Andy Lutomirski ([email protected])

Number of posts: 4672 (1.04 per day)
First post: 2012-02-01 20:36:11
Last post: 2024-06-07 18:40:57

Date List Subject
2019-05-03 01:45:08 linux-kernel Re: [PATCH V32 01/27] Add the ability to lock down access to the running kernel image
2019-05-02 20:27:42 linux-kernel Re: [RFC][PATCH 1/2] x86: Allow breakpoints to emulate call functions
2019-05-02 00:31:07 linux-kernel Re: [RESEND PATCH v6 08/12] x86/fsgsbase/64: Use the per-CPU base as GSBASE at the paranoid_entry
2019-05-01 20:28:43 linux-kernel Re: [RESEND PATCH v6 08/12] x86/fsgsbase/64: Use the per-CPU base as GSBASE at the paranoid_entry
2019-04-30 16:47:57 linux-kernel Re: [PATCH v2 5/5] x86,vdso: Create .build-id links for unstripped vdso files
2019-04-29 16:09:52 linux-kernel Re: [PATCH] x86/entry/64: randomize kernel stack offset upon syscall
2019-04-28 23:28:29 linux-kernel Re: [PATCH 1/4] x86/thread_info: introduce ->ftrace_int3_stack member
2019-04-28 20:57:43 linux-kernel Re: [PATCH 1/4] x86/thread_info: introduce ->ftrace_int3_stack member
2019-04-28 18:09:42 linux-kernel Re: [PATCH 1/4] x86/thread_info: introduce ->ftrace_int3_stack member
2019-04-28 17:42:53 linux-kernel Re: [PATCH 1/4] x86/thread_info: introduce ->ftrace_int3_stack member
2019-04-27 14:00:46 linux-kernel Re: [PATCH] x86/entry/64: randomize kernel stack offset upon syscall
2019-04-26 19:23:49 linux-kernel Re: [RFC PATCH 2/7] x86/sci: add core implementation for system call isolation
2019-04-26 18:37:22 linux-kernel Re: [PATCH] x86/entry/64: randomize kernel stack offset upon syscall
2019-04-26 18:04:15 linux-kernel Re: [RFC PATCH 2/7] x86/sci: add core implementation for system call isolation
2019-04-26 15:08:55 linux-kernel Re: [RFC PATCH 2/7] x86/sci: add core implementation for system call isolation
2019-04-23 23:59:06 linux-kernel Re: Does vdso_install attempt to re-compile objects under root privilege?
2019-04-23 19:45:40 linux-kernel Re: [RFC PATCH v1 2/3] x86/vdso: Modify __vdso_sgx_enter_enclave() to allow parameter passing on untrusted stack
2019-04-23 16:08:43 linux-kernel Re: mmotm 2019-04-19-14-53 uploaded (objtool)
2019-04-22 15:31:08 linux-kernel Re: [PATCH] x86_64: uninline TASK_SIZE
2019-04-19 21:33:10 linux-kernel Re: [PATCH v20 00/28] Intel SGX1 support
2019-04-19 21:17:47 linux-kernel Re: [PATCH v20 00/28] Intel SGX1 support
2019-04-18 14:16:07 linux-kernel Re: [PATCH] x86_64: Disabling read-implies-exec when the stack is executable
2019-04-17 16:49:54 linux-kernel Re: RFC: on adding new CLONE_* flags [WAS Re: [PATCH 0/4] clone: add CLONE_PIDFD]
2019-04-14 20:09:26 linux-kernel Re: WARNING in compat_copy_entries (2)
2019-04-13 21:49:45 linux-kernel Re: [PATCH] new flag COPY_FILE_RANGE_FILESIZE for copy_file_range()
2019-04-12 17:16:40 linux-kernel Re: 1808d65b55 ("asm-generic/tlb: Remove arch_tlb*_mmu()"): BUG: KASAN: stack-out-of-bounds in __change_page_attr_set_clr
2019-04-07 14:04:35 linux-kernel Re: [patch V2 28/29] x86/irq/64: Remap the IRQ stack with guard pages
2019-04-07 09:29:02 linux-kernel Re: [patch V2 28/29] x86/irq/64: Remap the IRQ stack with guard pages
2019-04-07 09:27:53 linux-kernel Re: 8b275b3754 ("x86/irq/64: Remap the IRQ stack with guard pages"): BUG: unable to handle kernel paging request at ffffb659000a1000
2019-04-05 13:51:36 linux-kernel Re: [RESEND PATCH v6 08/12] x86/fsgsbase/64: Use the per-CPU base as GSBASE at the paranoid_entry
2019-04-03 00:37:10 linux-kernel Re: [patch 15/14] x86/dumpstack/64: Speedup in_exception_stack()
2019-04-02 16:12:57 linux-kernel Re: [patch 15/14] x86/dumpstack/64: Speedup in_exception_stack()
2019-04-01 16:19:02 linux-kernel Re: [PATCH v2 0/5] pid: add pidfd_open()
2019-04-01 02:14:32 linux-kernel Re: [PATCH v2 0/5] pid: add pidfd_open()
2019-03-31 20:43:06 linux-kernel Re: [PATCH v2 0/5] pid: add pidfd_open()
2019-03-28 16:30:36 linux-kernel Re: [RFC PATCH] x86/entry/64: randomize kernel stack offset upon syscall
2019-03-27 05:30:35 linux-kernel Re: [PATCH V31 25/25] debugfs: Disable open() when kernel is locked down
2019-03-21 18:06:23 linux-kernel Re: [RFC][PATCH] tracing/x86: Save CR2 before tracing irqsoff on error_entry
2019-03-20 14:53:49 linux-kernel Re: [RFC PATCH] x86/entry/64: randomize kernel stack offset upon syscall
2019-03-07 18:06:50 linux-kernel Re: [PATCH 07/20] x86/uaccess: Always inline force_valid_ss()
2019-03-03 01:11:03 linux-kernel Re: a.out coredumping: fix or delete?
2019-03-01 15:39:18 linux-kernel Re: [PATCH 6/8] i915,uaccess: Fix redundant CLAC
2019-02-25 16:51:43 linux-kernel Re: [PATCH 1/6] x86/uaccess: Dont evaluate argument inside AC region
2019-02-25 16:29:53 linux-kernel Re: [PATCH 2/6] x86/ia32: Fix ia32_restore_sigcontext AC leak
2019-02-25 15:55:31 linux-kernel Re: [PATCH 5/6] objtool: Add UACCESS validation
2019-02-25 15:45:14 linux-kernel Re: [PATCH 1/6] x86/uaccess: Dont evaluate argument inside AC region
2019-02-25 15:43:09 linux-kernel Re: [PATCH 2/6] x86/ia32: Fix ia32_restore_sigcontext AC leak
2019-02-25 15:38:19 linux-kernel Re: [RFC][PATCH] objtool: STAC/CLAC validation
2019-02-22 19:56:36 linux-kernel Re: [PATCH 1/2 v2] kprobe: Do not use uaccess functions to access kernel memory that can fault
2019-02-22 19:53:48 linux-kernel Re: [PATCH 1/2 v2] kprobe: Do not use uaccess functions to access kernel memory that can fault
2019-02-22 17:49:16 linux-kernel Re: [PATCH 1/2 v2] kprobe: Do not use uaccess functions to access kernel memory that can fault