Kernel Hardening
[Prev Page][Next Page]
- Re: [PATCH] sched.h: drop in_ubsan field when UBSAN is in trap mode
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2 05/28] objtool: Add a pass for generating __mcount_loc
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 00/28] Add support for Clang LTO
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- [RFC PATCH v9 3/3] selftest/interpreter: Add tests for introspect_access(2) policies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v9 2/3] arch: Wire up introspect_access(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v9 1/3] fs: Add introspect_access(2) syscall implementation and related sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2 00/28] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v2 15/28] init: lto: ensure initcall ordering
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH] sched.h: drop in_ubsan field when UBSAN is in trap mode
- From: Elena Petrova <lenaptr@xxxxxxxxxx>
- Re: [PATCH v2 15/28] init: lto: ensure initcall ordering
- From: David Woodhouse <dwmw2@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Thibaut Sautereau <thibaut.sautereau@xxxxxxxxxxx>
- Re: [PATCH v2 00/28] Add support for Clang LTO
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2 00/28] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v2 27/28] x86, relocs: Ignore L4_PAGE_OFFSET relocations
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v2 22/28] arm64: export CC_USING_PATCHABLE_FUNCTION_ENTRY
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v2 15/28] init: lto: ensure initcall ordering
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v2 13/28] kbuild: lto: merge module sections
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v2 11/28] kbuild: lto: postpone objtool
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 10/28] kbuild: lto: fix module versioning
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v2 09/28] kbuild: add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2 09/28] kbuild: add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v2 09/28] kbuild: add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v2 09/28] kbuild: add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v6 3/3] io_uring: allow disabling rings during the creation
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v6 3/3] io_uring: allow disabling rings during the creation
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v6 3/3] io_uring: allow disabling rings during the creation
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v6 3/3] io_uring: allow disabling rings during the creation
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- [RFC PATCH v8 3/3] selftest/interpreter: Add tests for AT_INTERPRETED enforcing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v8 2/3] fs,doc: Enable to configure exec checks for AT_INTERPRETED
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH 0/9] Fork brute force attack mitigation (fbfam)
- From: John Wood <john.wood@xxxxxxx>
- Re: [PATCH v2 09/28] kbuild: add support for Clang LTO
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v2 13/28] kbuild: lto: merge module sections
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v3 4/6] powerpc: Introduce temporary mm
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxx>
- Re: [RFC PATCH 0/9] Fork brute force attack mitigation (fbfam)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 0/9] Fork brute force attack mitigation (fbfam)
- From: John Wood <john.wood@xxxxxxx>
- Re: [RFC PATCH 0/9] Fork brute force attack mitigation (fbfam)
- From: John Wood <john.wood@xxxxxxx>
- [RFC PATCH 0/9] Fork brute force attack mitigation (fbfam)
- From: John Wood <john.wood@xxxxxxx>
- [RFC PATCH 0/9] Fork brute force attack mitigation (fbfam)
- From: John Wood <john.wood@xxxxxxx>
- Re: [PATCH v2 00/28] Add support for Clang LTO
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v2 09/28] kbuild: add support for Clang LTO
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v2 09/28] kbuild: add support for Clang LTO
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v20 05/12] LSM: Infrastructure management of the superblock
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v2 05/28] objtool: Add a pass for generating __mcount_loc
- From: peterz@xxxxxxxxxxxxx
- Re: [PATCH v2 00/28] Add support for Clang LTO
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: [PATCH v2 00/28] Add support for Clang LTO
- From: peterz@xxxxxxxxxxxxx
- Re: [PATCH v2 00/28] Add support for Clang LTO
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: [PATCH v2 01/28] x86/boot/compressed: Disable relocation relaxation
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH v2 00/28] Add support for Clang LTO
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH v2 01/28] x86/boot/compressed: Disable relocation relaxation
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2 00/28] Add support for Clang LTO
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 00/28] Add support for Clang LTO
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 28/28] x86, build: allow LTO_CLANG and THINLTO to be selected
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 27/28] x86, relocs: Ignore L4_PAGE_OFFSET relocations
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 26/28] x86, vdso: disable LTO only for vDSO
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 25/28] arm64: allow LTO_CLANG and THINLTO to be selected
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 24/28] KVM: arm64: disable LTO for the nVHE directory
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 23/28] arm64: vdso: disable LTO
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 22/28] arm64: export CC_USING_PATCHABLE_FUNCTION_ENTRY
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 20/28] efi/libstub: disable LTO
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 19/28] scripts/mod: disable LTO for empty.c
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 18/28] modpost: lto: strip .lto from module names
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 17/28] PCI: Fix PREL32 relocations for LTO
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 16/28] init: lto: fix PREL32 relocations
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 15/28] init: lto: ensure initcall ordering
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 14/28] kbuild: lto: remove duplicate dependencies from .mod files
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 13/28] kbuild: lto: merge module sections
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 12/28] kbuild: lto: limit inlining
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 11/28] kbuild: lto: postpone objtool
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 08/28] x86, build: use objtool mcount
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v2 10/28] kbuild: lto: fix module versioning
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 09/28] kbuild: add support for Clang LTO
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 05/28] objtool: Add a pass for generating __mcount_loc
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v2 08/28] x86, build: use objtool mcount
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 07/28] kbuild: add support for objtool mcount
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 06/28] objtool: Don't autodetect vmlinux.o
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 05/28] objtool: Add a pass for generating __mcount_loc
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 04/28] RAS/CEC: Fix cec_init() prototype
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 03/28] lib/string.c: implement stpcpy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 02/28] x86/asm: Replace __force_order with memory clobber
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 01/28] x86/boot/compressed: Disable relocation relaxation
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 28/28] x86, build: allow LTO_CLANG and THINLTO to be selected
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 27/28] x86, relocs: Ignore L4_PAGE_OFFSET relocations
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 26/28] x86, vdso: disable LTO only for vDSO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 25/28] arm64: allow LTO_CLANG and THINLTO to be selected
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 24/28] KVM: arm64: disable LTO for the nVHE directory
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 23/28] arm64: vdso: disable LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 22/28] arm64: export CC_USING_PATCHABLE_FUNCTION_ENTRY
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 21/28] drivers/misc/lkdtm: disable LTO for rodata.o
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 20/28] efi/libstub: disable LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 19/28] scripts/mod: disable LTO for empty.c
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 18/28] modpost: lto: strip .lto from module names
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 17/28] PCI: Fix PREL32 relocations for LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 16/28] init: lto: fix PREL32 relocations
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 15/28] init: lto: ensure initcall ordering
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 14/28] kbuild: lto: remove duplicate dependencies from .mod files
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 13/28] kbuild: lto: merge module sections
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 12/28] kbuild: lto: limit inlining
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 11/28] kbuild: lto: postpone objtool
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 10/28] kbuild: lto: fix module versioning
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 09/28] kbuild: add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 08/28] x86, build: use objtool mcount
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 07/28] kbuild: add support for objtool mcount
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 06/28] objtool: Don't autodetect vmlinux.o
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 05/28] objtool: Add a pass for generating __mcount_loc
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 04/28] RAS/CEC: Fix cec_init() prototype
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 03/28] lib/string.c: implement stpcpy
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 02/28] x86/asm: Replace __force_order with memory clobber
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 01/28] x86/boot/compressed: Disable relocation relaxation
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2 00/28] Add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH] scripts: Add intended executable mode and SPDX license
- From: Solar Designer <solar@xxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] scripts: Add intended executable mode and SPDX license
- From: "Tobin C. Harding" <me@xxxxxxxx>
- Re: [PATCH] scripts: Add intended executable mode and SPDX license
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH] scripts: Add intended executable mode and SPDX license
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] scripts: Add intended executable mode and SPDX license
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: [PATCH] scripts: Add intended executable mode and SPDX license
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Miroslav Benes <mbenes@xxxxxxx>
- Re: [PATCH v6 0/3] io_uring: add restrictions to support untrusted applications and guests
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v3 3/6] Add LKDTM test to hijack a patch mapping (powerpc, x86_64)
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] scripts: Add intended executable mode and SPDX license
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 3/3] io_uring: allow disabling rings during the creation
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 3/3] io_uring: allow disabling rings during the creation
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v6 2/3] io_uring: add IOURING_REGISTER_RESTRICTIONS opcode
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v6 1/3] io_uring: use an enumeration for io_uring_register(2) opcodes
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v6 0/3] io_uring: add restrictions to support untrusted applications and guests
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v5 0/3] io_uring: add restrictions to support untrusted applications and guests
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v5 0/3] io_uring: add restrictions to support untrusted applications and guests
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v3 4/6] powerpc: Introduce temporary mm
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v5 0/3] io_uring: add restrictions to support untrusted applications and guests
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v5 0/3] io_uring: add restrictions to support untrusted applications and guests
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v5 2/3] io_uring: add IOURING_REGISTER_RESTRICTIONS opcode
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v5 0/3] io_uring: add restrictions to support untrusted applications and guests
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v5 2/3] io_uring: add IOURING_REGISTER_RESTRICTIONS opcode
- From: Jens Axboe <axboe@xxxxxxxxx>
- [PATCH v5 3/3] io_uring: allow disabling rings during the creation
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v5 2/3] io_uring: add IOURING_REGISTER_RESTRICTIONS opcode
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v5 1/3] io_uring: use an enumeration for io_uring_register(2) opcodes
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v5 0/3] io_uring: add restrictions to support untrusted applications and guests
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH] scripts: Add intended executable mode and SPDX license
- From: Solar Designer <solar@xxxxxxxxxxxx>
- Re: [PATCH] scripts: Add intended executable mode and SPDX license
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- Re: [PATCH] scripts: Add intended executable mode and SPDX license
- From: Lukas Bulwahn <lukas.bulwahn@xxxxxxxxx>
- [PATCH] scripts: Add intended executable mode and SPDX license
- From: Mrinal Pandey <mrinalmni@xxxxxxxxx>
- Re: [PATCH v3 3/6] Add LKDTM test to hijack a patch mapping (powerpc, x86_64)
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] scripts: Add intended executable mode and SPDX license
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] scripts: Add intended executable mode and SPDX license
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] io_uring: add restrictions to support untrusted applications and guests
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v4 3/3] io_uring: allow disabling rings during the creation
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v4 2/3] io_uring: add IOURING_REGISTER_RESTRICTIONS opcode
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v4 1/3] io_uring: use an enumeration for io_uring_register(2) opcodes
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v3 6/6] powerpc: Use a temporary mm for code patching
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxx>
- [PATCH v3 2/6] x86: Add LKDTM accessor for patching addr
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxx>
- [PATCH v3 5/6] powerpc: Initialize a temporary mm for code patching
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxx>
- [PATCH v3 1/6] powerpc: Add LKDTM accessor for patching addr
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxx>
- [PATCH v3 3/6] Add LKDTM test to hijack a patch mapping (powerpc,x86_64)
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxx>
- [PATCH v3 0/6] Use per-CPU temporary mappings for patching
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxx>
- [PATCH v3 4/6] powerpc: Introduce temporary mm
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxx>
- Re: [PATCH v4 1/3] io_uring: use an enumeration for io_uring_register(2) opcodes
- From: Andreas Dilger <adilger@xxxxxxxxx>
- Re: [PATCH v4 3/3] io_uring: allow disabling rings during the creation
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 2/3] io_uring: add IOURING_REGISTER_RESTRICTIONS opcode
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 1/3] io_uring: use an enumeration for io_uring_register(2) opcodes
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 1/3] io_uring: use an enumeration for io_uring_register(2) opcodes
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 0/3] io_uring: add restrictions to support untrusted applications and guests
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 0/3] io_uring: add restrictions to support untrusted applications and guests
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Joe Lawrence <joe.lawrence@xxxxxxxxxx>
- Re: [PATCH v4 0/3] io_uring: add restrictions to support untrusted applications and guests
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: init_on_alloc/init_on_free boot options
- From: Jirka Hladky <jhladky@xxxxxxxxxx>
- Re: init_on_alloc/init_on_free boot options
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- init_on_alloc/init_on_free boot options
- From: Jirka Hladky <jhladky@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH RFC 1/2] mm: Extract SLAB_QUARANTINE from KASAN
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: usercopy arch_within_stack_frames() is a no-op in almost all modern kernel configurations
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH RFC 1/2] mm: Extract SLAB_QUARANTINE from KASAN
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- Re: [PATCH v2] overflow: Add __must_check attribute to check_*() helpers
- From: Leon Romanovsky <leon@xxxxxxxxxx>
- Re: [PATCH RFC 0/2] Break heap spraying needed for exploiting use-after-free
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- usercopy arch_within_stack_frames() is a no-op in almost all modern kernel configurations
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH RFC 1/2] mm: Extract SLAB_QUARANTINE from KASAN
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH RFC 1/2] mm: Extract SLAB_QUARANTINE from KASAN
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH v2] overflow: Add __must_check attribute to check_*() helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH RFC 2/2] lkdtm: Add heap spraying test
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH RFC 2/2] lkdtm: Add heap spraying test
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH RFC 2/2] lkdtm: Add heap spraying test
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH RFC 1/2] mm: Extract SLAB_QUARANTINE from KASAN
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH RFC 1/2] mm: Extract SLAB_QUARANTINE from KASAN
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- Re: [PATCH v4 2/3] io_uring: add IOURING_REGISTER_RESTRICTIONS opcode
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2] overflow: Add __must_check attribute to check_*() helpers
- From: Rasmus Villemoes <linux@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] overflow: Add __must_check attribute to check_*() helpers
- From: David Sterba <dsterba@xxxxxxx>
- Re: [PATCH v2 1/5] powerpc/mm: Introduce temporary mm
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] powerpc/lib: Initialize a temporary mm for code patching
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- Re: [PATCH RFC 1/2] mm: Extract SLAB_QUARANTINE from KASAN
- From: Pavel Machek <pavel@xxxxxxx>
- Re: [PATCH RFC 1/2] mm: Extract SLAB_QUARANTINE from KASAN
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH] overflow: Add __must_check attribute to check_*() helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2] overflow: Add __must_check attribute to check_*() helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH RFC 2/2] lkdtm: Add heap spraying test
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH RFC 1/2] mm: Extract SLAB_QUARANTINE from KASAN
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH RFC 0/2] Break heap spraying needed for exploiting use-after-free
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH RFC 0/2] Break heap spraying needed for exploiting use-after-free
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH v20 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v20 05/12] LSM: Infrastructure management of the superblock
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v4 2/3] io_uring: add IOURING_REGISTER_RESTRICTIONS opcode
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v4 3/3] io_uring: allow disabling rings during the creation
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v4 2/3] io_uring: add IOURING_REGISTER_RESTRICTIONS opcode
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v4 0/3] io_uring: add restrictions to support untrusted applications and guests
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v4 1/3] io_uring: use an enumeration for io_uring_register(2) opcodes
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v7 3/7] exec: Move path_noexec() check earlier
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH RFC 2/2] lkdtm: Add heap spraying test
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- [PATCH RFC 1/2] mm: Extract SLAB_QUARANTINE from KASAN
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- [PATCH RFC 0/2] Break heap spraying needed for exploiting use-after-free
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH v7 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v20 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] overflow: Add __must_check attribute to check_*() helpers
- From: Rasmus Villemoes <linux@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] overflow: Add __must_check attribute to check_*() helpers
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH] overflow: Add __must_check attribute to check_*() helpers
- From: Rasmus Villemoes <linux@xxxxxxxxxxxxxxxxxx>
- [PATCH] overflow: Add __must_check attribute to check_*() helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Modernize tasklet callback API
- From: Takashi Iwai <tiwai@xxxxxxx>
- Re: [PATCH 0/3] Modernize tasklet callback API
- From: Allen <allen.lkml@xxxxxxxxx>
- Re: [PATCH 0/3] Modernize tasklet callback API
- From: Allen <allen.lkml@xxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 0/3] Modernize tasklet callback API
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v7 3/7] exec: Move path_noexec() check earlier
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v7 2/7] exec: Move S_ISREG() check earlier
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v7 1/7] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v7 1/7] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Modernize tasklet callback API
- From: Allen <allen.lkml@xxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- RE: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] objtool,x86_64: Replace recordmcount with objtool
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [RFC] saturate check_*_overflow() output?
- From: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/3] io_uring: add restrictions to support untrusted applications and guests
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v2 2/5] powerpc/lib: Initialize a temporary mm for code patching
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH v2 1/5] powerpc/mm: Introduce temporary mm
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [RFC] saturate check_*_overflow() output?
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC] saturate check_*_overflow() output?
- From: Rasmus Villemoes <linux@xxxxxxxxxxxxxxxxxx>
- Re: [RFC] saturate check_*_overflow() output?
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [RFC] saturate check_*_overflow() output?
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Joe Lawrence <joe.lawrence@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Jessica Yu <jeyu@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: David Laight <David.Laight@xxxxxxxxxx>
- RE: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: "Frank Ch. Eigler" <fche@xxxxxxxxxx>
- Re: [RFC] saturate check_*_overflow() output?
- From: Rasmus Villemoes <linux@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: "Frank Ch. Eigler" <fche@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: "Frank Ch. Eigler" <fche@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- [RFC] saturate check_*_overflow() output?
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Joe Lawrence <joe.lawrence@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Evgenii Shatokhin <eshatokhin@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] Modernize tasklet callback API
- From: Allen <allen.lkml@xxxxxxxxx>
- RE: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: David Laight <David.Laight@xxxxxxxxxx>
- RE: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: David Laight <David.Laight@xxxxxxxxxx>
- RE: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- [PATCH v20 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v20 10/12] selftests/landlock: Add initial tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v20 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v20 09/12] arch: Wire up Landlock syscalls
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v20 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v20 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v20 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v20 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v20 04/12] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v20 03/12] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v20 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v20 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v20 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] kernel/trace: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH 1/3] usb: gadget: udc: Avoid tasklet passing a global
- From: Felipe Balbi <balbi@xxxxxxxxxx>
- Re: [PATCH 1/2] kbuild: move shared library build rules to scripts/gcc-plugins/Makefile
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 0/3] Modernize tasklet callback API
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Alternative CET ABI
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: Alternative CET ABI
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: Alternative CET ABI
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: Alternative CET ABI
- From: Jann Horn <jannh@xxxxxxxxxx>
- Alternative CET ABI
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 2/4] [RFC] x86/trampfd: Provide support for the trampoline file descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v1 2/4] [RFC] x86/trampfd: Provide support for the trampoline file descriptor
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] Modernize tasklet callback API
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] kbuild: move shared library build rules to scripts/gcc-plugins/Makefile
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- RE: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 1/2] kbuild: move shared library build rules to scripts/gcc-plugins/Makefile
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v4 10/10] module: Reorder functions
- From: Jessica Yu <jeyu@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/4] [RFC] fs/trampfd: Implement the trampoline file descriptor API
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/4] [RFC] fs/trampfd: Implement the trampoline file descriptor API
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v3 3/3] io_uring: allow disabling rings during the creation
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v3 2/3] io_uring: add IOURING_REGISTER_RESTRICTIONS opcode
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v3 1/3] io_uring: use an enumeration for io_uring_register(2) opcodes
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH v3 0/3] io_uring: add restrictions to support untrusted applications and guests
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- RE: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v1 1/4] [RFC] fs/trampfd: Implement the trampoline file descriptor API
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- [PATCH v1 4/4] [RFC] arm/trampfd: Provide support for the trampoline file descriptor
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- [PATCH v1 3/4] [RFC] arm64/trampfd: Provide support for the trampoline file descriptor
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- [PATCH v1 2/4] [RFC] x86/trampfd: Provide support for the trampoline file descriptor
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- [PATCH v1 1/4] [RFC] fs/trampfd: Implement the trampoline file descriptor API
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- Re: [PATCH 12/26] netfilter: switch nf_setsockopt to sockptr_t
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- RE: [PATCH 12/26] netfilter: switch nf_setsockopt to sockptr_t
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 12/26] netfilter: switch nf_setsockopt to sockptr_t
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 12/26] netfilter: switch nf_setsockopt to sockptr_t
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2 2/2] kernel/trace: Remove function callback casts
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] kernel/trace: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH v2 2/2] kernel/trace: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH v2 2/2] kernel/trace: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 6/7] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/2] kernel/trace: Remove function callback casts
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v2 2/2] kernel/trace: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH v2 2/2] kernel/trace: Remove function callback casts
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v2 2/2] kernel/trace: Remove function callback casts
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v2 2/2] kernel/trace: Remove function callback casts
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v2 2/2] kernel/trace: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH v2 2/2] kernel/trace: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH v2 2/2] kernel/trace: Remove function callback casts
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v2 2/2] kernel/trace: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Thibaut Sautereau <thibaut.sautereau@xxxxxxxxxxx>
- [PATCH v7 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 6/7] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 3/7] exec: Move path_noexec() check earlier
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 2/7] exec: Move S_ISREG() check earlier
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 1/7] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC][PATCH] objtool,x86_64: Replace recordmcount with objtool
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [RFC][PATCH] objtool,x86_64: Replace recordmcount with objtool
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [RFC][PATCH] objtool,x86_64: Replace recordmcount with objtool
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC][PATCH] objtool,x86_64: Replace recordmcount with objtool
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC][PATCH] objtool,x86_64: Replace recordmcount with objtool
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH 11/22] pci: lto: fix PREL32 relocations
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [RFC][PATCH] objtool,x86_64: Replace recordmcount with objtool
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [RFC][PATCH] objtool,x86_64: Replace recordmcount with objtool
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [RFC][PATCH] objtool,x86_64: Replace recordmcount with objtool
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Thibaut Sautereau <thibaut.sautereau@xxxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Joe Lawrence <joe.lawrence@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Joe Lawrence <joe.lawrence@xxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH RFC v2 2/3] io_uring: add IOURING_REGISTER_RESTRICTIONS opcode
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH RFC v2 2/3] io_uring: add IOURING_REGISTER_RESTRICTIONS opcode
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH RFC v2 2/3] io_uring: add IOURING_REGISTER_RESTRICTIONS opcode
- From: Daurnimator <quae@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 00/10] Function Granular KASLR
- From: Miroslav Benes <mbenes@xxxxxxx>
- Re: [PATCH v2 2/2] kernel/trace: Remove function callback casts
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH RFC v2 2/3] io_uring: add IOURING_REGISTER_RESTRICTIONS opcode
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH RFC v2 2/3] io_uring: add IOURING_REGISTER_RESTRICTIONS opcode
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v4 09/10] kallsyms: Hide layout
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [RFC][PATCH] objtool,x86_64: Replace recordmcount with objtool
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v4 09/10] kallsyms: Hide layout
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 2/2] kernel/trace: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- [PATCH v2 1/2] kernel/trace: Prepare to remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- [PATCH v2 0/2] kernel/trace: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: Clarification about the series to modernize the tasklet api
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: Clarification about the series to modernize the tasklet api
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH 11/22] pci: lto: fix PREL32 relocations
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [RFC][PATCH] objtool,x86_64: Replace recordmcount with objtool
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [RFC][PATCH] objtool,x86_64: Replace recordmcount with objtool
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [RFC][PATCH] objtool,x86_64: Replace recordmcount with objtool
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [RFC][PATCH] objtool,x86_64: Replace recordmcount with objtool
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 10/10] module: Reorder functions
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v4 09/10] kallsyms: Hide layout
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v4 04/10] x86: Makefile: Add build and config option for CONFIG_FG_KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v4 07/10] x86/boot/compressed: Avoid duplicate malloc() implementations
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v4 08/10] x86: Add support for function granular KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v4 06/10] x86/tools: Add relative relocs for randomized functions
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v4 05/10] x86: Make sure _etext includes function sections
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v4 03/10] x86/boot: Allow a "silent" kaslr random byte fetch
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v4 02/10] x86: tools/relocs: Support >64K section headers
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v4 01/10] objtool: Do not assume order of parent/child functions
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v4 00/10] Function Granular KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] powerpc/lib: Initialize a temporary mm for code patching
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH RFC v2 2/3] io_uring: add IOURING_REGISTER_RESTRICTIONS opcode
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH RFC v2 1/3] io_uring: use an enumeration for io_uring_register(2) opcodes
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH RFC v2 2/3] io_uring: add IOURING_REGISTER_RESTRICTIONS opcode
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH 0/3] Modernize tasklet callback API
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH RFC v2 1/3] io_uring: use an enumeration for io_uring_register(2) opcodes
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH RFC v2 1/3] io_uring: use an enumeration for io_uring_register(2) opcodes
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- Re: [PATCH 0/3] Modernize tasklet callback API
- From: Dmitry Torokhov <dmitry.torokhov@xxxxxxxxx>
- Re: [PATCH RFC v2 1/3] io_uring: use an enumeration for io_uring_register(2) opcodes
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH RFC v2 1/3] io_uring: use an enumeration for io_uring_register(2) opcodes
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH RFC v2 1/3] io_uring: use an enumeration for io_uring_register(2) opcodes
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- Re: [PATCH 1/3] usb: gadget: udc: Avoid tasklet passing a global
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/3] Modernize tasklet callback API
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 3/3] tasklet: Introduce new initialization API
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/3] treewide: Replace DECLARE_TASKLET() with DECLARE_TASKLET_OLD()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/3] Modernize tasklet callback API
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 3/3] tasklet: Introduce new initialization API
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v6 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v6 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v6 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v6 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH RFC v2 3/3] io_uring: allow disabling rings during the creation
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH RFC v2 2/3] io_uring: add IOURING_REGISTER_RESTRICTIONS opcode
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH RFC v2 1/3] io_uring: use an enumeration for io_uring_register(2) opcodes
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH RFC v2 0/3] io_uring: add restrictions to support untrusted applications and guests
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 2/3] treewide: Replace DECLARE_TASKLET() with DECLARE_TASKLET_OLD()
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] Modernize tasklet callback API
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] Modernize tasklet callback API
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] treewide: Replace DECLARE_TASKLET() with DECLARE_TASKLET_OLD()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] tasklet: Introduce new initialization API
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] usb: gadget: udc: Avoid tasklet passing a global
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/3] treewide: Replace DECLARE_TASKLET() with DECLARE_TASKLET_OLD()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 3/3] tasklet: Introduce new initialization API
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 1/3] usb: gadget: udc: Avoid tasklet passing a global
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 0/3] Modernize tasklet callback API
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 6/7] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86: Introduce paravirt feature CR0/CR4 pinning
- From: "Andersen, John" <john.s.andersen@xxxxxxxxx>
- Re: Clarification about the series to modernize the tasklet api
- From: Allen <allen.lkml@xxxxxxxxx>
- Re: Clarification about the series to modernize the tasklet api
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Clarification about the series to modernize the tasklet api
- From: Allen <allen.lkml@xxxxxxxxx>
- Re: Clarification about the series to modernize the tasklet api
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Clarification about the series to modernize the tasklet api
- From: Allen <allen.lkml@xxxxxxxxx>
- Re: Clarification about the series to modernize the tasklet api
- From: Allen <allen.lkml@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86: Introduce paravirt feature CR0/CR4 pinning
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: Clarification about the series to modernize the tasklet api
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 5/5] powerpc: Add LKDTM test to hijack a patch mapping
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 0/2] arm64/acpi: restrict AML opregion memory access
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 3/5] powerpc/lib: Use a temporary mm for code patching
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- Re: [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v6 7/7] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 6/7] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 3/7] exec: Move path_noexec() check earlier
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 2/7] exec: Move S_ISREG() check earlier
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 1/7] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v6 0/7] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: Clarification about the series to modernize the tasklet api
- From: Allen <allen.lkml@xxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86: Introduce paravirt feature CR0/CR4 pinning
- From: "Andersen, John" <john.s.andersen@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86: Introduce paravirt feature CR0/CR4 pinning
- From: "Andersen, John" <john.s.andersen@xxxxxxxxx>, Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: Clarification about the series to modernize the tasklet api
- From: Allen <allen.lkml@xxxxxxxxx>
- Re: Clarification about the series to modernize the tasklet api
- From: Allen <allen.lkml@xxxxxxxxx>
- Re: Clarification about the series to modernize the tasklet api
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] gcc-plugins: Replace HTTP links with HTTPS ones
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Clarification about the series to modernize the tasklet api
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Clarification about the series to modernize the tasklet api
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] gcc-plugins: Replace HTTP links with HTTPS ones
- From: "Alexander A. Klimov" <grandmaster@xxxxxxxxxxxx>
- Re: [PATCH RFC 0/3] io_uring: add restrictions to support untrusted applications and guests
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- Re: Clarification about the series to modernize the tasklet api
- From: Allen <allen.lkml@xxxxxxxxx>
- Re: Clarification about the series to modernize the tasklet api
- From: Allen <allen.lkml@xxxxxxxxx>
- Re: [PATCH RFC 2/3] io_uring: add IOURING_REGISTER_RESTRICTIONS opcode
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Sedat Dilek <sedat.dilek@xxxxxxxxx>
- Clarification about the series to modernize the tasklet api
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH RFC 2/3] io_uring: add IOURING_REGISTER_RESTRICTIONS opcode
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH RFC 0/3] io_uring: add restrictions to support untrusted applications and guests
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH RFC 0/3] io_uring: add restrictions to support untrusted applications and guests
- From: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
- Re: [PATCH v3] firewire: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- [PATCH RFC 3/3] io_uring: allow disabling rings during the creation
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH RFC 2/3] io_uring: add IOURING_REGISTER_RESTRICTIONS opcode
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH RFC 1/3] io_uring: use an enumeration for io_uring_register(2) opcodes
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- [PATCH RFC 0/3] io_uring: add restrictions to support untrusted applications and guests
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH v19 08/12] landlock: Add syscall implementation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86: Introduce paravirt feature CR0/CR4 pinning
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 08/12] landlock: Add syscall implementation
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v19 08/12] landlock: Add syscall implementation
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 2/4] KVM: x86: Introduce paravirt feature CR0/CR4 pinning
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86: Introduce paravirt feature CR0/CR4 pinning
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86: Introduce paravirt feature CR0/CR4 pinning
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86: Introduce paravirt feature CR0/CR4 pinning
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86: Introduce paravirt feature CR0/CR4 pinning
- From: "Andersen, John" <john.s.andersen@xxxxxxxxx>
- Re: [PATCH v3 0/2] arm64/acpi: restrict AML opregion memory access
- From: Lorenzo Pieralisi <lorenzo.pieralisi@xxxxxxx>
- Re: [PATCH v2 3/5] powerpc/lib: Use a temporary mm for code patching
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v2 5/5] powerpc: Add LKDTM test to hijack a patch mapping
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- [PATCH v2 4/5] powerpc/lib: Add LKDTM accessor for patching addr
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- [PATCH v2 3/5] powerpc/lib: Use a temporary mm for code patching
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- [PATCH v2 2/5] powerpc/lib: Initialize a temporary mm for code patching
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- [PATCH v2 1/5] powerpc/mm: Introduce temporary mm
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- [PATCH 0/5] Use per-CPU temporary mappings for patching
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- Re: [PATCH v19 08/12] landlock: Add syscall implementation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 09/10] kallsyms: Hide layout
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 0/2] arm64/acpi: restrict AML opregion memory access
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v19 08/12] landlock: Add syscall implementation
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v3] firewire: Remove function callback casts
- From: Takashi Sakamoto <o-takashi@xxxxxxxxxxxxx>
- Re: [PATCH v19 08/12] landlock: Add syscall implementation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: [PATCH v3 09/10] kallsyms: Hide layout
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH v19 09/12] arch: Wire up landlock() syscall
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v19 08/12] landlock: Add syscall implementation
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v19 09/12] arch: Wire up landlock() syscall
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v19 09/12] arch: Wire up landlock() syscall
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v19 09/12] arch: Wire up landlock() syscall
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v19 09/12] arch: Wire up landlock() syscall
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v19 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 09/10] kallsyms: Hide layout
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86: Introduce paravirt feature CR0/CR4 pinning
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86: Introduce paravirt feature CR0/CR4 pinning
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86: Introduce paravirt feature CR0/CR4 pinning
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [PATCH v19 07/12] landlock: Support filesystem access-control
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v19 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 10/12] selftests/landlock: Add initial tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 09/12] arch: Wire up landlock() syscall
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 08/12] landlock: Add syscall implementation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 04/12] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 03/12] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v3] firewire: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- [PATCH v2] parisc/kernel/ftrace: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH 4/4] X86: Use KVM CR pin MSRs
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH] drivers/s390/char/tty3270: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH] parisc/kernel/ftrace: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH 4/4] X86: Use KVM CR pin MSRs
- From: "Andersen, John" <john.s.andersen@xxxxxxxxx>
- Re: [RFC PATCH v2] arm64/acpi: disallow AML memory opregions to access kernel memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH v2] arm64/acpi: disallow AML memory opregions to access kernel memory
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [RFC PATCH v2] arm64/acpi: disallow AML memory opregions to access kernel memory
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- RE: [PATCH 00/22] add support for Clang LTO
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- RE: [PATCH 00/22] add support for Clang LTO
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
[Index of Archives]
[Linux Samsung SoC]
[Linux Rockchip SoC]
[Linux for Synopsys ARC Processors]
[Linux Actions SoC]
[Linux Kernel]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Scanners]
[Yosemite Forum]