Linux API
[Prev Page][Next Page]
- Re: Ways to deprecate /sys/devices/system/memory/memoryX/phys_device ?
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: Ways to deprecate /sys/devices/system/memory/memoryX/phys_device ?
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: Ways to deprecate /sys/devices/system/memory/memoryX/phys_device ?
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH] vfs: add fchmodat2 syscall
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH RESEND 2/4] scsi: sg: implement BLKSSZGET
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH RESEND 2/4] scsi: sg: implement BLKSSZGET
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- Re: Ways to deprecate /sys/devices/system/memory/memoryX/phys_device ?
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: Ways to deprecate /sys/devices/system/memory/memoryX/phys_device ?
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: Ways to deprecate /sys/devices/system/memory/memoryX/phys_device ?
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- RE: [PATCH] vfs: add fchmodat2 syscall
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] vfs: add fchmodat2 syscall
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] vfs: add fchmodat2 syscall
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH] vfs: add fchmodat2 syscall
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [PATCH] vfs: add fchmodat2 syscall
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RESEND RFC PATCH 4/5] mm/remote_mapping: use a pidfd to access memory belonging to unrelated process
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH] vfs: add fchmodat2 syscall
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [PATCH] vfs: add fchmodat2 syscall
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [PATCH] vfs: add fchmodat2 syscall
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] vfs: add fchmodat2 syscall
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH] vfs: add fchmodat2 syscall
- From: Rich Felker <dalias@xxxxxxxx>
- Ways to deprecate /sys/devices/system/memory/memoryX/phys_device ?
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Thibaut Sautereau <thibaut.sautereau@xxxxxxxxxxx>
- Re: [PATCH RESEND 2/4] scsi: sg: implement BLKSSZGET
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH RESEND 2/4] scsi: sg: implement BLKSSZGET
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- RE: [RESEND RFC PATCH 4/5] mm/remote_mapping: use a pidfd to access memory belonging to unrelated process
- From: Mircea CIRJALIU - MELIU <mcirjaliu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 6/6] mm: secretmem: add ability to reserve memory at boot
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 6/6] io_uring: add support for zone-append
- From: "hch@xxxxxxxxxxxxx" <hch@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 6/6] mm: secretmem: add ability to reserve memory at boot
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RESEND 2/4] scsi: sg: implement BLKSSZGET
- From: Christoph Hellwig <hch@xxxxxx>
- [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v8 2/3] fs,doc: Enable to configure exec checks for AT_INTERPRETED
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v8 3/3] selftest/interpreter: Add tests for AT_INTERPRETED enforcing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v6 1/9] kernel: Support TIF_SYSCALL_INTERCEPT flag
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v6 6/9] kernel: entry: Support Syscall User Dispatch for common syscall entry
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- RE: [RESEND RFC PATCH 0/5] Remote mapping
- From: Mircea CIRJALIU - MELIU <mcirjaliu@xxxxxxxxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v10 2/6] x86: Support Generic Initiator only proximity domains
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v10 0/6] ACPI: Support Generic Initiator proximity domains
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v10 5/6] node: Add access1 class to represent CPU to memory characteristics
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v6 6/9] kernel: entry: Support Syscall User Dispatch for common syscall entry
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- RE: [RESEND RFC PATCH 4/5] mm/remote_mapping: use a pidfd to access memory belonging to unrelated process
- From: Mircea CIRJALIU - MELIU <mcirjaliu@xxxxxxxxxxxxxxx>
- [PATCH 6/9] ARM: oabi-compat: rework sys_semtimedop emulation
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 4/5] mm/remote_mapping: use a pidfd to access memory belonging to unrelated process
- From: Adalbert Lazăr <alazar@xxxxxxxxxxxxxxx>
- Re: [RESEND RFC PATCH 4/5] mm/remote_mapping: use a pidfd to access memory belonging to unrelated process
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 5/5] pidfd_mem: implemented remote memory mapping system call
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 4/5] mm/remote_mapping: use a pidfd to access memory belonging to unrelated process
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v6 6/9] kernel: entry: Support Syscall User Dispatch for common syscall entry
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH v10 6/6] docs: mm: numaperf.rst Add brief description for access class 1.
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v10 4/6] ACPI: HMAT: Fix handling of changes from ACPI 6.2 to ACPI 6.3
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v10 3/6] ACPI: Let ACPI know we support Generic Initiator Affinity Structures
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v10 1/6] ACPI: Support Generic Initiator only domains
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/9] kernel: Support TIF_SYSCALL_INTERCEPT flag
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v6 2/9] kernel: entry: Support TIF_SYSCAL_INTERCEPT on common entry code
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- RE: [RESEND RFC PATCH 0/5] Remote mapping
- From: Mircea CIRJALIU - MELIU <mcirjaliu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/9] signal: Expose SYS_USER_DISPATCH si_code type
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v6 6/9] kernel: entry: Support Syscall User Dispatch for common syscall entry
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH RESEND 2/4] scsi: sg: implement BLKSSZGET
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v4 6/6] io_uring: add support for zone-append
- From: Kanchan Joshi <joshiiitr@xxxxxxxxx>
- Re: [PATCH RESEND 2/4] scsi: sg: implement BLKSSZGET
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/4] block/scsi_ioctl.c: use queue_logical_sector_size() in max_sectors_bytes()
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH v3 3/4] scsi: sg: use queue_logical_sector_size() in max_sectors_bytes()
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH v3 2/4] scsi: sg: implement BLKSSZGET
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH v3 1/4] scsi: sg: fix BLKSECTGET ioctl
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH v2 4/4] block/scsi_ioctl.c: use queue_logical_sector_size() in max_sectors_bytes()
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH v2 3/4] scsi: sg: use queue_logical_sector_size() in max_sectors_bytes()
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH v2 2/4] scsi: sg: implement BLKSSZGET
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH v2 1/4] scsi: sg: fix BLKSECTGET ioctl
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- Re: [PATCH RESEND 3/4] scsi: sg: use queue_logical_sector_size() in max_sectors_bytes()
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- Re: [PATCH RESEND 3/4] scsi: sg: use queue_logical_sector_size() in max_sectors_bytes()
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH RESEND 4/4] block/scsi_ioctl.c: use queue_logical_sector_size() in max_sectors_bytes()
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH RESEND 3/4] scsi: sg: use queue_logical_sector_size() in max_sectors_bytes()
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH RESEND 2/4] scsi: sg: implement BLKSSZGET
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH RESEND 1/4] scsi: sg: fix BLKSECTGET ioctl
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH RESEND 4/4] block/scsi_ioctl.c: use queue_logical_sector_size() in max_sectors_bytes()
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH RESEND 3/4] scsi: sg: use queue_logical_sector_size() in max_sectors_bytes()
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH RESEND 2/4] scsi: sg: implement BLKSSZGET
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH RESEND 1/4] scsi: sg: fix BLKSECTGET ioctl
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 5/9] kernel: Implement selective syscall userspace redirection
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH v6 4/9] signal: Expose SYS_USER_DISPATCH si_code type
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v6 2/9] kernel: entry: Support TIF_SYSCAL_INTERCEPT on common entry code
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v6 5/9] kernel: Implement selective syscall userspace redirection
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v6 3/9] x86: vdso: Expose sigreturn address on vdso to the kernel
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v6 9/9] doc: Document Syscall User Dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v6 8/9] selftests: Add kselftest for syscall user dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v6 7/9] x86: Enable Syscall User Dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v6 6/9] kernel: entry: Support Syscall User Dispatch for common syscall entry
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v6 0/9] Syscall User Dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v6 1/9] kernel: Support TIF_SYSCALL_INTERCEPT flag
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [RESEND RFC PATCH 5/5] pidfd_mem: implemented remote memory mapping system call
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [RESEND RFC PATCH 4/5] mm/remote_mapping: use a pidfd to access memory belonging to unrelated process
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] init: fix error check in clean_path()
- From: Christoph Hellwig <hch@xxxxxx>
- RE: [RESEND RFC PATCH 0/5] Remote mapping
- From: Mircea CIRJALIU - MELIU <mcirjaliu@xxxxxxxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- RE: [RESEND RFC PATCH 0/5] Remote mapping
- From: Mircea CIRJALIU - MELIU <mcirjaliu@xxxxxxxxxxxxxxx>
- Re: [PATCH v20 05/12] LSM: Infrastructure management of the superblock
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] init: fix error check in clean_path()
- From: Barret Rhoden <brho@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- RE: [RESEND RFC PATCH 0/5] Remote mapping
- From: Mircea CIRJALIU - MELIU <mcirjaliu@xxxxxxxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RESEND RFC PATCH 3/5] mm/mmu_notifier: remove lockdep map, allow mmu notifier to be used in nested scenarios
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH 0/5] Remote mapping
- From: Adalbert Lazăr <alazar@xxxxxxxxxxxxxxx>
- [RESEND RFC PATCH 1/5] mm: add atomic capability to zap_details
- From: Adalbert Lazăr <alazar@xxxxxxxxxxxxxxx>
- [RESEND RFC PATCH 2/5] mm: let the VMA decide how zap_pte_range() acts on mapped pages
- From: Adalbert Lazăr <alazar@xxxxxxxxxxxxxxx>
- [RESEND RFC PATCH 3/5] mm/mmu_notifier: remove lockdep map, allow mmu notifier to be used in nested scenarios
- From: Adalbert Lazăr <alazar@xxxxxxxxxxxxxxx>
- [RESEND RFC PATCH 4/5] mm/remote_mapping: use a pidfd to access memory belonging to unrelated process
- From: Adalbert Lazăr <alazar@xxxxxxxxxxxxxxx>
- [RESEND RFC PATCH 0/5] Remote mapping
- From: Adalbert Lazăr <alazar@xxxxxxxxxxxxxxx>
- [RESEND RFC PATCH 5/5] pidfd_mem: implemented remote memory mapping system call
- From: Adalbert Lazăr <alazar@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Support non-blocking pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 2/4] exit: support non-blocking pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC PATCH 0/5] Remote mapping
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v9 3/3] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Support non-blocking pidfds
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] exit: support non-blocking pidfds
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] exit: support non-blocking pidfds
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] pidfd: support PIDFD_NONBLOCK in pidfd_open()
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/3] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v9 3/3] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/3] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v2 2/4] exit: support non-blocking pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 1/4] pidfd: support PIDFD_NONBLOCK in pidfd_open()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 1/4] pidfd: support PIDFD_NONBLOCK in pidfd_open()
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v2 2/4] exit: support non-blocking pidfds
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v2 1/4] pidfd: support PIDFD_NONBLOCK in pidfd_open()
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v4 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 4/5] Add manpage for fsopen(2) and fsmount(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 4/5] Add manpage for fsopen(2) and fsmount(2)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 4/5] Add manpage for fsopen(2) and fsmount(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v2 3/4] tests: port pidfd_wait to kselftest harness
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 4/4] tests: add waitid() tests for non-blocking pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 2/4] exit: support non-blocking pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 0/4] Support non-blocking pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 1/4] pidfd: support PIDFD_NONBLOCK in pidfd_open()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2] block: grant IOPRIO_CLASS_RT to CAP_SYS_NICE
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v2] block: grant IOPRIO_CLASS_RT to CAP_SYS_NICE
- From: Khazhismel Kumykov <khazhy@xxxxxxxxxx>
- Re: [PATCH v9 3/3] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 1/4] pidfd: support PIDFD_NONBLOCK in pidfd_open()
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH 1/4] pidfd: support PIDFD_NONBLOCK in pidfd_open()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 1/4] pidfd: support PIDFD_NONBLOCK in pidfd_open()
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH 2/4] exit: support non-blocking pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 2/4] exit: support non-blocking pidfds
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [Question] About SECCOMP issue for ILP32
- From: Xiongfeng Wang <wangxiongfeng2@xxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v9 3/3] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v9 1/3] mm/madvise: pass mm to do_madvise
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v9 2/3] pid: move pidfd_get_pid() to pid.c
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v9 0/3] introduce memory hinting API for external process
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [Question] About SECCOMP issue for ILP32
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH v2] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v2] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH v2] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Rich Felker <dalias@xxxxxxxx>
- [PATCH 2/4] exit: support non-blocking pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 3/4] tests: port pidfd_wait to kselftest harness
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 0/4] Support non-blocking pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 4/4] tests: add waitid() tests for non-blocking pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 1/4] pidfd: support PIDFD_NONBLOCK in pidfd_open()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [PATCH v34 04/12] LRNG - add switchable DRNG support
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v34 01/12] Linux Random Number Generator
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2] block: grant IOPRIO_CLASS_RT to CAP_SYS_NICE
- From: Bart Van Assche <bvanassche@xxxxxxx>
- Re: [PATCH v8 3/4] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [PATCH v8 3/4] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v8 3/4] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v8 3/4] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v8 3/4] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v8 3/4] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v8 3/4] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH] x86: Extend arch_prctl (int, ...) to 5 arguments
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 2/5] Add manpages for move_mount(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 02/18] fsinfo: Add fsinfo() syscall to query filesystem information [ver #21]
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 4/5] Add manpage for fsopen(2) and fsmount(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH 1/2] Add a manpage for watch_queue(7)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 5/5] Add manpage for fsconfig(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 1/5] Add manpage for open_tree(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 3/5] Add manpage for fspick(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [RFC PATCH] mm: extend memfd with ability to create "secret" memory areas
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v20 22/23] LSM: Add /proc attr entry for full LSM context
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC PATCH] mm: extend memfd with ability to create "secret" memory areas
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v20 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v33 01/12] Linux Random Number Generator
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v33 01/12] Linux Random Number Generator
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH 2/5] Add manpages for move_mount(2) and open_tree(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v5 3/9] fs: add RWF_ENCODED for reading/writing compressed data
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v11 8/9] x86/vdso: Insert endbr32/endbr64 to vDSO
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 9/9] x86: Disallow vsyscall emulation when CET is enabled
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v34 01/12] Linux Random Number Generator
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v34 01/12] Linux Random Number Generator
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH 0/5] Introduce /proc/all/ to gather stats from all processes
- From: Eugene Lubarsky <elubarsky.linux@xxxxxxxxx>
- Re: [RFC PATCH 0/5] Introduce /proc/all/ to gather stats from all processes
- From: Eugene Lubarsky <elubarsky.linux@xxxxxxxxx>
- Re: [PATCH v11 9/9] x86: Disallow vsyscall emulation when CET is enabled
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v5 3/9] fs: add RWF_ENCODED for reading/writing compressed data
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v34 08/12] crypto: provide access to a static Jitter RNG state
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 09/12] LRNG - add Jitter RNG fast noise source
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 06/12] LRNG - add SP800-90A DRBG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 07/12] LRNG - add kernel crypto API PRNG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 05/12] crypto: DRBG - externalize DRBG functions for LRNG
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 10/12] LRNG - add SP800-90B compliant health tests
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 12/12] LRNG - add power-on and runtime self-tests
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 03/12] LRNG - sysctls and /proc interface
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 11/12] LRNG - add interface for gathering of raw entropy
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 01/12] Linux Random Number Generator
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 02/12] LRNG - allocate one DRNG instance per NUMA node
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 04/12] LRNG - add switchable DRNG support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 00/12] /dev/random - a new approach with full SP800-90B compliance
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v11 02/25] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 00/25] Control-flow Enforcement: Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 8/9] x86/vdso: Insert endbr32/endbr64 to vDSO
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v11 03/25] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 04/25] x86/cet: Add control-protection fault handler
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 09/25] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 9/9] x86: Disallow vsyscall emulation when CET is enabled
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v11 11/25] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY_HW to _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 14/25] x86/mm: Update maybe_mkwrite() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 13/25] x86/mm: Shadow Stack page fault error checking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 12/25] mm: Introduce VM_SHSTK for shadow stack memory
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 19/25] mm: Re-introduce do_mmap_pgoff()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 16/25] mm: Add guard pages around a shadow stack.
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 4/9] x86/cet/ibt: ELF header parsing for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 5/9] x86/cet/ibt: Update arch_prctl functions for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 1/9] x86/cet/ibt: Add Kconfig option for user-mode Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 8/9] x86/vdso: Insert endbr32/endbr64 to vDSO
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 7/9] x86/vdso/32: Add ENDBR32 to __kernel_vsyscall entry point
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 2/9] x86/cet/ibt: User-mode Indirect Branch Tracking support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 0/9] Control-flow Enforcement: Indirect Branch Tracking, PTRACE
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 08/25] x86/mm: Introduce _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 9/9] x86: Disallow vsyscall emulation when CET is enabled
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 3/9] x86/cet/ibt: Handle signals for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 17/25] mm/mmap: Add shadow stack pages to memory accounting
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 21/25] x86/cet/shstk: Handle signals for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 24/25] x86/cet/shstk: Handle thread shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 23/25] ELF: Introduce arch_setup_elf_property()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 20/25] x86/cet/shstk: User-mode shadow stack support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 22/25] binfmt_elf: Define GNU_PROPERTY_X86_FEATURE_1_AND properties
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 18/25] mm: Update can_follow_write_pte() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 15/25] mm: Fixup places that call pte_mkwrite() directly
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 10/25] x86/mm: Update pte_modify for _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 07/25] x86/mm: Remove _PAGE_DIRTY_HW from kernel RO pages
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 06/25] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 05/25] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 01/25] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v5 3/9] fs: add RWF_ENCODED for reading/writing compressed data
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v5 9/9] btrfs: implement RWF_ENCODED writes
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v5 8/9] btrfs: implement RWF_ENCODED reads
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v5 2/9] fs: add O_ALLOW_ENCODED open flag
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v5 1/9] iov_iter: add copy_struct_from_iter()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v5 9/9] btrfs: implement RWF_ENCODED writes
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v5 8/9] btrfs: implement RWF_ENCODED reads
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v5 7/9] btrfs: optionally extend i_size in cow_file_range_inline()
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v5 6/9] btrfs: support different disk extent size for delalloc
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v5 5/9] btrfs: add ram_bytes and offset to btrfs_ordered_extent
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v5 4/9] btrfs: don't advance offset for compressed bios in btrfs_csum_one_bio()
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v5 3/9] fs: add RWF_ENCODED for reading/writing compressed data
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v5 1/9] iov_iter: add copy_struct_from_iter()
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v5 2/9] fs: add O_ALLOW_ENCODED open flag
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH man-pages v5] Document encoded I/O
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH 1/2] Add a manpage for watch_queue(7)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/2] Add a manpage for watch_queue(7)
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- [PATCH 1/2] Add a manpage for watch_queue(7)
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/2] Modify the pipe(2) manpage for notification queues
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/2] Add a manpage for watch_queue(7)
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 1/5] Add manpage for open_tree(2)
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/5] Add manpage for fspick(2)
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 4/5] Add manpage for fsopen(2) and fsmount(2)
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 5/5] Add manpage for fsconfig(2)
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/5] Add manpages for move_mount(2)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 2/5] Add manpages for move_mount(2) and open_tree(2)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2 2/2] net: socket: implement SO_DESCRIPTION
- From: Pascal Bouchareine <kalou@xxxxxxx>
- Re: [PATCH v33 12/12] LRNG - add power-on and runtime self-tests
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v33 03/12] LRNG - sysctls and /proc interface
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH iproute2 v5 0/2] iplink: hsr: add support for creating PRP device
- From: Stephen Hemminger <stephen@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] net: socket: implement SO_DESCRIPTION
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] net: socket: implement SO_DESCRIPTION
- From: Pascal Bouchareine <kalou@xxxxxxx>
- Re: [PATCH v2 2/2] net: socket: implement SO_DESCRIPTION
- From: Pascal Bouchareine <kalou@xxxxxxx>
- Re: [PATCH 5/5] Add manpage for fsconfig(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 4/5] Add manpage for fsopen(2) and fsmount(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 3/5] Add manpage for fspick(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 2/5] Add manpages for move_mount(2) and open_tree(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 1/5] Add manpage for open_tree(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2 2/2] net: socket: implement SO_DESCRIPTION
- From: Pascal Bouchareine <kalou@xxxxxxx>
- Re: [PATCH v2 1/2] mm: add GFP mask param to strndup_user
- From: Pascal Bouchareine <kalou@xxxxxxx>
- Re: [PATCH v2 2/2] net: socket: implement SO_DESCRIPTION
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] net: socket: implement SO_DESCRIPTION
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v33 01/12] Linux Random Number Generator
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 1/2] mm: add GFP mask param to strndup_user
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v33 01/12] Linux Random Number Generator
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2 1/2] mm: add GFP mask param to strndup_user
- From: Pascal Bouchareine <kalou@xxxxxxx>
- [PATCH v2 2/2] net: socket: implement SO_DESCRIPTION
- From: Pascal Bouchareine <kalou@xxxxxxx>
- Re: [PATCH iproute2 v5 0/2] iplink: hsr: add support for creating PRP device
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- Re: [PATCH ghak90 V9 11/13] audit: contid check descendancy and nesting
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v33 01/12] Linux Random Number Generator
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH ghak90 V9 02/13] audit: add container id
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak90 V9 05/13] audit: log container info of syscalls
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak90 V9 06/13] audit: add contid support for signalling the audit daemon
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak90 V9 08/13] audit: add containerid support for user records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 4/6] ACPI: HMAT: Fix handling of changes from ACPI 6.2 to ACPI 6.3
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v9 4/6] ACPI: HMAT: Fix handling of changes from ACPI 6.2 to ACPI 6.3
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v9 4/6] ACPI: HMAT: Fix handling of changes from ACPI 6.2 to ACPI 6.3
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v9 4/6] ACPI: HMAT: Fix handling of changes from ACPI 6.2 to ACPI 6.3
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v9 4/6] ACPI: HMAT: Fix handling of changes from ACPI 6.2 to ACPI 6.3
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: file metadata via fs API
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v9 4/6] ACPI: HMAT: Fix handling of changes from ACPI 6.2 to ACPI 6.3
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v9 4/6] ACPI: HMAT: Fix handling of changes from ACPI 6.2 to ACPI 6.3
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH man-pages v5] Document encoded I/O
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v9 2/6] x86: Support Generic Initiator only proximity domains
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v5 3/9] fs: add RWF_ENCODED for reading/writing compressed data
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v9 4/6] ACPI: HMAT: Fix handling of changes from ACPI 6.2 to ACPI 6.3
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v5 9/9] btrfs: implement RWF_ENCODED writes
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v5 8/9] btrfs: implement RWF_ENCODED reads
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v5 7/9] btrfs: optionally extend i_size in cow_file_range_inline()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v5 6/9] btrfs: support different disk extent size for delalloc
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v5 4/9] btrfs: don't advance offset for compressed bios in btrfs_csum_one_bio()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v5 5/9] btrfs: add ram_bytes and offset to btrfs_ordered_extent
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v5 3/9] fs: add RWF_ENCODED for reading/writing compressed data
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v5 2/9] fs: add O_ALLOW_ENCODED open flag
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v5 1/9] iov_iter: add copy_struct_from_iter()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH man-pages v5] Document encoded I/O
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v5 0/9] fs: interface for directly reading/writing compressed data
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v33 00/12] /dev/random - a new approach with full SP800-90B compliance
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 06/12] LRNG - add SP800-90A DRBG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 01/12] Linux Random Number Generator
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 03/12] LRNG - sysctls and /proc interface
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 02/12] LRNG - allocate one DRNG instance per NUMA node
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 04/12] LRNG - add switchable DRNG support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 09/12] LRNG - add Jitter RNG fast noise source
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 05/12] crypto: DRBG - externalize DRBG functions for LRNG
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 10/12] LRNG - add SP800-90B compliant health tests
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 11/12] LRNG - add interface for gathering of raw entropy
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 12/12] LRNG - add power-on and runtime self-tests
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 07/12] LRNG - add kernel crypto API PRNG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 08/12] crypto: provide access to a static Jitter RNG state
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v9 2/6] x86: Support Generic Initiator only proximity domains
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v9 4/6] ACPI: HMAT: Fix handling of changes from ACPI 6.2 to ACPI 6.3
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [RFC PATCH 0/5] Introduce /proc/all/ to gather stats from all processes
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: [PATCH v4 6/6] mm: secretmem: add ability to reserve memory at boot
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v32 11/12] LRNG - add interface for gathering of raw entropy
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v32 07/12] LRNG - add kernel crypto API PRNG extension
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v32 01/12] Linux Random Number Generator
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v32 06/12] LRNG - add SP800-90A DRBG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v32 06/12] LRNG - add SP800-90A DRBG extension
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v32 01/12] Linux Random Number Generator
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v32 03/12] LRNG - sysctls and /proc interface
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 10/12] LRNG - add SP800-90B compliant health tests
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 01/12] Linux Random Number Generator
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 06/12] LRNG - add SP800-90A DRBG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 04/12] LRNG - add switchable DRNG support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 02/12] LRNG - allocate one DRNG instance per NUMA node
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 08/12] crypto: provide access to a static Jitter RNG state
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 09/12] LRNG - add Jitter RNG fast noise source
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 00/12] /dev/random - a new approach with full SP800-90B compliance
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 11/12] LRNG - add interface for gathering of raw entropy
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 07/12] LRNG - add kernel crypto API PRNG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 05/12] crypto: DRBG - externalize DRBG functions for LRNG
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 12/12] LRNG - add power-on and runtime self-tests
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH iproute2 v5 0/2] iplink: hsr: add support for creating PRP device
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 6/6] mm: secretmem: add ability to reserve memory at boot
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 6/6] mm: secretmem: add ability to reserve memory at boot
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v9 6/6] docs: mm: numaperf.rst Add brief description for access class 1.
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v9 5/6] node: Add access1 class to represent CPU to memory characteristics
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v9 4/6] ACPI: HMAT: Fix handling of changes from ACPI 6.2 to ACPI 6.3
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v9 3/6] ACPI: Let ACPI know we support Generic Initiator Affinity Structures
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v9 2/6] x86: Support Generic Initiator only proximity domains
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v9 1/6] ACPI: Support Generic Initiator only domains
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v9 0/6] ACPI: Support Generic Initiator proximity domains
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 6/6] mm: secretmem: add ability to reserve memory at boot
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 6/6] mm: secretmem: add ability to reserve memory at boot
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 6/6] mm: secretmem: add ability to reserve memory at boot
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: file metadata via fs API
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: file metadata via fs API
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] mm: introduce reference pages
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Jeffrey E Altman <jaltman@xxxxxxxxxxxx>
- [PATCH v4 6/6] mm: secretmem: add ability to reserve memory at boot
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v4 5/6] mm: secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v4 3/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v4 4/6] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v4 2/6] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v4 1/6] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v4 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: file metadata via fs API
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v3] mm: introduce reference pages
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v3] mm: introduce reference pages
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: file metadata via fs API
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH iproute2 v5 2/2] ip: iplink: prp: update man page for new parameter
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [PATCH iproute2 v5 1/2] iplink: hsr: add support for creating PRP device similar to HSR
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- [PATCH iproute2 v5 0/2] iplink: hsr: add support for creating PRP device
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- Re: [net-next iproute2 PATCH v4 1/2] iplink: hsr: add support for creating PRP device similar to HSR
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- Re: [PATCH 00/23] proc: Introduce /proc/namespaces/ directory to expose namespaces lineary
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: file metadata via fs API
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 02/23] fs: refactor ksys_umount
- From: Naresh Kamboju <naresh.kamboju@xxxxxxxxxx>
- Re: file metadata via fs API
- From: Steven Whitehouse <swhiteho@xxxxxxxxxx>
- Re: [net-next iproute2 PATCH v4 1/2] iplink: hsr: add support for creating PRP device similar to HSR
- From: Stephen Hemminger <stephen@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] net: socket: implement SO_DESCRIPTION
- From: Pascal Bouchareine <kalou@xxxxxxx>
- Re: [PATCH 2/2] net: socket: implement SO_DESCRIPTION
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH 1/2] mm: add GFP mask param to strndup_user
- From: Alexey Dobriyan <adobriyan@xxxxxxxxx>
- Re: [PATCH 2/2] net: socket: implement SO_DESCRIPTION
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 2/2] net: socket: implement SO_DESCRIPTION
- From: kernel test robot <lkp@xxxxxxxxx>
- [RFC PATCH] net: socket: sock_set_description() can be static
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 2/2] net: socket: implement SO_DESCRIPTION
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH 1/2] mm: add GFP mask param to strndup_user
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] net: socket: implement SO_DESCRIPTION
- From: Pascal Bouchareine <kalou@xxxxxxx>
- [RFC PATCH 0/2] proc,socket: attach description to sockets
- From: Pascal Bouchareine <kalou@xxxxxxx>
- [PATCH 1/2] mm: add GFP mask param to strndup_user
- From: Pascal Bouchareine <kalou@xxxxxxx>
- Re: [RFC PATCH] mm: extend memfd with ability to create "secret" memory areas
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH] mm: extend memfd with ability to create "secret" memory areas
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 6/6] io_uring: add support for zone-append
- From: Damien Le Moal <Damien.LeMoal@xxxxxxx>
- Re: [PATCH v4 6/6] io_uring: add support for zone-append
- From: "hch@xxxxxxxxxxxxx" <hch@xxxxxxxxxxxxx>
- Re: setsid2(sid) proposal - assign current process to existing session
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- setsid2(sid) proposal - assign current process to existing session
- From: Devin Bayer <dev@xxxxxxxxx>
- Re: [PATCH v4 6/6] io_uring: add support for zone-append
- From: Damien Le Moal <Damien.LeMoal@xxxxxxx>
- Re: [PATCH v4 6/6] io_uring: add support for zone-append
- From: "hch@xxxxxxxxxxxxx" <hch@xxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: file metadata via fs API
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: [PATCH v4 2/2] fcntl: introduce F_SET_DESCRIPTION
- From: Pascal Bouchareine <kalou@xxxxxxx>
- Re: [PATCH v4 2/2] fcntl: introduce F_SET_DESCRIPTION
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [PATCH v4 2/2] fcntl: introduce F_SET_DESCRIPTION
- From: Pascal Bouchareine <kalou@xxxxxxx>
- [PATCH v4 1/2] mm: add GFP mask param to strndup_user
- From: Pascal Bouchareine <kalou@xxxxxxx>
- [PATCH v4 0/2] proc,fcntl: introduce F_SET_DESCRIPTION
- From: Pascal Bouchareine <kalou@xxxxxxx>
- Re: [PATCH v20 08/12] landlock: Add syscall implementations
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v20 05/12] LSM: Infrastructure management of the superblock
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH v7 3/7] exec: Move path_noexec() check earlier
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH 0/5] Introduce /proc/all/ to gather stats from all processes
- From: Eugene Lubarsky <elubarsky.linux@xxxxxxxxx>
- Re: [PATCH v7 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v20 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: file metadata via fs API
- From: Karel Zak <kzak@xxxxxxxxxx>
- Re: file metadata via fs API
- From: Karel Zak <kzak@xxxxxxxxxx>
- Re: [RFC PATCH 0/5] Introduce /proc/all/ to gather stats from all processes
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: [RFC PATCH 0/5] Introduce /proc/all/ to gather stats from all processes
- From: David Ahern <dsahern@xxxxxxxxx>
- Re: INFO: task hung in pipe_release (2)
- From: syzbot <syzbot+61acc40a49a3e46e25ea@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Jeffrey E Altman <jaltman@xxxxxxxxxxxx>
- Re: file metadata via fs API
- From: Ian Kent <raven@xxxxxxxxxx>
- Re: file metadata via fs API
- From: Ian Kent <raven@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: KASAN: use-after-free Read in path_init (2)
- From: syzbot <syzbot+bbeb1c88016c7db4aa24@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API
- From: Steven Whitehouse <swhiteho@xxxxxxxxxx>
- Re: [PATCH v20 05/12] LSM: Infrastructure management of the superblock
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Re: KASAN: use-after-free Read in path_init (2)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: file metadata via fs API
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: file metadata via fs API
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: file metadata via fs API
- From: Karel Zak <kzak@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Karel Zak <kzak@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: file metadata via fs API
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: file metadata via fs API
- From: Steven Whitehouse <swhiteho@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [RFC PATCH 0/5] Introduce /proc/all/ to gather stats from all processes
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH] Re: KASAN: use-after-free Read in path_init (2)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Re: KASAN: use-after-free Read in path_init (2)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] Re: KASAN: use-after-free Read in path_init (2)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- KASAN: use-after-free Read in path_init (2)
- From: syzbot <syzbot+bbeb1c88016c7db4aa24@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Ian Kent <raven@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v7 5/7] fs,doc: Enable to enforce noexec mounts or file exec through O_MAYEXEC
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v7 4/7] fs: Introduce O_MAYEXEC flag for openat2(2)
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v7 3/7] exec: Move path_noexec() check earlier
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Lennart Poettering <mzxreary@xxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v7 2/7] exec: Move S_ISREG() check earlier
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v7 1/7] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v7 1/7] exec: Change uselib(2) IS_SREG() failure to EACCES
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH v5 3/9] x86: vdso: Expose sigreturn address on vdso to the kernel
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Deven Bowers <deven.desai@xxxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Pavel Machek <pavel@xxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v7 0/7] Add support for O_MAYEXEC
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Samba]
[Yosemite News]