Linux API
[Prev Page][Next Page]
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH -V6 RESEND 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Mel Gorman <mgorman@xxxxxxx>
- Re: [PATCH -V6 RESEND 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH -V6 RESEND 2/3] NOT kernel/man-pages: man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: Mel Gorman <mgorman@xxxxxxx>
- Re: [PATCH v15 06/26] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v5 2/2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v5 1/2] arm64: mte: make the per-task SCTLR_EL1 field usable elsewhere
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v4 1/2] arm64: mte: make the per-task SCTLR_EL1 field usable elsewhere
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 10/10] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 09/10] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 08/10] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 07/10] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 06/10] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 05/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 03/10] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 02/10] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 01/10] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 00/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH -V6 RESEND 2/3] NOT kernel/man-pages: man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: "Huang\, Ying" <ying.huang@xxxxxxxxx>
- Re: [PATCH v6 11/11] btrfs: implement RWF_ENCODED writes
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v5 7/9] task_isolation: don't interrupt CPUs with tick_nohz_full_kick_cpu()
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v5 5/9] task_isolation: Add driver-specific hooks
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [EXT] Re: [PATCH v5 0/9] "Task_isolation" mode
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v5 6/9] task_isolation: arch/arm64: enable task isolation functionality
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH -V6 RESEND 2/3] NOT kernel/man-pages: man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: "Alejandro Colomar (mailing lists; readonly)" <alx.mailinglists@xxxxxxxxx>
- Re: [PATCH -V6 RESEND 3/3] NOT kernel/numactl: Support to enable Linux kernel NUMA balancing
- From: Mel Gorman <mgorman@xxxxxxx>
- Re: [PATCH -V6 RESEND 2/3] NOT kernel/man-pages: man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: Mel Gorman <mgorman@xxxxxxx>
- Re: [PATCH -V6 RESEND 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Mel Gorman <mgorman@xxxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 07/38] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 17/38] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 10/38] inode: add idmapped mount aware init and permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 06/38] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 03/38] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 02/38] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 01/38] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH -V6 RESEND 2/3] NOT kernel/man-pages: man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -V6 RESEND 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -V6 RESEND 3/3] NOT kernel/numactl: Support to enable Linux kernel NUMA balancing
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -V6 RESEND 0/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Huang Ying <ying.huang@xxxxxxxxx>
- Re: [PATCH v8 0/7] Syscall User Dispatch
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v8 4/7] entry: Support Syscall User Dispatch on common syscall entry
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v8 7/7] docs: Document Syscall User Dispatch
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v8 6/7] selftests: Add benchmark for syscall user dispatch
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v8 4/7] entry: Support Syscall User Dispatch on common syscall entry
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v8 3/7] kernel: Implement selective syscall userspace redirection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v8 7/7] docs: Document Syscall User Dispatch
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 7/7] docs: Document Syscall User Dispatch
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH v6 02/11] fs: add O_ALLOW_ENCODED open flag
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH v25 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 09/12] arch: Wire up Landlock syscalls
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 03/12] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 10/12] selftests/landlock: Add user space tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 04/12] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3] drivers/virt: vmgenid: add vm generation id driver
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v13 07/10] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v13 07/10] secretmem: add memcg accounting
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH v15 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: Borislav Petkov <bp@xxxxxxxxx>
- Ping: [PATCH man-pages v6] Document encoded I/O
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH v2 1/4] x86/signal: Introduce helpers to get the maximum signal frame size
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 07/38] mount: attach mappings to mounts
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 17/38] namei: introduce struct renamedata
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 10/38] inode: add idmapped mount aware init and permission helpers
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 07/38] mount: attach mappings to mounts
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 06/38] fs: add id translation helpers
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 03/38] namespace: only take read lock in do_reconfigure_mnt()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 02/38] mount: make {lock,unlock}_mount_hash() static
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 01/38] namespace: take lock_mount_hash() directly when changing flags
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 32/38] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 00/38] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v6 02/11] fs: add O_ALLOW_ENCODED open flag
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v13 10/10] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 09/10] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 08/10] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 07/10] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 06/10] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 05/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 03/10] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 02/10] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 01/10] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 00/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH -v6 2/3] NOT kernel/man-pages man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: "Huang\, Ying" <ying.huang@xxxxxxxxx>
- Re: [NEEDS-REVIEW] [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Mauricio Vásquez Bernal <mauricio@xxxxxxxxxx>
- Re: [PATCH v3 32/38] fat: handle idmapped mounts
- From: Mauricio Vásquez Bernal <mauricio@xxxxxxxxxx>
- RE: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- Re: [PATCH v15 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v2 1/4] x86/signal: Introduce helpers to get the maximum signal frame size
- From: "Bae, Chang Seok" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v15 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v12 07/10] secretmem: add memcg accounting
- From: Roman Gushchin <guro@xxxxxx>
- Re: [PATCH v15 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 01/26] Documentation/x86: Add CET description
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v15 01/26] Documentation/x86: Add CET description
- From: Fāng-ruì Sòng <maskray@xxxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v6 02/11] fs: add O_ALLOW_ENCODED open flag
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v6 05/11] btrfs: fix check_data_csum() error message for direct I/O
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v6 04/11] btrfs: fix btrfs_write_check()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- RE: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- Re: [PATCH v15 01/26] Documentation/x86: Add CET description
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- RE: [PATCH v15 01/26] Documentation/x86: Add CET description
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [NEEDS-REVIEW] [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v15 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [NEEDS-REVIEW] [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [NEEDS-REVIEW] [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH -v6 2/3] NOT kernel/man-pages man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [NEEDS-REVIEW] [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] arm64: mte: make the per-task SCTLR_EL1 field usable elsewhere
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [RFC net-next af_unix v1 0/1] Allow delivery of SIGURG on AF_UNIX streams socket
- From: Rao Shoaib <rao.shoaib@xxxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v12 07/10] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v12 07/10] secretmem: add memcg accounting
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [RFC net-next af_unix v1 0/1] Allow delivery of SIGURG on AF_UNIX streams socket
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [RFC net-next af_unix v1 0/1] Allow delivery of SIGURG on AF_UNIX streams socket
- From: rao.shoaib@xxxxxxxxxx
- [RFC net-next af_unix v1 1/1] af_unix: Allow delivery of SIGURG on AF_UNIX streams socket
- From: rao.shoaib@xxxxxxxxxx
- Re: [PATCH v3 00/38] idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH v3 08/38] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 10/38] inode: add idmapped mount aware init and permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 18/38] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 08/38] capability: handle idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH v3 11/38] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 14/38] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 00/38] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 06/38] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 04/38] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 15/38] stat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 13/38] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 05/38] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 07/38] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 19/38] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 17/38] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 12/38] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3] drivers/virt: vmgenid: add vm generation id driver
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v3 01/38] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 03/38] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 02/38] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v8 3/7] kernel: Implement selective syscall userspace redirection
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v3 16/38] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v8 5/7] selftests: Add kselftest for syscall user dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: [PATCH v2 10/39] inode: add idmapped mount aware init and permission helpers
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v15 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v15 00/26] Control-flow Enforcement: Shadow Stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- [PATCH v8 4/7] entry: Support Syscall User Dispatch on common syscall entry
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v8 0/7] Syscall User Dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v8 1/7] x86: vdso: Expose sigreturn address on vdso to the kernel
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v3 38/38] generic/618: add fstests for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 24/38] notify: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 27/38] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 20/38] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 29/38] fs: add helpers for idmap mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 28/38] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 26/38] ioctl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 22/38] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 31/38] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 36/38] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 34/38] ecryptfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 21/38] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 23/38] fcntl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 35/38] overlayfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 30/38] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 37/38] tests: extend mount_setattr tests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 25/38] init: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 32/38] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v8 7/7] docs: Document Syscall User Dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v8 2/7] signal: Expose SYS_USER_DISPATCH si_code type
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v8 6/7] selftests: Add benchmark for syscall user dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v4 1/2] arm64: mte: make the per-task SCTLR_EL1 field usable elsewhere
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: "Catangiu, Adrian Costin" <acatan@xxxxxxxxxx>
- [PATCH v3] drivers/virt: vmgenid: add vm generation id driver
- From: "Catangiu, Adrian Costin" <acatan@xxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2 4/4] selftest/x86/signal: Include test cases for validating sigaltstack
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: "Catangiu, Adrian Costin" <acatan@xxxxxxxxxx>
- Re: [PATCH v15 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 2/4] x86/elf: Support a new ELF aux vector AT_MINSIGSTKSZ
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v15 00/26] Control-flow Enforcement: Shadow Stack
- From: Balbir Singh <bsingharora@xxxxxxxxx>
- Re: [PATCH v15 04/26] x86/cet: Add control-protection fault handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 2/4] x86/elf: Support a new ELF aux vector AT_MINSIGSTKSZ
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH -V6 3/3] NOT kernel/numactl: Support to enable Linux kernel NUMA balancing
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -v6 2/3] NOT kernel/man-pages man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -V6 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -V6 0/3] autonuma: Migrate on fault among multiple bound nodes
- From: Huang Ying <ying.huang@xxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH 1/2] kasan: arm64: set TCR_EL1.TBID1 when enabled
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v12 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [Question] About SECCOMP issue for ILP32
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH 2/2] arm64: allow TCR_EL1.TBID0 to be configured
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v12 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v12 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: [PATCH v12 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2 1/4] x86/signal: Introduce helpers to get the maximum signal frame size
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v12 10/10] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 09/10] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 08/10] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 07/10] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 06/10] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 05/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 03/10] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 02/10] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 01/10] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 00/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [EXT] Re: [PATCH v5 9/9] task_isolation: kick_all_cpus_sync: don't kick isolated cpus
- From: Alex Belits <abelits@xxxxxxxxxxx>
- Re: [PATCH] mm: introduce sysctl file to flush per-cpu vmstat statistics
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- Re: [PATCH v2 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: "Bae, Chang Seok" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v2 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: "Bae, Chang Seok" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH 2/2] arm64: allow TCR_EL1.TBID0 to be configured
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH 2/2] arm64: allow TCR_EL1.TBID0 to be configured
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v4] mm: Optional full ASLR for mmap() and mremap()
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v2 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: "Bae, Chang Seok" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [EXT] Re: [PATCH v5 0/9] "Task_isolation" mode
- From: Alex Belits <abelits@xxxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] mm: introduce sysctl file to flush per-cpu vmstat statistics
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v11 4/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] mm/madvise: add process_madvise MADV_DONTNEER support
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v5 0/9] "Task_isolation" mode
- From: Tom Rix <trix@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Mark Wielaard <mark@xxxxxxxxx>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 2/2] mm/madvise: add process_madvise MADV_DONTNEER support
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v11 4/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v10 0/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 9/9] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 8/9] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 7/9] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 6/9] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 5/9] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 4/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 3/9] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 2/9] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 1/9] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 0/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH 2/2] mm/madvise: add process_madvise MADV_DONTNEER support
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH 0/2] userspace memory reaping using process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v24 12/12] landlock: Add user and kernel documentation
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [EXT] Re: [PATCH v5 9/9] task_isolation: kick_all_cpus_sync: don't kick isolated cpus
- From: Frederic Weisbecker <frederic@xxxxxxxxxx>
- Re: [EXT] Re: [PATCH v5 9/9] task_isolation: kick_all_cpus_sync: don't kick isolated cpus
- From: Alex Belits <abelits@xxxxxxxxxxx>
- Re: [PATCH v5 7/9] task_isolation: don't interrupt CPUs with tick_nohz_full_kick_cpu()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v5 7/9] task_isolation: don't interrupt CPUs with tick_nohz_full_kick_cpu()
- From: Alex Belits <abelits@xxxxxxxxxxx>
- Re: [PATCH v5 4/9] task_isolation: Add task isolation hooks to arch-independent code
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v5 9/9] task_isolation: kick_all_cpus_sync: don't kick isolated cpus
- From: Frederic Weisbecker <frederic@xxxxxxxxxx>
- Re: [PATCH v5 7/9] task_isolation: don't interrupt CPUs with tick_nohz_full_kick_cpu()
- From: Frederic Weisbecker <frederic@xxxxxxxxxx>
- Re: [PATCH v2 31/39] audit: handle idmapped mounts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 3/9] task_isolation: userspace hard isolation from kernel
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/9] task_isolation: vmstat: add vmstat_idle function
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/9] task_isolation: vmstat: add quiet_vmstat_sync function
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v24 07/12] landlock: Support filesystem access-control
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v24 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v24 07/12] landlock: Support filesystem access-control
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v21 2/2] arm64: expose FAR_EL1 tag bits in siginfo
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 1/2] kasan: arm64: set TCR_EL1.TBID1 when enabled
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v5 8/9] task_isolation: ringbuffer: don't interrupt CPUs running isolated tasks on buffer resize
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 9/9] task_isolation: kick_all_cpus_sync: don't kick isolated cpus
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 7/9] task_isolation: don't interrupt CPUs with tick_nohz_full_kick_cpu()
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 6/9] task_isolation: arch/arm64: enable task isolation functionality
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 5/9] task_isolation: Add driver-specific hooks
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 4/9] task_isolation: Add task isolation hooks to arch-independent code
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 3/9] task_isolation: userspace hard isolation from kernel
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 2/9] task_isolation: vmstat: add vmstat_idle function
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 1/9] task_isolation: vmstat: add quiet_vmstat_sync function
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 0/9] "Task_isolation" mode
- From: Alex Belits <abelits@xxxxxxxxxxx>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v6 05/11] btrfs: fix check_data_csum() error message for direct I/O
- From: David Sterba <dsterba@xxxxxxx>
- Re: [PATCH v6 04/11] btrfs: fix btrfs_write_check()
- From: David Sterba <dsterba@xxxxxxx>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Problems with the new pthread clock implementations
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v10 0/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Problems with the new pthread clock implementations
- From: Adhemerval Zanella <adhemerval.zanella@xxxxxxxxxx>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v10 8/9] arch, mm: wire up memfd_secret system call were relevant
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH v10 9/9] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 8/9] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 7/9] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 6/9] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 5/9] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 4/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 3/9] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 2/9] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 1/9] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 0/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 14/39] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 31/39] audit: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 31/39] audit: handle idmapped mounts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 14/39] commoncap: handle idmapped mounts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 3/7] kernel: Implement selective syscall userspace redirection
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Problems with the new pthread clock implementations
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: Problems with the new pthread clock implementations
- From: Mike Crowe <mac@xxxxxxxxxx>
- Re: Problems with the new pthread clock implementations
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: Problems with the new pthread clock implementations
- From: Mike Crowe <mac@xxxxxxxxxx>
- Re: [PATCH v24 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v24 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH 2/2] arm64: allow TCR_EL1.TBID0 to be configured
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH 1/2] kasan: arm64: set TCR_EL1.TBID1 when enabled
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v24 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v24 02/12] landlock: Add ruleset and domain management
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v24 07/12] landlock: Support filesystem access-control
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v24 12/12] landlock: Add user and kernel documentation
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v24 08/12] landlock: Add syscall implementations
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v24 01/12] landlock: Add object management
- From: Jann Horn <jannh@xxxxxxxxxx>
- Problems with the new pthread clock implementations
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v7 0/7] Syscall User Dispatch
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 3/7] kernel: Implement selective syscall userspace redirection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 02/11] fs: add O_ALLOW_ENCODED open flag
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Dmitry Safonov <0x7f454c46@xxxxxxxxx>
- Re: [PATCH v2 39/39] tests: add vfs/idmapped mounts test suite
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v23 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v20] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v21 2/2] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v23 12/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v20] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v20] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v20] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v4 2/2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v4 1/2] arm64: mte: make the per-task SCTLR_EL1 field usable elsewhere
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH v24 02/12] landlock: Add ruleset and domain management
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Alejandro Colomar (mailing lists; readonly)" <alx.mailinglists@xxxxxxxxx>
- Re: [PATCH v19] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v20] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v2 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v2 4/4] selftest/x86/signal: Include test cases for validating sigaltstack
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v2 1/4] x86/signal: Introduce helpers to get the maximum signal frame size
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v2 0/4] x86: Improve Minimum Alternate Stack Size
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v2 2/4] x86/elf: Support a new ELF aux vector AT_MINSIGSTKSZ
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Alexander Graf <graf@xxxxxxxxx>
- Re: [PATCH v3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v7 3/7] kernel: Implement selective syscall userspace redirection
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v19] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Alexander Graf <graf@xxxxxxxxx>
- Re: [PATCH v7 0/7] Syscall User Dispatch
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/7] kernel: Implement selective syscall userspace redirection
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v6 03/11] fs: add RWF_ENCODED for reading/writing compressed data
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v6 02/11] fs: add O_ALLOW_ENCODED open flag
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: Is adding an argument to an existing syscall okay?
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v6 11/11] btrfs: implement RWF_ENCODED writes
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 10/11] btrfs: implement RWF_ENCODED reads
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 09/11] btrfs: optionally extend i_size in cow_file_range_inline()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 08/11] btrfs: support different disk extent size for delalloc
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 07/11] btrfs: add ram_bytes and offset to btrfs_ordered_extent
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 06/11] btrfs: don't advance offset for compressed bios in btrfs_csum_one_bio()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 05/11] btrfs: fix check_data_csum() error message for direct I/O
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 04/11] btrfs: fix btrfs_write_check()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 03/11] fs: add RWF_ENCODED for reading/writing compressed data
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 02/11] fs: add O_ALLOW_ENCODED open flag
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 01/11] iov_iter: add copy_struct_from_iter()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH man-pages v6] Document encoded I/O
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 00/11] fs: interface for directly reading/writing compressed data
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Syscall User Dispatch
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v7 7/7] docs: Document Syscall User Dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Syscall User Dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: [PATCH v2] sigaction.2: Document SA_EXPOSE_TAGBITS and the flag support detection protocol
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2] sigaction.2: Document SA_EXPOSE_TAGBITS and the flag support detection protocol
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Alexander Graf <graf@xxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 RESEND] fcntl: Add 32bit filesystem mode
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v7 7/7] docs: Document Syscall User Dispatch
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Syscall User Dispatch
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v9 8/9] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v9 6/9] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Stephen Barber <smbarber@xxxxxxxxxxxx>
- [PATCH v7 7/7] docs: Document Syscall User Dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v7 6/7] selftests: Add benchmark for syscall user dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v7 5/7] selftests: Add kselftest for syscall user dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v7 4/7] entry: Support Syscall User Dispatch on common syscall entry
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v7 3/7] kernel: Implement selective syscall userspace redirection
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v7 2/7] signal: Expose SYS_USER_DISPATCH si_code type
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v7 1/7] x86: vdso: Expose sigreturn address on vdso to the kernel
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v7 0/7] Syscall User Dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: [PATCH v18] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v19] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v2] sigaction.2: Document SA_EXPOSE_TAGBITS and the flag support detection protocol
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH] sigaction.2: Document SA_EXPOSE_TAGBITS and the flag support detection protocol
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v4] fcntl: Add 32bit filesystem mode
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH v3 RESEND] fcntl: Add 32bit filesystem mode
- From: Linus Walleij <linus.walleij@xxxxxxxxxx>
- Re: [PATCH v18] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v9 3/3] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v9 3/3] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v9 6/9] secretmem: add memcg accounting
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH v17 0/3] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v18] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v17 3/3] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: Is adding an argument to an existing syscall okay?
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v9 6/9] secretmem: add memcg accounting
- From: Roman Gushchin <guro@xxxxxx>
- Re: Is adding an argument to an existing syscall okay?
- From: Peter Oskolkov <posk@xxxxxxxxxx>
- Re: Is adding an argument to an existing syscall okay?
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: Is adding an argument to an existing syscall okay?
- From: Peter Oskolkov <posk@xxxxxxxxxx>
- Re: Is adding an argument to an existing syscall okay?
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: Is adding an argument to an existing syscall okay?
- From: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v17 0/3] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: Is adding an argument to an existing syscall okay?
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v9 8/9] arch, mm: wire up memfd_secret system call were relevant
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: Is adding an argument to an existing syscall okay?
- From: "Theodore Y. Ts'o" <tytso@xxxxxxx>
- [PATCH v9 9/9] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v9 8/9] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v9 7/9] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v9 6/9] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v9 5/9] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v9 4/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v9 3/9] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v9 2/9] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v9 1/9] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v9 0/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v8 2/9] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v8 2/9] mmap: make mlock_future_check() global
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: Is adding an argument to an existing syscall okay?
- From: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
- Re: [PATCH v17 3/3] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] memfd_secret.2: New page describing memfd_secret() system call
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v24 00/12] Landlock LSM
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v16 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v17 3/3] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v17 2/3] signal: define the SA_UNSUPPORTED bit in sa_flags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v17 1/3] arch: provide better documentation for the arch-specific SA_* flags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v17 0/3] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v16 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Is adding an argument to an existing syscall okay?
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v16 5/6] signal: define the SA_UNSUPPORTED bit in sa_flags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v16 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v16 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v16 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v22 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v22 01/12] landlock: Add object management
- From: Pavel Machek <pavel@xxxxxx>
- [PATCH v2] memfd_secret.2: New page describing memfd_secret() system call
- From: Alejandro Colomar <alx.manpages@xxxxxxxxx>
- Re: [PATCH] fscrypt: remove kernel-internal constants from UAPI header
- From: Eric Biggers <ebiggers@xxxxxxxxxx>
- Re: [PATCH v16 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v16 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH] syscalls: Fix file comments for syscalls implemented in kernel/sys.c
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH] syscalls: Fix file comments for syscalls implemented in kernel/sys.c
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/3] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: "Catangiu, Adrian Costin" <acatan@xxxxxxxxxx>
- Re: [PATCH v16 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH] sigaction.2: Document SA_EXPOSE_TAGBITS and the flag support detection protocol
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v9 3/3] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH v16 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- [PATCH v2 35/39] ecryptfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 21/39] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 27/39] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 34/39] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 26/39] ioctl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 23/39] fcntl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 30/39] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 20/39] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 38/39] selftests: add idmapped mounts xattr selftest
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 22/39] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 25/39] init: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 28/39] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 32/39] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 39/39] tests: add vfs/idmapped mounts test suite
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 24/39] notify: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 37/39] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 29/39] fs: add helpers for idmap mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 33/39] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 31/39] audit: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 36/39] overlayfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 15/39] stat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 13/39] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 19/39] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 18/39] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 17/39] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 16/39] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 14/39] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 12/39] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 11/39] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 10/39] inode: add idmapped mount aware init and permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 09/39] namei: add idmapped mount aware permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 07/39] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 08/39] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 00/39] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 05/39] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 06/39] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 04/39] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 02/39] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 03/39] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 01/39] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] sigaction.2: Document SA_EXPOSE_TAGBITS and the flag support detection protocol
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v8 6/9] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v8 8/9] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v8 4/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v8 4/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v8 2/9] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH] sigaction.2: Document SA_EXPOSE_TAGBITS and the flag support detection protocol
- From: Alejandro Colomar <alx.manpages@xxxxxxxxx>
- Re: [PATCH v16 5/6] signal: define the SA_UNSUPPORTED bit in sa_flags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v16 5/6] signal: define the SA_UNSUPPORTED bit in sa_flags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH] sigaction.2: Document SA_EXPOSE_TAGBITS and the flag support detection protocol
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v8 6/9] secretmem: add memcg accounting
- From: Roman Gushchin <guroan@xxxxxxxxx>
- Re: [RFC PATCH] docs: ABI: ABI documentation for procfs attribute files used by multiple LSMs
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [RFC]: userspace memory reaping
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v8 4/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v8 4/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v8 3/9] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v8 8/9] arch, mm: wire up memfd_secret system call were relevant
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH v16 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v16 5/6] signal: define the SA_UNSUPPORTED bit in sa_flags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v16 4/6] signal: clear non-uapi flag bits when passing/returning sa_flags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v16 3/6] arch: move SA_* definitions to generic headers
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v16 2/6] parisc: start using signal-defs.h
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v16 1/6] parisc: Drop parisc special case for __sighandler_t
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v16 0/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v15 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v15 6/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v15 4/6] signal: clear non-uapi flag bits when passing/returning sa_flags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v15 5/6] signal: define the SA_UNSUPPORTED bit in sa_flags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v15 3/6] arch: move SA_* definitions to generic headers
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v15 0/6] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v15 2/6] parisc: start using signal-defs.h
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v15 1/6] parisc: Drop parisc special case for __sighandler_t
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v8 6/9] secretmem: add memcg accounting
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 8/8] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH] syscalls: Fix file comments for syscalls implemented in kernel/sys.c
- From: Tal Zussman <tz2294@xxxxxxxxxxxx>
- [PATCH v24 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 03/12] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 09/12] arch: Wire up Landlock syscalls
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 10/12] selftests/landlock: Add user space tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 04/12] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v24 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v8 2/9] mmap: make mlock_future_check() global
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v14 7/8] signal: define the field siginfo.si_faultflags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v8 2/9] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v14 8/8] arm64: expose FAR_EL1 tag bits in siginfo
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v14 7/8] signal: define the field siginfo.si_faultflags
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v14 7/8] signal: define the field siginfo.si_faultflags
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v8 2/9] mmap: make mlock_future_check() global
- From: David Hildenbrand <david@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Samba]
[Yosemite News]