Kernel Hardening
[Prev Page][Next Page]
- Re: [PATCH v19 09/12] arch: Wire up landlock() syscall
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v19 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 09/10] kallsyms: Hide layout
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86: Introduce paravirt feature CR0/CR4 pinning
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86: Introduce paravirt feature CR0/CR4 pinning
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86: Introduce paravirt feature CR0/CR4 pinning
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [PATCH v19 07/12] landlock: Support filesystem access-control
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v19 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 10/12] selftests/landlock: Add initial tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 09/12] arch: Wire up landlock() syscall
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 08/12] landlock: Add syscall implementation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 04/12] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 03/12] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v19 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v3] firewire: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- [PATCH v2] parisc/kernel/ftrace: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH 4/4] X86: Use KVM CR pin MSRs
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH] drivers/s390/char/tty3270: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH] parisc/kernel/ftrace: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH 4/4] X86: Use KVM CR pin MSRs
- From: "Andersen, John" <john.s.andersen@xxxxxxxxx>
- Re: [RFC PATCH v2] arm64/acpi: disallow AML memory opregions to access kernel memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH v2] arm64/acpi: disallow AML memory opregions to access kernel memory
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [RFC PATCH v2] arm64/acpi: disallow AML memory opregions to access kernel memory
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- RE: [PATCH 00/22] add support for Clang LTO
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- RE: [PATCH 00/22] add support for Clang LTO
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH] drivers/s390/char/tty3270: Remove function callback casts
- From: Heiko Carstens <heiko.carstens@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH] gcc-plugins: fix gcc-plugins directory path in documentation
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH] parisc/kernel/ftrace: Remove function callback casts
- From: Helge Deller <deller@xxxxxx>
- Re: [PATCH] drivers/s390/char/tty3270: Remove function callback casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] parisc/kernel/ftrace: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- [PATCH] drivers/s390/char/tty3270: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH v5 0/3] drivers/acpi: Remove function callback casts
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3 2/2] arm64/acpi: disallow writeable AML opregion mapping for EFI code regions
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 1/2] arm64/acpi: disallow AML memory opregions to access kernel memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH v3 0/2] arm64/acpi: restrict AML opregion memory access
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v5 0/3] drivers/acpi: Remove function callback casts
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- Re: [PATCH v5 0/3] drivers/acpi: Remove function callback casts
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [RFC][PATCH] objtool,x86_64: Replace recordmcount with objtool
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] objtool,x86_64: Replace recordmcount with objtool
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] objtool,x86_64: Replace recordmcount with objtool
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [RFC][PATCH] objtool,x86_64: Replace recordmcount with objtool
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [RFC][PATCH] objtool,x86_64: Replace recordmcount with objtool
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 05/22] kbuild: lto: postpone objtool
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH 05/22] kbuild: lto: postpone objtool
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 05/22] kbuild: lto: postpone objtool
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v3 09/10] kallsyms: Hide layout
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH 04/22] kbuild: lto: fix recordmcount
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH 02/22] kbuild: add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 05/22] kbuild: lto: postpone objtool
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 04/22] kbuild: lto: fix recordmcount
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 02/22] kbuild: add support for Clang LTO
- From: Nathan Chancellor <natechancellor@xxxxxxxxx>
- Re: [PATCH 09/22] init: lto: ensure initcall ordering
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 09/22] init: lto: ensure initcall ordering
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 17/22] arm64: vdso: disable LTO
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [PATCH 17/22] arm64: vdso: disable LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH 06/22] kbuild: lto: limit inlining
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH 11/22] pci: lto: fix PREL32 relocations
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH 17/22] arm64: vdso: disable LTO
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 11/22] pci: lto: fix PREL32 relocations
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 11/22] pci: lto: fix PREL32 relocations
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 12/22] modpost: lto: strip .lto from module names
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 17/22] arm64: vdso: disable LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH 05/22] kbuild: lto: postpone objtool
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH 04/22] kbuild: lto: fix recordmcount
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 07/22] kbuild: lto: merge module sections
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH 02/22] kbuild: add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH 04/22] kbuild: lto: fix recordmcount
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 06/22] kbuild: lto: limit inlining
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 05/22] kbuild: lto: postpone objtool
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/22] add support for Clang LTO
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 08/22] kbuild: lto: remove duplicate dependencies from .mod files
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 17/22] arm64: vdso: disable LTO
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 07/22] kbuild: lto: merge module sections
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 17/22] arm64: vdso: disable LTO
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 13/22] scripts/mod: disable LTO for empty.c
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH 02/22] kbuild: add support for Clang LTO
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH 22/22] x86, build: allow LTO_CLANG and THINLTO to be selected
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH 21/22] x86, relocs: Ignore L4_PAGE_OFFSET relocations
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH 20/22] x86, ftrace: disable recordmcount for ftrace_make_nop
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH 19/22] x86, vdso: disable LTO only for vDSO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH 18/22] arm64: allow LTO_CLANG and THINLTO to be selected
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH 17/22] arm64: vdso: disable LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH 16/22] arm64: export CC_USING_PATCHABLE_FUNCTION_ENTRY
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH 15/22] drivers/misc/lkdtm: disable LTO for rodata.o
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH 14/22] efi/libstub: disable LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH 13/22] scripts/mod: disable LTO for empty.c
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH 12/22] modpost: lto: strip .lto from module names
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH 11/22] pci: lto: fix PREL32 relocations
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH 10/22] init: lto: fix PREL32 relocations
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH 09/22] init: lto: ensure initcall ordering
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH 08/22] kbuild: lto: remove duplicate dependencies from .mod files
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH 07/22] kbuild: lto: merge module sections
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH 06/22] kbuild: lto: limit inlining
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH 05/22] kbuild: lto: postpone objtool
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH 04/22] kbuild: lto: fix recordmcount
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH 03/22] kbuild: lto: fix module versioning
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH 02/22] kbuild: add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH 01/22] objtool: use sh_info to find the base for .rela sections
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH 00/22] add support for Clang LTO
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH] ACPI: Eliminate usage of uninitialized_var() macro
- From: "Rafael J. Wysocki" <rjw@xxxxxxxxxxxxx>
- Re: [PATCH v3 09/10] kallsyms: Hide layout
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 5/5] gcc-plugins/stackleak: Add 'verbose' plugin parameter
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/5] ARM: vdso: Don't use gcc plugins for building vgettimeofday.c
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 1/5] gcc-plugins/stackleak: Don't instrument itself
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 3/5] arm64: vdso: Don't use gcc plugins for building vgettimeofday.c
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 5/5] gcc-plugins/stackleak: Add 'verbose' plugin parameter
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 5/5] gcc-plugins/stackleak: Add 'verbose' plugin parameter
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v2 2/5] ARM: vdso: Don't use gcc plugins for building vgettimeofday.c
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v2 0/5] Improvements of the stackleak gcc plugin
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2 5/5] gcc-plugins/stackleak: Add 'verbose' plugin parameter
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH v2 2/5] ARM: vdso: Don't use gcc plugins for building vgettimeofday.c
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH v2 3/5] arm64: vdso: Don't use gcc plugins for building vgettimeofday.c
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v2 5/5] gcc-plugins/stackleak: Add 'verbose' plugin parameter
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- [PATCH v2 4/5] gcc-plugins/stackleak: Use asm instrumentation to avoid useless register saving
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- [PATCH v2 3/5] arm64: vdso: Don't use gcc plugins for building vgettimeofday.c
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- [PATCH v2 2/5] ARM: vdso: Don't use gcc plugins for building vgettimeofday.c
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- [PATCH v2 1/5] gcc-plugins/stackleak: Don't instrument itself
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- [PATCH v2 0/5] Improvements of the stackleak gcc plugin
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH v3 09/10] kallsyms: Hide layout
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v3 00/10] Function Granular KASLR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 09/10] kallsyms: Hide layout
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 09/10] kallsyms: Hide layout
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 08/10] x86: Add support for function granular KASLR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 07/10] x86/boot/compressed: change definition of STATIC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 05/10] x86: Make sure _etext includes function sections
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 01/10] objtool: Do not assume order of parent/child functions
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH 4/4] X86: Use KVM CR pin MSRs
- From: "Andersen, John" <john.s.andersen@xxxxxxxxx>
- [PATCH v3 10/10] module: Reorder functions
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v3 09/10] kallsyms: Hide layout
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v3 08/10] x86: Add support for function granular KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v3 07/10] x86/boot/compressed: change definition of STATIC
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v3 06/10] x86/tools: Add relative relocs for randomized functions
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v3 05/10] x86: Make sure _etext includes function sections
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v3 04/10] x86: Makefile: Add build and config option for CONFIG_FG_KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v3 03/10] x86/boot: Allow a "silent" kaslr random byte fetch
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v3 02/10] x86: tools/relocs: Support >64K section headers
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v3 01/10] objtool: Do not assume order of parent/child functions
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v3 00/10] Function Granular KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] arm64/acpi: disallow AML memory opregions to access kernel memory
- From: Lorenzo Pieralisi <lorenzo.pieralisi@xxxxxxx>
- Re: [RFC PATCH v2] arm64/acpi: disallow AML memory opregions to access kernel memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- RE: [PATCH v4 3/5] stack: Optionally randomize kernel stack offset each syscall
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v4 3/5] stack: Optionally randomize kernel stack offset each syscall
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH 5/5] gcc-plugins/stackleak: Don't instrument vgettimeofday.c in arm64 VDSO
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH v4 5/5] arm64: entry: Enable random_kstack_offset support
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [RFC PATCH v2] arm64/acpi: disallow AML memory opregions to access kernel memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: Kernel hardening project suggestion: Normalizing ->ctor slabs and TYPESAFE_BY_RCU slabs
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: Kernel hardening project suggestion: Normalizing ->ctor slabs and TYPESAFE_BY_RCU slabs
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [RFC PATCH] arm64/acpi: disallow AML memory opregions to access kernel memory
- From: Will Deacon <will@xxxxxxxxxx>
- Re: Kernel hardening project suggestion: Normalizing ->ctor slabs and TYPESAFE_BY_RCU slabs
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: Kernel hardening project suggestion: Normalizing ->ctor slabs and TYPESAFE_BY_RCU slabs
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [RFC PATCH] arm64/acpi: disallow AML memory opregions to access kernel memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH] arm64/acpi: disallow AML memory opregions to access kernel memory
- From: Will Deacon <will@xxxxxxxxxx>
- Re: Kernel hardening project suggestion: Normalizing ->ctor slabs and TYPESAFE_BY_RCU slabs
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: Kernel hardening project suggestion: Normalizing ->ctor slabs and TYPESAFE_BY_RCU slabs
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: Kernel hardening project suggestion: Normalizing ->ctor slabs and TYPESAFE_BY_RCU slabs
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Kernel hardening project suggestion: Normalizing ->ctor slabs and TYPESAFE_BY_RCU slabs
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v4 3/5] stack: Optionally randomize kernel stack offset each syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 3/5] stack: Optionally randomize kernel stack offset each syscall
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v4 3/5] stack: Optionally randomize kernel stack offset each syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 3/5] stack: Optionally randomize kernel stack offset each syscall
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v4 3/5] stack: Optionally randomize kernel stack offset each syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 3/5] stack: Optionally randomize kernel stack offset each syscall
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v4 3/5] stack: Optionally randomize kernel stack offset each syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 3/5] stack: Optionally randomize kernel stack offset each syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH] arm64/acpi: disallow AML memory opregions to access kernel memory
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFC PATCH] arm64/acpi: disallow AML memory opregions to access kernel memory
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v4 3/5] stack: Optionally randomize kernel stack offset each syscall
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v4 3/5] stack: Optionally randomize kernel stack offset each syscall
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v4 5/5] arm64: entry: Enable random_kstack_offset support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 3/5] stack: Optionally randomize kernel stack offset each syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 0/5] Optionally randomize kernel stack offset each syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 2/5] init_on_alloc: Unpessimize default-on builds
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 1/5] jump_label: Provide CONFIG-driven build state defaults
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 4/5] x86/entry: Enable random_kstack_offset support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] acpi: disallow loading configfs acpi tables when locked down
- From: "Rafael J. Wysocki" <rafael@xxxxxxxxxx>
- [RFC PATCH] arm64/acpi: disallow AML memory opregions to access kernel memory
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] kernel/trace: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH 4/4] X86: Use KVM CR pin MSRs
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH] tracing: Use linker magic instead of recasting ftrace_ops_list_func()
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] tracing: Use linker magic instead of recasting ftrace_ops_list_func()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH 4/4] X86: Use KVM CR pin MSRs
- From: "Andersen, John" <john.s.andersen@xxxxxxxxx>
- Re: [PATCH 4/4] X86: Use KVM CR pin MSRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 4/4] X86: Use KVM CR pin MSRs
- From: "Andersen, John" <john.s.andersen@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86: Introduce paravirt feature CR0/CR4 pinning
- From: "Andersen, John" <john.s.andersen@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86: Introduce paravirt feature CR0/CR4 pinning
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 4/4] X86: Use KVM CR pin MSRs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 2/4] KVM: x86: Introduce paravirt feature CR0/CR4 pinning
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/4] X86: Update mmu_cr4_features during feature identification
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [kvm-unit-tests PATCH v2] x86: Add control register pinning tests
- From: John Andersen <john.s.andersen@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Add control register pinning tests
- From: "Andersen, John" <john.s.andersen@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Add control register pinning tests
- From: "Andersen, John" <john.s.andersen@xxxxxxxxx>
- Re: [PATCH] tracing: Use linker magic instead of recasting ftrace_ops_list_func()
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] tracing: Use linker magic instead of recasting ftrace_ops_list_func()
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Add control register pinning tests
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Add control register pinning tests
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- [kvm-unit-tests RESEND PATCH] x86: Add control register pinning tests
- From: John Andersen <john.s.andersen@xxxxxxxxx>
- Re: [PATCH] tracing: Use linker magic instead of recasting ftrace_ops_list_func()
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [kvm-unit-tests PATCH] x86: Add control register pinning tests
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- [kvm-unit-tests PATCH] x86: Add control register pinning tests
- From: John Andersen <john.s.andersen@xxxxxxxxx>
- Re: [PATCH] tracing: Use linker magic instead of recasting ftrace_ops_list_func()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH] tracing: Use linker magic instead of recasting ftrace_ops_list_func()
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH] tracing: Use linker magic instead of recasting ftrace_ops_list_func()
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH] kernel/trace: Remove function callback casts
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- [PATCH 4/4] X86: Use KVM CR pin MSRs
- From: John Andersen <john.s.andersen@xxxxxxxxx>
- [PATCH 3/4] selftests: kvm: add test for CR pinning with SMM
- From: John Andersen <john.s.andersen@xxxxxxxxx>
- [PATCH 2/4] KVM: x86: Introduce paravirt feature CR0/CR4 pinning
- From: John Andersen <john.s.andersen@xxxxxxxxx>
- [PATCH 1/4] X86: Update mmu_cr4_features during feature identification
- From: John Andersen <john.s.andersen@xxxxxxxxx>
- [PATCH 0/4] Paravirtualized Control Register pinning
- From: John Andersen <john.s.andersen@xxxxxxxxx>
- RE: [PATCH] acpi: disallow loading configfs acpi tables when locked down
- From: "Kaneda, Erik" <erik.kaneda@xxxxxxxxx>
- Re: [PATCH] acpi: disallow loading configfs acpi tables when locked down
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] acpi: disallow loading configfs acpi tables when locked down
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] acpi: disallow loading configfs acpi tables when locked down
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFC] io_uring: add restrictions to support untrusted applications and guests
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC] io_uring: add restrictions to support untrusted applications and guests
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [RFC] io_uring: add restrictions to support untrusted applications and guests
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC] io_uring: add restrictions to support untrusted applications and guests
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC] io_uring: add restrictions to support untrusted applications and guests
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [RFC] io_uring: add restrictions to support untrusted applications and guests
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC] io_uring: add restrictions to support untrusted applications and guests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] kernel/trace: Remove function callback casts
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH] kernel/trace: Remove function callback casts
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH] f2fs: Eliminate usage of uninitialized_var() macro
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [oss-security] lockdown bypass on mainline kernel for loading unsigned modules
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [oss-security] lockdown bypass on mainline kernel for loading unsigned modules
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC] io_uring: add restrictions to support untrusted applications and guests
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [oss-security] lockdown bypass on mainline kernel for loading unsigned modules
- From: John Haxby <john.haxby@xxxxxxxxxx>
- Re: [RFC] io_uring: add restrictions to support untrusted applications and guests
- From: Stefano Garzarella <sgarzare@xxxxxxxxxx>
- Re: [PATCH] f2fs: Eliminate usage of uninitialized_var() macro
- From: Chao Yu <yuchao0@xxxxxxxxxx>
- [PATCH] acpi: disallow loading configfs acpi tables when locked down
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- lockdown bypass on mainline kernel for loading unsigned modules
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [f2fs-dev] [PATCH] f2fs: Eliminate usage of uninitialized_var() macro
- From: Chao Yu <yuchao0@xxxxxxxxxx>
- Re: [PATCH] erofs: Eliminate usage of uninitialized_var() macro
- From: Gao Xiang <hsiangkao@xxxxxxxxxx>
- Re: [PATCH] erofs: Eliminate usage of uninitialized_var() macro
- From: Chao Yu <yuchao0@xxxxxxxxxx>
- Re: [PATCH] erofs: Eliminate usage of uninitialized_var() macro
- From: Gao Xiang <hsiangkao@xxxxxxxxxx>
- Re: [RFC] io_uring: add restrictions to support untrusted applications and guests
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH] f2fs: Eliminate usage of uninitialized_var() macro
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [f2fs-dev] [PATCH] f2fs: Eliminate usage of uninitialized_var() macro
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [PATCH] erofs: Eliminate usage of uninitialized_var() macro
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [PATCH 5/5] powerpc: Add LKDTM test to hijack a patch mapping
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH] ata: Eliminate usage of uninitialized_var() macro
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH] f2fs: Eliminate usage of uninitialized_var() macro
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH] erofs: Eliminate usage of uninitialized_var() macro
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH] ACPI: Eliminate usage of uninitialized_var() macro
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH] block: Eliminate usage of uninitialized_var() macro
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH] kernel/trace: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH 2/5] gcc-plugins/stackleak: Use asm instrumentation to avoid useless register saving
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH 1/5] powerpc/mm: Introduce temporary mm
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- Re: [PATCH 3/5] powerpc/lib: Use a temporary mm for code patching
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- Re: [PATCH 2/5] powerpc/lib: Initialize a temporary mm for code patching
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- Re: [PATCH 3/5] gcc-plugins/stackleak: Add 'verbose' plugin parameter
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/5] gcc-plugins/stackleak: Use asm instrumentation to avoid useless register saving
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 3/5] gcc-plugins/stackleak: Add 'verbose' plugin parameter
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH 2/5] gcc-plugins/stackleak: Use asm instrumentation to avoid useless register saving
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH 1/5] gcc-plugins/stackleak: Exclude alloca() from the instrumentation logic
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH 5/5] gcc-plugins/stackleak: Don't instrument vgettimeofday.c in arm64 VDSO
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH 0/5] Improvements of the stackleak gcc plugin
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH 5/5] gcc-plugins/stackleak: Don't instrument vgettimeofday.c in arm64 VDSO
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2 9/9] module: Reorder functions
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 9/9] module: Reorder functions
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 9/9] module: Reorder functions
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] Improvements of the stackleak gcc plugin
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 5/5] gcc-plugins/stackleak: Don't instrument vgettimeofday.c in arm64 VDSO
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 4/5] gcc-plugins/stackleak: Don't instrument itself
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 3/5] gcc-plugins/stackleak: Add 'verbose' plugin parameter
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/5] gcc-plugins/stackleak: Use asm instrumentation to avoid useless register saving
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/5] gcc-plugins/stackleak: Exclude alloca() from the instrumentation logic
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 5/5] powerpc: Add LKDTM test to hijack a patch mapping
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- Re: [PATCH 4/5] powerpc/lib: Add LKDTM accessor for patching addr
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- [PATCH AUTOSEL 5.6 103/606] gcc-common.h: Update for GCC 10
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2 7/9] x86: Add support for function granular KASLR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/5] Improvements of the stackleak gcc plugin
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 7/9] x86: Add support for function granular KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/5] gcc-plugins/stackleak: Exclude alloca() from the instrumentation logic
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH 2/5] gcc-plugins/stackleak: Use asm instrumentation to avoid useless register saving
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- Re: [PATCH 5/5] gcc-plugins/stackleak: Don't instrument vgettimeofday.c in arm64 VDSO
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH 5/5] gcc-plugins/stackleak: Don't instrument vgettimeofday.c in arm64 VDSO
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 5/5] gcc-plugins/stackleak: Don't instrument vgettimeofday.c in arm64 VDSO
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH 5/5] gcc-plugins/stackleak: Don't instrument vgettimeofday.c in arm64 VDSO
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 1/5] gcc-plugins/stackleak: Exclude alloca() from the instrumentation logic
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 5/5] gcc-plugins/stackleak: Don't instrument vgettimeofday.c in arm64 VDSO
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH 5/5] gcc-plugins/stackleak: Don't instrument vgettimeofday.c in arm64 VDSO
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- [PATCH 4/5] gcc-plugins/stackleak: Don't instrument itself
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- [PATCH 3/5] gcc-plugins/stackleak: Add 'verbose' plugin parameter
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- [PATCH 2/5] gcc-plugins/stackleak: Use asm instrumentation to avoid useless register saving
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- [PATCH 1/5] gcc-plugins/stackleak: Exclude alloca() from the instrumentation logic
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- [PATCH 0/5] Improvements of the stackleak gcc plugin
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH 5/5] powerpc: Add LKDTM test to hijack a patch mapping
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 4/5] powerpc/lib: Add LKDTM accessor for patching addr
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 3/5] powerpc/lib: Use a temporary mm for code patching
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 2/5] powerpc/lib: Initialize a temporary mm for code patching
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 1/5] powerpc/mm: Introduce temporary mm
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH 5/5] powerpc: Add LKDTM test to hijack a patch mapping
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- [PATCH 4/5] powerpc/lib: Add LKDTM accessor for patching addr
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- [PATCH 3/5] powerpc/lib: Use a temporary mm for code patching
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- [PATCH 1/5] powerpc/mm: Introduce temporary mm
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- [PATCH 2/5] powerpc/lib: Initialize a temporary mm for code patching
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- [PATCH 0/5] Use per-CPU temporary mappings for patching
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- [PATCH v5 3/3] drivers/acpi: Remove function cast
- From: Oscar Carter <oscar.carter@xxxxxxx>
- [PATCH v5 2/3] drivers/irqchip: Use new macro ACPI_DECLARE_SUBTABLE_PROBE_ENTRY
- From: Oscar Carter <oscar.carter@xxxxxxx>
- [PATCH v5 1/3] drivers/acpi: Add new macro ACPI_DECLARE_SUBTABLE_PROBE_ENTRY
- From: Oscar Carter <oscar.carter@xxxxxxx>
- [PATCH v5 0/3] drivers/acpi: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH v4 0/3] drivers/acpi: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- [PATCH v4 3/3] drivers/acpi: Remove function cast
- From: Oscar Carter <oscar.carter@xxxxxxx>
- [PATCH v4 2/3] drivers/irqchip: Use new macro ACPI_DECLARE_SUBTABLE_PROBE_ENTRY
- From: Oscar Carter <oscar.carter@xxxxxxx>
- [PATCH v4 1/3] drivers/acpi: Add new macro ACPI_DECLARE_SUBTABLE_PROBE_ENTRY
- From: Oscar Carter <oscar.carter@xxxxxxx>
- [PATCH v4 0/3] drivers/acpi: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH v3 2/2] drivers/irqchip: Use new macro ACPI_DECLARE_SUBTABLE_PROBE_ENTRY
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH v3 2/2] drivers/irqchip: Use new macro ACPI_DECLARE_SUBTABLE_PROBE_ENTRY
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH v3] firewire: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- [PATCH v3 2/2] drivers/irqchip: Use new macro ACPI_DECLARE_SUBTABLE_PROBE_ENTRY
- From: Oscar Carter <oscar.carter@xxxxxxx>
- [PATCH v3 1/2] drivers/irqchip: Add new macro ACPI_DECLARE_SUBTABLE_PROBE_ENTRY
- From: Oscar Carter <oscar.carter@xxxxxxx>
- [PATCH v3 0/2] drivers/irqchip: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH v18 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v18 07/12] landlock: Support filesystem access-control
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v18 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 10/12] selftests/landlock: Add initial tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 09/12] arch: Wire up landlock() syscall
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 08/12] landlock: Add syscall implementation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 04/12] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 03/12] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v18 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] drivers/irqchip: Remove function callback casts
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] drivers/irqchip: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH v2] drivers/irqchip: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH v2] drivers/irqchip: Remove function callback casts
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v2] firewire-core: remove cast of function callback
- From: Takashi Sakamoto <o-takashi@xxxxxxxxxxxxx>
- Re: [PATCH v2] firewire-core: remove cast of function callback
- From: Stefan Richter <stefanr@xxxxxxxxxxxxxxxxx>
- [PATCH v2] drivers/irqchip: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH] drivers/irqchip: Remove function callback casts
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH] drivers/irqchip: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH v2] firewire-core: remove cast of function callback
- From: Greg KH <greg@xxxxxxxxx>
- [PATCH v2] firewire-core: remove cast of function callback
- From: Takashi Sakamoto <o-takashi@xxxxxxxxxxxxx>
- Re: [PATCH] drivers/irqchip: Remove function callback casts
- From: Marc Zyngier <maz@xxxxxxxxxx>
- [PATCH] staging/rtl8192e: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- [PATCH] drivers/irqchip: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH v2] firewire: Remove function callback casts
- From: Takashi Sakamoto <o-takashi@xxxxxxxxxxxxx>
- Re: [PATCH v2] firewire: Remove function callback casts
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] firewire: Remove function callback casts
- Re: [PATCH] x86/mm/init: Stop printing pgt_buf addresses
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH] x86/mm/init: Stop printing pgt_buf addresses
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v2] firewire: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH 0/2] firewire: obsolete cast of function callback toward CFI
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH v2 0/9] Function Granular KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] Function Granular KASLR
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] Function Granular KASLR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 0/9] Function Granular KASLR
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/9] Function Granular KASLR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 7/9] x86: Add support for function granular KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 9/9] module: Reorder functions
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 8/9] kallsyms: Hide layout
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 7/9] x86: Add support for function granular KASLR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 4/9] x86: Makefile: Add build and config option for CONFIG_FG_KASLR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 6/9] x86/tools: Add relative relocs for randomized functions
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 5/9] x86: Make sure _etext includes function sections
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 9/9] module: Reorder functions
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v2 8/9] kallsyms: Hide layout
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v2 7/9] x86: Add support for function granular KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v2 6/9] x86/tools: Add relative relocs for randomized functions
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v2 5/9] x86: Make sure _etext includes function sections
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v2 4/9] x86: Makefile: Add build and config option for CONFIG_FG_KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v2 3/9] x86/boot: Allow a "silent" kaslr random byte fetch
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v2 2/9] x86: tools/relocs: Support >64K section headers
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v2 1/9] objtool: Do not assume order of parent/child functions
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v2 0/9] Function Granular KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] firewire: Remove function callback casts
- From: Takashi Sakamoto <o-takashi@xxxxxxxxxxxxx>
- [PATCH 2/2] firewire-core: obsolete cast of function callback
- From: Takashi Sakamoto <o-takashi@xxxxxxxxxxxxx>
- [PATCH 1/2] firewire-core: add kernel API to construct multichannel isoc context
- From: Takashi Sakamoto <o-takashi@xxxxxxxxxxxxx>
- [PATCH 0/2] firewire: obsolete cast of function callback toward CFI
- From: Takashi Sakamoto <o-takashi@xxxxxxxxxxxxx>
- [PATCH v2] firewire: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH] firewire: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v5 2/6] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- Re: [PATCH] firewire: Remove function callback casts
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- [PATCH] firewire: Remove function callback casts
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: Get involved in the KSPP
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v13 00/12] add support for Clang's Shadow Call Stack
- From: Will Deacon <will@xxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: Get involved in the KSPP
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- How about just O_EXEC? (was Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 7/9] x86: Add support for function granular KASLR
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH AUTOSEL 4.9 02/27] gcc-common.h: Update for GCC 10
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 02/39] gcc-common.h: Update for GCC 10
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 02/31] gcc-common.h: Update for GCC 10
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 04/49] gcc-common.h: Update for GCC 10
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.6 04/62] gcc-common.h: Update for GCC 10
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Get involved in the KSPP
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 2/6] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v17 02/10] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v5 2/6] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- Re: [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v17 02/10] landlock: Add ruleset and domain management
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v5 5/6] doc: Add documentation for the fs.open_mayexec_enforce sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 4/6] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 1/6] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3] security/keys: rewrite big_key crypto to use library interface
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v5 1/6] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3] security/keys: rewrite big_key crypto to use library interface
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v5 5/6] doc: Add documentation for the fs.open_mayexec_enforce sysctl
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 4/6] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 1/6] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Christian Heimes <christian@xxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3] security/keys: rewrite big_key crypto to use library interface
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v5 2/6] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 1/6] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3] security/keys: rewrite big_key crypto to use library interface
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH] gcc-plugins: remove always false $(if ...) in Makefile
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v17 00/10] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3] security/keys: rewrite big_key crypto to use library interface
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2] security/keys: rewrite big_key crypto to use Zinc
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH v17 10/10] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 09/10] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 08/10] selftests/landlock: Add initial tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 07/10] arch: Wire up landlock() syscall
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 06/10] landlock: Add syscall implementation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 05/10] fs,landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 04/10] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 03/10] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 02/10] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 01/10] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v17 00/10] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: Get involved in the KSPP
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Open source a new kernel harden project
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Open source a new kernel harden project
- From: wzt wzt <wzt.wzt@xxxxxxxxx>
- Re: Open source a new kernel harden project
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] security/keys: rewrite big_key crypto to use Zinc
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: Open source a new kernel harden project
- From: Lionel Debroux <lionel_debroux@xxxxxxxx>
- Open source a new kernel harden project
- From: wzt wzt <wzt.wzt@xxxxxxxxx>
- Re: [PATCH] gcc-plugins: remove always false $(if ...) in Makefile
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] gcc-plugins: remove always false $(if ...) in Makefile
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Get involved in the KSPP
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- Re: [RFC PATCH] arm64: remove CONFIG_DEBUG_ALIGN_RODATA feature
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit Europe 2020
- From: Elena Reshetova <elena.reshetova@xxxxxxxxx>
- RE: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- FYI: NGI POINTER OSS Funding
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 6/6] ima: add policy support for the new file open MAY_OPENEXEC flag
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 5/6] doc: Add documentation for the fs.open_mayexec_enforce sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 4/6] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 3/6] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 2/6] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 1/6] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 0/6] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH] arm64: remove CONFIG_DEBUG_ALIGN_RODATA feature
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v11 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v11 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v11 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v11 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v2] security/keys: rewrite big_key crypto to use Zinc
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] security/keys: rewrite big_key crypto to use Zinc
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] security/keys: rewrite big_key crypto to use Zinc
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH] security/keys: rewrite big_key crypto to use Zinc
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] security/keys: rewrite big_key crypto to use Zinc
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH] security/keys: rewrite big_key crypto to use Zinc
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v4 1/5] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/5] powerpc/mm: Introduce temporary mm
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/5] powerpc/mm: Introduce temporary mm
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 3/5] powerpc/lib: Use a temporary mm for code patching
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- Re: [PATCH v3 3/5] fs: Enable to enforce noexec mounts or file exec through RESOLVE_MAYEXEC
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3 3/5] fs: Enable to enforce noexec mounts or file exec through RESOLVE_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 1/5] fs: Add support for a RESOLVE_MAYEXEC flag on openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Christian Heimes <christian@xxxxxxxxxx>
- Re: [PATCH v3 3/5] fs: Enable to enforce noexec mounts or file exec through RESOLVE_MAYEXEC
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3 1/5] fs: Add support for a RESOLVE_MAYEXEC flag on openat2(2)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH v4 5/5] doc: Add documentation for the fs.open_mayexec_enforce sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 4/5] selftest/openat2: Add tests for O_MAYEXEC enforcing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 3/5] fs: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 1/5] fs: Add support for an O_MAYEXEC flag on openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v4 0/5] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- RE: [PATCH v13 00/12] add support for Clang's Shadow Call Stack
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [RFC PATCH v2 3/5] powerpc/lib: Use a temporary mm for code patching
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [RFC PATCH v2 1/5] powerpc/mm: Introduce temporary mm
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [RFC PATCH v2 1/5] powerpc/mm: Introduce temporary mm
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [RFC PATCH v2 5/5] powerpc: Add LKDTM test to hijack a patch mapping
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- [RFC PATCH v2 3/5] powerpc/lib: Use a temporary mm for code patching
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- [RFC PATCH v2 4/5] powerpc/lib: Add LKDTM accessor for patching addr
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- [RFC PATCH v2 2/5] powerpc/lib: Initialize a temporary mm for code patching
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- [RFC PATCH v2 1/5] powerpc/mm: Introduce temporary mm
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- [RFC PATCH v2 0/5] Use per-CPU temporary mappings for patching
- From: "Christopher M. Riedl" <cmr@xxxxxxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH v3 5/5] doc: Add documentation for the fs.open_mayexec_enforce sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 4/5] selftest/openat2: Add tests for RESOLVE_MAYEXEC enforcing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 3/5] fs: Enable to enforce noexec mounts or file exec through RESOLVE_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 2/5] fs: Add a MAY_EXECMOUNT flag to infer the noexec mount property
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 1/5] fs: Add support for a RESOLVE_MAYEXEC flag on openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v3 0/5] Add support for RESOLVE_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v13 00/12] add support for Clang's Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v13 00/12] add support for Clang's Shadow Call Stack
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v11 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH] nsproxy: attach to namespaces via pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] nsproxy: attach to namespaces via pidfds
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC PATCH 03/21] list: Annotate lockless list primitives with data_race()
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH] nsproxy: attach to namespaces via pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v13 00/12] add support for Clang's Shadow Call Stack
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Get involved
- From: Oscar Carter <oscar.carter@xxxxxxx>
- Re: [PATCH] nsproxy: attach to namespaces via pidfds
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v13 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v13 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- [PATCH v13 12/12] efi/libstub: disable SCS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v13 11/12] arm64: scs: add shadow stacks for SDEI
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v13 10/12] arm64: implement Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v13 09/12] arm64: disable SCS for hypervisor code
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v13 08/12] arm64: vdso: disable Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v13 06/12] arm64: preserve x18 when CPU is suspended
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v13 07/12] arm64: efi: restore x18 if it was corrupted
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v13 04/12] scs: disable when function graph tracing is enabled
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v13 05/12] arm64: reserve x18 from general allocation with SCS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v13 03/12] scs: add support for stack usage debugging
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v13 02/12] scs: add accounting
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v13 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v13 00/12] add support for Clang's Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v5 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH v5 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [RFC PATCH 03/21] list: Annotate lockless list primitives with data_race()
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v5 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH v11 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Will Deacon <will@xxxxxxxxxx>
- Re: Re: [PATCH v2] arm64: add check_wx_pages debugfs for CHECK_WX
- From: Phong Tran <tranmanphong@xxxxxxxxx>
- Re: [PATCH v12 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v13 7/8] proc: use human-readable values for hidepid
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v13 8/8] proc: use named enums for better readability
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v13 5/8] proc: add option to mount only a pids subset
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v13 6/8] docs: proc: add documentation for "hidepid=4" and "subset=pid" options and new mount behavior
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v13 4/8] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v13 3/8] proc: allow to mount many instances of proc in one pid namespace
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v13 2/8] Use proc_pid_ns() to get pid_namespace from the proc superblock
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v13 1/8] proc: rename struct proc_fs_info to proc_fs_opts
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v13 0/8] proc: modernize proc to support multiple private instances
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v13 2/7] proc: allow to mount many instances of proc in one pid namespace
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v11 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v12 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v13 2/7] proc: allow to mount many instances of proc in one pid namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v13 2/7] proc: allow to mount many instances of proc in one pid namespace
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v5 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [PATCH v12 03/12] scs: add support for stack usage debugging
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v11 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH 1/9] objtool: do not assume order of parent/child functions
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH 9/9] module: Reorder functions
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v12 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v12 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v11 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v12 03/12] scs: add support for stack usage debugging
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v12 02/12] scs: add accounting
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v11 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2] arm64: add check_wx_pages debugfs for CHECK_WX
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 9/9] module: Reorder functions
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v2] arm64: add check_wx_pages debugfs for CHECK_WX
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2] arm64: add check_wx_pages debugfs for CHECK_WX
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2] arm64: add check_wx_pages debugfs for CHECK_WX
- From: Steven Price <steven.price@xxxxxxx>
- [PATCH v2] arm64: add check_wx_pages debugfs for CHECK_WX
- From: Phong Tran <tranmanphong@xxxxxxxxx>
- Re: [PATCH v2 5/5] arm64: entry: Enable random_kstack_offset support
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH v12 12/12] efi/libstub: disable SCS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v12 11/12] arm64: scs: add shadow stacks for SDEI
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v12 10/12] arm64: implement Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v12 09/12] arm64: disable SCS for hypervisor code
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v12 08/12] arm64: vdso: disable Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v12 07/12] arm64: efi: restore x18 if it was corrupted
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v12 06/12] arm64: preserve x18 when CPU is suspended
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v12 05/12] arm64: reserve x18 from general allocation with SCS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v12 04/12] scs: disable when function graph tracing is enabled
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v12 03/12] scs: add support for stack usage debugging
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v12 02/12] scs: add accounting
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v12 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v12 00/12] add support for Clang's Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v11 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v2 5/5] arm64: entry: Enable random_kstack_offset support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v11 03/12] scs: add support for stack usage debugging
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
[Index of Archives]
[Linux Samsung SoC]
[Linux Rockchip SoC]
[Linux for Synopsys ARC Processors]
[Linux Actions SoC]
[Linux Kernel]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Scanners]
[Yosemite Forum]