Linux API
[Prev Page][Next Page]
- Re: [PATCH v12 8/8] x86: Disallow vsyscall emulation when CET is enabled
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v12 6/8] x86/vdso/32: Add ENDBR32 to __kernel_vsyscall entry point
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 7/8] x86/vdso: Insert endbr32/endbr64 to vDSO
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 24/26] x86/cet/shstk: Handle thread shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 5/8] x86/cet/ibt: Update arch_prctl functions for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 0/8] Control-flow Enforcement: Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 4/8] x86/cet/ibt: ELF header parsing for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 8/8] x86: Disallow vsyscall emulation when CET is enabled
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 26/26] mm: Introduce PROT_SHSTK for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 1/8] x86/cet/ibt: Add Kconfig option for user-mode Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 25/26] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 09/26] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 01/26] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 11/26] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY_HW to _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 02/26] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 12/26] mm: Introduce VM_SHSTK for shadow stack memory
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 15/26] mm: Fixup places that call pte_mkwrite() directly
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 13/26] x86/mm: Shadow Stack page fault error checking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 17/26] mm/mmap: Add shadow stack pages to memory accounting
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 16/26] mm: Add guard pages around a shadow stack.
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 04/26] x86/cet: Add control-protection fault handler
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 20/26] x86/cet/shstk: User-mode shadow stack support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 14/26] x86/mm: Update maybe_mkwrite() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 18/26] mm: Update can_follow_write_pte() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 19/26] mm: Re-introduce do_mmap_pgoff()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 22/26] binfmt_elf: Define GNU_PROPERTY_X86_FEATURE_1_AND properties
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 23/26] ELF: Introduce arch_setup_elf_property()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 21/26] x86/cet/shstk: Handle signals for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 08/26] x86/mm: Introduce _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 06/26] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 10/26] x86/mm: Update pte_modify for _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 03/26] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 07/26] x86/mm: Remove _PAGE_DIRTY_HW from kernel RO pages
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 05/26] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v12 00/26] Control-flow Enforcement: Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v5 0/5] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Qian Cai <cai@xxxxxxxxxx>
- Re: [PATCH v35 01/13] Linux Random Number Generator
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v10 0/6] ACPI: Support Generic Initiator proximity domains
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v35 01/13] Linux Random Number Generator
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v35 02/13] LRNG - allocate one DRNG instance per NUMA node
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v35 04/13] LRNG - add switchable DRNG support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v35 06/13] crypto: DRBG - externalize DRBG functions for LRNG
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v35 05/13] LRNG - add common generic hash support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v35 03/13] LRNG - sysctls and /proc interface
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v35 00/13] /dev/random - a new approach
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v35 08/13] LRNG - add kernel crypto API PRNG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v35 07/13] LRNG - add SP800-90A DRBG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v35 10/13] LRNG - add Jitter RNG fast noise source
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v35 12/13] LRNG - add interface for gathering of raw entropy
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v35 11/13] LRNG - add SP800-90B compliant health tests
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v35 09/13] crypto: provide access to a static Jitter RNG state
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v35 13/13] LRNG - add power-on and runtime self-tests
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 109/330] selftests/ftrace: fix glob selftest
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 318/330] selftests/x86/syscall_nt: Clear weird flags after each test
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 063/206] selftests/ftrace: fix glob selftest
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.19 200/206] selftests/x86/syscall_nt: Clear weird flags after each test
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 035/127] selftests/ftrace: fix glob selftest
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.9 89/90] selftests/x86/syscall_nt: Clear weird flags after each test
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 4.14 125/127] selftests/x86/syscall_nt: Clear weird flags after each test
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 200/330] selftests/ptrace: add test cases for dead-locks
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH AUTOSEL 5.4 071/330] selftests/bpf: De-flake test_tcpbpf
- From: Sasha Levin <sashal@xxxxxxxxxx>
- Re: [PATCH v2 1/2] vfs: block chmod of symlinks
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] compat: lift compat_s64 and compat_u64 to <asm-generic/compat.h>
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] compat: lift compat_s64 and compat_u64 to <asm-generic/compat.h>
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: "Madhavan T. Venkataraman" <madvenka@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v5 0/5] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Qian Cai <cai@xxxxxxxxxx>
- Re: [PATCH v5 1/3] open: add close_range()
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- [PATCH 3/3] quota: simplify the quotactl compat handling
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 2/3] compat: add a compat_need_64bit_alignment_fixup() helper
- From: Christoph Hellwig <hch@xxxxxx>
- [PATCH 1/3] compat: lift compat_s64 and compat_u64 to <asm-generic/compat.h>
- From: Christoph Hellwig <hch@xxxxxx>
- improve compat handling for the i386 u64 alignment quirk v3
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH v5 0/5] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v5 0/5] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v5 0/5] mm: introduce memfd_secret system call to create "secret" memory areas
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2 1/2] vfs: block chmod of symlinks
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] vfs: block chmod of symlinks
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v5 0/5] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] vfs: block chmod of symlinks
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v5 3/5] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v5 0/5] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v2 1/4] [RFC] fs/trampfd: Implement the trampoline file descriptor API
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- [PATCH v2 0/4] [RFC] Implement Trampoline File Descriptor
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- [PATCH v2 3/4] [RFC] arm64/trampfd: Provide support for the trampoline file descriptor
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- [PATCH v2 2/4] [RFC] x86/trampfd: Provide support for the trampoline file descriptor
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- [PATCH v2 4/4] [RFC] arm/trampfd: Provide support for the trampoline file descriptor
- From: madvenka@xxxxxxxxxxxxxxxxxxx
- Re: [PATCH v20 05/12] LSM: Infrastructure management of the superblock
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v2 1/2] vfs: block chmod of symlinks
- From: Rich Felker <dalias@xxxxxxxx>
- [PATCH v5 5/5] mm: secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v5 4/5] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v5 3/5] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v5 2/5] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v5 1/5] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v5 0/5] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v5 0/5] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v2 1/2] vfs: block chmod of symlinks
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] vfs: block chmod of symlinks
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] vfs: add fchmodat2 syscall
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/2] vfs: block chmod of symlinks
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] vfs: add fchmodat2 syscall
- From: Aleksa Sarai <cyphar@xxxxxxxxxx>
- Re: [PATCH RESEND 2/4] scsi: sg: implement BLKSSZGET
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- Re: [RFC PATCH v9 2/3] arch: Wire up introspect_access(2)
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH v2 2/2] vfs: add fchmodat2 syscall
- From: Rich Felker <dalias@xxxxxxxx>
- [PATCH v2 1/2] vfs: block chmod of symlinks
- From: Rich Felker <dalias@xxxxxxxx>
- [PATCH v2 0/2] changes for addding fchmodat2 syscall
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [NEEDS-REVIEW] Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [NEEDS-REVIEW] Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [NEEDS-REVIEW] Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [RFC]: userspace memory reaping
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- [RFC]: userspace memory reaping
- From: Suren Baghdasaryan <surenb@xxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [NEEDS-REVIEW] Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [NEEDS-REVIEW] Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: Ways to deprecate /sys/devices/system/memory/memoryX/phys_device ?
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [NEEDS-REVIEW] Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: Ways to deprecate /sys/devices/system/memory/memoryX/phys_device ?
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH RESEND 2/4] scsi: sg: implement BLKSSZGET
- From: Alan Stern <stern@xxxxxxxxxxxxxxxxxxx>
- Re: Ways to deprecate /sys/devices/system/memory/memoryX/phys_device ?
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v6 2/9] kernel: entry: Support TIF_SYSCAL_INTERCEPT on common entry code
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- RE: Ways to deprecate /sys/devices/system/memory/memoryX/phys_device ?
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH v6 1/9] kernel: Support TIF_SYSCALL_INTERCEPT flag
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: Ways to deprecate /sys/devices/system/memory/memoryX/phys_device ?
- From: David Hildenbrand <david@xxxxxxxxxx>
- RE: Ways to deprecate /sys/devices/system/memory/memoryX/phys_device ?
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: Ways to deprecate /sys/devices/system/memory/memoryX/phys_device ?
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH RESEND 2/4] scsi: sg: implement BLKSSZGET
- From: Douglas Gilbert <dgilbert@xxxxxxxxxxxx>
- Re: [PATCH 4/5] Add manpage for fsopen(2) and fsmount(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Igor Zhbanov <i.zhbanov@xxxxxxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: Ways to deprecate /sys/devices/system/memory/memoryX/phys_device ?
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v6 6/9] kernel: entry: Support Syscall User Dispatch for common syscall entry
- From: peterz@xxxxxxxxxxxxx
- Re: [PATCH v6 5/9] kernel: Implement selective syscall userspace redirection
- From: peterz@xxxxxxxxxxxxx
- Re: [PATCH v6 2/9] kernel: entry: Support TIF_SYSCAL_INTERCEPT on common entry code
- From: peterz@xxxxxxxxxxxxx
- Re: [PATCH v6 1/9] kernel: Support TIF_SYSCALL_INTERCEPT flag
- From: peterz@xxxxxxxxxxxxx
- Re: Ways to deprecate /sys/devices/system/memory/memoryX/phys_device ?
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: Ways to deprecate /sys/devices/system/memory/memoryX/phys_device ?
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: Ways to deprecate /sys/devices/system/memory/memoryX/phys_device ?
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH] vfs: add fchmodat2 syscall
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH RESEND 2/4] scsi: sg: implement BLKSSZGET
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH RESEND 2/4] scsi: sg: implement BLKSSZGET
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- Re: Ways to deprecate /sys/devices/system/memory/memoryX/phys_device ?
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: Ways to deprecate /sys/devices/system/memory/memoryX/phys_device ?
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: Ways to deprecate /sys/devices/system/memory/memoryX/phys_device ?
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- RE: [PATCH] vfs: add fchmodat2 syscall
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH] vfs: add fchmodat2 syscall
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] vfs: add fchmodat2 syscall
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH] vfs: add fchmodat2 syscall
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [PATCH] vfs: add fchmodat2 syscall
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [RFC PATCH v9 0/3] Add introspect_access(2) (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RESEND RFC PATCH 4/5] mm/remote_mapping: use a pidfd to access memory belonging to unrelated process
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH] vfs: add fchmodat2 syscall
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [PATCH] vfs: add fchmodat2 syscall
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [PATCH] vfs: add fchmodat2 syscall
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH] vfs: add fchmodat2 syscall
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- [PATCH] vfs: add fchmodat2 syscall
- From: Rich Felker <dalias@xxxxxxxx>
- Ways to deprecate /sys/devices/system/memory/memoryX/phys_device ?
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Thibaut Sautereau <thibaut.sautereau@xxxxxxxxxxx>
- Re: [PATCH RESEND 2/4] scsi: sg: implement BLKSSZGET
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH RESEND 2/4] scsi: sg: implement BLKSSZGET
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Stefan Hajnoczi <stefanha@xxxxxxxxxx>
- RE: [RESEND RFC PATCH 4/5] mm/remote_mapping: use a pidfd to access memory belonging to unrelated process
- From: Mircea CIRJALIU - MELIU <mcirjaliu@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 6/6] mm: secretmem: add ability to reserve memory at boot
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mimi Zohar <zohar@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 6/6] io_uring: add support for zone-append
- From: "hch@xxxxxxxxxxxxx" <hch@xxxxxxxxxxxxx>
- Re: [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 6/6] mm: secretmem: add ability to reserve memory at boot
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RESEND 2/4] scsi: sg: implement BLKSSZGET
- From: Christoph Hellwig <hch@xxxxxx>
- [RFC PATCH v8 1/3] fs: Introduce AT_INTERPRETED flag for faccessat2(2)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v8 2/3] fs,doc: Enable to configure exec checks for AT_INTERPRETED
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v8 0/3] Add support for AT_INTERPRETED (was O_MAYEXEC)
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [RFC PATCH v8 3/3] selftest/interpreter: Add tests for AT_INTERPRETED enforcing
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v6 1/9] kernel: Support TIF_SYSCALL_INTERCEPT flag
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v6 6/9] kernel: entry: Support Syscall User Dispatch for common syscall entry
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- RE: [RESEND RFC PATCH 0/5] Remote mapping
- From: Mircea CIRJALIU - MELIU <mcirjaliu@xxxxxxxxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- [PATCH v10 2/6] x86: Support Generic Initiator only proximity domains
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v10 0/6] ACPI: Support Generic Initiator proximity domains
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v10 5/6] node: Add access1 class to represent CPU to memory characteristics
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v6 6/9] kernel: entry: Support Syscall User Dispatch for common syscall entry
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- RE: [RESEND RFC PATCH 4/5] mm/remote_mapping: use a pidfd to access memory belonging to unrelated process
- From: Mircea CIRJALIU - MELIU <mcirjaliu@xxxxxxxxxxxxxxx>
- [PATCH 6/9] ARM: oabi-compat: rework sys_semtimedop emulation
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 4/5] mm/remote_mapping: use a pidfd to access memory belonging to unrelated process
- From: Adalbert Lazăr <alazar@xxxxxxxxxxxxxxx>
- Re: [RESEND RFC PATCH 4/5] mm/remote_mapping: use a pidfd to access memory belonging to unrelated process
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 5/5] pidfd_mem: implemented remote memory mapping system call
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 4/5] mm/remote_mapping: use a pidfd to access memory belonging to unrelated process
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v6 6/9] kernel: entry: Support Syscall User Dispatch for common syscall entry
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH v10 6/6] docs: mm: numaperf.rst Add brief description for access class 1.
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v10 4/6] ACPI: HMAT: Fix handling of changes from ACPI 6.2 to ACPI 6.3
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v10 3/6] ACPI: Let ACPI know we support Generic Initiator Affinity Structures
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v10 1/6] ACPI: Support Generic Initiator only domains
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 1/9] kernel: Support TIF_SYSCALL_INTERCEPT flag
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v6 2/9] kernel: entry: Support TIF_SYSCAL_INTERCEPT on common entry code
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- RE: [RESEND RFC PATCH 0/5] Remote mapping
- From: Mircea CIRJALIU - MELIU <mcirjaliu@xxxxxxxxxxxxxxx>
- Re: [PATCH v6 4/9] signal: Expose SYS_USER_DISPATCH si_code type
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v6 6/9] kernel: entry: Support Syscall User Dispatch for common syscall entry
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH RESEND 2/4] scsi: sg: implement BLKSSZGET
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH v4 6/6] io_uring: add support for zone-append
- From: Kanchan Joshi <joshiiitr@xxxxxxxxx>
- Re: [PATCH RESEND 2/4] scsi: sg: implement BLKSSZGET
- From: Christoph Hellwig <hch@xxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: Greg KH <greg@xxxxxxxxx>
- [PATCH RESEND v4 1/1] tpm: add sysfs exports for all banks of PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH RESEND v4 0/1] add sysfs exports for TPM 2 PCR registers
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- [PATCH v3 4/4] block/scsi_ioctl.c: use queue_logical_sector_size() in max_sectors_bytes()
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH v3 3/4] scsi: sg: use queue_logical_sector_size() in max_sectors_bytes()
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH v3 2/4] scsi: sg: implement BLKSSZGET
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH v3 1/4] scsi: sg: fix BLKSECTGET ioctl
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH v2 4/4] block/scsi_ioctl.c: use queue_logical_sector_size() in max_sectors_bytes()
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH v2 3/4] scsi: sg: use queue_logical_sector_size() in max_sectors_bytes()
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH v2 2/4] scsi: sg: implement BLKSSZGET
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH v2 1/4] scsi: sg: fix BLKSECTGET ioctl
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- Re: [PATCH RESEND 3/4] scsi: sg: use queue_logical_sector_size() in max_sectors_bytes()
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- Re: [PATCH RESEND 3/4] scsi: sg: use queue_logical_sector_size() in max_sectors_bytes()
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH RESEND 4/4] block/scsi_ioctl.c: use queue_logical_sector_size() in max_sectors_bytes()
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH RESEND 3/4] scsi: sg: use queue_logical_sector_size() in max_sectors_bytes()
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH RESEND 2/4] scsi: sg: implement BLKSSZGET
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH RESEND 1/4] scsi: sg: fix BLKSECTGET ioctl
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH RESEND 4/4] block/scsi_ioctl.c: use queue_logical_sector_size() in max_sectors_bytes()
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH RESEND 3/4] scsi: sg: use queue_logical_sector_size() in max_sectors_bytes()
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH RESEND 2/4] scsi: sg: implement BLKSSZGET
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- [PATCH RESEND 1/4] scsi: sg: fix BLKSECTGET ioctl
- From: Tom Yan <tom.ty89@xxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [PATCH v6 5/9] kernel: Implement selective syscall userspace redirection
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- [PATCH v6 4/9] signal: Expose SYS_USER_DISPATCH si_code type
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v6 2/9] kernel: entry: Support TIF_SYSCAL_INTERCEPT on common entry code
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v6 5/9] kernel: Implement selective syscall userspace redirection
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v6 3/9] x86: vdso: Expose sigreturn address on vdso to the kernel
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v6 9/9] doc: Document Syscall User Dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v6 8/9] selftests: Add kselftest for syscall user dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v6 7/9] x86: Enable Syscall User Dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v6 6/9] kernel: entry: Support Syscall User Dispatch for common syscall entry
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v6 0/9] Syscall User Dispatch
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- [PATCH v6 1/9] kernel: Support TIF_SYSCALL_INTERCEPT flag
- From: Gabriel Krisman Bertazi <krisman@xxxxxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [RESEND RFC PATCH 5/5] pidfd_mem: implemented remote memory mapping system call
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [RESEND RFC PATCH 4/5] mm/remote_mapping: use a pidfd to access memory belonging to unrelated process
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [PATCH] init: fix error check in clean_path()
- From: Christoph Hellwig <hch@xxxxxx>
- RE: [RESEND RFC PATCH 0/5] Remote mapping
- From: Mircea CIRJALIU - MELIU <mcirjaliu@xxxxxxxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- RE: [RESEND RFC PATCH 0/5] Remote mapping
- From: Mircea CIRJALIU - MELIU <mcirjaliu@xxxxxxxxxxxxxxx>
- Re: [PATCH v20 05/12] LSM: Infrastructure management of the superblock
- From: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>
- [PATCH] init: fix error check in clean_path()
- From: Barret Rhoden <brho@xxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- RE: [RESEND RFC PATCH 0/5] Remote mapping
- From: Mircea CIRJALIU - MELIU <mcirjaliu@xxxxxxxxxxxxxxx>
- Re: [RESEND RFC PATCH 0/5] Remote mapping
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RESEND RFC PATCH 3/5] mm/mmu_notifier: remove lockdep map, allow mmu notifier to be used in nested scenarios
- From: Jason Gunthorpe <jgg@xxxxxxxx>
- Re: [RFC PATCH 0/5] Remote mapping
- From: Adalbert Lazăr <alazar@xxxxxxxxxxxxxxx>
- [RESEND RFC PATCH 1/5] mm: add atomic capability to zap_details
- From: Adalbert Lazăr <alazar@xxxxxxxxxxxxxxx>
- [RESEND RFC PATCH 2/5] mm: let the VMA decide how zap_pte_range() acts on mapped pages
- From: Adalbert Lazăr <alazar@xxxxxxxxxxxxxxx>
- [RESEND RFC PATCH 3/5] mm/mmu_notifier: remove lockdep map, allow mmu notifier to be used in nested scenarios
- From: Adalbert Lazăr <alazar@xxxxxxxxxxxxxxx>
- [RESEND RFC PATCH 4/5] mm/remote_mapping: use a pidfd to access memory belonging to unrelated process
- From: Adalbert Lazăr <alazar@xxxxxxxxxxxxxxx>
- [RESEND RFC PATCH 0/5] Remote mapping
- From: Adalbert Lazăr <alazar@xxxxxxxxxxxxxxx>
- [RESEND RFC PATCH 5/5] pidfd_mem: implemented remote memory mapping system call
- From: Adalbert Lazăr <alazar@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 0/4] Support non-blocking pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 2/4] exit: support non-blocking pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RFC PATCH 0/5] Remote mapping
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v9 3/3] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 0/4] Support non-blocking pidfds
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] exit: support non-blocking pidfds
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/4] exit: support non-blocking pidfds
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH v2 1/4] pidfd: support PIDFD_NONBLOCK in pidfd_open()
- From: Josh Triplett <josh@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 3/3] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v9 3/3] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v9 3/3] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v2 2/4] exit: support non-blocking pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 1/4] pidfd: support PIDFD_NONBLOCK in pidfd_open()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2 1/4] pidfd: support PIDFD_NONBLOCK in pidfd_open()
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v2 2/4] exit: support non-blocking pidfds
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v2 1/4] pidfd: support PIDFD_NONBLOCK in pidfd_open()
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v4 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 4/5] Add manpage for fsopen(2) and fsmount(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH 4/5] Add manpage for fsopen(2) and fsmount(2)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 4/5] Add manpage for fsopen(2) and fsmount(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v2 3/4] tests: port pidfd_wait to kselftest harness
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 4/4] tests: add waitid() tests for non-blocking pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 2/4] exit: support non-blocking pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 0/4] Support non-blocking pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH v2 1/4] pidfd: support PIDFD_NONBLOCK in pidfd_open()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH v2] block: grant IOPRIO_CLASS_RT to CAP_SYS_NICE
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v2] block: grant IOPRIO_CLASS_RT to CAP_SYS_NICE
- From: Khazhismel Kumykov <khazhy@xxxxxxxxxx>
- Re: [PATCH v9 3/3] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 1/4] pidfd: support PIDFD_NONBLOCK in pidfd_open()
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH 1/4] pidfd: support PIDFD_NONBLOCK in pidfd_open()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 1/4] pidfd: support PIDFD_NONBLOCK in pidfd_open()
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH 2/4] exit: support non-blocking pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [PATCH 2/4] exit: support non-blocking pidfds
- From: Oleg Nesterov <oleg@xxxxxxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Mark Rutland <mark.rutland@xxxxxxx>
- Re: [Question] About SECCOMP issue for ILP32
- From: Xiongfeng Wang <wangxiongfeng2@xxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v9 3/3] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v9 1/3] mm/madvise: pass mm to do_madvise
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v9 2/3] pid: move pidfd_get_pid() to pid.c
- From: Minchan Kim <minchan@xxxxxxxxxx>
- [PATCH v9 0/3] introduce memory hinting API for external process
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [Question] About SECCOMP issue for ILP32
- From: Yury Norov <yury.norov@xxxxxxxxx>
- Re: [PATCH v2] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v2] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Jann Horn <jannh@xxxxxxxxxx>
- [PATCH v2] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Rich Felker <dalias@xxxxxxxx>
- [PATCH 2/4] exit: support non-blocking pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 3/4] tests: port pidfd_wait to kselftest harness
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 0/4] Support non-blocking pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 4/4] tests: add waitid() tests for non-blocking pidfds
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- [PATCH 1/4] pidfd: support PIDFD_NONBLOCK in pidfd_open()
- From: Christian Brauner <christian.brauner@xxxxxxxxxx>
- Re: [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [PATCH v34 04/12] LRNG - add switchable DRNG support
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v34 01/12] Linux Random Number Generator
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2] block: grant IOPRIO_CLASS_RT to CAP_SYS_NICE
- From: Bart Van Assche <bvanassche@xxxxxxx>
- Re: [PATCH v8 3/4] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- [RESEND PATCH] vfs: add RWF_NOAPPEND flag for pwritev2
- From: Rich Felker <dalias@xxxxxxxx>
- Re: [PATCH v8 3/4] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v8 3/4] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v8 3/4] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Minchan Kim <minchan@xxxxxxxxxx>
- Re: [PATCH v8 3/4] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Christian Brauner <christian@xxxxxxxxxx>
- Re: [PATCH v8 3/4] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Jens Axboe <axboe@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v8 3/4] mm/madvise: introduce process_madvise() syscall: an external memory hinting API
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH] x86: Extend arch_prctl (int, ...) to 5 arguments
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH 2/5] Add manpages for move_mount(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 02/18] fsinfo: Add fsinfo() syscall to query filesystem information [ver #21]
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 4/5] Add manpage for fsopen(2) and fsmount(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH 1/2] Add a manpage for watch_queue(7)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 5/5] Add manpage for fsconfig(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 1/5] Add manpage for open_tree(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 3/5] Add manpage for fspick(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "H.J. Lu" <hjl.tools@xxxxxxxxx>
- Re: [RFC PATCH] mm: extend memfd with ability to create "secret" memory areas
- From: Florian Weimer <fw@xxxxxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v20 22/23] LSM: Add /proc attr entry for full LSM context
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Martin <Dave.Martin@xxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [RFC PATCH] mm: extend memfd with ability to create "secret" memory areas
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Martin <Dave.Martin@xxxxxxx>
- [PATCH v20 22/23] LSM: Add /proc attr entry for full LSM context
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v33 01/12] Linux Random Number Generator
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v33 01/12] Linux Random Number Generator
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v4 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH 2/5] Add manpages for move_mount(2) and open_tree(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v5 3/9] fs: add RWF_ENCODED for reading/writing compressed data
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v11 8/9] x86/vdso: Insert endbr32/endbr64 to vDSO
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 9/9] x86: Disallow vsyscall emulation when CET is enabled
- From: "Yu, Yu-cheng" <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v34 01/12] Linux Random Number Generator
- From: Stephan Mueller <smueller@xxxxxxxxxx>
- Re: [PATCH v34 01/12] Linux Random Number Generator
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [RFC PATCH 0/5] Introduce /proc/all/ to gather stats from all processes
- From: Eugene Lubarsky <elubarsky.linux@xxxxxxxxx>
- Re: [RFC PATCH 0/5] Introduce /proc/all/ to gather stats from all processes
- From: Eugene Lubarsky <elubarsky.linux@xxxxxxxxx>
- Re: [PATCH v11 9/9] x86: Disallow vsyscall emulation when CET is enabled
- From: Florian Weimer <fweimer@xxxxxxxxxx>
- Re: [PATCH v5 3/9] fs: add RWF_ENCODED for reading/writing compressed data
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- [PATCH v34 08/12] crypto: provide access to a static Jitter RNG state
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 09/12] LRNG - add Jitter RNG fast noise source
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 06/12] LRNG - add SP800-90A DRBG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 07/12] LRNG - add kernel crypto API PRNG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 05/12] crypto: DRBG - externalize DRBG functions for LRNG
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 10/12] LRNG - add SP800-90B compliant health tests
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 12/12] LRNG - add power-on and runtime self-tests
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 03/12] LRNG - sysctls and /proc interface
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 11/12] LRNG - add interface for gathering of raw entropy
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 01/12] Linux Random Number Generator
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 02/12] LRNG - allocate one DRNG instance per NUMA node
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 04/12] LRNG - add switchable DRNG support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v34 00/12] /dev/random - a new approach with full SP800-90B compliance
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v11 02/25] x86/cpufeatures: Add CET CPU feature flags for Control-flow Enforcement Technology (CET)
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 00/25] Control-flow Enforcement: Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 8/9] x86/vdso: Insert endbr32/endbr64 to vDSO
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v11 03/25] x86/fpu/xstate: Introduce CET MSR XSAVES supervisor states
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 04/25] x86/cet: Add control-protection fault handler
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 09/25] drm/i915/gvt: Change _PAGE_DIRTY to _PAGE_DIRTY_BITS
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v11 9/9] x86: Disallow vsyscall emulation when CET is enabled
- From: Andy Lutomirski <luto@xxxxxxxxxx>
- [PATCH v11 11/25] x86/mm: Update ptep_set_wrprotect() and pmdp_set_wrprotect() for transition from _PAGE_DIRTY_HW to _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 14/25] x86/mm: Update maybe_mkwrite() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 13/25] x86/mm: Shadow Stack page fault error checking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 12/25] mm: Introduce VM_SHSTK for shadow stack memory
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 19/25] mm: Re-introduce do_mmap_pgoff()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 16/25] mm: Add guard pages around a shadow stack.
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 4/9] x86/cet/ibt: ELF header parsing for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 5/9] x86/cet/ibt: Update arch_prctl functions for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 1/9] x86/cet/ibt: Add Kconfig option for user-mode Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 6/9] x86/cet: Add PTRACE interface for CET
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 8/9] x86/vdso: Insert endbr32/endbr64 to vDSO
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 7/9] x86/vdso/32: Add ENDBR32 to __kernel_vsyscall entry point
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 2/9] x86/cet/ibt: User-mode Indirect Branch Tracking support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 0/9] Control-flow Enforcement: Indirect Branch Tracking, PTRACE
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 08/25] x86/mm: Introduce _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 9/9] x86: Disallow vsyscall emulation when CET is enabled
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 3/9] x86/cet/ibt: Handle signals for Indirect Branch Tracking
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 17/25] mm/mmap: Add shadow stack pages to memory accounting
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 21/25] x86/cet/shstk: Handle signals for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 25/25] x86/cet/shstk: Add arch_prctl functions for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 24/25] x86/cet/shstk: Handle thread shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 23/25] ELF: Introduce arch_setup_elf_property()
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 20/25] x86/cet/shstk: User-mode shadow stack support
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 22/25] binfmt_elf: Define GNU_PROPERTY_X86_FEATURE_1_AND properties
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 18/25] mm: Update can_follow_write_pte() for shadow stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 15/25] mm: Fixup places that call pte_mkwrite() directly
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 10/25] x86/mm: Update pte_modify for _PAGE_COW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 07/25] x86/mm: Remove _PAGE_DIRTY_HW from kernel RO pages
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 06/25] x86/mm: Change _PAGE_DIRTY to _PAGE_DIRTY_HW
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 05/25] x86/cet/shstk: Add Kconfig option for user-mode Shadow Stack
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- [PATCH v11 01/25] Documentation/x86: Add CET description
- From: Yu-cheng Yu <yu-cheng.yu@xxxxxxxxx>
- Re: [PATCH v5 3/9] fs: add RWF_ENCODED for reading/writing compressed data
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v5 9/9] btrfs: implement RWF_ENCODED writes
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v5 8/9] btrfs: implement RWF_ENCODED reads
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v5 2/9] fs: add O_ALLOW_ENCODED open flag
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v5 1/9] iov_iter: add copy_struct_from_iter()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH v5 9/9] btrfs: implement RWF_ENCODED writes
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v5 8/9] btrfs: implement RWF_ENCODED reads
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v5 7/9] btrfs: optionally extend i_size in cow_file_range_inline()
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v5 6/9] btrfs: support different disk extent size for delalloc
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v5 5/9] btrfs: add ram_bytes and offset to btrfs_ordered_extent
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v5 4/9] btrfs: don't advance offset for compressed bios in btrfs_csum_one_bio()
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v5 3/9] fs: add RWF_ENCODED for reading/writing compressed data
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v5 1/9] iov_iter: add copy_struct_from_iter()
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH v5 2/9] fs: add O_ALLOW_ENCODED open flag
- From: Josef Bacik <josef@xxxxxxxxxxxxxx>
- Re: [PATCH man-pages v5] Document encoded I/O
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- Re: [PATCH 1/2] Add a manpage for watch_queue(7)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/2] Add a manpage for watch_queue(7)
- From: Ben Boeckel <me@xxxxxxxxxxxxxx>
- [PATCH 1/2] Add a manpage for watch_queue(7)
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/2] Modify the pipe(2) manpage for notification queues
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 1/2] Add a manpage for watch_queue(7)
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 1/5] Add manpage for open_tree(2)
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 3/5] Add manpage for fspick(2)
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 4/5] Add manpage for fsopen(2) and fsmount(2)
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 5/5] Add manpage for fsconfig(2)
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH 2/5] Add manpages for move_mount(2)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH 2/5] Add manpages for move_mount(2) and open_tree(2)
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH v2 2/2] net: socket: implement SO_DESCRIPTION
- From: Pascal Bouchareine <kalou@xxxxxxx>
- Re: [PATCH v33 12/12] LRNG - add power-on and runtime self-tests
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v33 03/12] LRNG - sysctls and /proc interface
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH iproute2 v5 0/2] iplink: hsr: add support for creating PRP device
- From: Stephen Hemminger <stephen@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] net: socket: implement SO_DESCRIPTION
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] net: socket: implement SO_DESCRIPTION
- From: Pascal Bouchareine <kalou@xxxxxxx>
- Re: [PATCH v2 2/2] net: socket: implement SO_DESCRIPTION
- From: Pascal Bouchareine <kalou@xxxxxxx>
- Re: [PATCH 5/5] Add manpage for fsconfig(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 4/5] Add manpage for fsopen(2) and fsmount(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 3/5] Add manpage for fspick(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 2/5] Add manpages for move_mount(2) and open_tree(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH 1/5] Add manpage for open_tree(2)
- From: "Michael Kerrisk (man-pages)" <mtk.manpages@xxxxxxxxx>
- Re: [PATCH v2 2/2] net: socket: implement SO_DESCRIPTION
- From: Pascal Bouchareine <kalou@xxxxxxx>
- Re: [PATCH v2 1/2] mm: add GFP mask param to strndup_user
- From: Pascal Bouchareine <kalou@xxxxxxx>
- Re: [PATCH v2 2/2] net: socket: implement SO_DESCRIPTION
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] net: socket: implement SO_DESCRIPTION
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v33 01/12] Linux Random Number Generator
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v2 1/2] mm: add GFP mask param to strndup_user
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v33 01/12] Linux Random Number Generator
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v2 1/2] mm: add GFP mask param to strndup_user
- From: Pascal Bouchareine <kalou@xxxxxxx>
- [PATCH v2 2/2] net: socket: implement SO_DESCRIPTION
- From: Pascal Bouchareine <kalou@xxxxxxx>
- Re: [PATCH iproute2 v5 0/2] iplink: hsr: add support for creating PRP device
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- Re: [PATCH ghak90 V9 11/13] audit: contid check descendancy and nesting
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v33 01/12] Linux Random Number Generator
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH ghak90 V9 02/13] audit: add container id
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak90 V9 05/13] audit: log container info of syscalls
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak90 V9 06/13] audit: add contid support for signalling the audit daemon
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH ghak90 V9 08/13] audit: add containerid support for user records
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v9 4/6] ACPI: HMAT: Fix handling of changes from ACPI 6.2 to ACPI 6.3
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v9 4/6] ACPI: HMAT: Fix handling of changes from ACPI 6.2 to ACPI 6.3
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v9 4/6] ACPI: HMAT: Fix handling of changes from ACPI 6.2 to ACPI 6.3
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v9 4/6] ACPI: HMAT: Fix handling of changes from ACPI 6.2 to ACPI 6.3
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v9 4/6] ACPI: HMAT: Fix handling of changes from ACPI 6.2 to ACPI 6.3
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: file metadata via fs API
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: [PATCH v9 4/6] ACPI: HMAT: Fix handling of changes from ACPI 6.2 to ACPI 6.3
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v9 4/6] ACPI: HMAT: Fix handling of changes from ACPI 6.2 to ACPI 6.3
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH man-pages v5] Document encoded I/O
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v9 2/6] x86: Support Generic Initiator only proximity domains
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v5 3/9] fs: add RWF_ENCODED for reading/writing compressed data
- From: Amir Goldstein <amir73il@xxxxxxxxx>
- Re: [PATCH v9 4/6] ACPI: HMAT: Fix handling of changes from ACPI 6.2 to ACPI 6.3
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v5 9/9] btrfs: implement RWF_ENCODED writes
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v5 8/9] btrfs: implement RWF_ENCODED reads
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v5 7/9] btrfs: optionally extend i_size in cow_file_range_inline()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v5 6/9] btrfs: support different disk extent size for delalloc
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v5 4/9] btrfs: don't advance offset for compressed bios in btrfs_csum_one_bio()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v5 5/9] btrfs: add ram_bytes and offset to btrfs_ordered_extent
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v5 3/9] fs: add RWF_ENCODED for reading/writing compressed data
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v5 2/9] fs: add O_ALLOW_ENCODED open flag
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v5 1/9] iov_iter: add copy_struct_from_iter()
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH man-pages v5] Document encoded I/O
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v5 0/9] fs: interface for directly reading/writing compressed data
- From: Omar Sandoval <osandov@xxxxxxxxxxx>
- [PATCH v33 00/12] /dev/random - a new approach with full SP800-90B compliance
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 06/12] LRNG - add SP800-90A DRBG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 01/12] Linux Random Number Generator
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 03/12] LRNG - sysctls and /proc interface
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 02/12] LRNG - allocate one DRNG instance per NUMA node
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 04/12] LRNG - add switchable DRNG support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 09/12] LRNG - add Jitter RNG fast noise source
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 05/12] crypto: DRBG - externalize DRBG functions for LRNG
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 10/12] LRNG - add SP800-90B compliant health tests
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 11/12] LRNG - add interface for gathering of raw entropy
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 12/12] LRNG - add power-on and runtime self-tests
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 07/12] LRNG - add kernel crypto API PRNG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v33 08/12] crypto: provide access to a static Jitter RNG state
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v9 2/6] x86: Support Generic Initiator only proximity domains
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [PATCH v9 4/6] ACPI: HMAT: Fix handling of changes from ACPI 6.2 to ACPI 6.3
- From: Bjorn Helgaas <helgaas@xxxxxxxxxx>
- Re: [RFC PATCH 0/5] Introduce /proc/all/ to gather stats from all processes
- From: Andrei Vagin <avagin@xxxxxxxxx>
- Re: [PATCH v4 6/6] mm: secretmem: add ability to reserve memory at boot
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v32 11/12] LRNG - add interface for gathering of raw entropy
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v32 07/12] LRNG - add kernel crypto API PRNG extension
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v32 01/12] Linux Random Number Generator
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v32 06/12] LRNG - add SP800-90A DRBG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH v32 06/12] LRNG - add SP800-90A DRBG extension
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v32 01/12] Linux Random Number Generator
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH v32 03/12] LRNG - sysctls and /proc interface
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 10/12] LRNG - add SP800-90B compliant health tests
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 01/12] Linux Random Number Generator
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 06/12] LRNG - add SP800-90A DRBG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 04/12] LRNG - add switchable DRNG support
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 02/12] LRNG - allocate one DRNG instance per NUMA node
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 08/12] crypto: provide access to a static Jitter RNG state
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 09/12] LRNG - add Jitter RNG fast noise source
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 00/12] /dev/random - a new approach with full SP800-90B compliance
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 11/12] LRNG - add interface for gathering of raw entropy
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 07/12] LRNG - add kernel crypto API PRNG extension
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 05/12] crypto: DRBG - externalize DRBG functions for LRNG
- From: Stephan Müller <smueller@xxxxxxxxxx>
- [PATCH v32 12/12] LRNG - add power-on and runtime self-tests
- From: Stephan Müller <smueller@xxxxxxxxxx>
- Re: [PATCH iproute2 v5 0/2] iplink: hsr: add support for creating PRP device
- From: Murali Karicheri <m-karicheri2@xxxxxx>
- Re: [PATCH v1 0/4] [RFC] Implement Trampoline File Descriptor
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4 6/6] mm: secretmem: add ability to reserve memory at boot
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 6/6] mm: secretmem: add ability to reserve memory at boot
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v9 6/6] docs: mm: numaperf.rst Add brief description for access class 1.
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v9 5/6] node: Add access1 class to represent CPU to memory characteristics
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v9 4/6] ACPI: HMAT: Fix handling of changes from ACPI 6.2 to ACPI 6.3
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v9 3/6] ACPI: Let ACPI know we support Generic Initiator Affinity Structures
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v9 2/6] x86: Support Generic Initiator only proximity domains
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v9 1/6] ACPI: Support Generic Initiator only domains
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- [PATCH v9 0/6] ACPI: Support Generic Initiator proximity domains
- From: Jonathan Cameron <Jonathan.Cameron@xxxxxxxxxx>
- Re: [PATCH v4 6/6] mm: secretmem: add ability to reserve memory at boot
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 6/6] mm: secretmem: add ability to reserve memory at boot
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 6/6] mm: secretmem: add ability to reserve memory at boot
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH v4 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: file metadata via fs API
- From: Al Viro <viro@xxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: file metadata via fs API
- From: Miklos Szeredi <miklos@xxxxxxxxxx>
- Re: file metadata via fs API
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3] mm: introduce reference pages
- From: John Hubbard <jhubbard@xxxxxxxxxx>
- Re: file metadata via fs API (was: [GIT PULL] Filesystem Information)
- From: Jeffrey E Altman <jaltman@xxxxxxxxxxxx>
- [PATCH v4 6/6] mm: secretmem: add ability to reserve memory at boot
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v4 5/6] mm: secretmem: use PMD-size pages to amortize direct map fragmentation
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v4 3/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v4 4/6] arch, mm: wire up memfd_secret system call were relevant
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v4 2/6] mmap: make mlock_future_check() global
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v4 1/6] mm: add definition of PMD_PAGE_ORDER
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v4 0/6] mm: introduce memfd_secret system call to create "secret" memory areas
- From: Mike Rapoport <rppt@xxxxxxxxxx>
[Index of Archives]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Samba]
[Yosemite News]