Linux Arch
[Prev Page][Next Page]
- RE: [PATCH 03/14] nds32: fix access_ok() checks in get/put_user
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 11/14] sparc64: remove CONFIG_SET_FS support
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 10/14] uaccess: remove most CONFIG_SET_FS users
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 07/14] uaccess: generalize access_ok()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 03/14] nds32: fix access_ok() checks in get/put_user
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 05/14] uaccess: add generic __{get,put}_kernel_nofault
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 04/14] x86: use more conventional access_ok() definition
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 01/14] uaccess: fix integer overflow on access_ok()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [PATCH 14/14] uaccess: drop set_fs leftovers
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 12/14] sh: remove CONFIG_SET_FS support
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 13/14] ia64: remove CONFIG_SET_FS support
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 11/14] sparc64: remove CONFIG_SET_FS support
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 10/14] uaccess: remove most CONFIG_SET_FS users
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 09/14] m68k: drop custom __access_ok()
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 08/14] arm64: simplify access_ok()
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 05/14] uaccess: add generic __{get,put}_kernel_nofault
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 07/14] uaccess: generalize access_ok()
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 04/14] x86: use more conventional access_ok() definition
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 06/14] mips: use simpler access_ok()
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 03/14] nds32: fix access_ok() checks in get/put_user
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 02/14] sparc64: add __{get,put}_kernel_nocheck()
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 01/14] uaccess: fix integer overflow on access_ok()
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH 00/14] clean up asm/uaccess.h, kill set_fs for good
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH] microblaze: remove CONFIG_SET_FS
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH 26/35] x86/process: Change copy_thread() argument 'arg' to 'stack_size'
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v10 10/15] FG-KASLR: use a scripted approach to handle .text.* sections
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- Re: [PATCH v10 02/15] livepatch: avoid position-based search if `-z unique-symbol` is available
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- Re: [PATCH v10 02/15] livepatch: avoid position-based search if `-z unique-symbol` is available
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- Re: [PATCH v10 10/15] FG-KASLR: use a scripted approach to handle .text.* sections
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v10 05/15] x86: support asm function sections
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- Re: [PATCH v10 10/15] FG-KASLR: use a scripted approach to handle .text.* sections
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- Re: [PATCH v3 12/12] lkdtm: Add a test for function descriptors protection
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v3 08/12] asm-generic: Refactor dereference_[kernel]_function_descriptor()
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v3 04/12] powerpc: Prepare func_desc_t for refactorisation
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 23/30] um/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- Re: [PATCH 30/30] mm/mmap: Drop ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- Re: [PATCH 30/30] mm/mmap: Drop ARCH_HAS_VM_GET_PAGE_PROT
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] microblaze: remove CONFIG_SET_FS
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] microblaze: remove CONFIG_SET_FS
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 23/30] um/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 17/30] sh/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 24/30] microblaze/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 19/30] csky/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 25/30] nios2/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 07/30] mips/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 29/30] mm/mmap: Drop generic vm_get_page_prot()
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 08/30] m68k/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 20/30] extensa/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 18/30] arc/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 28/30] ia64/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 09/30] arm/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 22/30] openrisc/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 11/30] mm/mmap: Drop protection_map[]
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 03/30] mm/mmap: Add new config ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 06/30] sparc/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 16/30] alpha/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 27/30] nds32/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 01/30] mm/debug_vm_pgtable: Drop protection_map[] usage
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 02/30] mm/mmap: Clarify protection_map[] indices
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 10/30] x86/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 13/30] mm/mmap: Drop arch_vm_get_page_pgprot()
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 23/30] um/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 26/30] hexagon/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 12/30] mm/mmap: Drop arch_filter_pgprot()
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 04/30] powerpc/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 05/30] arm64/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 00/30] mm/mmap: Drop protection_map[] and platform's __SXXX/__PXXX requirements
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 15/30] riscv/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 30/30] mm/mmap: Drop ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 21/30] parisc/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- [PATCH 14/30] s390/mm: Enable ARCH_HAS_VM_GET_PAGE_PROT
- From: Anshuman Khandual <anshuman.khandual@xxxxxxx>
- Re: [PATCH 23/35] x86/fpu: Add helpers for modifying supervisor xstate
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 10/35] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 22/35] x86/mm: Prevent VM_WRITE shadow stacks
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 23/35] x86/fpu: Add helpers for modifying supervisor xstate
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 25/35] x86/cet/shstk: Add user-mode shadow stack support
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 25/35] x86/cet/shstk: Add user-mode shadow stack support
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 18/35] mm: Add guard pages around a shadow stack.
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 25/35] x86/cet/shstk: Add user-mode shadow stack support
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH 25/35] x86/cet/shstk: Add user-mode shadow stack support
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] microblaze: remove CONFIG_SET_FS
- From: Stafford Horne <shorne@xxxxxxxxx>
- Re: [PATCH 22/35] x86/mm: Prevent VM_WRITE shadow stacks
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] microblaze: remove CONFIG_SET_FS
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH] microblaze: remove CONFIG_SET_FS
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v10 02/15] livepatch: avoid position-based search if `-z unique-symbol` is available
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v10 02/15] livepatch: avoid position-based search if `-z unique-symbol` is available
- From: Fāng-ruì Sòng <maskray@xxxxxxxxxx>
- Re: [PATCH 18/35] mm: Add guard pages around a shadow stack.
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH] microblaze: remove CONFIG_SET_FS
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v10 02/15] livepatch: avoid position-based search if `-z unique-symbol` is available
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH] microblaze: remove CONFIG_SET_FS
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v10 05/15] x86: support asm function sections
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v10 10/15] FG-KASLR: use a scripted approach to handle .text.* sections
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- RE: [PATCH 18/35] mm: Add guard pages around a shadow stack.
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v3 04/12] powerpc: Prepare func_desc_t for refactorisation
- From: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: "avagin@xxxxxxxxx" <avagin@xxxxxxxxx>
- Re: [PATCH 10/35] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS
- From: "Wang, Zhi A" <zhi.a.wang@xxxxxxxxx>
- Re: [PATCH 0/6] Add more export headers to compile-test coverage
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 26/35] x86/process: Change copy_thread() argument 'arg' to 'stack_size'
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 10/35] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 12/12] lkdtm: Add a test for function descriptors protection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 11/12] lkdtm: Fix execute_[user]_location()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 08/12] asm-generic: Refactor dereference_[kernel]_function_descriptor()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 04/12] powerpc: Prepare func_desc_t for refactorisation
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 01/12] powerpc: Move and rename func_descr_t
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] microblaze: remove CONFIG_SET_FS
- From: Stafford Horne <shorne@xxxxxxxxx>
- Re: [PATCH 18/35] mm: Add guard pages around a shadow stack.
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 18/35] mm: Add guard pages around a shadow stack.
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 18/35] mm: Add guard pages around a shadow stack.
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- RE: [PATCH 20/35] mm: Update can_follow_write_pte() for shadow stack
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 18/35] mm: Add guard pages around a shadow stack.
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH 18/35] mm: Add guard pages around a shadow stack.
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 21/35] mm/mprotect: Exclude shadow stack from preserve_write
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH 00/35] Shadow stacks for userspace
- From: "Willgerodt, Felix" <felix.willgerodt@xxxxxxxxx>
- Re: [PATCH 1/6] signal.h: add linux/signal.h and asm/signal.h to UAPI compile-test coverage
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v3 08/12] asm-generic: Refactor dereference_[kernel]_function_descriptor()
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH 5/6] kexec.h: add linux/kexec.h to UAPI compile-test coverage
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 0/6] Add more export headers to compile-test coverage
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 1/6] signal.h: add linux/signal.h and asm/signal.h to UAPI compile-test coverage
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 3/6] android/binder.h: add linux/android/binder(fs).h to UAPI compile-test coverage
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 4/6] fsmap.h: add linux/fsmap.h to UAPI compile-test coverage
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 6/6] reiserfs_xattr.h: add linux/reiserfs_xattr.h to UAPI compile-test coverage
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 2/6] shmbuf.h: add asm/shmbuf.h to UAPI compile-test coverage
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 1/6] signal.h: add linux/signal.h and asm/signal.h to UAPI compile-test coverage
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 5/6] kexec.h: add linux/kexec.h to UAPI compile-test coverage
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 2/6] shmbuf.h: add asm/shmbuf.h to UAPI compile-test coverage
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 3/6] android/binder.h: add linux/android/binder(fs).h to UAPI compile-test coverage
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 6/6] reiserfs_xattr.h: add linux/reiserfs_xattr.h to UAPI compile-test coverage
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 4/6] fsmap.h: add linux/fsmap.h to UAPI compile-test coverage
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 0/6] Add more export headers to compile-test coverage
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH] microblaze: remove CONFIG_SET_FS
- From: Stafford Horne <shorne@xxxxxxxxx>
- Re: [PATCH 20/35] mm: Update can_follow_write_pte() for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 20/35] mm: Update can_follow_write_pte() for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 19/35] mm/mmap: Add shadow stack pages to memory accounting
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 18/35] mm: Add guard pages around a shadow stack.
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [no subject]
- [no subject]
- [no subject]
- [no subject]
- Re: [PATCH 14/35] mm: Introduce VM_SHADOW_STACK for shadow stack memory
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 17/35] mm: Fixup places that call pte_mkwrite() directly
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 16/35] x86/mm: Update maybe_mkwrite() for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 23/35] x86/fpu: Add helpers for modifying supervisor xstate
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- [PATCH v10 13/15] module: use a scripted approach for FG-KASLR
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- Re: [PATCH 15/35] x86/mm: Check Shadow Stack page fault errors
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v10 08/15] x86/tools: Add relative relocs for randomized functions
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v10 11/15] x86/boot: allow FG-KASLR to be selected
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v10 02/15] livepatch: avoid position-based search if `-z unique-symbol` is available
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v10 06/15] x86: decouple ORC table sorting into a separate file
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v10 07/15] Makefile: add config options and build scripts for FG-KASLR
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v10 10/15] FG-KASLR: use a scripted approach to handle .text.* sections
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v10 09/15] x86: Add support for function granular KASLR
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v10 03/15] kallsyms: randomize /proc/kallsyms output order
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v10 04/15] arch: introduce asm function sections
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v10 15/15] maintainers: add MAINTAINERS entry for FG-KASLR
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v10 12/15] module: add arch-indep FG-KASLR for randomizing function layout
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v10 05/15] x86: support asm function sections
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v10 01/15] modpost: fix removing numeric suffixes
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v10 00/15] Function Granular KASLR
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- [PATCH v10 14/15] Documentation: add documentation for FG-KASLR
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- Re: [PATCH 12/35] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 11/35] x86/mm: Update pte_modify for _PAGE_COW
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 10/35] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 0/5] Allocate module text and data separately
- From: Miroslav Benes <mbenes@xxxxxxx>
- Re: [PATCH] microblaze: remove CONFIG_SET_FS
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH] microblaze: remove CONFIG_SET_FS
- From: Michal Simek <michal.simek@xxxxxxxxxx>
- Re: [PATCH] microblaze: remove CONFIG_SET_FS
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH] microblaze: remove CONFIG_SET_FS
- From: Michal Simek <monstr@xxxxxxxxx>
- Re: [PATCH] microblaze: remove CONFIG_SET_FS
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] microblaze: remove CONFIG_SET_FS
- From: Michal Simek <monstr@xxxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [PATCH 03/35] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 07/35] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 06/35] x86/cet: Add control-protection fault handler
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 04/35] x86/cpufeatures: Introduce CPU setup and option parsing for CET
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 02/35] x86/cet/shstk: Add Kconfig option for Shadow Stack
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 03/35] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 05/35] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v3 4/6] modules: Add CONFIG_ARCH_WANTS_MODULES_DATA_IN_VMALLOC
- From: Michal Suchánek <msuchanek@xxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: Cyrill Gorcunov <gorcunov@xxxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH 23/35] x86/fpu: Add helpers for modifying supervisor xstate
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 02/35] x86/cet/shstk: Add Kconfig option for Shadow Stack
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 02/35] x86/cet/shstk: Add Kconfig option for Shadow Stack
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 26/35] x86/process: Change copy_thread() argument 'arg' to 'stack_size'
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH V5 00/21] riscv: compat: Add COMPAT mode support for rv64
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 09/35] x86/mm: Introduce _PAGE_COW
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 05/35] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 06/35] x86/cet: Add control-protection fault handler
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 07/35] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 04/35] x86/cpufeatures: Introduce CPU setup and option parsing for CET
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 03/35] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 02/35] x86/cet/shstk: Add Kconfig option for Shadow Stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [no subject]
- [no subject]
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH] ilog2: Force inlining of __ilog2_u32() and __ilog2_u64()
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: Adrian Reber <adrian@xxxxxxxx>
- Re: [PATCH v2 3/3] vstatus: Display an informational message when the VSTATUS character is pressed or TIOCSTAT ioctl is called.
- From: Jiri Slaby <jirislaby@xxxxxxxxxx>
- Re: [PATCH v2 5/5] powerpc: Select ARCH_WANTS_MODULES_DATA_IN_VMALLOC on book3s/32 and 8xx
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] vstatus: Display an informational message when the VSTATUS character is pressed or TIOCSTAT ioctl is called.
- From: Arseny Maslennikov <ar@xxxxxxxxx>
- Re: [PATCH v2 3/3] vstatus: Display an informational message when the VSTATUS character is pressed or TIOCSTAT ioctl is called.
- From: Arseny Maslennikov <ar@xxxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 3/3] vstatus: Display an informational message when the VSTATUS character is pressed or TIOCSTAT ioctl is called.
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/3] status: Add user space API definitions for VSTATUS, NOKERNINFO and TIOCSTAT
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v2 2/3] status: Add user space API definitions for VSTATUS, NOKERNINFO and TIOCSTAT
- From: Walt Drummond <walt@xxxxxxxxxxx>
- [PATCH v2 3/3] vstatus: Display an informational message when the VSTATUS character is pressed or TIOCSTAT ioctl is called.
- From: Walt Drummond <walt@xxxxxxxxxxx>
- [PATCH v2 1/3] vstatus: Allow the n_tty line dicipline to write to a user tty
- From: Walt Drummond <walt@xxxxxxxxxxx>
- [PATCH v2 0/3] vstatus: TTY status message request
- From: Walt Drummond <walt@xxxxxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- RE: [PATCH 00/35] Shadow stacks for userspace
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- RE: [PATCH 00/35] Shadow stacks for userspace
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 35/35] x86/cpufeatures: Limit shadow stack to Intel CPUs
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH v8 4/4] elf: Remove has_interp property from arch_parse_elf_property()
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v8 3/4] elf: Remove has_interp property from arch_adjust_elf_prot()
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v8 2/4] arm64: Enable BTI for main executable as well as the interpreter
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v8 1/4] elf: Allow architectures to parse properties on the main executable
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH V7 4/5] scsi: storvsc: Add Isolation VM support for storvsc driver
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH 33/35] selftests/x86: Add map_shadow_stack syscall test
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: "Edgecombe, Rick P" <rick.p.edgecombe@xxxxxxxxx>
- Re: [PATCH V7 4/5] scsi: storvsc: Add Isolation VM support for storvsc driver
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH 33/35] selftests/x86: Add map_shadow_stack syscall test
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 35/35] x86/cpufeatures: Limit shadow stack to Intel CPUs
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH 35/35] x86/cpufeatures: Limit shadow stack to Intel CPUs
- From: John Allen <john.allen@xxxxxxx>
- Re: [PATCH 00/35] Shadow stacks for userspace
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v3 4/6] modules: Add CONFIG_ARCH_WANTS_MODULES_DATA_IN_VMALLOC
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v2 5/5] powerpc: Select ARCH_WANTS_MODULES_DATA_IN_VMALLOC on book3s/32 and 8xx
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v3 4/6] modules: Add CONFIG_ARCH_WANTS_MODULES_DATA_IN_VMALLOC
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v3 3/6] modules: Introduce data_layout
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v2 5/5] powerpc: Select ARCH_WANTS_MODULES_DATA_IN_VMALLOC on book3s/32 and 8xx
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH V5 15/21] riscv: compat: Add hw capability check for elf
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH v3 0/6] Allocate module text and data separately
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v3 4/6] modules: Add CONFIG_ARCH_WANTS_MODULES_DATA_IN_VMALLOC
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v3 3/6] modules: Introduce data_layout
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v2 5/5] powerpc: Select ARCH_WANTS_MODULES_DATA_IN_VMALLOC on book3s/32 and 8xx
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH 6/7] modules: Add CONFIG_ARCH_WANTS_MODULES_DATA_IN_VMALLOC
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH] docs/memory-barriers.txt: volatile is not a barrier() substitute
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH V5 15/21] riscv: compat: Add hw capability check for elf
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH V5 06/21] asm-generic: compat: Cleanup duplicate definitions
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH] docs/memory-barriers.txt: volatile is not a barrier() substitute
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH V5 15/21] riscv: compat: Add hw capability check for elf
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH] docs/memory-barriers.txt: volatile is not a barrier() substitute
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH] docs/memory-barriers.txt: volatile is not a barrier() substitute
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v2] tools/memory-model: Explain syntactic and semantic dependencies
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH] tools/memory-model: Explain syntactic and semantic dependencies
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- [PATCH v2] tools/memory-model: Explain syntactic and semantic dependencies
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tools/memory-model: Explain syntactic and semantic dependencies
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tools/memory-model: Explain syntactic and semantic dependencies
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH v5 08/10] ARM: uaccess: add __{get,put}_kernel_nofault
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCH V5 21/21] KVM: compat: riscv: Prevent KVM_COMPAT from being selected
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH V5 21/21] KVM: compat: riscv: Prevent KVM_COMPAT from being selected
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- Re: [PATCH V5 21/21] KVM: compat: riscv: Prevent KVM_COMPAT from being selected
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH V5 21/21] KVM: compat: riscv: Prevent KVM_COMPAT from being selected
- From: Anup Patel <anup@xxxxxxxxxxxxxx>
- [PATCH V5 21/21] KVM: compat: riscv: Prevent KVM_COMPAT from being selected
- [PATCH V5 20/21] riscv: compat: Add COMPAT Kbuild skeletal support
- [PATCH V5 19/21] riscv: compat: ptrace: Add compat_arch_ptrace implement
- [PATCH V5 17/21] riscv: compat: vdso: Add setup additional pages implementation
- [PATCH V5 18/21] riscv: compat: signal: Add rt_frame implementation
- [PATCH V5 16/21] riscv: compat: vdso: Add rv32 VDSO base code implementation
- [PATCH V5 15/21] riscv: compat: Add hw capability check for elf
- [PATCH V5 14/21] riscv: compat: Add elf.h implementation
- [PATCH V5 13/21] riscv: compat: process: Add UXL_32 support in start_thread
- [PATCH V5 12/21] riscv: compat: syscall: Add entry.S implementation
- [PATCH V5 11/21] riscv: compat: syscall: Add compat_sys_call_table implementation
- [PATCH V5 10/21] riscv: compat: Re-implement TASK_SIZE for COMPAT_32BIT
- [PATCH V5 09/21] riscv: compat: Add basic compat data type implementation
- [PATCH V5 08/21] riscv: Fixup difference with defconfig
- [PATCH V5 07/21] syscalls: compat: Fix the missing part for __SYSCALL_COMPAT
- [PATCH V5 06/21] asm-generic: compat: Cleanup duplicate definitions
- [PATCH V5 05/21] fs: stat: compat: Add __ARCH_WANT_COMPAT_STAT
- [PATCH V5 04/21] kconfig: Add SYSVIPC_COMPAT for all architectures
- [PATCH V5 03/21] compat: consolidate the compat_flock{,64} definition
- [PATCH V5 02/21] uapi: always define F_GETLK64/F_SETLK64/F_SETLKW64 in fcntl.h
- [PATCH V5 01/21] uapi: simplify __ARCH_FLOCK{,64}_PAD a little
- [PATCH V5 00/21] riscv: compat: Add COMPAT mode support for rv64
- Re: [PATCH V4 16/17] riscv: compat: Add COMPAT Kbuild skeletal support
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH v3 0/8] KVM: x86: Hyper-V hypercall fix and cleanups
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH V4 16/17] riscv: compat: Add COMPAT Kbuild skeletal support
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: consolidate the compat fcntl definitions v2
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH V4 16/17] riscv: compat: Add COMPAT Kbuild skeletal support
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH V4 16/17] riscv: compat: Add COMPAT Kbuild skeletal support
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] docs/memory-barriers.txt: volatile is not a barrier() substitute
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH V4 16/17] riscv: compat: Add COMPAT Kbuild skeletal support
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH V4 16/17] riscv: compat: Add COMPAT Kbuild skeletal support
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 1/5] uapi: remove the unused HAVE_ARCH_STRUCT_FLOCK64 define
- From: Christoph Hellwig <hch@xxxxxx>
- Re: consolidate the compat fcntl definitions v2
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH] docs/memory-barriers.txt: volatile is not a barrier() substitute
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 4/5] uapi: always define F_GETLK64/F_SETLK64/F_SETLKW64 in fcntl.h
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH 4/5] uapi: always define F_GETLK64/F_SETLK64/F_SETLKW64 in fcntl.h
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH] tools/memory-model: Explain syntactic and semantic dependencies
- From: Akira Yokosawa <akiyks@xxxxxxxxx>
- Re: [PATCH 1/5] uapi: remove the unused HAVE_ARCH_STRUCT_FLOCK64 define
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: consolidate the compat fcntl definitions v2
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH] docs/memory-barriers.txt: volatile is not a barrier() substitute
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] docs/memory-barriers.txt: volatile is not a barrier() substitute
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: consolidate the compat fcntl definitions v2
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 34/35] x86/cet/shstk: Support wrss for userspace
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH 34/35] x86/cet/shstk: Support wrss for userspace
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH V4 03/17] asm-generic: compat: Cleanup duplicate definitions
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH V4 16/17] riscv: compat: Add COMPAT Kbuild skeletal support
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH 4/5] uapi: always define F_GETLK64/F_SETLK64/F_SETLKW64 in fcntl.h
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH 2/5] uapi: simplify __ARCH_FLOCK{,64}_PAD a little
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH V4 05/17] riscv: Fixup difference with defconfig
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH V4 05/17] riscv: Fixup difference with defconfig
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH V4 05/17] riscv: Fixup difference with defconfig
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH V4 16/17] riscv: compat: Add COMPAT Kbuild skeletal support
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH V4 05/17] riscv: Fixup difference with defconfig
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH V4 04/17] syscalls: compat: Fix the missing part for __SYSCALL_COMPAT
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH V4 03/17] asm-generic: compat: Cleanup duplicate definitions
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH V4 02/17] fs: stat: compat: Add __ARCH_WANT_COMPAT_STAT
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH V4 01/17] kconfig: Add SYSVIPC_COMPAT for all architectures
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 1/5] uapi: remove the unused HAVE_ARCH_STRUCT_FLOCK64 define
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH 34/35] x86/cet/shstk: Support wrss for userspace
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- [PATCH 2/5] uapi: simplify __ARCH_FLOCK{,64}_PAD a little
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 5/5] compat: consolidate the compat_flock{,64} definition
- From: Christoph Hellwig <hch@xxxxxx>
- consolidate the compat fcntl definitions v2
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 3/5] uapi: merge the 32-bit mips struct flock into the generic one
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 4/5] uapi: always define F_GETLK64/F_SETLK64/F_SETLKW64 in fcntl.h
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 1/5] uapi: remove the unused HAVE_ARCH_STRUCT_FLOCK64 define
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 28/35] x86/cet/shstk: Handle thread shadow stack
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 24/35] mm: Re-introduce vm_flags to do_mmap()
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 27/35] x86/fpu: Add unsafe xsave buffer helpers
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 35/35] x86/cpufeatures: Limit shadow stack to Intel CPUs
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 32/35] x86/cet/shstk: Introduce map_shadow_stack syscall
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 34/35] x86/cet/shstk: Support wrss for userspace
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 26/35] x86/process: Change copy_thread() argument 'arg' to 'stack_size'
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 33/35] selftests/x86: Add map_shadow_stack syscall test
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 25/35] x86/cet/shstk: Add user-mode shadow stack support
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 23/35] x86/fpu: Add helpers for modifying supervisor xstate
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 30/35] x86/cet/shstk: Handle signals for shadow stack
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 31/35] x86/cet/shstk: Add arch_prctl elf feature functions
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 29/35] x86/cet/shstk: Introduce shadow stack token setup/verify routines
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 21/35] mm/mprotect: Exclude shadow stack from preserve_write
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 20/35] mm: Update can_follow_write_pte() for shadow stack
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 22/35] x86/mm: Prevent VM_WRITE shadow stacks
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 19/35] mm/mmap: Add shadow stack pages to memory accounting
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 18/35] mm: Add guard pages around a shadow stack.
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 17/35] mm: Fixup places that call pte_mkwrite() directly
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 16/35] x86/mm: Update maybe_mkwrite() for shadow stack
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 15/35] x86/mm: Check Shadow Stack page fault errors
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 06/35] x86/cet: Add control-protection fault handler
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 10/35] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 09/35] x86/mm: Introduce _PAGE_COW
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 11/35] x86/mm: Update pte_modify for _PAGE_COW
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 12/35] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 08/35] x86/mm: Move pmd_write(), pud_write() up in the file
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 07/35] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 13/35] mm: Move VM_UFFD_MINOR_BIT from 37 to 38
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 05/35] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 14/35] mm: Introduce VM_SHADOW_STACK for shadow stack memory
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 04/35] x86/cpufeatures: Introduce CPU setup and option parsing for CET
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 03/35] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 02/35] x86/cet/shstk: Add Kconfig option for Shadow Stack
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 01/35] Documentation/x86: Add CET description
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- [PATCH 00/35] Shadow stacks for userspace
- From: Rick Edgecombe <rick.p.edgecombe@xxxxxxxxx>
- Re: [RFC 12/32] iio: adc: Kconfig: add HAS_IOPORT dependencies
- From: Jonathan Cameron <jic23@xxxxxxxxxx>
- Re: [PATCH V4 08/17] riscv: compat: syscall: Add compat_sys_call_table implementation
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH V4 06/17] riscv: compat: Add basic compat date type implementation
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH V4 08/17] riscv: compat: syscall: Add compat_sys_call_table implementation
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH V4 08/17] riscv: compat: syscall: Add compat_sys_call_table implementation
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH V4 06/17] riscv: compat: Add basic compat date type implementation
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH V4 08/17] riscv: compat: syscall: Add compat_sys_call_table implementation
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH V4 06/17] riscv: compat: Add basic compat date type implementation
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH V4 03/17] asm-generic: compat: Cleanup duplicate definitions
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v3 6/6] powerpc: Select ARCH_WANTS_MODULES_DATA_IN_VMALLOC on book3s/32 and 8xx
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3 5/6] modules: Remove module_addr_min and module_addr_max
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3 4/6] modules: Add CONFIG_ARCH_WANTS_MODULES_DATA_IN_VMALLOC
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3 3/6] modules: Introduce data_layout
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3 2/6] modules: Prepare for handling several RB trees
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3 1/6] modules: Always have struct mod_tree_root
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v3 0/6] Allocate module text and data separately
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 0/3] status: TTY status message request
- From: Walt Drummond <walt@xxxxxxxxxxx>
- [PATCH V4 15/17] riscv: compat: ptrace: Add compat_arch_ptrace implement
- [PATCH V4 17/17] KVM: compat: riscv: Prevent KVM_COMPAT from being selected
- [PATCH V4 16/17] riscv: compat: Add COMPAT Kbuild skeletal support
- [PATCH V4 14/17] riscv: compat: signal: Add rt_frame implementation
- [PATCH V4 13/17] riscv: compat: vdso: Add setup additional pages implementation
- [PATCH V4 12/17] riscv: compat: vdso: Add rv32 VDSO base code implementation
- [PATCH V4 08/17] riscv: compat: syscall: Add compat_sys_call_table implementation
- [PATCH V4 09/17] riscv: compat: syscall: Add entry.S implementation
- [PATCH V4 10/17] riscv: compat: process: Add UXL_32 support in start_thread
- [PATCH V4 11/17] riscv: compat: Add elf.h implementation
- [PATCH V4 07/17] riscv: compat: Re-implement TASK_SIZE for COMPAT_32BIT
- [PATCH V4 06/17] riscv: compat: Add basic compat date type implementation
- [PATCH V4 05/17] riscv: Fixup difference with defconfig
- [PATCH V4 04/17] syscalls: compat: Fix the missing part for __SYSCALL_COMPAT
- [PATCH V4 03/17] asm-generic: compat: Cleanup duplicate definitions
- [PATCH V4 02/17] fs: stat: compat: Add __ARCH_WANT_COMPAT_STAT
- [PATCH V4 01/17] kconfig: Add SYSVIPC_COMPAT for all architectures
- [PATCH V4 00/17] riscv: compat: Add COMPAT mode support for rv64
- [PATCH v8 1/5] powercap/drivers/dtpm: Convert the init table section to a simple array
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [PATCH v2 4/5] modules: Add CONFIG_ARCH_WANTS_MODULES_DATA_IN_VMALLOC
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- [PATCH] tools/memory-model: Explain syntactic and semantic dependencies
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] tools/memory-model: Clarify syntactic and semantic dependencies
- From: Paul Heidekrüger <paul.heidekrueger@xxxxxxxxx>
- Re: [PATCH 6/7] modules: Add CONFIG_ARCH_WANTS_MODULES_DATA_IN_VMALLOC
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH] tools/memory-model: Clarify syntactic and semantic dependencies
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/7] modules: Add CONFIG_ARCH_WANTS_MODULES_DATA_IN_VMALLOC
- From: Miroslav Benes <mbenes@xxxxxxx>
- Re: [PATCH v7 0/4] arm64: Enable BTI for the executable as well as the interpreter
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v7 0/4] arm64: Enable BTI for the executable as well as the interpreter
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 1/7] modules: Refactor within_module_core() and within_module_init()
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 1/7] modules: Refactor within_module_core() and within_module_init()
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v2 5/5] powerpc: Select ARCH_WANTS_MODULES_DATA_IN_VMALLOC on book3s/32 and 8xx
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v2 4/5] modules: Add CONFIG_ARCH_WANTS_MODULES_DATA_IN_VMALLOC
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v2 3/5] modules: Introduce data_layout
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v2 2/5] modules: Prepare for handling several RB trees
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v2 1/5] modules: Always have struct mod_tree_root
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH v2 0/5] Allocate module text and data separately
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH] tools/memory-model: Clarify syntactic and semantic dependencies
- From: Paul Heidekrüger <paul.heidekrueger@xxxxxxxxx>
- Re: [PATCH 1/7] modules: Refactor within_module_core() and within_module_init()
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH 1/8] signal: Make SIGKILL during coredumps an explicit special case
- From: Olivier Langlois <olivier@xxxxxxxxxxxxxx>
- Re: [PATCH v9 05/15] x86: support ASM function sections
- From: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx>
- Re: [PATCH 0/3] status: TTY status message request
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/7] modules: Add CONFIG_ARCH_WANTS_MODULES_DATA_IN_VMALLOC
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 0/7] Allocate module text and data separately
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 6/7] modules: Add CONFIG_ARCH_WANTS_MODULES_DATA_IN_VMALLOC
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH] tools/memory-model: Clarify syntactic and semantic dependencies
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/7] Allocate module text and data separately
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH] tools/memory-model: Clarify syntactic and semantic dependencies
- From: Paul Heidekrüger <paul.heidekrueger@xxxxxxxxx>
- [PATCH v7 1/5] powercap/drivers/dtpm: Convert the init table section to a simple array
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [PATCH 6/7] modules: Add CONFIG_ARCH_WANTS_MODULES_DATA_IN_VMALLOC
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 6/7] modules: Add CONFIG_ARCH_WANTS_MODULES_DATA_IN_VMALLOC
- From: Doug Anderson <dianders@xxxxxxxxxxxx>
- Re: [PATCH] Revert "Makefile: Do not quote value for CONFIG_CC_IMPLICIT_FALLTHROUGH"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] Revert "Makefile: Do not quote value for CONFIG_CC_IMPLICIT_FALLTHROUGH"
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH] Revert "Makefile: Do not quote value for CONFIG_CC_IMPLICIT_FALLTHROUGH"
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH v8 4/4] elf: Remove has_interp property from arch_parse_elf_property()
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v8 3/4] elf: Remove has_interp property from arch_adjust_elf_prot()
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v8 2/4] arm64: Enable BTI for main executable as well as the interpreter
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v8 1/4] elf: Allow architectures to parse properties on the main executable
- From: Mark Brown <broonie@xxxxxxxxxx>
- [PATCH v8 0/4] arm64: Enable BTI for the executable as well as the interpreter
- From: Mark Brown <broonie@xxxxxxxxxx>
- Re: [PATCH 1/7] modules: Refactor within_module_core() and within_module_init()
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH 1/7] modules: Refactor within_module_core() and within_module_init()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 7/7] powerpc: Select ARCH_WANTS_MODULES_DATA_IN_VMALLOC on book3s/32 and 8xx
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH 7/7] powerpc: Select ARCH_WANTS_MODULES_DATA_IN_VMALLOC on book3s/32 and 8xx
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH 6/7] modules: Add CONFIG_ARCH_WANTS_MODULES_DATA_IN_VMALLOC
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH 5/7] modules: Introduce data_layout
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH 4/7] modules: Prepare for handling several RB trees
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH 3/7] modules: Always have struct mod_tree_root
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH 2/7] modules: Add within_module_text() macro
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH 1/7] modules: Refactor within_module_core() and within_module_init()
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- [PATCH 0/7] Allocate module text and data separately
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [ANNOUNCE] "Fast Kernel Headers" Tree -v2
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v9 05/15] x86: support ASM function sections
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] asm-generic: Add missing brackets for io_stop_wc macro
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v3 00/13] Introduce sv48 support without relocatable kernel
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- Re: [PATCH v3 00/13] Introduce sv48 support without relocatable kernel
- From: Alexandre Ghiti <alexandre.ghiti@xxxxxxxxxxxxx>
- [PATCH] Revert "Makefile: Do not quote value for CONFIG_CC_IMPLICIT_FALLTHROUGH"
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH v3 00/13] Introduce sv48 support without relocatable kernel
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH v3 11/12] lkdtm: Fix execute_[user]_location()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 11/12] lkdtm: Fix execute_[user]_location()
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [ANNOUNCE] "Fast Kernel Headers" Tree -v2
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [ANNOUNCE] "Fast Kernel Headers" Tree -v2
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v6 1/5] powercap/drivers/dtpm: Convert the init table section to a simple array
- From: Ulf Hansson <ulf.hansson@xxxxxxxxxx>
- [PATCH v6 1/5] powercap/drivers/dtpm: Convert the init table section to a simple array
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [PATCH 1/8] signal: Make SIGKILL during coredumps an explicit special case
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- Re: [PATCH 1/8] signal: Make SIGKILL during coredumps an explicit special case
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH 1/8] signal: Make SIGKILL during coredumps an explicit special case
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- Re: [PATCH v7 0/4] arm64: Enable BTI for the executable as well as the interpreter
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v7 0/4] arm64: Enable BTI for the executable as well as the interpreter
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v7 0/4] arm64: Enable BTI for the executable as well as the interpreter
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH 2/3] vstatus: Add user space API definitions for VSTATUS, NOKERNINFO and TIOCSTAT
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH 2/3] vstatus: Add user space API definitions for VSTATUS, NOKERNINFO and TIOCSTAT
- From: Walt Drummond <walt@xxxxxxxxxxx>
- [PATCH 0/3] status: TTY status message request
- From: Walt Drummond <walt@xxxxxxxxxxx>
- Re: io_uring truncating coredumps
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 04/15] arch: introduce ASM function sections
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v9 04/15] arch: introduce ASM function sections
- From: Nicolas Pitre <nico@xxxxxxxxxxx>
- Re: [PATCH v9 04/15] arch: introduce ASM function sections
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v7 0/4] arm64: Enable BTI for the executable as well as the interpreter
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- io_uring truncating coredumps
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH v7 0/4] arm64: Enable BTI for the executable as well as the interpreter
- From: Adhemerval Zanella <adhemerval.zanella@xxxxxxxxxx>
- Re: [PATCH v7 0/4] arm64: Enable BTI for the executable as well as the interpreter
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 1/8] signal: Make SIGKILL during coredumps an explicit special case
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH] microblaze: remove CONFIG_SET_FS
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH 03/10] exit: Move oops specific logic from do_exit into make_task_dead
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 03/10] exit: Move oops specific logic from do_exit into make_task_dead
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 03/10] exit: Move oops specific logic from do_exit into make_task_dead
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH 03/10] exit: Move oops specific logic from do_exit into make_task_dead
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [RFC PATCH 00/13] x86 User Interrupts support
- From: Chrisma Pakha <cpakha@xxxxxxxxxxxxxx>
- Re: [PATCH 1/8] signal: Make SIGKILL during coredumps an explicit special case
- From: Olivier Langlois <olivier@xxxxxxxxxxxxxx>
- Re: [PATCH 0000/2297] [ANNOUNCE, RFC] "Fast Kernel Headers" Tree -v1: Eliminate the Linux kernel's "Dependency Hell"
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [PATCH 1/8] signal: Make SIGKILL during coredumps an explicit special case
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH v3 1/3] x86: Implement arch_prctl(ARCH_VSYSCALL_CONTROL) to disable vsyscall
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v3 2/3] selftests/x86/Makefile: Support per-target $(LIBS) configuration
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] asm-generic: Add missing brackets for io_stop_wc macro
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH] asm-generic: Add missing brackets for io_stop_wc macro
- From: Xiongfeng Wang <wangxiongfeng2@xxxxxxxxxx>
- Re: [PATCH v3 2/3] selftests/x86/Makefile: Support per-target $(LIBS) configuration
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH v3 2/3] selftests/x86/Makefile: Support per-target $(LIBS) configuration
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v3 3/3] x86: Add test for arch_prctl(ARCH_VSYSCALL_CONTROL)
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v3 1/3] x86: Implement arch_prctl(ARCH_VSYSCALL_CONTROL) to disable vsyscall
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v3 2/3] selftests/x86/Makefile: Support per-target $(LIBS) configuration
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v3 3/3] x86: Add test for arch_prctl(ARCH_VSYSCALL_CONTROL)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v3 1/3] x86: Implement arch_prctl(ARCH_VSYSCALL_CONTROL) to disable vsyscall
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v5 08/10] ARM: uaccess: add __{get,put}_kernel_nofault
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [ANNOUNCE] "Fast Kernel Headers" Tree -v2
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v5 08/10] ARM: uaccess: add __{get,put}_kernel_nofault
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [ANNOUNCE] "Fast Kernel Headers" Tree -v2
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [ANNOUNCE] "Fast Kernel Headers" Tree -v2
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [ANNOUNCE] "Fast Kernel Headers" Tree -v2
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v5 08/10] ARM: uaccess: add __{get,put}_kernel_nofault
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 08/10] ARM: uaccess: add __{get,put}_kernel_nofault
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCH 09/23] membarrier: Fix incorrect barrier positions during exec and kthread_use_mm()
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH 09/23] membarrier: Fix incorrect barrier positions during exec and kthread_use_mm()
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH 08/23] membarrier: Remove redundant clear of mm->membarrier_state in exec_mmap()
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH 07/23] membarrier: Rewrite sync_core_before_usermode() and improve documentation
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH 4/5] uapi: always define F_GETLK64/F_SETLK64/F_SETLKW64 in fcntl.h
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 06/23] powerpc/membarrier: Remove special barrier on mm switch
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH 05/23] membarrier, kthread: Use _ONCE accessors for task->mm
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH 04/23] membarrier: Make the post-switch-mm barrier explicit
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH 02/23] x86/mm: Handle unlazying membarrier core sync in the arch code
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH 01/23] membarrier: Document why membarrier() works
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH 4/5] uapi: always define F_GETLK64/F_SETLK64/F_SETLKW64 in fcntl.h
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 4/5] uapi: always define F_GETLK64/F_SETLK64/F_SETLKW64 in fcntl.h
- From: Jeff Layton <jlayton@xxxxxxxxxx>
- Re: consolidate the compat fcntl definitions
- From: Sergey Shtylyov <s.shtylyov@xxxxxx>
- Re: [PATCH 4/5] uapi: always define F_GETLK64/F_SETLK64/F_SETLKW64 in fcntl.h
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall
- From: Michael Schmitz <schmitzmic@xxxxxxxxx>
- Re: [PATCH 4/5] uapi: always define F_GETLK64/F_SETLK64/F_SETLKW64 in fcntl.h
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall
- From: Michael Schmitz <schmitzmic@xxxxxxxxx>
- Re: [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall
- From: Finn Thain <fthain@xxxxxxxxxxxxxx>
- Re: [PATCH 4/5] uapi: always define F_GETLK64/F_SETLK64/F_SETLKW64 in fcntl.h
- From: Guo Ren <guoren@xxxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall
- From: Michael Schmitz <schmitzmic@xxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall
- From: Finn Thain <fthain@xxxxxxxxxxxxxx>
- Re: [PATCH 1/8] signal: Make SIGKILL during coredumps an explicit special case
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/8] signal: Make SIGKILL during coredumps an explicit special case
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [GIT PULL] LKMM changes for v5.17
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 1/8] signal: Make SIGKILL during coredumps an explicit special case
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH 1/8] signal: Make SIGKILL during coredumps an explicit special case
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- RE: [ANNOUNCE] "Fast Kernel Headers" Tree -v2
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [ANNOUNCE] "Fast Kernel Headers" Tree -v2
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: consolidate the compat fcntl definitions
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH 4/5] uapi: always define F_GETLK64/F_SETLK64/F_SETLKW64 in fcntl.h
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Will Deacon <will@xxxxxxxxxx>
- RE: [PATCH 5/5] compat: consolidate the compat_flock{,64} definition
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 1/8] signal: Make SIGKILL during coredumps an explicit special case
- From: Dmitry Osipenko <digetx@xxxxxxxxx>
- [PATCH 5/5] compat: consolidate the compat_flock{,64} definition
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 4/5] uapi: always define F_GETLK64/F_SETLK64/F_SETLKW64 in fcntl.h
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 3/5] uapi: merge the 32-bit mips struct flock into the generic one
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 2/5] uapi: simplify __ARCH_FLOCK{,64}_PAD a little
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 1/5] uapi: remove the unused HAVE_ARCH_STRUCT_FLOCK64 define
- From: Christoph Hellwig <hch@xxxxxx>
- consolidate the compat fcntl definitions
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall
- From: Michael Schmitz <schmitzmic@xxxxxxxxx>
- Re: [PATCH 1/8] signal: Make SIGKILL during coredumps an explicit special case
- From: Olivier Langlois <olivier@xxxxxxxxxxxxxx>
- Re: [PATCH 11/23] sched/scs: Initialize shadow stack on idle thread bringup, not shutdown
- From: Sami Tolvanen <samitolvanen@xxxxxxxxxx>
- Re: [ANNOUNCE] "Fast Kernel Headers" Tree -v2
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0000/2297] [ANNOUNCE, RFC] "Fast Kernel Headers" Tree -v1: Eliminate the Linux kernel's "Dependency Hell"
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH 0000/2297] [ANNOUNCE, RFC] "Fast Kernel Headers" Tree -v1: Eliminate the Linux kernel's "Dependency Hell"
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- [GIT PULL] LKMM changes for v5.17
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [GIT PULL] asm-generic: cleanups for 5.17
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH 06/10] exit: Implement kthread_exit
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH 06/10] exit: Implement kthread_exit
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH v5 1/6] powercap/drivers/dtpm: Move dtpm table from init to data section
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [PATCH 19/23] x86/efi: Make efi_enter/leave_mm use the temporary_mm machinery
- From: Ard Biesheuvel <ardb@xxxxxxxxxx>
- Re: [PATCH 5/5] kbuild: add cmd_file_size
- From: Nicolas Schier <n.schier@xxxxxx>
- Re: [PATCH 4/5] arch: decompressor: remove useless vmlinux.bin.all-y
- From: Nicolas Schier <n.schier@xxxxxx>
- Re: [PATCH 3/5] kbuild: rename cmd_{bzip2,lzma,lzo,lz4,xzkern,zstd22}
- From: Nicolas Schier <n.schier@xxxxxx>
- Re: [PATCH 2/5] kbuild: drop $(size_append) from cmd_zstd
- From: Nicolas Schier <n.schier@xxxxxx>
- Re: [PATCH 1/5] sh: rename suffix-y to suffix_y
- From: Nicolas Schier <n.schier@xxxxxx>
- Re: [PATCH 0000/2297] [ANNOUNCE, RFC] "Fast Kernel Headers" Tree -v1: Eliminate the Linux kernel's "Dependency Hell"
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC 01/32] Kconfig: introduce and depend on LEGACY_PCI
- From: Niklas Schnelle <schnelle@xxxxxxxxxxxxx>
- Re: [PATCH 06/23] powerpc/membarrier: Remove special barrier on mm switch
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v3 12/13] riscv: Initialize thread pointer before calling C functions
- From: Alexandre ghiti <alex@xxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Rik van Riel <riel@xxxxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Rik van Riel <riel@xxxxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Rik van Riel <riel@xxxxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 1/5] sh: rename suffix-y to suffix_y
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 5/5] kbuild: add cmd_file_size
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 3/5] kbuild: rename cmd_{bzip2,lzma,lzo,lz4,xzkern,zstd22}
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 4/5] arch: decompressor: remove useless vmlinux.bin.all-y
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- [PATCH 2/5] kbuild: drop $(size_append) from cmd_zstd
- From: Masahiro Yamada <masahiroy@xxxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Nadav Amit <nadav.amit@xxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH 06/10] exit: Implement kthread_exit
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 06/10] exit: Implement kthread_exit
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: "Andy Lutomirski" <luto@xxxxxxxxxx>
- Re: [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/8] signal: Make SIGKILL during coredumps an explicit special case
- From: Heiko Carstens <hca@xxxxxxxxxxxxx>
- Re: [PATCH 06/10] exit: Implement kthread_exit
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH 09/10] kthread: Ensure struct kthread is present for all kthreads
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 2/2] signal: Make coredump handling explicit in complete_signal
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 1/2] signal: Have prepare_signal detect coredumps using signal->core_state
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH 1/8] signal: Make SIGKILL during coredumps an explicit special case
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 23/23] x86/mm: Opt in to IRQs-off activate_mm()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 21/23] x86/mm: Use unlazy_mm_irqs_off() in TLB flush IPIs
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 22/23] x86/mm: Optimize for_each_possible_lazymm_cpu()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 20/23] x86/mm: Remove leave_mm() in favor of unlazy_mm_irqs_off()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 18/23] x86/mm: Allow temporary mms when IRQs are on
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 19/23] x86/efi: Make efi_enter/leave_mm use the temporary_mm machinery
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 17/23] x86/mm: Make use/unuse_temporary_mm() non-static
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 16/23] sched: Use lightweight hazard pointers to grab lazy mms
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 15/23] kthread: Switch to __change_current_mm()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 13/23] exec: Remove unnecessary vmacache_seqnum clear in exec_mmap()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 14/23] sched, exec: Factor current mm changes out from exec
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 11/23] sched/scs: Initialize shadow stack on idle thread bringup, not shutdown
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 10/23] x86/events, x86/insn-eval: Remove incorrect active_mm references
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 08/23] membarrier: Remove redundant clear of mm->membarrier_state in exec_mmap()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 12/23] Rework "sched/core: Fix illegal RCU from offline CPUs"
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 09/23] membarrier: Fix incorrect barrier positions during exec and kthread_use_mm()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 07/23] membarrier: Rewrite sync_core_before_usermode() and improve documentation
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 05/23] membarrier, kthread: Use _ONCE accessors for task->mm
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 06/23] powerpc/membarrier: Remove special barrier on mm switch
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 03/23] membarrier: Remove membarrier_arch_switch_mm() prototype in core code
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 04/23] membarrier: Make the post-switch-mm barrier explicit
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 02/23] x86/mm: Handle unlazying membarrier core sync in the arch code
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 01/23] membarrier: Document why membarrier() works
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH 00/23] mm, sched: Rework lazy mm handling
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [ANNOUNCE] "Fast Kernel Headers" Tree -v2
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 01/17] exit: Remove profile_task_exit & profile_munmap
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH 0000/2297] [ANNOUNCE, RFC] "Fast Kernel Headers" Tree -v1: Eliminate the Linux kernel's "Dependency Hell"
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [RFC PATCH 8/8] signals: Support BSD VSTATUS, KERNINFO and SIGINFO
- From: Arseny Maslennikov <ar@xxxxxxxxx>
- Re: [PATCH 0000/2297] [ANNOUNCE, RFC] "Fast Kernel Headers" Tree -v1: Eliminate the Linux kernel's "Dependency Hell"
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 0000/2297] [ANNOUNCE, RFC] "Fast Kernel Headers" Tree -v1: Eliminate the Linux kernel's "Dependency Hell"
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 0000/2297] [ANNOUNCE, RFC] "Fast Kernel Headers" Tree -v1: Eliminate the Linux kernel's "Dependency Hell"
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH] x86/bitops: Remove unused __sw_hweight64() assembly implementation
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 0000/2297] [ANNOUNCE, RFC] "Fast Kernel Headers" Tree -v1: Eliminate the Linux kernel's "Dependency Hell"
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH] FIX: headers/deps: uapi/headers: Create usr/include/uapi symbolic link
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH] headers/deps: Add header dependencies to .c files: <linux/ptrace_api.h>
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [RFC PATCH 8/8] signals: Support BSD VSTATUS, KERNINFO and SIGINFO
- From: Arseny Maslennikov <ar@xxxxxxxxx>
[Index of Archives]
[Kernel Announce]
[IETF Annouce]
[Netdev]
[Netfilter]
[Bugtraq]