lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 05 Jun 2019 15:07:53 +0200
From:   Peter Zijlstra <>
        Ard Biesheuvel <>,
        Andy Lutomirski <>,
        Steven Rostedt <>,
        Peter Zijlstra <>,
        Ingo Molnar <>,
        Thomas Gleixner <>,
        Linus Torvalds <>,
        Masami Hiramatsu <>,
        Jason Baron <>, Jiri Kosina <>,
        David Laight <David.Laight@...LAB.COM>,
        Borislav Petkov <>,
        Julia Cartwright <>, Jessica Yu <>,
        "H. Peter Anvin" <>, Nadav Amit <>,
        Rasmus Villemoes <>,
        Edward Cree <>,
        Daniel Bristot de Oliveira <>
Subject: [PATCH 00/15] x86 cleanups and static_call()


Now that all the x86_64 int3_emulate_call() stuff is upstream, here are the
i386 patches and all the rest of the cleanups that resulted from that

And I figured I should have a go at making that static_call() thing working now
that we have the prerequisites sorted.  This is mostly a combination of the v2
and v3 static_call() patches done on top of an 'enhanced' text_poke_bp().

I wrote a little self-test and added Steve's ftrace convertion on top for
testing, and suspicously I've not had it explode, so I'm sure this is going to
set all your computers on fire.


Powered by blists - more mailing lists