Linux API
[Prev Page][Next Page]
- Re: [PATCH v5 18/42] stat: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 17/42] commoncap: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 15/42] fs: add file_user_ns() helper
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 14/42] acl: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 12/42] inode: make init and permission helpers idmapped mount aware
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 11/42] namei: make permission helpers idmapped mount aware
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 10/42] capability: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 09/42] mount: attach mappings to mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v8 1/1] ns: add binfmt_misc to the user namespace
- From: Laurent Vivier <laurent@xxxxxxxxx>
- Re: [PATCH v5 37/42] xfs: support idmapped mounts
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- RE: [PATCH] Adds a new ioctl32 syscall for backwards compatibility layers
- From: David Laight <David.Laight@xxxxxxxxxx>
- Ping: [PATCH] futex: Change 'utime' parameter to be 'const ... *'
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH v26 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] Adds a new ioctl32 syscall for backwards compatibility layers
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] Adds a new ioctl32 syscall for backwards compatibility layers
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH] Adds a new ioctl32 syscall for backwards compatibility layers
- From: Rich Felker <dalias@xxxxxxxx>
- RE: [PATCH] Adds a new ioctl32 syscall for backwards compatibility layers
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH] Adds a new ioctl32 syscall for backwards compatibility layers
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v4 4/4] selftest/x86/signal: Include test cases for validating sigaltstack
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v4 3/4] x86/signal: Detect and prevent an alternate signal stack overflow
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v4 1/4] x86/signal: Introduce helpers to get the maximum signal frame size
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v4 0/4] x86: Improve Minimum Alternate Stack Size
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v4 2/4] x86/elf: Support a new ELF aux vector AT_MINSIGSTKSZ
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Joe Perches <joe@xxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Joe Perches <joe@xxxxxxxxxxx>
- RE: [PATCH] Adds a new ioctl32 syscall for backwards compatibility layers
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v26 07/12] landlock: Support filesystem access-control
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH 6/6] fs-verity: support reading signature with ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 5/6] fs-verity: support reading descriptor with ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 4/6] fs-verity: support reading Merkle tree with ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 0/6] fs-verity: add an ioctl to read verity metadata
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 2/6] fs-verity: don't pass whole descriptor to fsverity_verify_signature()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 3/6] fs-verity: add FS_IOC_READ_VERITY_METADATA ioctl
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- [PATCH 1/6] fs-verity: factor out fsverity_get_descriptor()
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: "Theodore Ts'o" <tytso@xxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 37/42] xfs: support idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v2 0/5] Add sysfs interface to collect reports from debugging tools
- From: Alexander Potapenko <glider@xxxxxxxxxx>
- Re: [PATCH v2 0/5] Add sysfs interface to collect reports from debugging tools
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v26 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] Adds a new ioctl32 syscall for backwards compatibility layers
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH v2] Adds a new ioctl32 syscall for backwards compatibility layers
- From: sonicadvance1@xxxxxxxxx
- [PATCH] Adds a new ioctl32 syscall for backwards compatibility layers
- From: sonicadvance1@xxxxxxxxx
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 2/2] ABI: add sysfs description for tpm exports of PCR registers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] Adds a new ioctl32 syscall for backwards compatibility layers
- From: Ryan Houdek <sonicadvance1@xxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v26 07/12] landlock: Support filesystem access-control
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v5 37/42] xfs: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH v5 37/42] xfs: support idmapped mounts
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- Re: [PATCH v26 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v26 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v26 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v5 00/42] idmapped mounts
- From: "Darrick J. Wong" <djwong@xxxxxxxxxx>
- Re: [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v26 00/12] Landlock LSM
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v26 07/12] landlock: Support filesystem access-control
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v26 02/12] landlock: Add ruleset and domain management
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v26 11/12] samples/landlock: Add a sandbox manager example
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 0/2] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 1/2] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 2/2] ABI: add sysfs description for tpm exports of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/2] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v5 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/1] add sysfs exports for TPM 2 PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v21 2/2] arm64: expose FAR_EL1 tag bits in siginfo
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v21 2/2] arm64: expose FAR_EL1 tag bits in siginfo
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v9] mm: Optional full ASLR for mmap(), mremap(), vdso, stack and heap
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v17 04/26] x86/cpufeatures: Introduce X86_FEATURE_CET and setup functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- [PATCH v5 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 41/42] tests: extend mount_setattr tests
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v17 04/26] x86/cpufeatures: Introduce X86_FEATURE_CET and setup functions
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- [PATCH v5 29/42] ioctl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 26/42] fcntl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 33/42] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 38/42] ecryptfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 22/42] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 23/42] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 35/42] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 32/42] fs: make helpers idmap mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 30/42] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 34/42] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 21/42] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 41/42] tests: extend mount_setattr tests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 39/42] overlayfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 42/42] generic/622: add fstests for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 27/42] notify: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 20/42] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 24/42] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 40/42] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 36/42] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 01/42] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 15/42] fs: add file_user_ns() helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 37/42] xfs: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 13/42] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 31/42] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 25/42] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 28/42] init: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 18/42] stat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 16/42] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 11/42] namei: make permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 19/42] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 17/42] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 14/42] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 12/42] inode: make init and permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 08/42] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 00/42] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 06/42] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 07/42] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 10/42] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 09/42] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 04/42] fs: split out functions to hold writers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 05/42] fs: add attr_flags_to_mnt_flags helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 03/42] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v5 02/42] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 01/10] vfs: move cap_convert_nscap() call into vfs_setxattr()
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 01/10] vfs: move cap_convert_nscap() call into vfs_setxattr()
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH ghak90 v11 08/11] audit: add support for containerid to network namespaces
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v11 11/11] audit: add capcontid to set contid outside init_user_ns
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v11 10/11] audit: track container nesting
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v11 09/11] audit: contid check descendancy and nesting
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v11 07/11] audit: add containerid filtering
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v11 06/11] audit: add containerid support for user records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v11 05/11] audit: add support for non-syscall auxiliary records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v11 04/11] audit: add contid support for signalling the audit daemon
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v11 03/11] audit: log container info of syscalls
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v11 02/11] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v11 01/11] audit: collect audit task parameters
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v11 00/11] audit: implement container identifier
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH v17 04/26] x86/cpufeatures: Introduce X86_FEATURE_CET and setup functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH -V8 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: "Huang\, Ying" <ying.huang@xxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: Ping: [PATCH man-pages v6] Document encoded I/O
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v17 04/26] x86/cpufeatures: Introduce X86_FEATURE_CET and setup functions
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v6 03/11] fs: add RWF_ENCODED for reading/writing compressed data
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v17 04/26] x86/cpufeatures: Introduce X86_FEATURE_CET and setup functions
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v6 10/11] btrfs: implement RWF_ENCODED reads
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v6 10/11] btrfs: implement RWF_ENCODED reads
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v17 04/26] x86/cpufeatures: Introduce X86_FEATURE_CET and setup functions
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v6 10/11] btrfs: implement RWF_ENCODED reads
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v17 04/26] x86/cpufeatures: Introduce X86_FEATURE_CET and setup functions
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v2 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: David Rientjes <rientjes@xxxxxxxxxx>
- Re: [PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH 1/1] mm/madvise: replace ptrace attach requirement for process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v3 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v3 4/4] selftest/x86/signal: Include test cases for validating sigaltstack
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v8 1/1] ns: add binfmt_misc to the user namespace
- From: Jan Kiszka <jan.kiszka@xxxxxxxxxxx>
- Re: [PATCH] Adds a new ioctl32 syscall for backwards compatibility layers
- From: "Amanieu d'Antras" <amanieu@xxxxxxxxx>
- Re: [PATCH] Adds a new ioctl32 syscall for backwards compatibility layers
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- [PATCH -V8 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -V8 0/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH] Adds a new ioctl32 syscall for backwards compatibility layers
- From: sonicadvance1@xxxxxxxxx
- Re: [PATCH v2] fs: Validate umount flags before looking up path in ksys_umount
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH v2] fs: Validate umount flags before looking up path in ksys_umount
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH] fs: Validate flags and capabilities before looking up path in ksys_umount
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v17 00/26] Control-flow Enforcement: Shadow Stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v9] mm: Optional full ASLR for mmap(), mremap(), vdso, stack and heap
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] fs: Validate flags and capabilities before looking up path in ksys_umount
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH v9] mm: Optional full ASLR for mmap(), mremap(), vdso, stack and heap
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [RESEND PATCH] fs: Validate flags and capabilities before looking up path in ksys_umount
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH] entry: Use different define for selector variable in SUD
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCHSET RFC v2 00/17] xfs: atomic file updates
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH v6] prctl.2: Document Syscall User Dispatch
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH v6 2/3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v6 3/3] arm64: pac: Optimize kernel entry/exit key installation code paths
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v6 1/3] arm64: mte: make the per-task SCTLR_EL1 field usable elsewhere
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v17 05/26] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 6/7] x86/vdso/32: Add ENDBR32 to __kernel_vsyscall entry point
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 7/7] x86/vdso: Insert endbr32/endbr64 to vDSO
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 4/7] x86/cet/ibt: Update ELF header parsing for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 3/7] x86/cet/ibt: Handle signals for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 5/7] x86/cet/ibt: Update arch_prctl functions for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 0/7] Control-flow Enforcement: Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 10/26] x86/mm: Update pte_modify for _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 1/7] x86/cet/ibt: Update Kconfig for user-mode Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 2/7] x86/cet/ibt: User-mode Indirect Branch Tracking support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 09/26] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 07/26] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 06/26] x86/cet: Add control-protection fault handler
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 04/26] x86/cpufeatures: Introduce X86_FEATURE_CET and setup functions
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 11/26] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 13/26] x86/mm: Shadow Stack page fault error checking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 14/26] x86/mm: Update maybe_mkwrite() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 16/26] mm: Add guard pages around a shadow stack.
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 18/26] mm: Update can_follow_write_pte() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 19/26] mm: Re-introduce vm_flags to do_mmap()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 20/26] x86/cet/shstk: User-mode shadow stack support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 22/26] binfmt_elf: Define GNU_PROPERTY_X86_FEATURE_1_AND properties
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 23/26] ELF: Introduce arch_setup_elf_property()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 24/26] x86/cet/shstk: Handle thread shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 26/26] mm: Introduce PROT_SHSTK for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 25/26] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 21/26] x86/cet/shstk: Handle signals for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 17/26] mm/mmap: Add shadow stack pages to memory accounting
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 15/26] mm: Fixup places that call pte_mkwrite() directly
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 12/26] mm: Introduce VM_SHSTK for shadow stack memory
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 08/26] x86/mm: Introduce _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 03/26] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 01/26] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 02/26] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v17 00/26] Control-flow Enforcement: Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v16 02/26] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v16 02/26] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v16 02/26] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v16 02/26] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
- From: Borislav Petkov <bp@xxxxxxxxx>
- [RESEND PATCH] fs: Validate flags and capabilities before looking up path in ksys_umount
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Ken Goldman <kgold@xxxxxxxxxxxxx>
- [PATCH] fs: Validate flags and capabilities before looking up path in ksys_umount
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v3 4/4] selftest/x86/signal: Include test cases for validating sigaltstack
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v3 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v3 2/4] x86/elf: Support a new ELF aux vector AT_MINSIGSTKSZ
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v3 1/4] x86/signal: Introduce helpers to get the maximum signal frame size
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v3 0/4] x86: Improve Minimum Alternate Stack Size
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH ghak90 v10 01/11] audit: collect audit task parameters
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2] sigaction.2: Document SA_EXPOSE_TAGBITS and the flag support detection protocol
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH ghak90 v10 01/11] audit: collect audit task parameters
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v10 11/11] audit: add capcontid to set contid outside init_user_ns
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v10 10/11] audit: track container nesting
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v10 09/11] audit: contid check descendancy and nesting
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v10 08/11] audit: add support for containerid to network namespaces
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v10 07/11] audit: add containerid filtering
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v10 06/11] audit: add containerid support for user records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v10 05/11] audit: add support for non-syscall auxiliary records
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v10 04/11] audit: add contid support for signalling the audit daemon
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v10 03/11] audit: log container info of syscalls
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v10 02/11] audit: add container id
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v10 01/11] audit: collect audit task parameters
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH ghak90 v10 00/11] audit: implement container identifier
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- Re: [PATCH -V6 RESEND 2/3] NOT kernel/man-pages: man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: "Huang\, Ying" <ying.huang@xxxxxxxxx>
- [PATCH v8] mm: Optional full ASLR for mmap(), mremap(), vdso, stack and heap
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: Please remove all bit fields in bpf uapi
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: Please remove all bit fields in bpf uapi
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Ping: [PATCH man-pages v6] Document encoded I/O
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: Please remove all bit fields in bpf uapi
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] sigaction.2: Document SA_EXPOSE_TAGBITS and the flag support detection protocol
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH -V6 RESEND 2/3] NOT kernel/man-pages: man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: "Alejandro Colomar (mailing lists; readonly)" <alx.mailinglists@xxxxxxxxx>
- Re: Please remove all bit fields in bpf uapi
- From: Meng Zhuo <mengzhuo1203@xxxxxxxxx>
- Re: Please remove all bit fields in bpf uapi
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Please remove all bit fields in bpf uapi
- From: Meng Zhuo <mengzhuo1203@xxxxxxxxx>
- [PATCH v7] mm: Optional full ASLR for mmap(), mremap(), vdso, stack and heap
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [RFC PATCH v6] mm: Optional full ASLR for mmap(), mremap(), vdso, stack and heap
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH v2] mm/vmalloc: randomize vmalloc() allocations
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH AUTOSEL 5.9 09/23] selftests: tc-testing: enable CONFIG_NET_SCH_RED as a module
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.9 23/23] tools/testing/selftests/vm: fix build error
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v14 10/10] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v14 10/10] secretmem: test: add basic selftest for memfd_secret(2)
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v5 0/9] "Task_isolation" mode
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v15 08/26] x86/mm: Introduce _PAGE_COW
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v15 08/26] x86/mm: Introduce _PAGE_COW
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] futex: Change 'utime' parameter to be 'const ... *'
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH v26 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH -V6 RESEND 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: "Huang\, Ying" <ying.huang@xxxxxxxxx>
- [PATCH v16 05/26] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 03/26] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 02/26] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 08/26] x86/mm: Introduce _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 11/26] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 14/26] x86/mm: Update maybe_mkwrite() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 13/26] x86/mm: Shadow Stack page fault error checking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 10/26] x86/mm: Update pte_modify for _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 12/26] mm: Introduce VM_SHSTK for shadow stack memory
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 09/26] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 07/26] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 04/26] x86/cpufeatures: Introduce X86_FEATURE_CET and setup functions
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 18/26] mm: Update can_follow_write_pte() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 15/26] mm: Fixup places that call pte_mkwrite() directly
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 19/26] mm: Re-introduce vm_flags to do_mmap()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 20/26] x86/cet/shstk: User-mode shadow stack support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 23/26] ELF: Introduce arch_setup_elf_property()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 17/26] mm/mmap: Add shadow stack pages to memory accounting
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 26/26] mm: Introduce PROT_SHSTK for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 25/26] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 0/7] Control-flow Enforcement: Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 1/7] x86/cet/ibt: Update Kconfig for user-mode Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 6/7] x86/vdso/32: Add ENDBR32 to __kernel_vsyscall entry point
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 5/7] x86/cet/ibt: Update arch_prctl functions for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 7/7] x86/vdso: Insert endbr32/endbr64 to vDSO
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 4/7] x86/cet/ibt: Update ELF header parsing for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 3/7] x86/cet/ibt: Handle signals for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 2/7] x86/cet/ibt: User-mode Indirect Branch Tracking support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 24/26] x86/cet/shstk: Handle thread shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 21/26] x86/cet/shstk: Handle signals for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 22/26] binfmt_elf: Define GNU_PROPERTY_X86_FEATURE_1_AND properties
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 16/26] mm: Add guard pages around a shadow stack.
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 06/26] x86/cet: Add control-protection fault handler
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 00/26] Control-flow Enforcement: Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 01/26] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v26 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 04/12] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 10/12] selftests/landlock: Add user space tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 09/12] arch: Wire up Landlock syscalls
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 03/12] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] mm,hwpoison: Return -EBUSY when migration fails
- From: Oscar Salvador <osalvador@xxxxxxx>
- Re: [PATCH] mm,hwpoison: Return -EBUSY when migration fails
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH 2/2] mm/madvise: add process_madvise MADV_DONTNEER support
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 2/2] mm/madvise: add process_madvise MADV_DONTNEER support
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v15 08/26] x86/mm: Introduce _PAGE_COW
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v15 08/26] x86/mm: Introduce _PAGE_COW
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v15 08/26] x86/mm: Introduce _PAGE_COW
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v15 08/26] x86/mm: Introduce _PAGE_COW
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 06/40] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v4 06/40] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v4 06/40] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v4 06/40] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v4 05/40] fs: add attr_flags_to_mnt_flags helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH -V6 RESEND 2/3] NOT kernel/man-pages: man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: "Huang\, Ying" <ying.huang@xxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v14 09/10] arch, mm: wire up memfd_secret system call were relevant
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC net-next af_unix v1 0/1] Allow delivery of SIGURG on AF_UNIX streams socket
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v4 06/40] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v15 07/26] x86/mm: Remove _PAGE_DIRTY_HW from kernel RO pages
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v4 05/40] fs: add attr_flags_to_mnt_flags helper
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v4 04/40] fs: split out functions to hold writers
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [RFC net-next af_unix v1 0/1] Allow delivery of SIGURG on AF_UNIX streams socket
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v15 07/26] x86/mm: Remove _PAGE_DIRTY_HW from kernel RO pages
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC net-next af_unix v1 0/1] Allow delivery of SIGURG on AF_UNIX streams socket
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v14 09/10] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: [PATCH v14 09/10] arch, mm: wire up memfd_secret system call were relevant
- From: Qian Cai <qcai@xxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Alexander Graf <graf@xxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Alexander Graf <graf@xxxxxxxxx>
- Re: [PATCH v3] drivers/virt: vmgenid: add vm generation id driver
- From: Alexander Graf <graf@xxxxxxxxx>
- Re: [EXT] Re: [PATCH v5 7/9] task_isolation: don't interrupt CPUs with tick_nohz_full_kick_cpu()
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [EXT] Re: [PATCH v5 6/9] task_isolation: arch/arm64: enable task isolation functionality
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH -V7 2/3] NOT kernel/man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: "Huang\, Ying" <ying.huang@xxxxxxxxx>
- Re: [PATCH v14 09/10] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: [PATCH v14 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/9] "Task_isolation" mode
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/9] "Task_isolation" mode
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- RE: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH -V7 2/3] NOT kernel/man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH -V6 RESEND 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: "Huang\, Ying" <ying.huang@xxxxxxxxx>
- [PATCH -V7 3/3] NOT kernel/numactl: Support to enable Linux kernel NUMA balancing
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -V7 2/3] NOT kernel/man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -V7 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -V7 0/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Huang Ying <ying.huang@xxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [EXT] Re: [PATCH v5 7/9] task_isolation: don't interrupt CPUs with tick_nohz_full_kick_cpu()
- From: Alex Belits <abelits@xxxxxxxxxxx>
- Re: [EXT] Re: [PATCH v5 5/9] task_isolation: Add driver-specific hooks
- From: Alex Belits <abelits@xxxxxxxxxxx>
- Re: [EXT] Re: [PATCH v5 0/9] "Task_isolation" mode
- From: Alex Belits <abelits@xxxxxxxxxxx>
- Re: [EXT] Re: [PATCH v5 6/9] task_isolation: arch/arm64: enable task isolation functionality
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v4 34/40] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 30/40] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 40/40] generic/618: add fstests for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 28/40] ioctl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 31/40] fs: make helpers idmap mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 26/40] notify: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 25/40] fcntl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 32/40] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 27/40] init: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 39/40] tests: extend mount_setattr tests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 35/40] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 22/40] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 33/40] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 20/40] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 36/40] ecryptfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 37/40] overlayfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 21/40] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 23/40] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 29/40] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 38/40] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 24/40] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 00/40] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 16/40] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 18/40] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 19/40] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 14/40] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 13/40] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 15/40] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 17/40] stat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 12/40] inode: make init and permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 11/40] namei: make permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 01/40] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 04/40] fs: split out functions to hold writers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 03/40] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 02/40] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 07/40] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 06/40] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 10/40] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 08/40] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 09/40] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 05/40] fs: add attr_flags_to_mnt_flags helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v14 09/10] arch, mm: wire up memfd_secret system call were relevant
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Joseph Myers <joseph@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH v12 2/3] arch: Wire up trusted_for(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v12 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v12 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v12 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v15 06/26] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v14 07/10] secretmem: add memcg accounting
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH v15 06/26] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v6 11/11] btrfs: implement RWF_ENCODED writes
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v6 10/11] btrfs: implement RWF_ENCODED reads
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH -V6 RESEND 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Mel Gorman <mgorman@xxxxxxx>
- Re: [PATCH -V6 RESEND 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH -V6 RESEND 2/3] NOT kernel/man-pages: man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: Mel Gorman <mgorman@xxxxxxx>
- Re: [PATCH v15 06/26] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v5 2/2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v5 1/2] arm64: mte: make the per-task SCTLR_EL1 field usable elsewhere
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v4 1/2] arm64: mte: make the per-task SCTLR_EL1 field usable elsewhere
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 10/10] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 09/10] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 08/10] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 07/10] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 06/10] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 05/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 03/10] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 02/10] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 01/10] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 00/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH -V6 RESEND 2/3] NOT kernel/man-pages: man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: "Huang\, Ying" <ying.huang@xxxxxxxxx>
- Re: [PATCH v6 11/11] btrfs: implement RWF_ENCODED writes
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v5 7/9] task_isolation: don't interrupt CPUs with tick_nohz_full_kick_cpu()
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v5 5/9] task_isolation: Add driver-specific hooks
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [EXT] Re: [PATCH v5 0/9] "Task_isolation" mode
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v5 6/9] task_isolation: arch/arm64: enable task isolation functionality
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH -V6 RESEND 2/3] NOT kernel/man-pages: man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: "Alejandro Colomar (mailing lists; readonly)" <alx.mailinglists@xxxxxxxxx>
- Re: [PATCH -V6 RESEND 3/3] NOT kernel/numactl: Support to enable Linux kernel NUMA balancing
- From: Mel Gorman <mgorman@xxxxxxx>
- Re: [PATCH -V6 RESEND 2/3] NOT kernel/man-pages: man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: Mel Gorman <mgorman@xxxxxxx>
- Re: [PATCH -V6 RESEND 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Mel Gorman <mgorman@xxxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 07/38] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 17/38] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 10/38] inode: add idmapped mount aware init and permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 06/38] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 03/38] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 02/38] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 01/38] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH -V6 RESEND 2/3] NOT kernel/man-pages: man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -V6 RESEND 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -V6 RESEND 3/3] NOT kernel/numactl: Support to enable Linux kernel NUMA balancing
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -V6 RESEND 0/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Huang Ying <ying.huang@xxxxxxxxx>
- Re: [PATCH v8 0/7] Syscall User Dispatch
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v8 4/7] entry: Support Syscall User Dispatch on common syscall entry
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v8 7/7] docs: Document Syscall User Dispatch
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v8 6/7] selftests: Add benchmark for syscall user dispatch
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v8 4/7] entry: Support Syscall User Dispatch on common syscall entry
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v8 3/7] kernel: Implement selective syscall userspace redirection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v8 7/7] docs: Document Syscall User Dispatch
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 7/7] docs: Document Syscall User Dispatch
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH v6 02/11] fs: add O_ALLOW_ENCODED open flag
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH v25 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 09/12] arch: Wire up Landlock syscalls
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 03/12] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 10/12] selftests/landlock: Add user space tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 04/12] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3] drivers/virt: vmgenid: add vm generation id driver
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v13 07/10] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v13 07/10] secretmem: add memcg accounting
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH v15 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: Borislav Petkov <bp@xxxxxxxxx>
- Ping: [PATCH man-pages v6] Document encoded I/O
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH v2 1/4] x86/signal: Introduce helpers to get the maximum signal frame size
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 07/38] mount: attach mappings to mounts
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 17/38] namei: introduce struct renamedata
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 10/38] inode: add idmapped mount aware init and permission helpers
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 07/38] mount: attach mappings to mounts
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 06/38] fs: add id translation helpers
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 03/38] namespace: only take read lock in do_reconfigure_mnt()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 02/38] mount: make {lock,unlock}_mount_hash() static
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 01/38] namespace: take lock_mount_hash() directly when changing flags
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 32/38] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 00/38] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v6 02/11] fs: add O_ALLOW_ENCODED open flag
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v13 10/10] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 09/10] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 08/10] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 07/10] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 06/10] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 05/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 03/10] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 02/10] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 01/10] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 00/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH -v6 2/3] NOT kernel/man-pages man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: "Huang\, Ying" <ying.huang@xxxxxxxxx>
- Re: [NEEDS-REVIEW] [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Mauricio Vásquez Bernal <mauricio@xxxxxxxxxx>
- Re: [PATCH v3 32/38] fat: handle idmapped mounts
- From: Mauricio Vásquez Bernal <mauricio@xxxxxxxxxx>
- RE: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- Re: [PATCH v15 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v2 1/4] x86/signal: Introduce helpers to get the maximum signal frame size
- From: "Bae, Chang Seok" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v15 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v12 07/10] secretmem: add memcg accounting
- From: Roman Gushchin <guro@xxxxxx>
- Re: [PATCH v15 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 01/26] Documentation/x86: Add CET description
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v15 01/26] Documentation/x86: Add CET description
- From: Fāng-ruì Sòng <maskray@xxxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v6 02/11] fs: add O_ALLOW_ENCODED open flag
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v6 05/11] btrfs: fix check_data_csum() error message for direct I/O
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v6 04/11] btrfs: fix btrfs_write_check()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- RE: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- Re: [PATCH v15 01/26] Documentation/x86: Add CET description
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- RE: [PATCH v15 01/26] Documentation/x86: Add CET description
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [NEEDS-REVIEW] [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v15 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [NEEDS-REVIEW] [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [NEEDS-REVIEW] [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH -v6 2/3] NOT kernel/man-pages man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [NEEDS-REVIEW] [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] arm64: mte: make the per-task SCTLR_EL1 field usable elsewhere
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [RFC net-next af_unix v1 0/1] Allow delivery of SIGURG on AF_UNIX streams socket
- From: Rao Shoaib <rao.shoaib@xxxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v12 07/10] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v12 07/10] secretmem: add memcg accounting
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [RFC net-next af_unix v1 0/1] Allow delivery of SIGURG on AF_UNIX streams socket
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [RFC net-next af_unix v1 0/1] Allow delivery of SIGURG on AF_UNIX streams socket
- From: rao.shoaib@xxxxxxxxxx
- [RFC net-next af_unix v1 1/1] af_unix: Allow delivery of SIGURG on AF_UNIX streams socket
- From: rao.shoaib@xxxxxxxxxx
- Re: [PATCH v3 00/38] idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH v3 08/38] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 10/38] inode: add idmapped mount aware init and permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 18/38] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 08/38] capability: handle idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH v3 11/38] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 14/38] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 00/38] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 06/38] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 04/38] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 15/38] stat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 13/38] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 05/38] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 07/38] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 19/38] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 17/38] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 12/38] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3] drivers/virt: vmgenid: add vm generation id driver
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v3 01/38] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 03/38] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 02/38] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v8 3/7] kernel: Implement selective syscall userspace redirection
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v3 16/38] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v8 5/7] selftests: Add kselftest for syscall user dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: [PATCH v2 10/39] inode: add idmapped mount aware init and permission helpers
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v15 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v15 00/26] Control-flow Enforcement: Shadow Stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- [PATCH v8 4/7] entry: Support Syscall User Dispatch on common syscall entry
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v8 0/7] Syscall User Dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v8 1/7] x86: vdso: Expose sigreturn address on vdso to the kernel
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v3 38/38] generic/618: add fstests for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 24/38] notify: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 27/38] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 20/38] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 29/38] fs: add helpers for idmap mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 28/38] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 26/38] ioctl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 22/38] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 31/38] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 36/38] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 34/38] ecryptfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 21/38] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 23/38] fcntl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 35/38] overlayfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 30/38] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 37/38] tests: extend mount_setattr tests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 25/38] init: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 32/38] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Samba]
[Yosemite News]