LinuxLists
Users
About
Andy Lutomirski (
[email protected]
)
Number of posts: 4672 (1.04 per day)
First post: 2012-02-01 20:36:11
Last post: 2024-06-07 18:40:57
Previous Page
/
Next Page
Date
List
Subject
2019-05-03 01:45:08
linux-kernel
Re: [PATCH V32 01/27] Add the ability to lock down access to the running kernel image
2019-05-02 20:27:42
linux-kernel
Re: [RFC][PATCH 1/2] x86: Allow breakpoints to emulate call functions
2019-05-02 00:31:07
linux-kernel
Re: [RESEND PATCH v6 08/12] x86/fsgsbase/64: Use the per-CPU base as GSBASE at the paranoid_entry
2019-05-01 20:28:43
linux-kernel
Re: [RESEND PATCH v6 08/12] x86/fsgsbase/64: Use the per-CPU base as GSBASE at the paranoid_entry
2019-04-30 16:47:57
linux-kernel
Re: [PATCH v2 5/5] x86,vdso: Create .build-id links for unstripped vdso files
2019-04-29 16:09:52
linux-kernel
Re: [PATCH] x86/entry/64: randomize kernel stack offset upon syscall
2019-04-28 23:28:29
linux-kernel
Re: [PATCH 1/4] x86/thread_info: introduce ->ftrace_int3_stack member
2019-04-28 20:57:43
linux-kernel
Re: [PATCH 1/4] x86/thread_info: introduce ->ftrace_int3_stack member
2019-04-28 18:09:42
linux-kernel
Re: [PATCH 1/4] x86/thread_info: introduce ->ftrace_int3_stack member
2019-04-28 17:42:53
linux-kernel
Re: [PATCH 1/4] x86/thread_info: introduce ->ftrace_int3_stack member
2019-04-27 14:00:46
linux-kernel
Re: [PATCH] x86/entry/64: randomize kernel stack offset upon syscall
2019-04-26 19:23:49
linux-kernel
Re: [RFC PATCH 2/7] x86/sci: add core implementation for system call isolation
2019-04-26 18:37:22
linux-kernel
Re: [PATCH] x86/entry/64: randomize kernel stack offset upon syscall
2019-04-26 18:04:15
linux-kernel
Re: [RFC PATCH 2/7] x86/sci: add core implementation for system call isolation
2019-04-26 15:08:55
linux-kernel
Re: [RFC PATCH 2/7] x86/sci: add core implementation for system call isolation
2019-04-23 23:59:06
linux-kernel
Re: Does vdso_install attempt to re-compile objects under root privilege?
2019-04-23 19:45:40
linux-kernel
Re: [RFC PATCH v1 2/3] x86/vdso: Modify __vdso_sgx_enter_enclave() to allow parameter passing on untrusted stack
2019-04-23 16:08:43
linux-kernel
Re: mmotm 2019-04-19-14-53 uploaded (objtool)
2019-04-22 15:31:08
linux-kernel
Re: [PATCH] x86_64: uninline TASK_SIZE
2019-04-19 21:33:10
linux-kernel
Re: [PATCH v20 00/28] Intel SGX1 support
2019-04-19 21:17:47
linux-kernel
Re: [PATCH v20 00/28] Intel SGX1 support
2019-04-18 14:16:07
linux-kernel
Re: [PATCH] x86_64: Disabling read-implies-exec when the stack is executable
2019-04-17 16:49:54
linux-kernel
Re: RFC: on adding new CLONE_* flags [WAS Re: [PATCH 0/4] clone: add CLONE_PIDFD]
2019-04-14 20:09:26
linux-kernel
Re: WARNING in compat_copy_entries (2)
2019-04-13 21:49:45
linux-kernel
Re: [PATCH] new flag COPY_FILE_RANGE_FILESIZE for copy_file_range()
2019-04-12 17:16:40
linux-kernel
Re: 1808d65b55 ("asm-generic/tlb: Remove arch_tlb*_mmu()"): BUG: KASAN: stack-out-of-bounds in __change_page_attr_set_clr
2019-04-07 14:04:35
linux-kernel
Re: [patch V2 28/29] x86/irq/64: Remap the IRQ stack with guard pages
2019-04-07 09:29:02
linux-kernel
Re: [patch V2 28/29] x86/irq/64: Remap the IRQ stack with guard pages
2019-04-07 09:27:53
linux-kernel
Re: 8b275b3754 ("x86/irq/64: Remap the IRQ stack with guard pages"): BUG: unable to handle kernel paging request at ffffb659000a1000
2019-04-05 13:51:36
linux-kernel
Re: [RESEND PATCH v6 08/12] x86/fsgsbase/64: Use the per-CPU base as GSBASE at the paranoid_entry
2019-04-03 00:37:10
linux-kernel
Re: [patch 15/14] x86/dumpstack/64: Speedup in_exception_stack()
2019-04-02 16:12:57
linux-kernel
Re: [patch 15/14] x86/dumpstack/64: Speedup in_exception_stack()
2019-04-01 16:19:02
linux-kernel
Re: [PATCH v2 0/5] pid: add pidfd_open()
2019-04-01 02:14:32
linux-kernel
Re: [PATCH v2 0/5] pid: add pidfd_open()
2019-03-31 20:43:06
linux-kernel
Re: [PATCH v2 0/5] pid: add pidfd_open()
2019-03-28 16:30:36
linux-kernel
Re: [RFC PATCH] x86/entry/64: randomize kernel stack offset upon syscall
2019-03-27 05:30:35
linux-kernel
Re: [PATCH V31 25/25] debugfs: Disable open() when kernel is locked down
2019-03-21 18:06:23
linux-kernel
Re: [RFC][PATCH] tracing/x86: Save CR2 before tracing irqsoff on error_entry
2019-03-20 14:53:49
linux-kernel
Re: [RFC PATCH] x86/entry/64: randomize kernel stack offset upon syscall
2019-03-07 18:06:50
linux-kernel
Re: [PATCH 07/20] x86/uaccess: Always inline force_valid_ss()
2019-03-03 01:11:03
linux-kernel
Re: a.out coredumping: fix or delete?
2019-03-01 15:39:18
linux-kernel
Re: [PATCH 6/8] i915,uaccess: Fix redundant CLAC
2019-02-25 16:51:43
linux-kernel
Re: [PATCH 1/6] x86/uaccess: Dont evaluate argument inside AC region
2019-02-25 16:29:53
linux-kernel
Re: [PATCH 2/6] x86/ia32: Fix ia32_restore_sigcontext AC leak
2019-02-25 15:55:31
linux-kernel
Re: [PATCH 5/6] objtool: Add UACCESS validation
2019-02-25 15:45:14
linux-kernel
Re: [PATCH 1/6] x86/uaccess: Dont evaluate argument inside AC region
2019-02-25 15:43:09
linux-kernel
Re: [PATCH 2/6] x86/ia32: Fix ia32_restore_sigcontext AC leak
2019-02-25 15:38:19
linux-kernel
Re: [RFC][PATCH] objtool: STAC/CLAC validation
2019-02-22 19:56:36
linux-kernel
Re: [PATCH 1/2 v2] kprobe: Do not use uaccess functions to access kernel memory that can fault
2019-02-22 19:53:48
linux-kernel
Re: [PATCH 1/2 v2] kprobe: Do not use uaccess functions to access kernel memory that can fault
2019-02-22 17:49:16
linux-kernel
Re: [PATCH 1/2 v2] kprobe: Do not use uaccess functions to access kernel memory that can fault