Linux API
[Prev Page][Next Page]
- Re: [PATCH v19 3/7] x86/cet/ibt: Handle signals for Indirect Branch Tracking
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v19 1/7] x86/cet/ibt: Update Kconfig for user-mode Indirect Branch Tracking
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [Patch v4 1/3] lib: Restrict cpumask_local_spread to houskeeping CPUs
- From: Nitesh Narayan Lal <nitesh@xxxxxxxxxx>
- Re: [Patch v4 1/3] lib: Restrict cpumask_local_spread to houskeeping CPUs
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- [PATCH RESEND] entry: Use different define for selector variable in SUD
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: [Patch v4 1/3] lib: Restrict cpumask_local_spread to houskeeping CPUs
- From: Nitesh Narayan Lal <nitesh@xxxxxxxxxx>
- Re: [Patch v4 1/3] lib: Restrict cpumask_local_spread to houskeeping CPUs
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- [PATCH 1/2] Add namespace tags that can be used for matching without pinning a ns
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/2] keys: Allow request_key upcalls from a container to be intercepted
- From: David Howells <dhowells@xxxxxxxxxx>
- [RFC][PATCH 0/2] keys: request_key() interception in containers
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/3] arm64/ptrace: don't clobber task registers on syscall entry/exit traps
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v5 1/5] uapi: Move the aux vector AT_MINSIGSTKSZ define to uapi
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH 3/3] selftest/arm64/ptrace: add tests for PTRACE_O_ARM64_RAW_REGS
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 2/3] arm64/ptrace: introduce PTRACE_O_ARM64_RAW_REGS
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 1/3] arm64/ptrace: don't clobber task registers on syscall entry/exit traps
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH 0/3 v2] arm64/ptrace: allow to get all registers on syscall traps
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v16 06/11] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v28 03/12] landlock: Set up the security framework and manage credentials
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v28 02/12] landlock: Add ruleset and domain management
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH v19 01/25] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 05/25] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 03/25] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 00/25] Control-flow Enforcement: Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 16/25] mm: Add guard pages around a shadow stack.
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 14/25] x86/mm: Update maybe_mkwrite() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 09/25] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 18/25] mm: Update can_follow_write_pte() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 17/25] mm/mmap: Add shadow stack pages to memory accounting
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 23/25] x86/cet/shstk: Handle thread shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 22/25] ELF: Introduce arch_setup_elf_property()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 2/7] x86/cet/ibt: User-mode Indirect Branch Tracking support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 7/7] x86/vdso: Insert endbr32/endbr64 to vDSO
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 0/7] Control-flow Enforcement: Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 3/7] x86/cet/ibt: Handle signals for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 6/7] x86/vdso/32: Add ENDBR32 to __kernel_vsyscall entry point
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 4/7] x86/cet/ibt: Update ELF header parsing for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 5/7] x86/cet/ibt: Update arch_prctl functions for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 1/7] x86/cet/ibt: Update Kconfig for user-mode Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 24/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 25/25] mm: Introduce PROT_SHSTK for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 21/25] x86/cet/shstk: Handle signals for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 20/25] x86/cet/shstk: User-mode shadow stack support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 15/25] mm: Fixup places that call pte_mkwrite() directly
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 19/25] mm: Re-introduce vm_flags to do_mmap()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 11/25] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 12/25] mm: Introduce VM_SHSTK for shadow stack memory
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 13/25] x86/mm: Shadow Stack page fault error checking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 10/25] x86/mm: Update pte_modify for _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 08/25] x86/mm: Introduce _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 07/25] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 06/25] x86/cet: Add control-protection fault handler
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 04/25] x86/cpufeatures: Introduce X86_FEATURE_CET and setup functions
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v19 02/25] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v18 24/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v18 24/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v18 24/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- [PATCH v5 5/5] selftest/x86/signal: Include test cases for validating sigaltstack
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v5 4/5] x86/signal: Detect and prevent an alternate signal stack overflow
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v5 3/5] x86/elf: Support a new ELF aux vector AT_MINSIGSTKSZ
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v5 2/5] x86/signal: Introduce helpers to get the maximum signal frame size
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v5 1/5] uapi: Move the aux vector AT_MINSIGSTKSZ define to uapi
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v5 0/5] x86: Improve Minimum Alternate Stack Size
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v7 00/10] fs: interface for directly reading/writing compressed data
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v28 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v28 08/12] landlock: Add syscall implementations
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v28 01/12] landlock: Add object management
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v16 06/11] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH] procfs/dmabuf: Add /proc/<pid>/task/<tid>/dmabuf_fds
- From: Daniel Vetter <daniel@xxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v3 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v28 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v28 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v28 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v28 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v28 03/12] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v28 09/12] arch: Wire up Landlock syscalls
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v28 10/12] selftests/landlock: Add user space tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v28 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v28 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v28 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v28 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v28 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v28 04/12] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v3 1/1] process_madvise.2: Add process_madvise man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v3 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 0/3 v2] arm64/ptrace: allow to get all registers on syscall traps
- From: Keno Fischer <keno@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v18 05/25] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v18 05/25] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v18 05/25] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v18 05/25] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v18 21/25] x86/cet/shstk: Handle signals for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v18 21/25] x86/cet/shstk: Handle signals for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v18 05/25] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- [PATCH 3/3] selftest/arm64/ptrace: add tests for PTRACE_O_ARM64_RAW_REGS
- From: Andrei Vagin <avagin@xxxxxxxxx>
- [PATCH 1/3] arm64/ptrace: don't clobber task registers on syscall entry/exit traps
- From: Andrei Vagin <avagin@xxxxxxxxx>
- [PATCH 2/3] arm64/ptrace: introduce PTRACE_O_ARM64_RAW_REGS
- From: Andrei Vagin <avagin@xxxxxxxxx>
- [PATCH 0/3 v2] arm64/ptrace: allow to get all registers on syscall traps
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: [EXT] Re: [Patch v4 1/3] lib: Restrict cpumask_local_spread to houskeeping CPUs
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- Re: [PATCH 0/6] fs-verity: add an ioctl to read verity metadata
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v18 05/25] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 1/1] process_madvise.2: Add process_madvise man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v3] mm/page_alloc: count CMA pages per zone and print them in /proc/zoneinfo
- From: David Rientjes <rientjes@xxxxxxxxxx>
- RE: [PATCH] af_unix: Allow Unix sockets to raise SIGURG
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [NEEDS-REVIEW] [PATCH v18 05/25] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH] af_unix: Allow Unix sockets to raise SIGURG
- From: Shoaib Rao <rao.shoaib@xxxxxxxxxx>
- Re: [PATCH] af_unix: Allow Unix sockets to raise SIGURG
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH] af_unix: Allow Unix sockets to raise SIGURG
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH v18 02/25] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [NEEDS-REVIEW] [PATCH v18 05/25] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] af_unix: Allow Unix sockets to raise SIGURG
- From: Shoaib Rao <rao.shoaib@xxxxxxxxxx>
- Re: [PATCH v18 02/25] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] af_unix: Allow Unix sockets to raise SIGURG
- From: Shoaib Rao <rao.shoaib@xxxxxxxxxx>
- Re: [PATCH v18 02/25] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] af_unix: Allow Unix sockets to raise SIGURG
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH] af_unix: Allow Unix sockets to raise SIGURG
- From: Shoaib Rao <rao.shoaib@xxxxxxxxxx>
- Re: [PATCH] af_unix: Allow Unix sockets to raise SIGURG
- From: Shoaib Rao <rao.shoaib@xxxxxxxxxx>
- Re: [PATCH] af_unix: Allow Unix sockets to raise SIGURG
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH v18 02/25] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v18 02/25] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH] af_unix: Allow Unix sockets to raise SIGURG
- From: Shoaib Rao <rao.shoaib@xxxxxxxxxx>
- Re: [PATCH v18 24/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH] af_unix: Allow Unix sockets to raise SIGURG
- From: Shoaib Rao <rao.shoaib@xxxxxxxxxx>
- Re: [PATCH v18 02/25] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] af_unix: Allow Unix sockets to raise SIGURG
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v18 24/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] af_unix: Allow Unix sockets to raise SIGURG
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH v18 24/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH] af_unix: Allow Unix sockets to raise SIGURG
- From: Shoaib Rao <rao.shoaib@xxxxxxxxxx>
- Re: [EXT] Re: [Patch v4 1/3] lib: Restrict cpumask_local_spread to houskeeping CPUs
- From: Alex Belits <abelits@xxxxxxxxxxx>
- Re: [PATCH v18 24/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v7 00/10] fs: interface for directly reading/writing compressed data
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v3] mm/page_alloc: count CMA pages per zone and print them in /proc/zoneinfo
- From: Oscar Salvador <osalvador@xxxxxxx>
- Re: [PATCH v3] mm/page_alloc: count CMA pages per zone and print them in /proc/zoneinfo
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v2 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2] mm/page_alloc: count CMA pages per zone and print them in /proc/zoneinfo
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2] mm/page_alloc: count CMA pages per zone and print them in /proc/zoneinfo
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: [PATCH v2] mm/page_alloc: count CMA pages per zone and print them in /proc/zoneinfo
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2] mm/page_alloc: count CMA pages per zone and print them in /proc/zoneinfo
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: [PATCH v2] mm/page_alloc: count CMA pages per zone and print them in /proc/zoneinfo
- From: Oscar Salvador <osalvador@xxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] process_madvise.2: Add process_madvise man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [Patch v4 1/3] lib: Restrict cpumask_local_spread to houskeeping CPUs
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [Patch v4 1/3] lib: Restrict cpumask_local_spread to houskeeping CPUs
- From: Nitesh Narayan Lal <nitesh@xxxxxxxxxx>
- Re: [Patch v4 1/3] lib: Restrict cpumask_local_spread to houskeeping CPUs
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- Re: [Patch v4 1/3] lib: Restrict cpumask_local_spread to houskeeping CPUs
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- [PATCH v2] mm/page_alloc: count CMA pages per zone and print them in /proc/zoneinfo
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [Patch v4 1/3] lib: Restrict cpumask_local_spread to houskeeping CPUs
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Christoph Lameter <cl@xxxxxxxxx>
- Re: [Patch v4 1/3] lib: Restrict cpumask_local_spread to houskeeping CPUs
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: James Bottomley <jejb@xxxxxxxxxxxxx>
- Re: [PATCH v16 08/11] secretmem: add memcg accounting
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH v16 08/11] secretmem: add memcg accounting
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH v16 08/11] secretmem: add memcg accounting
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v16 08/11] secretmem: add memcg accounting
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Christoph Lameter <cl@xxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH 1/1] process_madvise.2: Add process_madvise man page
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH] procfs/dmabuf: Add /proc/<pid>/task/<tid>/dmabuf_fds
- From: Pekka Paalanen <ppaalanen@xxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v16 08/11] secretmem: add memcg accounting
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH 2/6] fs-verity: don't pass whole descriptor to fsverity_verify_signature()
- From: Amy Parker <enbyamy@xxxxxxxxx>
- Re: [PATCH 4/6] fs-verity: support reading Merkle tree with ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH 3/6] fs-verity: add FS_IOC_READ_VERITY_METADATA ioctl
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- Re: [PATCH 5/6] fs-verity: support reading descriptor with ioctl
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- Re: [PATCH 6/6] fs-verity: support reading signature with ioctl
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- Re: [PATCH 4/6] fs-verity: support reading Merkle tree with ioctl
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- Re: [PATCH 2/6] fs-verity: don't pass whole descriptor to fsverity_verify_signature()
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- Re: [PATCH 1/6] fs-verity: factor out fsverity_get_descriptor()
- From: Jaegeuk Kim <jaegeuk@xxxxxxxxxx>
- [PATCH v18 5/7] x86/cet/ibt: Update arch_prctl functions for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 0/7] Control-flow Enforcement: Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 23/25] x86/cet/shstk: Handle thread shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 3/7] x86/cet/ibt: Handle signals for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 6/7] x86/vdso/32: Add ENDBR32 to __kernel_vsyscall entry point
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 25/25] mm: Introduce PROT_SHSTK for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 2/7] x86/cet/ibt: User-mode Indirect Branch Tracking support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 4/7] x86/cet/ibt: Update ELF header parsing for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 1/7] x86/cet/ibt: Update Kconfig for user-mode Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 24/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 21/25] x86/cet/shstk: Handle signals for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 22/25] ELF: Introduce arch_setup_elf_property()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 20/25] x86/cet/shstk: User-mode shadow stack support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 7/7] x86/vdso: Insert endbr32/endbr64 to vDSO
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 17/25] mm/mmap: Add shadow stack pages to memory accounting
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 18/25] mm: Update can_follow_write_pte() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 19/25] mm: Re-introduce vm_flags to do_mmap()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 16/25] mm: Add guard pages around a shadow stack.
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 15/25] mm: Fixup places that call pte_mkwrite() directly
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 00/25] Control-flow Enforcement: Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 01/25] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 08/25] x86/mm: Introduce _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 06/25] x86/cet: Add control-protection fault handler
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 13/25] x86/mm: Shadow Stack page fault error checking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 14/25] x86/mm: Update maybe_mkwrite() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 11/25] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 10/25] x86/mm: Update pte_modify for _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 12/25] mm: Introduce VM_SHSTK for shadow stack memory
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 07/25] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 02/25] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 09/25] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 05/25] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 04/25] x86/cpufeatures: Introduce X86_FEATURE_CET and setup functions
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v18 03/25] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v27 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v16 08/11] secretmem: add memcg accounting
- From: Roman Gushchin <guro@xxxxxx>
- Re: [PATCH] procfs/dmabuf: Add /proc/<pid>/task/<tid>/dmabuf_fds
- From: Kalesh Singh <kaleshsingh@xxxxxxxxxx>
- Re: [PATCH 1/8] quota: Allow to pass mount path to quotactl
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 1/8] quota: Allow to pass mount path to quotactl
- From: Jan Kara <jack@xxxxxxx>
- Re: [Patch v4 1/3] lib: Restrict cpumask_local_spread to houskeeping CPUs
- From: Nitesh Narayan Lal <nitesh@xxxxxxxxxx>
- Re: [Patch v4 1/3] lib: Restrict cpumask_local_spread to houskeeping CPUs
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [Patch v4 1/3] lib: Restrict cpumask_local_spread to houskeeping CPUs
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- Re: [Patch v4 1/3] lib: Restrict cpumask_local_spread to houskeeping CPUs
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [Patch v4 1/3] lib: Restrict cpumask_local_spread to houskeeping CPUs
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- Re: [Patch v4 1/3] lib: Restrict cpumask_local_spread to houskeeping CPUs
- From: Robin Murphy <robin.murphy@xxxxxxx>
- Re: [PATCH] procfs/dmabuf: Add /proc/<pid>/task/<tid>/dmabuf_fds
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH] procfs/dmabuf: Add /proc/<pid>/task/<tid>/dmabuf_fds
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH] procfs/dmabuf: Add /proc/<pid>/task/<tid>/dmabuf_fds
- From: Christian König <christian.koenig@xxxxxxx>
- Re: [PATCH] procfs/dmabuf: Add /proc/<pid>/task/<tid>/dmabuf_fds
- From: Christian König <christian.koenig@xxxxxxx>
- Re: [PATCH] procfs/dmabuf: Add /proc/<pid>/task/<tid>/dmabuf_fds
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH] procfs/dmabuf: Add /proc/<pid>/task/<tid>/dmabuf_fds
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH] procfs/dmabuf: Add /proc/<pid>/task/<tid>/dmabuf_fds
- From: Christian König <christian.koenig@xxxxxxx>
- Re: [PATCH] procfs/dmabuf: Add /proc/<pid>/task/<tid>/dmabuf_fds
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] procfs/dmabuf: Add /proc/<pid>/task/<tid>/dmabuf_fds
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v15 03/11] riscv/Kconfig: make direct map manipulation options depend on MMU
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH v6 00/40] idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v3 (resend)] tee: Add -q, --quiet, --silent option to not write to stdout
- From: Alex Henrie <alexhenrie24@xxxxxxxxx>
- [PATCH v24 24/25] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v17 11/26] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v17 11/26] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 0/6] fs-verity: add an ioctl to read verity metadata
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 1/1] process_madvise.2: Add process_madvise man page
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v3 (resend)] tee: Add -q, --quiet, --silent option to not write to stdout
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH v3 (resend)] tee: Add -q, --quiet, --silent option to not write to stdout
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH v16 06/11] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v16 08/11] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v17 11/26] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v16 08/11] secretmem: add memcg accounting
- From: Michal Hocko <mhocko@xxxxxxxx>
- [PATCH v24 14/25] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v16 06/11] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v16 06/11] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v16 06/11] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v16 08/11] secretmem: add memcg accounting
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v16 06/11] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v16 08/11] secretmem: add memcg accounting
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v16 08/11] secretmem: add memcg accounting
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v6 3/3] arm64: pac: Optimize kernel entry/exit key installation code paths
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v6 1/3] arm64: mte: make the per-task SCTLR_EL1 field usable elsewhere
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v6 2/3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Will Deacon <will@xxxxxxxxxx>
- Re: [PATCH v17 11/26] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v16 06/11] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v16 06/11] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v16 06/11] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v17 11/26] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH] af_unix: Allow Unix sockets to raise SIGURG
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH v17 11/26] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v17 11/26] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v16 08/11] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v16 06/11] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v16 08/11] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v17 11/26] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v7 04/10] btrfs: fix check_data_csum() error message for direct I/O
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v7 02/10] fs: add O_ALLOW_ENCODED open flag
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v17 11/26] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v16 10/11] arch, mm: wire up memfd_secret system call where relevant
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v16 08/11] secretmem: add memcg accounting
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH v16 08/11] secretmem: add memcg accounting
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v16 06/11] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v16 08/11] secretmem: add memcg accounting
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v3 (resend)] tee: Add -q, --quiet, --silent option to not write to stdout
- From: Philipp-Joachim Ost <pj@xxxxxx>
- Re: [PATCH v3 (resend)] tee: Add -q, --quiet, --silent option to not write to stdout
- From: Bernhard Voelker <mail@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: "J. Bruce Fields" <bfields@xxxxxxxxxxxx>
- Re: [PATCH v3 (resend)] tee: Add -q, --quiet, --silent option to not write to stdout
- From: Otto Moerbeek <otto@xxxxxxxxx>
- Re: [PATCH v3 (resend)] tee: Add -q, --quiet, --silent option to not write to stdout
- From: Alex Henrie <alexhenrie24@xxxxxxxxx>
- [RFC][PATCH 2/2] fanotify: support limited functionality for unprivileged users
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [RFC][PATCH 1/2] fanotify: configurable limits via sysfs
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [RFC][PATCH 0/2] unprivileged fanotify listener
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v3 (resend)] tee: Add -q, --quiet, --silent option to not write to stdout
- From: "Theo de Raadt" <deraadt@xxxxxxxxxxx>
- Re: [PATCH v3 (resend)] tee: Add -q, --quiet, --silent option to not write to stdout
- From: Otto Moerbeek <otto@xxxxxxxxx>
- Re: [PATCH v3 (resend)] tee: Add -q, --quiet, --silent option to not write to stdout
- From: Teran McKinney <sega01@xxxxxxxxxxxxx>
- Re: [PATCH v3 (resend)] tee: Add -q, --quiet, --silent option to not write to stdout
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH v27 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v10 2/2] mm/mremap: optionally randomize mremap(..., MREMAP_MAYMOVE)
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH v10 1/2] mm: Optional full ASLR for mmap(), vdso, stack and heap
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH v3 (resend)] tee: Add -q, --quiet, --silent option to not write to stdout
- From: Alejandro Colomar <alx.manpages@xxxxxxxxx>
- [PATCH] tee: Add -q, --quiet, --silent option to not write to stdout
- From: Alejandro Colomar <alx.manpages@xxxxxxxxx>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v15 03/11] riscv/Kconfig: make direct map manipulation options depend on MMU
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v15 03/11] riscv/Kconfig: make direct map manipulation options depend on MMU
- From: Palmer Dabbelt <palmer@xxxxxxxxxxx>
- Re: [PATCH 0/6] fs-verity: add an ioctl to read verity metadata
- From: Victor Hsieh <victorhsieh@xxxxxxxxxx>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: bfields@xxxxxxxxxxxx (J. Bruce Fields)
- Re: [PATCH v17 08/26] x86/mm: Introduce _PAGE_COW
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- [PATCH man-pages v7] Document encoded I/O
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v7 01/10] iov_iter: add copy_struct_from_iter()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v7 13/15] btrfs: send: allocate send buffer with alloc_page() and vmap() for v2
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v7 09/10] btrfs: implement RWF_ENCODED reads
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v7 10/10] btrfs: implement RWF_ENCODED writes
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v7 06/10] btrfs: add ram_bytes and offset to btrfs_ordered_extent
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v7 11/15] btrfs: add send stream v2 definitions
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v7 14/15] btrfs: send: send compressed extents with encoded writes
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v7 15/15] btrfs: send: enable support for stream v2 and compressed writes
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v7 07/10] btrfs: support different disk extent size for delalloc
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v7 12/15] btrfs: send: write larger chunks when using stream v2
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v7 11/15] btrfs: add send stream v2 definitions
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v7 05/10] btrfs: don't advance offset for compressed bios in btrfs_csum_one_bio()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v7 04/10] btrfs: fix check_data_csum() error message for direct I/O
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v7 08/10] btrfs: optionally extend i_size in cow_file_range_inline()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v7 03/10] fs: add RWF_ENCODED for reading/writing compressed data
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v7 02/10] fs: add O_ALLOW_ENCODED open flag
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v7 00/10] fs: interface for directly reading/writing compressed data
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v6 16/40] open: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v2] tee: Add -q, --quiet, --silent option to not write to stdout
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH v6 20/40] init: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v6 15/40] open: handle idmapped mounts in do_truncate()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v4 11/13] task_isolation: net: don't flush backlog on CPUs running isolated tasks
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH] af_unix: Allow Unix sockets to raise SIGURG
- From: "Matthew Wilcox (Oracle)" <willy@xxxxxxxxxxxxx>
- Re: [EXT] Re: [PATCH v5 9/9] task_isolation: kick_all_cpus_sync: don't kick isolated cpus
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- Re: [PATCH v4 11/13] task_isolation: net: don't flush backlog on CPUs running isolated tasks
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- Re: [PATCH 3/5] Add manpage for fspick(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v27 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 5/5] Add manpage for fsconfig(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v3 0/3] Add error_report_end tracepoint to KFENCE and KASAN
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v3 0/3] Add error_report_end tracepoint to KFENCE and KASAN
- From: Petr Mladek <pmladek@xxxxxxxx>
- Re: [PATCH 4/5] Add manpage for fsopen(2) and fsmount(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 2/5] Add manpages for move_mount(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 1/5] Add manpage for open_tree(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v27 12/12] landlock: Add user and kernel documentation
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v3 0/3] Add error_report_end tracepoint to KFENCE and KASAN
- From: Petr Mladek <pmladek@xxxxxxxx>
- Re: [PATCH v6 28/40] overlayfs: do not mount on top of idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 27/40] ecryptfs: do not mount on top of idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 23/40] exec: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 21/40] ioctl: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 19/40] fcntl: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 18/40] utimes: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 17/40] af_unix: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 16/40] open: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 12/40] namei: handle idmapped mounts in may_*() helpers
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 11/40] stat: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 10/40] commoncap: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 09/40] xattr: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 06/40] inode: make init and permission helpers idmapped mount aware
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 04/40] capability: handle idmapped mounts
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v6 03/40] fs: add file and path permissions helpers
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH v2] tee: Add -q, --quiet, --silent option to not write to stdout
- From: Alejandro Colomar <alx.manpages@xxxxxxxxx>
- Re: [PATCH] tee: Add -q, --quiet option to not write to stdout
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- RE: [PATCH v17 08/26] x86/mm: Introduce _PAGE_COW
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v17 08/26] x86/mm: Introduce _PAGE_COW
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v16 00/11] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH v17 08/26] x86/mm: Introduce _PAGE_COW
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v17 08/26] x86/mm: Introduce _PAGE_COW
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- [PATCH v27 09/12] arch: Wire up Landlock syscalls
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v27 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v27 04/12] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v27 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v27 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v27 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v27 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v27 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v27 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v27 10/12] selftests/landlock: Add user space tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v27 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v27 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v27 03/12] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v17 08/26] x86/mm: Introduce _PAGE_COW
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v17 08/26] x86/mm: Introduce _PAGE_COW
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v17 08/26] x86/mm: Introduce _PAGE_COW
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v17 08/26] x86/mm: Introduce _PAGE_COW
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v17 08/26] x86/mm: Introduce _PAGE_COW
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v17 08/26] x86/mm: Introduce _PAGE_COW
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v6 01/40] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 05/39] namei: make permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 02/40] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 00/40] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 3/3] kasan: use error_report_end tracepoint
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH v6 06/40] inode: make init and permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 09/40] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 07/40] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 16/40] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 15/40] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 17/40] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 12/40] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 30/40] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 18/40] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 20/40] init: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 38/40] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 27/40] ecryptfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 26/39] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 32/40] fs: split out functions to hold writers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 33/40] fs: add attr_flags_to_mnt_flags helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 25/40] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 22/40] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 21/40] ioctl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 34/40] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 39/40] xfs: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 35/40] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 23/40] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 40/40] generic/622: add fstests for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 24/40] fs: make helpers idmap mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 29/40] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 36/40] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 37/40] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 28/40] overlayfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 31/40] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 19/40] fcntl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 13/40] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 11/40] stat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 14/40] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 08/40] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 10/40] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 04/40] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v6 03/40] fs: add file and path permissions helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 0/3] Add error_report_end tracepoint to KFENCE and KASAN
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH v3 1/3] tracing: add error_report_end trace point
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH 2/3] kfence: use error_report_end tracepoint
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v2 0/5] Add sysfs interface to collect reports from debugging tools
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- [PATCH v16 00/11] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v16 04/11] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v16 02/11] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v16 03/11] riscv/Kconfig: make direct map manipulation options depend on MMU
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v16 06/11] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v16 05/11] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v16 09/11] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v16 10/11] arch, mm: wire up memfd_secret system call where relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v16 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v16 11/11] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v16 08/11] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v16 01/11] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v15 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v15 06/11] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v15 06/11] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- [PATCH 1/1] process_madvise.2: Add process_madvise man page
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v15 02/11] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v15 06/11] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v15 01/11] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v15 08/11] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v15 07/11] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v15 03/11] riscv/Kconfig: make direct map manipulation options depend on MMU
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v15 09/11] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v15 11/11] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v15 10/11] arch, mm: wire up memfd_secret system call where relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v15 05/11] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v15 04/11] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v15 00/11] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v14 05/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v4 2/4] x86/elf: Support a new ELF aux vector AT_MINSIGSTKSZ
- From: "Carlos O'Donell" <carlos@xxxxxxxxxx>
- Re: [PATCH v14 05/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v14 05/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v5 15/42] fs: add file_user_ns() helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] entry: Use different define for selector variable in SUD
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH -V9 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -V9 0/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Huang Ying <ying.huang@xxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v5 15/42] fs: add file_user_ns() helper
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v5 23/42] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v14 05/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v17 06/26] x86/cet: Add control-protection fault handler
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v17 02/26] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v5 13/42] attr: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v17 06/26] x86/cet: Add control-protection fault handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v17 02/26] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v5 32/42] fs: make helpers idmap mount aware
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 31/42] exec: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 30/42] would_dump: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 29/42] ioctl: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 24/42] af_unix: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 27/42] notify: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 26/42] fcntl: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 25/42] utimes: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 23/42] open: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 22/42] open: handle idmapped mounts in do_truncate()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 16/42] xattr: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 21/42] namei: prepare for idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 20/42] namei: introduce struct renamedata
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 19/42] namei: handle idmapped mounts in may_*() helpers
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 18/42] stat: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 17/42] commoncap: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/42] fs: add file_user_ns() helper
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 14/42] acl: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 12/42] inode: make init and permission helpers idmapped mount aware
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 11/42] namei: make permission helpers idmapped mount aware
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 10/42] capability: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 09/42] mount: attach mappings to mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/1] ns: add binfmt_misc to the user namespace
- From: Laurent Vivier <laurent@xxxxxxxxx>
- Re: [PATCH v5 37/42] xfs: support idmapped mounts
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- RE: [PATCH] Adds a new ioctl32 syscall for backwards compatibility layers
- From: David Laight <David.Laight@xxxxxxxxxx>
- Ping: [PATCH] futex: Change 'utime' parameter to be 'const ... *'
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH v26 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] Adds a new ioctl32 syscall for backwards compatibility layers
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] Adds a new ioctl32 syscall for backwards compatibility layers
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH] Adds a new ioctl32 syscall for backwards compatibility layers
- From: Rich Felker <dalias@xxxxxxxx>
- RE: [PATCH] Adds a new ioctl32 syscall for backwards compatibility layers
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] Adds a new ioctl32 syscall for backwards compatibility layers
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v4 4/4] selftest/x86/signal: Include test cases for validating sigaltstack
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v4 3/4] x86/signal: Detect and prevent an alternate signal stack overflow
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v4 1/4] x86/signal: Introduce helpers to get the maximum signal frame size
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v4 0/4] x86: Improve Minimum Alternate Stack Size
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v4 2/4] x86/elf: Support a new ELF aux vector AT_MINSIGSTKSZ
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Joe Perches <joe@xxxxxxxxxxx>
- RE: [PATCH] Adds a new ioctl32 syscall for backwards compatibility layers
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v26 07/12] landlock: Support filesystem access-control
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH 6/6] fs-verity: support reading signature with ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 5/6] fs-verity: support reading descriptor with ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4/6] fs-verity: support reading Merkle tree with ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/6] fs-verity: add an ioctl to read verity metadata
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/6] fs-verity: don't pass whole descriptor to fsverity_verify_signature()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/6] fs-verity: add FS_IOC_READ_VERITY_METADATA ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/6] fs-verity: factor out fsverity_get_descriptor()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 37/42] xfs: support idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v2 0/5] Add sysfs interface to collect reports from debugging tools
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v2 0/5] Add sysfs interface to collect reports from debugging tools
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v26 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] Adds a new ioctl32 syscall for backwards compatibility layers
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v2] Adds a new ioctl32 syscall for backwards compatibility layers
- From: sonicadvance1@xxxxxxxxx
- [PATCH] Adds a new ioctl32 syscall for backwards compatibility layers
- From: sonicadvance1@xxxxxxxxx
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 2/2] ABI: add sysfs description for tpm exports of PCR registers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] Adds a new ioctl32 syscall for backwards compatibility layers
- From: Ryan Houdek <sonicadvance1@xxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v26 07/12] landlock: Support filesystem access-control
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v5 37/42] xfs: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH v5 37/42] xfs: support idmapped mounts
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH v26 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v26 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v26 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v26 00/12] Landlock LSM
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v26 07/12] landlock: Support filesystem access-control
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v26 02/12] landlock: Add ruleset and domain management
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v26 11/12] samples/landlock: Add a sandbox manager example
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 0/2] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/2] ABI: add sysfs description for tpm exports of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/2] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v5 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/1] add sysfs exports for TPM 2 PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v21 2/2] arm64: expose FAR_EL1 tag bits in siginfo
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v21 2/2] arm64: expose FAR_EL1 tag bits in siginfo
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v9] mm: Optional full ASLR for mmap(), mremap(), vdso, stack and heap
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v17 04/26] x86/cpufeatures: Introduce X86_FEATURE_CET and setup functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 41/42] tests: extend mount_setattr tests
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v17 04/26] x86/cpufeatures: Introduce X86_FEATURE_CET and setup functions
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- [PATCH v5 29/42] ioctl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 26/42] fcntl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 33/42] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 38/42] ecryptfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 22/42] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 23/42] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 35/42] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 32/42] fs: make helpers idmap mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 30/42] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 34/42] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 21/42] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 41/42] tests: extend mount_setattr tests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 39/42] overlayfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 42/42] generic/622: add fstests for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 27/42] notify: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 20/42] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 24/42] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 36/42] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 01/42] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 15/42] fs: add file_user_ns() helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 37/42] xfs: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 13/42] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 31/42] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 25/42] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 28/42] init: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 18/42] stat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 16/42] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 11/42] namei: make permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 19/42] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 17/42] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 14/42] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 12/42] inode: make init and permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 08/42] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 00/42] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 06/42] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 07/42] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 10/42] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 09/42] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 04/42] fs: split out functions to hold writers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 05/42] fs: add attr_flags_to_mnt_flags helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 03/42] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 02/42] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 01/10] vfs: move cap_convert_nscap() call into vfs_setxattr()
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 01/10] vfs: move cap_convert_nscap() call into vfs_setxattr()
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH ghak90 v11 08/11] audit: add support for containerid to network namespaces
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v11 11/11] audit: add capcontid to set contid outside init_user_ns
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Samba]
[Yosemite News]