Linux API
[Prev Page][Next Page]
- [PATCH 04/30] rseq: Extend struct rseq with numa node id
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH 09/30] selftests/rseq: Remove RSEQ_SKIP_FASTPATH code
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH 12/30] selftests/rseq: arm: Template memory ordering and percpu access mode
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH 03/30] rseq: Introduce extensible rseq ABI
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH 06/30] selftests/rseq: Implement rseq numa node id field selftest
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH 02/30] rseq: Introduce feature size and alignment ELF auxiliary vector entries
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH 08/30] rseq: Extend struct rseq with per-memory-map concurrency ID
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH 05/30] selftests/rseq: Use ELF auxiliary vector for extensible rseq
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH 01/30] selftests/rseq: Fix: Fail thread registration when CONFIG_RSEQ=n
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH 14/30] selftests/rseq: mips: Template memory ordering and percpu access mode
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH 10/30] selftests/rseq: Implement rseq mm_cid field support
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH 13/30] selftests/rseq: arm64: Template memory ordering and percpu access mode
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH 15/30] selftests/rseq: ppc: Template memory ordering and percpu access mode
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH 00/30] RSEQ node id and mm concurrency id extensions
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [External] Re: [PATCH v2] mm: add new syscall pidfd_set_mempolicy().
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [External] Re: [PATCH v2] mm: add new syscall pidfd_set_mempolicy().
- From: Zhongkun He <hezhongkun.hzk@xxxxxxxxxxxxx>
- Re: [PATCH v1] xfs_spaceman: add fsuuid command
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH v5 08/24] sched: Introduce per memory space current virtual cpu id
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v5 08/24] sched: Introduce per memory space current virtual cpu id
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [External] Re: [PATCH v2] mm: add new syscall pidfd_set_mempolicy().
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- RE: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: "Schimpe, Christina" <christina.schimpe@xxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- RE: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: "Schimpe, Christina" <christina.schimpe@xxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [RFC] Add a new generic system call which has better performance, to get /proc data, than existing mechanisms
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 08/24] sched: Introduce per memory space current virtual cpu id
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v5 08/24] sched: Introduce per memory space current virtual cpu id
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v5 08/24] sched: Introduce per memory space current virtual cpu id
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 08/12] landlock: Implement TCP network hooks
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v8 07/12] landlock: Add network rules support
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 08/24] sched: Introduce per memory space current virtual cpu id
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- RE: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: "Schimpe, Christina" <christina.schimpe@xxxxxxxxx>
- Re: [External] Re: [PATCH v2] mm: add new syscall pidfd_set_mempolicy().
- From: Zhongkun He <hezhongkun.hzk@xxxxxxxxxxxxx>
- Re: [External] Re: [PATCH v2] mm: add new syscall pidfd_set_mempolicy().
- From: "Huang, Ying" <ying.huang@xxxxxxxxx>
- Re: [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Ackerley Tng <ackerleytng@xxxxxxxxxx>
- Re: [PATCH v5 0/2] sched/numa: add per-process numa_balancing
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [RFC] Add a new generic system call which has better performance, to get /proc data, than existing mechanisms
- From: Anjali Kulkarni <anjali.k.kulkarni@xxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [External] Re: [PATCH v2] mm: add new syscall pidfd_set_mempolicy().
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [RFC PATCH] seccomp: Add protection keys into seccomp_data
- From: Stephen Röttger <sroettger@xxxxxxxxxx>
- Re: [External] Re: [PATCH v2] mm: add new syscall pidfd_set_mempolicy().
- From: Zhongkun He <hezhongkun.hzk@xxxxxxxxxxxxx>
- Re: [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 15/37] x86/mm: Check Shadow Stack page fault errors
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [External] Re: [PATCH v2] mm: add new syscall pidfd_set_mempolicy().
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH] drm/atomic: do not branch based on the value of current->comm[0]
- From: Daniel Vetter <daniel@xxxxxxxx>
- Re: [External] Re: [PATCH v2] mm: add new syscall pidfd_set_mempolicy().
- From: Zhongkun He <hezhongkun.hzk@xxxxxxxxxxxxx>
- Re: [PATCH] drm/atomic: do not branch based on the value of current->comm[0]
- From: Daniel Abrecht <freedesktop-linux-dri-devel@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2] mm: add new syscall pidfd_set_mempolicy().
- From: "Huang, Ying" <ying.huang@xxxxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH] drm/atomic: do not branch based on the value of current->comm[0]
- From: Dave Airlie <airlied@xxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH] drm/atomic: do not branch based on the value of current->comm[0]
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH] drm/atomic: do not branch based on the value of current->comm[0]
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 15/37] x86/mm: Check Shadow Stack page fault errors
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 18/37] mm: Add guard pages around a shadow stack.
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 25/37] x86/shstk: Add user-mode shadow stack support
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 36/37] x86/cet/shstk: Add ARCH_CET_UNLOCK
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 15/37] x86/mm: Check Shadow Stack page fault errors
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 36/37] x86/cet/shstk: Add ARCH_CET_UNLOCK
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3 36/37] x86/cet/shstk: Add ARCH_CET_UNLOCK
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 18/37] mm: Add guard pages around a shadow stack.
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 24/37] x86: Introduce userspace API for CET enabling
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 24/37] x86: Introduce userspace API for CET enabling
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 20/37] mm/mprotect: Exclude shadow stack from preserve_write
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 18/37] mm: Add guard pages around a shadow stack.
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 20/37] mm/mprotect: Exclude shadow stack from preserve_write
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 24/37] x86: Introduce userspace API for CET enabling
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 15/37] x86/mm: Check Shadow Stack page fault errors
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 36/37] x86/cet/shstk: Add ARCH_CET_UNLOCK
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 18/37] mm: Add guard pages around a shadow stack.
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 25/37] x86/shstk: Add user-mode shadow stack support
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 24/37] x86: Introduce userspace API for CET enabling
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 24/37] x86: Introduce userspace API for CET enabling
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 15/37] x86/mm: Check Shadow Stack page fault errors
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 36/37] x86/cet/shstk: Add ARCH_CET_UNLOCK
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 13/37] mm: Move VM_UFFD_MINOR_BIT from 37 to 38
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v3 13/37] mm: Move VM_UFFD_MINOR_BIT from 37 to 38
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [External] Re: [PATCH v2] mm: add new syscall pidfd_set_mempolicy().
- From: Zhongkun He <hezhongkun.hzk@xxxxxxxxxxxxx>
- Re: [RFC PATCH] seccomp: Add protection keys into seccomp_data
- From: Michael Sammler <msammler@xxxxxxxxxxx>
- Re: [RFC PATCH] getting misc stats/attributes via xattr API
- From: Abel Wu <wuyun.abel@xxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v5 08/24] sched: Introduce per memory space current virtual cpu id
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [External] Re: [PATCH v2] mm: add new syscall pidfd_set_mempolicy().
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [External] Re: [PATCH v2] mm: add new syscall pidfd_set_mempolicy().
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [External] Re: [PATCH v2] mm: add new syscall pidfd_set_mempolicy().
- From: Zhongkun He <hezhongkun.hzk@xxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [RFC PATCH] getting misc stats/attributes via xattr API
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: Alex Bennée <alex.bennee@xxxxxxxxxx>
- Re: [External] Re: [PATCH v2] mm: add new syscall pidfd_set_mempolicy().
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [External] Re: [PATCH v2] mm: add new syscall pidfd_set_mempolicy().
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [RFC PATCH] seccomp: Add protection keys into seccomp_data
- From: Stephen Röttger <sroettger@xxxxxxxxxx>
- Re: [External] Re: [PATCH v2] mm: add new syscall pidfd_set_mempolicy().
- From: Zhongkun He <hezhongkun.hzk@xxxxxxxxxxxxx>
- Re: [RFC PATCH] getting misc stats/attributes via xattr API
- From: Abel Wu <wuyun.abel@xxxxxxxxxxxxx>
- Re: [External] Re: [PATCH v2] mm: add new syscall pidfd_set_mempolicy().
- From: Zhongkun He <hezhongkun.hzk@xxxxxxxxxxxxx>
- Re: [PATCH v2] mm: add new syscall pidfd_set_mempolicy().
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2] mm: add new syscall pidfd_set_mempolicy().
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 08/24] sched: Introduce per memory space current virtual cpu id
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v2] mm: add new syscall pidfd_set_mempolicy().
- From: Zhongkun He <hezhongkun.hzk@xxxxxxxxxxxxx>
- Re: [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 08/24] sched: Introduce per memory space current virtual cpu id
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v1 6/8] LSM: lsm_self_attr syscall for LSM self attributes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 6/8] LSM: lsm_self_attr syscall for LSM self attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 6/8] LSM: lsm_self_attr syscall for LSM self attributes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH] riscv: Bump COMMAND_LINE_SIZE value to 1024
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v1 7/8] LSM: Create lsm_module_list system call
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 0/2] sched/numa: add per-process numa_balancing
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH v1 6/8] LSM: lsm_self_attr syscall for LSM self attributes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 3/8] LSM: Identify the process attributes for each module
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 2/8] LSM: Add an LSM identifier for external use
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 7/8] LSM: Create lsm_module_list system call
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 6/8] LSM: lsm_self_attr syscall for LSM self attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 3/8] LSM: Identify the process attributes for each module
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 2/8] LSM: Add an LSM identifier for external use
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 2/8] LSM: Add an LSM identifier for external use
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 6/8] LSM: lsm_self_attr syscall for LSM self attributes
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 4/8] LSM: Maintain a table of LSM attribute data
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 7/8] LSM: Create lsm_module_list system call
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 3/8] LSM: Identify the process attributes for each module
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 2/8] LSM: Add an LSM identifier for external use
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v1 2/8] LSM: Add an LSM identifier for external use
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v5 08/24] sched: Introduce per memory space current virtual cpu id
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v5 08/24] sched: Introduce per memory space current virtual cpu id
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v5 08/24] sched: Introduce per memory space current virtual cpu id
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v5 08/24] sched: Introduce per memory space current virtual cpu id
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v5 08/24] sched: Introduce per memory space current virtual cpu id
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 6/8] KVM: Update lpage info when private/shared memory are mixed
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 08/24] sched: Introduce per memory space current virtual cpu id
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v5 08/24] sched: Introduce per memory space current virtual cpu id
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v5 08/24] sched: Introduce per memory space current virtual cpu id
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v5 08/24] sched: Introduce per memory space current virtual cpu id
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v9 6/8] KVM: Update lpage info when private/shared memory are mixed
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: selftests: clone3: clone3_cap_checkpoint_restore fails - Could not set CAP_CHECKPOINT_RESTORE
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: selftests: clone3: clone3_clear_sighand failed - Bail out! Failed to clear signal handler for child process
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: selftests: clone3: clone3_clear_sighand failed - Bail out! Failed to clear signal handler for child process
- From: Naresh Kamboju <naresh.kamboju@xxxxxxxxxx>
- Re: selftests: clone3: clone3_clear_sighand failed - Bail out! Failed to clear signal handler for child process
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- selftests: clone3: clone3_cap_checkpoint_restore fails - Could not set CAP_CHECKPOINT_RESTORE
- From: Naresh Kamboju <naresh.kamboju@xxxxxxxxxx>
- Re: selftests: clone3: clone3_clear_sighand failed - Bail out! Failed to clear signal handler for child process
- From: Naresh Kamboju <naresh.kamboju@xxxxxxxxxx>
- Re: selftests: clone3: clone3_clear_sighand failed - Bail out! Failed to clear signal handler for child process
- From: Christian Brauner <brauner@xxxxxxxxxx>
- selftests: clone3: clone3_clear_sighand failed - Bail out! Failed to clear signal handler for child process
- From: Naresh Kamboju <naresh.kamboju@xxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Yuan Yao <yuan.yao@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 04/37] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 04/37] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 04/37] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v3 04/37] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 04/37] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 04/37] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 03/37] x86/cpufeatures: Add CPU feature flags for shadow stacks
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- [PATCH] drm/atomic: do not branch based on the value of current->comm[0]
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- [PATCH v3 36/37] x86/cet/shstk: Add ARCH_CET_UNLOCK
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [RFC 37/37] fs/binfmt_elf: Block old shstk elf bit
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 31/37] x86: Expose thread features in /proc/$PID/status
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 32/37] x86/cet/shstk: Wire in CET interface
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 35/37] x86/cet: Add PTRACE interface for CET
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 33/37] selftests/x86: Add shadow stack test
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 34/37] x86/fpu: Add helper for initing features
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 30/37] x86/shstk: Support wrss for userspace
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 29/37] x86/shstk: Introduce map_shadow_stack syscall
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 27/37] x86/shstk: Introduce routines modifying shstk
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 28/37] x86/shstk: Handle signals for shadow stack
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 26/37] x86/shstk: Handle thread shadow stack
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 25/37] x86/shstk: Add user-mode shadow stack support
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 24/37] x86: Introduce userspace API for CET enabling
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 23/37] mm: Warn on shadow stack memory in wrong vma
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 20/37] mm/mprotect: Exclude shadow stack from preserve_write
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 22/37] mm: Don't allow write GUPs to shadow stack memory
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 21/37] mm: Re-introduce vm_flags to do_mmap()
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 19/37] mm/mmap: Add shadow stack pages to memory accounting
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 18/37] mm: Add guard pages around a shadow stack.
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 14/37] mm: Introduce VM_SHADOW_STACK for shadow stack memory
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 13/37] mm: Move VM_UFFD_MINOR_BIT from 37 to 38
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 15/37] x86/mm: Check Shadow Stack page fault errors
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 17/37] mm: Fixup places that call pte_mkwrite() directly
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 16/37] x86/mm: Update maybe_mkwrite() for shadow stack
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 12/37] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 10/37] x86/mm: Introduce _PAGE_COW
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 11/37] x86/mm: Update pte_modify for _PAGE_COW
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 08/37] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 09/37] x86/mm: Move pmd_write(), pud_write() up in the file
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 07/37] x86/cet: Add user control-protection fault handler
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 06/37] x86/fpu: Add helper for modifying xstate
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 04/37] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 05/37] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 02/37] x86/cet/shstk: Add Kconfig option for Shadow Stack
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 03/37] x86/cpufeatures: Add CPU feature flags for shadow stacks
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 01/37] Documentation/x86: Add CET description
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v3 00/37] Shadow stacks for userspace
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH v5 20/24] selftests/rseq: Implement parametrized vm_vcpu_id test
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 23/24] selftests/rseq: parametrized test: Report/abort on negative cpu id
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 21/24] selftests/rseq: x86: Implement rseq_load_u32_u32
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 18/24] selftests/rseq: riscv: Template memory ordering and percpu access mode
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 17/24] selftests/rseq: s390: Template memory ordering and percpu access mode
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 19/24] selftests/rseq: Implement basic percpu ops vm_vcpu_id test
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 22/24] selftests/rseq: Implement numa node id vs vm_vcpu_id invariant test
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 24/24] tracing/rseq: Add mm_vcpu_id field to rseq_update
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 16/24] selftests/rseq: ppc: Template memory ordering and percpu access mode
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 15/24] selftests/rseq: mips: Template memory ordering and percpu access mode
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 10/24] selftests/rseq: Remove RSEQ_SKIP_FASTPATH code
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 12/24] selftests/rseq: x86: Template memory ordering and percpu access mode
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 14/24] selftests/rseq: arm64: Template memory ordering and percpu access mode
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 11/24] selftests/rseq: Implement rseq vm_vcpu_id field support
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 09/24] rseq: Extend struct rseq with per memory space vcpu id
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 08/24] sched: Introduce per memory space current virtual cpu id
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 13/24] selftests/rseq: arm: Template memory ordering and percpu access mode
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 07/24] cpumask: Implement cpumask_{first,next}_{not,}andnot
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 06/24] lib: Implement find_{first,next,nth}_notandnot_bit, find_first_andnot_bit
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 00/24] RSEQ node id and virtual cpu id extensions
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 03/24] rseq: Extend struct rseq with numa node id
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 05/24] selftests/rseq: Implement rseq numa node id field selftest
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 04/24] selftests/rseq: Use ELF auxiliary vector for extensible rseq
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 01/24] rseq: Introduce feature size and alignment ELF auxiliary vector entries
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- [PATCH v5 02/24] rseq: Introduce extensible rseq ABI
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v2 33/39] x86/cpufeatures: Limit shadow stack to Intel CPUs
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- [PATCH v3] kernel/ksysfs.c: export kernel cpu byteorder
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH] rseq: Use pr_warn_once() when deprecated/unknown ABI flags are encountered
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH] rseq: Use pr_warn_once() when deprecated/unknown ABI flags are encountered
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v2] proc: add byteorder file
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- RE: linux interprets an fcntl int arg as long
- From: David Laight <David.Laight@xxxxxxxxxx>
- RE: linux interprets an fcntl int arg as long
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v2] proc: add byteorder file
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: linux interprets an fcntl int arg as long
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH v2] proc: add byteorder file
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: linux interprets an fcntl int arg as long
- From: "'Szabolcs Nagy'" <szabolcs.nagy@xxxxxxx>
- RE: linux interprets an fcntl int arg as long
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: linux interprets an fcntl int arg as long
- From: "'Szabolcs Nagy'" <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- RE: linux interprets an fcntl int arg as long
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: linux interprets an fcntl int arg as long
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH] proc: add byteorder file
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH] proc: add byteorder file
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: linux interprets an fcntl int arg as long
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- [PATCH] proc: add byteorder file
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- Re: [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Michael Roth <michael.roth@xxxxxxx>
- Re: [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- linux interprets an fcntl int arg as long
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v1 2/8] LSM: Add an LSM identifier for external use
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Xiaoyao Li <xiaoyao.li@xxxxxxxxx>
- Re: [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 6/8] KVM: Update lpage info when private/shared memory are mixed
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v1 4/8] LSM: Maintain a table of LSM attribute data
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 4/8] LSM: Maintain a table of LSM attribute data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 8/8] KVM: Enable and expose KVM_MEM_PRIVATE
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v1 2/8] LSM: Add an LSM identifier for external use
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 4/8] LSM: Maintain a table of LSM attribute data
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/2] sched/numa: add per-process numa_balancing
- From: Gang Li <ligang.bdlg@xxxxxxxxxxxxx>
- [PATCH v5 0/2] sched/numa: add per-process numa_balancing
- From: Gang Li <ligang.bdlg@xxxxxxxxxxxxx>
- Re: [PATCH v1 4/8] LSM: Maintain a table of LSM attribute data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v1 2/8] LSM: Add an LSM identifier for external use
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 01/39] Documentation/x86: Add CET description
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v9 6/8] KVM: Update lpage info when private/shared memory are mixed
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v1 2/8] LSM: Add an LSM identifier for external use
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Isaku Yamahata <isaku.yamahata@xxxxxxxxx>
- Re: [PATCH v1 7/8] LSM: Create lsm_module_list system call
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v1 6/8] LSM: lsm_self_attr syscall for LSM self attributes
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v1 6/8] LSM: lsm_self_attr syscall for LSM self attributes
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v1 8/8] lsm: wireup syscalls lsm_self_attr and lsm_module_list
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v1 6/8] LSM: lsm_self_attr syscall for LSM self attributes
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v1 6/8] LSM: lsm_self_attr syscall for LSM self attributes
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v1 7/8] LSM: Create lsm_module_list system call
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 4/8] LSM: Maintain a table of LSM attribute data
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 3/8] LSM: Identify the process attributes for each module
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 2/8] LSM: Add an LSM identifier for external use
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 1/8] LSM: Identify modules by more than name
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 6/8] LSM: lsm_self_attr syscall for LSM self attributes
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v1 8/8] lsm: wireup syscalls lsm_self_attr and lsm_module_list
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 7/8] LSM: Create lsm_module_list system call
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 4/8] LSM: Maintain a table of LSM attribute data
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 5/8] proc: Use lsmids instead of lsm names for attrs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 3/8] LSM: Identify the process attributes for each module
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 6/8] LSM: lsm_self_attr syscall for LSM self attributes
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 2/8] LSM: Add an LSM identifier for external use
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 0/8] LSM: Two basic syscalls
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v1 1/8] LSM: Identify modules by more than name
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Peter Maydell <peter.maydell@xxxxxxxxxx>
- [PATCH v9 8/8] KVM: Enable and expose KVM_MEM_PRIVATE
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 7/8] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 5/8] KVM: Register/unregister the guest private memory regions
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 6/8] KVM: Update lpage info when private/shared memory are mixed
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 4/8] KVM: Use gfn instead of hva for mmu_notifier_retry
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 3/8] KVM: Add KVM_EXIT_MEMORY_FAULT exit
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 1/8] mm: Introduce memfd_restricted system call to create restricted user memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- [PATCH v9 0/8] KVM: mm: fd-based approach for supporting KVM
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: "Kirill A . Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] rseq: Use pr_warn_once() when deprecated/unknown ABI flags are encountered
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v2 27/39] x86/cet/shstk: Handle signals for shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 24/39] x86/cet/shstk: Add user-mode shadow stack support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 27/39] x86/cet/shstk: Handle signals for shadow stack
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 26/39] x86/cet/shstk: Introduce routines modifying shstk
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 24/39] x86/cet/shstk: Add user-mode shadow stack support
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 33/39] x86/cpufeatures: Limit shadow stack to Intel CPUs
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v38 39/39] LSM: Create lsm_module_list system call
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v8 5/8] KVM: Register/unregister the guest private memory regions
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v8 5/8] KVM: Register/unregister the guest private memory regions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: "Kirill A . Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v8 5/8] KVM: Register/unregister the guest private memory regions
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 5/8] KVM: Register/unregister the guest private memory regions
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v5 0/8] make statx() return DIO alignment information
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH v4 01/25] rseq: Introduce feature size and alignment ELF auxiliary vector entries
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v4 01/25] rseq: Introduce feature size and alignment ELF auxiliary vector entries
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Vishal Annapurve <vannapurve@xxxxxxxxxx>
- Re: [PATCH v5 0/8] make statx() return DIO alignment information
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 0/8] make statx() return DIO alignment information
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 5/8] KVM: Register/unregister the guest private memory regions
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: "Kirill A . Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 05/39] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v2 05/39] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v4 01/25] rseq: Introduce feature size and alignment ELF auxiliary vector entries
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: "Gupta, Pankaj" <pankaj.gupta@xxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: "Kirill A . Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v4 01/25] rseq: Introduce feature size and alignment ELF auxiliary vector entries
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v4 00/25] RSEQ node id and virtual cpu id extensions
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 7/8] KVM: Handle page fault for private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v8 5/8] KVM: Register/unregister the guest private memory regions
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v2 05/39] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 04/39] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 03/39] x86/cpufeatures: Add CPU feature flags for shadow stacks
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v8 7/8] KVM: Handle page fault for private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2 04/39] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 10/39] x86/mm: Introduce _PAGE_COW
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 04/39] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 03/39] x86/cpufeatures: Add CPU feature flags for shadow stacks
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 17/39] mm: Fixup places that call pte_mkwrite() directly
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 17/39] mm: Fixup places that call pte_mkwrite() directly
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 10/39] x86/mm: Introduce _PAGE_COW
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 15/39] x86/mm: Check Shadow Stack page fault errors
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 16/39] x86/mm: Update maybe_mkwrite() for shadow stack
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 16/39] x86/mm: Update maybe_mkwrite() for shadow stack
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 15/39] x86/mm: Check Shadow Stack page fault errors
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 10/39] x86/mm: Introduce _PAGE_COW
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 10/39] x86/mm: Introduce _PAGE_COW
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/39] Documentation/x86: Add CET description
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v2 01/39] Documentation/x86: Add CET description
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [External] Re: [RFC] mm: add new syscall pidfd_set_mempolicy()
- From: Zhongkun He <hezhongkun.hzk@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [External] Re: [RFC] mm: add new syscall pidfd_set_mempolicy()
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [External] Re: [RFC] mm: add new syscall pidfd_set_mempolicy()
- From: Zhongkun He <hezhongkun.hzk@xxxxxxxxxxxxx>
- Re: [External] Re: [RFC] mm: add new syscall pidfd_set_mempolicy()
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [External] Re: [RFC] mm: add new syscall pidfd_set_mempolicy()
- From: Zhongkun He <hezhongkun.hzk@xxxxxxxxxxxxx>
- Re: [PATCH v2 02/39] x86/cet/shstk: Add Kconfig option for Shadow Stack
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 02/39] x86/cet/shstk: Add Kconfig option for Shadow Stack
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [man-pages PATCH v4] statx.2, open.2: document STATX_DIOALIGN
- From: Alejandro Colomar <alx.manpages@xxxxxxxxx>
- Re: [PATCH v38 39/39] LSM: Create lsm_module_list system call
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v38 06/39] LSM: lsm_self_attr syscall for LSM self attributes
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2 02/39] x86/cet/shstk: Add Kconfig option for Shadow Stack
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 23/39] x86: Introduce userspace API for CET enabling
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 01/39] Documentation/x86: Add CET description
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [RFC] mm: add new syscall pidfd_set_mempolicy()
- From: Frank van der Linden <fvdl@xxxxxxxxxx>
- Re: [PATCH v2 01/39] Documentation/x86: Add CET description
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC] mm: add new syscall pidfd_set_mempolicy()
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [RFC] mm: add new syscall pidfd_set_mempolicy()
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [RFC] mm: add new syscall pidfd_set_mempolicy()
- From: Vinicius Petrucci <vpetrucci@xxxxxxxxx>
- Re: [PATCH v2 01/39] Documentation/x86: Add CET description
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v2 23/39] x86: Introduce userspace API for CET enabling
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [External] Re: [RFC] mm: add new syscall pidfd_set_mempolicy()
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [External] Re: [RFC] mm: add new syscall pidfd_set_mempolicy()
- From: Zhongkun He <hezhongkun.hzk@xxxxxxxxxxxxx>
- Re: [External] Re: [RFC] mm: add new syscall pidfd_set_mempolicy()
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [External] Re: [RFC] mm: add new syscall pidfd_set_mempolicy()
- From: Zhongkun He <hezhongkun.hzk@xxxxxxxxxxxxx>
- Re: [PATCH v8 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [External] Re: [RFC] mm: add new syscall pidfd_set_mempolicy()
- From: Zhongkun He <hezhongkun.hzk@xxxxxxxxxxxxx>
- Re: [RFC] mm: add new syscall pidfd_set_mempolicy()
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [RFC] mm: add new syscall pidfd_set_mempolicy()
- From: Abel Wu <wuyun.abel@xxxxxxxxxxxxx>
- Re: [PATCH v8 5/8] KVM: Register/unregister the guest private memory regions
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [man-pages PATCH v3] statx.2, open.2: document STATX_DIOALIGN
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [man-pages PATCH v4] statx.2, open.2: document STATX_DIOALIGN
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [RFC] mm: add new syscall pidfd_set_mempolicy()
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [RFC] mm: add new syscall pidfd_set_mempolicy()
- From: Frank van der Linden <fvdl@xxxxxxxxxx>
- Re: [RFC] mm: add new syscall pidfd_set_mempolicy()
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [RFC] mm: add new syscall pidfd_set_mempolicy()
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v6] MIPS: Expose prid and globalnumber to sysfs
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v6] MIPS: Expose prid and globalnumber to sysfs
- From: Jiaxun Yang <jiaxun.yang@xxxxxxxxxxx>
- Re: [PATCH v8 5/8] KVM: Register/unregister the guest private memory regions
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v2 01/39] Documentation/x86: Add CET description
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v2 01/39] Documentation/x86: Add CET description
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 23/39] x86: Introduce userspace API for CET enabling
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC] mm: add new syscall pidfd_set_mempolicy()
- From: Frank van der Linden <fvdl@xxxxxxxxxx>
- Semantic newlines (was: [man-pages PATCH v3] statx.2, open.2: document STATX_DIOALIGN)
- From: Alejandro Colomar <alx.manpages@xxxxxxxxx>
- Re: [man-pages PATCH v3] statx.2, open.2: document STATX_DIOALIGN
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH v2 28/39] x86/cet/shstk: Introduce map_shadow_stack syscall
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v2 18/39] mm: Add guard pages around a shadow stack.
- From: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
- Re: [PATCH v2 18/39] mm: Add guard pages around a shadow stack.
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v2 18/39] mm: Add guard pages around a shadow stack.
- From: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
- Re: [PATCH v4 00/25] RSEQ node id and virtual cpu id extensions
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v4 01/25] rseq: Introduce feature size and alignment ELF auxiliary vector entries
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v2 18/39] mm: Add guard pages around a shadow stack.
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v2 01/39] Documentation/x86: Add CET description
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v2 28/39] x86/cet/shstk: Introduce map_shadow_stack syscall
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v2 23/39] x86: Introduce userspace API for CET enabling
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- [RFC] mm: add new syscall pidfd_set_mempolicy()
- From: Zhongkun He <hezhongkun.hzk@xxxxxxxxxxxxx>
- Re: [PATCH v8 8/8] KVM: Enable and expose KVM_MEM_PRIVATE
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 8/8] KVM: Enable and expose KVM_MEM_PRIVATE
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Chao Peng <chao.p.peng@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5] MIPS: Expose prid and globalnumber to sysfs
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [man-pages PATCH v3] statx.2, open.2: document STATX_DIOALIGN
- From: Alejandro Colomar <alx.manpages@xxxxxxxxx>
- Re: [PATCH v8 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5] MIPS: Expose prid and globalnumber to sysfs
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v5] MIPS: Expose prid and globalnumber to sysfs
- From: "Jiaxun Yang" <jiaxun.yang@xxxxxxxxxxx>
- Re: [PATCH v8 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5] MIPS: Expose prid and globalnumber to sysfs
- From: Greg KH <greg@xxxxxxxxx>
- [PATCH v5] MIPS: Expose prid and globalnumber to sysfs
- From: Jiaxun Yang <jiaxun.yang@xxxxxxxxxxx>
- Re: [PATCH v8 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [man-pages PATCH v3] statx.2, open.2: document STATX_DIOALIGN
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH v2 23/39] x86: Introduce userspace API for CET enabling
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 10/39] x86/mm: Introduce _PAGE_COW
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v8 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v8 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/5] treewide cleanup of random integer usage
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH v8 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v8 8/8] KVM: Enable and expose KVM_MEM_PRIVATE
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v1 0/5] treewide cleanup of random integer usage
- From: "Yann Droneaud" <ydroneaud@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v1 0/5] treewide cleanup of random integer usage
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 29/39] x86/cet/shstk: Support wrss for userspace
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 29/39] x86/cet/shstk: Support wrss for userspace
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 10/39] x86/mm: Introduce _PAGE_COW
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 10/39] x86/mm: Introduce _PAGE_COW
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 26/39] x86/cet/shstk: Introduce routines modifying shstk
- From: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
- Re: [PATCH v2 26/39] x86/cet/shstk: Introduce routines modifying shstk
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 07/39] x86/cet: Add user control-protection fault handler
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 07/39] x86/cet: Add user control-protection fault handler
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v8 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 10/39] x86/mm: Introduce _PAGE_COW
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH v2 24/39] x86/cet/shstk: Add user-mode shadow stack support
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v8 2/8] KVM: Extend the memslot to support fd-based private memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 08/39] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
- From: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
- Re: [PATCH v2 10/39] x86/mm: Introduce _PAGE_COW
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 08/39] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/39] Documentation/x86: Add CET description
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 07/39] x86/cet: Add user control-protection fault handler
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 01/39] Documentation/x86: Add CET description
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v2 01/39] Documentation/x86: Add CET description
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 26/39] x86/cet/shstk: Introduce routines modifying shstk
- From: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
- Re: [PATCH v2 18/39] mm: Add guard pages around a shadow stack.
- From: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
- Re: [PATCH v2 10/39] x86/mm: Introduce _PAGE_COW
- From: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
- Re: [PATCH v2 08/39] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
- From: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
- Re: [PATCH v2 07/39] x86/cet: Add user control-protection fault handler
- From: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
- Re: [PATCH v2 04/39] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
- Re: [PATCH v2 01/39] Documentation/x86: Add CET description
- From: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
- Re: [PATCH v2 33/39] x86/cpufeatures: Limit shadow stack to Intel CPUs
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 28/39] x86/cet/shstk: Introduce map_shadow_stack syscall
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [OPTIONAL/RFC v2 36/39] x86/fpu: Add helper for initing features
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 28/39] x86/cet/shstk: Introduce map_shadow_stack syscall
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 26/39] x86/cet/shstk: Introduce routines modifying shstk
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 25/39] x86/cet/shstk: Handle thread shadow stack
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 33/39] x86/cpufeatures: Limit shadow stack to Intel CPUs
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [PATCH v2 33/39] x86/cpufeatures: Limit shadow stack to Intel CPUs
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v2 33/39] x86/cpufeatures: Limit shadow stack to Intel CPUs
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 33/39] x86/cpufeatures: Limit shadow stack to Intel CPUs
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH v2 24/39] x86/cet/shstk: Add user-mode shadow stack support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 00/39] Shadowstacks for userspace
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [OPTIONAL/RFC v2 37/39] x86/cet: Add PTRACE interface for CET
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [OPTIONAL/RFC v2 39/39] x86: Add alt shadow stack support
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [OPTIONAL/RFC v2 39/39] x86: Add alt shadow stack support
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- [man-pages PATCH v3] statx.2, open.2: document STATX_DIOALIGN
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 24/39] x86/cet/shstk: Add user-mode shadow stack support
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 17/39] mm: Fixup places that call pte_mkwrite() directly
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 17/39] mm: Fixup places that call pte_mkwrite() directly
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 06/39] x86/fpu: Add helper for modifying xstate
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [OPTIONAL/RFC v2 39/39] x86: Add alt shadow stack support
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 33/39] x86/cpufeatures: Limit shadow stack to Intel CPUs
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- Re: [PATCH v8 8/8] KVM: Enable and expose KVM_MEM_PRIVATE
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 06/39] x86/fpu: Add helper for modifying xstate
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH v2 24/39] x86/cet/shstk: Add user-mode shadow stack support
- From: David Laight <David.Laight@xxxxxxxxxx>
- RE: [PATCH v2 00/39] Shadowstacks for userspace
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [OPTIONAL/RFC v2 37/39] x86/cet: Add PTRACE interface for CET
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 33/39] x86/cpufeatures: Limit shadow stack to Intel CPUs
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 29/39] x86/cet/shstk: Support wrss for userspace
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 00/39] Shadowstacks for userspace
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 33/39] x86/cpufeatures: Limit shadow stack to Intel CPUs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 29/39] x86/cet/shstk: Support wrss for userspace
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 22/39] mm: Don't allow write GUPs to shadow stack memory
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 30/39] x86: Expose thread features status in /proc/$PID/arch_status
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 06/39] x86/fpu: Add helper for modifying xstate
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 24/39] x86/cet/shstk: Add user-mode shadow stack support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 00/39] Shadowstacks for userspace
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [GIT PULL] STATX_DIOALIGN for 6.1
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 01/39] Documentation/x86: Add CET description
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v2 01/39] Documentation/x86: Add CET description
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH v2 17/39] mm: Fixup places that call pte_mkwrite() directly
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH v2 12/39] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH v2 19/39] mm/mmap: Add shadow stack pages to memory accounting
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 14/39] mm: Introduce VM_SHADOW_STACK for shadow stack memory
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 33/39] x86/cpufeatures: Limit shadow stack to Intel CPUs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 19/39] mm/mmap: Add shadow stack pages to memory accounting
- From: "Kirill A . Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [OPTIONAL/RFC v2 38/39] x86/cet/shstk: Add ARCH_CET_UNLOCK
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [OPTIONAL/RFC v2 37/39] x86/cet: Add PTRACE interface for CET
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 33/39] x86/cpufeatures: Limit shadow stack to Intel CPUs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 32/39] selftests/x86: Add shadow stack test
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 17/39] mm: Fixup places that call pte_mkwrite() directly
- From: "Kirill A . Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 16/39] x86/mm: Update maybe_mkwrite() for shadow stack
- From: "Kirill A . Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 12/39] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 12/39] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH v2 07/39] x86/cet: Add user control-protection fault handler
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [OPTIONAL/RFC v2 39/39] x86: Add alt shadow stack support
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v2 12/39] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH v2 12/39] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH v2 07/39] x86/cet: Add user control-protection fault handler
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 29/39] x86/cet/shstk: Support wrss for userspace
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v2 07/39] x86/cet: Add user control-protection fault handler
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v2 23/39] x86: Introduce userspace API for CET enabling
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 22/39] mm: Don't allow write GUPs to shadow stack memory
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v2 30/39] x86: Expose thread features status in /proc/$PID/arch_status
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH v2 31/39] x86/cet/shstk: Wire in CET interface
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 30/39] x86: Expose thread features status in /proc/$PID/arch_status
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 29/39] x86/cet/shstk: Support wrss for userspace
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 12/39] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 28/39] x86/cet/shstk: Introduce map_shadow_stack syscall
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 10/39] x86/mm: Introduce _PAGE_COW
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 10/39] x86/mm: Introduce _PAGE_COW
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 10/39] x86/mm: Introduce _PAGE_COW
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2 10/39] x86/mm: Introduce _PAGE_COW
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 27/39] x86/cet/shstk: Handle signals for shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 26/39] x86/cet/shstk: Introduce routines modifying shstk
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 07/39] x86/cet: Add user control-protection fault handler
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 25/39] x86/cet/shstk: Handle thread shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 06/39] x86/fpu: Add helper for modifying xstate
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 24/39] x86/cet/shstk: Add user-mode shadow stack support
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 02/39] x86/cet/shstk: Add Kconfig option for Shadow Stack
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 02/39] x86/cet/shstk: Add Kconfig option for Shadow Stack
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 02/39] x86/cet/shstk: Add Kconfig option for Shadow Stack
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 01/39] Documentation/x86: Add CET description
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 24/39] x86/cet/shstk: Add user-mode shadow stack support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 02/39] x86/cet/shstk: Add Kconfig option for Shadow Stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 01/39] Documentation/x86: Add CET description
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 01/39] Documentation/x86: Add CET description
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [OPTIONAL/RFC v2 36/39] x86/fpu: Add helper for initing features
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v2 23/39] x86: Introduce userspace API for CET enabling
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 12/39] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 22/39] mm: Don't allow write GUPs to shadow stack memory
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 00/39] Shadowstacks for userspace
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 19/39] mm/mmap: Add shadow stack pages to memory accounting
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 18/39] mm: Add guard pages around a shadow stack.
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 13/39] mm: Move VM_UFFD_MINOR_BIT from 37 to 38
- From: Peter Xu <peterx@xxxxxxxxxx>
- Re: [PATCH v2 17/39] mm: Fixup places that call pte_mkwrite() directly
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 16/39] x86/mm: Update maybe_mkwrite() for shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 15/39] x86/mm: Check Shadow Stack page fault errors
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 14/39] mm: Introduce VM_SHADOW_STACK for shadow stack memory
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 07/39] x86/cet: Add user control-protection fault handler
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 13/39] mm: Move VM_UFFD_MINOR_BIT from 37 to 38
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 12/39] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH v2 09/39] x86/mm: Move pmd_write(), pud_write() up in the file
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 07/39] x86/cet: Add user control-protection fault handler
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 12/39] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: "Kirill A . Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 06/39] x86/fpu: Add helper for modifying xstate
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 14/39] mm: Introduce VM_SHADOW_STACK for shadow stack memory
- From: "Kirill A . Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 05/39] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 04/39] x86/cpufeatures: Enable CET CR4 bit for shadow stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 03/39] x86/cpufeatures: Add CPU feature flags for shadow stacks
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 00/39] Shadowstacks for userspace
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2 02/39] x86/cet/shstk: Add Kconfig option for Shadow Stack
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 01/39] Documentation/x86: Add CET description
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 00/39] Shadowstacks for userspace
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 25/39] x86/cet/shstk: Handle thread shadow stack
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 01/39] Documentation/x86: Add CET description
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 10/39] x86/mm: Introduce _PAGE_COW
- From: "Kirill A . Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 08/39] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
- From: "Kirill A . Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 07/39] x86/cet: Add user control-protection fault handler
- From: "Kirill A . Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/39] x86/cet/shstk: Add Kconfig option for Shadow Stack
- From: "Kirill A . Shutemov" <kirill.shutemov@xxxxxxxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [PATCH v2 25/39] x86/cet/shstk: Handle thread shadow stack
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v8 1/8] mm/memfd: Introduce userspace inaccessible memfd
- From: Fuad Tabba <tabba@xxxxxxxxxx>
- [GIT PULL] STATX_DIOALIGN for 6.1
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v2 22/39] mm: Don't allow write GUPs to shadow stack memory
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v2 22/39] mm: Don't allow write GUPs to shadow stack memory
- From: Jann Horn <jannh@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Samba]
[Yosemite News]