [PATCH] binfmt_elf: Update READ_IMPLIES_EXEC logic for modern CPUs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 3/3] RFC: net: apply __GFP_NOINIT to AF_UNIX sk_buff allocations
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/3] gfp: mm: introduce __GFP_NOINIT
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/3] gfp: mm: introduce __GFP_NOINIT
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] binfmt_elf: Update READ_IMPLIES_EXEC logic for modern CPUs
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 1/3] mm: security: introduce the init_allocations=1 boot option
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- + binfmt_elf-update-read_implies_exec-logic-for-modern-cpus.patch added to -mm tree
- From: akpm@xxxxxxxxxxxxxxxxxxxx
- Re: [PATCH 0/3] RFC: add init_allocations=1 boot option
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH] binfmt_elf: Update READ_IMPLIES_EXEC logic for modern CPUs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Wes Turner <wes.turner@xxxxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Wes Turner <wes.turner@xxxxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Mike Snitzer <snitzer@xxxxxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] mm: security: introduce the init_allocations=1 boot option
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v4 22/23] tlb: provide default nmi_uaccess_okay()
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 19/23] x86/ftrace: Use vmalloc special flag
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 17/23] modules: Use vmalloc special flag
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 21/23] x86/alternative: Comment about module removal races
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 14/23] x86/mm/cpa: Add set_direct_map_ functions
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 15/23] mm: Make hibernate handle unmapped pages
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 16/23] vmalloc: Add flag for free of special permsissions
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 12/23] x86/jump-label: Remove support for custom poker
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 20/23] x86/kprobes: Use vmalloc special flag
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 10/23] x86/kprobes: Set instruction page as executable
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 13/23] x86/alternative: Remove the return value of text_poke_*()
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 08/23] x86/kgdb: Avoid redundant comparison of patched code
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 04/23] x86/mm: Save DRs when loading a temporary mm
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 06/23] x86/alternative: Initialize temporary mm for patching
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 11/23] x86/module: Avoid breaking W^X while loading modules
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 09/23] x86/ftrace: Set trampoline pages as executable
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 02/23] x86/jump_label: Use text_poke_early() during early init
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 07/23] x86/alternative: Use temporary mm for text poking
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 23/23] bpf: Fail bpf_probe_write_user() while mm is switched
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 01/23] Fix "x86/alternatives: Lockdep-enforce text_mutex in text_poke*()"
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 05/23] fork: Provide a function for copying init_mm
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 18/23] bpf: Use vmalloc special flag
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 03/23] x86/mm: Introduce temporary mm structs
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v4 00/23] Merge text_poke fixes and executable lockdowns
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v2 56/79] docs: Documentation/*.txt: rename all ReST files to *.rst
- From: Mauro Carvalho Chehab <mchehab+samsung@xxxxxxxxxx>
- Re: [PATCH v3 3/3] module: Make __tracepoints_ptrs as read-only
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] include: linux: Regularise the use of FIELD_SIZEOF macro
- From: Shyam Saini <mayhs11saini@xxxxxxxxx>
- Re: willing to involve in KSPP
- From: Shyam Saini <mayhs11saini@xxxxxxxxx>
- Re: [PATCH v2 1/3] security: Create "kernel hardening" config area
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH 1/3] mm: security: introduce the init_allocations=1 boot option
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] RFC: add init_allocations=1 boot option
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] gfp: mm: introduce __GFP_NOINIT
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/3] mm: security: introduce the init_allocations=1 boot option
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH 1/3] mm: security: introduce the init_allocations=1 boot option
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH 1/3] mm: security: introduce the init_allocations=1 boot option
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH 3/3] RFC: net: apply __GFP_NOINIT to AF_UNIX sk_buff allocations
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH 2/3] gfp: mm: introduce __GFP_NOINIT
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH 0/3] RFC: add init_allocations=1 boot option
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH 1/3] mm: security: introduce the init_allocations=1 boot option
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH 0/3] RFC: add init_allocations=1 boot option
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH] x86_64: Disabling read-implies-exec when the stack is executable
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] x86_64: Disabling read-implies-exec when the stack is executable
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] x86_64: Disabling read-implies-exec when the stack is executable
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/2] initmem: introduce CONFIG_INIT_ALL_HEAP
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH] x86_64: Disabling read-implies-exec when the stack is executable
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH] x86_64: Disabling read-implies-exec when the stack is executable
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] mm: security: introduce CONFIG_INIT_HEAP_ALL
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v3 3/3] module: Make __tracepoints_ptrs as read-only
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- Re: willing to involve in KSPP
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 3/3] module: Make __tracepoints_ptrs as read-only
- From: Jessica Yu <jeyu@xxxxxxxxxx>
- Re: [RFC PATCH v1 1/5] fs: Add support for an O_MAYEXEC flag on sys_open()
- From: Mickaël Salaün <mickael.salaun@xxxxxxxxxxx>
- Re: [RFC PATCH v1 1/5] fs: Add support for an O_MAYEXEC flag on sys_open()
- From: Mickaël Salaün <mickael.salaun@xxxxxxxxxxx>
- Re: willing to involve in KSPP
- From: Shyam Saini <mayhs11saini@xxxxxxxxx>
- Re: [PATCH v3 1/3] module: Prepare for addition of new ro_after_init sections
- From: Jessica Yu <jeyu@xxxxxxxxxx>
- Re: [PATCH] mm: security: introduce CONFIG_INIT_HEAP_ALL
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [RFC PATCH v1 1/5] fs: Add support for an O_MAYEXEC flag on sys_open()
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] mm: security: introduce CONFIG_INIT_HEAP_ALL
- From: Christopher Lameter <cl@xxxxxxxxx>
- Re: [PATCH] mm: security: introduce CONFIG_INIT_HEAP_ALL
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH] mm: security: introduce CONFIG_INIT_HEAP_ALL
- From: Christopher Lameter <cl@xxxxxxxxx>
- Re: [RFC PATCH v1 1/5] fs: Add support for an O_MAYEXEC flag on sys_open()
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH v2 1/3] security: Create "kernel hardening" config area
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 1/3] security: Create "kernel hardening" config area
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH] mm: security: introduce CONFIG_INIT_HEAP_ALL
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH] mm: security: introduce CONFIG_INIT_HEAP_ALL
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [RFC PATCH v1 1/5] fs: Add support for an O_MAYEXEC flag on sys_open()
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] mm: security: introduce CONFIG_INIT_HEAP_ALL
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH] mm: security: introduce CONFIG_INIT_HEAP_ALL
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v2 1/3] security: Create "kernel hardening" config area
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: willing to involve in KSPP
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: willing to involve in KSPP
- From: Shyam Saini <mayhs11saini@xxxxxxxxx>
- Re: [PATCH] mm: security: introduce CONFIG_INIT_HEAP_ALL
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 1/5] fs: Add support for an O_MAYEXEC flag on sys_open()
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH v2 1/3] security: Create "kernel hardening" config area
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH 1/2] include: linux: Regularise the use of FIELD_SIZEOF macro
- From: William Kucharski <william.kucharski@xxxxxxxxxx>
- Re: [PATCH 1/2] include: linux: Regularise the use of FIELD_SIZEOF macro
- From: Shyam Saini <mayhs11saini@xxxxxxxxx>
- Re: [PATCH 1/2] include: linux: Regularise the use of FIELD_SIZEOF macro
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- [PATCH 2/2] include: linux: Remove unused macros and their defination
- From: Shyam Saini <shyam.saini@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/2] include: linux: Regularise the use of FIELD_SIZEOF macro
- From: Shyam Saini <shyam.saini@xxxxxxxxxxxxxxxxxxxx>
- Re: willing to involve in KSPP
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: willing to involve in KSPP
- From: Shyam Saini <mayhs11saini@xxxxxxxxx>
- Re: [PATCH] mm: security: introduce CONFIG_INIT_HEAP_ALL
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH] mm: security: introduce CONFIG_INIT_HEAP_ALL
- From: Qian Cai <cai@xxxxxx>
- [PATCH] mm: security: introduce CONFIG_INIT_HEAP_ALL
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v2 3/3] security: Implement Clang's stack initialization
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH] module: Make srcu_struct ptr array as read-only
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- Re: [PATCH] module: Make srcu_struct ptr array as read-only
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] security: Create "kernel hardening" config area
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: willing to involve in KSPP
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] module: Make srcu_struct ptr array as read-only
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- [PATCH] module: Make srcu_struct ptr array as read-only
- From: "Joel Fernandes (Google)" <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] module: Make __tracepoints_ptrs as read-only
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- [PATCH v2 3/3] security: Implement Clang's stack initialization
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 2/3] security: Move stackleak config to Kconfig.hardening
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 1/3] security: Create "kernel hardening" config area
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 0/3] Refactor memory initialization hardening
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 2/3] initmem: introduce CONFIG_INIT_ALL_HEAP
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v4 2/3] initmem: introduce CONFIG_INIT_ALL_HEAP
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 3/3] kbuild: Implement Clang's stack initialization
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/3] Kconfig: Create "kernel hardening" config area
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 3/3] module: Make __tracepoints_ptrs as read-only
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v3 3/3] module: Make __tracepoints_ptrs as read-only
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] Kconfig: Create "kernel hardening" config area
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/3] initmem: introduce CONFIG_INIT_ALL_HEAP
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v3 1/3] module: Prepare for addition of new ro_after_init sections
- From: Miroslav Benes <mbenes@xxxxxxx>
- Re: [PATCH v3 3/3] module: Make __tracepoints_ptrs as read-only
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] kbuild: Implement Clang's stack initialization
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] Kconfig: Refactor memory initialization hardening
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] module: Make __tracepoints_ptrs as read-only
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v3 3/3] module: Make __tracepoints_ptrs as read-only
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/3] module: Make __tracepoints_ptrs as read-only
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- [PATCH v3 3/3] module: Make __tracepoints_ptrs as read-only
- From: "Joel Fernandes (Google)" <joel@xxxxxxxxxxxxxxxxx>
- [PATCH v3 2/3] module: Make srcu_struct ptr array as read-only post init
- From: "Joel Fernandes (Google)" <joel@xxxxxxxxxxxxxxxxx>
- [PATCH v3 1/3] module: Prepare for addition of new ro_after_init sections
- From: "Joel Fernandes (Google)" <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] module: Prepare for addition of new ro_after_init sections
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- [PATCH v2 3/3] module: Make __tracepoints_ptrs as read-only
- From: "Joel Fernandes (Google)" <joel@xxxxxxxxxxxxxxxxx>
- [PATCH v2 2/3] module: Make srcu_struct ptr array as read-only post init
- From: "Joel Fernandes (Google)" <joel@xxxxxxxxxxxxxxxxx>
- [PATCH v2 1/3] module: Prepare for addition of new ro_after_init sections
- From: "Joel Fernandes (Google)" <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] module: Prepare for addition of new ro_after_init sections
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH 1/2] module: Prepare for addition of new ro_after_init sections
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/2] module: Prepare for addition of new ro_after_init sections
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] module: Prepare for addition of new ro_after_init sections
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 1/3] Kconfig: Create "kernel hardening" config area
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 2/3] kbuild: Move stackleak config to Kconfig.hardening
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 3/3] kbuild: Implement Clang's stack initialization
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 0/3] Kconfig: Refactor memory initialization hardening
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 2/3] initmem: introduce CONFIG_INIT_ALL_HEAP
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/2] module: Make srcu_struct ptr array as read-only post init
- From: Joel Fernandes <joelaf@xxxxxxxxxx>
- Re: [PATCH 2/2] module: Make srcu_struct ptr array as read-only post init
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH 2/2] module: Make srcu_struct ptr array as read-only post init
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- [PATCH v4 2/3] initmem: introduce CONFIG_INIT_ALL_HEAP
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH v4 1/3] initmem: introduce CONFIG_INIT_ALL_MEMORY and CONFIG_INIT_ALL_STACK
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH v4 0/3] RFC: introduce CONFIG_INIT_ALL_MEMORY
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH 3/3] net: make sk_prot_alloc() work with CONFIG_INIT_ALL_HEAP
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- willing to involve in KSPP
- From: Shyam Saini <mayhs11saini@xxxxxxxxx>
- Re: [PATCH 2/2] module: Make srcu_struct ptr array as read-only post init
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH 2/2] module: Make srcu_struct ptr array as read-only post init
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] module: Make srcu_struct ptr array as read-only post init
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- [PATCH 2/2] module: Make srcu_struct ptr array as read-only post init
- From: "Joel Fernandes (Google)" <joel@xxxxxxxxxxxxxxxxx>
- [PATCH 1/2] module: Prepare for addition of new ro_after_init sections
- From: "Joel Fernandes (Google)" <joel@xxxxxxxxxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit North America 2019
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3 1/2] initmem: introduce CONFIG_INIT_ALL_MEMORY and CONFIG_INIT_ALL_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/2] initmem: introduce CONFIG_INIT_ALL_HEAP
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 2/2] initmem: introduce CONFIG_INIT_ALL_HEAP
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v3 2/2] initmem: introduce CONFIG_INIT_ALL_HEAP
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v3 1/2] initmem: introduce CONFIG_INIT_ALL_MEMORY and CONFIG_INIT_ALL_STACK
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v3 1/2] initmem: introduce CONFIG_INIT_ALL_MEMORY and CONFIG_INIT_ALL_STACK
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v2 2/2] initmem: introduce CONFIG_INIT_ALL_HEAP
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v3 1/2] initmem: introduce CONFIG_INIT_ALL_MEMORY and CONFIG_INIT_ALL_STACK
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] initmem: introduce CONFIG_INIT_ALL_MEMORY and CONFIG_INIT_ALL_STACK
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v3 1/2] initmem: introduce CONFIG_INIT_ALL_MEMORY and CONFIG_INIT_ALL_STACK
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v6 14/27] x86/percpu: Adapt percpu for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- Re: [PATCH v6 14/27] x86/percpu: Adapt percpu for PIE support
- From: Christopher Lameter <cl@xxxxxxxxx>
- Re: [PATCH v3 2/2] initmem: introduce CONFIG_INIT_ALL_HEAP
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH v3 2/2] initmem: introduce CONFIG_INIT_ALL_HEAP
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH v3 1/2] initmem: introduce CONFIG_INIT_ALL_MEMORY and CONFIG_INIT_ALL_STACK
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH v3 0/2] RFC: introduce CONFIG_INIT_ALL_MEMORY
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v2 2/2] initmem: introduce CONFIG_INIT_ALL_HEAP
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/2] initmem: introduce CONFIG_INIT_ALL_HEAP
- From: Laura Abbott <labbott@xxxxxxxxxx>
- Re: [PATCH v6 14/27] x86/percpu: Adapt percpu for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- Re: [PATCH v4 0/6] lib/string: Add strscpy_pad() function
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 0/6] lib/string: Add strscpy_pad() function
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH v4 0/6] lib/string: Add strscpy_pad() function
- From: "Tobin C. Harding" <me@xxxxxxxx>
- Re: [PATCH v2 1/2] initmem: introduce CONFIG_INIT_ALL_MEMORY and CONFIG_INIT_ALL_STACK
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v2 2/2] initmem: introduce CONFIG_INIT_ALL_HEAP
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [RFC PATCH] x86/entry/64: randomize kernel stack offset upon syscall
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] initmem: introduce CONFIG_INIT_ALL_HEAP
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] initmem: introduce CONFIG_INIT_ALL_MEMORY and CONFIG_INIT_ALL_STACK
- From: Masahiro Yamada <yamada.masahiro@xxxxxxxxxxxxx>
- RE: [RFC PATCH] x86/entry/64: randomize kernel stack offset upon syscall
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- [PATCH v4 6/6] lib: Add test module for strscpy_pad
- From: "Tobin C. Harding" <tobin@xxxxxxxxxx>
- [PATCH v4 4/6] lib: Use new kselftest header
- From: "Tobin C. Harding" <tobin@xxxxxxxxxx>
- [PATCH v4 5/6] lib/string: Add strscpy_pad() function
- From: "Tobin C. Harding" <tobin@xxxxxxxxxx>
- [PATCH v4 3/6] kselftest: Add test module framework header
- From: "Tobin C. Harding" <tobin@xxxxxxxxxx>
- [PATCH v4 2/6] kselftest: Add test runner creation script
- From: "Tobin C. Harding" <tobin@xxxxxxxxxx>
- [PATCH v4 1/6] lib/test_printf: Add empty module_exit function
- From: "Tobin C. Harding" <tobin@xxxxxxxxxx>
- [PATCH v4 0/6] lib/string: Add strscpy_pad() function
- From: "Tobin C. Harding" <tobin@xxxxxxxxxx>
- Re: [PATCH v3 2/7] kselftest: Add test runner creation script
- From: "Tobin C. Harding" <me@xxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] x86/entry/64: randomize kernel stack offset upon syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 11/13] xpfo, mm: optimize spinlock usage in xpfo_kunmap
- From: Khalid Aziz <khalid.aziz@xxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- RE: [RFC PATCH] x86/entry/64: randomize kernel stack offset upon syscall
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: [RFC PATCH v9 11/13] xpfo, mm: optimize spinlock usage in xpfo_kunmap
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH] x86/entry/64: randomize kernel stack offset upon syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [RFC PATCH v9 11/13] xpfo, mm: optimize spinlock usage in xpfo_kunmap
- From: Khalid Aziz <khalid.aziz@xxxxxxxxxx>
- Re: [PATCH v3 0/7] lib/string: Add strscpy_pad() function
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH v3 0/7] lib/string: Add strscpy_pad() function
- From: "Tobin C. Harding" <me@xxxxxxxx>
- Re: [PATCH v3 3/7] kselftest/lib: Use new shell runner to define tests
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 3/7] kselftest/lib: Use new shell runner to define tests
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 0/7] lib/string: Add strscpy_pad() function
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 4/7] kselftest: Add test module framework header
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 7/7] lib: Add test module for strscpy_pad
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 6/7] lib/string: Add strscpy_pad() function
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 2/7] kselftest: Add test runner creation script
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v3 5/7] lib: Use new kselftest header
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 1/7] lib/test_printf: Add empty module_exit function
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 3/7] kselftest/lib: Use new shell runner to define tests
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 2/7] kselftest: Add test runner creation script
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- RE: [PATCH] Convert struct pid count to refcount_t
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- [RFC PATCH] x86/entry/64: randomize kernel stack offset upon syscall
- From: Elena Reshetova <elena.reshetova@xxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] Convert struct pid count to refcount_t
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] Convert struct pid count to refcount_t
- From: "Joel Fernandes (Google)" <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v9 12/19] zinc: BLAKE2s generic C implementation and selftest
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH net-next v9 05/19] zinc: ChaCha20 ARM and ARM64 implementations
- From: Stefan Agner <stefan@xxxxxxxx>
- [PATCH net-next v9 18/19] security/keys: rewrite big_key crypto to use Zinc
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 17/19] zinc: Curve25519 ARM implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 16/19] zinc: import Bernstein and Schwabe's Curve25519 ARM implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 15/19] zinc: Curve25519 x86_64 implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 14/19] zinc: Curve25519 generic C implementations and selftest
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 13/19] zinc: BLAKE2s x86_64 implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 12/19] zinc: BLAKE2s generic C implementation and selftest
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 11/19] zinc: ChaCha20Poly1305 construction and selftest
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 10/19] zinc: Poly1305 MIPS64 and MIPS32r2 implementations
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 09/19] zinc: Poly1305 ARM and ARM64 implementations
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 08/19] zinc: Poly1305 x86_64 implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 05/19] zinc: ChaCha20 ARM and ARM64 implementations
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 07/19] zinc: Poly1305 generic C implementations and selftest
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 06/19] zinc: ChaCha20 MIPS32r2 implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 04/19] zinc: ChaCha20 x86_64 implementation
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 03/19] zinc: ChaCha20 generic C implementation and selftest
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH net-next v9 02/19] zinc: introduce minimal cryptography library
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2 0/4] RCU fixes for rcu_assign_pointer() usage
- From: Luc Van Oostenryck <luc.vanoostenryck@xxxxxxxxx>
- Re: [PATCH v2 0/4] RCU fixes for rcu_assign_pointer() usage
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] initmem: introduce CONFIG_INIT_ALL_MEMORY and CONFIG_INIT_ALL_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 02/02]: Support for PIC modules
- From: Ruslan Nikolaev <nruslan_devel@xxxxxxxxx>
- [PATCH v2 02/02]: Support for PIC modules
- From: Ruslan Nikolaev <nruslan_devel@xxxxxxxxx>
- [PATCH v2 01/01]: Prerequisites for PIC modules
- From: Ruslan Nikolaev <nruslan_devel@xxxxxxxxx>
- [PATCH v2 4/4] sched: Annotate perf_domain pointer with __rcu
- From: "Joel Fernandes (Google)" <joel@xxxxxxxxxxxxxxxxx>
- [PATCH v2 3/4] rcuwait: Annotate task_struct with __rcu
- From: "Joel Fernandes (Google)" <joel@xxxxxxxxxxxxxxxxx>
- [PATCH v2 2/4] sched_domain: Annotate RCU pointers properly
- From: "Joel Fernandes (Google)" <joel@xxxxxxxxxxxxxxxxx>
- [PATCH v2 1/4] sched/cpufreq: Annotate cpufreq_update_util_data pointer with __rcu
- From: "Joel Fernandes (Google)" <joel@xxxxxxxxxxxxxxxxx>
- [PATCH v2 0/4] RCU fixes for rcu_assign_pointer() usage
- From: "Joel Fernandes (Google)" <joel@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] initmem: introduce CONFIG_INIT_ALL_MEMORY and CONFIG_INIT_ALL_STACK
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- RE: [RFC PATCH] x86/entry/64: randomize kernel stack offset upon syscall
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- [RFC PATCH] x86/entry/64: randomize kernel stack offset upon syscall
- From: Elena Reshetova <elena.reshetova@xxxxxxxxx>
- Re: [PATCH 1/2] gcc-plugins: structleak: Generalize to all variable types
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/2] gcc-plugins: structleak: Generalize to all variable types
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH 2/2] lib: Introduce test_stackinit module
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [GIT PULL] leaking_addresses: changes for v5.1-rc1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v3 0/7] lib/string: Add strscpy_pad() function
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 2/2] initmem: introduce CONFIG_INIT_ALL_HEAP
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH v2 1/2] initmem: introduce CONFIG_INIT_ALL_MEMORY and CONFIG_INIT_ALL_STACK
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH v2 0/2] RFC: introduce CONFIG_INIT_ALL_MEMORY
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: initmem: introduce CONFIG_INIT_ALL_MEMORY and CONFIG_INIT_ALL_STACK
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: initmem: introduce CONFIG_INIT_ALL_MEMORY and CONFIG_INIT_ALL_STACK
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v3 0/7] lib/string: Add strscpy_pad() function
- From: "Tobin C. Harding" <me@xxxxxxxx>
- Re: [PATCH v3 0/7] lib/string: Add strscpy_pad() function
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 0/7] lib/string: Add strscpy_pad() function
- From: "Tobin C. Harding" <me@xxxxxxxx>
- Re: [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: initmem: introduce CONFIG_INIT_ALL_MEMORY and CONFIG_INIT_ALL_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] x86/cpufeature: Remove __pure attribute to _static_cpu_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
- Re: [PATCH] x86/cpufeature: Remove __pure attribute to _static_cpu_has()
- [PATCH] x86/cpufeature: Remove __pure attribute to _static_cpu_has()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
- From: Borislav Petkov <bp@xxxxxxxxx>
- [GIT PULL] leaking_addresses: changes for v5.1-rc1
- From: "Tobin C. Harding" <tobin@xxxxxxxxxx>
- Re: [PATCH v3 0/7] lib/string: Add strscpy_pad() function
- From: "Tobin C. Harding" <me@xxxxxxxx>
- [PATCH v3 7/7] lib: Add test module for strscpy_pad
- From: "Tobin C. Harding" <tobin@xxxxxxxxxx>
- [PATCH v3 5/7] lib: Use new kselftest header
- From: "Tobin C. Harding" <tobin@xxxxxxxxxx>
- [PATCH v3 6/7] lib/string: Add strscpy_pad() function
- From: "Tobin C. Harding" <tobin@xxxxxxxxxx>
- [PATCH v3 4/7] kselftest: Add test module framework header
- From: "Tobin C. Harding" <tobin@xxxxxxxxxx>
- [PATCH v3 3/7] kselftest/lib: Use new shell runner to define tests
- From: "Tobin C. Harding" <tobin@xxxxxxxxxx>
- [PATCH v3 2/7] kselftest: Add test runner creation script
- From: "Tobin C. Harding" <tobin@xxxxxxxxxx>
- [PATCH v3 1/7] lib/test_printf: Add empty module_exit function
- From: "Tobin C. Harding" <tobin@xxxxxxxxxx>
- [PATCH v3 0/7] lib/string: Add strscpy_pad() function
- From: "Tobin C. Harding" <tobin@xxxxxxxxxx>
- Re: [PATCH 1/2] gcc-plugins: structleak: Generalize to all variable types
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/2] gcc-plugins: structleak: Generalize to all variable types
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 1/2] gcc-plugins: structleak: Generalize to all variable types
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/2] gcc-plugins: structleak: Generalize to all variable types
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/2] gcc-plugins: structleak: Generalize to all variable types
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v2 1/3] x86/asm: Pin sensitive CR0 bits
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 0/3] x86/asm: More pinning
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 2/3] x86/asm: Avoid taking an exception before cr4 restore
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 3/3] lkdtm: Check for SMEP clearing protections
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/3] x86/asm: Pin sensitive CR0 bits
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/3] x86/asm: More pinning
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/6] sched/cpufreq: Annotate cpufreq_update_util_data pointer with __rcu
- From: Joel Fernandes <joel@xxxxxxxxxxxxxxxxx>
- RE: [RFC PATCH] x86/entry/64: randomize kernel stack offset upon system call
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- Re: [PATCH 1/3] x86/asm: Pin sensitive CR0 bits
- From: Solar Designer <solar@xxxxxxxxxxxx>
- Re: [PATCH v2 1/1] lib/string: Add strscpy_pad() function
- From: "Tobin C. Harding" <me@xxxxxxxx>
- [PATCH v2] lkdtm: Check for SMEP clearing protections
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 3/3] lkdtm: Check for SMEP clearing protections
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 3/3] lkdtm: Check for SMEP clearing protections
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 0/3] x86/asm: More pinning
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 2/3] x86/asm: Avoid taking an exception before cr4 restore
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 1/3] x86/asm: Pin sensitive CR0 bits
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 1/1] lib/string: Add strscpy_pad() function
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 1/1] lib/string: Add strscpy_pad() function
- From: "Tobin C. Harding" <me@xxxxxxxx>
- Re: [PATCH v2 1/1] lib/string: Add strscpy_pad() function
- From: "Tobin C. Harding" <me@xxxxxxxx>
- Re: [PATCH v2 6/6] sched: Annotate perf_domain pointer with __rcu
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] rcuwait: Annotate task_struct with __rcu
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] sched_domain: Annotate RCU pointers properly
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- Re: [PATCH v2 3/6] sched/cpufreq: Annotate cpufreq_update_util_data pointer with __rcu
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/6] ixgbe: Fix incorrect RCU API usage
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/6] net: rtnetlink: Fix incorrect RCU API usage
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- Re: [PATCH 4/6] lib/string: Add string copy/zero function
- From: "Tobin C. Harding" <me@xxxxxxxx>
- Re: [PATCH 5/6] lib: Fix function documentation for strncpy_from_user
- From: Rasmus Villemoes <linux@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] lib/string: Add strscpy_pad() function
- From: Andy Shevchenko <andy.shevchenko@xxxxxxxxx>
- [PATCH v2 1/1] lib/string: Add strscpy_pad() function
- From: "Tobin C. Harding" <tobin@xxxxxxxxxx>
- [PATCH v2 0/1] lib/string: Add strscpy_pad() function
- From: "Tobin C. Harding" <tobin@xxxxxxxxxx>
[Index of Archives]
[Linux Samsung SoC]
[Linux Rockchip SoC]
[Linux for Synopsys ARC Processors]
[Linux Actions SoC]
[Linux Kernel]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Scanners]
[Yosemite Forum]