Kernel Hardening
[Prev Page][Next Page]
- Re: [PATCH v2 0/6] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 1/6] aarch64: Fix missing BTI protection from dependencies [BZ #26926]
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v3 2/2] aarch64: Use mmap to add PROT_BTI instead of mprotect [BZ #26831]
- From: Adhemerval Zanella <adhemerval.zanella@xxxxxxxxxx>
- Re: [PATCH v3 1/2] aarch64: align address for BTI protection [BZ #26988]
- From: Adhemerval Zanella <adhemerval.zanella@xxxxxxxxxx>
- Re: [PATCH v2 5/6] elf: Pass the fd to note processing
- From: Adhemerval Zanella <adhemerval.zanella@xxxxxxxxxx>
- Re: [PATCH v2 3/6] elf: Fix failure handling in _dl_map_object_from_fd
- From: Adhemerval Zanella <adhemerval.zanella@xxxxxxxxxx>
- Re: [PATCH v2 1/6] aarch64: Fix missing BTI protection from dependencies [BZ #26926]
- From: Adhemerval Zanella <adhemerval.zanella@xxxxxxxxxx>
- Re: [PATCH v26 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 10/12] selftests/landlock: Add user space tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 09/12] arch: Wire up Landlock syscalls
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 04/12] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 03/12] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Fāng-ruì Sòng <maskray@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Fangrui Song <maskray@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH v2 0/6] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PRE-REVIEW PATCH 0/2] Remove all strlcpy in favor of strscpy
- From: Romain Perier <romain.perier@xxxxxxxxx>
- [PRE-REVIEW PATCH 2/2] Automated replacement of all other deprecated strlcpy()
- From: Romain Perier <romain.perier@xxxxxxxxx>
- [PRE-REVIEW PATCH 1/2] Manual replacement of the deprecated strlcpy() with return values
- From: Romain Perier <romain.perier@xxxxxxxxx>
- [PRE-REVIEW PATCH 0/2] Remove all strlcpy in favor of strscpy
- From: Romain Perier <romain.perier@xxxxxxxxx>
- Re: [PATCH RFC v2 2/6] mm/slab: Perform init_on_free earlier
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH RFC v2 2/6] mm/slab: Perform init_on_free earlier
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC v2 2/6] mm/slab: Perform init_on_free earlier
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH v6 14/25] kbuild: lto: remove duplicate dependencies from .mod files
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH v6 14/25] kbuild: lto: remove duplicate dependencies from .mod files
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH v12 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v12 2/3] arch: Wire up trusted_for(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v12 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v12 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2 0/6] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v8 02/16] kbuild: add support for Clang LTO
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v8 00/16] Add support for Clang LTO
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v7 00/17] Add support for Clang LTO
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 2/2] aarch64: Use mmap to add PROT_BTI instead of mprotect [BZ #26831]
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- [PATCH v3 1/2] aarch64: align address for BTI protection [BZ #26988]
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v7 00/17] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v8 02/16] kbuild: add support for Clang LTO
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v7 00/17] Add support for Clang LTO
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v8 01/16] tracing: move function tracer options to Kconfig
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v7 00/17] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 16/16] arm64: allow LTO to be selected
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 15/16] arm64: disable recordmcount with DYNAMIC_FTRACE_WITH_REGS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 14/16] arm64: vdso: disable LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 13/16] drivers/misc/lkdtm: disable LTO for rodata.o
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 12/16] efi/libstub: disable LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 11/16] scripts/mod: disable LTO for empty.c
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 10/16] modpost: lto: strip .lto from module names
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 09/16] PCI: Fix PREL32 relocations for LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 08/16] init: lto: fix PREL32 relocations
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 07/16] init: lto: ensure initcall ordering
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 06/16] kbuild: lto: remove duplicate dependencies from .mod files
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 05/16] kbuild: lto: merge module sections
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 04/16] kbuild: lto: limit inlining
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 03/16] kbuild: lto: fix module versioning
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 02/16] kbuild: add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 01/16] tracing: move function tracer options to Kconfig
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 00/16] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v7 00/17] Add support for Clang LTO
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH v25 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 10/12] selftests/landlock: Add user space tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 09/12] arch: Wire up Landlock syscalls
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 04/12] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 03/12] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 00/17] Add support for Clang LTO
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 14/17] arm64: vdso: disable LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v2 0/6] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v7 00/17] Add support for Clang LTO
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v7 17/17] arm64: allow LTO_CLANG and THINLTO to be selected
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v7 16/17] arm64: disable recordmcount with DYNAMIC_FTRACE_WITH_REGS
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v7 14/17] arm64: vdso: disable LTO
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v2 6/6] aarch64: Use mmap to add PROT_BTI instead of mprotect [BZ #26831]
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- [PATCH v2 5/6] elf: Pass the fd to note processing
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- [PATCH v2 4/6] elf: Move note processing after l_phdr is updated
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- [PATCH v2 3/6] elf: Fix failure handling in _dl_map_object_from_fd
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- [PATCH v2 2/6] elf: lose is closely tied to _dl_map_object_from_fd
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- [PATCH v2 1/6] aarch64: Fix missing BTI protection from dependencies [BZ #26926]
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- [PATCH v2 0/6] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v24 12/12] landlock: Add user and kernel documentation
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v24 07/12] landlock: Support filesystem access-control
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v24 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v24 07/12] landlock: Support filesystem access-control
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v7 15/17] KVM: arm64: disable LTO for the nVHE directory
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v7 15/17] KVM: arm64: disable LTO for the nVHE directory
- From: David Brazdil <dbrazdil@xxxxxxxxxx>
- Re: [PATCH v7 02/17] kbuild: add support for Clang LTO
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 00/17] Add support for Clang LTO
- From: Marc Zyngier <maz@xxxxxxxxxxxxxxx>
- Re: [PATCH v24 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v24 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v24 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 00/17] Add support for Clang LTO
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v24 02/12] landlock: Add ruleset and domain management
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v24 07/12] landlock: Support filesystem access-control
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v24 12/12] landlock: Add user and kernel documentation
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v24 08/12] landlock: Add syscall implementations
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v24 01/12] landlock: Add object management
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v7 00/17] Add support for Clang LTO
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH v7 02/17] kbuild: add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v7 02/17] kbuild: add support for Clang LTO
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 00/17] Add support for Clang LTO
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v7 00/17] Add support for Clang LTO
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v7 02/17] kbuild: add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v7 02/17] kbuild: add support for Clang LTO
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 02/17] kbuild: add support for Clang LTO
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH v7 00/17] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v7 00/17] Add support for Clang LTO
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v7 02/17] kbuild: add support for Clang LTO
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 02/17] kbuild: add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v7 00/17] Add support for Clang LTO
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v7 00/17] Add support for Clang LTO
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v24 02/12] landlock: Add ruleset and domain management
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v4] mm: Optional full ASLR for mmap() and mremap()
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v7 02/17] kbuild: add support for Clang LTO
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v7 00/17] Add support for Clang LTO
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v4] mm: Optional full ASLR for mmap() and mremap()
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH v7 17/17] arm64: allow LTO_CLANG and THINLTO to be selected
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 16/17] arm64: disable recordmcount with DYNAMIC_FTRACE_WITH_REGS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 15/17] KVM: arm64: disable LTO for the nVHE directory
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 14/17] arm64: vdso: disable LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 13/17] drivers/misc/lkdtm: disable LTO for rodata.o
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 12/17] efi/libstub: disable LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 11/17] scripts/mod: disable LTO for empty.c
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 10/17] modpost: lto: strip .lto from module names
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 09/17] PCI: Fix PREL32 relocations for LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 08/17] init: lto: fix PREL32 relocations
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 07/17] init: lto: ensure initcall ordering
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 06/17] kbuild: lto: remove duplicate dependencies from .mod files
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 05/17] kbuild: lto: merge module sections
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 04/17] kbuild: lto: limit inlining
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 03/17] kbuild: lto: fix module versioning
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 02/17] kbuild: add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 01/17] tracing: move function tracer options to Kconfig
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 00/17] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v24 00/12] Landlock LSM
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v22 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v22 01/12] landlock: Add object management
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v2 0/8] Fork brute force attack mitigation
- From: John Wood <john.wood@xxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- [PATCH v24 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 10/12] selftests/landlock: Add user space tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 09/12] arch: Wire up Landlock syscalls
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 04/12] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 03/12] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2 0/8] Fork brute force attack mitigation
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v23 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v23 00/12] Landlock LSM
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v2 7/8] Documentation: Add documentation for the Brute LSM
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v2 7/8] Documentation: Add documentation for the Brute LSM
- From: John Wood <john.wood@xxxxxxx>
- Re: [PATCH v2 7/8] Documentation: Add documentation for the Brute LSM
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/8] Fork brute force attack mitigation
- From: John Wood <john.wood@xxxxxxx>
- Re: [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxxxxx>
- Re: [PATCH 0/4] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH 0/4] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Jeremy Linton <jeremy.linton@xxxxxxx>
- Re: [PATCH 0/4] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Jeremy Linton <jeremy.linton@xxxxxxx>
- Re: [PATCH 0/4] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [RFC PATCH v1 4/4] Allow to change the user namespace in which user rlimits are counted
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH 0/4] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH 0/4] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 0/4] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH 0/4] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH 0/4] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 0/4] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [RFC PATCH v1 4/4] Allow to change the user namespace in which user rlimits are counted
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH 0/4] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Jeremy Linton <jeremy.linton@xxxxxxx>
- Re: [PATCH 0/4] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 0/4] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH 0/4] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH 0/4] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 0/4] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH 0/4] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- [PATCH v23 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 10/12] selftests/landlock: Add user space tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 09/12] arch: Wire up Landlock syscalls
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 04/12] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 03/12] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 0/4] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH v22 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 2/4] elf: Move note processing after l_phdr is updated [BZ #26831]
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH 2/4] elf: Move note processing after l_phdr is updated [BZ #26831]
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH 2/4] elf: Move note processing after l_phdr is updated [BZ #26831]
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH 2/4] elf: Move note processing after l_phdr is updated [BZ #26831]
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH 3/4] aarch64: Use mmap to add PROT_BTI instead of mprotect [BZ #26831]
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- [PATCH 3/4] aarch64: Use mmap to add PROT_BTI instead of mprotect [BZ #26831]
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- [PATCH 4/4] aarch64: Remove the bti link_map field [BZ #26831]
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- [PATCH 2/4] elf: Move note processing after l_phdr is updated [BZ #26831]
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- [PATCH 1/4] elf: Pass the fd to note processing [BZ #26831]
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- [PATCH 0/4] aarch64: avoid mprotect(PROT_BTI|PROT_EXEC) [BZ #26831]
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [RFC PATCH v1 1/4] Increase size of ucounts to atomic_long_t
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [RFC PATCH v1 1/4] Increase size of ucounts to atomic_long_t
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC PATCH v1 0/4] Per user namespace rlimits
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC PATCH v1 4/4] Allow to change the user namespace in which user rlimits are counted
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [RFC PATCH v1 4/4] Allow to change the user namespace in which user rlimits are counted
- From: Jann Horn <jannh@xxxxxxxxxx>
- [RFC PATCH v1 1/4] Increase size of ucounts to atomic_long_t
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [RFC PATCH v1 3/4] Do not allow fork if RLIMIT_NPROC is exceeded in the user namespace tree
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [RFC PATCH v1 2/4] Move the user's process counter to ucounts
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [RFC PATCH v1 4/4] Allow to change the user namespace in which user rlimits are counted
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [RFC PATCH v1 0/4] Per user namespace rlimits
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v22 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v22 08/12] landlock: Add syscall implementations
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v22 01/12] landlock: Add object management
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v22 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v22 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v22 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v22 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v22 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v22 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v22 12/12] landlock: Add user and kernel documentation
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v22 08/12] landlock: Add syscall implementations
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v22 07/12] landlock: Support filesystem access-control
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v22 06/12] fs,security: Add sb_delete hook
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v22 04/12] landlock: Add ptrace restrictions
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v22 03/12] landlock: Set up the security framework and manage credentials
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v22 02/12] landlock: Add ruleset and domain management
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v22 01/12] landlock: Add object management
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v22 00/12] Landlock LSM
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v22 09/12] arch: Wire up Landlock syscalls
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v22 06/12] fs,security: Add sb_delete hook
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v22 05/12] LSM: Infrastructure management of the superblock
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH v22 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 10/12] selftests/landlock: Add user space tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 09/12] arch: Wire up Landlock syscalls
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 04/12] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 03/12] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v22 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RESEND PATCH v11 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: BTI interaction between seccomp filters in systemd and glibc mprotect calls, causing service failures
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: BTI interaction between seccomp filters in systemd and glibc mprotect calls, causing service failures
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: BTI interaction between seccomp filters in systemd and glibc mprotect calls, causing service failures
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: BTI interaction between seccomp filters in systemd and glibc mprotect calls, causing service failures
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v2 8/8] MAINTAINERS: Add a new entry for the Brute LSM
- From: John Wood <john.wood@xxxxxxx>
- [PATCH v2 7/8] Documentation: Add documentation for the Brute LSM
- From: John Wood <john.wood@xxxxxxx>
- [PATCH v2 6/8] security/brute: Add prctls to enable/disable the fork attack detection
- From: John Wood <john.wood@xxxxxxx>
- [PATCH v2 5/8] security/brute: Mitigate a fork brute force attack
- From: John Wood <john.wood@xxxxxxx>
- [PATCH v2 4/8] security/brute: Detect a fork brute force attack
- From: John Wood <john.wood@xxxxxxx>
- [PATCH v2 3/8] security/brute: Add sysctl attributes to allow detection fine tuning
- From: John Wood <john.wood@xxxxxxx>
- [PATCH v2 2/8] security/brute: Define a LSM and manage statistical data
- From: John Wood <john.wood@xxxxxxx>
- [PATCH v2 1/8] security: Add LSM hook at the point where a task gets a fatal signal
- From: John Wood <john.wood@xxxxxxx>
- Re: BTI interaction between seccomp filters in systemd and glibc mprotect calls, causing service failures
- From: Jordan Glover <Golden_Miller83@xxxxxxxxxxxxx>
- [PATCH v2 0/8] Fork brute force attack mitigation
- From: John Wood <john.wood@xxxxxxx>
- Re: BTI interaction between seccomp filters in systemd and glibc mprotect calls, causing service failures
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: BTI interaction between seccomp filters in systemd and glibc mprotect calls, causing service failures
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: BTI interaction between seccomp filters in systemd and glibc mprotect calls, causing service failures
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: BTI interaction between seccomp filters in systemd and glibc mprotect calls, causing service failures
- From: Salvatore Mesoraca <s.mesoraca16@xxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: BTI interaction between seccomp filters in systemd and glibc mprotect calls, causing service failures
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: BTI interaction between seccomp filters in systemd and glibc mprotect calls, causing service failures
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: BTI interaction between seccomp filters in systemd and glibc mprotect calls, causing service failures
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
- From: Mike Kravetz <mike.kravetz@xxxxxxxxxx>
- Re: [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
- From: Guilherme Piccoli <gpiccoli@xxxxxxxxxxxxx>
- Re: [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
- From: Mike Kravetz <mike.kravetz@xxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v6 13/25] kbuild: lto: merge module sections
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
- From: Michal Hocko <mhocko@xxxxxxxx>
- [PATCH] mm, hugetlb: Avoid double clearing for hugetlb pages
- From: "Guilherme G. Piccoli" <gpiccoli@xxxxxxxxxxxxx>
- Re: [RESEND PATCH v11 2/3] arch: Wire up trusted_for(2)
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [RESEND PATCH v11 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RESEND PATCH v11 2/3] arch: Wire up trusted_for(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RESEND PATCH v11 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RESEND PATCH v11 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v6 07/25] treewide: remove DISABLE_LTO
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v6 02/25] objtool: Add a pass for generating __mcount_loc
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v21 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v6 16/25] init: lto: fix PREL32 relocations
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v6 17/25] PCI: Fix PREL32 relocations for LTO
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 16/25] init: lto: fix PREL32 relocations
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 14/25] kbuild: lto: remove duplicate dependencies from .mod files
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 13/25] kbuild: lto: merge module sections
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 07/25] treewide: remove DISABLE_LTO
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v21 07/12] landlock: Support filesystem access-control
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v21 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v21 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v6 02/25] objtool: Add a pass for generating __mcount_loc
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v21 07/12] landlock: Support filesystem access-control
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 02/25] objtool: Add a pass for generating __mcount_loc
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: Remove all strlcpy() uses in favor of strscpy() (#89)
- From: Romain Perier <romain.perier@xxxxxxxxx>
- [PATCH v6 25/25] x86, build: allow LTO_CLANG and THINLTO to be selected
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 24/25] x86, cpu: disable LTO for cpu.c
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 23/25] x86, vdso: disable LTO only for vDSO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 22/25] x86/asm: annotate indirect jumps
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 21/25] drivers/misc/lkdtm: disable LTO for rodata.o
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 20/25] efi/libstub: disable LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 19/25] scripts/mod: disable LTO for empty.c
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 18/25] modpost: lto: strip .lto from module names
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 17/25] PCI: Fix PREL32 relocations for LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 16/25] init: lto: fix PREL32 relocations
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 15/25] init: lto: ensure initcall ordering
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 14/25] kbuild: lto: remove duplicate dependencies from .mod files
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 13/25] kbuild: lto: merge module sections
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 12/25] kbuild: lto: limit inlining
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 11/25] kbuild: lto: postpone objtool
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 10/25] objtool: Split noinstr validation from --vmlinux
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 09/25] kbuild: lto: fix module versioning
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 08/25] kbuild: add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 07/25] treewide: remove DISABLE_LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 06/25] x86, build: use objtool mcount
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 05/25] tracing: add support for objtool mcount
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 04/25] tracing: move function tracer options to Kconfig
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 03/25] objtool: Don't autodetect vmlinux.o
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 02/25] objtool: Add a pass for generating __mcount_loc
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 01/25] kbuild: preprocess module linker script
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 00/25] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v5 25/29] arm64: allow LTO_CLANG and THINLTO to be selected
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 25/29] arm64: allow LTO_CLANG and THINLTO to be selected
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v5 25/29] arm64: allow LTO_CLANG and THINLTO to be selected
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Remove all strlcpy() uses in favor of strscpy() (#89)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 25/29] arm64: allow LTO_CLANG and THINLTO to be selected
- From: Will Deacon <will@xxxxxxxxxx>
- Remove all strlcpy() uses in favor of strscpy() (#89)
- From: Romain Perier <romain.perier@xxxxxxxxx>
- Re: [PATCH v5 00/29] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v5 00/29] Add support for Clang LTO
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v5 00/29] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v5 00/29] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v5 00/29] Add support for Clang LTO
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v5 00/29] Add support for Clang LTO
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- [PATCH v5 29/29] x86, build: allow LTO_CLANG and THINLTO to be selected
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 28/29] x86, cpu: disable LTO for cpu.c
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 27/29] x86, vdso: disable LTO only for vDSO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 26/29] x86/asm: annotate indirect jumps
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 25/29] arm64: allow LTO_CLANG and THINLTO to be selected
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 24/29] arm64: disable recordmcount with DYNAMIC_FTRACE_WITH_REGS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 23/29] KVM: arm64: disable LTO for the nVHE directory
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 22/29] arm64: vdso: disable LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 21/29] drivers/misc/lkdtm: disable LTO for rodata.o
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 20/29] efi/libstub: disable LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 19/29] scripts/mod: disable LTO for empty.c
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 18/29] modpost: lto: strip .lto from module names
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 17/29] PCI: Fix PREL32 relocations for LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 16/29] init: lto: fix PREL32 relocations
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 15/29] init: lto: ensure initcall ordering
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 14/29] kbuild: lto: remove duplicate dependencies from .mod files
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 13/29] kbuild: lto: merge module sections
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 12/29] kbuild: lto: limit inlining
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 11/29] kbuild: lto: postpone objtool
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 10/29] objtool: Split noinstr validation from --vmlinux
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 09/29] kbuild: lto: fix module versioning
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 08/29] kbuild: add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 07/29] treewide: remove DISABLE_LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 06/29] x86, build: use objtool mcount
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 05/29] tracing: add support for objtool mcount
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 04/29] tracing: move function tracer options to Kconfig
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 03/29] objtool: Don't autodetect vmlinux.o
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 02/29] objtool: Add a pass for generating __mcount_loc
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 01/29] kbuild: preprocess module linker script
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 00/29] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v21 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v21 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v21 10/12] selftests/landlock: Add initial tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v21 09/12] arch: Wire up Landlock syscalls
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v21 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v21 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v21 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v21 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v21 04/12] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v21 03/12] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v21 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v21 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v21 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: Linux-specific kernel hardening
- From: Romain Perier <romain.perier@xxxxxxxxx>
- Re: Linux-specific kernel hardening
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH RFC v2 0/6] Break heap spraying needed for exploiting use-after-free
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH RFC v2 0/6] Break heap spraying needed for exploiting use-after-free
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH RFC v2 0/6] Break heap spraying needed for exploiting use-after-free
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: Linux-specific kernel hardening
- From: Solar Designer <solar@xxxxxxxxxxxx>
- Re: [PATCH RFC v2 0/6] Break heap spraying needed for exploiting use-after-free
- From: Christopher Lameter <cl@xxxxxxxxx>
- Re: [PATCH RFC v2 0/6] Break heap spraying needed for exploiting use-after-free
- From: Christopher Lameter <cl@xxxxxxxxx>
- Re: [PATCH] random32: Restore __latent_entropy attribute on net_rand_state
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] random32: Restore __latent_entropy attribute on net_rand_state
- From: Willy Tarreau <w@xxxxxx>
- Re: [PATCH RFC v2 0/6] Break heap spraying needed for exploiting use-after-free
- From: Daniel Micay <danielmicay@xxxxxxxxx>
- Re: [PATCH RFC v2 0/6] Break heap spraying needed for exploiting use-after-free
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] random32: Restore __latent_entropy attribute on net_rand_state
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH RFC v2 0/6] Break heap spraying needed for exploiting use-after-free
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH RFC v2 0/6] Break heap spraying needed for exploiting use-after-free
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH RFC v2 0/6] Break heap spraying needed for exploiting use-after-free
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- [PATCH v2] MAINTAINERS: Change hardening mailing list
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Change hardening mailing list
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] MAINTAINERS: Change hardening mailing list
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2 0/6] Break heap spraying needed for exploiting use-after-free
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH] MAINTAINERS: Change hardening mailing list
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Linux-specific kernel hardening
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Linux-specific kernel hardening
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: Linux-specific kernel hardening
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Linux-specific kernel hardening
- From: Solar Designer <solar@xxxxxxxxxxxx>
- Re: Linux-specific kernel hardening
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- Re: Linux-specific kernel hardening
- From: Solar Designer <solar@xxxxxxxxxxxx>
- Re: [PATCH v4 04/29] objtool: Add a pass for generating __mcount_loc
- From: Miroslav Benes <mbenes@xxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Jay K <jayk123@xxxxxxxxxxx>
- Re: [RFC PATCH 3/6] security/fbfam: Use the api to manage statistics
- From: John Wood <john.wood@xxxxxxx>
- Re: [PATCH] random32: Restore __latent_entropy attribute on net_rand_state
- From: Willy Tarreau <w@xxxxxx>
- [PATCH] random32: Restore __latent_entropy attribute on net_rand_state
- From: Thibaut Sautereau <thibaut.sautereau@xxxxxxxxxxx>
- Re: [PATCH v4 04/29] objtool: Add a pass for generating __mcount_loc
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v11 2/3] arch: Wire up trusted_for(2)
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH v11 2/3] arch: Wire up trusted_for(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH RFC v2 2/6] mm/slab: Perform init_on_free earlier
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH RFC v2 0/6] Break heap spraying needed for exploiting use-after-free
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- [PATCH v11 2/3] arch: Wire up trusted_for(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v11 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v11 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v11 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 04/29] objtool: Add a pass for generating __mcount_loc
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 04/29] objtool: Add a pass for generating __mcount_loc
- From: Miroslav Benes <mbenes@xxxxxxx>
- Re: [PATCH v4 00/29] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v4 00/29] Add support for Clang LTO
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v4 00/29] Add support for Clang LTO
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 10/29] treewide: remove DISABLE_LTO
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 1/2] arm64/acpi: disallow AML memory opregions to access kernel memory
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v4 09/29] arm64: disable recordmcount with DYNAMIC_FTRACE_WITH_REGS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v4 06/29] tracing: move function tracer options to Kconfig
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH RFC v2 2/6] mm/slab: Perform init_on_free earlier
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v3 1/2] arm64/acpi: disallow AML memory opregions to access kernel memory
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 09/29] arm64: disable recordmcount with DYNAMIC_FTRACE_WITH_REGS
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: Linux-specific kernel hardening
- From: Solar Designer <solar@xxxxxxxxxxxx>
- Re: [PATCH v4 06/29] tracing: move function tracer options to Kconfig
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [RFC PATCH 3/6] security/fbfam: Use the api to manage statistics
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [RFC PATCH 3/6] security/fbfam: Use the api to manage statistics
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: Linux-specific kernel hardening
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 29/29] x86, build: allow LTO_CLANG and THINLTO to be selected
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 28/29] x86, cpu: disable LTO for cpu.c
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 27/29] x86, vdso: disable LTO only for vDSO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 26/29] arm64: allow LTO_CLANG and THINLTO to be selected
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 25/29] KVM: arm64: disable LTO for the nVHE directory
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 24/29] arm64: vdso: disable LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 23/29] drivers/misc/lkdtm: disable LTO for rodata.o
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 22/29] efi/libstub: disable LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 21/29] scripts/mod: disable LTO for empty.c
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 20/29] modpost: lto: strip .lto from module names
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 19/29] PCI: Fix PREL32 relocations for LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 18/29] init: lto: fix PREL32 relocations
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 17/29] init: lto: ensure initcall ordering
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 16/29] kbuild: lto: remove duplicate dependencies from .mod files
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 15/29] kbuild: lto: merge module sections
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 14/29] kbuild: lto: limit inlining
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 13/29] kbuild: lto: postpone objtool
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 12/29] kbuild: lto: fix module versioning
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 11/29] kbuild: add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 10/29] treewide: remove DISABLE_LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 09/29] arm64: disable recordmcount with DYNAMIC_FTRACE_WITH_REGS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 08/29] x86, build: use objtool mcount
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 07/29] tracing: add support for objtool mcount
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 06/29] tracing: move function tracer options to Kconfig
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 05/29] objtool: Don't autodetect vmlinux.o
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 04/29] objtool: Add a pass for generating __mcount_loc
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 03/29] kbuild: preprocess module linker script
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 02/29] x86/asm: Replace __force_order with memory clobber
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 01/29] RAS/CEC: Fix cec_init() prototype
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 00/29] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: Linux-specific kernel hardening
- From: Solar Designer <solar@xxxxxxxxxxxx>
- Re: [PATCH v5 00/10] Function Granular KASLR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 1/2] arm64/acpi: disallow AML memory opregions to access kernel memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH RFC v2 6/6] mm: Add heap quarantine verbose debugging (not for merge)
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- [PATCH RFC v2 5/6] lkdtm: Add heap quarantine tests
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- [PATCH RFC v2 4/6] mm: Implement slab quarantine randomization
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- [PATCH RFC v2 3/6] mm: Integrate SLAB_QUARANTINE with init_on_free
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- [PATCH RFC v2 2/6] mm/slab: Perform init_on_free earlier
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- [PATCH RFC v2 1/6] mm: Extract SLAB_QUARANTINE from KASAN
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- [PATCH RFC v2 0/6] Break heap spraying needed for exploiting use-after-free
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Linux-specific kernel hardening
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 00/10] Function Granular KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] arm64/acpi: disallow AML memory opregions to access kernel memory
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v3 1/2] arm64/acpi: disallow AML memory opregions to access kernel memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v3 1/2] arm64/acpi: disallow AML memory opregions to access kernel memory
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/10] Function Granular KASLR
- From: Miroslav Benes <mbenes@xxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v10 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v10 2/3] arch: Wire up trusted_for(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v10 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v10 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 10/10] livepatch: only match unique symbols when using fgkaslr
- From: Miroslav Benes <mbenes@xxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Solar Designer <solar@xxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Solar Designer <solar@xxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Solar Designer <solar@xxxxxxxxxxxx>
- [PATCH v5 10/10] livepatch: only match unique symbols when using fgkaslr
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v5 09/10] module: Reorder functions
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v5 08/10] kallsyms: Hide layout
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v5 07/10] x86: Add support for function granular KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v5 06/10] x86/boot/compressed: Avoid duplicate malloc() implementations
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v5 05/10] x86/tools: Add relative relocs for randomized functions
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v5 04/10] x86: Make sure _etext includes function sections
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v5 03/10] x86: Makefile: Add build and config option for CONFIG_FG_KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v5 02/10] x86/boot: Allow a "silent" kaslr random byte fetch
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v5 01/10] x86: tools/relocs: Support >64K section headers
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v5 00/10] Function Granular KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Solar Designer <solar@xxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Solar Designer <solar@xxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Jay K <jayk123@xxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 4/4] [RFC] arm/trampfd: Provide support for the trampoline file descriptor
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- [PATCH v2 3/4] [RFC] arm64/trampfd: Provide support for the trampoline file descriptor
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- [PATCH v2 2/4] [RFC] x86/trampfd: Provide support for the trampoline file descriptor
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- [PATCH v2 1/4] [RFC] fs/trampfd: Implement the trampoline file descriptor API
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- Re: [PATCH v3 13/30] kbuild: lto: postpone objtool
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v3 03/30] x86/boot/compressed: Disable relocation relaxation
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [RFC PATCH 6/6] security/fbfam: Mitigate a fork brute force attack
- From: John Wood <john.wood@xxxxxxx>
- Re: [RFC PATCH 6/6] security/fbfam: Mitigate a fork brute force attack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 17/30] init: lto: ensure initcall ordering
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 13/30] kbuild: lto: postpone objtool
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 00/30] Add support for Clang LTO
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v3 00/30] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v3 00/30] Add support for Clang LTO
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- [PATCH v3 30/30] x86, build: allow LTO_CLANG and THINLTO to be selected
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 29/30] x86, cpu: disable LTO for cpu.c
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 28/30] x86, vdso: disable LTO only for vDSO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 27/30] arm64: allow LTO_CLANG and THINLTO to be selected
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 26/30] KVM: arm64: disable LTO for the nVHE directory
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 25/30] arm64: vdso: disable LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 24/30] arm64: export CC_USING_PATCHABLE_FUNCTION_ENTRY
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 23/30] drivers/misc/lkdtm: disable LTO for rodata.o
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 22/30] efi/libstub: disable LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 21/30] scripts/mod: disable LTO for empty.c
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 20/30] modpost: lto: strip .lto from module names
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 19/30] PCI: Fix PREL32 relocations for LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 18/30] init: lto: fix PREL32 relocations
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 17/30] init: lto: ensure initcall ordering
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 16/30] kbuild: lto: remove duplicate dependencies from .mod files
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 15/30] kbuild: lto: merge module sections
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 14/30] kbuild: lto: limit inlining
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 13/30] kbuild: lto: postpone objtool
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 12/30] kbuild: lto: fix module versioning
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 11/30] kbuild: add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 10/30] treewide: remove DISABLE_LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 09/30] x86, build: use objtool mcount
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 08/30] kbuild: add support for objtool mcount
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 07/30] objtool: Don't autodetect vmlinux.o
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 06/30] objtool: Add a pass for generating __mcount_loc
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 05/30] kbuild: preprocess module linker script
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 04/30] x86/asm: Replace __force_order with memory clobber
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 03/30] x86/boot/compressed: Disable relocation relaxation
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 02/30] RAS/CEC: Fix cec_init() prototype
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 01/30] lib/string.c: implement stpcpy
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v3 00/30] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [RFC PATCH 6/6] security/fbfam: Mitigate a fork brute force attack
- From: John Wood <john.wood@xxxxxxx>
[Index of Archives]
[Linux Samsung SoC]
[Linux Rockchip SoC]
[Linux for Synopsys ARC Processors]
[Linux Actions SoC]
[Linux Kernel]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Scanners]
[Yosemite Forum]