Linux API
[Prev Page][Next Page]
- [PATCH v8 7/7] docs: Document Syscall User Dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v8 2/7] signal: Expose SYS_USER_DISPATCH si_code type
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v8 6/7] selftests: Add benchmark for syscall user dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v4 1/2] arm64: mte: make the per-task SCTLR_EL1 field usable elsewhere
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: "Catangiu, Adrian Costin" <acatan@xxxxxxxxxx>
- [PATCH v3] drivers/virt: vmgenid: add vm generation id driver
- From: "Catangiu, Adrian Costin" <acatan@xxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2 4/4] selftest/x86/signal: Include test cases for validating sigaltstack
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: "Catangiu, Adrian Costin" <acatan@xxxxxxxxxx>
- Re: [PATCH v15 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 2/4] x86/elf: Support a new ELF aux vector AT_MINSIGSTKSZ
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v15 00/26] Control-flow Enforcement: Shadow Stack
- From: Balbir Singh <bsingharora@xxxxxxxxx>
- Re: [PATCH v15 04/26] x86/cet: Add control-protection fault handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 2/4] x86/elf: Support a new ELF aux vector AT_MINSIGSTKSZ
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH -V6 3/3] NOT kernel/numactl: Support to enable Linux kernel NUMA balancing
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -v6 2/3] NOT kernel/man-pages man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -V6 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -V6 0/3] autonuma: Migrate on fault among multiple bound nodes
- From: Huang Ying <ying.huang@xxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH 1/2] kasan: arm64: set TCR_EL1.TBID1 when enabled
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v12 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [Question] About SECCOMP issue for ILP32
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH 2/2] arm64: allow TCR_EL1.TBID0 to be configured
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v12 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v12 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: [PATCH v12 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2 1/4] x86/signal: Introduce helpers to get the maximum signal frame size
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v12 10/10] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 09/10] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 08/10] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 07/10] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 06/10] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 05/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 03/10] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 02/10] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 01/10] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 00/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [EXT] Re: [PATCH v5 9/9] task_isolation: kick_all_cpus_sync: don't kick isolated cpus
- From: Alex Belits <abelits@xxxxxxxxxxx>
- Re: [PATCH] mm: introduce sysctl file to flush per-cpu vmstat statistics
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- Re: [PATCH v2 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: "Bae, Chang Seok" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v2 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: "Bae, Chang Seok" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH 2/2] arm64: allow TCR_EL1.TBID0 to be configured
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH 2/2] arm64: allow TCR_EL1.TBID0 to be configured
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v4] mm: Optional full ASLR for mmap() and mremap()
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v2 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: "Bae, Chang Seok" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [EXT] Re: [PATCH v5 0/9] "Task_isolation" mode
- From: Alex Belits <abelits@xxxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] mm: introduce sysctl file to flush per-cpu vmstat statistics
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v11 4/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] mm/madvise: add process_madvise MADV_DONTNEER support
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v5 0/9] "Task_isolation" mode
- From: Tom Rix <trix@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Mark Wielaard <mark@xxxxxxxxx>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 2/2] mm/madvise: add process_madvise MADV_DONTNEER support
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v11 4/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v10 0/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 9/9] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 8/9] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 7/9] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 6/9] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 5/9] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 4/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 3/9] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 2/9] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 1/9] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 0/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH 2/2] mm/madvise: add process_madvise MADV_DONTNEER support
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH 0/2] userspace memory reaping using process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v24 12/12] landlock: Add user and kernel documentation
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [EXT] Re: [PATCH v5 9/9] task_isolation: kick_all_cpus_sync: don't kick isolated cpus
- From: Frederic Weisbecker <frederic@xxxxxxxxxx>
- Re: [EXT] Re: [PATCH v5 9/9] task_isolation: kick_all_cpus_sync: don't kick isolated cpus
- From: Alex Belits <abelits@xxxxxxxxxxx>
- Re: [PATCH v5 7/9] task_isolation: don't interrupt CPUs with tick_nohz_full_kick_cpu()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v5 7/9] task_isolation: don't interrupt CPUs with tick_nohz_full_kick_cpu()
- From: Alex Belits <abelits@xxxxxxxxxxx>
- Re: [PATCH v5 4/9] task_isolation: Add task isolation hooks to arch-independent code
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v5 9/9] task_isolation: kick_all_cpus_sync: don't kick isolated cpus
- From: Frederic Weisbecker <frederic@xxxxxxxxxx>
- Re: [PATCH v5 7/9] task_isolation: don't interrupt CPUs with tick_nohz_full_kick_cpu()
- From: Frederic Weisbecker <frederic@xxxxxxxxxx>
- Re: [PATCH v2 31/39] audit: handle idmapped mounts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 3/9] task_isolation: userspace hard isolation from kernel
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/9] task_isolation: vmstat: add vmstat_idle function
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/9] task_isolation: vmstat: add quiet_vmstat_sync function
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v24 07/12] landlock: Support filesystem access-control
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v24 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v24 07/12] landlock: Support filesystem access-control
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v21 2/2] arm64: expose FAR_EL1 tag bits in siginfo
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 1/2] kasan: arm64: set TCR_EL1.TBID1 when enabled
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v5 8/9] task_isolation: ringbuffer: don't interrupt CPUs running isolated tasks on buffer resize
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 9/9] task_isolation: kick_all_cpus_sync: don't kick isolated cpus
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 7/9] task_isolation: don't interrupt CPUs with tick_nohz_full_kick_cpu()
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 6/9] task_isolation: arch/arm64: enable task isolation functionality
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 5/9] task_isolation: Add driver-specific hooks
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 4/9] task_isolation: Add task isolation hooks to arch-independent code
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 3/9] task_isolation: userspace hard isolation from kernel
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 2/9] task_isolation: vmstat: add vmstat_idle function
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 1/9] task_isolation: vmstat: add quiet_vmstat_sync function
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 0/9] "Task_isolation" mode
- From: Alex Belits <abelits@xxxxxxxxxxx>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v6 05/11] btrfs: fix check_data_csum() error message for direct I/O
- From: David Sterba <dsterba@xxxxxxx>
- Re: [PATCH v6 04/11] btrfs: fix btrfs_write_check()
- From: David Sterba <dsterba@xxxxxxx>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Problems with the new pthread clock implementations
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v10 0/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Problems with the new pthread clock implementations
- From: Adhemerval Zanella <adhemerval.zanella@xxxxxxxxxx>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v10 8/9] arch, mm: wire up memfd_secret system call were relevant
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH v10 9/9] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 8/9] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 7/9] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 6/9] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 5/9] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 4/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 3/9] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 2/9] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 1/9] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 0/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 14/39] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 31/39] audit: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 31/39] audit: handle idmapped mounts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 14/39] commoncap: handle idmapped mounts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 3/7] kernel: Implement selective syscall userspace redirection
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Problems with the new pthread clock implementations
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: Problems with the new pthread clock implementations
- From: Mike Crowe <mac@xxxxxxxxxx>
- Re: Problems with the new pthread clock implementations
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: Problems with the new pthread clock implementations
- From: Mike Crowe <mac@xxxxxxxxxx>
- Re: [PATCH v24 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v24 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH 2/2] arm64: allow TCR_EL1.TBID0 to be configured
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH 1/2] kasan: arm64: set TCR_EL1.TBID1 when enabled
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v24 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v24 02/12] landlock: Add ruleset and domain management
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v24 07/12] landlock: Support filesystem access-control
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v24 12/12] landlock: Add user and kernel documentation
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v24 08/12] landlock: Add syscall implementations
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v24 01/12] landlock: Add object management
- From: Jann Horn <jannh@xxxxxxxxxx>
- Problems with the new pthread clock implementations
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v7 0/7] Syscall User Dispatch
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 3/7] kernel: Implement selective syscall userspace redirection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 02/11] fs: add O_ALLOW_ENCODED open flag
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Dmitry Safonov <0x7f454c46@xxxxxxxxx>
- Re: [PATCH v2 39/39] tests: add vfs/idmapped mounts test suite
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v23 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v20] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v21 2/2] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v23 12/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v20] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v20] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v20] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v4 2/2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v4 1/2] arm64: mte: make the per-task SCTLR_EL1 field usable elsewhere
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH v24 02/12] landlock: Add ruleset and domain management
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Alejandro Colomar (mailing lists; readonly)" <alx.mailinglists@xxxxxxxxx>
- Re: [PATCH v19] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v20] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v2 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v2 4/4] selftest/x86/signal: Include test cases for validating sigaltstack
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v2 1/4] x86/signal: Introduce helpers to get the maximum signal frame size
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v2 0/4] x86: Improve Minimum Alternate Stack Size
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v2 2/4] x86/elf: Support a new ELF aux vector AT_MINSIGSTKSZ
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Alexander Graf <graf@xxxxxxxxx>
- Re: [PATCH v3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v7 3/7] kernel: Implement selective syscall userspace redirection
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v19] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Alexander Graf <graf@xxxxxxxxx>
- Re: [PATCH v7 0/7] Syscall User Dispatch
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/7] kernel: Implement selective syscall userspace redirection
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v6 03/11] fs: add RWF_ENCODED for reading/writing compressed data
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v6 02/11] fs: add O_ALLOW_ENCODED open flag
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: Is adding an argument to an existing syscall okay?
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v6 11/11] btrfs: implement RWF_ENCODED writes
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 10/11] btrfs: implement RWF_ENCODED reads
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 09/11] btrfs: optionally extend i_size in cow_file_range_inline()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 08/11] btrfs: support different disk extent size for delalloc
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 07/11] btrfs: add ram_bytes and offset to btrfs_ordered_extent
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 06/11] btrfs: don't advance offset for compressed bios in btrfs_csum_one_bio()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 05/11] btrfs: fix check_data_csum() error message for direct I/O
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 04/11] btrfs: fix btrfs_write_check()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 03/11] fs: add RWF_ENCODED for reading/writing compressed data
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 02/11] fs: add O_ALLOW_ENCODED open flag
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 01/11] iov_iter: add copy_struct_from_iter()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH man-pages v6] Document encoded I/O
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 00/11] fs: interface for directly reading/writing compressed data
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Syscall User Dispatch
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v7 7/7] docs: Document Syscall User Dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Syscall User Dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: [PATCH v2] sigaction.2: Document SA_EXPOSE_TAGBITS and the flag support detection protocol
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2] sigaction.2: Document SA_EXPOSE_TAGBITS and the flag support detection protocol
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Alexander Graf <graf@xxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 RESEND] fcntl: Add 32bit filesystem mode
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v7 7/7] docs: Document Syscall User Dispatch
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Syscall User Dispatch
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v9 8/9] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v9 6/9] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Stephen Barber <smbarber@xxxxxxxxxxxx>
- [PATCH v7 7/7] docs: Document Syscall User Dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v7 6/7] selftests: Add benchmark for syscall user dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v7 5/7] selftests: Add kselftest for syscall user dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v7 4/7] entry: Support Syscall User Dispatch on common syscall entry
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v7 3/7] kernel: Implement selective syscall userspace redirection
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v7 2/7] signal: Expose SYS_USER_DISPATCH si_code type
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v7 1/7] x86: vdso: Expose sigreturn address on vdso to the kernel
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v7 0/7] Syscall User Dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: [PATCH v18] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v19] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v2] sigaction.2: Document SA_EXPOSE_TAGBITS and the flag support detection protocol
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH] sigaction.2: Document SA_EXPOSE_TAGBITS and the flag support detection protocol
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v4] fcntl: Add 32bit filesystem mode
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH v3 RESEND] fcntl: Add 32bit filesystem mode
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH v18] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v9 3/3] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v9 3/3] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 6/9] secretmem: add memcg accounting
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH v17 0/3] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v18] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v17 3/3] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: Is adding an argument to an existing syscall okay?
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v9 6/9] secretmem: add memcg accounting
- From: Roman Gushchin <guro@xxxxxx>
- Re: Is adding an argument to an existing syscall okay?
- From: Peter Oskolkov <posk@xxxxxxxxxx>
- Re: Is adding an argument to an existing syscall okay?
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: Is adding an argument to an existing syscall okay?
- From: Peter Oskolkov <posk@xxxxxxxxxx>
- Re: Is adding an argument to an existing syscall okay?
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: Is adding an argument to an existing syscall okay?
- From: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v17 0/3] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: Is adding an argument to an existing syscall okay?
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v9 8/9] arch, mm: wire up memfd_secret system call were relevant
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: Is adding an argument to an existing syscall okay?
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- [PATCH v9 9/9] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v9 8/9] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v9 7/9] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v9 6/9] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v9 5/9] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v9 4/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v9 3/9] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v9 2/9] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v9 1/9] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v9 0/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v8 2/9] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v8 2/9] mmap: make mlock_future_check() global
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: Is adding an argument to an existing syscall okay?
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v17 3/3] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] memfd_secret.2: New page describing memfd_secret() system call
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v24 00/12] Landlock LSM
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v16 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v17 3/3] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v17 2/3] signal: define the SA_UNSUPPORTED bit in sa_flags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v17 1/3] arch: provide better documentation for the arch-specific SA_* flags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v17 0/3] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v16 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Is adding an argument to an existing syscall okay?
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v16 5/6] signal: define the SA_UNSUPPORTED bit in sa_flags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v16 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v16 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v16 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v22 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v22 01/12] landlock: Add object management
- From: Pavel Machek <pavel@xxxxxx>
- [PATCH v2] memfd_secret.2: New page describing memfd_secret() system call
- From: Alejandro Colomar <alx.manpages@xxxxxxxxx>
- Re: [PATCH] fscrypt: remove kernel-internal constants from UAPI header
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v16 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v16 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH] syscalls: Fix file comments for syscalls implemented in kernel/sys.c
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH] syscalls: Fix file comments for syscalls implemented in kernel/sys.c
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/3] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: "Catangiu, Adrian Costin" <acatan@xxxxxxxxxx>
- Re: [PATCH v16 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH] sigaction.2: Document SA_EXPOSE_TAGBITS and the flag support detection protocol
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v9 3/3] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH v16 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v2 35/39] ecryptfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 21/39] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 27/39] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 34/39] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 26/39] ioctl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 23/39] fcntl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 30/39] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 20/39] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 38/39] selftests: add idmapped mounts xattr selftest
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 22/39] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 25/39] init: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 28/39] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 32/39] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 39/39] tests: add vfs/idmapped mounts test suite
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 24/39] notify: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 37/39] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 29/39] fs: add helpers for idmap mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 33/39] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 31/39] audit: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 36/39] overlayfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 15/39] stat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 13/39] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 19/39] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 18/39] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 17/39] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 16/39] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 14/39] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 12/39] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 11/39] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 10/39] inode: add idmapped mount aware init and permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 09/39] namei: add idmapped mount aware permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 07/39] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 08/39] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 00/39] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 05/39] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 06/39] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 04/39] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 02/39] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 03/39] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 01/39] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] sigaction.2: Document SA_EXPOSE_TAGBITS and the flag support detection protocol
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v8 6/9] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v8 8/9] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v8 4/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v8 4/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v8 2/9] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH] sigaction.2: Document SA_EXPOSE_TAGBITS and the flag support detection protocol
- From: Alejandro Colomar <alx.manpages@xxxxxxxxx>
- Re: [PATCH v16 5/6] signal: define the SA_UNSUPPORTED bit in sa_flags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v16 5/6] signal: define the SA_UNSUPPORTED bit in sa_flags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH] sigaction.2: Document SA_EXPOSE_TAGBITS and the flag support detection protocol
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 6/9] secretmem: add memcg accounting
- From: Roman Gushchin <guroan@xxxxxxxxx>
- Re: [RFC PATCH] docs: ABI: ABI documentation for procfs attribute files used by multiple LSMs
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [RFC]: userspace memory reaping
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v8 4/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v8 4/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v8 3/9] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v8 8/9] arch, mm: wire up memfd_secret system call were relevant
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH v16 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v16 5/6] signal: define the SA_UNSUPPORTED bit in sa_flags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v16 4/6] signal: clear non-uapi flag bits when passing/returning sa_flags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v16 3/6] arch: move SA_* definitions to generic headers
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v16 2/6] parisc: start using signal-defs.h
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v16 1/6] parisc: Drop parisc special case for __sighandler_t
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v16 0/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v15 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v15 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v15 4/6] signal: clear non-uapi flag bits when passing/returning sa_flags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v15 5/6] signal: define the SA_UNSUPPORTED bit in sa_flags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v15 3/6] arch: move SA_* definitions to generic headers
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v15 0/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v15 2/6] parisc: start using signal-defs.h
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v15 1/6] parisc: Drop parisc special case for __sighandler_t
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v8 6/9] secretmem: add memcg accounting
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 8/8] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH] syscalls: Fix file comments for syscalls implemented in kernel/sys.c
- From: Tal Zussman <tz2294@xxxxxxxxxxxx>
- [PATCH v24 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 03/12] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 09/12] arch: Wire up Landlock syscalls
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 10/12] selftests/landlock: Add user space tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 04/12] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v8 2/9] mmap: make mlock_future_check() global
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v14 7/8] signal: define the field siginfo.si_faultflags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v8 2/9] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v14 8/8] arm64: expose FAR_EL1 tag bits in siginfo
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v14 7/8] signal: define the field siginfo.si_faultflags
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v14 7/8] signal: define the field siginfo.si_faultflags
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v8 2/9] mmap: make mlock_future_check() global
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v8 0/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v14 7/8] signal: define the field siginfo.si_faultflags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v14 7/8] signal: define the field siginfo.si_faultflags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v14 7/8] signal: define the field siginfo.si_faultflags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v14 8/8] arm64: expose FAR_EL1 tag bits in siginfo
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v14 7/8] signal: define the field siginfo.si_faultflags
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v14 7/8] signal: define the field siginfo.si_faultflags
- From: Haren Myneni <haren@xxxxxxxxxxxxx>
- Re: [PATCH v14 8/8] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v14 8/8] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v8 2/9] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [RFC PATCH] docs: ABI: ABI documentation for procfs attribute files used by multiple LSMs
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v8 2/9] mmap: make mlock_future_check() global
- From: David Hildenbrand <david@xxxxxxxxxx>
- [PATCH v15 07/26] x86/mm: Remove _PAGE_DIRTY_HW from kernel RO pages
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 3/7] x86/cet/ibt: Handle signals for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 1/7] x86/cet/ibt: Add Kconfig option for user-mode Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 0/7] Control-flow Enforcement: Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 2/7] x86/cet/ibt: User-mode Indirect Branch Tracking support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 4/7] x86/cet/ibt: ELF header parsing for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 6/7] x86/vdso/32: Add ENDBR32 to __kernel_vsyscall entry point
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 7/7] x86/vdso: Insert endbr32/endbr64 to vDSO
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 5/7] x86/cet/ibt: Update arch_prctl functions for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 08/26] x86/mm: Introduce _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 01/26] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 06/26] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 13/26] x86/mm: Shadow Stack page fault error checking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 12/26] mm: Introduce VM_SHSTK for shadow stack memory
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 14/26] x86/mm: Update maybe_mkwrite() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 11/26] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY_HW to _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 09/26] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 10/26] x86/mm: Update pte_modify for _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 15/26] mm: Fixup places that call pte_mkwrite() directly
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 04/26] x86/cet: Add control-protection fault handler
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 16/26] mm: Add guard pages around a shadow stack.
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 21/26] x86/cet/shstk: Handle signals for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 26/26] mm: Introduce PROT_SHSTK for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 19/26] mm: Re-introduce vm_flags to do_mmap()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 18/26] mm: Update can_follow_write_pte() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 25/26] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 20/26] x86/cet/shstk: User-mode shadow stack support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 22/26] binfmt_elf: Define GNU_PROPERTY_X86_FEATURE_1_AND properties
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 24/26] x86/cet/shstk: Handle thread shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 23/26] ELF: Introduce arch_setup_elf_property()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 17/26] mm/mmap: Add shadow stack pages to memory accounting
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 02/26] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v15 00/26] Control-flow Enforcement: Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v14 4/8] signal: deduplicate code dealing with common _sigfault fields
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v8 9/9] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v8 8/9] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v8 7/9] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v8 6/9] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v8 5/9] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v8 4/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v8 3/9] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v8 2/9] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v8 1/9] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v8 0/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v14 8/8] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v23 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v23 00/12] Landlock LSM
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v14 8/8] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v14 4/8] signal: deduplicate code dealing with common _sigfault fields
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v14 5/8] signal: clear non-uapi flag bits when passing/returning sa_flags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v14 7/8] signal: define the field siginfo.si_faultflags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v14 7/8] signal: define the field siginfo.si_faultflags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v14 8/8] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v14 4/8] signal: deduplicate code dealing with common _sigfault fields
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v14 5/8] signal: clear non-uapi flag bits when passing/returning sa_flags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v22 12/23] LSM: Specify which LSM to display
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v22 12/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v6 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Hagen Paul Pfeifer <hagen@xxxxxxxx>
- Re: [PATCH v22 12/23] LSM: Specify which LSM to display
- From: John Johansen <john.johansen@xxxxxxxxxxxxx>
- Re: [PATCH v22 12/23] LSM: Specify which LSM to display
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v22 12/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v14 02/26] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v14 02/26] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v14 02/26] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v14 02/26] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v14 01/26] Documentation/x86: Add CET description
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v14 01/26] Documentation/x86: Add CET description
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v14 01/26] Documentation/x86: Add CET description
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v14 01/26] Documentation/x86: Add CET description
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] crypto: af_alg - avoid undefined behavior accessing salg_name
- From: Herbert Xu <herbert@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC]: userspace memory reaping
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [RFC]: userspace memory reaping
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [RFC]: userspace memory reaping
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [RFC]: userspace memory reaping
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [RFC]: userspace memory reaping
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [RFC]: userspace memory reaping
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [RFC]: userspace memory reaping
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [RFC]: userspace memory reaping
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v22 12/23] LSM: Specify which LSM to display
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH v22 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 12/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v22 12/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH v14 8/8] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v14 7/8] signal: define the field siginfo.si_faultflags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v14 6/8] signal: define the SA_UNSUPPORTED bit in sa_flags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v14 5/8] signal: clear non-uapi flag bits when passing/returning sa_flags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v14 4/8] signal: deduplicate code dealing with common _sigfault fields
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v14 3/8] arch: move SA_* definitions to generic headers
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v14 2/8] parisc: start using signal-defs.h
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v14 1/8] parisc: Drop parisc special case for __sighandler_t
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v14 0/8] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v13 3/8] arch: move SA_* definitions to generic headers
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v13 1/8] parisc: Drop parisc special case for __sighandler_t
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [RFC]: userspace memory reaping
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v13 7/8] signal: define the field siginfo.si_faultflags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v13 3/8] arch: move SA_* definitions to generic headers
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v13 8/8] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v13 7/8] signal: define the field siginfo.si_faultflags
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v13 2/8] parisc: start using signal-defs.h
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v13 1/8] parisc: Drop parisc special case for __sighandler_t
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v13 8/8] arm64: expose FAR_EL1 tag bits in siginfo
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v13 1/8] parisc: Drop parisc special case for __sighandler_t
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v13 1/8] parisc: Drop parisc special case for __sighandler_t
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v6 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v13 1/8] parisc: Drop parisc special case for __sighandler_t
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v6 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Hagen Paul Pfeifer <hagen@xxxxxxxx>
- Re: [PATCH v13 7/8] signal: define the field siginfo.si_faultflags
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [RFC]: userspace memory reaping
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [RFC]: userspace memory reaping
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [RFC]: userspace memory reaping
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [RFC]: userspace memory reaping
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [RFC]: userspace memory reaping
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v13 8/8] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v13 7/8] signal: define the field siginfo.si_faultflags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v13 8/8] arm64: expose FAR_EL1 tag bits in siginfo
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH v23 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 03/12] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 04/12] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 09/12] arch: Wire up Landlock syscalls
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 10/12] selftests/landlock: Add user space tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v23 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v13 7/8] signal: define the field siginfo.si_faultflags
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v6 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v22 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Alban Crequy <alban@xxxxxxxxxx>
- Re: [PATCH v6 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Hagen Paul Pfeifer <hagen@xxxxxxxx>
- Re: [PATCH v12 8/8] arm64: expose FAR_EL1 tag bits in siginfo
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v12 7/8] signal: define the field siginfo.si_xflags
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v6 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v6 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [RFC]: userspace memory reaping
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v12 7/8] signal: define the field siginfo.si_xflags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v13 8/8] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v13 7/8] signal: define the field siginfo.si_faultflags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v13 6/8] signal: deduplicate code dealing with common _sigfault fields
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v13 5/8] signal: define the SA_UNSUPPORTED bit in sa_flags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v13 4/8] signal: clear non-uapi flag bits when passing/returning sa_flags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v13 3/8] arch: move SA_* definitions to generic headers
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v13 2/8] parisc: start using signal-defs.h
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v13 1/8] parisc: Drop parisc special case for __sighandler_t
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v13 0/8] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v12 8/8] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v3 01/14] docs: Document IO Address Space ID (IOASID) APIs
- From: Jacob Pan <jacob.jun.pan@xxxxxxxxxxxxxxx>
- Re: [RFC]: userspace memory reaping
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v12 8/8] arm64: expose FAR_EL1 tag bits in siginfo
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v6 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v6 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v12 7/8] signal: define the field siginfo.si_xflags
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v12 4/8] signal: clear non-uapi flag bits when passing/returning sa_flags
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v12 3/8] arch: move SA_* definitions to generic headers
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v6 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH 03/34] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 01/34] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 05/34] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 06/34] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 07/34] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v6 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v6 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: UBSAN: array-index-out-of-bounds in alg_bind
- From: syzbot <syzbot+92ead4eb8e26a26d465e@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 07/34] capability: handle idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 06/34] fs: add id translation helpers
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 05/34] fs: introduce MOUNT_ATTR_IDMAP
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 03/34] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 01/34] namespace: take lock_mount_hash() directly when changing flags
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v6 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Hagen Paul Pfeifer <hagen@xxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Seth Forshee <seth.forshee@xxxxxxxxxxxxx>
- Re: [PATCH v22 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 01/14] docs: Document IO Address Space ID (IOASID) APIs
- From: Jean-Philippe Brucker <jean-philippe@xxxxxxxxxx>
- Re: [PATCH 33/34] overlayfs: handle idmapped merged mounts
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v22 08/12] landlock: Add syscall implementations
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v22 01/12] landlock: Add object management
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Stéphane Graber <stgraber@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 00/34] fs: idmapped mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 00/34] fs: idmapped mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 00/34] fs: idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Sargun Dhillon <sargun@xxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Lennart Poettering <lennart@xxxxxxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH 00/34] fs: idmapped mounts
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RFC PATCH 1/2] rseq: Implement KTLS prototype for x86-64
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v22 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v22 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v22 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v22 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v22 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v22 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Samba]
[Yosemite News]