messages from 2019-02-18 23:23:03 to 2019-03-21 00:34:23 UTC [more...]
[PATCH v2 0/4] RCU fixes for rcu_assign_pointer() usage
2019-03-21 0:34 UTC (2+ messages)
` [PATCH v2 1/4] sched/cpufreq: Annotate cpufreq_update_util_data pointer with __rcu
[PATCH v2 0/2] RFC: introduce CONFIG_INIT_ALL_MEMORY
2019-03-20 14:44 UTC (4+ messages)
` [PATCH v2 1/2] initmem: introduce CONFIG_INIT_ALL_MEMORY and CONFIG_INIT_ALL_STACK
` [PATCH v2 2/2] initmem: introduce CONFIG_INIT_ALL_HEAP
[RFC PATCH] x86/entry/64: randomize kernel stack offset upon syscall
2019-03-20 7:29 UTC (2+ messages)
[PATCH 0/2] gcc-plugins: structleak: Generalize to all variable types
2019-03-13 19:01 UTC (11+ messages)
` [PATCH 1/2] "
` [PATCH 2/2] lib: Introduce test_stackinit module
[GIT PULL] leaking_addresses: changes for v5.1-rc1
2019-03-09 19:55 UTC (2+ messages)
[PATCH v3 0/7] lib/string: Add strscpy_pad() function
2019-03-08 16:18 UTC (13+ messages)
` [PATCH v3 1/7] lib/test_printf: Add empty module_exit function
` [PATCH v3 2/7] kselftest: Add test runner creation script
` [PATCH v3 3/7] kselftest/lib: Use new shell runner to define tests
` [PATCH v3 4/7] kselftest: Add test module framework header
` [PATCH v3 5/7] lib: Use new kselftest header
` [PATCH v3 6/7] lib/string: Add strscpy_pad() function
` [PATCH v3 7/7] lib: Add test module for strscpy_pad
[PATCH 1/1] RFC: initmem: introduce CONFIG_INIT_ALL_MEMORY and CONFIG_INIT_ALL_STACK
2019-03-08 11:57 UTC (3+ messages)
[PATCH v2 00/20] Merge text_poke fixes and executable lockdowns
2019-03-07 20:25 UTC (26+ messages)
` [PATCH v2 10/20] x86: avoid W^X being broken during modules loading
` [PATCH] x86/cpufeature: Remove __pure attribute to _static_cpu_has()
` [PATCH v2 14/20] mm: Make hibernate handle unmapped pages
` [PATCH v2 15/20] vmalloc: New flags for safe vfree on special perms
[PATCH v2 0/3] x86/asm: More pinning
2019-02-27 20:01 UTC (4+ messages)
` [PATCH v2 1/3] x86/asm: Pin sensitive CR0 bits
` [PATCH v2 2/3] x86/asm: Avoid taking an exception before cr4 restore
` [PATCH v2 3/3] lkdtm: Check for SMEP clearing protections
[PATCH 0/3] x86/asm: More pinning
2019-02-27 19:45 UTC (9+ messages)
` [PATCH 1/3] x86/asm: Pin sensitive CR0 bits
` [PATCH 2/3] x86/asm: Avoid taking an exception before cr4 restore
` [PATCH 3/3] lkdtm: Check for SMEP clearing protections
` [PATCH v2] "
[PATCH v2 0/6] RCU fixes for rcu_assign_pointer() usage
2019-02-27 15:42 UTC (14+ messages)
` [PATCH v2 1/6] net: rtnetlink: Fix incorrect RCU API usage
` [PATCH v2 2/6] ixgbe: "
` [PATCH v2 3/6] sched/cpufreq: Annotate cpufreq_update_util_data pointer with __rcu
` [PATCH v2 4/6] sched_domain: Annotate RCU pointers properly
` [PATCH v2 5/6] rcuwait: Annotate task_struct with __rcu
` [PATCH v2 6/6] sched: Annotate perf_domain pointer "
[RFC PATCH] Early version of thread stack randomization
2019-02-27 11:03 UTC (28+ messages)
` [RFC PATCH] x86/entry/64: randomize kernel stack offset upon system call
[PATCH v2 0/1] lib/string: Add strscpy_pad() function
2019-02-27 4:40 UTC (7+ messages)
` [PATCH v2 1/1] "
[PATCH 0/6] lib: Add safe string funtions
2019-02-25 20:09 UTC (41+ messages)
` [PATCH 1/6] lib/string: Enable string selftesting
` [PATCH 2/6] lib/string: Fix erroneous 'overflow' documentation
` [PATCH 3/6] lib/string: Use correct docstring format
` [PATCH 4/6] lib/string: Add string copy/zero function
` [PATCH 5/6] lib: Fix function documentation for strncpy_from_user
` [PATCH 6/6] lib: Add function strscpy_from_user()
[PATCH v3 00/20] Merge text_poke fixes and executable lockdowns
2019-02-22 18:32 UTC (27+ messages)
` [PATCH v3 01/20] x86/jump_label: Use text_poke_early() during early init
` [PATCH v3 02/20] x86/mm: Introduce temporary mm structs
` [PATCH v3 03/20] x86/mm: Save DRs when loading a temporary mm
` [PATCH v3 04/20] fork: Provide a function for copying init_mm
` [PATCH v3 05/20] x86/alternative: Initialize temporary mm for patching
` [PATCH v3 06/20] x86/alternative: Use temporary mm for text poking
` [PATCH v3 07/20] x86/kgdb: Avoid redundant comparison of patched code
` [PATCH v3 08/20] x86/ftrace: Set trampoline pages as executable
` [PATCH v3 09/20] x86/kprobes: Set instruction page "
` [PATCH v3 10/20] x86/module: Avoid breaking W^X while loading modules
` [PATCH v3 11/20] x86/jump-label: Remove support for custom poker
` [PATCH v3 12/20] x86/alternative: Remove the return value of text_poke_*()
` [PATCH v3 13/20] x86/mm/cpa: Add set_direct_map_ functions
` [PATCH v3 14/20] mm: Make hibernate handle unmapped pages
` [PATCH v3 15/20] vmalloc: Add flag for free of special permsissions
` [PATCH v3 16/20] modules: Use vmalloc special flag
` [PATCH v3 17/20] bpf: "
` [PATCH v3 18/20] x86/ftrace: "
` [PATCH v3 19/20] x86/kprobes: "
` [PATCH v3 20/20] x86/alternative: Comment about module removal races
[PATCH 0/7] Kernel Userspace Protection for radix
2019-02-22 5:14 UTC (17+ messages)
` [PATCH 1/7] powerpc: Add framework for Kernel Userspace Protection
` [PATCH 2/7] powerpc: Add skeleton for Kernel Userspace Execution Prevention
` [PATCH 3/7] powerpc/mm: Add a framework for Kernel Userspace Access Protection
` [PATCH 4/7] powerpc/64: Setup KUP on secondary CPUs
` [PATCH 5/7] powerpc/mm/radix: Use KUEP API for Radix MMU
` [PATCH 6/7] powerpc/lib: Refactor __patch_instruction() to use __put_user_asm()
` [PATCH 7/7] powerpc/64s: Implement KUAP for Radix MMU
classes of methods for gaining access to kernel memory
2019-02-21 19:36 UTC (5+ messages)
[PATCH v3] x86/asm: Pin sensitive CR4 bits
2019-02-21 18:09 UTC
[PATCH v2] x86/asm: Pin sensitive CR4 bits
2019-02-21 17:37 UTC (7+ messages)
[PATCH] x86/asm: Pin sensitive CR4 bits
2019-02-20 17:01 UTC (5+ messages)
[PATCH v2 0/3] [PATCH v2 0/3] Kernel Userspace Protection for Radix MMU
2019-02-20 11:57 UTC (5+ messages)
` [PATCH v2 2/3] powerpc/lib: Refactor __patch_instruction() to use __put_user_asm()
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).