Linux API
[Prev Page][Next Page]
- Re: Please remove all bit fields in bpf uapi
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: Please remove all bit fields in bpf uapi
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Ping: [PATCH man-pages v6] Document encoded I/O
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: Please remove all bit fields in bpf uapi
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] sigaction.2: Document SA_EXPOSE_TAGBITS and the flag support detection protocol
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH -V6 RESEND 2/3] NOT kernel/man-pages: man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: "Alejandro Colomar (mailing lists; readonly)" <alx.mailinglists@xxxxxxxxx>
- Re: Please remove all bit fields in bpf uapi
- From: Meng Zhuo <mengzhuo1203@xxxxxxxxx>
- Re: Please remove all bit fields in bpf uapi
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Please remove all bit fields in bpf uapi
- From: Meng Zhuo <mengzhuo1203@xxxxxxxxx>
- [PATCH v7] mm: Optional full ASLR for mmap(), mremap(), vdso, stack and heap
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [RFC PATCH v6] mm: Optional full ASLR for mmap(), mremap(), vdso, stack and heap
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH v2] mm/vmalloc: randomize vmalloc() allocations
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- [PATCH AUTOSEL 5.9 09/23] selftests: tc-testing: enable CONFIG_NET_SCH_RED as a module
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.9 23/23] tools/testing/selftests/vm: fix build error
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v14 10/10] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v14 10/10] secretmem: test: add basic selftest for memfd_secret(2)
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v5 0/9] "Task_isolation" mode
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v15 08/26] x86/mm: Introduce _PAGE_COW
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v15 08/26] x86/mm: Introduce _PAGE_COW
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH] futex: Change 'utime' parameter to be 'const ... *'
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH v26 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH -V6 RESEND 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: "Huang\, Ying" <ying.huang@xxxxxxxxx>
- [PATCH v16 05/26] x86/fpu/xstate: Introduce CET MSR and XSAVES supervisor states
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 03/26] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 02/26] x86/cet/shstk: Add Kconfig option for user-mode control-flow protection
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 08/26] x86/mm: Introduce _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 11/26] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY to _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 14/26] x86/mm: Update maybe_mkwrite() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 13/26] x86/mm: Shadow Stack page fault error checking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 10/26] x86/mm: Update pte_modify for _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 12/26] mm: Introduce VM_SHSTK for shadow stack memory
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 09/26] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 07/26] x86/mm: Remove _PAGE_DIRTY from kernel RO pages
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 04/26] x86/cpufeatures: Introduce X86_FEATURE_CET and setup functions
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 18/26] mm: Update can_follow_write_pte() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 15/26] mm: Fixup places that call pte_mkwrite() directly
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 19/26] mm: Re-introduce vm_flags to do_mmap()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 20/26] x86/cet/shstk: User-mode shadow stack support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 23/26] ELF: Introduce arch_setup_elf_property()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 17/26] mm/mmap: Add shadow stack pages to memory accounting
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 26/26] mm: Introduce PROT_SHSTK for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 25/26] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 0/7] Control-flow Enforcement: Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 1/7] x86/cet/ibt: Update Kconfig for user-mode Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 6/7] x86/vdso/32: Add ENDBR32 to __kernel_vsyscall entry point
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 5/7] x86/cet/ibt: Update arch_prctl functions for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 7/7] x86/vdso: Insert endbr32/endbr64 to vDSO
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 4/7] x86/cet/ibt: Update ELF header parsing for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 3/7] x86/cet/ibt: Handle signals for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 2/7] x86/cet/ibt: User-mode Indirect Branch Tracking support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 24/26] x86/cet/shstk: Handle thread shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 21/26] x86/cet/shstk: Handle signals for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 22/26] binfmt_elf: Define GNU_PROPERTY_X86_FEATURE_1_AND properties
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 16/26] mm: Add guard pages around a shadow stack.
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 06/26] x86/cet: Add control-protection fault handler
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 00/26] Control-flow Enforcement: Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v16 01/26] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v26 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 04/12] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 10/12] selftests/landlock: Add user space tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 09/12] arch: Wire up Landlock syscalls
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 03/12] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v26 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] mm,hwpoison: Return -EBUSY when migration fails
- From: Oscar Salvador <osalvador@xxxxxxx>
- Re: [PATCH] mm,hwpoison: Return -EBUSY when migration fails
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH 2/2] mm/madvise: add process_madvise MADV_DONTNEER support
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 2/2] mm/madvise: add process_madvise MADV_DONTNEER support
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v15 08/26] x86/mm: Introduce _PAGE_COW
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v15 08/26] x86/mm: Introduce _PAGE_COW
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v15 08/26] x86/mm: Introduce _PAGE_COW
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v15 08/26] x86/mm: Introduce _PAGE_COW
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v4 06/40] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v4 06/40] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v4 06/40] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v4 06/40] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v4 05/40] fs: add attr_flags_to_mnt_flags helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH -V6 RESEND 2/3] NOT kernel/man-pages: man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: "Huang\, Ying" <ying.huang@xxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v14 09/10] arch, mm: wire up memfd_secret system call were relevant
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [RFC net-next af_unix v1 0/1] Allow delivery of SIGURG on AF_UNIX streams socket
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v4 06/40] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v15 07/26] x86/mm: Remove _PAGE_DIRTY_HW from kernel RO pages
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v4 05/40] fs: add attr_flags_to_mnt_flags helper
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v4 04/40] fs: split out functions to hold writers
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [RFC net-next af_unix v1 0/1] Allow delivery of SIGURG on AF_UNIX streams socket
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v15 07/26] x86/mm: Remove _PAGE_DIRTY_HW from kernel RO pages
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC net-next af_unix v1 0/1] Allow delivery of SIGURG on AF_UNIX streams socket
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v14 09/10] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: [PATCH v14 09/10] arch, mm: wire up memfd_secret system call were relevant
- From: Qian Cai <qcai@xxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Alexander Graf <graf@xxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Alexander Graf <graf@xxxxxxxxx>
- Re: [PATCH v3] drivers/virt: vmgenid: add vm generation id driver
- From: Alexander Graf <graf@xxxxxxxxx>
- Re: [EXT] Re: [PATCH v5 7/9] task_isolation: don't interrupt CPUs with tick_nohz_full_kick_cpu()
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [EXT] Re: [PATCH v5 6/9] task_isolation: arch/arm64: enable task isolation functionality
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH -V7 2/3] NOT kernel/man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: "Huang\, Ying" <ying.huang@xxxxxxxxx>
- Re: [PATCH v14 09/10] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: [PATCH v14 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/9] "Task_isolation" mode
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/9] "Task_isolation" mode
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- RE: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH -V7 2/3] NOT kernel/man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH -V6 RESEND 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: "Huang\, Ying" <ying.huang@xxxxxxxxx>
- [PATCH -V7 3/3] NOT kernel/numactl: Support to enable Linux kernel NUMA balancing
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -V7 2/3] NOT kernel/man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -V7 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -V7 0/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Huang Ying <ying.huang@xxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [EXT] Re: [PATCH v5 7/9] task_isolation: don't interrupt CPUs with tick_nohz_full_kick_cpu()
- From: Alex Belits <abelits@xxxxxxxxxxx>
- Re: [EXT] Re: [PATCH v5 5/9] task_isolation: Add driver-specific hooks
- From: Alex Belits <abelits@xxxxxxxxxxx>
- Re: [EXT] Re: [PATCH v5 0/9] "Task_isolation" mode
- From: Alex Belits <abelits@xxxxxxxxxxx>
- Re: [EXT] Re: [PATCH v5 6/9] task_isolation: arch/arm64: enable task isolation functionality
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v4 34/40] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 30/40] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 40/40] generic/618: add fstests for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 28/40] ioctl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 31/40] fs: make helpers idmap mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 26/40] notify: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 25/40] fcntl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 32/40] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 27/40] init: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 39/40] tests: extend mount_setattr tests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 35/40] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 22/40] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 33/40] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 20/40] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 36/40] ecryptfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 37/40] overlayfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 21/40] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 23/40] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 29/40] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 38/40] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 24/40] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 00/40] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 16/40] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 18/40] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 19/40] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 14/40] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 13/40] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 15/40] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 17/40] stat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 12/40] inode: make init and permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 11/40] namei: make permission helpers idmapped mount aware
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 01/40] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 04/40] fs: split out functions to hold writers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 03/40] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 02/40] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 07/40] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 06/40] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 10/40] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 08/40] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 09/40] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v4 05/40] fs: add attr_flags_to_mnt_flags helper
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v14 09/10] arch, mm: wire up memfd_secret system call were relevant
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v14 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Joseph Myers <joseph@xxxxxxxxxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH v12 2/3] arch: Wire up trusted_for(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v12 3/3] selftest/interpreter: Add tests for trusted_for(2) policies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v12 1/3] fs: Add trusted_for(2) syscall implementation and related sysctl
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v12 0/3] Add trusted_for(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v15 06/26] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v14 07/10] secretmem: add memcg accounting
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH v15 06/26] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v6 11/11] btrfs: implement RWF_ENCODED writes
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v6 10/11] btrfs: implement RWF_ENCODED reads
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH -V6 RESEND 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Mel Gorman <mgorman@xxxxxxx>
- Re: [PATCH -V6 RESEND 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH -V6 RESEND 2/3] NOT kernel/man-pages: man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: Mel Gorman <mgorman@xxxxxxx>
- Re: [PATCH v15 06/26] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v5 2/2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v5 1/2] arm64: mte: make the per-task SCTLR_EL1 field usable elsewhere
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v4 1/2] arm64: mte: make the per-task SCTLR_EL1 field usable elsewhere
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 10/10] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 09/10] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 08/10] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 07/10] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 06/10] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 05/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 03/10] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 02/10] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 01/10] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v14 00/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH -V6 RESEND 2/3] NOT kernel/man-pages: man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: "Huang\, Ying" <ying.huang@xxxxxxxxx>
- Re: [PATCH v6 11/11] btrfs: implement RWF_ENCODED writes
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v5 7/9] task_isolation: don't interrupt CPUs with tick_nohz_full_kick_cpu()
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v5 5/9] task_isolation: Add driver-specific hooks
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [EXT] Re: [PATCH v5 0/9] "Task_isolation" mode
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH v5 6/9] task_isolation: arch/arm64: enable task isolation functionality
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [PATCH -V6 RESEND 2/3] NOT kernel/man-pages: man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: "Alejandro Colomar (mailing lists; readonly)" <alx.mailinglists@xxxxxxxxx>
- Re: [PATCH -V6 RESEND 3/3] NOT kernel/numactl: Support to enable Linux kernel NUMA balancing
- From: Mel Gorman <mgorman@xxxxxxx>
- Re: [PATCH -V6 RESEND 2/3] NOT kernel/man-pages: man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: Mel Gorman <mgorman@xxxxxxx>
- Re: [PATCH -V6 RESEND 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Mel Gorman <mgorman@xxxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 07/38] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 17/38] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 10/38] inode: add idmapped mount aware init and permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 06/38] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 03/38] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 02/38] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 01/38] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH -V6 RESEND 2/3] NOT kernel/man-pages: man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -V6 RESEND 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -V6 RESEND 3/3] NOT kernel/numactl: Support to enable Linux kernel NUMA balancing
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -V6 RESEND 0/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Huang Ying <ying.huang@xxxxxxxxx>
- Re: [PATCH v8 0/7] Syscall User Dispatch
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v8 4/7] entry: Support Syscall User Dispatch on common syscall entry
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v8 7/7] docs: Document Syscall User Dispatch
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v8 6/7] selftests: Add benchmark for syscall user dispatch
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v8 4/7] entry: Support Syscall User Dispatch on common syscall entry
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v8 3/7] kernel: Implement selective syscall userspace redirection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v8 7/7] docs: Document Syscall User Dispatch
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v8 7/7] docs: Document Syscall User Dispatch
- From: Jonathan Corbet <corbet@xxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH] mm/vmalloc: randomize vmalloc() allocations
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH v6 02/11] fs: add O_ALLOW_ENCODED open flag
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH v25 12/12] landlock: Add user and kernel documentation
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 09/12] arch: Wire up Landlock syscalls
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 00/12] Landlock LSM
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 03/12] landlock: Set up the security framework and manage credentials
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 10/12] selftests/landlock: Add user space tests
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 06/12] fs,security: Add sb_delete hook
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 11/12] samples/landlock: Add a sandbox manager example
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 04/12] landlock: Add ptrace restrictions
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH v25 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v3] drivers/virt: vmgenid: add vm generation id driver
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Jason Gunthorpe <jgg@xxxxxxxxxx>
- Re: [PATCH v13 07/10] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v13 07/10] secretmem: add memcg accounting
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH v15 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: Borislav Petkov <bp@xxxxxxxxx>
- Ping: [PATCH man-pages v6] Document encoded I/O
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH v2 1/4] x86/signal: Introduce helpers to get the maximum signal frame size
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3 07/38] mount: attach mappings to mounts
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 17/38] namei: introduce struct renamedata
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 10/38] inode: add idmapped mount aware init and permission helpers
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 07/38] mount: attach mappings to mounts
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 06/38] fs: add id translation helpers
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 04/38] fs: add mount_setattr()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 03/38] namespace: only take read lock in do_reconfigure_mnt()
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 02/38] mount: make {lock,unlock}_mount_hash() static
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 01/38] namespace: take lock_mount_hash() directly when changing flags
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 32/38] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 00/38] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v6 02/11] fs: add O_ALLOW_ENCODED open flag
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v13 10/10] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 09/10] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 08/10] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 07/10] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 06/10] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 05/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 03/10] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 02/10] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 01/10] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v13 00/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH -v6 2/3] NOT kernel/man-pages man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: "Huang\, Ying" <ying.huang@xxxxxxxxx>
- Re: [NEEDS-REVIEW] [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 33/38] ext4: support idmapped mounts
- From: Mauricio Vásquez Bernal <mauricio@xxxxxxxxxx>
- Re: [PATCH v3 32/38] fat: handle idmapped mounts
- From: Mauricio Vásquez Bernal <mauricio@xxxxxxxxxx>
- RE: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- Re: [PATCH v15 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v2 1/4] x86/signal: Introduce helpers to get the maximum signal frame size
- From: "Bae, Chang Seok" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v15 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v12 07/10] secretmem: add memcg accounting
- From: Roman Gushchin <guro@xxxxxx>
- Re: [PATCH v15 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v15 01/26] Documentation/x86: Add CET description
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v15 01/26] Documentation/x86: Add CET description
- From: Fāng-ruì Sòng <maskray@xxxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v6 02/11] fs: add O_ALLOW_ENCODED open flag
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v6 05/11] btrfs: fix check_data_csum() error message for direct I/O
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v6 04/11] btrfs: fix btrfs_write_check()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- RE: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: "Elliott, Robert (Servers)" <elliott@xxxxxxx>
- Re: [PATCH v15 01/26] Documentation/x86: Add CET description
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- RE: [PATCH v15 01/26] Documentation/x86: Add CET description
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [NEEDS-REVIEW] [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v15 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [NEEDS-REVIEW] [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [NEEDS-REVIEW] [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH -v6 2/3] NOT kernel/man-pages man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [NEEDS-REVIEW] [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v4 1/2] arm64: mte: make the per-task SCTLR_EL1 field usable elsewhere
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [RFC net-next af_unix v1 0/1] Allow delivery of SIGURG on AF_UNIX streams socket
- From: Rao Shoaib <rao.shoaib@xxxxxxxxxx>
- Re: [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v5] mm: Optional full ASLR for mmap(), mremap(), vdso and stack
- From: Topi Miettinen <toiwoton@xxxxxxxxx>
- Re: [PATCH v12 07/10] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v12 07/10] secretmem: add memcg accounting
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [RFC net-next af_unix v1 0/1] Allow delivery of SIGURG on AF_UNIX streams socket
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [RFC net-next af_unix v1 0/1] Allow delivery of SIGURG on AF_UNIX streams socket
- From: rao.shoaib@xxxxxxxxxx
- [RFC net-next af_unix v1 1/1] af_unix: Allow delivery of SIGURG on AF_UNIX streams socket
- From: rao.shoaib@xxxxxxxxxx
- Re: [PATCH v3 00/38] idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH v3 08/38] capability: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 09/38] namei: add idmapped mount aware permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 10/38] inode: add idmapped mount aware init and permission helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 18/38] namei: prepare for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 08/38] capability: handle idmapped mounts
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- [PATCH v3 11/38] attr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 14/38] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 00/38] idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 06/38] fs: add id translation helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 04/38] fs: add mount_setattr()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 15/38] stat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 13/38] xattr: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 05/38] tests: add mount_setattr() selftests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 07/38] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 19/38] open: handle idmapped mounts in do_truncate()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 17/38] namei: introduce struct renamedata
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 12/38] acl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3] drivers/virt: vmgenid: add vm generation id driver
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v3 01/38] namespace: take lock_mount_hash() directly when changing flags
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 03/38] namespace: only take read lock in do_reconfigure_mnt()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 02/38] mount: make {lock,unlock}_mount_hash() static
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v8 3/7] kernel: Implement selective syscall userspace redirection
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v3 16/38] namei: handle idmapped mounts in may_*() helpers
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v8 5/7] selftests: Add kselftest for syscall user dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: [PATCH v2 10/39] inode: add idmapped mount aware init and permission helpers
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH v15 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v15 00/26] Control-flow Enforcement: Shadow Stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- [PATCH v8 4/7] entry: Support Syscall User Dispatch on common syscall entry
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v8 0/7] Syscall User Dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v8 1/7] x86: vdso: Expose sigreturn address on vdso to the kernel
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v3 38/38] generic/618: add fstests for idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 24/38] notify: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 27/38] would_dump: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 33/38] ext4: support idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 20/38] open: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 29/38] fs: add helpers for idmap mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 28/38] exec: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 26/38] ioctl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 22/38] utimes: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 31/38] ima: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 36/38] fs: introduce MOUNT_ATTR_IDMAP
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 34/38] ecryptfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 21/38] af_unix: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 23/38] fcntl: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 35/38] overlayfs: do not mount on top of idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 30/38] apparmor: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 37/38] tests: extend mount_setattr tests
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 25/38] init: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v3 32/38] fat: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v8 7/7] docs: Document Syscall User Dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v8 2/7] signal: Expose SYS_USER_DISPATCH si_code type
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v8 6/7] selftests: Add benchmark for syscall user dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v4 1/2] arm64: mte: make the per-task SCTLR_EL1 field usable elsewhere
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: "Catangiu, Adrian Costin" <acatan@xxxxxxxxxx>
- [PATCH v3] drivers/virt: vmgenid: add vm generation id driver
- From: "Catangiu, Adrian Costin" <acatan@xxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2 4/4] selftest/x86/signal: Include test cases for validating sigaltstack
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: "Catangiu, Adrian Costin" <acatan@xxxxxxxxxx>
- Re: [PATCH v15 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v2 2/4] x86/elf: Support a new ELF aux vector AT_MINSIGSTKSZ
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v15 00/26] Control-flow Enforcement: Shadow Stack
- From: Balbir Singh <bsingharora@xxxxxxxxx>
- Re: [PATCH v15 04/26] x86/cet: Add control-protection fault handler
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 2/4] x86/elf: Support a new ELF aux vector AT_MINSIGSTKSZ
- From: Borislav Petkov <bp@xxxxxxx>
- Re: [PATCH v15 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH -V6 3/3] NOT kernel/numactl: Support to enable Linux kernel NUMA balancing
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -v6 2/3] NOT kernel/man-pages man2/set_mempolicy.2: Add mode flag MPOL_F_NUMA_BALANCING
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -V6 1/3] numa balancing: Migrate on fault among multiple bound nodes
- From: Huang Ying <ying.huang@xxxxxxxxx>
- [PATCH -V6 0/3] autonuma: Migrate on fault among multiple bound nodes
- From: Huang Ying <ying.huang@xxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH 1/2] kasan: arm64: set TCR_EL1.TBID1 when enabled
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v12 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [Question] About SECCOMP issue for ILP32
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH 2/2] arm64: allow TCR_EL1.TBID0 to be configured
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v12 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v12 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: Mike Rapoport <rppt@xxxxxxxxxxxxx>
- Re: [PATCH v12 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v2 1/4] x86/signal: Introduce helpers to get the maximum signal frame size
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v12 10/10] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 09/10] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 08/10] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 07/10] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 06/10] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 05/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 04/10] set_memory: allow querying whether set_direct_map_*() is actually enabled
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 03/10] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 02/10] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 01/10] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v12 00/10] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [EXT] Re: [PATCH v5 9/9] task_isolation: kick_all_cpus_sync: don't kick isolated cpus
- From: Alex Belits <abelits@xxxxxxxxxxx>
- Re: [PATCH] mm: introduce sysctl file to flush per-cpu vmstat statistics
- From: Marcelo Tosatti <mtosatti@xxxxxxxxxx>
- Re: [PATCH v2 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: "Bae, Chang Seok" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v2 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: "Bae, Chang Seok" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH 2/2] arm64: allow TCR_EL1.TBID0 to be configured
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH 2/2] arm64: allow TCR_EL1.TBID0 to be configured
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v4] mm: Optional full ASLR for mmap() and mremap()
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH v2 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: "Bae, Chang Seok" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [EXT] Re: [PATCH v5 0/9] "Task_isolation" mode
- From: Alex Belits <abelits@xxxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] mm: introduce sysctl file to flush per-cpu vmstat statistics
- From: Vlastimil Babka <vbabka@xxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v11 4/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] mm/madvise: add process_madvise MADV_DONTNEER support
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v5 0/9] "Task_isolation" mode
- From: Tom Rix <trix@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Mark Wielaard <mark@xxxxxxxxx>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 2/2] mm/madvise: add process_madvise MADV_DONTNEER support
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH] syscalls: Document OCI seccomp filter interactions & workaround
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v11 4/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v10 0/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 9/9] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 8/9] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 7/9] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 6/9] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 5/9] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 4/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 3/9] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 2/9] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 1/9] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v11 0/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH 2/2] mm/madvise: add process_madvise MADV_DONTNEER support
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH 1/2] mm/madvise: allow process_madvise operations on entire memory range
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH 0/2] userspace memory reaping using process_madvise
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v24 12/12] landlock: Add user and kernel documentation
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [EXT] Re: [PATCH v5 9/9] task_isolation: kick_all_cpus_sync: don't kick isolated cpus
- From: Frederic Weisbecker <frederic@xxxxxxxxxx>
- Re: [EXT] Re: [PATCH v5 9/9] task_isolation: kick_all_cpus_sync: don't kick isolated cpus
- From: Alex Belits <abelits@xxxxxxxxxxx>
- Re: [PATCH v5 7/9] task_isolation: don't interrupt CPUs with tick_nohz_full_kick_cpu()
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v5 7/9] task_isolation: don't interrupt CPUs with tick_nohz_full_kick_cpu()
- From: Alex Belits <abelits@xxxxxxxxxxx>
- Re: [PATCH v5 4/9] task_isolation: Add task isolation hooks to arch-independent code
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v5 9/9] task_isolation: kick_all_cpus_sync: don't kick isolated cpus
- From: Frederic Weisbecker <frederic@xxxxxxxxxx>
- Re: [PATCH v5 7/9] task_isolation: don't interrupt CPUs with tick_nohz_full_kick_cpu()
- From: Frederic Weisbecker <frederic@xxxxxxxxxx>
- Re: [PATCH v2 31/39] audit: handle idmapped mounts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v5 3/9] task_isolation: userspace hard isolation from kernel
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v5 2/9] task_isolation: vmstat: add vmstat_idle function
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v5 1/9] task_isolation: vmstat: add quiet_vmstat_sync function
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v24 07/12] landlock: Support filesystem access-control
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v24 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v24 07/12] landlock: Support filesystem access-control
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v21 2/2] arm64: expose FAR_EL1 tag bits in siginfo
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH 1/2] kasan: arm64: set TCR_EL1.TBID1 when enabled
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- [PATCH v5 8/9] task_isolation: ringbuffer: don't interrupt CPUs running isolated tasks on buffer resize
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 9/9] task_isolation: kick_all_cpus_sync: don't kick isolated cpus
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 7/9] task_isolation: don't interrupt CPUs with tick_nohz_full_kick_cpu()
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 6/9] task_isolation: arch/arm64: enable task isolation functionality
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 5/9] task_isolation: Add driver-specific hooks
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 4/9] task_isolation: Add task isolation hooks to arch-independent code
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 3/9] task_isolation: userspace hard isolation from kernel
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 2/9] task_isolation: vmstat: add vmstat_idle function
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 1/9] task_isolation: vmstat: add quiet_vmstat_sync function
- From: Alex Belits <abelits@xxxxxxxxxxx>
- [PATCH v5 0/9] "Task_isolation" mode
- From: Alex Belits <abelits@xxxxxxxxxxx>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v6 05/11] btrfs: fix check_data_csum() error message for direct I/O
- From: David Sterba <dsterba@xxxxxxx>
- Re: [PATCH v6 04/11] btrfs: fix btrfs_write_check()
- From: David Sterba <dsterba@xxxxxxx>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: Problems with the new pthread clock implementations
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2 07/39] mount: attach mappings to mounts
- From: Tycho Andersen <tycho@tycho.pizza>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v10 0/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Problems with the new pthread clock implementations
- From: Adhemerval Zanella <adhemerval.zanella@xxxxxxxxxx>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v10 8/9] arch, mm: wire up memfd_secret system call were relevant
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- [PATCH v10 9/9] secretmem: test: add basic selftest for memfd_secret(2)
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 8/9] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 7/9] PM: hibernate: disable when there are active secretmem users
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 6/9] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 5/9] secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 4/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 3/9] set_memory: allow set_direct_map_*_noflush() for multiple pages
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 2/9] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 1/9] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v10 0/9] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 14/39] commoncap: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 31/39] audit: handle idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 31/39] audit: handle idmapped mounts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 14/39] commoncap: handle idmapped mounts
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v7 3/7] kernel: Implement selective syscall userspace redirection
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Problems with the new pthread clock implementations
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: Problems with the new pthread clock implementations
- From: Mike Crowe <mac@xxxxxxxxxx>
- Re: Problems with the new pthread clock implementations
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: Problems with the new pthread clock implementations
- From: Mike Crowe <mac@xxxxxxxxxx>
- Re: [PATCH v24 01/12] landlock: Add object management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v24 07/12] landlock: Support filesystem access-control
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH 2/2] arm64: allow TCR_EL1.TBID0 to be configured
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH 1/2] kasan: arm64: set TCR_EL1.TBID1 when enabled
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v24 02/12] landlock: Add ruleset and domain management
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v24 02/12] landlock: Add ruleset and domain management
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v24 07/12] landlock: Support filesystem access-control
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v24 12/12] landlock: Add user and kernel documentation
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v24 08/12] landlock: Add syscall implementations
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v24 01/12] landlock: Add object management
- From: Jann Horn <jannh@xxxxxxxxxx>
- Problems with the new pthread clock implementations
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v7 0/7] Syscall User Dispatch
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v7 3/7] kernel: Implement selective syscall userspace redirection
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v6 02/11] fs: add O_ALLOW_ENCODED open flag
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Dmitry Safonov <0x7f454c46@xxxxxxxxx>
- Re: [PATCH v2 39/39] tests: add vfs/idmapped mounts test suite
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH v23 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v20] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v21 2/2] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v21 1/2] signal: define the SA_EXPOSE_TAGBITS bit in sa_flags
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v23 12/23] LSM: Specify which LSM to display
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v20] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v20] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v20] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v4 2/2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v4 1/2] arm64: mte: make the per-task SCTLR_EL1 field usable elsewhere
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: "Darrick J. Wong" <darrick.wong@xxxxxxxxxx>
- Re: [PATCH v24 02/12] landlock: Add ruleset and domain management
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH man-pages v6] Document encoded I/O
- From: "Alejandro Colomar (mailing lists; readonly)" <alx.mailinglists@xxxxxxxxx>
- Re: [PATCH v19] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v20] arm64: expose FAR_EL1 tag bits in siginfo
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v2 3/4] x86/signal: Prevent an alternate stack overflow before a signal delivery
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v2 4/4] selftest/x86/signal: Include test cases for validating sigaltstack
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v2 1/4] x86/signal: Introduce helpers to get the maximum signal frame size
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v2 0/4] x86: Improve Minimum Alternate Stack Size
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- [PATCH v2 2/4] x86/elf: Support a new ELF aux vector AT_MINSIGSTKSZ
- From: "Chang S. Bae" <chang.seok.bae@xxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Alexander Graf <graf@xxxxxxxxx>
- Re: [PATCH v3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v7 3/7] kernel: Implement selective syscall userspace redirection
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v19] arm64: expose FAR_EL1 tag bits in siginfo
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Alexander Graf <graf@xxxxxxxxx>
- Re: [PATCH v7 0/7] Syscall User Dispatch
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v7 3/7] kernel: Implement selective syscall userspace redirection
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Christian Borntraeger <borntraeger@xxxxxxxxxx>
- Re: [PATCH v3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v6 03/11] fs: add RWF_ENCODED for reading/writing compressed data
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v6 02/11] fs: add O_ALLOW_ENCODED open flag
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- [PATCH v3] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: Is adding an argument to an existing syscall okay?
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [PATCH v6 11/11] btrfs: implement RWF_ENCODED writes
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 10/11] btrfs: implement RWF_ENCODED reads
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 09/11] btrfs: optionally extend i_size in cow_file_range_inline()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 08/11] btrfs: support different disk extent size for delalloc
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 07/11] btrfs: add ram_bytes and offset to btrfs_ordered_extent
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 06/11] btrfs: don't advance offset for compressed bios in btrfs_csum_one_bio()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 05/11] btrfs: fix check_data_csum() error message for direct I/O
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 04/11] btrfs: fix btrfs_write_check()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 03/11] fs: add RWF_ENCODED for reading/writing compressed data
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 02/11] fs: add O_ALLOW_ENCODED open flag
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 01/11] iov_iter: add copy_struct_from_iter()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH man-pages v6] Document encoded I/O
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v6 00/11] fs: interface for directly reading/writing compressed data
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Peter Collingbourne <pcc@xxxxxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Syscall User Dispatch
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v7 7/7] docs: Document Syscall User Dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Syscall User Dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: [PATCH v2] sigaction.2: Document SA_EXPOSE_TAGBITS and the flag support detection protocol
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Szabolcs Nagy <szabolcs.nagy@xxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2] arm64: Introduce prctl(PR_PAC_{SET,GET}_ENABLED_KEYS)
- From: Catalin Marinas <catalin.marinas@xxxxxxx>
- Re: [PATCH v2] sigaction.2: Document SA_EXPOSE_TAGBITS and the flag support detection protocol
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- Re: [PATCH 1/1] RFC: add pidfd_send_signal flag to reclaim mm while killing a process
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2] drivers/virt: vmgenid: add vm generation id driver
- From: Alexander Graf <graf@xxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v3 RESEND] fcntl: Add 32bit filesystem mode
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH v7 7/7] docs: Document Syscall User Dispatch
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Syscall User Dispatch
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v9 8/9] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v9 6/9] secretmem: add memcg accounting
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 00/39] fs: idmapped mounts
- From: Stephen Barber <smbarber@xxxxxxxxxxxx>
- [PATCH v7 7/7] docs: Document Syscall User Dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v7 6/7] selftests: Add benchmark for syscall user dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Samba]
[Yosemite News]