Linux Arch
[Prev Page][Next Page]
- Re: [RFC PATCH v4 4/9] mm/mmap: Add IBT bitmap size to address space limit check
- From: Eugene Syromiatnikov <esyr@xxxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH v4 3/9] x86/cet/ibt: Add IBT legacy code bitmap allocation function
- From: Eugene Syromiatnikov <esyr@xxxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v4 2/9] x86/cet/ibt: User-mode indirect branch tracking support
- From: Eugene Syromiatnikov <esyr@xxxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v4 26/27] x86/cet/shstk: Add arch_prctl functions for Shadow Stack
- From: Eugene Syromiatnikov <esyr@xxxxxxxxxx>
- [PATCH] asm-generic/pgtable-nop?d.h: define folded with a value for use in C
- From: James Morse <james.morse@xxxxxxx>
- Re: [PATCH v7 7/8] arm64: update Documentation/arm64/tagged-pointers.txt
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 12/18] arch/tlb: Clean up simple architectures
- From: Vineet Gupta <vineet.gupta1@xxxxxxxxxxxx>
- Re: [RFC PATCH v4 24/27] mm/mmap: Create a guard area between VMAs
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC PATCH v4 20/27] x86/cet/shstk: Signal handling for shadow stack
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RFC PATCH v4 24/27] mm/mmap: Create a guard area between VMAs
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [RFC PATCH v4 24/27] mm/mmap: Create a guard area between VMAs
- From: Eugene Syromiatnikov <esyr@xxxxxxxxxx>
- Re: [RFC PATCH v4 06/27] x86/cet: Control protection exception handler
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [RFC PATCH v4 24/27] mm/mmap: Create a guard area between VMAs
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC PATCH v4 09/27] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [RFC PATCH v4 24/27] mm/mmap: Create a guard area between VMAs
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [RFC PATCH v4 18/27] x86/cet/shstk: User-mode shadow stack support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [RFC PATCH v4 18/27] x86/cet/shstk: User-mode shadow stack support
- From: Eugene Syromiatnikov <esyr@xxxxxxxxxx>
- Re: [RFC PATCH v4 20/27] x86/cet/shstk: Signal handling for shadow stack
- From: Eugene Syromiatnikov <esyr@xxxxxxxxxx>
- Re: [RFC PATCH v4 09/27] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
- From: Dave Hansen <dave.hansen@xxxxxxxxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v4 09/27] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/8] arm64: untag user pointers passed to the kernel
- From: Luc Van Oostenryck <luc.vanoostenryck@xxxxxxxxx>
- RE: [PATCH 0/3] namei: implement various scoping AT_* flags
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [RFC PATCH v4 10/27] drm/i915/gvt: Update _PAGE_DIRTY to _PAGE_DIRTY_BITS
- From: Eugene Syromiatnikov <esyr@xxxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [RESEND PATCH v4 1/8] bitops: Introduce the for_each_set_clump macro
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 3/3] microblaze: uapi header and system call table file generation
- From: Michal Simek <michal.simek@xxxxxxxxxx>
- Re: [RFC PATCH v4 06/27] x86/cet: Control protection exception handler
- From: Eugene Syromiatnikov <esyr@xxxxxxxxxx>
- Re: [PATCH v2 3/5] parisc: add system call table generation support
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- Re: [PATCH v6 0/4] devres: provide and use devm_kstrdup_const()
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- Re: [RFC PATCH v4 24/27] mm/mmap: Create a guard area between VMAs
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 1/3] microblaze: Replace NR_syscalls macro from asm/unistd.h
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- Re: [PATCH v2 3/3] microblaze: uapi header and system call table file generation
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- Re: [RFC PATCH v4 24/27] mm/mmap: Create a guard area between VMAs
- From: Eugene Syromiatnikov <esyr@xxxxxxxxxx>
- Re: [RFC PATCH v4 19/27] x86/cet/shstk: Introduce WRUSS instruction
- From: Eugene Syromiatnikov <esyr@xxxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v22 5/6] ntb: ntb_hw_intel: use io-64-nonatomic instead of in-driver hacks
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v22 6/6] ntb: ntb_hw_switchtec: Cleanup 64bit IO defines to use the common header
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v22 0/6] Add io{read|write}64 to io-64-atomic headers
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v22 4/6] io-64-nonatomic: add io{read|write}64[be]{_lo_hi|_hi_lo} macros
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v22 2/6] parisc: iomap: introduce io{read|write}64
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v22 3/6] iomap: introduce io{read|write}64_{lo_hi|hi_lo}
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- [PATCH v22 1/6] iomap: Use non-raw io functions for io{read|write}XXbe
- From: Logan Gunthorpe <logang@xxxxxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH security-next v4 10/32] LSM: Don't ignore initialization failures
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH security-next v4 10/32] LSM: Don't ignore initialization failures
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH security-next v4 09/32] LSM: Provide init debugging infrastructure
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH security-next v4 07/32] LSM: Convert security_initcall() into DEFINE_LSM()
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH security-next v4 06/32] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH security-next v4 04/32] LSM: Remove initcall tracing
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v4 03/27] x86/fpu/xstate: Enable XSAVES system states
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [RFC PATCH v4 02/27] x86/fpu/xstate: Change some names to separate XSAVES system and user states
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [RFC PATCH v4 02/27] x86/fpu/xstate: Change some names to separate XSAVES system and user states
- From: Dave Hansen <dave.hansen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 02/27] x86/fpu/xstate: Change some names to separate XSAVES system and user states
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: Jordan Glover <Golden_Miller83@xxxxxxxxxxxxx>
- please help me for investment in your country
- From: Aisha Gaddafi <Ponit@xxxxxxx>
- Re: [RFC PATCH v4 02/27] x86/fpu/xstate: Change some names to separate XSAVES system and user states
- From: Dave Hansen <dave.hansen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v4 02/27] x86/fpu/xstate: Change some names to separate XSAVES system and user states
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [RFC PATCH v4 02/27] x86/fpu/xstate: Change some names to separate XSAVES system and user states
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 3/3] microblaze: uapi header and system call table file generation
- From: Michal Simek <michal.simek@xxxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v6 11/11] arm64: annotate user pointers casts detected by sparse
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v7 1/8] arm64: add type casts to untagged_addr macro
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v7 0/8] arm64: untag user pointers passed to the kernel
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v7 2/8] uaccess: add untagged_addr definition for other arches
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v7 5/8] lib, arm64: untag addrs passed to strncpy_from_user and strnlen_user
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v7 8/8] selftests, arm64: add a selftest for passing tagged pointers to kernel
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v7 7/8] arm64: update Documentation/arm64/tagged-pointers.txt
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v7 6/8] fs, arm64: untag user address in copy_mount_options
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v7 4/8] mm, arm64: untag user addresses in mm/gup.c
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v7 3/8] arm64: untag user addresses in access_ok and __uaccess_mask_ptr
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- Re: [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH memory-model 0/5] Updates to the formal memory model
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [RESEND PATCH v4 1/8] bitops: Introduce the for_each_set_clump macro
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [RESEND PATCH v4 1/8] bitops: Introduce the for_each_set_clump macro
- From: Rasmus Villemoes <linux@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] namei: implement AT_THIS_ROOT chroot-like path resolution
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH net-next v6 01/23] asm: simd context helper API
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 1/3] microblaze: Replace NR_syscalls macro from asm/unistd.h
- From: Michal Simek <michal.simek@xxxxxxxxxx>
- Re: [RESEND PATCH v4 3/8] gpio: 104-dio-48e: Utilize for_each_set_clump macro
- From: Rasmus Villemoes <linux@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH security-next v4 21/32] LSM: Finalize centralized LSM enabling logic
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH security-next v4 13/32] LoadPin: Rename "enable" to "enforce"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH net-next v6 01/23] asm: simd context helper API
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH security-next v4 21/32] LSM: Finalize centralized LSM enabling logic
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [RESEND PATCH v4 8/8] gpio: pcie-idio-24: Utilize for_each_set_clump macro
- From: William Breathitt Gray <vilhelm.gray@xxxxxxxxx>
- [RESEND PATCH v4 7/8] gpio: pci-idio-16: Utilize for_each_set_clump macro
- From: William Breathitt Gray <vilhelm.gray@xxxxxxxxx>
- [RESEND PATCH v4 6/8] gpio: ws16c48: Utilize for_each_set_clump macro
- From: William Breathitt Gray <vilhelm.gray@xxxxxxxxx>
- [RESEND PATCH v4 5/8] gpio: gpio-mm: Utilize for_each_set_clump macro
- From: William Breathitt Gray <vilhelm.gray@xxxxxxxxx>
- [RESEND PATCH v4 4/8] gpio: 104-idi-48: Utilize for_each_set_clump macro
- From: William Breathitt Gray <vilhelm.gray@xxxxxxxxx>
- [RESEND PATCH v4 3/8] gpio: 104-dio-48e: Utilize for_each_set_clump macro
- From: William Breathitt Gray <vilhelm.gray@xxxxxxxxx>
- [RESEND PATCH v4 2/8] lib/test_bitmap.c: Add for_each_set_clump test cases
- From: William Breathitt Gray <vilhelm.gray@xxxxxxxxx>
- [RESEND PATCH v4 1/8] bitops: Introduce the for_each_set_clump macro
- From: William Breathitt Gray <vilhelm.gray@xxxxxxxxx>
- [RESEND PATCH v4 0/8] Introduce the for_each_set_clump macro
- From: William Breathitt Gray <vilhelm.gray@xxxxxxxxx>
- Re: [PATCH security-next v4 13/32] LoadPin: Rename "enable" to "enforce"
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [PATCH security-next v4 16/32] LSM: Prepare for arbitrary LSM enabling
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 19/32] LSM: Prepare for reorganizing "security=" logic
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 17/32] LSM: Introduce CONFIG_LSM_ENABLE
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 24/32] LSM: Build ordered list of ordered LSMs for init
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 22/32] apparmor: Remove boot parameter
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 23/32] selinux: Remove boot parameter
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 21/32] LSM: Finalize centralized LSM enabling logic
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 29/32] LSM: Introduce enum lsm_order
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 28/32] Yama: Initialize as ordered LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 25/32] LSM: Introduce CONFIG_LSM_ORDER
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 20/32] LSM: Refactor "security=" in terms of enable/disable
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 27/32] LoadPin: Initialize as ordered LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 18/32] LSM: Introduce lsm.enable= and lsm.disable=
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 04/32] LSM: Remove initcall tracing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 03/32] LSM: Rename .security_initcall section to .lsm_info
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 02/32] vmlinux.lds.h: Avoid copy/paste of security_init section
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 00/32] LSM: Explict LSM ordering
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 05/32] LSM: Convert from initcall to struct lsm_info
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 08/32] LSM: Record LSM name in struct lsm_info
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 06/32] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 07/32] LSM: Convert security_initcall() into DEFINE_LSM()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 12/32] LSM: Provide separate ordered initialization
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 10/32] LSM: Don't ignore initialization failures
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 09/32] LSM: Provide init debugging infrastructure
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 15/32] LSM: Lift LSM selection out of individual LSMs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 13/32] LoadPin: Rename "enable" to "enforce"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 11/32] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 14/32] LSM: Plumb visibility into optional "enabled" state
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 30/32] capability: Initialize as LSM_ORDER_FIRST
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 31/32] LSM: Separate idea of "major" LSM from "exclusive" LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 32/32] LSM: Add all exclusive LSMs to ordered initialization
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 26/32] LSM: Introduce "lsm.order=" for boottime ordering
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v4 01/32] LSM: Correctly announce start of LSM initialization
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH security-next v3 18/29] LSM: Introduce lsm.enable= and lsm.disable=
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 18/29] LSM: Introduce lsm.enable= and lsm.disable=
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH security-next v3 18/29] LSM: Introduce lsm.enable= and lsm.disable=
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 18/29] LSM: Introduce lsm.enable= and lsm.disable=
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH security-next v3 18/29] LSM: Introduce lsm.enable= and lsm.disable=
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH security-next v3 14/29] LSM: Plumb visibility into optional "enabled" state
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v3 3/5] m68k: add system call table generation support
- From: Finn Thain <fthain@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH security-next v3 18/29] LSM: Introduce lsm.enable= and lsm.disable=
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 04/29] LSM: Remove initcall tracing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH security-next v3 14/29] LSM: Plumb visibility into optional "enabled" state
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH security-next v3 18/29] LSM: Introduce lsm.enable= and lsm.disable=
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH security-next v3 14/29] LSM: Plumb visibility into optional "enabled" state
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 12/29] LSM: Provide separate ordered initialization
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH security-next v3 14/29] LSM: Plumb visibility into optional "enabled" state
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH security-next v3 14/29] LSM: Plumb visibility into optional "enabled" state
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH security-next v3 19/29] LSM: Prepare for reorganizing "security=" logic
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 18/29] LSM: Introduce lsm.enable= and lsm.disable=
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 17/29] LSM: Introduce CONFIG_LSM_ENABLE
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 04/29] LSM: Remove initcall tracing
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH security-next v3 16/29] LSM: Prepare for arbitrary LSM enabling
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 15/29] LSM: Lift LSM selection out of individual LSMs
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 14/29] LSM: Plumb visibility into optional "enabled" state
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 13/29] LoadPin: Rename "enable" to "enforce"
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 12/29] LSM: Provide separate ordered initialization
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 11/29] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 10/29] LSM: Don't ignore initialization failures
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 09/29] LSM: Provide init debugging infrastructure
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 08/29] LSM: Record LSM name in struct lsm_info
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 07/29] LSM: Convert security_initcall() into DEFINE_LSM()
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 06/29] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 05/29] LSM: Convert from initcall to struct lsm_info
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 04/29] LSM: Remove initcall tracing
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 03/29] LSM: Rename .security_initcall section to .lsm_info
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 02/29] vmlinux.lds.h: Avoid copy/paste of security_init section
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 01/29] LSM: Correctly announce start of LSM initialization
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] namei: implement various scoping AT_* flags
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH security-next v3 05/29] LSM: Convert from initcall to struct lsm_info
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH security-next v3 03/29] LSM: Rename .security_initcall section to .lsm_info
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH security-next v3 02/29] vmlinux.lds.h: Avoid copy/paste of security_init section
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH security-next v3 01/29] LSM: Correctly announce start of LSM initialization
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 16/16] cpupower, x86: Add Hygon Dhyana support
- From: Shuah Khan <shuah@xxxxxxxxxx>
- Re: [PATCH 2/3] namei: implement AT_THIS_ROOT chroot-like path resolution
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH 0/3] namei: implement various scoping AT_* flags
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v6 0/4] devres: provide and use devm_kstrdup_const()
- From: Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] namei: implement O_BENEATH-style AT_* flags
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH v2 1/7] ia64: add __NR_old_getpagesize macro
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 2/3] namei: implement AT_THIS_ROOT chroot-like path resolution
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] parisc: add system call table generation support
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- Re: [PATCH v2 0/7] System call table generation support
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- Re: [PATCH v2 1/7] ia64: add __NR_old_getpagesize macro
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- Re: [PATCH v2 6/7] ia64: uapi header and system call table file generation
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- Re: [PATCH v2 2/5] parisc: add __NR_Linux_syscalls macro with __NR_syscalls
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- Re: [PATCH 2/3] namei: implement AT_THIS_ROOT chroot-like path resolution
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 2/3] namei: implement AT_THIS_ROOT chroot-like path resolution
- From: Bruce Fields <bfields@xxxxxxxxxxxx>
- RE: [PATCH 0/3] namei: implement various scoping AT_* flags
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [REVIEW][PATCH 04/20] signal/x86: Use send_sig_mceerr as apropriate
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH 1/3] namei: implement O_BENEATH-style AT_* flags
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v3 5/5] m68k: add __IGNORE* entries in asm/unistd.h
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v2 2/3] microblaze: add system call table generation support
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- [PATCH v2 1/3] microblaze: replace __NR_syscalls macro from asm/unistd.h
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- [PATCH v2 3/3] microblaze: uapi header and system call table file generation
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- [PATCH v2 0/3] System call table generation support
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- [PATCH v3 4/5] m68k: uapi header and system call table file generation
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- [PATCH v3 5/5] m68k: add __IGNORE* entries in asm/unistd.h
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- [PATCH v3 3/5] m68k: add system call table generation support
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- [PATCH v3 2/5] m68k: replace NR_syscalls macro from asm/unistd.h
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- [PATCH v3 1/5] m68k: rename system call table file name
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- [PATCH v3 0/5] System call table generation support
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- Re: [PATCH 2/3] namei: implement AT_THIS_ROOT chroot-like path resolution
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 1/3] namei: implement O_BENEATH-style AT_* flags
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2 3/5] parisc: add system call table generation support
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 2/3] namei: implement AT_THIS_ROOT chroot-like path resolution
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 2/3] namei: implement AT_THIS_ROOT chroot-like path resolution
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 2/3] namei: implement AT_THIS_ROOT chroot-like path resolution
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 2/3] namei: implement AT_THIS_ROOT chroot-like path resolution
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH 0/3] namei: implement various scoping AT_* flags
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH 0/3] namei: implement various scoping AT_* flags
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH 2/3] namei: implement AT_THIS_ROOT chroot-like path resolution
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH 0/3] namei: implement various scoping AT_* flags
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 04/29] LSM: Remove initcall tracing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH security-next v3 04/29] LSM: Remove initcall tracing
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH 0/3] namei: implement various scoping AT_* flags
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 0/3] namei: implement various scoping AT_* flags
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH v6 2/4] mm: move is_kernel_rodata() to asm-generic/sections.h
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH v6 4/4] mailbox: tegra-hsp: use devm_kstrdup_const()
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH v6 3/4] devres: provide devm_kstrdup_const()
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH v6 1/4] devres: constify p in devm_kfree()
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH v6 0/4] devres: provide and use devm_kstrdup_const()
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- Re: [PATCH 0/3] namei: implement various scoping AT_* flags
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH security-next v3 00/29] LSM: Explict LSM ordering
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/3] namei: implement various scoping AT_* flags
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 0/3] namei: implement various scoping AT_* flags
- From: Alban Crequy <alban@xxxxxxxxxx>
- Re: [PATCH V6 20/33] csky/dma: fix up dma_mapping error
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH net-next v6 01/23] asm: simd context helper API
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 0/3] namei: implement various scoping AT_* flags
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH 1/3] namei: implement O_BENEATH-style AT_* flags
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH net-next v6 01/23] asm: simd context helper API
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH security-next v3 00/29] LSM: Explict LSM ordering
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] namei: implement various scoping AT_* flags
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 00/29] LSM: Explict LSM ordering
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 00/29] LSM: Explict LSM ordering
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/3] namei: implement AT_THIS_ROOT chroot-like path resolution
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH V6 01/33] csky: Build infrastructure
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH V6 03/33] csky: Kernel booting
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH V6 04/33] csky: Exception handling and mm-fault
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH V6 05/33] csky: System Call
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH V6 07/33] csky: MMU and page table management
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH V6 08/33] csky: Process management and Signal
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH V6 10/33] csky: IRQ handling
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH V6 13/33] csky: Library functions
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH 2/3] namei: implement AT_THIS_ROOT chroot-like path resolution
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 0/3] namei: implement various scoping AT_* flags
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 0/3] namei: implement various scoping AT_* flags
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH 1/3] namei: implement O_BENEATH-style AT_* flags
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH V6 20/33] csky/dma: fix up dma_mapping error
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH 1/3] namei: implement O_BENEATH-style AT_* flags
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 0/3] namei: implement various scoping AT_* flags
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH 0/3] namei: implement various scoping AT_* flags
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 0/3] signal/unicore32: siginfo cleanups
- From: "Guan Xuetao" <gxt@xxxxxxxxxx>
- [PATCH 3/3] selftests: vfs: add AT_* path resolution tests
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- [PATCH 2/3] namei: implement AT_THIS_ROOT chroot-like path resolution
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH security-next v3 00/29] LSM: Explict LSM ordering
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/3] namei: implement O_BENEATH-style AT_* flags
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- [PATCH 0/3] namei: implement various scoping AT_* flags
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH security-next v3 00/29] LSM: Explict LSM ordering
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH security-next v3 00/29] LSM: Explict LSM ordering
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 00/29] LSM: Explict LSM ordering
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 00/29] LSM: Explict LSM ordering
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 11/11] arm64: annotate user pointers casts detected by sparse
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 0/7] System call table generation support
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [RFC PATCH v4 01/27] x86/cpufeatures: Add CPUIDs for Control-flow Enforcement Technology (CET)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [RFC PATCH v4 01/27] x86/cpufeatures: Add CPUIDs for Control-flow Enforcement Technology (CET)
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH V6 20/33] csky/dma: fix up dma_mapping error
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH V6 13/33] csky: Library functions
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH V6 05/33] csky: System Call
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH V6 04/33] csky: Exception handling and mm-fault
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH V6 03/33] csky: Kernel booting
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH V6 01/33] csky: Build infrastructure
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH security-next v3 00/29] LSM: Explict LSM ordering
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH net-next v6 01/23] asm: simd context helper API
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH net-next v6 01/23] asm: simd context helper API
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH net-next v6 01/23] asm: simd context helper API
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH net-next v6 01/23] asm: simd context helper API
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH net-next v6 01/23] asm: simd context helper API
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH net-next v6 01/23] asm: simd context helper API
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- Re: [PATCH V6 08/33] csky: Process management and Signal
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH V6 10/33] csky: IRQ handling
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH V6 07/33] csky: MMU and page table management
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH v2 2/5] parisc: add __NR_Linux_syscalls macro with __NR_syscalls
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v2 1/7] ia64: add __NR_old_getpagesize macro
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v2 6/7] ia64: uapi header and system call table file generation
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v2 7/7] ia64: add __IGNORE* entries in asm/unistd.h
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH V5 18/30] dt-bindings: csky CPU Bindings
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH V5 18/30] dt-bindings: csky CPU Bindings
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH net-next v6 01/23] asm: simd context helper API
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH net-next v6 01/23] asm: simd context helper API
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH v5 3/4] devres: provide devm_kstrdup_const()
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] mm: move is_kernel_rodata() to asm-generic/sections.h
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v5 1/4] devres: constify p in devm_kfree()
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v5 2/4] mm: move is_kernel_rodata() to asm-generic/sections.h
- From: Rasmus Villemoes <linux@xxxxxxxxxxxxxxxxxx>
- [PATCH v5 3/4] devres: provide devm_kstrdup_const()
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH v5 1/4] devres: constify p in devm_kfree()
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH v5 2/4] mm: move is_kernel_rodata() to asm-generic/sections.h
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH v5 4/4] mailbox: tegra-hsp: use devm_kstrdup_const()
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH v5 0/4] devres: provide and use devm_kstrdup_const()
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- Re: [PATCH V5 23/30] dt-bindings: interrupt-controller: C-SKY SMP intc
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH V5 18/30] dt-bindings: csky CPU Bindings
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 29/33] dt-bindings: timer: gx6605s SOC timer
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 18/33] dt-bindings: csky CPU Bindings
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 32/33] csky: fix flush_cache_range and tlb_start_vma
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 28/33] irqchip: add C-SKY APB bus interrupt controller
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 30/33] clocksource: add gx6605s SOC system timer
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 19/33] dt-bindings: Add vendor prefix for csky
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 22/33] irqchip: add C-SKY SMP interrupt controller
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 23/33] dt-bindings: interrupt-controller: C-SKY SMP intc
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 25/33] dt-bindings: timer: C-SKY Multi-processor timer
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 31/33] csky: fix compile error in linux/bug.h with SMP enabled
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 33/33] csky: use asm-generic/bitops/atomic.h for all
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 21/33] csky: remove irq_mapping from smp.c
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 24/33] clocksource: add C-SKY SMP timer
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 27/33] dt-bindings: interrupt-controller: C-SKY APB intc
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 26/33] MAINTAINERS: Add csky
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 20/33] csky/dma: fix up dma_mapping error
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH V6 08/33] csky: Process management and Signal
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v14 08/19] signal: x86/sgx: Add SIGSEGV siginfo code for SGX EPCM fault
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH V5 27/30] dt-bindings: interrupt-controller: C-SKY APB intc
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH V5 25/30] dt-bindings: timer: C-SKY Multi-processor timer
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH V5 23/30] dt-bindings: interrupt-controller: C-SKY SMP intc
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH V5 19/30] dt-bindings: Add vendor prefix for csky
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH V5 18/30] dt-bindings: csky CPU Bindings
- From: Rob Herring <robh@xxxxxxxxxx>
- Re: [PATCH V6 10/33] csky: IRQ handling
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH V6 07/33] csky: MMU and page table management
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [PATCH V6 16/33] csky: SMP support
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 13/33] csky: Library functions
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 17/33] csky: Misc headers
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 10/33] csky: IRQ handling
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 14/33] csky: User access
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 12/33] csky: ELF and module probe
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 15/33] csky: Debug and Ptrace GDB
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 11/33] csky: Atomic operations
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 09/33] csky: VDSO and rt_sigreturn
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 06/33] csky: Cache and TLB routines
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 05/33] csky: System Call
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 03/33] csky: Kernel booting
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 00/33] C-SKY(csky) Linux Kernel Port
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 08/33] csky: Process management and Signal
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 07/33] csky: MMU and page table management
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 04/33] csky: Exception handling and mm-fault
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 01/33] csky: Build infrastructure
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V6 02/33] csky: defconfig
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH v2 5/5] parisc: add __IGNORE* entries in asm/unistd.h
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- [PATCH v2 4/5] parisc: uapi header and system call table file generation
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- [PATCH v2 3/5] parisc: add system call table generation support
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- [PATCH v2 2/5] parisc: add __NR_Linux_syscalls macro with __NR_syscalls
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- [PATCH v2 1/5] parisc: move __IGNORE* entries to non uapi header
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- [PATCH v2 0/5] System call table generation support
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- [PATCH v2 7/7] ia64: add __IGNORE* entries in asm/unistd.h
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- [PATCH v2 6/7] ia64: uapi header and system call table file generation
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- [PATCH v2 5/7] ia64: add system call table generation support
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- [PATCH v2 4/7] ia64: replace the system call table entries from entry.S
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- [PATCH v2 3/7] ia64: add an offset for system call number
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- [PATCH v2 2/7] ia64: replace NR_syscalls macro from asm/unistd.h
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- [PATCH v2 1/7] ia64: add __NR_old_getpagesize macro
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- [PATCH v2 0/7] System call table generation support
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- Re: [REVIEW][PATCH 00/15] signal/arm64: siginfo cleanups
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 05/18] asm-generic/tlb: Provide generic tlb_flush
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH V5 06/30] csky: Cache and TLB routines
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [REVIEW][PATCH 00/15] signal/arm64: siginfo cleanups
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH V5 06/30] csky: Cache and TLB routines
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH V5 06/30] csky: Cache and TLB routines
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH V5 06/30] csky: Cache and TLB routines
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH V5 06/30] csky: Cache and TLB routines
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH V5 17/30] csky: Misc headers
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH v14 08/19] signal: x86/sgx: Add SIGSEGV siginfo code for SGX EPCM fault
- From: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
- Re: [PATCH security-next v3 04/29] LSM: Remove initcall tracing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH memory-model 2/5] tools/memory-model: Add extra ordering for locks and remove it for ordinary release/acquire
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- [PATCH memory-model 5/5] doc: Replace smp_cond_acquire() with smp_cond_load_acquire()
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- [PATCH memory-model 3/5] tools/memory-model: Fix a README typo
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- [PATCH memory-model 4/5] tools/memory-model: Add more LKMM limitations
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- [PATCH memory-model 1/5] tools/memory-model: Add litmus-test naming scheme
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- [PATCH memory-model 0/5] Updates to the formal memory model
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxx>
- Re: [PATCH 05/18] asm-generic/tlb: Provide generic tlb_flush
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 00/15] signal/arm64: siginfo cleanups
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH security-next v3 04/29] LSM: Remove initcall tracing
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH 05/18] asm-generic/tlb: Provide generic tlb_flush
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v5 2/2] tty/serial: atmel: add ISO7816 support
- From: Ludovic Desroches <ludovic.desroches@xxxxxxxxxxxxx>
- [PATCH v5 1/2] tty/serial_core: add ISO7816 infrastructure
- From: Ludovic Desroches <ludovic.desroches@xxxxxxxxxxxxx>
- [PATCH v5 0/2] add ISO7816 support
- From: Ludovic Desroches <ludovic.desroches@xxxxxxxxxxxxx>
- Re: [PATCH v4 2/2] tty/serial: atmel: add ISO7816 support
- From: Ludovic Desroches <ludovic.desroches@xxxxxxxxxxxxx>
- Re: [PATCH 08/18] arm/tlb: Convert to generic mmu_gather
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 05/18] asm-generic/tlb: Provide generic tlb_flush
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 06/18] asm-generic/tlb: Conditionally provide tlb_migrate_finish()
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH 00/18] my generic mmu_gather patches
- From: Will Deacon <will.deacon@xxxxxxx>
- [PATCH 12/18] arch/tlb: Clean up simple architectures
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 03/18] x86/mm: Page size aware flush_tlb_mm_range()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 14/18] s390/tlb: convert to generic mmu_gather
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 13/18] asm-generic/tlb: Introduce HAVE_MMU_GATHER_NO_GATHER
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 18/18] asm-generic/tlb: Remove tlb_table_flush()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 06/18] asm-generic/tlb: Conditionally provide tlb_migrate_finish()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 08/18] arm/tlb: Convert to generic mmu_gather
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 11/18] um/tlb: Convert to generic mmu_gather
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 10/18] sh/tlb: Convert SH to generic mmu_gather
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 09/18] ia64/tlb: Conver to generic mmu_gather
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 16/18] asm-generic/tlb: Remove HAVE_GENERIC_MMU_GATHER
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 07/18] asm-generic/tlb: Invert HAVE_RCU_TABLE_INVALIDATE
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 17/18] asm-generic/tlb: Remove tlb_flush_mmu_free()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 15/18] asm-generic/tlb: Remove arch_tlb*_mmu()
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 05/18] asm-generic/tlb: Provide generic tlb_flush
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 02/18] asm-generic/tlb: Provide HAVE_MMU_GATHER_PAGE_SIZE
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 04/18] asm-generic/tlb: Provide generic VIPT cache flush
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 00/18] my generic mmu_gather patches
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH 01/18] asm-generic/tlb: Provide a comment
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH v4 03/27] x86/fpu/xstate: Enable XSAVES system states
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [REVIEW][PATCH 6/6] signal: Use a smaller struct siginfo in the kernel
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 5/6] signal: Distinguish between kernel_siginfo and siginfo
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 4/6] signal: Introduce copy_siginfo_from_user and use it's return value
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 3/6] signal: Remove the need for __ARCH_SI_PREABLE_SIZE and SI_PAD_SIZE
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 2/6] signal: Fail sigqueueinfo if si_signo != sig
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 1/6] signal/sparc: Move EMT_TAGOVF into the generic siginfo.h
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 0/6] signal: Shrinking the kernel's siginfo structure
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH v4 03/27] x86/fpu/xstate: Enable XSAVES system states
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH v4 02/27] x86/fpu/xstate: Change some names to separate XSAVES system and user states
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [RFC PATCH v4 01/27] x86/cpufeatures: Add CPUIDs for Control-flow Enforcement Technology (CET)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [RFC PATCH v4 01/27] x86/cpufeatures: Add CPUIDs for Control-flow Enforcement Technology (CET)
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v4 0/4] devres: provide and use devm_kstrdup_const()
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- Re: [PATCH v4 0/4] devres: provide and use devm_kstrdup_const()
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH net-next v6 01/23] asm: simd context helper API
- From: "Jason A. Donenfeld" <Jason@xxxxxxxxx>
- [PATCH 2/2] x86/pci: Add Hygon Dhyana support to PCI and north bridge
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH 1/2] x86/amd_nb: Add vendor checking for strict function access
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH v14 08/19] signal: x86/sgx: Add SIGSEGV siginfo code for SGX EPCM fault
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v14 00/19] Intel SGX1 support
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [x86] BUG()/BUG_ON() macros cannot be disabled
- From: Alexander Lochmann <alexander.lochmann@xxxxxxxxxxxxxx>
- Re: [PATCH v8 07/16] x86/pci: Add Hygon Dhyana support to PCI and north bridge
- From: Pu Wen <puwen@xxxxxxxx>
- Re: [PATCH v4 0/4] devres: provide and use devm_kstrdup_const()
- From: Robin Murphy <robin.murphy@xxxxxxx>
- [PATCH v4 0/4] devres: provide and use devm_kstrdup_const()
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH v4 1/4] devres: constify p in devm_kfree()
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH v4 2/4] mm: move is_kernel_rodata() to asm-generic/sections.h
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH v4 3/4] devres: provide devm_kstrdup_const()
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- [PATCH v4 4/4] mailbox: tegra-hsp: use devm_kstrdup_const()
- From: Bartosz Golaszewski <brgl@xxxxxxxx>
- Re: [x86] BUG()/BUG_ON() macros cannot be disabled
- From: Alexander Stein <alexander.stein@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 07/16] x86/pci: Add Hygon Dhyana support to PCI and north bridge
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v8 07/16] x86/pci: Add Hygon Dhyana support to PCI and north bridge
- From: Pu Wen <puwen@xxxxxxxx>
- Re: [PATCH 2/3] powerpc: Add system call table generation support
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [x86] BUG()/BUG_ON() macros cannot be disabled
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [x86] BUG()/BUG_ON() macros cannot be disabled
- From: Alexander Lochmann <alexander.lochmann@xxxxxxxxxxxxxx>
- Re: [x86] BUG()/BUG_ON() macros cannot be disabled
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [x86] BUG()/BUG_ON() macros cannot be disabled
- From: Alexander Lochmann <alexander.lochmann@xxxxxxxxxxxxxx>
- Re: [PATCH V7 1/2] csky/dma: bugfix dma_sync_for_cpu/device
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH V5 17/30] csky: Misc headers
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH V5 17/30] csky: Misc headers
- From: Andrea Parri <andrea.parri@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V7 1/2] csky/dma: bugfix dma_sync_for_cpu/device
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH V7 1/2] csky/dma: bugfix dma_sync_for_cpu/device
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH V7 2/2] csky: remove irq_mapping from smp.c.
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH V5 06/30] csky: Cache and TLB routines
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] powerpc: Add system call table generation support
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 2/3] powerpc: Add system call table generation support
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- [PATCH security-next v3 25/29] Yama: Initialize as ordered LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 19/29] LSM: Prepare for reorganizing "security=" logic
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 18/29] LSM: Introduce lsm.enable= and lsm.disable=
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 24/29] LoadPin: Initialize as ordered LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 26/29] LSM: Introduce enum lsm_order
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 20/29] LSM: Refactor "security=" in terms of enable/disable
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 22/29] LSM: Introduce CONFIG_LSM_ORDER
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 17/29] LSM: Introduce CONFIG_LSM_ENABLE
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 06/29] vmlinux.lds.h: Move LSM_TABLE into INIT_DATA
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 07/29] LSM: Convert security_initcall() into DEFINE_LSM()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 10/29] LSM: Don't ignore initialization failures
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 12/29] LSM: Provide separate ordered initialization
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 09/29] LSM: Provide init debugging infrastructure
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 11/29] LSM: Introduce LSM_FLAG_LEGACY_MAJOR
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 14/29] LSM: Plumb visibility into optional "enabled" state
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 13/29] LoadPin: Rename "enable" to "enforce"
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 29/29] LSM: Add all exclusive LSMs to ordered initialization
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 27/29] capability: Initialize as LSM_ORDER_FIRST
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 21/29] LSM: Build ordered list of ordered LSMs for init
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 28/29] LSM: Separate idea of "major" LSM from "exclusive" LSM
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 16/29] LSM: Prepare for arbitrary LSM enabling
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 23/29] LSM: Introduce "lsm.order=" for boottime ordering
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 15/29] LSM: Lift LSM selection out of individual LSMs
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 08/29] LSM: Record LSM name in struct lsm_info
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 05/29] LSM: Convert from initcall to struct lsm_info
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 02/29] vmlinux.lds.h: Avoid copy/paste of security_init section
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 00/29] LSM: Explict LSM ordering
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 04/29] LSM: Remove initcall tracing
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 03/29] LSM: Rename .security_initcall section to .lsm_info
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH security-next v3 01/29] LSM: Correctly announce start of LSM initialization
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH V5 29/30] dt-bindings: timer: gx6605s SOC timer
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 27/30] dt-bindings: interrupt-controller: C-SKY APB intc
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 30/30] clocksource: add gx6605s SOC system timer
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 28/30] irqchip: add C-SKY APB bus interrupt controller
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 26/30] MAINTAINERS: Add csky
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 25/30] dt-bindings: timer: C-SKY Multi-processor timer
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 24/30] clocksource: add C-SKY SMP timer
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 22/30] irqchip: add C-SKY SMP interrupt controller
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 23/30] dt-bindings: interrupt-controller: C-SKY SMP intc
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 21/30] csky: remove irq_mapping from smp.c
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 20/30] csky/dma: bugfix dma_sync_for_cpu/device
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 19/30] dt-bindings: Add vendor prefix for csky
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 18/30] dt-bindings: csky CPU Bindings
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 17/30] csky: Misc headers
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 16/30] csky: SMP support
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 15/30] csky: Debug and Ptrace GDB
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [PATCH 3/3] microblaze: uapi header and system call table file generation
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 1/4] sparc: Move __IGNORE* entries to non uapi header
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 2/3] powerpc: Add system call table generation support
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH V7 1/2] csky/dma: bugfix dma_sync_for_cpu/device
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH V7 2/2] csky: remove irq_mapping from smp.c.
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [REVIEW][PATCH 0/3] signal/ia64: siginfo fixes and cleanups
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [REVIEW][PATCH 2/2] signal/arc: Use force_sig_fault where appropriate
- From: Vineet Gupta <vineet.gupta1@xxxxxxxxxxxx>
- Re: [REVIEW][PATCH 1/2] signal/arc: Push siginfo generation into unhandled_exception
- From: Vineet Gupta <vineet.gupta1@xxxxxxxxxxxx>
- Re: [RFC PATCH v4 00/27] Control Flow Enforcement: Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [REVIEW][PATCH 3/3] signal/unicore32: Use force_sig_fault where appropriate
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 2/3] signal/unicore32: Generate siginfo in ucs32_notify_die
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 1/3] signal/unicore32: Use send_sig_fault where appropriate
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- Re: [PATCH v8 07/16] x86/pci: Add Hygon Dhyana support to PCI and north bridge
- From: Borislav Petkov <bp@xxxxxxxxx>
- [REVIEW][PATCH 0/3] signal/unicore32: siginfo cleanups
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v6 11/11] arm64: annotate user pointers casts detected by sparse
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [REVIEW][PATCH 1/2] signal/arc: Push siginfo generation into unhandled_exception
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 2/2] signal/arc: Use force_sig_fault where appropriate
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 0/2] signal/arc: siginfo cleanups
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH V5 07/30] csky: MMU and page table management
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 13/30] csky: Library functions
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 10/30] csky: IRQ handling
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 14/30] csky: User access
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 11/30] csky: Atomic operations
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 05/30] csky: System Call
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 08/30] csky: Process management and Signal
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 09/30] csky: VDSO and rt_sigreturn
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 03/30] csky: Kernel booting
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 12/30] csky: ELF and module probe
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 01/30] csky: Build infrastructure
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 06/30] csky: Cache and TLB routines
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 04/30] csky: Exception handling and mm-fault
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 02/30] csky: defconfig
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [PATCH V5 00/30] C-SKY(csky) Linux Kernel Port
- From: Guo Ren <ren_guo@xxxxxxxxx>
- [REVIEW][PATCH 3/3] signal/ia64: Use force_sig_fault where appropriate
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 2/3] signal/ia64: Use the force_sig(SIGSEGV,...) in ia64_rt_sigreturn
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 1/3] signal/ia64: Use the generic force_sigsegv in setup_frame
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 0/3] signal/ia64: siginfo fixes and cleanups
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [REVIEW][PATCH 1/4] signal/arm: Push siginfo generation into arm_notify_die
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 2/4] signal/arm: Use force_sig_fault where appropriate
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 3/4] signal/arm: Use send_sig_fault where appropriate
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 4/4] signal/arm/kvm: Use send_sig_mceerr
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [PATCH 4.18 166/235] sched/core: Use smp_mb() in wake_woken_function()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 121/173] sched/core: Use smp_mb() in wake_woken_function()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [REVIEW][PATCH 0/4] signal/arm: siginfo cleanups
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] tools/memory-model: Model smp_mb__after_unlock_lock()
- From: Andrea Parri <andrea.parri@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] tools/memory-model: Model smp_mb__after_unlock_lock()
- From: Andrea Parri <andrea.parri@xxxxxxxxxxxxxxxxxxxx>
- [REVIEW][PATCH 12/15] signal/arm64: Remove arm64_force_sig_info
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 14/15] signal/arm64: Add and use arm64_force_sig_ptrace_errno_trap
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 15/15] signal/arm64: Use send_sig_fault where appropriate
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 13/15] signal/arm64: In ptrace_hbptriggered name the signal description string
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 11/15] signal/arm64: Add and use arm64_force_sig_mceerr as appropriate
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 10/15] signal/arm64: Add and use arm64_force_sig_fault where appropriate
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 09/15] signal/arm64: Only call set_thread_esr once in do_page_fault
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 08/15] signal/arm64: Only perform one esr_to_fault_info call in do_page_fault
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 07/15] signal/arm64: Expand __do_user_fault and remove it
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 06/15] signal/arm64: For clarity separate the 3 signal sending cases in do_page_fault
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 05/15] signal/arm64: Consolidate the two hwpoison cases in do_page_fault
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 04/15] signal/arm64: Factor set_thread_esr out of __do_user_fault
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 03/15] signal/arm64: Factor out arm64_show_signal from arm64_force_sig_info
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 01/15] signal/arm64: Push siginfo generation into arm64_notify_die
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 02/15] signal/arm64: Remove unneeded tsk parameter from arm64_force_sig_info
- From: "Eric W. Biederman" <ebiederm@xxxxxxxxxxxx>
- [REVIEW][PATCH 00/15] signal/arm64: siginfo cleanups
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH V4 00/27] C-SKY(csky) Linux Kernel Port
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v2 4/5] m68k: uapi header and system call table file generation
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- Re: [PATCH v2 3/5] m68k: Added system call table generation support
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- Re: [PATCH V4 00/27] C-SKY(csky) Linux Kernel Port
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] System call table generation support
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v2 5/5] m68k: added __IGNORE* entries in asm/unistd.h
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v2 4/5] m68k: uapi header and system call table file generation
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v2 3/5] m68k: Added system call table generation support
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] m68k: Replace NR_syscalls macro from asm/unistd.h
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/5] m68k: Replace NR_syscalls macro from asm/unistd.h
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v2 1/5] m68k: Rename system call table file name
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH v2 0/5] System call table generation support
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- Re: [PATCH v2 0/5] System call table generation support
- From: Greg Ungerer <gerg@xxxxxxxxxxxxxx>
- Re: [PATCH v8 07/16] x86/pci: Add Hygon Dhyana support to PCI and north bridge
- From: Pu Wen <puwen@xxxxxxxx>
- Re: [PATCH v8 07/16] x86/pci: Add Hygon Dhyana support to PCI and north bridge
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [LKP] [x86/pci] 7ffb31888c: PANIC:early_exception
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH v8 15/16] EDAC, amd64: Add Hygon Dhyana support
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH v8 14/16] cpufreq, x86: Add Hygon Dhyana support
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH v8 13/16] ACPI, x86: Add Hygon Dhyana support
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH v8 12/16] x86/xen: Add Hygon Dhyana support to Xen
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH v8 11/16] x86/kvm: Add Hygon Dhyana support to KVM infrastructure
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH v8 10/16] x86/mce: Add Hygon Dhyana support to MCE infrastructure
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH v8 09/16] x86/bugs: Add mitigation to spectre and no meltdown for Hygon Dhyana
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH v8 08/16] x86/apic: Add Hygon Dhyana support to APIC
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH v8 07/16] x86/pci: Add Hygon Dhyana support to PCI and north bridge
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH v8 06/16] x86/alternative: Init ideal_nops for Hygon Dhyana
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH v8 05/16] perf/x86: Add Hygon Dhyana support to PMU infrastructure
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH v8 04/16] x86/smpboot: SMP init no delay and not flush caches before sleep
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH v8 03/16] x86/cpu/mtrr: Support TOP_MEM2 and get MTRR number
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH v8 02/16] x86/cpu: Get cache info and setup cache cpumap for Hygon Dhyana
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH v8 01/16] x86/cpu: Create Hygon Dhyana architecture support file
- From: Pu Wen <puwen@xxxxxxxx>
- [PATCH v8 00/16] Add support for Hygon Dhyana Family 18h processor
- From: Pu Wen <puwen@xxxxxxxx>
- Re: [PATCH 3/3] mm: optimise pte dirty/accessed bit setting by demand based pte insertion
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH v2 1/5] m68k: Rename system call table file name
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- Re: [PATCH 2/4] m68k: Replace NR_syscalls macro from asm/unistd.h
- From: Firoz Khan <firoz.khan@xxxxxxxxxx>
- Re: [PATCH V4 00/27] C-SKY(csky) Linux Kernel Port
- From: Guo Ren <ren_guo@xxxxxxxxx>
- Re: [RFC PATCH v4 00/27] Control Flow Enforcement: Shadow Stack
- From: Dave Hansen <dave.hansen@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] System call table generation support
- From: Paul Burton <paul.burton@xxxxxxxx>
- Re: [RFC PATCH v4 23/27] mm/map: Add Shadow stack pages to memory accounting
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [RFC PATCH v4 23/27] mm/map: Add Shadow stack pages to memory accounting
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- [RFC PATCH v4 02/27] x86/fpu/xstate: Change some names to separate XSAVES system and user states
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 05/27] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 06/27] x86/cet: Control protection exception handler
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 04/27] x86/fpu/xstate: Add XSAVES system states for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 01/27] x86/cpufeatures: Add CPUIDs for Control-flow Enforcement Technology (CET)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 15/27] mm: Handle THP/HugeTLB shadow stack page fault
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 08/27] mm: Introduce VM_SHSTK for shadow stack memory
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 27/27] x86/cet/shstk: Add Shadow Stack instructions to opcode map
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 07/27] x86/cet/shstk: Add Kconfig option for user-mode shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 09/27] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 24/27] mm/mmap: Create a guard area between VMAs
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 26/27] x86/cet/shstk: Add arch_prctl functions for Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 25/27] mm/mmap: Prevent Shadow Stack VMA merges
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 23/27] mm/map: Add Shadow stack pages to memory accounting
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 0/9] Control Flow Enforcement: Branch Tracking, PTRACE
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 1/9] x86/cet/ibt: Add Kconfig option for user-mode Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 3/9] x86/cet/ibt: Add IBT legacy code bitmap allocation function
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 6/9] x86/cet/ibt: Add arch_prctl functions for IBT
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 9/9] x86/cet: Add PTRACE interface for CET
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 5/9] x86/cet/ibt: ELF header parsing for IBT
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 7/9] x86/cet/ibt: Add ENDBR to op-code-map
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 8/9] x86: Insert endbr32/endbr64 to vDSO
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 4/9] mm/mmap: Add IBT bitmap size to address space limit check
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 2/9] x86/cet/ibt: User-mode indirect branch tracking support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 10/27] drm/i915/gvt: Update _PAGE_DIRTY to _PAGE_DIRTY_BITS
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 11/27] x86/mm: Introduce _PAGE_DIRTY_SW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 20/27] x86/cet/shstk: Signal handling for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 16/27] mm: Update can_follow_write_pte/pmd for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 12/27] x86/mm: Modify ptep_set_wrprotect and pmdp_set_wrprotect for _PAGE_DIRTY_SW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 17/27] mm: Introduce do_mmap_locked()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 13/27] x86/mm: Shadow stack page fault error checking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 03/27] x86/fpu/xstate: Enable XSAVES system states
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 19/27] x86/cet/shstk: Introduce WRUSS instruction
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 14/27] mm: Handle shadow stack page fault
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 18/27] x86/cet/shstk: User-mode shadow stack support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 21/27] x86/cet/shstk: ELF header parsing of Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 22/27] x86/cet/shstk: Handle thread shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [RFC PATCH v4 00/27] Control Flow Enforcement: Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH security-next v2 26/26] LSM: Add all exclusive LSMs to ordered initialization
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 08/20] signal/x86/traps: Move setting error_code and trap_nr into do_trap_no_signal
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH security-next v2 26/26] LSM: Add all exclusive LSMs to ordered initialization
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 08/20] signal/x86/traps: Move setting error_code and trap_nr into do_trap_no_signal
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [REVIEW][PATCH 12/20] signal/x86: Remove pkey parameter from bad_area_nosemaphore
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH net-next 1/3] net: rework SIOCGSTAMP ioctl handling
- From: Stefan Schmidt <stefan@xxxxxxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 0/9] signal/powerpc: siginfo cleanups
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 9/9] signal/powerpc: Use force_sig_fault where appropriate
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 7/9] signal/poewrpc: Specialize _exception_pkey for handling pkey exceptions
- From: Christophe LEROY <christophe.leroy@xxxxxx>
- Re: [REVIEW][PATCH 8/9] signal/powerpc: Simplify _exception_pkey by using force_sig_pkuerr
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 7/9] signal/poewrpc: Specialize _exception_pkey for handling pkey exceptions
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 6/9] signal/powerpc: Call force_sig_fault from _exception
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] mm: optimise pte dirty/accessed bit setting by demand based pte insertion
- From: Ley Foon Tan <ley.foon.tan@xxxxxxxxx>
- Re: [REVIEW][PATCH 5/9] signal/powerpc: Factor the common exception code into exception_common
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 4/9] signal/powerpc: Remove pkey parameter from __bad_area_nosemaphore
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [REVIEW][PATCH 3/9] signal/powerpc: Call _exception_pkey directly from bad_key_fault_exception
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
[Index of Archives]
[Kernel Announce]
[IETF Annouce]
[Netdev]
[Netfilter]
[Bugtraq]