Kernel Hardening
[Prev Page][Next Page]
- [PATCH v16 05/10] fs,landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v16 04/10] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v16 03/10] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v16 02/10] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v16 01/10] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v16 00/10] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 7/9] x86: Add support for function granular KASLR
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH 9/9] module: Reorder functions
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH 8/9] kallsyms: hide layout
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH 7/9] x86: Add support for function granular KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH 6/9] x86/tools: Adding relative relocs for randomized functions
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH 5/9] x86: make sure _etext includes function sections
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH 4/9] x86: Makefile: Add build and config option for CONFIG_FG_KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH 3/9] x86/boot: Allow a "silent" kaslr random byte fetch
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH 2/9] x86: tools/relocs: Support >64K section headers
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH 1/9] objtool: do not assume order of parent/child functions
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH 0/9] Function Granular Kernel Address Space Layout Randomization
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Scott Wood <oss@xxxxxxxxxxxx>
- Re: [PATCH v3 0/5] hardening : prevent write to proces's read-only pages
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 5/5] Hardening : PPC book3s64: Forbid writes to read-only memory pages of a process
- From: Lev Olshvang <levonshe@xxxxxxxxx>
- [PATCH v3 4/5] Hardening unicore32: Forbid writes to read-only memory pages of a process
- From: Lev Olshvang <levonshe@xxxxxxxxx>
- [PATCH v3 3/5] Hardening um: Forbid writes to read-only memory pages of a process
- From: Lev Olshvang <levonshe@xxxxxxxxx>
- [PATCH v3 2/5] Hardening PowerPC: Forbid writes to read-only memory pages of a process
- From: Lev Olshvang <levonshe@xxxxxxxxx>
- [PATCH v3 1/5] Hardening x86: Forbid writes to read-only memory pages of a process
- From: Lev Olshvang <levonshe@xxxxxxxxx>
- [PATCH v3 0/5] hardening : prevent write to proces's read-only pages
- From: Lev Olshvang <levonshe@xxxxxxxxx>
- [PATCH v1 0/1] hardening : prevent write to proces's read-only pages
- From: Lev Olshvang <levonshe@xxxxxxxxx>
- Re: [PATCH v5 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: Coccinelle rule for CVE-2019-18683
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- Re: Coccinelle rule for CVE-2019-18683
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- [PATCH v1] prevent write to proces's read-only pages
- From: Lev Olshvang <levonshe@xxxxxxxxx>
- Re: [Cocci] Coccinelle rule for CVE-2019-18683
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- Re: [selftests/landlock] d9d464ccf6: kernel-selftests.landlock.test_base.fail
- From: Rong Chen <rong.a.chen@xxxxxxxxx>
- [selftests/landlock] d9d464ccf6: kernel-selftests.landlock.test_base.fail
- From: kernel test robot <rong.a.chen@xxxxxxxxx>
- Re: [selftests/landlock] d9d464ccf6: kernel-selftests.landlock.test_base.fail
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] x86/mm/init: Stop printing pgt_buf addresses
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] x86/mm/init: Stop printing pgt_buf addresses
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [Cocci] Coccinelle rule for CVE-2019-18683
- From: Julia Lawall <julia.lawall@xxxxxxxx>
- Re: [Cocci] Coccinelle rule for CVE-2019-18683
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: Coccinelle rule for CVE-2019-18683
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [Cocci] Coccinelle rule for CVE-2019-18683
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH v10 8/9] proc: use human-readable values for hidehid
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH RESEND v11 0/8] proc: modernize proc to support multiple private instances
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH RESEND v11 0/8] proc: modernize proc to support multiple private instances
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH RESEND v11 0/8] proc: modernize proc to support multiple private instances
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH RESEND v11 7/8] proc: use human-readable values for hidepid
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH RESEND v11 8/8] proc: use named enums for better readability
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH RESEND v11 6/8] docs: proc: add documentation for "hidepid=4" and "subset=pid" options and new mount behavior
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH RESEND v11 5/8] proc: add option to mount only a pids subset
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH RESEND v11 4/8] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH RESEND v11 2/8] proc: allow to mount many instances of proc in one pid namespace
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH RESEND v11 3/8] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH RESEND v11 0/8] proc: modernize proc to support multiple private instances
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH RESEND v11 1/8] proc: rename struct proc_fs_info to proc_fs_opts
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [Cocci] Coccinelle rule for CVE-2019-18683
- From: Julia Lawall <julia.lawall@xxxxxxxx>
- Re: [Cocci] Coccinelle rule for CVE-2019-18683
- From: Markus Elfring <Markus.Elfring@xxxxxx>
- Re: Coccinelle rule for CVE-2019-18683
- From: Jann Horn <jannh@xxxxxxxxxx>
- Coccinelle rule for CVE-2019-18683
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH] gcc-common.h: 'params.h' has been dropped in GCC10
- From: Frédéric Pierret <frederic.pierret@xxxxxxxxxxxx>
- Re: [PATCH] gcc-common.h: 'params.h' has been dropped in GCC10
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] gcc-common.h: 'params.h' has been dropped in GCC10
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] gcc-plugins/stackleak: Avoid assignment for unused macro argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] security : hardening : prevent write to proces's read-only pages from another process
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] gcc-plugins/stackleak: Avoid assignment for unused macro argument
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [PATCH v10 12/12] efi/libstub: disable SCS
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] gcc-common.h: 'params.h' has been dropped in GCC10
- From: Frédéric Pierret (fepitre) <frederic.pierret@xxxxxxxxxxxx>
- Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [RFC PATCH 1/5] security : hardening : prevent write to proces's read-only pages from another process
- From: "Lev R. Oshvang ." <levonshe@xxxxxxxxx>
- Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Vlastimil Babka <vbabka@xxxxxxx>
- [PATCH v3 5/5] arm64: entry: Enable random_kstack_offset support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 4/5] x86/entry: Enable random_kstack_offset support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 3/5] stack: Optionally randomize kernel stack offset each syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 1/5] jump_label: Provide CONFIG-driven build state defaults
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 0/5] Optionally randomize kernel stack offset each syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 2/5] init_on_alloc: Unpessimize default-on builds
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 1/5] security : hardening : prevent write to proces's read-only pages from another process
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 12/12] efi/libstub: disable SCS
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 09/12] arm64: disable SCS for hypervisor code
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v10 12/12] efi/libstub: disable SCS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v10 11/12] arm64: scs: add shadow stacks for SDEI
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v10 10/12] arm64: implement Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v10 09/12] arm64: disable SCS for hypervisor code
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v10 08/12] arm64: vdso: disable Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v10 07/12] arm64: efi: restore x18 if it was corrupted
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v10 06/12] arm64: preserve x18 when CPU is suspended
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v10 05/12] arm64: reserve x18 from general allocation with SCS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v10 04/12] scs: disable when function graph tracing is enabled
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v10 03/12] scs: add support for stack usage debugging
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v10 02/12] scs: add accounting
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v10 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v10 00/12] add support for Clang's Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [RFC PATCH 5/5] UM:Prevent write to read-only pages :text, PLT/GOT tables from another process
- From: Lev Olshvang <levonshe@xxxxxxxxx>
- [RFC PATCH 4/5] X86:Prevent write to read-only pages :text, PLT/GOT tables from another process
- From: Lev Olshvang <levonshe@xxxxxxxxx>
- [RFC PATCH 3/5] Prevent write to read-only pages text, PLT/GOT tables from another process
- From: Lev Olshvang <levonshe@xxxxxxxxx>
- [RFC PATCH 2/5] Prevent write to read-only pages from another process
- From: Lev Olshvang <levonshe@xxxxxxxxx>
- [RFC PATCH 1/5] security : hardening : prevent write to proces's read-only pages from another process
- From: Lev Olshvang <levonshe@xxxxxxxxx>
- [RFC PATCH 0/5] Prevent write to read-only pages (text, PLT/GOT
- From: Lev Olshvang <levonshe@xxxxxxxxx>
- Re: kCFI sources
- From: joao@xxxxxxxxxxxxxxxxxx <joao@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 7/9] proc: move hidepid values to uapi as they are user interface to mount
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: kCFI sources
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v11 1/8] proc: rename struct proc_fs_info to proc_fs_opts
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v11 5/8] proc: add option to mount only a pids subset
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v11 4/8] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v11 0/8] proc: modernize proc to support multiple private instances
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v11 2/8] proc: allow to mount many instances of proc in one pid namespace
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v11 6/8] docs: proc: add documentation for "hidepid=4" and "subset=pid" options and new mount behavior
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v11 3/8] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v11 7/8] proc: use human-readable values for hidepid
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v11 8/8] proc: use named enums for better readability
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v8 2/7] powerpc/kprobes: Mark newly allocated probes as RO
- From: "Naveen N. Rao" <naveen.n.rao@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/7] powerpc/kprobes: Mark newly allocated probes as RO
- From: Russell Currey <ruscur@xxxxxxxxxx>
- Re: [PATCH v8 2/7] powerpc/kprobes: Mark newly allocated probes as RO
- From: "Naveen N. Rao" <naveen.n.rao@xxxxxxxxxxxxx>
- kCFI sources
- From: joao@xxxxxxxxxxxxxxxxxx <joao@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] arm64: remove CONFIG_DEBUG_ALIGN_RODATA feature
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH v8 2/7] powerpc/kprobes: Mark newly allocated probes as RO
- From: Russell Currey <ruscur@xxxxxxxxxx>
- Re: [RFC PATCH] arm64: remove CONFIG_DEBUG_ALIGN_RODATA feature
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH] signal: Extend exec_id to 64bits
- From: Adam Zabrocki <pi3@xxxxxxxxxx>
- Re: [PATCH v8 2/7] powerpc/kprobes: Mark newly allocated probes as RO
- From: Russell Currey <ruscur@xxxxxxxxxx>
- Re: [PATCH v5 bpf] kbuild: fix dependencies for DEBUG_INFO_BTF
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH v5 bpf] kbuild: fix dependencies for DEBUG_INFO_BTF
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- [PATCH v5 bpf] kbuild: fix dependencies for DEBUG_INFO_BTF
- From: Slava Bacherikov <slava@xxxxxxxxxxxx>
- Re: [PATCH v4 bpf] kbuild: fix dependencies for DEBUG_INFO_BTF
- From: Slava Bacherikov <slava@xxxxxxxxxxxx>
- Re: [PATCH v4 bpf] kbuild: fix dependencies for DEBUG_INFO_BTF
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 bpf] kbuild: fix dependencies for DEBUG_INFO_BTF
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH] signal: Extend exec_id to 64bits
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/7] powerpc/kprobes: Mark newly allocated probes as RO
- From: "Naveen N. Rao" <naveen.n.rao@xxxxxxxxxxxxx>
- Re: [PATCH v10 8/9] proc: use human-readable values for hidehid
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v10 0/9] proc: modernize proc to support multiple private instances
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v10 7/9] proc: move hidepid values to uapi as they are user interface to mount
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v10 8/9] proc: use human-readable values for hidehid
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v10 2/9] proc: allow to mount many instances of proc in one pid namespace
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v8 2/7] powerpc/kprobes: Mark newly allocated probes as RO
- From: "Naveen N. Rao" <naveen.n.rao@xxxxxxxxxxxxx>
- Re: [PATCH v11 8/9] proc: use human-readable values for hidehid
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v10 8/9] proc: use human-readable values for hidehid
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v4 bpf] kbuild: fix dependencies for DEBUG_INFO_BTF
- From: Slava Bacherikov <slava@xxxxxxxxxxxx>
- [PATCH v4 bpf] kbuild: fix dependencies for DEBUG_INFO_BTF
- From: Slava Bacherikov <slava@xxxxxxxxxxxx>
- Re: [PATCH v10 2/9] proc: allow to mount many instances of proc in one pid namespace
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] signal: Extend exec_id to 64bits
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH] gcc-plugins/stackleak: Avoid assignment for unused macro argument
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] signal: Extend exec_id to 64bits
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH] arm64: remove CONFIG_DEBUG_ALIGN_RODATA feature
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH] arm64: remove CONFIG_DEBUG_ALIGN_RODATA feature
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [RFC PATCH] arm64: remove CONFIG_DEBUG_ALIGN_RODATA feature
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [RFC PATCH] arm64: remove CONFIG_DEBUG_ALIGN_RODATA feature
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH v8 4/7] powerpc: Set ARCH_HAS_STRICT_MODULE_RWX
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v8 6/7] powerpc/mm: implement set_memory_attr()
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v8 7/7] powerpc/32: use set_memory_attr()
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v8 3/7] powerpc/mm/ptdump: debugfs handler for W+X checks at runtime
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v8 2/7] powerpc/kprobes: Mark newly allocated probes as RO
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v8 1/7] powerpc/mm: Implement set_memory() routines
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v8 5/7] powerpc/configs: Enable STRICT_MODULE_RWX in skiroot_defconfig
- From: Russell Currey <ruscur@xxxxxxxxxx>
- Re: [PATCH] signal: Extend exec_id to 64bits
- From: Bernd Edlinger <bernd.edlinger@xxxxxxxxxx>
- Re: [PATCH] signal: Extend exec_id to 64bits
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] signal: Extend exec_id to 64bits
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] signal: Extend exec_id to 64bits
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] signal: Extend exec_id to 64bits
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] signal: Extend exec_id to 64bits
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] signal: Extend exec_id to 64bits
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] signal: Extend exec_id to 64bits
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] signal: Extend exec_id to 64bits
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] signal: Extend exec_id to 64bits
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] signal: Extend exec_id to 64bits
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v3 bpf] kbuild: fix dependencies for DEBUG_INFO_BTF
- From: Slava Bacherikov <slava@xxxxxxxxxxxx>
- Re: [PATCH v3 bpf] kbuild: fix dependencies for DEBUG_INFO_BTF
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH v3 bpf] kbuild: fix dependencies for DEBUG_INFO_BTF
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 bpf] kbuild: fix dependencies for DEBUG_INFO_BTF
- From: Slava Bacherikov <slava@xxxxxxxxxxxx>
- [PATCH v3 bpf] kbuild: fix dependencies for DEBUG_INFO_BTF
- From: Slava Bacherikov <slava@xxxxxxxxxxxx>
- Re: [RFC PATCH 03/21] list: Annotate lockless list primitives with data_race()
- From: Will Deacon <will@xxxxxxxxxx>
- Re: CONFIG_DEBUG_INFO_BTF and CONFIG_GCC_PLUGIN_RANDSTRUCT
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH v2 bpf] kbuild: fix dependencies for DEBUG_INFO_BTF
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH v2 bpf] kbuild: fix dependencies for DEBUG_INFO_BTF
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 bpf] kbuild: fix dependencies for DEBUG_INFO_BTF
- From: Slava Bacherikov <slava@xxxxxxxxxxxx>
- Re: CONFIG_DEBUG_INFO_BTF and CONFIG_GCC_PLUGIN_RANDSTRUCT
- From: Slava Bacherikov <slava@xxxxxxxxxxxx>
- Re: CONFIG_DEBUG_INFO_BTF and CONFIG_GCC_PLUGIN_RANDSTRUCT
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 03/21] list: Annotate lockless list primitives with data_race()
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v7 7/7] powerpc/32: use set_memory_attr()
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v7 7/7] powerpc/32: use set_memory_attr()
- From: Russell Currey <ruscur@xxxxxxxxxx>
- Re: [PATCH v2 bpf] kbuild: fix dependencies for DEBUG_INFO_BTF
- From: KP Singh <kpsingh@xxxxxxxxxxxx>
- Re: CONFIG_DEBUG_INFO_BTF and CONFIG_GCC_PLUGIN_RANDSTRUCT
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: CONFIG_DEBUG_INFO_BTF and CONFIG_GCC_PLUGIN_RANDSTRUCT
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: CONFIG_DEBUG_INFO_BTF and CONFIG_GCC_PLUGIN_RANDSTRUCT
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v11 8/9] proc: use human-readable values for hidehid
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 3/5] stack: Optionally randomize kernel stack offset each syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 3/5] stack: Optionally randomize kernel stack offset each syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 08/21] Revert "list: Use WRITE_ONCE() when initializing list_head structures"
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [RFC PATCH 08/21] Revert "list: Use WRITE_ONCE() when initializing list_head structures"
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [RFC PATCH 03/21] list: Annotate lockless list primitives with data_race()
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [RFC PATCH 09/21] list: Remove unnecessary WRITE_ONCE() from hlist_bl_add_before()
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [RFC PATCH 12/21] list: Poison ->next pointer for non-RCU deletion of 'hlist_nulls_node'
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [RFC PATCH 09/21] list: Remove unnecessary WRITE_ONCE() from hlist_bl_add_before()
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [RFC PATCH 08/21] Revert "list: Use WRITE_ONCE() when initializing list_head structures"
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [RFC PATCH 07/21] Revert "list: Use WRITE_ONCE() when adding to lists and hlists"
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [RFC PATCH 06/21] list: Remove superfluous WRITE_ONCE() from hlist_nulls implementation
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [RFC PATCH 05/21] list: Comment missing WRITE_ONCE() in __list_del()
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [RFC PATCH 03/21] list: Annotate lockless list primitives with data_race()
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [RFC PATCH 02/21] list: Remove hlist_nulls_unhashed_lockless()
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [RFC PATCH 01/21] list: Remove hlist_unhashed_lockless()
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: Curiosity around 'exec_id' and some problems associated with it
- From: Adam Zabrocki <pi3@xxxxxxxxxx>
- Re: [PATCH v7 7/7] powerpc/32: use set_memory_attr()
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH v7 7/7] powerpc/32: use set_memory_attr()
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v7 6/7] powerpc/mm: implement set_memory_attr()
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v7 5/7] powerpc/configs: Enable STRICT_MODULE_RWX in skiroot_defconfig
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v7 4/7] powerpc: Set ARCH_HAS_STRICT_MODULE_RWX
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v7 3/7] powerpc/mm/ptdump: debugfs handler for W+X checks at runtime
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v7 2/7] powerpc/kprobes: Mark newly allocated probes as RO
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v7 1/7] powerpc/mm: Implement set_memory() routines
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v7 0/7] set_memory() routines and STRICT_MODULE_RWX
- From: Russell Currey <ruscur@xxxxxxxxxx>
- Re: [PATCH v6 1/7] powerpc/mm: Implement set_memory() routines
- From: Russell Currey <ruscur@xxxxxxxxxx>
- Re: CONFIG_DEBUG_INFO_BTF and CONFIG_GCC_PLUGIN_RANDSTRUCT
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH v15 05/10] fs,landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v14 00/10] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: CONFIG_DEBUG_INFO_BTF and CONFIG_GCC_PLUGIN_RANDSTRUCT
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: CONFIG_DEBUG_INFO_BTF and CONFIG_GCC_PLUGIN_RANDSTRUCT
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: CONFIG_DEBUG_INFO_BTF and CONFIG_GCC_PLUGIN_RANDSTRUCT
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- CONFIG_DEBUG_INFO_BTF and CONFIG_GCC_PLUGIN_RANDSTRUCT
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC PATCH] arm64: remove CONFIG_DEBUG_ALIGN_RODATA feature
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH] arm64: remove CONFIG_DEBUG_ALIGN_RODATA feature
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH] arm64: remove CONFIG_DEBUG_ALIGN_RODATA feature
- From: Laura Abbott <labbott@xxxxxxxxxx>
- Re: [RFC PATCH] arm64: remove CONFIG_DEBUG_ALIGN_RODATA feature
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH] arm64: remove CONFIG_DEBUG_ALIGN_RODATA feature
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [RFC PATCH] arm64: remove CONFIG_DEBUG_ALIGN_RODATA feature
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [RFC PATCH] arm64: remove CONFIG_DEBUG_ALIGN_RODATA feature
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [RFC PATCH] arm64: remove CONFIG_DEBUG_ALIGN_RODATA feature
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [RFC PATCH] arm64: remove CONFIG_DEBUG_ALIGN_RODATA feature
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [RFC PATCH] arm64: remove CONFIG_DEBUG_ALIGN_RODATA feature
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 5/5] arm64: entry: Enable random_kstack_offset support
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v2 3/5] stack: Optionally randomize kernel stack offset each syscall
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH v11 8/9] proc: use human-readable values for hidehid
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: Curiosity around 'exec_id' and some problems associated with it
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH] gcc-plugins: drop support for GCC <= 4.7
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH] gcc-plugins: drop support for GCC <= 4.7
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 6/6] powerpc/fsl_booke/kaslr: rename kaslr-booke32.rst to kaslr-booke.rst and add 64bit part
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v5 5/6] powerpc/fsl_booke/64: clear the original kernel if randomized
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v5 4/6] powerpc/fsl_booke/64: do not clear the BSS for the second pass
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v5 2/6] powerpc/fsl_booke/64: introduce reloc_kernel_entry() helper
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v5 3/6] powerpc/fsl_booke/64: implement KASLR for fsl_booke64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v5 1/6] powerpc/fsl_booke/kaslr: refactor kaslr_legal_offset() and kaslr_early_init()
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v5 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: Curiosity around 'exec_id' and some problems associated with it
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [RFC PATCH] arm64: remove CONFIG_DEBUG_ALIGN_RODATA feature
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- [PATCH] gcc-plugins: drop support for GCC <= 4.7
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 2/2] kbuild: add -Wall to KBUILD_HOSTCXXFLAGS
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 1/2] kconfig: remove unused variable in qconf.cc
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v10 7/9] proc: move hidepid values to uapi as they are user interface to mount
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 7/9] proc: move hidepid values to uapi as they are user interface to mount
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v10 8/9] proc: use human-readable values for hidehid
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v2 4/5] x86/entry: Enable random_kstack_offset support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 7/9] proc: move hidepid values to uapi as they are user interface to mount
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 8/9] proc: use human-readable values for hidehid
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 7/9] proc: move hidepid values to uapi as they are user interface to mount
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v10 4/9] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v10 8/9] proc: use human-readable values for hidehid
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v10 7/9] proc: move hidepid values to uapi as they are user interface to mount
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 4/9] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 8/9] proc: use human-readable values for hidehid
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v10 9/9] proc: use named enums for better readability
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v10 8/9] proc: use human-readable values for hidehid
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v10 7/9] proc: move hidepid values to uapi as they are user interface to mount
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v10 5/9] proc: add option to mount only a pids subset
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v10 6/9] docs: proc: add documentation for "hidepid=4" and "subset=pid" options and new mount behavior
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v10 4/9] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v10 3/9] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v10 2/9] proc: allow to mount many instances of proc in one pid namespace
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v10 1/9] proc: rename struct proc_fs_info to proc_fs_opts
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v10 0/9] proc: modernize proc to support multiple private instances
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v15 09/10] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v5 5/6] arm32/64, elf: Split READ_IMPLIES_EXEC from executable PT_GNU_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 6/6] arm64, elf: Disable automatic READ_IMPLIES_EXEC for 64-bit address spaces
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 2/6] x86/elf: Split READ_IMPLIES_EXEC from executable PT_GNU_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 1/6] x86/elf: Add table to document READ_IMPLIES_EXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 0/6] binfmt_elf: Update READ_IMPLIES_EXEC logic for modern CPUs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 4/6] arm32/64, elf: Add tables to document READ_IMPLIES_EXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 3/6] x86/elf: Disable automatic READ_IMPLIES_EXEC for 64-bit address spaces
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v15 09/10] samples/landlock: Add a sandbox manager example
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH v15 10/10] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v15 09/10] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v15 08/10] selftests/landlock: Add initial tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v15 07/10] arch: Wire up landlock() syscall
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v15 06/10] landlock: Add syscall implementation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v15 05/10] fs,landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v15 04/10] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v15 03/10] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v15 02/10] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v15 01/10] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v15 00/10] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2 0/5] Optionally randomize kernel stack offset each syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 5/5] arm64: entry: Enable random_kstack_offset support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 2/5] init_on_alloc: Unpessimize default-on builds
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v2 5/5] arm64: entry: Enable random_kstack_offset support
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 2/2] kbuild: add -Wall to KBUILD_HOSTCXXFLAGS
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/2] kconfig: remove unused variable in qconf.cc
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 0/5] Optionally randomize kernel stack offset each syscall
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2 0/5] Optionally randomize kernel stack offset each syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 5/5] arm64: entry: Enable random_kstack_offset support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v9 9/8] proc: use named enums for better readability
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH RESEND v9 3/8] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH RESEND v9 3/8] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
- From: Alexey Dobriyan <adobriyan@xxxxxxxxx>
- [PATCH v9 9/8] proc: use named enums for better readability
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [RFC PATCH 05/11] x86: Makefile: Add build and config option for CONFIG_FG_KASLR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 5/5] arm64: entry: Enable random_kstack_offset support
- From: Mark Rutland <mark.rutland@xxxxxxx>
- RE: [PATCH v2 0/5] Optionally randomize kernel stack offset each syscall
- From: "Reshetova, Elena" <elena.reshetova@xxxxxxxxx>
- [PATCH 2/2] kbuild: add -Wall to KBUILD_HOSTCXXFLAGS
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 1/2] kconfig: remove unused variable in qconf.cc
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Curiosity around 'exec_id' and some problems associated with it
- From: Adam Zabrocki <pi3@xxxxxxxxxx>
- Re: [PATCH v2 0/5] Optionally randomize kernel stack offset each syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 1/5] jump_label: Provide CONFIG-driven build state defaults
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 03/21] list: Annotate lockless list primitives with data_race()
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [RFC PATCH 03/21] list: Annotate lockless list primitives with data_race()
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2 0/5] Optionally randomize kernel stack offset each syscall
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC PATCH 05/11] x86: Makefile: Add build and config option for CONFIG_FG_KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH RESEND v9 3/8] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 17/21] linux/bit_spinlock.h: Include linux/processor.h
- From: Will Deacon <will@xxxxxxxxxx>
- [PATCH RESEND v9 6/8] docs: proc: add documentation for "hidepid=4" and "subset=pidfs" options and new mount behavior
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH RESEND v9 7/8] proc: move hidepid values to uapi as they are user interface to mount
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH RESEND v9 8/8] proc: use human-readable values for hidehid
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH RESEND v9 5/8] proc: add option to mount only a pids subset
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH RESEND v9 4/8] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH RESEND v9 3/8] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH RESEND v9 2/8] proc: allow to mount many instances of proc in one pid namespace
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH RESEND v9 1/8] proc: rename struct proc_fs_info to proc_fs_opts
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH RESEND v9 0/8] proc: modernize proc to support multiple private instances
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v2 5/5] arm64: entry: Enable random_kstack_offset support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 1/5] jump_label: Provide CONFIG-driven build state defaults
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 0/5] Optionally randomize kernel stack offset each syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 3/5] stack: Optionally randomize kernel stack offset each syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 4/5] x86/entry: Enable random_kstack_offset support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 2/5] init_on_alloc: Unpessimize default-on builds
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 03/21] list: Annotate lockless list primitives with data_race()
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC PATCH 03/21] list: Annotate lockless list primitives with data_race()
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [RFC PATCH 03/21] list: Annotate lockless list primitives with data_race()
- From: Greg KH <greg@xxxxxxxxx>
- Re: [RFC PATCH 03/21] list: Annotate lockless list primitives with data_race()
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC PATCH 03/21] list: Annotate lockless list primitives with data_race()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 14/21] plist: Use CHECK_DATA_CORRUPTION instead of explicit {BUG,WARN}_ON()
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 10/21] kernel-hacking: Make DEBUG_{LIST,PLIST,SG,NOTIFIERS} non-debug options
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 20/21] list: Format CHECK_DATA_CORRUPTION error messages consistently
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 03/21] list: Annotate lockless list primitives with data_race()
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC PATCH 04/21] timers: Use hlist_unhashed() instead of open-coding in timer_pending()
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 17/21] linux/bit_spinlock.h: Include linux/processor.h
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 02/21] list: Remove hlist_nulls_unhashed_lockless()
- From: Greg KH <greg@xxxxxxxxx>
- Re: [RFC PATCH 01/21] list: Remove hlist_unhashed_lockless()
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 03/21] list: Annotate lockless list primitives with data_race()
- From: Greg KH <greg@xxxxxxxxx>
- Re: [RFC PATCH 03/21] list: Annotate lockless list primitives with data_race()
- From: Jann Horn <jannh@xxxxxxxxxx>
- [RFC PATCH 21/21] lkdtm: Extend list corruption checks
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 20/21] list: Format CHECK_DATA_CORRUPTION error messages consistently
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 19/21] list_bl: Extend integrity checking to cover the same cases as 'hlist'
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 18/21] list_bl: Move integrity checking out of line
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 15/21] list_bl: Use CHECK_DATA_CORRUPTION instead of custom BUG_ON() wrapper
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 13/21] list: Add integrity checking to hlist_nulls implementation
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 17/21] linux/bit_spinlock.h: Include linux/processor.h
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 16/21] list_bl: Extend integrity checking in deletion routines
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 10/21] kernel-hacking: Make DEBUG_{LIST,PLIST,SG,NOTIFIERS} non-debug options
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 14/21] plist: Use CHECK_DATA_CORRUPTION instead of explicit {BUG,WARN}_ON()
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 09/21] list: Remove unnecessary WRITE_ONCE() from hlist_bl_add_before()
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 08/21] Revert "list: Use WRITE_ONCE() when initializing list_head structures"
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 12/21] list: Poison ->next pointer for non-RCU deletion of 'hlist_nulls_node'
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 07/21] Revert "list: Use WRITE_ONCE() when adding to lists and hlists"
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 11/21] list: Add integrity checking to hlist implementation
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 06/21] list: Remove superfluous WRITE_ONCE() from hlist_nulls implementation
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 05/21] list: Comment missing WRITE_ONCE() in __list_del()
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 04/21] timers: Use hlist_unhashed() instead of open-coding in timer_pending()
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 03/21] list: Annotate lockless list primitives with data_race()
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 02/21] list: Remove hlist_nulls_unhashed_lockless()
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 01/21] list: Remove hlist_unhashed_lockless()
- From: Will Deacon <will@xxxxxxxxxx>
- [RFC PATCH 00/21] Improve list integrity checking
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v2] lib/refcount: Document interaction with PID_MAX_LIMIT
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: Looking for help testing patch attestation
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [PATCH v4 6/6] powerpc/fsl_booke/kaslr: rename kaslr-booke32.rst to kaslr-booke.rst and add 64bit part
- From: Scott Wood <oss@xxxxxxxxxxxx>
- Re: [PATCH v4 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [RFC PATCH v14 00/10] Landlock LSM
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC PATCH v14 00/10] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v14 00/10] Landlock LSM
- From: Jann Horn <jannh@xxxxxxxxxx>
- Looking for help testing patch attestation
- From: Konstantin Ryabitsev <konstantin@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v14 00/10] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2] lib/refcount: Document interaction with PID_MAX_LIMIT
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [RFC PATCH v14 00/10] Landlock LSM
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC PATCH v14 06/10] landlock: Add syscall implementation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v14 00/10] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v14 06/10] landlock: Add syscall implementation
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v14 00/10] Landlock LSM
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v4 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v9 8/8] proc: use human-readable values for hidehid
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v9 7/8] proc: move hidepid values to uapi as they are user interface to mount
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v9 6/8] docs: proc: add documentation for "hidepid=4" and "subset=pidfs" options and new mount behavior
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v9 5/8] proc: add option to mount only a pids subset
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v9 4/8] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v9 3/8] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v9 1/8] proc: rename struct proc_fs_info to proc_fs_opts
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v9 2/8] proc: allow to mount many instances of proc in one pid namespace
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v9 0/8] proc: modernize proc to support multiple private instances
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v4 1/6] x86/elf: Add table to document READ_IMPLIES_EXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3] ARM: smp: add support for per-task stack canaries
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [RFC PATCH v14 00/10] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3] ARM: smp: add support for per-task stack canaries
- From: Russell King - ARM Linux admin <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 1/6] x86/elf: Add table to document READ_IMPLIES_EXEC
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3] ARM: smp: add support for per-task stack canaries
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3] ARM: smp: add support for per-task stack canaries
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v3] ARM: smp: add support for per-task stack canaries
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 6/7] powerpc/mm: implement set_memory_attr()
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH v6 1/7] powerpc/mm: Implement set_memory() routines
- From: Daniel Axtens <dja@xxxxxxxxxx>
- [PATCH v6 7/7] powerpc/32: use set_memory_attr()
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v6 6/7] powerpc/mm: implement set_memory_attr()
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v6 5/7] powerpc/configs: Enable STRICT_MODULE_RWX in skiroot_defconfig
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v6 4/7] powerpc: Set ARCH_HAS_STRICT_MODULE_RWX
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v6 3/7] powerpc/mm/ptdump: debugfs handler for W+X checks at runtime
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v6 2/7] powerpc/kprobes: Mark newly allocated probes as RO
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v6 1/7] powerpc/mm: Implement set_memory() routines
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v6 0/7] set_memory() routines and STRICT_MODULE_RWX
- From: Russell Currey <ruscur@xxxxxxxxxx>
- Re: [RFC PATCH v14 00/10] Landlock LSM
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v3] ARM: smp: add support for per-task stack canaries
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH] arm64: add check_wx_pages debugfs for CHECK_WX
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] arm64: add check_wx_pages debugfs for CHECK_WX
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] arm64: add check_wx_pages debugfs for CHECK_WX
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH] arm64: add check_wx_pages debugfs for CHECK_WX
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH] arm64: add check_wx_pages debugfs for CHECK_WX
- From: Steven Price <steven.price@xxxxxxx>
- Re: [PATCH] microblaze: Stop printing the virtual memory layout
- From: Michal Simek <monstr@xxxxxxxxx>
- Re: [PATCH] sh: Stop printing the virtual memory layout
- From: Kaiwan N Billimoria <kaiwan@xxxxxxxxxxxxxx>
- Re: Maybe inappropriate use BUG_ON() in CONFIG_SLAB_FREELIST_HARDENED
- From: zerons <zeronsaxm@xxxxxxxxx>
- [PATCH] arm64: add check_wx_pages debugfs for CHECK_WX
- From: Phong Tran <tranmanphong@xxxxxxxxx>
- Re: [PATCH] xtensa/mm: Stop printing the virtual memory layout
- From: Max Filippov <jcmvbkbc@xxxxxxxxx>
- Re: [PATCH] sh: Stop printing the virtual memory layout
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- [PATCH v4 4/6] powerpc/fsl_booke/64: do not clear the BSS for the second pass
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v4 5/6] powerpc/fsl_booke/64: clear the original kernel if randomized
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v4 6/6] powerpc/fsl_booke/kaslr: rename kaslr-booke32.rst to kaslr-booke.rst and add 64bit part
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v4 2/6] powerpc/fsl_booke/64: introduce reloc_kernel_entry() helper
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v4 3/6] powerpc/fsl_booke/64: implement KASLR for fsl_booke64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v4 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v4 1/6] powerpc/fsl_booke/kaslr: refactor kaslr_legal_offset() and kaslr_early_init()
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [PATCH] sh: Stop printing the virtual memory layout
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] sh: Stop printing the virtual memory layout
- From: John Paul Adrian Glaubitz <glaubitz@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] sh: Stop printing the virtual memory layout
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH] xtensa/mm: Stop printing the virtual memory layout
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH] powerpc/32: Stop printing the virtual memory layout
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH] nds32/mm: Stop printing the virtual memory layout
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH] microblaze: Stop printing the virtual memory layout
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH v3] x86/mm/init_32: Stop printing the virtual memory layout
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [PATCH] sh: Stop printing the virtual memory layout
- From: John Paul Adrian Glaubitz <glaubitz@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] sh: Stop printing the virtual memory layout
- From: John Paul Adrian Glaubitz <glaubitz@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] sh: Stop printing the virtual memory layout
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] sh: Stop printing the virtual memory layout
- From: John Paul Adrian Glaubitz <glaubitz@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] x86/mm/init_32: Stop printing the virtual memory layout
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] sh: Stop printing the virtual memory layout
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH] sh: Stop printing the virtual memory layout
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH] sh: Stop printing the virtual memory layout
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH] xtensa/mm: Stop printing the virtual memory layout
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [PATCH] sh: Stop printing the virtual memory layout
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [PATCH] powerpc/32: Stop printing the virtual memory layout
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [PATCH] nds32/mm: Stop printing the virtual memory layout
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [PATCH] microblaze: Stop printing the virtual memory layout
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [PATCH v3] x86/mm/init_32: Stop printing the virtual memory layout
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v3 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [PATCH v3 5/6] powerpc/fsl_booke/64: clear the original kernel if randomized
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [PATCH v3 4/6] powerpc/fsl_booke/64: do not clear the BSS for the second pass
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [PATCH v3 3/6] powerpc/fsl_booke/64: implement KASLR for fsl_booke64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [PATCH v3 5/6] powerpc/fsl_booke/64: clear the original kernel if randomized
- From: Scott Wood <oss@xxxxxxxxxxxx>
- Re: [PATCH v3 4/6] powerpc/fsl_booke/64: do not clear the BSS for the second pass
- From: Scott Wood <oss@xxxxxxxxxxxx>
- Re: [PATCH v3 3/6] powerpc/fsl_booke/64: implement KASLR for fsl_booke64
- From: Scott Wood <oss@xxxxxxxxxxxx>
- Re: [PATCH v3 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Scott Wood <oss@xxxxxxxxxxxx>
- Re: [PATCH v11 00/11] x86: PIE support to extend KASLR randomization
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v11 00/11] x86: PIE support to extend KASLR randomization
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- Re: [PATCH v11 00/11] x86: PIE support to extend KASLR randomization
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v11 00/11] x86: PIE support to extend KASLR randomization
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v11 00/11] x86: PIE support to extend KASLR randomization
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v11 00/11] x86: PIE support to extend KASLR randomization
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v11 00/11] x86: PIE support to extend KASLR randomization
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] lib/refcount: Document interaction with PID_MAX_LIMIT
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v11 00/11] x86: PIE support to extend KASLR randomization
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 00/11] x86: PIE support to extend KASLR randomization
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- Re: [PATCH v2] lib/refcount: Document interaction with PID_MAX_LIMIT
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2] lib/refcount: Document interaction with PID_MAX_LIMIT
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] lib/refcount: Document interaction with PID_MAX_LIMIT
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH v2] lib/refcount: Document interaction with PID_MAX_LIMIT
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v11 00/11] x86: PIE support to extend KASLR randomization
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v11 00/11] x86: PIE support to extend KASLR randomization
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v11 11/11] x86/alternatives: Adapt assembly for PIE support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v11 06/11] x86/CPU: Adapt assembly for PIE support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] lib/refcount: Document interaction with PID_MAX_LIMIT
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] lib/refcount: Document interaction with PID_MAX_LIMIT
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC PATCH 09/11] kallsyms: hide layout and expose seed
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 09/11] kallsyms: hide layout and expose seed
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 09/11] kallsyms: hide layout and expose seed
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86/mm/init_32: Stop printing the virtual memory layout
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] x86/mm/init_32: Don't print out kernel memory layout if KASLR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2] x86/mm/init_32: Stop printing the virtual memory layout
- From: Tycho Andersen <tycho@xxxxxxxx>
- Re: [RESEND PATCH v4 05/10] lib/refcount: Improve performance of generic REFCOUNT_FULL code
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC PATCH v14 10/10] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [PATCH v3 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Scott Wood <oss@xxxxxxxxxxxx>
- Re: [PATCH v3 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [PATCH v3 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Scott Wood <oss@xxxxxxxxxxxx>
- Re: [PATCH v3 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v2] x86/mm/init_32: Stop printing the virtual memory layout
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH] x86/mm/init_32: Don't print out kernel memory layout if KASLR
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH] x86/mm/init_32: Don't print out kernel memory layout if KASLR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] x86/mm/init: Stop printing pgt_buf addresses
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] x86/mm/init: Stop printing pgt_buf addresses
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v3 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Scott Wood <oss@xxxxxxxxxxxx>
- Re: [RFC PATCH v14 10/10] landlock: Add user and kernel documentation
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [PATCH v3 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Scott Wood <oss@xxxxxxxxxxxx>
- Re: [PATCH 4/3] pid: Improve the comment about waiting in zap_pid_ns_processes
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 4/3] pid: Improve the comment about waiting in zap_pid_ns_processes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 2/3] uml: Create a private mount of proc for mconsole
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 3/3] proc: Remove the now unnecessary internal mount of proc
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 2/3] uml: Create a private mount of proc for mconsole
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v9 10/12] arm64: implement Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH 3/3] proc: Remove the now unnecessary internal mount of proc
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 2/3] uml: Create a private mount of proc for mconsole
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 3/3] proc: Remove the now unnecessary internal mount of proc
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 2/3] uml: Create a private mount of proc for mconsole
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 1/3] uml: Don't consult current to find the proc_mnt in mconsole_proc
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 0/3] proc: Actually honor the mount options
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v9 10/12] arm64: implement Shadow Call Stack
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH v5 6/6] ubsan: Include bug type in report header
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- Re: [RESEND PATCH v4 05/10] lib/refcount: Improve performance of generic REFCOUNT_FULL code
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v3 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [PATCH v3 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Scott Wood <oss@xxxxxxxxxxxx>
- Re: [RFC PATCH 09/11] kallsyms: hide layout and expose seed
- From: Baoquan He <bhe@xxxxxxxxxx>
- [PATCH v11 11/11] x86/alternatives: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v11 10/11] x86/paravirt: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v11 09/11] x86/power/64: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v11 08/11] x86/boot/64: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v11 07/11] x86/acpi: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v11 06/11] x86/CPU: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v11 05/11] x86: pm-trace - Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v11 04/11] x86/entry/64: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v11 03/11] x86: relocate_kernel - Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v11 02/11] x86: Add macro to get symbol address for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v11 01/11] x86/crypto: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v11 00/11] x86: PIE support to extend KASLR randomization
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v5 6/6] ubsan: Include bug type in report header
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 5/6] kasan: Unset panic_on_warn before calling panic()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 3/6] lkdtm/bugs: Add arithmetic overflow and array bounds checks
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 0/6] ubsan: Split out bounds checker
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 1/6] ubsan: Add trap instrumentation option
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 2/6] ubsan: Split "bounds" checker from other options
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 4/6] ubsan: Check panic_on_warn
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 6/6] ubsan: Include bug type in report header
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 5/6] kasan: Unset panic_on_warn before calling panic()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 3/6] lkdtm/bugs: Add arithmetic overflow and array bounds checks
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 1/6] ubsan: Add trap instrumentation option
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 4/6] ubsan: Check panic_on_warn
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 0/6] ubsan: Split out bounds checker
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 2/6] ubsan: Split "bounds" checker from other options
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH v14 01/10] landlock: Add object and rule management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v14 05/10] fs,landlock: Support filesystem access-control
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC PATCH v14 05/10] fs,landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v14 01/10] landlock: Add object and rule management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH 09/11] kallsyms: hide layout and expose seed
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Maybe inappropriate use BUG_ON() in CONFIG_SLAB_FREELIST_HARDENED
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: [RFC PATCH v14 01/10] landlock: Add object and rule management
- From: Hillf Danton <hdanton@xxxxxxxx>
- Re: [RFC PATCH 09/11] kallsyms: hide layout and expose seed
- From: Baoquan He <bhe@xxxxxxxxxx>
- Re: [PATCH v3 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [PATCH 5/5] [RFC] mm: annotate memory allocation functions with their sizes
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 3/8] powerpc/mm/ptdump: debugfs handler for W+X checks at runtime
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] x86/mm/init_32: Don't print out kernel memory layout if KASLR
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [RFC PATCH v14 05/10] fs,landlock: Support filesystem access-control
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC PATCH v14 01/10] landlock: Add object and rule management
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC PATCH 08/11] x86: Add support for finer grained KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 05/11] x86: Makefile: Add build and config option for CONFIG_FG_KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v14 00/10] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v14 01/10] landlock: Add object and rule management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH v5 8/8] powerpc/mm: Disable set_memory() routines when strict RWX isn't enabled
- From: Andrew Donnellan <ajd@xxxxxxxxxxxxx>
- Re: [PATCH v3 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [PATCH v5 8/8] powerpc/mm: Disable set_memory() routines when strict RWX isn't enabled
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v4 8/8] powerpc/mm: Disable set_memory() routines when strict RWX isn't enabled
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v3 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Daniel Axtens <dja@xxxxxxxxxx>
- [PATCH v5 8/8] powerpc/mm: Disable set_memory() routines when strict RWX isn't enabled
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v5 7/8] powerpc/32: use set_memory_attr()
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v5 6/8] powerpc/mm: implement set_memory_attr()
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v5 5/8] powerpc/configs: Enable STRICT_MODULE_RWX in skiroot_defconfig
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v5 4/8] powerpc: Set ARCH_HAS_STRICT_MODULE_RWX
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v5 3/8] powerpc/mm/ptdump: debugfs handler for W+X checks at runtime
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v5 2/8] powerpc/kprobes: Mark newly allocated probes as RO
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v5 1/8] powerpc/mm: Implement set_memory() routines
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v5 0/8] set_memory() routines and STRICT_MODULE_RWX
- From: Russell Currey <ruscur@xxxxxxxxxx>
- Re: [RFC PATCH] Use IS_ENABLED() instead of #ifdefs
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v4 8/8] powerpc/mm: Disable set_memory() routines when strict RWX isn't enabled
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v4 7/8] powerpc/32: use set_memory_attr()
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v4 6/8] powerpc/mm: implement set_memory_attr()
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v4 5/8] powerpc/configs: Enable STRICT_MODULE_RWX in skiroot_defconfig
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v4 4/8] powerpc: Set ARCH_HAS_STRICT_MODULE_RWX
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v4 3/8] powerpc/mm/ptdump: debugfs handler for W+X checks at runtime
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v4 2/8] powerpc/kprobes: Mark newly allocated probes as RO
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v4 1/8] powerpc/mm: Implement set_memory() routines
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v4 0/8] set_memory() routines and STRICT_MODULE_RWX
- From: Russell Currey <ruscur@xxxxxxxxxx>
- Re: [PATCH 5/5] [RFC] mm: annotate memory allocation functions with their sizes
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH v3 3/6] powerpc/fsl_booke/64: implement KASLR for fsl_booke64
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v3 3/6] powerpc/fsl_booke/64: implement KASLR for fsl_booke64
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [RFC PATCH] Use IS_ENABLED() instead of #ifdefs
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [RESEND PATCH v4 05/10] lib/refcount: Improve performance of generic REFCOUNT_FULL code
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v3 3/6] powerpc/fsl_booke/64: implement KASLR for fsl_booke64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [PATCH v3 6/6] powerpc/fsl_booke/kaslr: rename kaslr-booke32.rst to kaslr-booke.rst and add 64bit part
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [PATCH v3 5/6] powerpc/fsl_booke/64: clear the original kernel if randomized
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [PATCH v3 3/6] powerpc/fsl_booke/64: implement KASLR for fsl_booke64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [PATCH v3 1/6] powerpc/fsl_booke/kaslr: refactor kaslr_legal_offset() and kaslr_early_init()
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [RFC PATCH v14 01/10] landlock: Add object and rule management
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] gcc-plugins: fix gcc-plugins directory path in documentation
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH v14 00/10] Landlock LSM
- From: J Freyensee <why2jjj.linux@xxxxxxxxx>
- Re: [PATCH 5/5] [RFC] mm: annotate memory allocation functions with their sizes
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 05/11] x86: Makefile: Add build and config option for CONFIG_FG_KASLR
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [RFC PATCH 08/11] x86: Add support for finer grained KASLR
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- [PATCH v9 12/12] efi/libstub: disable SCS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v9 11/12] arm64: scs: add shadow stacks for SDEI
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v9 10/12] arm64: implement Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v9 09/12] arm64: disable SCS for hypervisor code
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v9 08/12] arm64: vdso: disable Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v9 07/12] arm64: efi: restore x18 if it was corrupted
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v9 06/12] arm64: preserve x18 when CPU is suspended
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v9 05/12] arm64: reserve x18 from general allocation with SCS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v9 04/12] scs: disable when function graph tracing is enabled
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v9 03/12] scs: add support for stack usage debugging
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v9 02/12] scs: add accounting
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v9 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v9 00/12] add support for Clang's Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 5/6] arm32/64, elf: Split READ_IMPLIES_EXEC from executable GNU_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 6/6] arm64, elf: Disable automatic READ_IMPLIES_EXEC for 64-bit address spaces
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 4/6] arm32/64, elf: Add tables to document READ_IMPLIES_EXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 1/6] x86/elf: Add table to document READ_IMPLIES_EXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 0/6] binfmt_elf: Update READ_IMPLIES_EXEC logic for modern CPUs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 2/6] x86/elf: Split READ_IMPLIES_EXEC from executable GNU_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 3/6] x86/elf: Disable automatic READ_IMPLIES_EXEC for 64-bit address spaces
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 6/6] proc: Use a list of inodes to flush from proc
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v2 5/6] proc: Clear the pieces of proc_inode that proc_evict_inode cares about
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v2 4/6] proc: Use d_invalidate in proc_prune_siblings_dcache
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v2 3/6] proc: In proc_prune_siblings_dcache cache an aquired super block
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v2 2/6] proc: Generalize proc_sys_prune_dcache into proc_prune_siblings_dcache
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v2 1/6] proc: Rename in proc_inode rename sysctl_inodes sibling_inodes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v2 0/6] proc: Dentry flushing without proc_mnt
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [RFC PATCH v14 01/10] landlock: Add object and rule management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v14 09/10] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v14 07/10] arch: Wire up landlock() syscall
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v14 02/10] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v14 06/10] landlock: Add syscall implementation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v14 00/10] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v14 10/10] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v14 08/10] selftests/landlock: Add initial tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v14 05/10] fs,landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v14 04/10] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v14 03/10] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 7/7] proc: Ensure we see the exit of each process tid exactly once
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH 06/11] x86: make sure _etext includes function sections
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [RFC PATCH 06/11] x86: make sure _etext includes function sections
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH 7/7] proc: Ensure we see the exit of each process tid exactly once
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH 4/7] proc: Use d_invalidate in proc_prune_siblings_dcache
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/7] proc: Dentry flushing without proc_mnt
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/7] proc: Dentry flushing without proc_mnt
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] proc: Dentry flushing without proc_mnt
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] proc: Use d_invalidate in proc_prune_siblings_dcache
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] proc: Use d_invalidate in proc_prune_siblings_dcache
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] proc: Use d_invalidate in proc_prune_siblings_dcache
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] proc: Use d_invalidate in proc_prune_siblings_dcache
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/7] proc: Mov rcu_read_(lock|unlock) in proc_prune_siblings_dcache
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 7/7] proc: Ensure we see the exit of each process tid exactly once
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 6/7] proc: Use a list of inodes to flush from proc
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 5/7] proc: Clear the pieces of proc_inode that proc_evict_inode cares about
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 4/7] proc: Use d_invalidate in proc_prune_siblings_dcache
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 3/7] proc: Mov rcu_read_(lock|unlock) in proc_prune_siblings_dcache
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 2/7] proc: Generalize proc_sys_prune_dcache into proc_prune_siblings_dcache
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 1/7] proc: Rename in proc_inode rename sysctl_inodes sibling_inodes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 0/7] proc: Dentry flushing without proc_mnt
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v3 6/6] powerpc/fsl_booke/kaslr: rename kaslr-booke32.rst to kaslr-booke.rst and add 64bit part
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v3 5/6] powerpc/fsl_booke/64: clear the original kernel if randomized
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v3 3/6] powerpc/fsl_booke/64: implement KASLR for fsl_booke64
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v3 2/6] powerpc/fsl_booke/64: introduce reloc_kernel_entry() helper
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v3 1/6] powerpc/fsl_booke/kaslr: refactor kaslr_legal_offset() and kaslr_early_init()
- From: Christophe Leroy <christophe.leroy@xxxxxx>
[Index of Archives]
[Linux Samsung SoC]
[Linux Rockchip SoC]
[Linux for Synopsys ARC Processors]
[Linux Actions SoC]
[Linux Kernel]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Scanners]
[Yosemite Forum]