Linux Arch
[Prev Page][Next Page]
- Re: [PATCH 05/19] arm64: rename COMPAT to AARCH32_EL0 in Kconfig
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH] arm: add an option for erratum 657417
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH] arm: add an option for erratum 657417
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH] arm: add an option for erratum 657417
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH] arm: add an option for erratum 657417
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] arm: add an option for erratum 657417
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH] arm: add an option for erratum 657417
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH] arm: add an option for erratum 657417
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] arm: add an option for erratum 657417
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH] arm: add an option for erratum 657417
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH] arm: add an option for erratum 657417
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] arm: apply more __ro_after_init
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- [PATCH] arm: add an option for erratum 657417
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [RFC v3 07/13] tables.h: add linker table support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC v3 07/13] tables.h: add linker table support
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [RFC v3 07/13] tables.h: add linker table support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC v3 07/13] tables.h: add linker table support
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- [PATCH memory-barriers.txt 2/4] memory-barriers.txt: Fix wrong section reference
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- [PATCH memory-barriers.txt 3/4] Doc/memory-barriers: Fix a typo of example result
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- [PATCH memory-barriers.txt 1/4] memory-barriers.txt: Maintain consistent blank line
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- [PATCH memory-barriers.txt v2 0/5] Fixes and Korean translation
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] arm: apply more __ro_after_init
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [EXPERIMENTAL] enable thin archives and --gc-sections on ARM
- From: Nicolas Pitre <nicolas.pitre@xxxxxxxxxx>
- Re: [EXPERIMENTAL] enable thin archives and --gc-sections on ARM
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 05/19] arm64: rename COMPAT to AARCH32_EL0 in Kconfig
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [EXPERIMENTAL] enable thin archives and --gc-sections on ARM
- From: Nicolas Pitre <nicolas.pitre@xxxxxxxxxx>
- Re: [PATCH v3 1/2] arm64: implement FTRACE_WITH_REGS
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: c6x linker issue on linux-next-20160808 + some linker table work
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: c6x linker issue on linux-next-20160808 + some linker table work
- From: Mark Salter <msalter@xxxxxxxxxx>
- Re: [PATCH v2 2/2] arm64: implement live patching
- From: Torsten Duwe <duwe@xxxxxx>
- [PATCH v3 1/2] arm64: implement FTRACE_WITH_REGS
- From: Torsten Duwe <duwe@xxxxxx>
- [PATCH v3 2/2] arm64: implement live patching
- From: Torsten Duwe <duwe@xxxxxx>
- [PATCH v3 0/2] arm64 live patching
- From: Torsten Duwe <duwe@xxxxxx>
- Re: [PATCH 05/19] arm64: rename COMPAT to AARCH32_EL0 in Kconfig
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 2/2] arm: apply more __ro_after_init
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: c6x linker issue on linux-next-20160808 + some linker table work
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH 2/2] arm: apply more __ro_after_init
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v7 4/4] nmi_backtrace: generate one-line reports for idle cpus
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v7 4/4] nmi_backtrace: generate one-line reports for idle cpus
- From: Petr Mladek <pmladek@xxxxxxxx>
- Re: [PATCH 05/19] arm64: rename COMPAT to AARCH32_EL0 in Kconfig
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 05/19] arm64: rename COMPAT to AARCH32_EL0 in Kconfig
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [Xen-devel] [PATCH] Xen: remove -fshort-wchar gcc flag
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [Xen-devel] [PATCH] Xen: remove -fshort-wchar gcc flag
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [EXPERIMENTAL] enable thin archives and --gc-sections on ARM
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [Xen-devel] [PATCH] Xen: remove -fshort-wchar gcc flag
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- [PATCH] Xen: remove -fshort-wchar gcc flag
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 0/6 v2] kbuild changes, thin archives, --gc-sections
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: c6x linker issue on linux-next-20160808 + some linker table work
- From: Mark Salter <msalter@xxxxxxxxxx>
- [PATCH 6/6] powerpc: use the new post-link pass to check relocations
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH 5/6] powerpc/64: use linker dead code elimination
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH 4/6] powerpc: switch to using thin archives
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH 3/6] kbuild: add arch specific post-link pass
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH 2/6] kbuild: allow archs to select link dead code/data elimination
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH 1/6] kbuild: allow architectures to use thin archives instead of ld -r
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH 0/6 v2] kbuild changes, thin archives, --gc-sections
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH 05/19] arm64: rename COMPAT to AARCH32_EL0 in Kconfig
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 05/19] arm64: rename COMPAT to AARCH32_EL0 in Kconfig
- From: "Zhangjian (Bamvor)" <bamvor.zhangjian@xxxxxxxxxx>
- Re: c6x linker issue on linux-next-20160808 + some linker table work
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH 2/2] arm: apply more __ro_after_init
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: c6x linker issue on linux-next-20160808 + some linker table work
- From: Mark Salter <msalter@xxxxxxxxxx>
- Re: [PATCH 2/2] arm: apply more __ro_after_init
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] arm: apply more __ro_after_init
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 2/2] arm: apply more __ro_after_init
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: c6x linker issue on linux-next-20160808 + some linker table work
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH 2/2] arm: apply more __ro_after_init
- From: Daniel Micay <danielmicay@xxxxxxxxx>
- Re: [PATCH 2/2] arm: apply more __ro_after_init
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] arm: apply more __ro_after_init
- From: Russell King - ARM Linux <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] arm: apply more __ro_after_init
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/2] arm: apply more __ro_after_init
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC v3 00/13] linux: generalize sections, ranges and linker tables
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH 2/2] arm: apply more __ro_after_init
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: c6x linker issue on linux-next-20160808 + some linker table work
- From: Mark Salter <msalter@xxxxxxxxxx>
- Re: c6x linker issue on linux-next-20160808 + some linker table work
- From: Mark Salter <msalter@xxxxxxxxxx>
- Re: [PATCH 2/5] kbuild: allow archs to select build for link dead code/data elimination
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] kbuild: allow archs to select build for link dead code/data elimination
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] kbuild: allow archs to select build for link dead code/data elimination
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 2/5] kbuild: allow archs to select build for link dead code/data elimination
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: c6x linker issue on linux-next-20160808 + some linker table work
- From: Mark Salter <msalter@xxxxxxxxxx>
- Re: c6x linker issue on linux-next-20160808 + some linker table work
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH v7 4/4] nmi_backtrace: generate one-line reports for idle cpus
- From: Chris Metcalf <cmetcalf@xxxxxxxxxxxx>
- Re: [PATCH v7 4/4] nmi_backtrace: generate one-line reports for idle cpus
- From: Chris Metcalf <cmetcalf@xxxxxxxxxxxx>
- Re: S3 resume regression [1cf4f629d9d2 ("cpu/hotplug: Move online calls to hotplugged cpu")]
- From: Ville Syrjälä <ville.syrjala@xxxxxxxxxxxxxxx>
- Re: c6x linker issue on linux-next-20160808 + some linker table work
- From: Mark Salter <msalter@xxxxxxxxxx>
- Re: [RFC v3 00/13] linux: generalize sections, ranges and linker tables
- From: Richard Fontana <fontana@xxxxxxxxxxxxxxx>
- Re: [RFC v3 00/13] linux: generalize sections, ranges and linker tables
- From: Richard Fontana <fontana@xxxxxxxxxxxxxxx>
- Re: [RFC v3 00/13] linux: generalize sections, ranges and linker tables
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RFC v3 00/13] linux: generalize sections, ranges and linker tables
- From: One Thousand Gnomes <gnomes@xxxxxxxxxxxxxxxxxxx>
- Re: c6x linker issue on linux-next-20160808 + some linker table work
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v7 4/4] nmi_backtrace: generate one-line reports for idle cpus
- From: Petr Mladek <pmladek@xxxxxxxx>
- Re: [PATCH v7 4/4] nmi_backtrace: generate one-line reports for idle cpus
- From: Lorenzo Pieralisi <lorenzo.pieralisi@xxxxxxx>
- c6x linker issue on linux-next-20160808 + some linker table work
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [RFC v3 07/13] tables.h: add linker table support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 2/5] kbuild: allow archs to select build for link dead code/data elimination
- From: Andi Kleen <ak@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] kbuild: allow archs to select build for link dead code/data elimination
- From: Alan Modra <amodra@xxxxxxxxx>
- [PATCH 01/10] x86, pkeys: add fault handling for PF_PK page fault bit
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 03/10] x86, pkeys: make mprotect_key() mask off additional vm_flags
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 05/10] x86: wire up protection keys system calls
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 04/10] x86, pkeys: allocation/free syscalls
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 02/10] mm: implement new pkey_mprotect() system call
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 06/10] generic syscalls: wire up memory protection keys syscalls
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 07/10] pkeys: add details of system call use to Documentation/
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 10/10] x86, pkeys: add self-tests
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 09/10] x86, pkeys: allow configuration of init_pkru
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 08/10] x86, pkeys: default to a restrictive init PKRU
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 00/10] [v6] System Calls for Memory Protection Keys
- From: Dave Hansen <dave@xxxxxxxx>
- Re: [PATCH v7 4/4] nmi_backtrace: generate one-line reports for idle cpus
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH v7 0/4] improvements to the nmi_backtrace code
- From: Chris Metcalf <cmetcalf@xxxxxxxxxxxx>
- [PATCH v7 4/4] nmi_backtrace: generate one-line reports for idle cpus
- From: Chris Metcalf <cmetcalf@xxxxxxxxxxxx>
- Re: [PATCH 2/5] kbuild: allow archs to select build for link dead code/data elimination
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC v3 07/13] tables.h: add linker table support
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH 1/5] kbuild: allow architectures to use thin archives instead of ld -r
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 2/5] kbuild: allow archs to select build for link dead code/data elimination
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH 1/5] kbuild: allow architectures to use thin archives instead of ld -r
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH 2/5] kbuild: allow archs to select build for link dead code/data elimination
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH 2/5] kbuild: allow archs to select build for link dead code/data elimination
- From: Nicolas Pitre <nicolas.pitre@xxxxxxxxxx>
- Re: [RFC][PATCH 0/5] kbuild changes, thin archives, --gc-sections
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH 2/5] kbuild: allow archs to select build for link dead code/data elimination
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH 3/5] kbuild: add arch specific post-module-link pass
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH 2/5] kbuild: allow archs to select build for link dead code/data elimination
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH 1/5] kbuild: allow architectures to use thin archives instead of ld -r
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH 1/5] kbuild: allow architectures to use thin archives instead of ld -r
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [PATCH 2/5] kbuild: allow archs to select build for link dead code/data elimination
- From: Alan Modra <amodra@xxxxxxxxx>
- Re: [PATCH 2/5] kbuild: allow archs to select build for link dead code/data elimination
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RFC][PATCH 0/5] kbuild changes, thin archives, --gc-sections
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 1/5] kbuild: allow architectures to use thin archives instead of ld -r
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH 2/5] kbuild: allow archs to select build for link dead code/data elimination
- From: Andreas Schwab <schwab@xxxxxxxxxxxxxx>
- Re: [PATCH 2/5] kbuild: allow archs to select build for link dead code/data elimination
- From: Alan Modra <amodra@xxxxxxxxx>
- Re: [PATCH 2/5] kbuild: allow archs to select build for link dead code/data elimination
- From: Nicolas Pitre <nicolas.pitre@xxxxxxxxxx>
- Re: [PATCH 1/5] kbuild: allow architectures to use thin archives instead of ld -r
- From: Nicolas Pitre <nicolas.pitre@xxxxxxxxxx>
- Re: [PATCH 1/5] kbuild: allow architectures to use thin archives instead of ld -r
- From: Alan Modra <amodra@xxxxxxxxx>
- Re: [PATCH 1/5] kbuild: allow architectures to use thin archives instead of ld -r
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] kbuild: allow archs to select build for link dead code/data elimination
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH 1/5] kbuild: allow architectures to use thin archives instead of ld -r
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH 1/5] kbuild: allow architectures to use thin archives instead of ld -r
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 3/5] kbuild: add arch specific post-module-link pass
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH 3/5] kbuild: add arch specific post-module-link pass
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: [RFC][PATCH 0/5] kbuild changes, thin archives, --gc-sections
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH 5/5] powerpc/64: use linker dce
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH 4/5] powerpc: switch to using thin archives
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH 3/5] kbuild: add arch specific post-module-link pass
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH 2/5] kbuild: allow archs to select build for link dead code/data elimination
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [PATCH 1/5] kbuild: allow architectures to use thin archives instead of ld -r
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- [RFC][PATCH 0/5] kbuild changes, thin archives, --gc-sections
- From: Nicholas Piggin <npiggin@xxxxxxxxx>
- Re: Generic section maintainers
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: Generic section maintainers
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: Generic section maintainers
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: Generic section maintainers
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: Generic section maintainers
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Generic section maintainers
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: Generic section maintainers
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 09/10] x86, pkeys: allow configuration of init_pkru
- From: Dave Hansen <dave@xxxxxxxx>
- Re: [RFC][PATCHSET v2] allowing exports in *.S
- From: Michal Marek <mmarek@xxxxxxx>
- Re: [PATCH 09/10] x86, pkeys: allow configuration of init_pkru
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH 08/10] x86, pkeys: default to a restrictive init PKRU
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH 08/10] x86, pkeys: default to a restrictive init PKRU
- From: Dave Hansen <dave@xxxxxxxx>
- Re: [PATCH 08/10] x86, pkeys: default to a restrictive init PKRU
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH 4/5] s390: Define AT_VECTOR_SIZE_ARCH for ARCH_DLINFO
- From: Martin Schwidefsky <schwidefsky@xxxxxxxxxx>
- Re: [PATCH 08/10] x86, pkeys: default to a restrictive init PKRU
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 08/10] x86, pkeys: default to a restrictive init PKRU
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 08/10] x86, pkeys: default to a restrictive init PKRU
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFC v3 05/13] sections.h: add sections header to collect all section info
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- [PATCH 05/10] x86: wire up protection keys system calls
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 06/10] generic syscalls: wire up memory protection keys syscalls
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 08/10] x86, pkeys: default to a restrictive init PKRU
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 03/10] x86, pkeys: make mprotect_key() mask off additional vm_flags
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 10/10] x86, pkeys: add self-tests
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 02/10] mm: implement new pkey_mprotect() system call
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 09/10] x86, pkeys: allow configuration of init_pkru
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 07/10] pkeys: add details of system call use to Documentation/
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 04/10] x86, pkeys: allocation/free syscalls
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 01/10] x86, pkeys: add fault handling for PF_PK page fault bit
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 00/10] [v6] System Calls for Memory Protection Keys
- From: Dave Hansen <dave@xxxxxxxx>
- Re: [RFC v3 07/13] tables.h: add linker table support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC v3 07/13] tables.h: add linker table support
- From: "H. Peter Anvin" <hpa@xxxxxxxxx>
- Re: [kernel-hardening] [PATCH v5 03/32] x86/cpa: In populate_pgd, don't set the pgd entry until it's populated
- From: Valdis.Kletnieks@xxxxxx
- Re: [PATCH 01/14] exceptions: fork exception table content from module.h into extable.h
- From: Rusty Russell <rusty@xxxxxxxxxxxxxxx>
- Re: [RFC v3 07/13] tables.h: add linker table support
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [RFC v3 13/13] kprobes: port blacklist kprobes to linker table
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [RFC v3 10/13] jump_label: port __jump_table to linker tables
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [RFC v3 00/13] linux: generalize sections, ranges and linker tables
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [RFC v3 12/13] kprobes: port .kprobes.text to section range
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- [PATCH memory-barriers.txt 3/5] memory-barriers.txt: Fix wrong section reference
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- [PATCH memory-barriers.txt 4/5] Doc/memory-barriers: Fix a typo of example result
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- [PATCH memory-barriers.txt 2/5] memory-barriers.txt: Maintain consistent blank line
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- [PATCH memory-barriers.txt 1/5] documentation: Clarify limited control-dependency scope
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- [PATCH memory-barriers.txt 0/5] Fixes and Korean translation
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 02/11] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- RE: [PATCH v3 02/11] mm: Hardened usercopy
- From: Michael Ellerman <mpe@xxxxxxxxxxxxxx>
- Re: [PATCH v4 12/12] mm: SLUB hardened usercopy support
- From: Laura Abbott <labbott@xxxxxxxxxx>
- Re: [PATCH v4 12/12] mm: SLUB hardened usercopy support
- From: Rik van Riel <riel@xxxxxxxxxx>
- Re: [PATCH v4 12/12] mm: SLUB hardened usercopy support
- From: Laura Abbott <labbott@xxxxxxxxxx>
- Re: [PATCH v4 12/12] mm: SLUB hardened usercopy support
- From: Rik van Riel <riel@xxxxxxxxxx>
- Re: [PATCH 5/5] tile: Define AT_VECTOR_SIZE_ARCH for ARCH_DLINFO
- From: Chris Metcalf <cmetcalf@xxxxxxxxxxxx>
- Re: [PATCH v4 12/12] mm: SLUB hardened usercopy support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 12/12] mm: SLUB hardened usercopy support
- From: Laura Abbott <labbott@xxxxxxxxxx>
- Re: [PATCH 5/5] tile: Define AT_VECTOR_SIZE_ARCH for ARCH_DLINFO
- From: James Hogan <james.hogan@xxxxxxxxxx>
- Re: [PATCH v4 00/12] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 04/14] arm64: migrate exception table users off module.h and onto extable.h
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH 3/5] arm64: Define AT_VECTOR_SIZE_ARCH for ARCH_DLINFO
- From: James Hogan <james.hogan@xxxxxxxxxx>
- [PATCH 2/5] ARM: Define AT_VECTOR_SIZE_ARCH for ARCH_DLINFO
- From: James Hogan <james.hogan@xxxxxxxxxx>
- [PATCH 4/5] s390: Define AT_VECTOR_SIZE_ARCH for ARCH_DLINFO
- From: James Hogan <james.hogan@xxxxxxxxxx>
- [PATCH 5/5] tile: Define AT_VECTOR_SIZE_ARCH for ARCH_DLINFO
- From: James Hogan <james.hogan@xxxxxxxxxx>
- [PATCH 0/5] Define AT_VECTOR_SIZE_ARCH correctly
- From: James Hogan <james.hogan@xxxxxxxxxx>
- [PATCH 1/5] MIPS: Define AT_VECTOR_SIZE_ARCH for ARCH_DLINFO
- From: James Hogan <james.hogan@xxxxxxxxxx>
- Re: [RFC v3 07/13] tables.h: add linker table support
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- Re: [RFC v3 13/13] kprobes: port blacklist kprobes to linker table
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- Re: [RFC v3 12/13] kprobes: port .kprobes.text to section range
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- Re: Is THREAD_INFO_IN_TASK appropriate for -mm for 4.8?
- From: Heiko Carstens <heiko.carstens@xxxxxxxxxx>
- Re: [RFC v3 00/13] linux: generalize sections, ranges and linker tables
- From: Richard Fontana <fontana@xxxxxxxxxxxxxxx>
- Re: [RFC v3 00/13] linux: generalize sections, ranges and linker tables
- From: Masami Hiramatsu <mhiramat@xxxxxxxxxx>
- RE: [PATCH v3 02/11] mm: Hardened usercopy
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 05/14] mips: migrate exception table users off module.h and onto extable.h
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH 02/14] x86: migrate exception table users off module.h and onto extable.h
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [RFC/PATCH 00/14] split exception table content out of module.h into extable.h
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH 10/14] tile: migrate exception table users off module.h and onto extable.h
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- [PATCH 02/14] x86: migrate exception table users off module.h and onto extable.h
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- [PATCH 03/14] arm: migrate exception table users off module.h and onto extable.h
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- [PATCH 12/14] parisc: migrate exception table users off module.h and onto extable.h
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- [PATCH 11/14] alpha: migrate exception table users off module.h and onto extable.h
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- [RFC/PATCH 00/14] split exception table content out of module.h into extable.h
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- [PATCH 07/14] powerpc: migrate exception table users off module.h and onto extable.h
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- [PATCH 09/14] s390: migrate exception table users off module.h and onto extable.h
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- [PATCH 14/14] module.h: remove extable.h include now users have migrated
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- [PATCH 04/14] arm64: migrate exception table users off module.h and onto extable.h
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- [PATCH 13/14] core: migrate exception table users off module.h and onto extable.h
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- [PATCH 08/14] m68k: migrate exception table users off module.h and onto extable.h
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- [PATCH 05/14] mips: migrate exception table users off module.h and onto extable.h
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- [PATCH 06/14] sparc: migrate exception table users off module.h and onto extable.h
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- [PATCH 01/14] exceptions: fork exception table content from module.h into extable.h
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- Re: [kernel-hardening] [PATCH v5 03/32] x86/cpa: In populate_pgd, don't set the pgd entry until it's populated
- From: Nicolai Stange <nicstange@xxxxxxxxx>
- Re: [PATCH v4 00/12] mm: Hardened usercopy
- From: Laura Abbott <labbott@xxxxxxxxxx>
- Re: [RFC v3 10/13] jump_label: port __jump_table to linker tables
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [RFC v3 10/13] jump_label: port __jump_table to linker tables
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [RFC v3 10/13] jump_label: port __jump_table to linker tables
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [RFC v3 05/13] sections.h: add sections header to collect all section info
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [RFC v3 05/13] sections.h: add sections header to collect all section info
- From: James Hogan <james.hogan@xxxxxxxxxx>
- Re: [RFC v3 02/13] dell-smo8800: include uaccess.h
- From: Pali Rohár <pali.rohar@xxxxxxxxx>
- [RFC v3 08/13] firmware/Makefile: force recompilation if makefile changes
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- [RFC v3 09/13] firmware: port built-in section to linker table
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- [RFC v3 13/13] kprobes: port blacklist kprobes to linker table
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- [RFC v3 12/13] kprobes: port .kprobes.text to section range
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- [RFC v3 11/13] dynamic_debug: port to use linker tables
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- [RFC v3 10/13] jump_label: port __jump_table to linker tables
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- [RFC v3 07/13] tables.h: add linker table support
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- [RFC v3 06/13] ranges.h: add helpers to build and identify Linux section ranges
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- [RFC v3 05/13] sections.h: add sections header to collect all section info
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- [RFC v3 04/13] sections.h: guard against asm and linker script
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- [RFC v3 03/13] scripts/module-common.lds: enable generation
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- [RFC v3 02/13] dell-smo8800: include uaccess.h
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- [RFC v3 01/13] x86: remove LTO_REFERENCE_INITCALL()
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- [RFC v3 00/13] linux: generalize sections, ranges and linker tables
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [kernel-hardening] [PATCH v5 03/32] x86/cpa: In populate_pgd, don't set the pgd entry until it's populated
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [kernel-hardening] [PATCH v5 03/32] x86/cpa: In populate_pgd, don't set the pgd entry until it's populated
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [kernel-hardening] [PATCH v5 03/32] x86/cpa: In populate_pgd, don't set the pgd entry until it's populated
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v3 02/11] mm: Hardened usercopy
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [kernel-hardening] [PATCH v5 03/32] x86/cpa: In populate_pgd, don't set the pgd entry until it's populated
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [kernel-hardening] [PATCH v5 03/32] x86/cpa: In populate_pgd, don't set the pgd entry until it's populated
- From: Mike Krinkin <krinkin.m.u@xxxxxxxxx>
- Re: [kernel-hardening] [PATCH v5 03/32] x86/cpa: In populate_pgd, don't set the pgd entry until it's populated
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [kernel-hardening] [PATCH v5 03/32] x86/cpa: In populate_pgd, don't set the pgd entry until it's populated
- From: Valdis.Kletnieks@xxxxxx
- Re: [Xen-devel] [RFC v2 7/7] kprobes: port to linker table
- From: "Luis R. Rodriguez" <mcgrof@xxxxxxxxxx>
- Re: [PATCH v3 02/11] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4] locking/qrwlock: Fix write unlock issue in big endian
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [RFD] Efficient unit test and fuzz tools for kernel/libc porting
- From: "Zhangjian (Bamvor)" <bamvor.zhangjian@xxxxxxxxxx>
- Re: [PATCH 04/17] arm: get rid of superfluous __GFP_REPEAT
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 04/12] x86/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 02/12] mm: Implement stack frame object validation
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 11/12] mm: SLAB hardened usercopy support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 07/12] ia64/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 03/12] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 05/12] ARM: uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 06/12] arm64/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 08/12] powerpc/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 10/12] s390/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 12/12] mm: SLUB hardened usercopy support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 09/12] sparc/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 00/12] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v4 01/12] mm: Add is_migrate_cma_page
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 00/11] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 00/11] mm: Hardened usercopy
- From: Rik van Riel <riel@xxxxxxxxxx>
- RE: [PATCH v3 00/11] mm: Hardened usercopy
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [RFD] Efficient unit test and fuzz tools for kernel/libc porting
- From: Joseph Myers <joseph@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 02/11] mm: Hardened usercopy
- From: Laura Abbott <labbott@xxxxxxxxxx>
- Re: [PATCH v3 00/11] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 02/11] mm: Hardened usercopy
- From: Balbir Singh <bsingharora@xxxxxxxxx>
- RE: [PATCH v3 00/11] mm: Hardened usercopy
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: Is THREAD_INFO_IN_TASK appropriate for -mm for 4.8?
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v3 02/11] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] mm: Add is_migrate_cma_page
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH] mm: Add is_migrate_cma_page
- From: Laura Abbott <labbott@xxxxxxxxxx>
- Re: [PATCH v3 02/11] mm: Hardened usercopy
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v3 02/11] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 02/11] mm: Hardened usercopy
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v3 02/11] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 02/11] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 02/11] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/2] arm/arm64: localise objcopy flags
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 0/2] arm/arm64: localise objcopy flags
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: Is THREAD_INFO_IN_TASK appropriate for -mm for 4.8?
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 0/2] arm/arm64: localise objcopy flags
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v3 02/11] mm: Hardened usercopy
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: Is THREAD_INFO_IN_TASK appropriate for -mm for 4.8?
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v3 02/11] mm: Hardened usercopy
- From: Laura Abbott <labbott@xxxxxxxxxx>
- Re: [PATCH v3 02/11] mm: Hardened usercopy
- From: Laura Abbott <labbott@xxxxxxxxxx>
- Is THREAD_INFO_IN_TASK appropriate for -mm for 4.8?
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 0/2] arm/arm64: localise objcopy flags
- From: Laura Abbott <labbott@xxxxxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Dave Hansen <dave@xxxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH v4] locking/qrwlock: Fix write unlock issue in big endian
- From: Pan Xinhui <xinhui.pan@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/11] mm: Hardened usercopy
- From: Balbir Singh <bsingharora@xxxxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [for-next][PATCH 3/7] ftrace: Reduce size of function graph entries
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- [PATCH v3 01/11] mm: Implement stack frame object validation
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 00/11] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 04/11] ARM: uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 05/11] arm64/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 02/11] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 11/11] mm: SLUB hardened usercopy support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 07/11] powerpc/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 09/11] s390/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 03/11] x86/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 08/11] sparc/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 10/11] mm: SLAB hardened usercopy support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v3 06/11] ia64/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v2 02/11] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v2 02/11] mm: Hardened usercopy
- From: Daniel Micay <danielmicay@xxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v2 02/11] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v2 02/11] mm: Hardened usercopy
- From: Daniel Micay <danielmicay@xxxxxxxxx>
- Re: [PATCH v2 1/2] arm64: implement FTRACE_WITH_REGS
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v2 2/2] arm64: implement live patching
- From: Paul Gortmaker <paul.gortmaker@xxxxxxxxxxxxx>
- Re: [PATCH v2 02/11] mm: Hardened usercopy
- From: Balbir Singh <bsingharora@xxxxxxxxx>
- Re: [PATCH v3] locking/qrwlock: Let qrwlock has same layout regardless of the endian
- From: panxinhui <xinhui@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 02/11] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 11/11] mm: SLUB hardened usercopy support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 02/11] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 02/11] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 11/11] mm: SLUB hardened usercopy support
- From: Balbir Singh <bsingharora@xxxxxxxxx>
- Re: [PATCH v2 02/11] mm: Hardened usercopy
- From: Balbir Singh <bsingharora@xxxxxxxxx>
- Re: [PATCH v2 02/11] mm: Hardened usercopy
- From: Rik van Riel <riel@xxxxxxxxxx>
- Re: [PATCH v3] locking/qrwlock: Let qrwlock has same layout regardless of the endian
- From: Boqun Feng <boqun.feng@xxxxxxxxx>
- Re: [PATCH v2 02/11] mm: Hardened usercopy
- From: Balbir Singh <bsingharora@xxxxxxxxx>
- Re: [PATCH v2 01/11] mm: Implement stack frame object validation
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v6 4/4] nmi_backtrace: generate one-line reports for idle cpus
- From: Chris Metcalf <cmetcalf@xxxxxxxxxxxx>
- [PATCH v6 0/4] improvements to the nmi_backtrace code
- From: Chris Metcalf <cmetcalf@xxxxxxxxxxxx>
- Re: [PATCH v5 01/32] bluetooth: Switch SMP to crypto_cipher_encrypt_one()
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v5 01/32] bluetooth: Switch SMP to crypto_cipher_encrypt_one()
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: [PATCH v2 01/11] mm: Implement stack frame object validation
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v5 01/32] bluetooth: Switch SMP to crypto_cipher_encrypt_one()
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH for -mm] signal: Consolidate {TS,TLF}_RESTORE_SIGMASK code
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v5 14/32] x86/mm/64: Enable vmapped stacks
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v2 01/11] mm: Implement stack frame object validation
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v5 14/32] x86/mm/64: Enable vmapped stacks
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v3] locking/qrwlock: Let qrwlock has same layout regardless of the endian
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3] locking/qrwlock: Let qrwlock has same layout regardless of the endian
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v5 14/32] x86/mm/64: Enable vmapped stacks
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: S3 resume regression [1cf4f629d9d2 ("cpu/hotplug: Move online calls to hotplugged cpu")]
- From: Feng Tang <feng.79.tang@xxxxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v3] locking/qrwlock: Let qrwlock has same layout regardless of the endian
- From: xinhui <xinhui.pan@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] locking/qrwlock: Let qrwlock has same layout regardless of the endian
- From: Waiman Long <waiman.long@xxxxxxx>
- Re: [PATCH v2 01/11] mm: Implement stack frame object validation
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v5 0/4] improvements to the nmi_backtrace code
- From: Chris Metcalf <cmetcalf@xxxxxxxxxxxx>
- Re: [PATCH v2 01/11] mm: Implement stack frame object validation
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 01/11] mm: Implement stack frame object validation
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH v2 10/11] mm: SLAB hardened usercopy support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 07/11] powerpc/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 08/11] sparc/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 09/11] s390/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 11/11] mm: SLUB hardened usercopy support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 06/11] ia64/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 05/11] arm64/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 02/11] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 0/11] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 03/11] x86/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 04/11] ARM: uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v2 01/11] mm: Implement stack frame object validation
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3] locking/qrwlock: Let qrwlock has same layout regardless of the endian
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3] locking/qrwlock: Let qrwlock has same layout regardless of the endian
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v5 00/32] virtually mapped stacks and thread_info cleanup
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v5 14/32] x86/mm/64: Enable vmapped stacks
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v5 00/32] virtually mapped stacks and thread_info cleanup
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: S3 resume regression [1cf4f629d9d2 ("cpu/hotplug: Move online calls to hotplugged cpu")]
- From: Ville Syrjälä <ville.syrjala@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/32] virtually mapped stacks and thread_info cleanup
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v5 14/32] x86/mm/64: Enable vmapped stacks
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH] arm64: take SHN_LIVEPATCH syms into account when calculating plt_max_entries
- From: Jessica Yu <jeyu@xxxxxxxxxx>
- Re: [PATCH v5 18/32] signal: Consolidate {TS,TLF}_RESTORE_SIGMASK code
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [kernel-hardening] [PATCH v5 13/32] x86/mm/64: In vmalloc_fault(), use CR3 instead of current->active_mm
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [kernel-hardening] [PATCH v5 13/32] x86/mm/64: In vmalloc_fault(), use CR3 instead of current->active_mm
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 0/2] arm/arm64: localise objcopy flags
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 2/2] arm: localise objcopy flags
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 0/2] arm/arm64: localise objcopy flags
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 1/2] arm64: localise Image objcopy flags
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v5 18/32] signal: Consolidate {TS,TLF}_RESTORE_SIGMASK code
- From: Brian Gerst <brgerst@xxxxxxxxx>
- Re: arm64: implement live patching
- From: Miroslav Benes <mbenes@xxxxxxx>
- Re: [PATCH v5 00/32] virtually mapped stacks and thread_info cleanup
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- [PATCH] printk: include <asm/sections.h> instead of <asm-generic/sections.h>
- From: Christoph Hellwig <hch@xxxxxx>
- Re: arm64: implement live patching
- From: Jessica Yu <jeyu@xxxxxxxxxx>
- [PATCH v5 01/32] bluetooth: Switch SMP to crypto_cipher_encrypt_one()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 02/32] x86/mm/hotplug: Don't remove PGD entries in remove_pagetable()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 05/32] mm: Track NR_KERNEL_STACK in KiB instead of number of stacks
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 06/32] mm: Fix memcg stack accounting for sub-page stacks
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 07/32] fork: Add generic vmalloced stack support
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 12/32] x86/dumpstack/64: Handle faults when printing the "Stack:" part of an OOPS
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 11/32] x86/dumpstack: Try harder to get a call trace on stack overflow
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 10/32] x86/dumpstack: Honor supplied @regs arg
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 08/32] dma-api: Teach the "DMA-from-stack" check about vmapped stacks
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 13/32] x86/mm/64: In vmalloc_fault(), use CR3 instead of current->active_mm
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 15/32] x86/mm: Improve stack-overflow #PF handling
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 16/32] x86: Move uaccess_err and sig_on_uaccess_err to thread_struct
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 14/32] x86/mm/64: Enable vmapped stacks
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 17/32] x86: Move addr_limit to thread_struct
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 19/32] x86/smp: Remove stack_smp_processor_id()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 18/32] signal: Consolidate {TS,TLF}_RESTORE_SIGMASK code
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 20/32] x86/smp: Remove unnecessary initialization of thread_info::cpu
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 21/32] x86/asm: Move 'status' from struct thread_info to struct thread_struct
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 22/32] kdb: Use task_cpu() instead of task_thread_info()->cpu
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 25/32] um: Stop conflating task_struct::stack with thread_info
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 24/32] x86/entry: Get rid of pt_regs_to_thread_info()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 26/32] sched: Allow putting thread_info into task_struct
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 30/32] x86/dumpstack: Pin the target stack in save_stack_trace_tsk()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 29/32] kthread: to_live_kthread() needs try_get_task_stack()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 28/32] sched: Add try_get_task_stack() and put_task_stack()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 27/32] x86: Move thread_info into task_struct
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 31/32] sched: Free the stack early if CONFIG_THREAD_INFO_IN_TASK
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 32/32] fork: Cache two thread stacks per cpu if CONFIG_VMAP_STACK is set
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 23/32] printk: When dumping regs, show the stack, not thread_info
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 09/32] x86/dumpstack: When OOPSing, rewind the stack before do_exit()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 04/32] x86/mm: Remove kernel_unmap_pages_in_pgd() and efi_cleanup_page_tables()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 03/32] x86/cpa: In populate_pgd, don't set the pgd entry until it's populated
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v5 00/32] virtually mapped stacks and thread_info cleanup
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 0/9] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/9] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH v3 06/13] fork: Add generic vmalloced stack support
- From: Andrey Ryabinin <ryabinin.a.a@xxxxxxxxx>
- Re: [kernel-hardening] [PATCH v4 26/29] sched: Allow putting thread_info into task_struct
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [kernel-hardening] [PATCH v4 26/29] sched: Allow putting thread_info into task_struct
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [kernel-hardening] [PATCH v4 26/29] sched: Allow putting thread_info into task_struct
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [kernel-hardening] [PATCH v4 26/29] sched: Allow putting thread_info into task_struct
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Dave Hansen <dave@xxxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Dave Hansen <dave@xxxxxxxx>
- Re: [PATCH v2 2/2] arm64: implement live patching
- From: Miroslav Benes <mbenes@xxxxxxx>
- Re: [kernel-hardening] [PATCH v4 26/29] sched: Allow putting thread_info into task_struct
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH 9/9] mm: SLUB hardened usercopy support
- From: Joonsoo Kim <iamjoonsoo.kim@xxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 0/9] mm: Hardened usercopy
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 0/9] mm: Hardened usercopy
- From: "PaX Team" <pageexec@xxxxxxxxxxx>
- Re: [PATCH 0/9] mm: Hardened usercopy
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 0/9] mm: Hardened usercopy
- From: "PaX Team" <pageexec@xxxxxxxxxxx>
- Re: [PATCH 0/9] mm: Hardened usercopy
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH 9/9] mm: SLUB hardened usercopy support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/9] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 0/9] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 1/2] arm64: implement FTRACE_WITH_REGS
- From: Torsten Duwe <duwe@xxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 0/9] mm: Hardened usercopy
- From: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
- Re: [PATCH 0/9] mm: Hardened usercopy
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH 9/9] mm: SLUB hardened usercopy support
- From: Valdis.Kletnieks@xxxxxx
- Re: [PATCH 0/9] mm: Hardened usercopy
- From: Rik van Riel <riel@xxxxxxxxxx>
- Re: [PATCH v2 1/2] arm64: implement FTRACE_WITH_REGS
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH 9/9] mm: SLUB hardened usercopy support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 1/2] arm64: implement FTRACE_WITH_REGS
- From: Torsten Duwe <duwe@xxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Dave Hansen <dave@xxxxxxxx>
- Re: [PATCH 0/9] [REVIEW-REQUEST] [v4] System Calls for Memory Protection Keys
- From: Hugh Dickins <hughd@xxxxxxxxxx>
- Re: [PATCH 0/9] mm: Hardened usercopy
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH 9/9] mm: SLUB hardened usercopy support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Dave Hansen <dave@xxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH 9/9] mm: SLUB hardened usercopy support
- From: Christoph Lameter <cl@xxxxxxxxx>
- Re: [PATCH 0/9] mm: Hardened usercopy
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH 9/9] mm: SLUB hardened usercopy support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v2 1/2] arm64: implement FTRACE_WITH_REGS
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v2 1/2] arm64: implement FTRACE_WITH_REGS
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v2 1/2] arm64: implement FTRACE_WITH_REGS
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v2 1/2] arm64: implement FTRACE_WITH_REGS
- From: Petr Mladek <pmladek@xxxxxxxx>
- Re: [PATCH v2 1/2] arm64: implement FTRACE_WITH_REGS
- From: Torsten Duwe <duwe@xxxxxx>
- Re: [PATCH v2 1/2] arm64: implement FTRACE_WITH_REGS
- From: Petr Mladek <pmladek@xxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH 9/9] mm: SLUB hardened usercopy support
- From: Christoph Lameter <cl@xxxxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Mel Gorman <mgorman@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/9] mm: implement new pkey_mprotect() system call
- From: Mel Gorman <mgorman@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/9] mm: Hardened usercopy
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 0/9] mm: Hardened usercopy
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 1/9] mm: Hardened usercopy
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [kernel-hardening] Re: [PATCH 9/9] mm: SLUB hardened usercopy support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/9] mm: Hardened usercopy
- From: Baruch Siach <baruch@xxxxxxxxxx>
- Re: [PATCH 1/9] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/9] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/9] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Dave Hansen <dave@xxxxxxxx>
- Re: [PATCH 0/9] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/9] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 4/9] arm64/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/9] mm: implement new pkey_mprotect() system call
- From: Dave Hansen <dave@xxxxxxxx>
- Re: [PATCH 1/9] mm: Hardened usercopy
- From: Rik van Riel <riel@xxxxxxxxxx>
- Re: [PATCH 1/9] mm: Hardened usercopy
- From: Rik van Riel <riel@xxxxxxxxxx>
- Re: [PATCH 1/9] x86, pkeys: add fault handling for PF_PK page fault bit
- From: Dave Hansen <dave@xxxxxxxx>
- Re: [PATCH 5/9] x86, pkeys: allocation/free syscalls
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Mel Gorman <mgorman@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/9] x86, pkeys: add fault handling for PF_PK page fault bit
- From: Mel Gorman <mgorman@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 5/9] x86, pkeys: allocation/free syscalls
- From: Mel Gorman <mgorman@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/9] [REVIEW-REQUEST] [v4] System Calls for Memory Protection Keys
- From: Mel Gorman <mgorman@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/9] mm: implement new pkey_mprotect() system call
- From: Mel Gorman <mgorman@xxxxxxxxxxxxxxxxxxx>
- [PATCH 1/9] x86, pkeys: add fault handling for PF_PK page fault bit
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 9/9] x86, pkeys: add self-tests
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 5/9] x86, pkeys: allocation/free syscalls
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 2/9] mm: implement new pkey_mprotect() system call
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 3/9] x86, pkeys: make mprotect_key() mask off additional vm_flags
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 6/9] x86, pkeys: add pkey set/get syscalls
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 8/9] pkeys: add details of system call use to Documentation/
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 7/9] generic syscalls: wire up memory protection keys syscalls
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 4/9] x86: wire up mprotect_key() system call
- From: Dave Hansen <dave@xxxxxxxx>
- [PATCH 0/9] [REVIEW-REQUEST] [v4] System Calls for Memory Protection Keys
- From: Dave Hansen <dave@xxxxxxxx>
- Re: [PATCH 4/9] arm64/uaccess: Enable hardened usercopy
- From: Mark Rutland <mark.rutland@xxxxxxx>
- [PATCH 12/93] clocksource/drivers/clksrc-probe: Introduce init functions with return code
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- [PATCH 72/93] clocksources: Switch back to the clksrc table
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [PATCH 1/9] mm: Hardened usercopy
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH 1/9] mm: Hardened usercopy
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH 0/9] mm: Hardened usercopy
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH 1/9] mm: Hardened usercopy
- From: Baruch Siach <baruch@xxxxxxxxxx>
- [PATCH 2/9] x86/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 4/9] arm64/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 1/9] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 7/9] sparc/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 8/9] mm: SLAB hardened usercopy support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 5/9] ia64/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 6/9] powerpc/uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 9/9] mm: SLUB hardened usercopy support
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 0/9] mm: Hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH 3/9] ARM: uaccess: Enable hardened usercopy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 08/29] dma-api: Teach the "DMA-from-stack" check about vmapped stacks
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 01/29] bluetooth: Switch SMP to crypto_cipher_encrypt_one()
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [RFD] Efficient unit test and fuzz tools for kernel/libc porting
- From: "Zhangjian (Bamvor)" <bamvor.zhangjian@xxxxxxxxxx>
- Re: [RFD] Efficient unit test and fuzz tools for kernel/libc porting
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [RFD] Efficient unit test and fuzz tools for kernel/libc porting
- From: "Zhangjian (Bamvor)" <bamvor.zhangjian@xxxxxxxxxx>
- Re: [RFD] Efficient unit test and fuzz tools for kernel/libc porting
- From: "Zhangjian (Bamvor)" <bamvor.zhangjian@xxxxxxxxxx>
- Re: [RFD] Efficient unit test and fuzz tools for kernel/libc porting
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [RFD] Efficient unit test and fuzz tools for kernel/libc porting
- From: "Zhangjian (Bamvor)" <bamvor.zhangjian@xxxxxxxxxx>
- Re: [PATCH v4 11/29] x86/dumpstack: When OOPSing, rewind the stack before do_exit
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 01/29] bluetooth: Switch SMP to crypto_cipher_encrypt_one()
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: [PATCH v2 1/2] arm64: implement FTRACE_WITH_REGS
- From: Torsten Duwe <duwe@xxxxxx>
- Re: [PATCH v4 10/29] x86/die: Don't try to recover from an OOPS on a non-default stack
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 10/29] x86/die: Don't try to recover from an OOPS on a non-default stack
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 10/29] x86/die: Don't try to recover from an OOPS on a non-default stack
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 1/2] arm64: implement FTRACE_WITH_REGS
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 10/29] x86/die: Don't try to recover from an OOPS on a non-default stack
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v4 10/29] x86/die: Don't try to recover from an OOPS on a non-default stack
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 09/29] fork: Add generic vmalloced stack support
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4] vmlinux.lds: account for destructor sections
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v3] vmlinux.lds: account for destructor sections
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH v4] vmlinux.lds: account for destructor sections
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH v4 09/29] fork: Add generic vmalloced stack support
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3] vmlinux.lds: account for destructor sections
- From: Andrey Ryabinin <ryabinin.a.a@xxxxxxxxx>
- Re: [PATCH v2 1/2] arm64: implement FTRACE_WITH_REGS
- From: Josh Poimboeuf <jpoimboe@xxxxxxxxxx>
- Re: [PATCH v4 08/29] dma-api: Teach the "DMA-from-stack" check about vmapped stacks
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 0/9] [v3] System Calls for Memory Protection Keys
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 0/9] [v3] System Calls for Memory Protection Keys
- From: Dave Hansen <dave@xxxxxxxx>
- Re: [PATCH v3] vmlinux.lds: account for destructor sections
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH 0/9] [v3] System Calls for Memory Protection Keys
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH v4 00/29] virtually mapped stacks and thread_info cleanup
- From: Mika Penttilä <mika.penttila@xxxxxxxxxxxx>
- Re: [PATCH v3] vmlinux.lds: account for destructor sections
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [RFC/PATCH v3] ftrace: Reduce size of function graph entries
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- Re: [PATCH v4 00/29] virtually mapped stacks and thread_info cleanup
- From: Mika Penttilä <mika.penttila@xxxxxxxxxxxx>
- Re: [RFC/PATCH v2] ftrace: Reduce size of function graph entries
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [RFC/PATCH v2] ftrace: Reduce size of function graph entries
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- Re: [RFC/PATCH v2] ftrace: Reduce size of function graph entries
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [RFC/PATCH v2] ftrace: Reduce size of function graph entries
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- Re: [RFC/PATCH v2] ftrace: Reduce size of function graph entries
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH v4 04/29] x86/cpa: In populate_pgd, don't set the pgd entry until it's populated
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 04/29] x86/cpa: In populate_pgd, don't set the pgd entry until it's populated
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2] locking/qrwlock: Let qrwlock has same layout regardless of the endian
- From: Will Deacon <will.deacon@xxxxxxx>
- Re: [PATCH v4 02/29] rxrpc: Avoid using stack memory in SG lists in rxkad
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 12/92] clocksource/drivers/clksrc-probe: Introduce init functions with return code
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- [PATCH 72/92] clocksources: Switch back to the clksrc table
- From: Daniel Lezcano <daniel.lezcano@xxxxxxxxxx>
- Re: [PATCH v4 02/29] rxrpc: Avoid using stack memory in SG lists in rxkad
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v4 02/29] rxrpc: Avoid using stack memory in SG lists in rxkad
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 02/29] rxrpc: Avoid using stack memory in SG lists in rxkad
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 02/29] rxrpc: Avoid using stack memory in SG lists in rxkad
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v4 02/29] rxrpc: Avoid using stack memory in SG lists in rxkad
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v4 02/29] rxrpc: Avoid using stack memory in SG lists in rxkad
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 02/29] rxrpc: Avoid using stack memory in SG lists in rxkad
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v4 02/29] rxrpc: Avoid using stack memory in SG lists in rxkad
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v4 02/29] rxrpc: Avoid using stack memory in SG lists in rxkad
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 02/29] rxrpc: Avoid using stack memory in SG lists in rxkad
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC/PATCH v2] ftrace: Reduce size of function graph entries
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- Re: [PATCH v4 01/29] bluetooth: Switch SMP to crypto_cipher_encrypt_one()
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 01/29] bluetooth: Switch SMP to crypto_cipher_encrypt_one()
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: [PATCH v4 15/29] x86/mm/64: Enable vmapped stacks
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 15/29] x86/mm/64: Enable vmapped stacks
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 15/29] x86/mm/64: Enable vmapped stacks
- From: Brian Gerst <brgerst@xxxxxxxxx>
- Re: [PATCH v4 15/29] x86/mm/64: Enable vmapped stacks
- From: Brian Gerst <brgerst@xxxxxxxxx>
- Re: [PATCH v4 15/29] x86/mm/64: Enable vmapped stacks
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 15/29] x86/mm/64: Enable vmapped stacks
- From: Brian Gerst <brgerst@xxxxxxxxx>
- Re: [PATCH v4 15/29] x86/mm/64: Enable vmapped stacks
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 15/29] x86/mm/64: Enable vmapped stacks
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH v2 1/2] arm64: implement FTRACE_WITH_REGS
- From: Torsten Duwe <duwe@xxxxxx>
- [PATCH v2 2/2] arm64: implement live patching
- From: Torsten Duwe <duwe@xxxxxx>
- [PATCH v2 0/2] arm64 live patching
- From: Torsten Duwe <duwe@xxxxxx>
- Re: [PATCH v4 15/29] x86/mm/64: Enable vmapped stacks
- From: Brian Gerst <brgerst@xxxxxxxxx>
- Re: [PATCH v4 15/29] x86/mm/64: Enable vmapped stacks
- From: Brian Gerst <brgerst@xxxxxxxxx>
- Re: [PATCH v3 00/13] Virtually mapped stacks with guard pages (x86, core)
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH] ilp32: fix {GET,SET}SIGMASK request for ptrace
- From: zhouchengming <zhouchengming1@xxxxxxxxxx>
- Re: [PATCH v4 01/29] bluetooth: Switch SMP to crypto_cipher_encrypt_one()
- From: Ingo Molnar <mingo@xxxxxxxxxx>
- Re: [PATCH 01/19] compat ABI: use non-compat openat and open_by_handle_at variants
- From: Andreas Schwab <schwab@xxxxxxx>
- Re: [PATCH v4 05/29] x86/mm: Remove kernel_unmap_pages_in_pgd() and efi_cleanup_page_tables()
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 01/29] bluetooth: Switch SMP to crypto_cipher_encrypt_one()
- From: Marcel Holtmann <marcel@xxxxxxxxxxxx>
- Re: undefined reference to `printk'
- From: Yoshinori Sato <ysato@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] ilp32: fix {GET,SET}SIGMASK request for ptrace
- From: Yury Norov <ynorov@xxxxxxxxxxxxxxxxxx>
- [PATCH] ilp32: fix {GET,SET}SIGMASK request for ptrace
- From: zhouchengming <zhouchengming1@xxxxxxxxxx>
- Re: [PATCH 12/19] arm64: ptrace: handle ptrace_request differently for aarch32 and ilp32
- From: zhouchengming <zhouchengming1@xxxxxxxxxx>
- Re: [PATCH v4 28/29] sched: Free the stack early if CONFIG_THREAD_INFO_IN_TASK
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 17/23] arm64: ptrace: handle ptrace_request differently for aarch32 and ilp32
- From: zhouchengming <zhouchengming1@xxxxxxxxxx>
- Re: [PATCH v4 22/29] x86/asm: Move 'status' from struct thread_info to struct thread_struct
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 22/29] x86/asm: Move 'status' from struct thread_info to struct thread_struct
- From: Brian Gerst <brgerst@xxxxxxxxx>
- Re: [PATCH v4 22/29] x86/asm: Move 'status' from struct thread_info to struct thread_struct
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 22/29] x86/asm: Move 'status' from struct thread_info to struct thread_struct
- From: Brian Gerst <brgerst@xxxxxxxxx>
- Re: [PATCH v4 25/29] um: Stop conflating task_struct::stack with thread_info
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v4 25/29] um: Stop conflating task_struct::stack with thread_info
- From: Brian Gerst <brgerst@xxxxxxxxx>
- [PATCH v4 15/29] x86/mm/64: Enable vmapped stacks
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 16/29] x86/mm: Improve stack-overflow #PF handling
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 17/29] x86: Move uaccess_err and sig_on_uaccess_err to thread_struct
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 03/29] x86/mm/hotplug: Don't remove PGD entries in remove_pagetable()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 05/29] x86/mm: Remove kernel_unmap_pages_in_pgd() and efi_cleanup_page_tables()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 09/29] fork: Add generic vmalloced stack support
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 20/29] x86/smp: Remove stack_smp_processor_id()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 10/29] x86/die: Don't try to recover from an OOPS on a non-default stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 18/29] x86: Move addr_limit to thread_struct
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 21/29] x86/smp: Remove unnecessary initialization of thread_info::cpu
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 19/29] signal: Consolidate {TS,TLF}_RESTORE_SIGMASK code
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 13/29] x86/dumpstack: Try harder to get a call trace on stack overflow
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 22/29] x86/asm: Move 'status' from struct thread_info to struct thread_struct
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 11/29] x86/dumpstack: When OOPSing, rewind the stack before do_exit
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 23/29] kdb: Use task_cpu() instead of task_thread_info()->cpu
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 25/29] um: Stop conflating task_struct::stack with thread_info
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 26/29] sched: Allow putting thread_info into task_struct
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 27/29] x86: Move thread_info into task_struct
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 29/29] fork: Cache two thread stacks per cpu if CONFIG_VMAP_STACK is set
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 28/29] sched: Free the stack early if CONFIG_THREAD_INFO_IN_TASK
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 24/29] x86/entry: Get rid of pt_regs_to_thread_info()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 12/29] x86/dumpstack: When dumping stack bytes due to OOPS, start with regs->sp
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 14/29] x86/dumpstack/64: Handle faults when printing the "Stack:" part of an OOPS
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 08/29] dma-api: Teach the "DMA-from-stack" check about vmapped stacks
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 07/29] mm: Fix memcg stack accounting for sub-page stacks
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 06/29] mm: Track NR_KERNEL_STACK in KiB instead of number of stacks
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 04/29] x86/cpa: In populate_pgd, don't set the pgd entry until it's populated
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 02/29] rxrpc: Avoid using stack memory in SG lists in rxkad
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 01/29] bluetooth: Switch SMP to crypto_cipher_encrypt_one()
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v4 00/29] virtually mapped stacks and thread_info cleanup
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v4 13/16] x86/dumpstack: Try harder to get a call trace on stack overflow
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v3 00/13] Virtually mapped stacks with guard pages (x86, core)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 00/13] Virtually mapped stacks with guard pages (x86, core)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v3 00/13] Virtually mapped stacks with guard pages (x86, core)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 17/23] arm64: ptrace: handle ptrace_request differently for aarch32 and ilp32
- From: Bamvor Zhang <bamv2005@xxxxxxxxx>
- Re: [PATCH 17/23] arm64: ptrace: handle ptrace_request differently for aarch32 and ilp32
- From: zhouchengming <zhouchengming1@xxxxxxxxxx>
- Re: [RFC/PATCH] ftrace: Reduce size of function graph entries
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- Re: [PATCH v3 00/13] Virtually mapped stacks with guard pages (x86, core)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH v4 2/2] kbuild: Remove stale asm-generic wrappers
- From: James Hogan <james.hogan@xxxxxxxxxx>
- [PATCH v4 0/2] kbuild: Remove stale asm-generic wrappers
- From: James Hogan <james.hogan@xxxxxxxxxx>
- Re: [PATCH v3 00/13] Virtually mapped stacks with guard pages (x86, core)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
[Index of Archives]
[Kernel Announce]
[IETF Annouce]
[Netdev]
[Netfilter]
[Bugtraq]