Kernel Hardening
[Prev Page][Next Page]
- [PATCH v9 09/12] arm64: disable SCS for hypervisor code
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v9 08/12] arm64: vdso: disable Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v9 07/12] arm64: efi: restore x18 if it was corrupted
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v9 06/12] arm64: preserve x18 when CPU is suspended
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v9 05/12] arm64: reserve x18 from general allocation with SCS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v9 04/12] scs: disable when function graph tracing is enabled
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v9 03/12] scs: add support for stack usage debugging
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v9 02/12] scs: add accounting
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v9 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v9 00/12] add support for Clang's Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 5/6] arm32/64, elf: Split READ_IMPLIES_EXEC from executable GNU_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 6/6] arm64, elf: Disable automatic READ_IMPLIES_EXEC for 64-bit address spaces
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 4/6] arm32/64, elf: Add tables to document READ_IMPLIES_EXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 1/6] x86/elf: Add table to document READ_IMPLIES_EXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 0/6] binfmt_elf: Update READ_IMPLIES_EXEC logic for modern CPUs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 2/6] x86/elf: Split READ_IMPLIES_EXEC from executable GNU_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 3/6] x86/elf: Disable automatic READ_IMPLIES_EXEC for 64-bit address spaces
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 6/6] proc: Use a list of inodes to flush from proc
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v2 5/6] proc: Clear the pieces of proc_inode that proc_evict_inode cares about
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v2 4/6] proc: Use d_invalidate in proc_prune_siblings_dcache
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v2 3/6] proc: In proc_prune_siblings_dcache cache an aquired super block
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v2 2/6] proc: Generalize proc_sys_prune_dcache into proc_prune_siblings_dcache
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v2 1/6] proc: Rename in proc_inode rename sysctl_inodes sibling_inodes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v2 0/6] proc: Dentry flushing without proc_mnt
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [RFC PATCH v14 01/10] landlock: Add object and rule management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v14 09/10] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v14 07/10] arch: Wire up landlock() syscall
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v14 02/10] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v14 06/10] landlock: Add syscall implementation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v14 00/10] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v14 10/10] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v14 08/10] selftests/landlock: Add initial tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v14 05/10] fs,landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v14 04/10] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v14 03/10] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 7/7] proc: Ensure we see the exit of each process tid exactly once
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH 06/11] x86: make sure _etext includes function sections
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [RFC PATCH 06/11] x86: make sure _etext includes function sections
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH 7/7] proc: Ensure we see the exit of each process tid exactly once
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH 4/7] proc: Use d_invalidate in proc_prune_siblings_dcache
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/7] proc: Dentry flushing without proc_mnt
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/7] proc: Dentry flushing without proc_mnt
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] proc: Dentry flushing without proc_mnt
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] proc: Use d_invalidate in proc_prune_siblings_dcache
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] proc: Use d_invalidate in proc_prune_siblings_dcache
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] proc: Use d_invalidate in proc_prune_siblings_dcache
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 4/7] proc: Use d_invalidate in proc_prune_siblings_dcache
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 3/7] proc: Mov rcu_read_(lock|unlock) in proc_prune_siblings_dcache
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 7/7] proc: Ensure we see the exit of each process tid exactly once
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 6/7] proc: Use a list of inodes to flush from proc
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 5/7] proc: Clear the pieces of proc_inode that proc_evict_inode cares about
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 4/7] proc: Use d_invalidate in proc_prune_siblings_dcache
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 3/7] proc: Mov rcu_read_(lock|unlock) in proc_prune_siblings_dcache
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 2/7] proc: Generalize proc_sys_prune_dcache into proc_prune_siblings_dcache
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 1/7] proc: Rename in proc_inode rename sysctl_inodes sibling_inodes
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH 0/7] proc: Dentry flushing without proc_mnt
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v3 6/6] powerpc/fsl_booke/kaslr: rename kaslr-booke32.rst to kaslr-booke.rst and add 64bit part
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v3 5/6] powerpc/fsl_booke/64: clear the original kernel if randomized
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v3 3/6] powerpc/fsl_booke/64: implement KASLR for fsl_booke64
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v3 2/6] powerpc/fsl_booke/64: introduce reloc_kernel_entry() helper
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v3 1/6] powerpc/fsl_booke/kaslr: refactor kaslr_legal_offset() and kaslr_early_init()
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v8 00/12] add support for Clang's Shadow Call Stack
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v3 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [PATCH v8 00/12] add support for Clang's Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v8 00/12] add support for Clang's Shadow Call Stack
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v8 00/12] add support for Clang's Shadow Call Stack
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH v8 12/12] efi/libstub: disable SCS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v8 04/12] scs: disable when function graph tracing is enabled
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v8 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: Maybe inappropriate use BUG_ON() in CONFIG_SLAB_FREELIST_HARDENED
- From: zerons <zeronsaxm@xxxxxxxxx>
- Re: [PATCH v8 04/12] scs: disable when function graph tracing is enabled
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v8 09/12] arm64: disable SCS for hypervisor code
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v8 12/12] efi/libstub: disable SCS
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v8 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v8 12/12] efi/libstub: disable SCS
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v8 09/12] arm64: disable SCS for hypervisor code
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v8 12/12] efi/libstub: disable SCS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 11/12] arm64: scs: add shadow stacks for SDEI
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 10/12] arm64: implement Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 09/12] arm64: disable SCS for hypervisor code
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 08/12] arm64: vdso: disable Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 07/12] arm64: efi: restore x18 if it was corrupted
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 06/12] arm64: preserve x18 when CPU is suspended
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 05/12] arm64: reserve x18 from general allocation with SCS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 04/12] scs: disable when function graph tracing is enabled
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 03/12] scs: add support for stack usage debugging
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 02/12] scs: add accounting
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 01/12] add support for Clang's Shadow Call Stack (SCS)
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v8 00/12] add support for Clang's Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: Maybe inappropriate use BUG_ON() in CONFIG_SLAB_FREELIST_HARDENED
- From: Alexander Popov <alex.popov@xxxxxxxxx>
- Re: Maybe inappropriate use BUG_ON() in CONFIG_SLAB_FREELIST_HARDENED
- From: zerons <zeronsaxm@xxxxxxxxx>
- Re: Maybe inappropriate use BUG_ON() in CONFIG_SLAB_FREELIST_HARDENED
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Maybe inappropriate use BUG_ON() in CONFIG_SLAB_FREELIST_HARDENED
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- Re: [PATCH v7 11/11] arm64: scs: add shadow stacks for SDEI
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Maybe inappropriate use BUG_ON() in CONFIG_SLAB_FREELIST_HARDENED
- From: zerons <zeronsaxm@xxxxxxxxx>
- [PATCH] gcc-plugins: fix gcc-plugins directory path in documentation
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v3 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 11/11] arm64: scs: add shadow stacks for SDEI
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 00/11] add support for Clang's Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v7 09/11] arm64: disable SCS for hypervisor code
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v8 10/11] docs: proc: add documentation for "hidepid=4" and "subset=pidfs" options and new mount behavior
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v8 03/11] proc: move /proc/{self|thread-self} dentries to proc_fs_info
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v8 05/11] proc: add helpers to set and get proc hidepid and gid mount options
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v8 08/11] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v3 6/7] arm64, elf: Disable automatic READ_IMPLIES_EXEC for 64-bit address spaces
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v3 5/7] arm32/64, elf: Split READ_IMPLIES_EXEC from executable GNU_STACK
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v3 4/7] arm32/64, elf: Add tables to document READ_IMPLIES_EXEC
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v3 7/7] selftests/exec: Add READ_IMPLIES_EXEC tests
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH v3 7/7] selftests/exec: Add READ_IMPLIES_EXEC tests
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 7/7] selftests/exec: Add READ_IMPLIES_EXEC tests
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH v3 7/7] selftests/exec: Add READ_IMPLIES_EXEC tests
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 7/7] selftests/exec: Add READ_IMPLIES_EXEC tests
- From: shuah <shuah@xxxxxxxxxx>
- Re: [PATCH v3 0/7] binfmt_elf: Update READ_IMPLIES_EXEC logic for modern CPUs
- From: Jason Gunthorpe <jgg@xxxxxxxxxxxx>
- Re: [PATCH v7 11/11] arm64: scs: add shadow stacks for SDEI
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH v7 00/11] add support for Clang's Shadow Call Stack
- From: James Morse <james.morse@xxxxxxx>
- Re: [RFC PATCH 10/11] module: Reorder functions
- From: Jessica Yu <jeyu@xxxxxxxxxx>
- Re: [PATCH v7 09/11] arm64: disable SCS for hypervisor code
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v7 09/11] arm64: disable SCS for hypervisor code
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v7 09/11] arm64: disable SCS for hypervisor code
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v7 09/11] arm64: disable SCS for hypervisor code
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v3 7/7] selftests/exec: Add READ_IMPLIES_EXEC tests
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 5/7] arm32/64, elf: Split READ_IMPLIES_EXEC from executable GNU_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 6/7] arm64, elf: Disable automatic READ_IMPLIES_EXEC for 64-bit address spaces
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 2/7] x86/elf: Split READ_IMPLIES_EXEC from executable GNU_STACK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 3/7] x86/elf: Disable automatic READ_IMPLIES_EXEC for 64-bit address spaces
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 4/7] arm32/64, elf: Add tables to document READ_IMPLIES_EXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 1/7] x86/elf: Add table to document READ_IMPLIES_EXEC
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 0/7] binfmt_elf: Update READ_IMPLIES_EXEC logic for modern CPUs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 05/11] proc: add helpers to set and get proc hidepid and gid mount options
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v8 10/11] docs: proc: add documentation for "hidepid=4" and "subset=pidfs" options and new mount behavior
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v7 09/11] arm64: disable SCS for hypervisor code
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v8 03/11] proc: move /proc/{self|thread-self} dentries to proc_fs_info
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v7 09/11] arm64: disable SCS for hypervisor code
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v7 09/11] arm64: disable SCS for hypervisor code
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v7 09/11] arm64: disable SCS for hypervisor code
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 09/11] arm64: disable SCS for hypervisor code
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH v7 09/11] arm64: disable SCS for hypervisor code
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v7 07/11] arm64: efi: restore x18 if it was corrupted
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [RFC PATCH 06/11] x86: make sure _etext includes function sections
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [PATCH v8 08/11] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
- From: Jordan Glover <Golden_Miller83@xxxxxxxxxxxxx>
- Re: [RFC PATCH 06/11] x86: make sure _etext includes function sections
- From: Arjan van de Ven <arjan@xxxxxxxxxxxxxxx>
- [PATCH v8 11/11] proc: Move hidepid values to uapi as they are user interface to mount
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v8 10/11] docs: proc: add documentation for "hidepid=4" and "subset=pidfs" options and new mount behavior
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v8 09/11] proc: add option to mount only a pids subset
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v8 08/11] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v8 07/11] proc: flush task dcache entries from all procfs instances
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v8 06/11] proc: support mounting procfs instances inside same pid namespace
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v8 05/11] proc: add helpers to set and get proc hidepid and gid mount options
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v8 04/11] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v8 03/11] proc: move /proc/{self|thread-self} dentries to proc_fs_info
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v8 02/11] proc: add proc_fs_info struct to store proc information
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v8 01/11] proc: Rename struct proc_fs_info to proc_fs_opts
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v8 00/11] proc: modernize proc to support multiple private instances
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [RFC PATCH 06/11] x86: make sure _etext includes function sections
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 06/11] x86: make sure _etext includes function sections
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 5/5] [RFC] mm: annotate memory allocation functions with their sizes
- From: Daniel Micay <danielmicay@xxxxxxxxx>
- Re: [RFC PATCH 04/11] x86/boot/KASLR: Introduce PRNG for faster shuffling
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 06/11] x86: make sure _etext includes function sections
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 04/11] x86/boot/KASLR: Introduce PRNG for faster shuffling
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 04/11] x86/boot/KASLR: Introduce PRNG for faster shuffling
- From: Jean-Philippe Aumasson <jeanphilippe.aumasson@xxxxxxxxx>
- Re: [RFC PATCH 11/11] x86/boot: Move "boot heap" out of .bss
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 06/11] x86: make sure _etext includes function sections
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 06/11] x86: make sure _etext includes function sections
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 09/11] kallsyms: hide layout and expose seed
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC PATCH 09/11] kallsyms: hide layout and expose seed
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 08/11] x86: Add support for finer grained KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 08/11] x86: Add support for finer grained KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 08/11] x86: Add support for finer grained KASLR
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 08/11] x86: Add support for finer grained KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 03/11] x86/boot: Allow a "silent" kaslr random byte fetch
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- RE: [RFC PATCH 06/11] x86: make sure _etext includes function sections
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [RFC PATCH 06/11] x86: make sure _etext includes function sections
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 06/11] x86: make sure _etext includes function sections
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [RFC PATCH 06/11] x86: make sure _etext includes function sections
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [RFC PATCH 04/11] x86/boot/KASLR: Introduce PRNG for faster shuffling
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFC PATCH 06/11] x86: make sure _etext includes function sections
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [RFC PATCH 08/11] x86: Add support for finer grained KASLR
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 06/11] x86: make sure _etext includes function sections
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [RFC PATCH 11/11] x86/boot: Move "boot heap" out of .bss
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [RFC PATCH 06/11] x86: make sure _etext includes function sections
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC PATCH 10/11] module: Reorder functions
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 02/11] x86: tools/relocs: Support >64K section headers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 01/11] modpost: Support >64K sections
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 07/11] x86/tools: Adding relative relocs for randomized functions
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 09/11] kallsyms: hide layout and expose seed
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 06/11] x86: make sure _etext includes function sections
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 08/11] x86: Add support for finer grained KASLR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 08/11] x86: Add support for finer grained KASLR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 05/11] x86: Makefile: Add build and config option for CONFIG_FG_KASLR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 11/11] x86/boot: Move "boot heap" out of .bss
- From: Arvind Sankar <nivedita@xxxxxxxxxxxx>
- Re: [RFC PATCH 03/11] x86/boot: Allow a "silent" kaslr random byte fetch
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 11/11] x86/boot: Move "boot heap" out of .bss
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH 08/11] x86: Add support for finer grained KASLR
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH 05/11] x86: Makefile: Add build and config option for CONFIG_FG_KASLR
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v3 5/6] powerpc/fsl_booke/64: clear the original kernel if randomized
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v3 6/6] powerpc/fsl_booke/kaslr: rename kaslr-booke32.rst to kaslr-booke.rst and add 64bit part
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v3 3/6] powerpc/fsl_booke/64: implement KASLR for fsl_booke64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v3 1/6] powerpc/fsl_booke/kaslr: refactor kaslr_legal_offset() and kaslr_early_init()
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v3 4/6] powerpc/fsl_booke/64: do not clear the BSS for the second pass
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v3 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v3 2/6] powerpc/fsl_booke/64: introduce reloc_kernel_entry() helper
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [RFC PATCH 08/11] x86: Add support for finer grained KASLR
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC PATCH 04/11] x86/boot/KASLR: Introduce PRNG for faster shuffling
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 03/11] x86/boot: Allow a "silent" kaslr random byte fetch
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC PATCH 11/11] x86/boot: Move "boot heap" out of .bss
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [RFC PATCH 11/11] x86/boot: Move "boot heap" out of .bss
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [RFC PATCH 10/11] module: Reorder functions
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [RFC PATCH 09/11] kallsyms: hide layout and expose seed
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [RFC PATCH 08/11] x86: Add support for finer grained KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [RFC PATCH 07/11] x86/tools: Adding relative relocs for randomized functions
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [RFC PATCH 06/11] x86: make sure _etext includes function sections
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [RFC PATCH 05/11] x86: Makefile: Add build and config option for CONFIG_FG_KASLR
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [RFC PATCH 04/11] x86/boot/KASLR: Introduce PRNG for faster shuffling
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [RFC PATCH 03/11] x86/boot: Allow a "silent" kaslr random byte fetch
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [RFC PATCH 02/11] x86: tools/relocs: Support >64K section headers
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [RFC PATCH 01/11] modpost: Support >64K sections
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [RFC PATCH 00/11] Finer grained kernel address space randomization
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/6] powerpc/fsl_booke/64: implement KASLR for fsl_booke64
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v2 6/6] powerpc/fsl_booke/kaslr: rename kaslr-booke32.rst to kaslr-booke.rst and add 64bit part
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v2 4/6] powerpc/fsl_booke/64: do not clear the BSS for the second pass
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v2 5/6] powerpc/fsl_booke/64: clear the original kernel if randomized
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v2 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v2 2/6] powerpc/fsl_booke/64: introduce reloc_kernel_entry() helper
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v2 3/6] powerpc/fsl_booke/64: implement KASLR for fsl_booke64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH v2 1/6] powerpc/fsl_booke/kaslr: refactor kaslr_legal_offset() and kaslr_early_init()
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [ANNOUNCE][CFP] Linux Security Summit North America 2020
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v2] drm/radeon: have the callers of set_memory_*() check the return value
- From: Tianlin Li <tli@xxxxxxxxxxxxxxxx>
- Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Christopher Lameter <cl@xxxxxxxxx>
- Re: [PATCH v2] drm/radeon: have the callers of set_memory_*() check the return value
- From: Christian König <christian.koenig@xxxxxxx>
- [PATCH v2] drm/radeon: have the callers of set_memory_*() check the return value
- From: Tianlin Li <tli@xxxxxxxxxxxxxxxx>
- Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v6 1/5] powerpc/mm: Implement set_memory() routines
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v6 1/5] powerpc/mm: Implement set_memory() routines
- From: Russell Currey <ruscur@xxxxxxxxxx>
- Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] lkdtm: Test KUAP directional user access unlocks on powerpc
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] lkdtm: Test KUAP directional user access unlocks on powerpc
- From: Russell Currey <ruscur@xxxxxxxxxx>
- Re: [PATCH] lkdtm: Test KUAP directional user access unlocks on powerpc
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH] lkdtm: Test KUAP directional user access unlocks on powerpc
- From: Russell Currey <ruscur@xxxxxxxxxx>
- Re: [PATCH] lkdtm: Test KUAP directional user access unlocks on powerpc
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH] lkdtm: Test KUAP directional user access unlocks on powerpc
- From: Russell Currey <ruscur@xxxxxxxxxx>
- Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Christopher Lameter <cl@xxxxxxxxx>
- Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Ursula Braun <ubraun@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] powerpc/book3s64/hash: Disable 16M linear mapping size if not aligned
- From: Michael Ellerman <patch-notifications@xxxxxxxxxxxxxx>
- Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 04/11] scs: disable when function graph tracing is enabled
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v7 11/11] arm64: scs: add shadow stacks for SDEI
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 10/11] arm64: implement Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 09/11] arm64: disable SCS for hypervisor code
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 08/11] arm64: vdso: disable Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 07/11] arm64: efi: restore x18 if it was corrupted
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 06/11] arm64: preserve x18 when CPU is suspended
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 05/11] arm64: reserve x18 from general allocation with SCS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 04/11] scs: disable when function graph tracing is enabled
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 03/11] scs: add support for stack usage debugging
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 02/11] scs: add accounting
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 01/11] add support for Clang's Shadow Call Stack (SCS)
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v7 00/11] add support for Clang's Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v7 02/11] proc: add proc_fs_info struct to store proc information
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v7 02/11] proc: add proc_fs_info struct to store proc information
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v7 07/11] proc: flush task dcache entries from all procfs instances
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 07/11] proc: flush task dcache entries from all procfs instances
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v7 11/11] proc: Move hidepid values to uapi as they are user interface to mount
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v7 10/11] docs: proc: add documentation for "hidepid=4" and "subset=pidfs" options and new mount behavior
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v7 09/11] proc: add option to mount only a pids subset
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v7 07/11] proc: flush task dcache entries from all procfs instances
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v7 08/11] proc: instantiate only pids that we can ptrace on 'hidepid=4' mount option
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v7 06/11] proc: support mounting procfs instances inside same pid namespace
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v7 05/11] proc: add helpers to set and get proc hidepid and gid mount options
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v7 04/11] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v7 02/11] proc: add proc_fs_info struct to store proc information
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v7 03/11] proc: move /proc/{self|thread-self} dentries to proc_fs_info
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v7 01/11] proc: Rename struct proc_fs_info to proc_fs_opts
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v7 00/11] proc: modernize proc to support multiple private instances
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH 4/5] [VERY RFC] mm: kmalloc(_node): return NULL immediately for SIZE_MAX
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH 4/5] [VERY RFC] mm: kmalloc(_node): return NULL immediately for SIZE_MAX
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH v6 1/5] powerpc/mm: Implement set_memory() routines
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- [PATCH 5/5] [RFC] mm: annotate memory allocation functions with their sizes
- From: Daniel Axtens <dja@xxxxxxxxxx>
- [PATCH 4/5] [VERY RFC] mm: kmalloc(_node): return NULL immediately for SIZE_MAX
- From: Daniel Axtens <dja@xxxxxxxxxx>
- [PATCH 3/5] [RFC] staging: rts5208: make len a u16 in rtsx_write_cfg_seq
- From: Daniel Axtens <dja@xxxxxxxxxx>
- [PATCH 2/5] [RFC] kasan: kasan_test: hide allocation sizes from the compiler
- From: Daniel Axtens <dja@xxxxxxxxxx>
- [PATCH 1/5] altera-stapl: altera_get_note: prevent write beyond end of 'key'
- From: Daniel Axtens <dja@xxxxxxxxxx>
- [PATCH 0/5] Annotate allocation functions with alloc_size attribute
- From: Daniel Axtens <dja@xxxxxxxxxx>
- [PATCH v2 2/2] lkdtm: tests for FORTIFY_SOURCE
- From: Daniel Axtens <dja@xxxxxxxxxx>
- [PATCH v2 1/2] string.h: detect intra-object overflow in fortified string functions
- From: Daniel Axtens <dja@xxxxxxxxxx>
- [PATCH v2 0/2] FORTIFY_SOURCE: detect intra-object overflow in string functions
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH] string.h: detect intra-object overflow in fortified string functions
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH] string.h: detect intra-object overflow in fortified string functions
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 5/6] kasan: Unset panic_on_warn before calling panic()
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v3 5/6] kasan: Unset panic_on_warn before calling panic()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 5/6] kasan: Unset panic_on_warn before calling panic()
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH] string.h: detect intra-object overflow in fortified string functions
- From: Daniel Axtens <dja@xxxxxxxxxx>
- Re: [PATCH v3 5/6] kasan: Unset panic_on_warn before calling panic()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 14/15] arm64: implement Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v6 08/15] arm64: disable function graph tracing with SCS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v6 11/15] arm64: efi: restore x18 if it was corrupted
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v6 13/15] arm64: disable SCS for hypervisor code
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v6 00/15] add support for Clang's Shadow Call Stack
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v6 14/15] arm64: implement Shadow Call Stack
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v6 12/15] arm64: vdso: disable Shadow Call Stack
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v6 12/15] arm64: vdso: disable Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v6 15/15] arm64: scs: add shadow stacks for SDEI
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v6 13/15] arm64: disable SCS for hypervisor code
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v6 12/15] arm64: vdso: disable Shadow Call Stack
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v6 11/15] arm64: efi: restore x18 if it was corrupted
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v6 10/15] arm64: preserve x18 when CPU is suspended
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v6 08/15] arm64: disable function graph tracing with SCS
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v6 09/15] arm64: reserve x18 from general allocation with SCS
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v3 6/6] ubsan: Include bug type in report header
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- Re: [PATCH v3 5/6] kasan: Unset panic_on_warn before calling panic()
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH v3 5/6] kasan: Unset panic_on_warn before calling panic()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 6/6] ubsan: Include bug type in report header
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 2/6] ubsan: Split "bounds" checker from other options
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 4/6] ubsan: Check panic_on_warn
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 1/6] ubsan: Add trap instrumentation option
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 3/6] lkdtm/bugs: Add arithmetic overflow and array bounds checks
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 0/6] ubsan: Split out bounds checker
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/2] drm/radeon: have the callers of set_memory_*() check the return value
- From: Alex Deucher <alexdeucher@xxxxxxxxx>
- [RFC v5 43/57] gcc-plugins: objtool: Add plugin to detect switch table on arm64
- From: Julien Thierry <jthierry@xxxxxxxxxx>
- Re: [PATCH 0/2] drm/radeon: have the callers of set_memory_*() check the return value
- From: Thomas Zimmermann <tzimmermann@xxxxxxx>
- Re: [PATCH 0/2] drm/radeon: have the callers of set_memory_*() check the return value
- From: Christian König <christian.koenig@xxxxxxx>
- Re: [PATCH 0/2] drm/radeon: have the callers of set_memory_*() check the return value
- From: Alex Deucher <alexdeucher@xxxxxxxxx>
- Re: [PATCH 0/2] drm/radeon: have the callers of set_memory_*() check the return value
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 2/5] powerpc/kprobes: Mark newly allocated probes as RO
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH 0/2] drm/radeon: have the callers of set_memory_*() check the return value
- From: Tianlin Li <tli@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] drm/radeon: have the callers of set_memory_*() check the return value
- From: Christian König <christian.koenig@xxxxxxx>
- Re: [PATCH v6 1/5] powerpc/mm: Implement set_memory() routines
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v6 00/10] proc: modernize proc to support multiple private instances
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH 2/2] drm/radeon: change call sites to handle return value properly.
- From: Tianlin Li <tli@xxxxxxxxxxxxxxxx>
- [PATCH 1/2] drm/radeon: have the callers of set_memory_*() check the return value
- From: Tianlin Li <tli@xxxxxxxxxxxxxxxx>
- [PATCH 0/2] drm/radeon: have the callers of set_memory_*() check the return value
- From: Tianlin Li <tli@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 3/5] powerpc/mm/ptdump: debugfs handler for W+X checks at runtime
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v6 00/10] proc: modernize proc to support multiple private instances
- From: Alexey Dobriyan <adobriyan@xxxxxxxxx>
- Re: [PATCH v6 07/10] proc: flush task dcache entries from all procfs instances
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [PATCH v6 3/5] powerpc/mm/ptdump: debugfs handler for W+X checks at runtime
- From: Christophe Leroy <christophe.leroy@xxxxxx>
- Re: [PATCH v6 07/10] proc: flush task dcache entries from all procfs instances
- From: J Freyensee <why2jjj.linux@xxxxxxxxx>
- Re: [PATCH] gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v10 00/11] x86: PIE support to extend KASLR randomization
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 09/10] proc: add option to mount only a pids subset
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v6 05/10] proc: add helpers to set and get proc hidepid and gid mount options
- From: kbuild test robot <lkp@xxxxxxxxx>
- [PATCH v6 10/10] docs: proc: add documentation for "hidepid=3" and "pidonly" options and new mount behavior
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v6 09/10] proc: add option to mount only a pids subset
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v6 06/10] proc: support mounting procfs instances inside same pid namespace
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v6 05/10] proc: add helpers to set and get proc hidepid and gid mount options
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v6 08/10] proc: instantiate only pids that we can ptrace on 'hidepid=3' mount option
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v6 04/10] proc: move hide_pid, pid_gid from pid_namespace to proc_fs_info
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v6 03/10] proc: move /proc/{self|thread-self} dentries to proc_fs_info
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v6 07/10] proc: flush task dcache entries from all procfs instances
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v6 02/10] proc: add proc_fs_info struct to store proc information
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v6 01/10] proc: Rename struct proc_fs_info to proc_fs_opts
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- [PATCH v6 00/10] proc: modernize proc to support multiple private instances
- From: Alexey Gladkov <gladkov.alexey@xxxxxxxxx>
- Re: [RESEND RFC 0/2] Paravirtualized Control Register pinning
- From: Liran Alon <liran.alon@xxxxxxxxxx>
- Re: [PATCH v10 00/11] x86: PIE support to extend KASLR randomization
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v10 10/11] x86/paravirt: Adapt assembly for PIE support
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 2/2] powerpc: Remove STRICT_KERNEL_RWX incompatibility with RELOCATABLE
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH 1/2] powerpc/book3s64/hash: Disable 16M linear mapping size if not aligned
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v6 5/5] powerpc/configs: Enable STRICT_MODULE_RWX in skiroot_defconfig
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v6 4/5] powerpc: Set ARCH_HAS_STRICT_MODULE_RWX
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v6 3/5] powerpc/mm/ptdump: debugfs handler for W+X checks at runtime
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v6 2/5] powerpc/kprobes: Mark newly allocated probes as RO
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v6 1/5] powerpc/mm: Implement set_memory() routines
- From: Russell Currey <ruscur@xxxxxxxxxx>
- [PATCH v6 0/5] Implement STRICT_MODULE_RWX for powerpc
- From: Russell Currey <ruscur@xxxxxxxxxx>
- Re: [PATCH v10 10/11] x86/paravirt: Adapt assembly for PIE support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v10 04/11] x86/entry/64: Adapt assembly for PIE support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v10 00/11] x86: PIE support to extend KASLR randomization
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- Re: [PATCH v10 00/11] x86: PIE support to extend KASLR randomization
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v10 01/11] x86/crypto: Adapt assembly for PIE support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v10 01/11] x86/crypto: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- Re: [PATCH v10 01/11] x86/crypto: Adapt assembly for PIE support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 1/3] ubsan: Add trap instrumentation option
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] drivers/misc: have the callers of set_memory_*() check the return value
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] drivers/misc: have the callers of set_memory_*() check the return value
- From: Tianlin Li <tli@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/3] ubsan: Add trap instrumentation option
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH] gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH] gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v5 2/5] powerpc/kprobes: Mark newly allocated probes as RO
- From: Russell Currey <ruscur@xxxxxxxxxx>
- Re: [PATCH 07/11] io_uring: use atomic_t for refcounts
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH 07/11] io_uring: use atomic_t for refcounts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- [PATCH] gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 07/11] io_uring: use atomic_t for refcounts
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v7] crypto: x86: Regularize glue function prototypes
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/11] io_uring: use atomic_t for refcounts
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH 07/11] io_uring: use atomic_t for refcounts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 07/11] io_uring: use atomic_t for refcounts
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH 07/11] io_uring: use atomic_t for refcounts
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH v6 15/15] arm64: scs: add shadow stacks for SDEI
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 14/15] arm64: implement Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 13/15] arm64: disable SCS for hypervisor code
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 12/15] arm64: vdso: disable Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 11/15] arm64: efi: restore x18 if it was corrupted
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 10/15] arm64: preserve x18 when CPU is suspended
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 09/15] arm64: reserve x18 from general allocation with SCS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 08/15] arm64: disable function graph tracing with SCS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 07/15] scs: add support for stack usage debugging
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 06/15] scs: add accounting
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 05/15] add support for Clang's Shadow Call Stack (SCS)
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 04/15] arm64: kernel: avoid x18 in __cpu_soft_restart
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 03/15] arm64: kvm: stop treating register x18 as caller save
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 02/15] arm64/lib: copy_page: avoid x18 register in assembler code
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 01/15] arm64: mm: avoid x18 in idmap_kpti_install_ng_mappings
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v6 00/15] add support for Clang's Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v10 04/11] x86/entry/64: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- Re: [PATCH v10 04/11] x86/entry/64: Adapt assembly for PIE support
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/5] powerpc/kprobes: Mark newly allocated probes as RO
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v10 04/11] x86/entry/64: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- Re: [PATCH v10 04/11] x86/entry/64: Adapt assembly for PIE support
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v10 11/11] x86/alternatives: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v10 10/11] x86/paravirt: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v10 09/11] x86/power/64: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v10 08/11] x86/boot/64: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v10 07/11] x86/acpi: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v10 06/11] x86/CPU: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v10 05/11] x86: pm-trace - Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v10 04/11] x86/entry/64: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v10 03/11] x86: relocate_kernel - Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v10 02/11] x86: Add macro to get symbol address for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v10 01/11] x86/crypto: Adapt assembly for PIE support
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- [PATCH v10 00/11] x86: PIE support to extend KASLR randomization
- From: Thomas Garnier <thgarnie@xxxxxxxxxxxx>
- Re: Contributing to KSPP newbie
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: Contributing to KSPP newbie
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Contributing to KSPP newbie
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Contributing to KSPP newbie
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: Contributing to KSPP newbie
- From: Kassad <aashad940@xxxxxxxxx>
- Re: Contributing to KSPP newbie
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Contributing to KSPP newbie
- From: Kassad <aashad940@xxxxxxxxx>
- Re: [PATCH v2 0/3] ubsan: Split out bounds checker
- From: Qian Cai <cai@xxxxxx>
- Re: [PATCH v2 0/3] ubsan: Split out bounds checker
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v2 0/3] ubsan: Split out bounds checker
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: Questions about "security functions" and "suppression of compilation alarms".
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: Questions about "security functions" and "suppression of compilation alarms".
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7] crypto: x86: Regularize glue function prototypes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 0/3] ubsan: Split out bounds checker
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 0/3] ubsan: Split out bounds checker
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v2 0/3] ubsan: Split out bounds checker
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH v7] crypto: x86: Regularize glue function prototypes
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 0/3] ubsan: Split out bounds checker
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- RE: contribute to KSPP
- From: Peng Fan <peng.fan@xxxxxxx>
- Re: [PATCH v2 0/3] ubsan: Split out bounds checker
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 0/3] ubsan: Split out bounds checker
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v6 8/8] crypto, x86/sha: Eliminate casts on asm implementations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 0/8] crypto: x86: Fix indirect function call casts
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 6/8] crypto: x86/aesni: Remove glue function macro usage
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 1/8] crypto: x86/glue_helper: Regularize function prototypes
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH v6 5/8] crypto: x86/cast6: Remove glue function macro usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 8/8] crypto, x86/sha: Eliminate casts on asm implementations
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 7/8] crypto: x86/glue_helper: Remove function prototype cast helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 6/8] crypto: x86/aesni: Remove glue function macro usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 0/8] crypto: x86: Fix indirect function call casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 3/8] crypto: x86/camellia: Remove glue function macro usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 1/8] crypto: x86/glue_helper: Regularize function prototypes
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 2/8] crypto: x86/serpent: Remove glue function macros usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 4/8] crypto: x86/twofish: Remove glue function macro usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 8/8] crypto, x86/sha: Eliminate casts on asm implementations
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: x86/camellia: Remove glue function macro usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 2/8] crypto: x86/serpent: Remove glue function macros usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 3/3] lkdtm/bugs: Add arithmetic overflow and array bounds checks
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 2/3] ubsan: Split "bounds" checker from other options
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 1/3] ubsan: Add trap instrumentation option
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 0/3] ubsan: Split out bounds checker
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/3] ubsan: Add trap instrumentation option
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/3] ubsan: Add trap instrumentation option
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/3] ubsan: Split "bounds" checker from other options
- From: Andrey Ryabinin <aryabinin@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] ubsan: Add trap instrumentation option
- From: Andrey Ryabinin <aryabinin@xxxxxxxxxxxxx>
- Re: [PATCH 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH] kernel/module: have the callers of set_memory_*() check the return value
- From: Tianlin Li <tli@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] kernel/module: have the callers of set_memory_*() check the return value
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH 1/3] ubsan: Add trap instrumentation option
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 3/3] lkdtm/bugs: Add arithmetic overflow and array bounds checks
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 2/3] ubsan: Split "bounds" checker from other options
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 0/3] ubsan: Split out bounds checker
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH] kernel/module: have the callers of set_memory_*() check the return value
- From: Tianlin Li <tli@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] kernel/module: have the callers of set_memory_*() check the return value
- From: Tianlin Li <tli@xxxxxxxxxxxxxxxx>
- Re: [RFC PATCH] kernel/module: have the callers of set_memory_*() check the return value
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH] kernel/module: have the callers of set_memory_*() check the return value
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH] kernel/module: have the callers of set_memory_*() check the return value
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [RFC PATCH] kernel/module: have the callers of set_memory_*() check the return value
- From: Tianlin Li <tli@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5 14/14] arm64: implement Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: contribute to KSPP
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/5] bnx2x: Remove function casts
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v5 14/14] arm64: implement Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v5 05/14] add support for Clang's Shadow Call Stack (SCS)
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v2] staging: rtl*: Remove tasklet callback casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] staging: rtl*: Remove tasklet callback casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] staging: rtl*: Remove tasklet callback casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 05/14] add support for Clang's Shadow Call Stack (SCS)
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v5 14/14] arm64: implement Shadow Call Stack
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v5 13/14] arm64: disable SCS for hypervisor code
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v5 12/14] arm64: vdso: disable Shadow Call Stack
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v5 10/14] arm64: preserve x18 when CPU is suspended
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v5 08/14] arm64: disable function graph tracing with SCS
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v5 00/14] add support for Clang's Shadow Call Stack
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 6/6] powerpc/fsl_booke/kaslr: rename kaslr-booke32.rst to kaslr-booke.rst and add 64bit part
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH 5/6] powerpc/fsl_booke/64: clear the original kernel if randomized
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH 3/6] powerpc/fsl_booke/64: implement KASLR for fsl_booke64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH 2/6] powerpc/fsl_booke/64: introduce reloc_kernel_entry() helper
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH 1/6] powerpc/fsl_booke/kaslr: refactor kaslr_legal_offset() and kaslr_early_init()
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH 4/6] powerpc/fsl_booke/64: do not clear the BSS for the second pass
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- [PATCH 0/6] implement KASLR for powerpc/fsl_booke/64
- From: Jason Yan <yanaijie@xxxxxxxxxx>
- Re: [PATCH] staging: rtl*: Remove tasklet callback casts
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] staging: rtl*: Remove tasklet callback casts
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH] staging: rtl*: Remove tasklet callback casts
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] staging: rtl*: Remove tasklet callback casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 5/5] bnx2x: Remove hw_reset_t function casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 4/5] bnx2x: Remove format_fw_ver_t function casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 1/5] bnx2x: Drop redundant callback function casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 0/5] bnx2x: Remove function casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 2/5] bnx2x: Remove read_status_t function casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 3/5] bnx2x: Remove config_init_t function casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- contribute to KSPP
- From: Peng Fan <peng.fan@xxxxxxx>
- Re: [PATCH v4 08/17] kprobes: fix compilation without CONFIG_KRETPROBES
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v5 8/8] crypto, x86/sha: Eliminate casts on asm implementations
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 3/8] crypto: x86/camellia: Remove glue function macro usage
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 2/8] crypto: x86/serpent: Remove glue function macros usage
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 6/8] crypto: x86/aesni: Remove glue function macro usage
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 00/14] add support for Clang's Shadow Call Stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 8/8] crypto, x86/sha: Eliminate casts on asm implementations
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 7/8] crypto: x86/glue_helper: Remove function prototype cast helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 5/8] crypto: x86/cast6: Remove glue function macro usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 6/8] crypto: x86/aesni: Remove glue function macro usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 2/8] crypto: x86/serpent: Remove glue function macros usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 3/8] crypto: x86/camellia: Remove glue function macro usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 1/8] crypto: x86/glue_helper: Regularize function prototypes
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 4/8] crypto: x86/twofish: Remove glue function macro usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v5 0/8] crypto: x86: Fix indirect function call casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 00/14] add support for Clang's Shadow Call Stack
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v5 00/14] add support for Clang's Shadow Call Stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 3/8] crypto: x86/camellia: Use new glue function macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches
- From: Jiri Slaby <jslaby@xxxxxxx>
- Re: [PATCH v4 3/8] crypto: x86/camellia: Use new glue function macros
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 3/8] crypto: x86/camellia: Use new glue function macros
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v4 3/8] crypto: x86/camellia: Use new glue function macros
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v4 6/8] crypto: x86/aesni: Use new glue function macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 8/8] crypto, x86/sha: Eliminate casts on asm implementations
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 5/8] crypto: x86/cast6: Use new glue function macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 7/8] crypto: x86/glue_helper: Remove function prototype cast helpers
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 1/8] crypto: x86/glue_helper: Add function glue macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 0/8] crypto: x86: Fix indirect function call casts
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 3/8] crypto: x86/camellia: Use new glue function macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 2/8] crypto: x86/serpent: Use new glue function macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 4/8] crypto: x86/twofish: Use new glue function macros
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
- From: KP Singh <kpsingh@xxxxxxxxxxxx>
- Re: [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PRE-REVIEW PATCH 00/16] Modernize the tasklet API
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 11/14] arm64: efi: restore x18 if it was corrupted
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v5 11/14] arm64: efi: restore x18 if it was corrupted
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PRE-REVIEW PATCH 00/16] Modernize the tasklet API
- From: Romain Perier <romain.perier@xxxxxxxxx>
- Re: [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
- From: KP Singh <kpsingh@xxxxxxxxxxxx>
- Re: [PATCH v5 10/14] arm64: preserve x18 when CPU is suspended
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
- From: KP Singh <kpsingh@xxxxxxxxxxxx>
- Re: [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
- From: KP Singh <kpsingh@xxxxxxxxxxxx>
- Re: [PATCH v5 11/14] arm64: efi: restore x18 if it was corrupted
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- [PATCH v5 14/14] arm64: implement Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 13/14] arm64: disable SCS for hypervisor code
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 12/14] arm64: vdso: disable Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 11/14] arm64: efi: restore x18 if it was corrupted
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 10/14] arm64: preserve x18 when CPU is suspended
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 09/14] arm64: reserve x18 from general allocation with SCS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 08/14] arm64: disable function graph tracing with SCS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 07/14] scs: add support for stack usage debugging
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 06/14] scs: add accounting
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 05/14] add support for Clang's Shadow Call Stack (SCS)
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 04/14] arm64: kernel: avoid x18 in __cpu_soft_restart
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 03/14] arm64: kvm: stop treating register x18 as caller save
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 02/14] arm64/lib: copy_page: avoid x18 register in assembler code
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 01/14] arm64: mm: avoid x18 in idmap_kpti_install_ng_mappings
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v5 00/14] add support for Clang's Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 11/17] arm64: disable function graph tracing with SCS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v4 10/17] arm64: disable kretprobes with SCS
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v4 11/17] arm64: disable function graph tracing with SCS
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 11/17] arm64: disable function graph tracing with SCS
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v4 07/17] scs: add support for stack usage debugging
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v4 13/17] arm64: preserve x18 when CPU is suspended
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 13/17] arm64: preserve x18 when CPU is suspended
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v4 11/17] arm64: disable function graph tracing with SCS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v4 10/17] arm64: disable kretprobes with SCS
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v4 13/17] arm64: preserve x18 when CPU is suspended
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v4 03/17] arm64: kvm: stop treating register x18 as caller save
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v4 13/17] arm64: preserve x18 when CPU is suspended
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v4 07/17] scs: add support for stack usage debugging
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v4 05/17] add support for Clang's Shadow Call Stack (SCS)
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH bpf-next v13 5/7] bpf,landlock: Add task_landlock_ptrace_ancestor() helper
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH bpf-next v13 7/7] landlock: Add user and kernel documentation for Landlock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH bpf-next v13 4/7] landlock: Add ptrace LSM hooks
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH bpf-next v13 2/7] landlock: Add the management of domains
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH bpf-next v13 6/7] bpf,landlock: Add tests for the Landlock ptrace program type
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH bpf-next v13 1/7] bpf,landlock: Define an eBPF program type for Landlock hooks
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH bpf-next v13 3/7] landlock,seccomp: Apply Landlock programs to process hierarchy
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH bpf-next v13 0/7] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 11/17] arm64: disable function graph tracing with SCS
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v4 10/17] arm64: disable kretprobes with SCS
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v4 06/17] scs: add accounting
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 04/17] arm64: kernel: avoid x18 __cpu_soft_restart
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v4 06/17] scs: add accounting
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [PATCH v4 03/17] arm64: kvm: stop treating register x18 as caller save
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 13/17] arm64: preserve x18 when CPU is suspended
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 06/17] scs: add accounting
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 07/17] scs: add support for stack usage debugging
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v4 05/17] add support for Clang's Shadow Call Stack (SCS)
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v4 03/17] arm64: kvm: stop treating register x18 as caller save
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v4 04/17] arm64: kernel: avoid x18 __cpu_soft_restart
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v4 03/17] arm64: kvm: stop treating register x18 as caller save
- From: Marc Zyngier <maz@xxxxxxxxxx>
- Re: [PATCH v4 07/17] scs: add support for stack usage debugging
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 2/5] powerpc/kprobes: Mark newly allocated probes as RO
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: How to get the crash dump if system hangs?
- From: youling 257 <youling257@xxxxxxxxx>
- Re: [PATCH v4 05/17] add support for Clang's Shadow Call Stack (SCS)
- From: Miguel Ojeda <miguel.ojeda.sandonis@xxxxxxxxx>
- [PATCH v4 17/17] arm64: implement Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 16/17] arm64: disable SCS for hypervisor code
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 15/17] arm64: vdso: disable Shadow Call Stack
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- [PATCH v4 14/17] arm64: efi: restore x18 if it was corrupted
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
[Index of Archives]
[Linux Samsung SoC]
[Linux Rockchip SoC]
[Linux for Synopsys ARC Processors]
[Linux Actions SoC]
[Linux Kernel]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Scanners]
[Yosemite Forum]